From 708f73ecdfd14ba52e8cf80d35f6065dcb359891 Mon Sep 17 00:00:00 2001 From: runner Date: Mon, 15 Dec 2025 16:30:16 +0000 Subject: [PATCH 1/4] Automatic updates from complyscribe --- .../component-definition.json | 1986 ++++----- .../component-definition.json | 1962 ++++----- .../component-definition.json | 3662 ++++++++-------- .../component-definition.json | 3666 +++++++++-------- 4 files changed, 5818 insertions(+), 5458 deletions(-) diff --git a/component-definitions/rhel10/rhel10-cis_rhel10-l1_server/component-definition.json b/component-definitions/rhel10/rhel10-cis_rhel10-l1_server/component-definition.json index 718b6fff..a3897c4e 100644 --- a/component-definitions/rhel10/rhel10-cis_rhel10-l1_server/component-definition.json +++ b/component-definitions/rhel10/rhel10-cis_rhel10-l1_server/component-definition.json @@ -3,8 +3,8 @@ "uuid": "c4be1cdf-5566-4add-81ec-694b72fc0910", "metadata": { "title": "Component definition for rhel10", - "last-modified": "2025-12-11T18:25:33.421653+00:00", - "version": "3.2", + "last-modified": "2025-12-15T16:31:39.782834+00:00", + "version": "3.3", "oscal-version": "1.1.3" }, "components": [ @@ -4055,883 +4055,907 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_tmout", + "value": "no_invalid_shell_accounts_unlocked", "remarks": "rule_set_251" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Interactive Session Timeout", + "value": "Verify Non-Interactive Accounts Are Locked", "remarks": "rule_set_251" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_bashrc", + "value": "accounts_tmout", "remarks": "rule_set_252" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Bash Umask is Set Correctly", + "value": "Set Interactive Session Timeout", "remarks": "rule_set_252" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_login_defs", + "value": "accounts_umask_etc_bashrc", "remarks": "rule_set_253" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Umask is Set Correctly in login.defs", + "value": "Ensure the Default Bash Umask is Set Correctly", "remarks": "rule_set_253" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_profile", + "value": "accounts_umask_etc_login_defs", "remarks": "rule_set_254" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Umask is Set Correctly in /etc/profile", + "value": "Ensure the Default Umask is Set Correctly in login.defs", "remarks": "rule_set_254" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_aide_installed", + "value": "accounts_umask_etc_profile", "remarks": "rule_set_255" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install AIDE", + "value": "Ensure the Default Umask is Set Correctly in /etc/profile", "remarks": "rule_set_255" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_build_database", + "value": "package_aide_installed", "remarks": "rule_set_256" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Build and Test AIDE Database", + "value": "Install AIDE", "remarks": "rule_set_256" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_periodic_cron_checking", + "value": "aide_build_database", "remarks": "rule_set_257" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Periodic Execution of AIDE", + "value": "Build and Test AIDE Database", "remarks": "rule_set_257" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_check_audit_tools", + "value": "aide_periodic_cron_checking", "remarks": "rule_set_258" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure AIDE to Verify the Audit Tools", + "value": "Configure Periodic Execution of AIDE", "remarks": "rule_set_258" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_systemd-journald_enabled", + "value": "aide_check_audit_tools", "remarks": "rule_set_259" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable systemd-journald Service", + "value": "Configure AIDE to Verify the Audit Tools", "remarks": "rule_set_259" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_systemd-journal-remote_installed", + "value": "service_systemd-journald_enabled", "remarks": "rule_set_260" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install systemd-journal-remote Package", + "value": "Enable systemd-journald Service", "remarks": "rule_set_260" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_systemd-journal-upload_enabled", + "value": "ensure_journald_and_rsyslog_not_active_together", "remarks": "rule_set_261" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable systemd-journal-upload Service", + "value": "Ensure journald and rsyslog Are Not Active Together", "remarks": "rule_set_261" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "socket_systemd-journal-remote_disabled", + "value": "package_systemd-journal-remote_installed", "remarks": "rule_set_262" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable systemd-journal-remote Socket", + "value": "Install systemd-journal-remote Package", "remarks": "rule_set_262" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_disable_forward_to_syslog", + "value": "service_systemd-journal-upload_enabled", "remarks": "rule_set_263" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald ForwardToSyslog is disabled", + "value": "Enable systemd-journal-upload Service", "remarks": "rule_set_263" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_compress", + "value": "socket_systemd-journal-remote_disabled", "remarks": "rule_set_264" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald is configured to compress large log files", + "value": "Disable systemd-journal-remote Socket", "remarks": "rule_set_264" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_storage", + "value": "journald_disable_forward_to_syslog", "remarks": "rule_set_265" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald is configured to write log files to persistent disk", + "value": "Ensure journald ForwardToSyslog is disabled", "remarks": "rule_set_265" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_groupownership", + "value": "journald_compress", "remarks": "rule_set_266" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Log Files Are Owned By Appropriate Group", + "value": "Ensure journald is configured to compress large log files", "remarks": "rule_set_266" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_ownership", + "value": "journald_storage", "remarks": "rule_set_267" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Log Files Are Owned By Appropriate User", + "value": "Ensure journald is configured to write log files to persistent disk", "remarks": "rule_set_267" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_permissions", + "value": "rsyslog_files_groupownership", "remarks": "rule_set_268" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure System Log Files Have Correct Permissions", + "value": "Ensure Log Files Are Owned By Appropriate Group", "remarks": "rule_set_268" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_passwd", + "value": "rsyslog_files_ownership", "remarks": "rule_set_269" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns passwd File", + "value": "Ensure Log Files Are Owned By Appropriate User", "remarks": "rule_set_269" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_passwd", + "value": "rsyslog_files_permissions", "remarks": "rule_set_270" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns passwd File", + "value": "Ensure System Log Files Have Correct Permissions", "remarks": "rule_set_270" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_passwd", + "value": "file_groupowner_etc_passwd", "remarks": "rule_set_271" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on passwd File", + "value": "Verify Group Who Owns passwd File", "remarks": "rule_set_271" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_passwd", + "value": "file_owner_etc_passwd", "remarks": "rule_set_272" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup passwd File", + "value": "Verify User Who Owns passwd File", "remarks": "rule_set_272" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_passwd", + "value": "file_permissions_etc_passwd", "remarks": "rule_set_273" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup passwd File", + "value": "Verify Permissions on passwd File", "remarks": "rule_set_273" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_passwd", + "value": "file_groupowner_backup_etc_passwd", "remarks": "rule_set_274" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup passwd File", + "value": "Verify Group Who Owns Backup passwd File", "remarks": "rule_set_274" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_group", + "value": "file_owner_backup_etc_passwd", "remarks": "rule_set_275" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns group File", + "value": "Verify User Who Owns Backup passwd File", "remarks": "rule_set_275" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_group", + "value": "file_permissions_backup_etc_passwd", "remarks": "rule_set_276" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns group File", + "value": "Verify Permissions on Backup passwd File", "remarks": "rule_set_276" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_group", + "value": "file_groupowner_etc_group", "remarks": "rule_set_277" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on group File", + "value": "Verify Group Who Owns group File", "remarks": "rule_set_277" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_group", + "value": "file_owner_etc_group", "remarks": "rule_set_278" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup group File", + "value": "Verify User Who Owns group File", "remarks": "rule_set_278" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_group", + "value": "file_permissions_etc_group", "remarks": "rule_set_279" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup group File", + "value": "Verify Permissions on group File", "remarks": "rule_set_279" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_group", + "value": "file_groupowner_backup_etc_group", "remarks": "rule_set_280" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup group File", + "value": "Verify Group Who Owns Backup group File", "remarks": "rule_set_280" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_shadow", + "value": "file_owner_backup_etc_group", "remarks": "rule_set_281" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns shadow File", + "value": "Verify User Who Owns Backup group File", "remarks": "rule_set_281" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_shadow", + "value": "file_permissions_backup_etc_group", "remarks": "rule_set_282" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns shadow File", + "value": "Verify Permissions on Backup group File", "remarks": "rule_set_282" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_shadow", + "value": "file_owner_etc_shadow", "remarks": "rule_set_283" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on shadow File", + "value": "Verify User Who Owns shadow File", "remarks": "rule_set_283" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_shadow", + "value": "file_groupowner_etc_shadow", "remarks": "rule_set_284" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup shadow File", + "value": "Verify Group Who Owns shadow File", "remarks": "rule_set_284" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_shadow", + "value": "file_permissions_etc_shadow", "remarks": "rule_set_285" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup shadow File", + "value": "Verify Permissions on shadow File", "remarks": "rule_set_285" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_shadow", + "value": "file_groupowner_backup_etc_shadow", "remarks": "rule_set_286" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup shadow File", + "value": "Verify User Who Owns Backup shadow File", "remarks": "rule_set_286" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_gshadow", + "value": "file_owner_backup_etc_shadow", "remarks": "rule_set_287" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns gshadow File", + "value": "Verify Group Who Owns Backup shadow File", "remarks": "rule_set_287" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_gshadow", + "value": "file_permissions_backup_etc_shadow", "remarks": "rule_set_288" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns gshadow File", + "value": "Verify Permissions on Backup shadow File", "remarks": "rule_set_288" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_gshadow", + "value": "file_groupowner_etc_gshadow", "remarks": "rule_set_289" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on gshadow File", + "value": "Verify Group Who Owns gshadow File", "remarks": "rule_set_289" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_gshadow", + "value": "file_owner_etc_gshadow", "remarks": "rule_set_290" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup gshadow File", + "value": "Verify User Who Owns gshadow File", "remarks": "rule_set_290" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_gshadow", + "value": "file_permissions_etc_gshadow", "remarks": "rule_set_291" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup gshadow File", + "value": "Verify Permissions on gshadow File", "remarks": "rule_set_291" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_gshadow", + "value": "file_groupowner_backup_etc_gshadow", "remarks": "rule_set_292" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup gshadow File", + "value": "Verify Group Who Owns Backup gshadow File", "remarks": "rule_set_292" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_shells", + "value": "file_owner_backup_etc_gshadow", "remarks": "rule_set_293" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns /etc/shells File", + "value": "Verify User Who Owns Backup gshadow File", "remarks": "rule_set_293" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_shells", + "value": "file_permissions_backup_etc_gshadow", "remarks": "rule_set_294" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Who Owns /etc/shells File", + "value": "Verify Permissions on Backup gshadow File", "remarks": "rule_set_294" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_shells", + "value": "file_groupowner_etc_shells", "remarks": "rule_set_295" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on /etc/shells File", + "value": "Verify Group Who Owns /etc/shells File", "remarks": "rule_set_295" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_security_opasswd", + "value": "file_owner_etc_shells", "remarks": "rule_set_296" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns /etc/security/opasswd File", + "value": "Verify Who Owns /etc/shells File", "remarks": "rule_set_296" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_security_opasswd", + "value": "file_permissions_etc_shells", "remarks": "rule_set_297" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns /etc/security/opasswd File", + "value": "Verify Permissions on /etc/shells File", "remarks": "rule_set_297" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_security_opasswd", + "value": "file_groupowner_etc_security_opasswd", "remarks": "rule_set_298" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on /etc/security/opasswd File", + "value": "Verify Group Who Owns /etc/security/opasswd File", "remarks": "rule_set_298" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_security_opasswd_old", + "value": "file_owner_etc_security_opasswd", "remarks": "rule_set_299" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns /etc/security/opasswd.old File", + "value": "Verify User Who Owns /etc/security/opasswd File", "remarks": "rule_set_299" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_security_opasswd_old", + "value": "file_permissions_etc_security_opasswd", "remarks": "rule_set_300" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns /etc/security/opasswd.old File", + "value": "Verify Permissions on /etc/security/opasswd File", "remarks": "rule_set_300" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_security_opasswd_old", + "value": "file_groupowner_etc_security_opasswd_old", "remarks": "rule_set_301" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on /etc/security/opasswd.old File", + "value": "Verify Group Who Owns /etc/security/opasswd.old File", "remarks": "rule_set_301" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_unauthorized_world_writable", + "value": "file_owner_etc_security_opasswd_old", "remarks": "rule_set_302" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure No World-Writable Files Exist", + "value": "Verify User Who Owns /etc/security/opasswd.old File", "remarks": "rule_set_302" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dir_perms_world_writable_sticky_bits", + "value": "file_permissions_etc_security_opasswd_old", "remarks": "rule_set_303" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify that All World-Writable Directories Have Sticky Bits Set", + "value": "Verify Permissions on /etc/security/opasswd.old File", "remarks": "rule_set_303" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_files_or_dirs_unowned_by_user", + "value": "file_permissions_unauthorized_world_writable", "remarks": "rule_set_304" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All Files And Directories Are Owned by a User", + "value": "Ensure No World-Writable Files Exist", "remarks": "rule_set_304" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_files_or_dirs_ungroupowned", + "value": "dir_perms_world_writable_sticky_bits", "remarks": "rule_set_305" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All Files And Directories Are Owned by a Group", + "value": "Verify that All World-Writable Directories Have Sticky Bits Set", "remarks": "rule_set_305" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_all_shadowed", + "value": "no_files_or_dirs_unowned_by_user", "remarks": "rule_set_306" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify All Account Password Hashes are Shadowed", + "value": "Ensure All Files And Directories Are Owned by a User", "remarks": "rule_set_306" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_empty_passwords_etc_shadow", + "value": "no_files_or_dirs_ungroupowned", "remarks": "rule_set_307" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure There Are No Accounts With Blank or Null Passwords", + "value": "Ensure All Files And Directories Are Owned by a Group", "remarks": "rule_set_307" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "gid_passwd_group_same", + "value": "accounts_password_all_shadowed", "remarks": "rule_set_308" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", + "value": "Verify All Account Password Hashes are Shadowed", "remarks": "rule_set_308" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "account_unique_id", + "value": "no_empty_passwords_etc_shadow", "remarks": "rule_set_309" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All Accounts on the System Have Unique User IDs", + "value": "Ensure There Are No Accounts With Blank or Null Passwords", "remarks": "rule_set_309" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "group_unique_id", + "value": "gid_passwd_group_same", "remarks": "rule_set_310" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All Groups on the System Have Unique Group ID", + "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", "remarks": "rule_set_310" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "account_unique_name", + "value": "account_unique_id", "remarks": "rule_set_311" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All Accounts on the System Have Unique Names", + "value": "Ensure All Accounts on the System Have Unique User IDs", "remarks": "rule_set_311" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "group_unique_name", + "value": "group_unique_id", "remarks": "rule_set_312" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All Groups on the System Have Unique Group Names", + "value": "Ensure All Groups on the System Have Unique Group ID", "remarks": "rule_set_312" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_user_interactive_home_directory_exists", + "value": "account_unique_name", "remarks": "rule_set_313" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All Interactive Users Home Directories Must Exist", + "value": "Ensure All Accounts on the System Have Unique Names", "remarks": "rule_set_313" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_ownership_home_directories", + "value": "group_unique_name", "remarks": "rule_set_314" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All Interactive User Home Directories Must Be Owned By The Primary User", + "value": "Ensure All Groups on the System Have Unique Group Names", "remarks": "rule_set_314" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_home_directories", + "value": "accounts_user_interactive_home_directory_exists", "remarks": "rule_set_315" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", + "value": "All Interactive Users Home Directories Must Exist", "remarks": "rule_set_315" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_user_dot_group_ownership", + "value": "file_ownership_home_directories", "remarks": "rule_set_316" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "User Initialization Files Must Be Group-Owned By The Primary Group", + "value": "All Interactive User Home Directories Must Be Owned By The Primary User", "remarks": "rule_set_316" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_user_dot_user_ownership", + "value": "file_permissions_home_directories", "remarks": "rule_set_317" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "User Initialization Files Must Be Owned By the Primary User", + "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", "remarks": "rule_set_317" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_user_dot_no_world_writable_programs", + "value": "accounts_user_dot_group_ownership", "remarks": "rule_set_318" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "User Initialization Files Must Not Run World-Writable Programs", + "value": "User Initialization Files Must Be Group-Owned By The Primary Group", "remarks": "rule_set_318" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permission_user_init_files", + "value": "accounts_user_dot_user_ownership", "remarks": "rule_set_319" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", + "value": "User Initialization Files Must Be Owned By the Primary User", "remarks": "rule_set_319" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_forward_files", + "value": "accounts_user_dot_no_world_writable_programs", "remarks": "rule_set_320" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify No .forward Files Exist", + "value": "User Initialization Files Must Not Run World-Writable Programs", "remarks": "rule_set_320" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_netrc_files", + "value": "file_permission_user_init_files", "remarks": "rule_set_321" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify No netrc Files Exist", + "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", "remarks": "rule_set_321" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_rhost_files", + "value": "no_forward_files", "remarks": "rule_set_322" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify No .rhost Files Exist", + "value": "Verify No .forward Files Exist", "remarks": "rule_set_322" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permission_user_bash_history", + "value": "no_netrc_files", "remarks": "rule_set_323" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure User Bash History File Has Correct Permissions", + "value": "Verify No netrc Files Exist", "remarks": "rule_set_323" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "no_rhost_files", + "remarks": "rule_set_324" + }, + { + "name": "Rule_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Verify No .rhost Files Exist", + "remarks": "rule_set_324" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "file_permission_user_bash_history", + "remarks": "rule_set_325" + }, + { + "name": "Rule_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Ensure User Bash History File Has Correct Permissions", + "remarks": "rule_set_325" } ], "control-implementations": [ { - "uuid": "1998505d-7863-45c6-8b30-2a7ee43e6089", + "uuid": "04e970cf-1d25-48df-8c58-d13c6676885e", "source": "trestle://profiles/rhel10-cis_rhel10-l1_server/profile.json", "description": "Control implementation for cis_server_l1", "props": [ @@ -5287,7 +5311,7 @@ ], "implemented-requirements": [ { - "uuid": "4cae1bae-2f77-4d56-ac12-0a7e1692b11a", + "uuid": "f7a95cb1-2821-4642-be9c-36b743c64653", "control-id": "reload_dconf_db", "description": "This is a helper rule to reload Dconf database correctly.", "props": [ @@ -5304,7 +5328,7 @@ ] }, { - "uuid": "d16277c9-1378-42d7-90c9-8083e07fd3f7", + "uuid": "f7265b30-2e8e-43c1-9521-3cc684b42296", "control-id": "cis_rhel10_1-1.1.1", "description": "No notes for control-id 1.1.1.1.", "props": [ @@ -5321,7 +5345,7 @@ ] }, { - "uuid": "2e380517-4f2b-45cd-83ff-af0efe706fb6", + "uuid": "e931d14b-3953-459e-899e-ec388a2a292b", "control-id": "cis_rhel10_1-1.1.2", "description": "No notes for control-id 1.1.1.2.", "props": [ @@ -5338,7 +5362,7 @@ ] }, { - "uuid": "568094d7-756e-492f-bfca-efe794dec593", + "uuid": "3d9dd117-f650-43fd-b3ec-8453a9e6d7a9", "control-id": "cis_rhel10_1-1.1.3", "description": "No notes for control-id 1.1.1.3.", "props": [ @@ -5355,7 +5379,7 @@ ] }, { - "uuid": "2f36d2b5-60e9-467a-8a91-6f76809c5072", + "uuid": "5d824f5d-0c23-4aec-9e01-6ef07691b45b", "control-id": "cis_rhel10_1-1.1.4", "description": "No notes for control-id 1.1.1.4.", "props": [ @@ -5372,7 +5396,7 @@ ] }, { - "uuid": "cdf7ad16-5e87-4987-b49c-379abe65d7f5", + "uuid": "95f17a8c-17b3-4405-adc6-2d6e1d80e1e4", "control-id": "cis_rhel10_1-1.1.5", "description": "No notes for control-id 1.1.1.5.", "props": [ @@ -5389,7 +5413,7 @@ ] }, { - "uuid": "a025fc0b-d574-4c12-b9c7-9d1d0932b6ce", + "uuid": "257ad5e5-0e5d-46a4-afdf-39b51d5e2167", "control-id": "cis_rhel10_1-1.1.9", "description": "No notes for control-id 1.1.1.9.", "props": [ @@ -5406,7 +5430,7 @@ ] }, { - "uuid": "4a36e0dc-d357-42cf-825b-1021a50a7f56", + "uuid": "a2696cc8-fee2-4120-b18e-12832e359fe7", "control-id": "cis_rhel10_1-1.1.10", "description": "No notes for control-id 1.1.1.10.", "props": [ @@ -5423,7 +5447,7 @@ ] }, { - "uuid": "fe103713-36c2-4f3c-b05d-fc55401af7eb", + "uuid": "76f1fee7-05aa-47df-9a03-f52a2f385543", "control-id": "cis_rhel10_1-1.1.11", "description": "The description for control-id cis_rhel10_1-1.1.11.", "props": [ @@ -5436,7 +5460,7 @@ ] }, { - "uuid": "29b7085c-baee-4d8a-99d0-3b5d8d600ff7", + "uuid": "4d1b1da6-db37-4191-aa6c-247f125a18d7", "control-id": "cis_rhel10_1-1.2.1.1", "description": "No notes for control-id 1.1.2.1.1.", "props": [ @@ -5453,7 +5477,7 @@ ] }, { - "uuid": "3a83b78b-d036-43f8-9d88-5d9175de36bf", + "uuid": "f61f40ed-adc7-4eff-ab41-63f3c0be9f33", "control-id": "cis_rhel10_1-1.2.1.2", "description": "No notes for control-id 1.1.2.1.2.", "props": [ @@ -5470,7 +5494,7 @@ ] }, { - "uuid": "0e6b1b4f-5119-4f73-a78f-b259a7177688", + "uuid": "6efc6a5f-e7fe-48e3-a3d3-961b3fda02db", "control-id": "cis_rhel10_1-1.2.1.3", "description": "No notes for control-id 1.1.2.1.3.", "props": [ @@ -5487,7 +5511,7 @@ ] }, { - "uuid": "9d2db1cb-1133-4901-b7c4-e12c3f793b70", + "uuid": "094b3b50-4228-43a3-b18e-75cd3056f925", "control-id": "cis_rhel10_1-1.2.1.4", "description": "No notes for control-id 1.1.2.1.4.", "props": [ @@ -5504,7 +5528,7 @@ ] }, { - "uuid": "81a17f51-d057-475c-9b78-748ae225c50a", + "uuid": "daec4674-01f3-4a6e-ab01-a6a80644d521", "control-id": "cis_rhel10_1-1.2.2.1", "description": "No notes for control-id 1.1.2.2.1.", "props": [ @@ -5521,7 +5545,7 @@ ] }, { - "uuid": "0f0e35e0-cb60-49c4-85bf-99daf220d0e5", + "uuid": "839d903a-c1dc-4b6e-9dac-a3e7bb5bf1b6", "control-id": "cis_rhel10_1-1.2.2.2", "description": "No notes for control-id 1.1.2.2.2.", "props": [ @@ -5538,7 +5562,7 @@ ] }, { - "uuid": "4bc50223-ea16-41c6-ab6b-905fd63a0b90", + "uuid": "1108c228-a41f-4433-a782-627c8f726806", "control-id": "cis_rhel10_1-1.2.2.3", "description": "No notes for control-id 1.1.2.2.3.", "props": [ @@ -5555,7 +5579,7 @@ ] }, { - "uuid": "a61d0c09-91e0-4afd-b28a-5813afbbaa6f", + "uuid": "5f9db1a0-08a0-4cd3-8736-23604dc30910", "control-id": "cis_rhel10_1-1.2.2.4", "description": "No notes for control-id 1.1.2.2.4.", "props": [ @@ -5572,7 +5596,7 @@ ] }, { - "uuid": "f136e369-ac5c-4a34-bbfd-347a3d901964", + "uuid": "2a2d2c2d-29fe-4946-8121-b1258b881e61", "control-id": "cis_rhel10_1-1.2.3.2", "description": "No notes for control-id 1.1.2.3.2.", "props": [ @@ -5589,7 +5613,7 @@ ] }, { - "uuid": "898f32b4-6c0f-43a5-8a45-33f02f85a054", + "uuid": "7a2c0760-a31e-451d-a630-15c4e0446a2a", "control-id": "cis_rhel10_1-1.2.3.3", "description": "No notes for control-id 1.1.2.3.3.", "props": [ @@ -5606,7 +5630,7 @@ ] }, { - "uuid": "08741a51-d08c-4a5d-930a-a93dfc7d2d6e", + "uuid": "a6cf335b-6072-4ba7-8615-4622ac2d3fda", "control-id": "cis_rhel10_1-1.2.4.2", "description": "No notes for control-id 1.1.2.4.2.", "props": [ @@ -5623,7 +5647,7 @@ ] }, { - "uuid": "969ac3fb-26aa-45a9-b9e1-5708d49ff93f", + "uuid": "f7595f82-5f96-42e7-bd97-0299356821e4", "control-id": "cis_rhel10_1-1.2.4.3", "description": "No notes for control-id 1.1.2.4.3.", "props": [ @@ -5640,7 +5664,7 @@ ] }, { - "uuid": "d625aa05-ffa8-45e6-8665-714a9b212174", + "uuid": "5cb3e6ce-c0a4-47c2-8e93-658a66449d84", "control-id": "cis_rhel10_1-1.2.5.2", "description": "No notes for control-id 1.1.2.5.2.", "props": [ @@ -5657,7 +5681,7 @@ ] }, { - "uuid": "da37b3c6-ed15-47e3-ad1d-98b432f562b6", + "uuid": "7f5a1e6c-9ae9-492f-bfe0-7a40e6128138", "control-id": "cis_rhel10_1-1.2.5.3", "description": "No notes for control-id 1.1.2.5.3.", "props": [ @@ -5674,7 +5698,7 @@ ] }, { - "uuid": "c1ac9b83-0c64-4bdd-9972-f677afdfeb24", + "uuid": "0f855059-27cf-43dd-b80f-b8e06ccd01ee", "control-id": "cis_rhel10_1-1.2.5.4", "description": "No notes for control-id 1.1.2.5.4.", "props": [ @@ -5691,7 +5715,7 @@ ] }, { - "uuid": "15d17a42-2ac0-4736-9ede-18ea8910bc47", + "uuid": "f8989f80-92da-413d-9461-1ebcca435b71", "control-id": "cis_rhel10_1-1.2.6.2", "description": "No notes for control-id 1.1.2.6.2.", "props": [ @@ -5708,7 +5732,7 @@ ] }, { - "uuid": "4ebbd487-1572-4bf8-9fc2-80f7badae87e", + "uuid": "b3404b4c-2cab-475c-8b7b-6413ba7cd657", "control-id": "cis_rhel10_1-1.2.6.3", "description": "No notes for control-id 1.1.2.6.3.", "props": [ @@ -5725,7 +5749,7 @@ ] }, { - "uuid": "b63acfeb-04dc-47e7-9f3e-fe9df20c7750", + "uuid": "4397eed8-9cde-4f46-bf1d-d18388682cd8", "control-id": "cis_rhel10_1-1.2.6.4", "description": "No notes for control-id 1.1.2.6.4.", "props": [ @@ -5742,7 +5766,7 @@ ] }, { - "uuid": "7226ae45-b0ca-4e66-97db-25f0fa4ad80e", + "uuid": "e1ec2059-0de1-4d97-8c8b-8ac862388904", "control-id": "cis_rhel10_1-1.2.7.2", "description": "No notes for control-id 1.1.2.7.2.", "props": [ @@ -5759,7 +5783,7 @@ ] }, { - "uuid": "9cfdef34-fbb4-4112-afa1-38aff32331c2", + "uuid": "1b3749b4-25c0-4976-9071-9c669802db03", "control-id": "cis_rhel10_1-1.2.7.3", "description": "No notes for control-id 1.1.2.7.3.", "props": [ @@ -5776,7 +5800,7 @@ ] }, { - "uuid": "a7849b0c-66d0-45fd-8004-8a8a294c2f2b", + "uuid": "25bb48bc-87b7-4e87-b590-99eb8f678332", "control-id": "cis_rhel10_1-1.2.7.4", "description": "No notes for control-id 1.1.2.7.4.", "props": [ @@ -5793,7 +5817,7 @@ ] }, { - "uuid": "da49cf76-28eb-4234-9959-2b015aeeb29f", + "uuid": "4764e1cf-301a-4a0e-a01e-dc13d70111a8", "control-id": "cis_rhel10_1-2.1.1", "description": "The description for control-id cis_rhel10_1-2.1.1.", "props": [ @@ -5806,7 +5830,7 @@ ] }, { - "uuid": "17c7f713-2c46-42b5-955b-0d6867b8e50d", + "uuid": "4520d2b9-1f6d-43d7-b13b-786343350972", "control-id": "cis_rhel10_1-2.1.2", "description": "No notes for control-id 1.2.1.2.", "props": [ @@ -5823,7 +5847,7 @@ ] }, { - "uuid": "e74688e9-17e3-475e-8970-60a5010d63d5", + "uuid": "d568115b-cef8-4707-be82-e498cfa6a84b", "control-id": "cis_rhel10_1-2.1.4", "description": "The description for control-id cis_rhel10_1-2.1.4.", "props": [ @@ -5836,7 +5860,7 @@ ] }, { - "uuid": "620761ef-47c5-47b9-a708-f68b976be384", + "uuid": "dc7619fb-64f5-41e8-a785-72803fcd106a", "control-id": "cis_rhel10_1-2.2.1", "description": "The description for control-id cis_rhel10_1-2.2.1.", "props": [ @@ -5849,7 +5873,7 @@ ] }, { - "uuid": "4517a612-ad61-43d8-aa69-9601f756e484", + "uuid": "98dad05b-a3b8-4626-8a23-d9142a92af81", "control-id": "cis_rhel10_1-3.1.1", "description": "No notes for control-id 1.3.1.1.", "props": [ @@ -5866,7 +5890,7 @@ ] }, { - "uuid": "048291c7-50e1-4e0a-be47-63f4e51b6d20", + "uuid": "36ce91a5-ed25-40f6-b034-75755d2b46fd", "control-id": "cis_rhel10_1-3.1.2", "description": "No notes for control-id 1.3.1.2.", "props": [ @@ -5883,7 +5907,7 @@ ] }, { - "uuid": "8e37922a-f692-4e6c-b87d-a34c9201f8e3", + "uuid": "286db676-0ab1-4d88-81c8-34baee75020d", "control-id": "cis_rhel10_1-3.1.3", "description": "No notes for control-id 1.3.1.3.", "props": [ @@ -5900,7 +5924,7 @@ ] }, { - "uuid": "06072c03-2a7e-411b-826a-849744c55a2c", + "uuid": "eb0fbc14-7207-4fe6-b9fe-2538690ec9a6", "control-id": "cis_rhel10_1-3.1.4", "description": "No notes for control-id 1.3.1.4.", "props": [ @@ -5917,7 +5941,7 @@ ] }, { - "uuid": "185bc6cc-7120-4981-ae82-f01563358190", + "uuid": "616e7f3f-670f-4f64-a270-2671b23682a5", "control-id": "cis_rhel10_1-3.1.7", "description": "No notes for control-id 1.3.1.7.", "props": [ @@ -5934,7 +5958,7 @@ ] }, { - "uuid": "f6048e93-82e7-4710-8938-2f99487309fd", + "uuid": "9e3e3270-e094-4a80-9071-cc1f74c7a833", "control-id": "cis_rhel10_1-3.1.8", "description": "No notes for control-id 1.3.1.8.", "props": [ @@ -5951,7 +5975,7 @@ ] }, { - "uuid": "3e51f553-94cc-4cd2-899f-d97db357c416", + "uuid": "2a24d402-bae8-488f-be03-dde6948a95bb", "control-id": "cis_rhel10_1-4.1", "description": "There is no automated remediation for this rule and this is intentional.\nMore details in the rule description.", "props": [ @@ -5968,7 +5992,7 @@ ] }, { - "uuid": "c9f53417-18bb-470b-b20f-7bbc7a4a5fb5", + "uuid": "66d8fc18-2e27-4e54-bcc2-1090c742ba30", "control-id": "cis_rhel10_1-4.2", "description": "The description for control-id cis_rhel10_1-4.2.", "props": [ @@ -6011,7 +6035,7 @@ ] }, { - "uuid": "4041a638-4e1d-46fd-8c98-458109d101cd", + "uuid": "0157a93e-0985-4690-93fc-fe2bfbf298b3", "control-id": "cis_rhel10_1-5.1", "description": "No notes for control-id 1.5.1.", "props": [ @@ -6028,7 +6052,7 @@ ] }, { - "uuid": "f630047b-0828-4fca-a12d-0fdd8078c06d", + "uuid": "6d347044-2b97-4eca-a658-21ec287796fc", "control-id": "cis_rhel10_1-5.2", "description": "No notes for control-id 1.5.2.", "props": [ @@ -6045,7 +6069,7 @@ ] }, { - "uuid": "d3496bef-15ff-4337-95e3-7aa68384be2a", + "uuid": "7bc65eb3-908c-4844-97ed-c9d46333140d", "control-id": "cis_rhel10_1-5.4", "description": "No notes for control-id 1.5.4.", "props": [ @@ -6062,7 +6086,7 @@ ] }, { - "uuid": "748450c3-ad9b-4905-a915-fd1fb09ffc3c", + "uuid": "eecb63d2-0220-42d1-a80a-20c2f3ec27f0", "control-id": "cis_rhel10_1-5.5", "description": "No notes for control-id 1.5.5.", "props": [ @@ -6079,7 +6103,7 @@ ] }, { - "uuid": "8204e5db-c7b4-4bf0-8d05-57977dd77817", + "uuid": "30b68347-4615-4ece-8d3b-8a2ab58ec8c3", "control-id": "cis_rhel10_1-5.6", "description": "No notes for control-id 1.5.6.", "props": [ @@ -6096,7 +6120,7 @@ ] }, { - "uuid": "96269e82-11b5-4c63-b0cc-3cb53727e5a2", + "uuid": "79dd7c7c-6f55-4568-a1e3-4dec09d89c03", "control-id": "cis_rhel10_1-5.7", "description": "No notes for control-id 1.5.7.", "props": [ @@ -6113,7 +6137,7 @@ ] }, { - "uuid": "0e4c2c59-9c6a-420d-8d57-cb9e2fd3a1ff", + "uuid": "b7d76dad-9467-4d86-814a-8a159ada07a3", "control-id": "cis_rhel10_1-5.8", "description": "Address Space Layout Randomization (ASLR)", "props": [ @@ -6130,7 +6154,7 @@ ] }, { - "uuid": "66370a0b-95b6-4bbc-964f-7e3936890b8e", + "uuid": "6b44e3de-9293-4003-bab9-4c62daef0d82", "control-id": "cis_rhel10_1-5.9", "description": "No notes for control-id 1.5.9.", "props": [ @@ -6147,7 +6171,7 @@ ] }, { - "uuid": "0a6b1e48-eeb7-4692-a828-eebd5abf631b", + "uuid": "5c679195-eba3-4fa5-adde-963ed4d00ee0", "control-id": "cis_rhel10_1-5.10", "description": "No notes for control-id 1.5.10.", "props": [ @@ -6164,7 +6188,7 @@ ] }, { - "uuid": "443b3c47-256f-4d61-a5ad-a007d4c7b0cf", + "uuid": "3799d6cb-b675-4d75-a856-29587d2c67ca", "control-id": "cis_rhel10_1-6.1", "description": "No notes for control-id 1.6.1.", "props": [ @@ -6181,7 +6205,7 @@ ] }, { - "uuid": "50a266f2-f39c-4c52-8a6b-4ecce1fbfb4f", + "uuid": "0db4f15e-b735-4b23-88e6-9315163abd7e", "control-id": "cis_rhel10_1-6.2", "description": "No notes for control-id 1.6.2.", "props": [ @@ -6198,7 +6222,7 @@ ] }, { - "uuid": "d9857532-6ccb-4c2e-b75c-e32ab9397000", + "uuid": "f5422df2-1b8b-47ac-9409-4cc1d032bb28", "control-id": "cis_rhel10_1-6.3", "description": "No notes for control-id 1.6.3.", "props": [ @@ -6215,7 +6239,7 @@ ] }, { - "uuid": "e7e8b21a-c436-498a-b481-c5330de7f8f6", + "uuid": "c4f4066a-54e8-46e2-ad2b-f807fcf98d56", "control-id": "cis_rhel10_1-6.4", "description": "No notes for control-id 1.6.4.", "props": [ @@ -6232,7 +6256,7 @@ ] }, { - "uuid": "0ce9baf9-d0e0-431c-a05a-cc04d1fa5e6d", + "uuid": "e45ff2ca-45b5-434f-b43d-41208d660c26", "control-id": "cis_rhel10_1-7.1", "description": "No notes for control-id 1.7.1.", "props": [ @@ -6249,7 +6273,7 @@ ] }, { - "uuid": "255cee0a-de55-4eb6-83a1-a789d4e10433", + "uuid": "96b5ec8a-2ccf-44e0-910c-452752bc9e55", "control-id": "cis_rhel10_1-7.2", "description": "No notes for control-id 1.7.2.", "props": [ @@ -6266,7 +6290,7 @@ ] }, { - "uuid": "c925c737-19c2-4a92-b013-dd409c7f0c25", + "uuid": "678e8f16-4bfa-4a07-8595-a816bd1d4c67", "control-id": "cis_rhel10_1-7.3", "description": "No notes for control-id 1.7.3.", "props": [ @@ -6283,7 +6307,7 @@ ] }, { - "uuid": "bb1a7bbe-8542-4194-ac0d-92930e5a5c87", + "uuid": "63ca73b7-9f3b-48fd-bb6f-93f3c7890969", "control-id": "cis_rhel10_1-7.4", "description": "No notes for control-id 1.7.4.", "props": [ @@ -6310,7 +6334,7 @@ ] }, { - "uuid": "47313244-2926-418c-b904-f1c2cb603bdb", + "uuid": "e804f418-c835-436f-ba56-cce1e375fef8", "control-id": "cis_rhel10_1-7.5", "description": "No notes for control-id 1.7.5.", "props": [ @@ -6337,7 +6361,7 @@ ] }, { - "uuid": "5d898067-084d-4d93-a2e1-f90b6857d78d", + "uuid": "96c389dc-87d6-4271-afaf-1abe595f4d11", "control-id": "cis_rhel10_1-7.6", "description": "No notes for control-id 1.7.6.", "props": [ @@ -6364,7 +6388,7 @@ ] }, { - "uuid": "8312fbc5-e02c-4af4-b799-df2e8a76ef11", + "uuid": "03a9134b-333d-4ab0-895a-573c98bdd64c", "control-id": "cis_rhel10_1-8.1", "description": "No notes for control-id 1.8.1.", "props": [ @@ -6386,7 +6410,7 @@ ] }, { - "uuid": "c64c3f3e-8590-41a0-b694-99586c407d1b", + "uuid": "818e05b4-8985-4cca-9771-9fc6faae9c84", "control-id": "cis_rhel10_1-8.2", "description": "No notes for control-id 1.8.2.", "props": [ @@ -6403,7 +6427,7 @@ ] }, { - "uuid": "1e4a46f3-44bf-4bd7-b2da-c9786f58c993", + "uuid": "0bdf45c2-9e6a-4d0e-b447-ce0df34eda38", "control-id": "cis_rhel10_1-8.3", "description": "No notes for control-id 1.8.3.", "props": [ @@ -6435,7 +6459,7 @@ ] }, { - "uuid": "f3ba5cad-3b28-4c7c-b20d-28b67d2cd630", + "uuid": "920e4a76-1578-41ab-bf9c-92480f3d3cfe", "control-id": "cis_rhel10_1-8.4", "description": "No notes for control-id 1.8.4.", "props": [ @@ -6457,7 +6481,7 @@ ] }, { - "uuid": "163e601c-9fc6-43e3-8271-5f07868a2f4e", + "uuid": "1b37b57d-bf70-4482-99bb-31800531c6c9", "control-id": "cis_rhel10_1-8.5", "description": "No notes for control-id 1.8.5.", "props": [ @@ -6474,7 +6498,7 @@ ] }, { - "uuid": "fb65d6f9-6d5c-4819-a31c-0c7eeaab4e62", + "uuid": "0ea3ca0e-240e-4a70-bb3e-16a61f7ff970", "control-id": "cis_rhel10_2-1.1", "description": "No notes for control-id 2.1.1.", "props": [ @@ -6491,7 +6515,7 @@ ] }, { - "uuid": "a90d1d27-38f4-4875-958c-720390ef57d2", + "uuid": "6b367c41-7062-45a0-8306-9a3e943fe44e", "control-id": "cis_rhel10_2-1.2", "description": "No notes for control-id 2.1.2.", "props": [ @@ -6508,7 +6532,7 @@ ] }, { - "uuid": "d2c7e04a-25bc-4f53-a90a-92ca2d2bf64d", + "uuid": "6d10d82f-108a-462d-8d32-06a1742947c5", "control-id": "cis_rhel10_2-1.4", "description": "No notes for control-id 2.1.4.", "props": [ @@ -6525,7 +6549,7 @@ ] }, { - "uuid": "b7aa9a47-98d4-4d1f-8339-c3153826e9b7", + "uuid": "40f48fd4-946e-4e1d-addf-d92ddc3c2d21", "control-id": "cis_rhel10_2-1.5", "description": "No notes for control-id 2.1.5.", "props": [ @@ -6542,7 +6566,7 @@ ] }, { - "uuid": "ca10a416-1a49-4448-8869-6d0676c25423", + "uuid": "7fd39d8e-7c8d-4625-aede-2376c242f722", "control-id": "cis_rhel10_2-1.6", "description": "No notes for control-id 2.1.6.", "props": [ @@ -6559,7 +6583,7 @@ ] }, { - "uuid": "4a094d24-0675-4871-b875-533e3a5c6763", + "uuid": "29e6edeb-01ce-43ee-b535-9a1c3a33ddb0", "control-id": "cis_rhel10_2-1.7", "description": "No notes for control-id 2.1.7.", "props": [ @@ -6576,7 +6600,7 @@ ] }, { - "uuid": "ada2af68-85e3-46b1-b491-8b6eea8d47e2", + "uuid": "b42b31e0-0d02-4210-88b3-d06d95b7f8a4", "control-id": "cis_rhel10_2-1.8", "description": "No notes for control-id 2.1.8.", "props": [ @@ -6598,7 +6622,7 @@ ] }, { - "uuid": "4a3a371b-d38a-44d3-babc-b042812a3fd9", + "uuid": "2c896785-e64b-4471-989b-55b17cddf81a", "control-id": "cis_rhel10_2-1.9", "description": "Many of the libvirt packages used by Enterprise Linux virtualization are dependent on the\nnfs-utils package.", "props": [ @@ -6615,7 +6639,7 @@ ] }, { - "uuid": "ffbb2fc7-50d0-4a31-8ce9-25d488c0ad84", + "uuid": "a2f99185-beda-4178-a76c-2335110bdd44", "control-id": "cis_rhel10_2-1.10", "description": "No notes for control-id 2.1.10.", "props": [ @@ -6632,7 +6656,7 @@ ] }, { - "uuid": "f4023e20-1877-4b0b-9cdc-4f7436907b1c", + "uuid": "466327b6-069f-4aa1-b09f-00bf2a048ec4", "control-id": "cis_rhel10_2-1.11", "description": "Many of the libvirt packages used by Enterprise Linux virtualization, and the nfs-utils\npackage used for The Network File System (NFS), are dependent on the rpcbind package.", "props": [ @@ -6649,7 +6673,7 @@ ] }, { - "uuid": "0d58dde8-70a8-45b3-bff8-46eeb30a2e03", + "uuid": "c77c67dc-0bc6-4815-81e6-c4fc3ae58900", "control-id": "cis_rhel10_2-1.12", "description": "No notes for control-id 2.1.12.", "props": [ @@ -6666,7 +6690,7 @@ ] }, { - "uuid": "d73eaac2-f7fd-4a18-9b78-0fe3d48767c8", + "uuid": "cb133449-b7e7-446a-b234-1d9af717da31", "control-id": "cis_rhel10_2-1.13", "description": "No notes for control-id 2.1.13.", "props": [ @@ -6683,7 +6707,7 @@ ] }, { - "uuid": "687f1937-4769-43ab-939c-aa2ad07f9ffe", + "uuid": "f1819637-8d58-4b00-8d65-9de8325c2443", "control-id": "cis_rhel10_2-1.14", "description": "No notes for control-id 2.1.14.", "props": [ @@ -6700,7 +6724,7 @@ ] }, { - "uuid": "71ca6611-b026-4709-a00a-154bb388e7d8", + "uuid": "9ad4eef6-9f2b-4dc7-a02c-64bd6759051c", "control-id": "cis_rhel10_2-1.15", "description": "No notes for control-id 2.1.15.", "props": [ @@ -6717,7 +6741,7 @@ ] }, { - "uuid": "9a04d6a4-c09a-4bb7-ba76-8f8d4bd5a452", + "uuid": "5631384b-90fc-4038-8d0d-3106f3ac0b36", "control-id": "cis_rhel10_2-1.16", "description": "No notes for control-id 2.1.16.", "props": [ @@ -6734,7 +6758,7 @@ ] }, { - "uuid": "9be41eed-e8cc-400a-a139-74f82a1a0ecd", + "uuid": "3c70214d-2511-457c-976c-ae5634f8a6b9", "control-id": "cis_rhel10_2-1.17", "description": "No notes for control-id 2.1.17.", "props": [ @@ -6751,7 +6775,7 @@ ] }, { - "uuid": "7f06ea70-85db-421e-83b6-7b4026897b21", + "uuid": "b689c65d-5396-4967-ab2c-e0b4580b60e8", "control-id": "cis_rhel10_2-1.18", "description": "No notes for control-id 2.1.18.", "props": [ @@ -6773,7 +6797,7 @@ ] }, { - "uuid": "cc3bbb1a-7cef-45c0-85ee-c1ba1e2526aa", + "uuid": "a2d2e541-a8a7-4581-80a5-2ffc3a74d3a9", "control-id": "cis_rhel10_2-1.21", "description": "No notes for control-id 2.1.21.", "props": [ @@ -6795,7 +6819,7 @@ ] }, { - "uuid": "71647a0b-6077-44c3-9119-99d03c33c4e5", + "uuid": "ada7dfaf-d918-4bda-a8f3-79675beb7575", "control-id": "cis_rhel10_2-1.22", "description": "The description for control-id cis_rhel10_2-1.22.", "props": [ @@ -6808,7 +6832,7 @@ ] }, { - "uuid": "bab66ebd-ac30-496c-b25f-73a5572e37e2", + "uuid": "6667dd31-912b-4ae1-874a-4705068f9ad9", "control-id": "cis_rhel10_2-2.1", "description": "No notes for control-id 2.2.1.", "props": [ @@ -6825,7 +6849,7 @@ ] }, { - "uuid": "63280026-c0c4-4057-9d0a-9333e551921b", + "uuid": "55d2034e-530e-4739-9b3c-23c073a8207b", "control-id": "cis_rhel10_2-2.3", "description": "No notes for control-id 2.2.3.", "props": [ @@ -6842,7 +6866,7 @@ ] }, { - "uuid": "18660248-6339-44b1-9938-d1205ea82114", + "uuid": "21c5b5bf-bcdb-4469-9d45-4a68b7af1542", "control-id": "cis_rhel10_2-2.4", "description": "No notes for control-id 2.2.4.", "props": [ @@ -6859,7 +6883,7 @@ ] }, { - "uuid": "5587a7f1-c77e-4bb5-b9e8-57888d6961a2", + "uuid": "6c739b3f-3a05-41bc-99c3-80f920b2a64c", "control-id": "cis_rhel10_2-3.1", "description": "No notes for control-id 2.3.1.", "props": [ @@ -6871,7 +6895,7 @@ ] }, { - "uuid": "c4e06dc5-63b9-486b-b4e4-1cbef04f755c", + "uuid": "f72131d6-0922-409f-8766-301d244d2a2d", "control-id": "cis_rhel10_2-3.2", "description": "No notes for control-id 2.3.2.", "props": [ @@ -6888,7 +6912,7 @@ ] }, { - "uuid": "67332a59-199d-4ed7-9315-f884d8959e3e", + "uuid": "d9393fc8-74ca-4ee5-a7ab-590831927b0d", "control-id": "cis_rhel10_2-3.3", "description": "No notes for control-id 2.3.3.", "props": [ @@ -6905,7 +6929,7 @@ ] }, { - "uuid": "8ef02a83-2a00-4394-a4ca-d37658cbc7ae", + "uuid": "2abe967c-c997-4094-88fe-ebc6b9fa01ad", "control-id": "cis_rhel10_2-4.1.1", "description": "No notes for control-id 2.4.1.1.", "props": [ @@ -6927,7 +6951,7 @@ ] }, { - "uuid": "882e2d2c-3ef2-4230-a68b-1a67d5282fd5", + "uuid": "33adb154-12a9-4b28-8954-fd0b9a6b8dc8", "control-id": "cis_rhel10_2-4.1.2", "description": "No notes for control-id 2.4.1.2.", "props": [ @@ -6954,7 +6978,7 @@ ] }, { - "uuid": "32986d7b-7be3-498e-aee3-2f97f032b55b", + "uuid": "06ae33f8-111e-4901-95ff-7f5b6ff570b1", "control-id": "cis_rhel10_2-4.1.3", "description": "No notes for control-id 2.4.1.3.", "props": [ @@ -6981,7 +7005,7 @@ ] }, { - "uuid": "4069c4cf-9549-495c-befb-25b0de929bdb", + "uuid": "470429bc-7b08-4d6e-ab09-130d3fb607c4", "control-id": "cis_rhel10_2-4.1.4", "description": "No notes for control-id 2.4.1.4.", "props": [ @@ -7008,7 +7032,7 @@ ] }, { - "uuid": "222c2b76-a138-40de-97d9-0a177f3f97e3", + "uuid": "80ac2ec7-cbd6-45db-b213-fd5893edacfc", "control-id": "cis_rhel10_2-4.1.5", "description": "No notes for control-id 2.4.1.5.", "props": [ @@ -7035,7 +7059,7 @@ ] }, { - "uuid": "2a43ce8f-88c6-4ab6-8c69-6b03edb9672c", + "uuid": "ce975b64-ac1d-47c6-918d-17b5d4a75946", "control-id": "cis_rhel10_2-4.1.6", "description": "No notes for control-id 2.4.1.6.", "props": [ @@ -7062,7 +7086,7 @@ ] }, { - "uuid": "65bd6f4f-6113-4e94-832f-657816c82dfc", + "uuid": "aa87f981-cff2-493e-be07-bd249285dc7c", "control-id": "cis_rhel10_2-4.1.7", "description": "No notes for control-id 2.4.1.7.", "props": [ @@ -7089,7 +7113,7 @@ ] }, { - "uuid": "8422792e-32fd-4ae2-a4da-e55c1e4d050b", + "uuid": "b0c27dea-10f8-45da-9799-285c598bb462", "control-id": "cis_rhel10_2-4.1.8", "description": "No notes for control-id 2.4.1.8.", "props": [ @@ -7116,7 +7140,7 @@ ] }, { - "uuid": "ef3e9ca2-f629-4700-8660-ff97646c0098", + "uuid": "ba370ce3-fac1-4ef7-8502-102b024d4fd9", "control-id": "cis_rhel10_2-4.1.9", "description": "No notes for control-id 2.4.1.9.", "props": [ @@ -7153,7 +7177,7 @@ ] }, { - "uuid": "7acf98ae-3dc3-44da-a3df-06f77bd84400", + "uuid": "aa7ecbac-3304-45e9-9d01-6815956ce3e9", "control-id": "cis_rhel10_2-4.2.1", "description": "No notes for control-id 2.4.2.1.", "props": [ @@ -7190,7 +7214,7 @@ ] }, { - "uuid": "f5902c2c-c715-4d1c-a3d4-cad10ce50486", + "uuid": "f8df0695-14f7-49e9-a6bf-0a22b8f5e08f", "control-id": "cis_rhel10_3-1.1", "description": "The description for control-id cis_rhel10_3-1.1.", "props": [ @@ -7203,7 +7227,7 @@ ] }, { - "uuid": "f253dd51-cd32-467d-825e-6e2b7fcc7c90", + "uuid": "b9ddc8f2-8b3f-4693-b575-05b6f02831e4", "control-id": "cis_rhel10_3-1.2", "description": "No notes for control-id 3.1.2.", "props": [ @@ -7220,7 +7244,7 @@ ] }, { - "uuid": "6c0db5a2-2c7b-40d2-beae-a4c8aaece461", + "uuid": "981820f7-27d4-4b72-979f-e2e89830cb14", "control-id": "cis_rhel10_3-1.3", "description": "No notes for control-id 3.1.3.", "props": [ @@ -7237,7 +7261,7 @@ ] }, { - "uuid": "04c66959-afe1-4369-ba11-8596c7806e3e", + "uuid": "de8ebf21-0c8b-4ae2-8796-fee7eb83422b", "control-id": "cis_rhel10_3-2.1", "description": "No notes for control-id 3.2.1.", "props": [ @@ -7254,7 +7278,7 @@ ] }, { - "uuid": "10100e31-ed04-4768-bf08-1a023cc5fdef", + "uuid": "877b9026-5fc4-4edd-b405-4811c7e38724", "control-id": "cis_rhel10_3-2.2", "description": "No notes for control-id 3.2.2.", "props": [ @@ -7271,7 +7295,7 @@ ] }, { - "uuid": "d04f8281-af96-4ce5-b14e-9b34fd7df0a3", + "uuid": "1eebcc40-3ddb-41d7-a82f-1b6eaeee8b26", "control-id": "cis_rhel10_3-2.3", "description": "No notes for control-id 3.2.3.", "props": [ @@ -7288,7 +7312,7 @@ ] }, { - "uuid": "c8deca2a-ba0d-4142-aef6-308f65ba4543", + "uuid": "1da4dc3a-4b7d-4f23-aa10-11cb921192c2", "control-id": "cis_rhel10_3-2.4", "description": "No notes for control-id 3.2.4.", "props": [ @@ -7305,7 +7329,7 @@ ] }, { - "uuid": "252f409f-619e-4cdf-b038-c83d15ad0621", + "uuid": "063454e7-6a45-4dc4-978f-943890d27c7a", "control-id": "cis_rhel10_3-2.5", "description": "No notes for control-id 3.2.5.", "props": [ @@ -7322,7 +7346,7 @@ ] }, { - "uuid": "5dccba80-7498-490b-b11b-46af994ae444", + "uuid": "3de18f89-8f10-4ee0-bffe-8313be01f721", "control-id": "cis_rhel10_3-2.6", "description": "No notes for control-id 3.2.6.", "props": [ @@ -7339,7 +7363,7 @@ ] }, { - "uuid": "ddbfbb1f-72cf-4bf7-8063-bf822de345fb", + "uuid": "9fee174f-a041-4689-b88d-874650030106", "control-id": "cis_rhel10_3-3.1.2", "description": "No notes for control-id 3.3.1.2.", "props": [ @@ -7356,7 +7380,7 @@ ] }, { - "uuid": "ae3b4e0b-3fea-4836-8882-b4c8004b89f6", + "uuid": "c6773df1-119c-4dfc-9ff6-ef878294579f", "control-id": "cis_rhel10_3-3.1.3", "description": "No notes for control-id 3.3.1.3.", "props": [ @@ -7373,7 +7397,7 @@ ] }, { - "uuid": "0a25e2b4-8bc3-40dd-a2e7-28997e2a9dcf", + "uuid": "8089fac0-9ed8-4604-8a45-bd038b7c3a32", "control-id": "cis_rhel10_3-3.1.4", "description": "No notes for control-id 3.3.1.4.", "props": [ @@ -7390,7 +7414,7 @@ ] }, { - "uuid": "abe8347e-605c-4bdd-8658-a98bfe20298b", + "uuid": "c6111cfb-7c55-4424-8711-3964a140f707", "control-id": "cis_rhel10_3-3.1.5", "description": "No notes for control-id 3.3.1.5.", "props": [ @@ -7407,7 +7431,7 @@ ] }, { - "uuid": "ae9f5c32-ca0d-45f0-8f3b-974ef4ccfa39", + "uuid": "60f77688-28ce-4879-aa6d-2795faf32f17", "control-id": "cis_rhel10_3-3.1.6", "description": "No notes for control-id 3.3.1.6.", "props": [ @@ -7424,7 +7448,7 @@ ] }, { - "uuid": "5f29b827-1c12-4545-9fcf-66b72821c72d", + "uuid": "aac11a68-64b4-4de3-814b-1333b8a119be", "control-id": "cis_rhel10_3-3.1.7", "description": "No notes for control-id 3.3.1.7.", "props": [ @@ -7441,7 +7465,7 @@ ] }, { - "uuid": "ae4d1ddc-a15e-413c-8d9b-3ba9d9d05a8b", + "uuid": "8a14a4ef-43f7-4483-a620-93c51e049cc5", "control-id": "cis_rhel10_3-3.1.8", "description": "No notes for control-id 3.3.1.8.", "props": [ @@ -7458,7 +7482,7 @@ ] }, { - "uuid": "ded012a1-6642-4a6c-b612-ef9018833801", + "uuid": "1547492f-6150-40b8-ba02-dae0870cca81", "control-id": "cis_rhel10_3-3.1.9", "description": "No notes for control-id 3.3.1.9.", "props": [ @@ -7475,7 +7499,7 @@ ] }, { - "uuid": "323c0ce5-c156-4b05-8918-cc551029bb80", + "uuid": "aa50c009-4485-45c1-9d2a-007e837367cd", "control-id": "cis_rhel10_3-3.1.10", "description": "No notes for control-id 3.3.1.10.", "props": [ @@ -7492,7 +7516,7 @@ ] }, { - "uuid": "8ed5c31a-6989-48f9-8585-0c41860585a4", + "uuid": "a86fb2aa-a474-46b6-a975-381dbbb9b0ef", "control-id": "cis_rhel10_3-3.1.11", "description": "No notes for control-id 3.3.1.11.", "props": [ @@ -7509,7 +7533,7 @@ ] }, { - "uuid": "2fbdcb3e-9f6b-4fb1-9a32-addd7aaba758", + "uuid": "bdfc2c6e-8741-4bf5-aae4-1a5c19664fe8", "control-id": "cis_rhel10_3-3.1.12", "description": "No notes for control-id 3.3.1.12.", "props": [ @@ -7526,7 +7550,7 @@ ] }, { - "uuid": "d212c30b-a76f-4d43-86c2-a64e16173744", + "uuid": "43e2d2b6-d4d1-42ef-9687-ae610d0be608", "control-id": "cis_rhel10_3-3.1.13", "description": "No notes for control-id 3.3.1.13.", "props": [ @@ -7543,7 +7567,7 @@ ] }, { - "uuid": "a82440ed-1524-4c4d-9c69-042b2d35094d", + "uuid": "1ea507bb-f8d7-4124-8c9d-abb30cf646f5", "control-id": "cis_rhel10_3-3.1.14", "description": "No notes for control-id 3.3.1.14.", "props": [ @@ -7560,7 +7584,7 @@ ] }, { - "uuid": "60056312-313d-4fea-bb0c-8301f8bf5a2c", + "uuid": "fe8f9505-e641-4cc6-94c3-d2935ad308b8", "control-id": "cis_rhel10_3-3.1.15", "description": "No notes for control-id 3.3.1.15.", "props": [ @@ -7577,7 +7601,7 @@ ] }, { - "uuid": "ac67d2eb-f7c6-41a2-adaf-6e87167e0b1f", + "uuid": "91978c10-ba06-486a-8a93-0108d10cd7d5", "control-id": "cis_rhel10_3-3.1.16", "description": "No notes for control-id 3.3.1.16.", "props": [ @@ -7594,7 +7618,7 @@ ] }, { - "uuid": "abb345c6-d5c4-41e9-9572-66c808285e41", + "uuid": "a7e99bda-0144-4527-9f8b-1737d6a699cb", "control-id": "cis_rhel10_3-3.1.17", "description": "No notes for control-id 3.3.1.17.", "props": [ @@ -7611,7 +7635,7 @@ ] }, { - "uuid": "afb95ea0-131b-48bd-b993-ce9a1701f399", + "uuid": "a3555e83-3dd8-440e-be29-387a46a6d3a3", "control-id": "cis_rhel10_3-3.1.18", "description": "No notes for control-id 3.3.1.18.", "props": [ @@ -7628,7 +7652,7 @@ ] }, { - "uuid": "e725b7a3-6f8d-484f-9334-6720a0cf6fdf", + "uuid": "2236d81e-5164-4e14-96f0-33be7bde3aa7", "control-id": "cis_rhel10_3-3.2.1", "description": "No notes for control-id 3.3.2.1.", "props": [ @@ -7645,7 +7669,7 @@ ] }, { - "uuid": "1f4bf183-5e48-4519-96da-db2df6f65570", + "uuid": "d0d91997-b1e5-430b-9373-4accb6d9aecd", "control-id": "cis_rhel10_3-3.2.2", "description": "No notes for control-id 3.3.2.2.", "props": [ @@ -7662,7 +7686,7 @@ ] }, { - "uuid": "b2198733-ce6c-412c-83ff-29e681f50a2c", + "uuid": "6300262a-fd41-4d52-939b-67ec289c7085", "control-id": "cis_rhel10_3-3.2.3", "description": "No notes for control-id 3.3.2.3.", "props": [ @@ -7679,7 +7703,7 @@ ] }, { - "uuid": "4d08f7e7-16b7-4c01-bad3-94bcd1958575", + "uuid": "27ad1313-99c6-43d2-99fe-5bb66bbe70c4", "control-id": "cis_rhel10_3-3.2.4", "description": "No notes for control-id 3.3.2.4.", "props": [ @@ -7696,7 +7720,7 @@ ] }, { - "uuid": "e436ebad-8965-4a1f-bf5b-989f4909c0d3", + "uuid": "99017441-edda-48ed-b786-e1bcbee8fe9f", "control-id": "cis_rhel10_3-3.2.5", "description": "No notes for control-id 3.3.2.5.", "props": [ @@ -7713,7 +7737,7 @@ ] }, { - "uuid": "ae761256-8130-4dfc-aae2-e7937911b127", + "uuid": "f6910bbf-88cb-4128-8e71-8fb402a59c0b", "control-id": "cis_rhel10_3-3.2.6", "description": "No notes for control-id 3.3.2.6.", "props": [ @@ -7730,7 +7754,7 @@ ] }, { - "uuid": "f835f639-949e-4cec-9f16-bd611b047e88", + "uuid": "7446471b-4dd9-4e7b-bd6a-a84939920aa0", "control-id": "cis_rhel10_3-3.2.7", "description": "No notes for control-id 3.3.2.7.", "props": [ @@ -7747,7 +7771,7 @@ ] }, { - "uuid": "f90357ef-8783-4acd-84e3-9d9691b100e9", + "uuid": "078eca7e-27c2-4e8b-8446-f21c69b552be", "control-id": "cis_rhel10_3-3.2.8", "description": "No notes for control-id 3.3.2.8.", "props": [ @@ -7764,7 +7788,7 @@ ] }, { - "uuid": "7a2614fd-7c0c-488b-8a95-4a6ed262b5a0", + "uuid": "265e1c96-2ac1-48d6-a268-67e7e4116028", "control-id": "cis_rhel10_4-1.1", "description": "No notes for control-id 4.1.1.", "props": [ @@ -7781,7 +7805,7 @@ ] }, { - "uuid": "61d4a3a5-55fd-4b57-985f-dc1e29fee911", + "uuid": "bd3e34a0-46f5-4ec2-bd56-d3ff1595bfcf", "control-id": "cis_rhel10_4-1.2", "description": "No notes for control-id 4.1.2.", "props": [ @@ -7798,7 +7822,7 @@ ] }, { - "uuid": "51f9b1d9-908b-4444-ad78-1c018a1576e8", + "uuid": "80942b34-3751-4a91-913b-bc489b6f8969", "control-id": "cis_rhel10_4-1.3", "description": "No notes for control-id 4.1.3.", "props": [ @@ -7815,7 +7839,7 @@ ] }, { - "uuid": "7dd9f4e9-b220-4796-96bb-e5e8d0af59e2", + "uuid": "feeef00a-c020-4016-9e10-01f073537995", "control-id": "cis_rhel10_4-1.4", "description": "The description for control-id cis_rhel10_4-1.4.", "props": [ @@ -7828,7 +7852,7 @@ ] }, { - "uuid": "2064b7bb-382c-4cfc-858d-806423c9ffc9", + "uuid": "8525438a-c141-4eed-b9e9-3e5d30468d05", "control-id": "cis_rhel10_4-1.5", "description": "Firewalld in Red Hat Enterprise Linux 10 accepts loopback traffic by default.", "props": [ @@ -7845,7 +7869,7 @@ ] }, { - "uuid": "068c52a1-7da9-4c94-a8a0-03113a9979fa", + "uuid": "9803aeff-9696-45d2-8ab7-955b2bfdbdaa", "control-id": "cis_rhel10_4-1.6", "description": "The description for control-id cis_rhel10_4-1.6.", "props": [ @@ -7858,7 +7882,7 @@ ] }, { - "uuid": "347544b4-ec39-457d-ba83-7a37a8e0fb71", + "uuid": "21628817-9e17-4751-a420-4220bdb50a9c", "control-id": "cis_rhel10_4-1.7", "description": "The description for control-id cis_rhel10_4-1.7.", "props": [ @@ -7871,7 +7895,7 @@ ] }, { - "uuid": "cc278a42-27ad-4f25-8174-739d88514f59", + "uuid": "42366c06-05d6-4100-a408-32a1bcab020a", "control-id": "cis_rhel10_5-1.1", "description": "No notes for control-id 5.1.1.", "props": [ @@ -7928,7 +7952,7 @@ ] }, { - "uuid": "8ebde704-776e-4d8e-a3da-2a9131ac0250", + "uuid": "a0f7c9b8-f051-413f-9ac2-592f93f0d217", "control-id": "cis_rhel10_5-1.2", "description": "No notes for control-id 5.1.2.", "props": [ @@ -7955,7 +7979,7 @@ ] }, { - "uuid": "a501a884-c9f2-411d-b479-b1804125137c", + "uuid": "61658fbb-fe67-491e-a06e-502de7bf060f", "control-id": "cis_rhel10_5-1.3", "description": "No notes for control-id 5.1.3.", "props": [ @@ -7982,7 +8006,7 @@ ] }, { - "uuid": "0f6afc12-059e-4a9c-8a15-9e022fb4a2cf", + "uuid": "24dd2ff3-f9c6-431d-9dd4-cf5f7e395596", "control-id": "cis_rhel10_5-1.4", "description": "No notes for control-id 5.1.4.", "props": [ @@ -7999,7 +8023,7 @@ ] }, { - "uuid": "d2f80a82-a619-43a7-808c-99180208e1e3", + "uuid": "9637d4d4-8ff3-4550-8914-ccc974723089", "control-id": "cis_rhel10_5-1.5", "description": "No notes for control-id 5.1.5.", "props": [ @@ -8016,7 +8040,7 @@ ] }, { - "uuid": "4645f293-0f0a-4e11-86e7-5730ac126005", + "uuid": "7325d7ef-f21f-4a80-b400-6ba14ffdb287", "control-id": "cis_rhel10_5-1.6", "description": "No notes for control-id 5.1.6.", "props": [ @@ -8033,7 +8057,7 @@ ] }, { - "uuid": "0d8d249d-4ae7-4f0c-a422-3cbb8ebffdff", + "uuid": "9e21c43a-2484-4c22-be00-75b968396fe1", "control-id": "cis_rhel10_5-1.7", "description": "The requirement gives an example of 45 seconds, but is flexible about the values. It is only\nnecessary to ensure there is a timeout configured in alignment to the site policy.", "props": [ @@ -8055,7 +8079,7 @@ ] }, { - "uuid": "d5b36822-7868-4c28-a125-4f544122e2fd", + "uuid": "05e60438-462b-46cf-97e9-a1140aa56567", "control-id": "cis_rhel10_5-1.10", "description": "No notes for control-id 5.1.10.", "props": [ @@ -8072,7 +8096,7 @@ ] }, { - "uuid": "ad3f4b23-0cc2-4203-bcf5-5f2f1f1db02c", + "uuid": "4b883127-d812-4558-bc09-b9ece7618c8d", "control-id": "cis_rhel10_5-1.11", "description": "No notes for control-id 5.1.11.", "props": [ @@ -8089,7 +8113,7 @@ ] }, { - "uuid": "511f39f0-6202-4076-ae47-142b3559b9bb", + "uuid": "ac00cade-916d-4940-a25f-ab8cda55f8eb", "control-id": "cis_rhel10_5-1.12", "description": "The description for control-id cis_rhel10_5-1.12.", "props": [ @@ -8107,7 +8131,7 @@ ] }, { - "uuid": "52b46a19-9dab-4316-980b-a50e966db5a8", + "uuid": "dcc03301-e572-4b4f-8e67-f9ae3baa2586", "control-id": "cis_rhel10_5-1.13", "description": "No notes for control-id 5.1.13.", "props": [ @@ -8124,7 +8148,7 @@ ] }, { - "uuid": "292d2ff3-0d30-43a9-95de-d85bb895afb1", + "uuid": "8c6b2a6e-9e97-4180-99e6-8a43a92094db", "control-id": "cis_rhel10_5-1.14", "description": "The CIS benchmark is not opinionated about which loglevel is selected here. Here, this\nprofile uses VERBOSE by default, as it allows for the capture of login and logout activity\nas well as key fingerprints.", "props": [ @@ -8141,7 +8165,7 @@ ] }, { - "uuid": "1f32fc26-e03a-4d88-a5a4-57574db30b82", + "uuid": "82cdbb4c-92b2-4ab6-aea5-2ef4ac1e47ca", "control-id": "cis_rhel10_5-1.15", "description": "No notes for control-id 5.1.15.", "props": [ @@ -8158,7 +8182,7 @@ ] }, { - "uuid": "010d0bbc-06c9-40a0-842b-c59e17552588", + "uuid": "1afc1b0b-59bc-4ecb-a58a-6850b9d83c31", "control-id": "cis_rhel10_5-1.16", "description": "No notes for control-id 5.1.16.", "props": [ @@ -8175,7 +8199,7 @@ ] }, { - "uuid": "f0cb4e45-2c6c-4468-950e-b0c1e6b463a3", + "uuid": "97669b2e-6395-4ef3-a773-8b852571c218", "control-id": "cis_rhel10_5-1.17", "description": "No notes for control-id 5.1.17.", "props": [ @@ -8192,7 +8216,7 @@ ] }, { - "uuid": "aaf769ca-f0f3-424e-b81b-3d2253494759", + "uuid": "b2487912-f3d9-43b5-aa2d-18702aad8e7c", "control-id": "cis_rhel10_5-1.18", "description": "No notes for control-id 5.1.18.", "props": [ @@ -8209,7 +8233,7 @@ ] }, { - "uuid": "7d6f00c3-36dd-419e-90ef-d6d2d6ace27e", + "uuid": "9f00bbea-2d5d-42e3-a3e6-b0205afd9ba2", "control-id": "cis_rhel10_5-1.19", "description": "No notes for control-id 5.1.19.", "props": [ @@ -8226,7 +8250,7 @@ ] }, { - "uuid": "f62d9137-977b-4dce-9005-d9b5f3414608", + "uuid": "e827cbc6-5f7f-4330-a0b2-782c8bd8ee60", "control-id": "cis_rhel10_5-1.20", "description": "No notes for control-id 5.1.20.", "props": [ @@ -8243,7 +8267,7 @@ ] }, { - "uuid": "a7550ff3-46fa-483c-bd6a-0afc2b5b55d3", + "uuid": "2daad31a-9a62-4546-8caa-0381895af40d", "control-id": "cis_rhel10_5-1.21", "description": "No notes for control-id 5.1.21.", "props": [ @@ -8260,7 +8284,7 @@ ] }, { - "uuid": "9e97d252-0ab8-42bc-84c8-4c125fb2bde8", + "uuid": "6f764250-2a0f-4a5c-854c-2a42da89562a", "control-id": "cis_rhel10_5-1.22", "description": "No notes for control-id 5.1.22.", "props": [ @@ -8277,7 +8301,7 @@ ] }, { - "uuid": "4245d405-0486-4011-87ed-e01f1c9e40b2", + "uuid": "98b60319-e6cc-4056-adfc-596a852aa01b", "control-id": "cis_rhel10_5-2.1", "description": "No notes for control-id 5.2.1.", "props": [ @@ -8294,7 +8318,7 @@ ] }, { - "uuid": "5a0fa689-c6c6-4080-962a-40e409bb1d25", + "uuid": "5da5cfc2-dba2-4b26-b446-f37f64c96029", "control-id": "cis_rhel10_5-2.2", "description": "No notes for control-id 5.2.2.", "props": [ @@ -8311,7 +8335,7 @@ ] }, { - "uuid": "907546d5-3f6f-4feb-bc32-04920946c5b5", + "uuid": "bafbdb89-5e03-4a1d-bc77-30c19910ba60", "control-id": "cis_rhel10_5-2.3", "description": "No notes for control-id 5.2.3.", "props": [ @@ -8328,7 +8352,7 @@ ] }, { - "uuid": "e5c47df9-cfa0-4705-b0a4-38bb6f1eaf5d", + "uuid": "b0b59b08-debc-454b-9d03-8c0f5bf05c34", "control-id": "cis_rhel10_5-2.5", "description": "No notes for control-id 5.2.5.", "props": [ @@ -8345,7 +8369,7 @@ ] }, { - "uuid": "e6385f7c-8b14-44d7-b920-dee0f3056bf2", + "uuid": "1d99131d-730c-4d4e-bb0b-8fb69f795b68", "control-id": "cis_rhel10_5-2.6", "description": "No notes for control-id 5.2.6.", "props": [ @@ -8362,7 +8386,7 @@ ] }, { - "uuid": "a1674b99-7d6e-40f6-ac94-6fc32f7db059", + "uuid": "b4f27219-0e21-4dfd-8f9b-8f4bcb29e764", "control-id": "cis_rhel10_5-2.7", "description": "Members of \"wheel\" or GID 0 groups are checked by default if the group option is not set for\npam_wheel.so module. The recommendation states the group should be empty to reinforce the\nuse of \"sudo\" for privileged access. Therefore, members of these groups should be manually\nchecked or a different group should be informed.", "props": [ @@ -8384,7 +8408,7 @@ ] }, { - "uuid": "a23a16ec-e04c-4b63-aad7-dd791116ced1", + "uuid": "15523cc1-45cc-42ae-a937-848d233d0257", "control-id": "cis_rhel10_5-3.1.1", "description": "This requirement is hard to be automated without any specific requirement. The policy even\nstates that provided commands are examples, other custom settings might be in place and the\nsettings might be different depending on site policies. The other rules will already make\nsure there is a correct autheselect profile regardless of the existing settings. It is\nnecessary to better discuss with CIS Community.", "props": [ @@ -8396,7 +8420,7 @@ ] }, { - "uuid": "7ef4f120-3da2-47cc-be99-24a4c5ff620c", + "uuid": "558e5c83-61ae-4434-a9a7-cc3f1f4931ee", "control-id": "cis_rhel10_5-3.1.2", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.1.", "props": [ @@ -8418,7 +8442,7 @@ ] }, { - "uuid": "571dbfb2-94c8-438f-9577-269785a7fd9f", + "uuid": "a7cc9e4e-4ba9-4b7a-ba12-4255a437a066", "control-id": "cis_rhel10_5-3.1.3", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.2.", "props": [ @@ -8445,7 +8469,7 @@ ] }, { - "uuid": "15fcb8da-bf2d-4078-a954-57e77cc22280", + "uuid": "35897e1d-1a42-46b0-bcb9-590a250a89f9", "control-id": "cis_rhel10_5-3.1.4", "description": "The module is properly enabled by the rules mentioned in related_rules.\nRequirements in 5.3.2.3 use these rules.", "props": [ @@ -8457,7 +8481,7 @@ ] }, { - "uuid": "3f1a7cf3-c6d8-402e-81d6-ea980b946300", + "uuid": "e53b0663-bdbe-4c79-ac77-196e0452dbec", "control-id": "cis_rhel10_5-3.1.5", "description": "No notes for control-id 5.3.1.5.", "props": [ @@ -8474,7 +8498,7 @@ ] }, { - "uuid": "8cc2164b-229c-41dd-ba69-b03090623b48", + "uuid": "70b10ccd-30a8-4707-8285-4804a7fa2f63", "control-id": "cis_rhel10_5-3.2.1.1", "description": "No notes for control-id 5.3.2.1.1.", "props": [ @@ -8491,7 +8515,7 @@ ] }, { - "uuid": "0931863a-f961-48ef-a8e6-289b3f88a628", + "uuid": "b545e794-7d45-4b12-ac3b-b1c5a39e06e0", "control-id": "cis_rhel10_5-3.2.1.2", "description": "The policy also accepts value 0, which means the locked accounts should be manually unlocked\nby an administrator. However, it also mentions that using value 0 can facilitate a DoS\nattack to legitimate users.", "props": [ @@ -8508,7 +8532,7 @@ ] }, { - "uuid": "1b4eaebc-dd20-4bac-b0e0-857b42a73c8c", + "uuid": "bc9c4e24-4b07-4ea1-9a3f-f5a35317e8a6", "control-id": "cis_rhel10_5-3.2.2.1", "description": "No notes for control-id 5.3.2.2.1.", "props": [ @@ -8525,7 +8549,7 @@ ] }, { - "uuid": "f2b2cee1-9363-4438-b2d5-d567d26e687d", + "uuid": "a2f58af5-6d30-4e29-bc39-c1c970888154", "control-id": "cis_rhel10_5-3.2.2.2", "description": "No notes for control-id 5.3.2.2.2.", "props": [ @@ -8542,7 +8566,7 @@ ] }, { - "uuid": "ffcada48-2a76-4b0b-a34b-e8b31e869afc", + "uuid": "315f773e-4208-44ef-ae6e-40f5fc1c56bc", "control-id": "cis_rhel10_5-3.2.2.3", "description": "This requirement is expected to be manual. However, in previous versions of the policy\nit was already automated the configuration of \"minclass\" option. This posture was kept for\nRHEL 10 in this new version. Rules related to other options are informed in related_rules.\nIn short, minclass=4 alone can achieve the same result achieved by the combination of the\nother 4 options mentioned in the policy.", "props": [ @@ -8559,7 +8583,7 @@ ] }, { - "uuid": "75a4d8d7-ac30-442d-b168-d09bd9bce022", + "uuid": "246fd59e-88c9-4e53-91c7-ac81e07d00df", "control-id": "cis_rhel10_5-3.2.2.4", "description": "No notes for control-id 5.3.2.2.4.", "props": [ @@ -8576,7 +8600,7 @@ ] }, { - "uuid": "9d6d0315-c53f-4e0a-9a7d-bc3ba4cef627", + "uuid": "7a53ed14-d6f3-4752-a877-2920266662a7", "control-id": "cis_rhel10_5-3.2.2.5", "description": "No notes for control-id 5.3.2.2.5.", "props": [ @@ -8593,7 +8617,7 @@ ] }, { - "uuid": "0c273ef4-cac0-4841-929d-b47f6b2aa940", + "uuid": "1b4e9fe8-a0bd-4d64-848e-524c8f720e8d", "control-id": "cis_rhel10_5-3.2.2.6", "description": "No notes for control-id 5.3.2.2.6.", "props": [ @@ -8610,7 +8634,7 @@ ] }, { - "uuid": "0a83ce6b-45bc-4d9b-8d76-2dae28fccef5", + "uuid": "1b02af4b-1d05-4bd1-9831-b9dd60b48307", "control-id": "cis_rhel10_5-3.2.2.7", "description": "No notes for control-id 5.3.2.2.7.", "props": [ @@ -8627,7 +8651,7 @@ ] }, { - "uuid": "a265f80d-6a0a-474e-a231-2c28832b43d7", + "uuid": "bef97d84-1772-4ae2-90ee-d72a61e2a911", "control-id": "cis_rhel10_5-3.2.3.1", "description": "Although mentioned in the section 5.3.3.3, there is no explicit requirement to configure\nretry option of pam_pwhistory. If come in the future, the rule accounts_password_pam_retry\ncan be used.", "props": [ @@ -8649,7 +8673,7 @@ ] }, { - "uuid": "d0b3e15a-74a7-4142-abde-0c637ea1348d", + "uuid": "a6ad7248-c513-41ff-9e00-b3ba1633cf5f", "control-id": "cis_rhel10_5-3.2.3.2", "description": "No notes for control-id 5.3.2.3.2.", "props": [ @@ -8666,7 +8690,7 @@ ] }, { - "uuid": "6828c6cf-4bc0-4316-8c99-aa7b473730a1", + "uuid": "2f1dc7d5-445e-4bcf-836a-57986da4984b", "control-id": "cis_rhel10_5-3.2.3.3", "description": "In RHEL 10 pam_pwhistory is enabled via authselect feature, as required in 5.3.1.4. The\nfeature automatically set \"use_authok\" option. In any case, we don't have a rule to check\nthis option specifically.", "props": [ @@ -8683,7 +8707,7 @@ ] }, { - "uuid": "12aa89a2-2e18-4d26-856a-9d48c91ef79a", + "uuid": "87a867a9-2401-4d36-9e38-60e6b8b85a54", "control-id": "cis_rhel10_5-3.2.4.1", "description": "The rule more specifically used in this requirement also satify the requirement 5.3.1.5.", "props": [ @@ -8700,7 +8724,7 @@ ] }, { - "uuid": "054a4457-870f-4846-85a5-b4a8cfaa7584", + "uuid": "069b6872-0095-4a0f-90c3-e5cc0bbda253", "control-id": "cis_rhel10_5-3.2.4.2", "description": "Usage of pam_unix.so module together with \"remember\" option is deprecated and is not\nrecommended by this policy. Instead, it should be used remember option of pam_pwhistory\nmodule, as required in 5.3.2.3.1. See here for more details about pam_unix.so:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1778929", "props": [ @@ -8717,7 +8741,7 @@ ] }, { - "uuid": "0b3edd47-7a72-4469-9b06-0d431258d5c3", + "uuid": "cfdb1bcd-919d-41fa-a9f6-1a6e4efa47a8", "control-id": "cis_rhel10_5-3.2.4.3", "description": "Changes in logindefs mentioned in this requirement are more specifically covered by 5.4.1.4", "props": [ @@ -8739,7 +8763,7 @@ ] }, { - "uuid": "538b0729-ca57-4732-917e-e9e04d60b787", + "uuid": "208589d1-3f83-4d5e-91dc-3b95d1421a55", "control-id": "cis_rhel10_5-3.2.4.4", "description": "In RHEL 10 pam_unix is enabled by default in all authselect profiles already with the\nuse_authtok option set. In any case, we don't have a rule to check this option specifically,\nlike in 5.3.2.3.3.", "props": [ @@ -8756,7 +8780,7 @@ ] }, { - "uuid": "476147f6-23d4-47c2-97d1-7d46c8a7b891", + "uuid": "cfe690c2-6038-42bf-94e7-50b2901a4f34", "control-id": "cis_rhel10_5-4.1.1", "description": "No notes for control-id 5.4.1.1.", "props": [ @@ -8778,7 +8802,7 @@ ] }, { - "uuid": "a61a201e-f890-4161-b2f3-d25a46cce378", + "uuid": "5ad5b298-bca3-4726-a12c-1faaf0891249", "control-id": "cis_rhel10_5-4.1.3", "description": "No notes for control-id 5.4.1.3.", "props": [ @@ -8800,7 +8824,7 @@ ] }, { - "uuid": "8ec2e040-4e74-414d-8fe4-5dc63d623eca", + "uuid": "5f6e2533-b054-4dc0-bee5-b0f650dde822", "control-id": "cis_rhel10_5-4.1.4", "description": "There's a \"new\" set of options in /etc/login.defs file to define the number of iterations\nperformed during the hashing process.", "props": [ @@ -8822,7 +8846,7 @@ ] }, { - "uuid": "5ffe1739-665a-4f4e-8e90-06b772b28dd8", + "uuid": "eb30bc0e-8da8-4fdb-a878-ced860014fda", "control-id": "cis_rhel10_5-4.1.5", "description": "No notes for control-id 5.4.1.5.", "props": [ @@ -8844,7 +8868,7 @@ ] }, { - "uuid": "03eef250-2474-4634-97ec-31980bf5f713", + "uuid": "03046173-d4fb-4d4a-adad-45b5bd207313", "control-id": "cis_rhel10_5-4.1.6", "description": "No notes for control-id 5.4.1.6.", "props": [ @@ -8861,7 +8885,7 @@ ] }, { - "uuid": "409cc13b-58c6-4787-81ec-a0b869188db2", + "uuid": "d64f6d7f-b24a-488d-a924-317b750059c5", "control-id": "cis_rhel10_5-4.2.1", "description": "No notes for control-id 5.4.2.1.", "props": [ @@ -8878,7 +8902,7 @@ ] }, { - "uuid": "79b6b646-24e1-4b69-865c-b0f667c40001", + "uuid": "b312c975-e8a7-4576-85ef-9aa2c5bf8ec0", "control-id": "cis_rhel10_5-4.2.2", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -8895,7 +8919,7 @@ ] }, { - "uuid": "b1a20ee4-961e-4355-8693-b22de177ee5f", + "uuid": "7854142b-1d18-4646-b312-354a9519d04c", "control-id": "cis_rhel10_5-4.2.3", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -8912,7 +8936,7 @@ ] }, { - "uuid": "b3e5b1f2-ae87-44da-ab2b-34b191d9c6d4", + "uuid": "39455f62-ece9-4d8c-b526-945067ea0a57", "control-id": "cis_rhel10_5-4.2.4", "description": "No notes for control-id 5.4.2.4.", "props": [ @@ -8929,7 +8953,7 @@ ] }, { - "uuid": "01e1dd02-434f-4f4e-b3e9-afbba13d8f99", + "uuid": "f5555e23-6fd5-4a95-8e39-02a48a8b5c38", "control-id": "cis_rhel10_5-4.2.5", "description": "No notes for control-id 5.4.2.5.", "props": [ @@ -8951,7 +8975,7 @@ ] }, { - "uuid": "d122eabe-2898-405e-99bb-6c407a14c2e5", + "uuid": "39207b49-7f18-48bd-aa78-d9c5579e7ee4", "control-id": "cis_rhel10_5-4.2.6", "description": "No notes for control-id 5.4.2.6.", "props": [ @@ -8968,7 +8992,7 @@ ] }, { - "uuid": "58f58317-0362-4807-a627-6c17a65b0db4", + "uuid": "4983273a-baca-4d77-ac17-df1f3c80ef52", "control-id": "cis_rhel10_5-4.2.7", "description": "No notes for control-id 5.4.2.7.", "props": [ @@ -8990,19 +9014,24 @@ ] }, { - "uuid": "ff8fd5be-ab57-4cb7-8549-67d079a30c48", + "uuid": "a44cb135-32a4-48fe-aaae-d59557c41a29", "control-id": "cis_rhel10_5-4.2.8", - "description": "New rule is necessary.", + "description": "No notes for control-id 5.4.2.8.", "props": [ { "name": "implementation-status", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "implemented" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "no_invalid_shell_accounts_unlocked" } ] }, { - "uuid": "46193c59-0cb8-40fe-8261-7dd945f5f6e8", + "uuid": "8e08f11c-432c-4e07-a0d3-622d0847e22f", "control-id": "cis_rhel10_5-4.3.2", "description": "No notes for control-id 5.4.3.2.", "props": [ @@ -9019,7 +9048,7 @@ ] }, { - "uuid": "a48fb8ab-65f6-48c9-8f09-cd80b866c269", + "uuid": "6bc53da1-cda3-4cd2-a98b-77c0b295bbf3", "control-id": "cis_rhel10_5-4.3.3", "description": "No notes for control-id 5.4.3.3.", "props": [ @@ -9046,7 +9075,7 @@ ] }, { - "uuid": "d07f1341-0534-4c7a-94b9-2bc91db6aff7", + "uuid": "0977c702-8493-45fe-b3eb-a65679f23fa7", "control-id": "cis_rhel10_6-1.1", "description": "No notes for control-id 6.1.1.", "props": [ @@ -9068,7 +9097,7 @@ ] }, { - "uuid": "7eec4e1a-5911-49c8-b366-2dc2accee6cf", + "uuid": "b554e3a9-9040-40ee-b8a9-5dd0b420da5e", "control-id": "cis_rhel10_6-1.2", "description": "No notes for control-id 6.1.2.", "props": [ @@ -9085,7 +9114,7 @@ ] }, { - "uuid": "d9b78f01-ed8a-4d00-b9ee-ef2ede417618", + "uuid": "b5e22e0b-7915-4027-86c1-ef2e720b8d1a", "control-id": "cis_rhel10_6-1.3", "description": "No notes for control-id 6.1.3.", "props": [ @@ -9102,7 +9131,7 @@ ] }, { - "uuid": "a683318f-3587-451d-9c8b-fdba7836dd97", + "uuid": "93817462-607f-4ad9-aff8-1f4c364b4cc7", "control-id": "cis_rhel10_6-2.1.1", "description": "No notes for control-id 6.2.1.1.", "props": [ @@ -9119,7 +9148,7 @@ ] }, { - "uuid": "4c8cdd1a-02e6-4485-b848-026553863df4", + "uuid": "69b59864-271e-45a7-82e0-d125dfea92c7", "control-id": "cis_rhel10_6-2.1.2", "description": "The description for control-id cis_rhel10_6-2.1.2.", "props": [ @@ -9132,7 +9161,7 @@ ] }, { - "uuid": "fec5fa17-1982-4d21-abca-42da4605f159", + "uuid": "6a9c77a0-90c6-4652-9bb4-d19e21743394", "control-id": "cis_rhel10_6-2.1.3", "description": "The description for control-id cis_rhel10_6-2.1.3.", "props": [ @@ -9145,20 +9174,24 @@ ] }, { - "uuid": "b5843a77-e271-4c3d-a49d-4feaab8e40f1", + "uuid": "7a1682c0-a334-4860-a6b5-5c2f1c0b269f", "control-id": "cis_rhel10_6-2.1.4", - "description": "The description for control-id cis_rhel10_6-2.1.4.", + "description": "No notes for control-id 6.2.1.4.", "props": [ { "name": "implementation-status", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "alternative", - "remarks": "It is necessary to create a new rule to check the status of journald and rsyslog.\nIt would also be necessary a new rule to disable or remove rsyslog." + "value": "implemented" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "ensure_journald_and_rsyslog_not_active_together" } ] }, { - "uuid": "5c017407-2843-4291-bf04-1708fd5a91b7", + "uuid": "61fdb391-0da7-456d-ae59-412337adc0ae", "control-id": "cis_rhel10_6-2.2.1.1", "description": "No notes for control-id 6.2.2.1.1.", "props": [ @@ -9175,7 +9208,7 @@ ] }, { - "uuid": "f2319c0c-5bd5-4a4f-b3c8-769743285c94", + "uuid": "31e1e580-258e-4519-9190-9b1f245f7dfc", "control-id": "cis_rhel10_6-2.2.1.2", "description": "The description for control-id cis_rhel10_6-2.2.1.2.", "props": [ @@ -9188,7 +9221,7 @@ ] }, { - "uuid": "9000d638-8c86-429e-87fa-5cd702afde3b", + "uuid": "60ebc08b-a670-4b88-9261-fa29e0c3f151", "control-id": "cis_rhel10_6-2.2.1.3", "description": "No notes for control-id 6.2.2.1.3.", "props": [ @@ -9205,7 +9238,7 @@ ] }, { - "uuid": "851b3b65-bd18-408e-aa6c-fbfd56bae51e", + "uuid": "9b4f5819-85c1-4693-95d1-3864c49167de", "control-id": "cis_rhel10_6-2.2.1.4", "description": "No notes for control-id 6.2.2.1.4.", "props": [ @@ -9222,7 +9255,7 @@ ] }, { - "uuid": "57283e69-fe2e-403c-8fb3-dcd19b4956ed", + "uuid": "9c460d79-eadd-4ab9-b38c-c90e4faf069e", "control-id": "cis_rhel10_6-2.2.2", "description": "No notes for control-id 6.2.2.2.", "props": [ @@ -9239,7 +9272,7 @@ ] }, { - "uuid": "2c890951-1e05-4201-b852-3dab7819bfc8", + "uuid": "10141626-838a-4642-87bc-3aae39034bba", "control-id": "cis_rhel10_6-2.2.3", "description": "No notes for control-id 6.2.2.3.", "props": [ @@ -9256,7 +9289,7 @@ ] }, { - "uuid": "24c5f45d-88b3-47e4-8855-c35241aea5b1", + "uuid": "ba964c9c-4d38-4751-93f1-6d8cc216202d", "control-id": "cis_rhel10_6-2.2.4", "description": "No notes for control-id 6.2.2.4.", "props": [ @@ -9273,7 +9306,7 @@ ] }, { - "uuid": "e0a7c1da-37a9-4049-b520-38bf042031a9", + "uuid": "fd7543dc-5dd0-4045-88b7-59853a0e098a", "control-id": "cis_rhel10_6-2.3.1", "description": "No notes for control-id 6.2.3.1.", "props": [ @@ -9285,7 +9318,7 @@ ] }, { - "uuid": "9d71fd21-06f3-427a-8fb7-06626b5eebaa", + "uuid": "e67a18b7-ae94-4864-96bc-f67fef7e2a7f", "control-id": "cis_rhel10_6-2.3.2", "description": "No notes for control-id 6.2.3.2.", "props": [ @@ -9297,7 +9330,7 @@ ] }, { - "uuid": "9ee1f431-5bc5-45d1-a7cb-1b8a16cb5b63", + "uuid": "5c67bf11-bd9e-4cfd-a58a-a371ff01b14c", "control-id": "cis_rhel10_6-2.3.3", "description": "No notes for control-id 6.2.3.3.", "props": [ @@ -9309,7 +9342,7 @@ ] }, { - "uuid": "ae9468a6-60fd-4230-8a92-ad1b5c02cb1e", + "uuid": "fd090f73-d0b9-4fb0-afe0-bd18103a467a", "control-id": "cis_rhel10_6-2.3.4", "description": "No notes for control-id 6.2.3.4.", "props": [ @@ -9321,7 +9354,7 @@ ] }, { - "uuid": "3d3b9248-9344-475c-aad0-2c0bbcf98da6", + "uuid": "7f757d14-66be-4da6-a559-d08639b54d85", "control-id": "cis_rhel10_6-2.3.5", "description": "The description for control-id cis_rhel10_6-2.3.5.", "props": [ @@ -9334,7 +9367,7 @@ ] }, { - "uuid": "c6fa0f2a-cd9f-48b2-b549-7befdaaa5274", + "uuid": "3c4a6e2e-6594-489b-8332-aae38f66806a", "control-id": "cis_rhel10_6-2.3.6", "description": "The description for control-id cis_rhel10_6-2.3.6.", "props": [ @@ -9347,7 +9380,7 @@ ] }, { - "uuid": "18e44a7c-be52-4cd6-ab4f-b4e64a51b682", + "uuid": "1942b9ee-2bc5-4d4c-925d-cb3be41609b3", "control-id": "cis_rhel10_6-2.3.7", "description": "No notes for control-id 6.2.3.7.", "props": [ @@ -9359,7 +9392,7 @@ ] }, { - "uuid": "3673aad0-94f6-44eb-aa89-8b42d911477c", + "uuid": "cdb42469-ee3d-43c5-bc3c-c9bd7399a71e", "control-id": "cis_rhel10_6-2.3.8", "description": "The description for control-id cis_rhel10_6-2.3.8.", "props": [ @@ -9372,7 +9405,7 @@ ] }, { - "uuid": "ca76fd4a-67e0-4419-a07b-1bbfdbe5559d", + "uuid": "6d4edc76-8bc8-41b0-9047-9a1446210b78", "control-id": "cis_rhel10_6-2.4.1", "description": "It is not harmful to run these rules even if rsyslog is not installed or active.", "props": [ @@ -9399,7 +9432,7 @@ ] }, { - "uuid": "02cbf894-93ed-4ffb-a1f3-6e224a5ef00d", + "uuid": "49947062-dc9e-4cf7-8b17-cf946d9b95f9", "control-id": "cis_rhel10_7-1.1", "description": "No notes for control-id 7.1.1.", "props": [ @@ -9426,7 +9459,7 @@ ] }, { - "uuid": "52b871b7-2a7b-46e8-8b35-60cbc9b3180f", + "uuid": "a4d6030c-28e0-4d06-9c30-9c0bb2eb185b", "control-id": "cis_rhel10_7-1.2", "description": "No notes for control-id 7.1.2.", "props": [ @@ -9453,7 +9486,7 @@ ] }, { - "uuid": "171c8dc7-c9ba-4c86-ad75-73c90734350d", + "uuid": "12bb4156-2a49-4e8d-a25f-8876069f330d", "control-id": "cis_rhel10_7-1.3", "description": "No notes for control-id 7.1.3.", "props": [ @@ -9480,7 +9513,7 @@ ] }, { - "uuid": "9789e539-0c3b-46e6-a54a-367ca5386c5e", + "uuid": "711a3c98-15ea-4b02-ac3a-d18fe4305b6f", "control-id": "cis_rhel10_7-1.4", "description": "No notes for control-id 7.1.4.", "props": [ @@ -9507,7 +9540,7 @@ ] }, { - "uuid": "07ff23ef-8790-49f8-9f60-9c77c69ac5fe", + "uuid": "61585d6f-7533-4719-9be4-c6efc094730a", "control-id": "cis_rhel10_7-1.5", "description": "No notes for control-id 7.1.5.", "props": [ @@ -9534,7 +9567,7 @@ ] }, { - "uuid": "81303f1f-668c-4665-bb71-5846c4ab8d3d", + "uuid": "b5c2f699-d043-4e1f-9d08-f09bd3560138", "control-id": "cis_rhel10_7-1.6", "description": "No notes for control-id 7.1.6.", "props": [ @@ -9561,7 +9594,7 @@ ] }, { - "uuid": "e92d4723-35e5-4461-be8b-dfcbe551927c", + "uuid": "9e759d85-90ed-4401-aee0-fdb47b6ee271", "control-id": "cis_rhel10_7-1.7", "description": "No notes for control-id 7.1.7.", "props": [ @@ -9588,7 +9621,7 @@ ] }, { - "uuid": "417fd102-a44e-4c14-8c57-428e831b20dd", + "uuid": "2d6f8848-584d-4216-b10a-66450e4a030a", "control-id": "cis_rhel10_7-1.8", "description": "No notes for control-id 7.1.8.", "props": [ @@ -9615,7 +9648,7 @@ ] }, { - "uuid": "e970aacf-e68c-4fce-a6ce-8b0e33505147", + "uuid": "90a93c83-4d9d-46ae-bede-b6b810884cd2", "control-id": "cis_rhel10_7-1.9", "description": "No notes for control-id 7.1.9.", "props": [ @@ -9642,7 +9675,7 @@ ] }, { - "uuid": "2d4c5b3a-2da7-4214-86ba-3f830360ec62", + "uuid": "de2e189e-d4b0-4951-8807-d3c00eb85cc7", "control-id": "cis_rhel10_7-1.10", "description": "No notes for control-id 7.1.10.", "props": [ @@ -9684,7 +9717,7 @@ ] }, { - "uuid": "8727b370-c206-4f23-bfed-0d70caa5b2a3", + "uuid": "f23f3fe9-d529-4c0a-b764-19c65cf162b1", "control-id": "cis_rhel10_7-1.11", "description": "No notes for control-id 7.1.11.", "props": [ @@ -9706,7 +9739,7 @@ ] }, { - "uuid": "98e6c156-7cb4-477a-9336-6c01703d97c2", + "uuid": "4fd68b1d-3f6f-4198-a95e-5b467bc12707", "control-id": "cis_rhel10_7-1.12", "description": "No notes for control-id 7.1.12.", "props": [ @@ -9728,7 +9761,7 @@ ] }, { - "uuid": "a33536a6-70c5-41f0-9297-43fcf6ee0a43", + "uuid": "c8a9af85-e69b-40ac-b1f5-3742ba4d0cbc", "control-id": "cis_rhel10_7-1.13", "description": "The description for control-id cis_rhel10_7-1.13.", "props": [ @@ -9741,7 +9774,7 @@ ] }, { - "uuid": "9a34f9e7-55c2-4da0-bc84-1210dd335220", + "uuid": "f16529ef-88fa-4e80-a858-e27344b22355", "control-id": "cis_rhel10_7-2.1", "description": "No notes for control-id 7.2.1.", "props": [ @@ -9758,7 +9791,7 @@ ] }, { - "uuid": "a3db1b8d-b439-42cc-bd65-69ed10a2469c", + "uuid": "a9ac8aef-45dc-429b-8ab1-b2d0bc36b42b", "control-id": "cis_rhel10_7-2.2", "description": "No notes for control-id 7.2.2.", "props": [ @@ -9775,7 +9808,7 @@ ] }, { - "uuid": "07085bb2-4e0e-4b99-a5ea-1219b78f4b0f", + "uuid": "8107cc52-5e91-4051-baed-3b9ee471bd71", "control-id": "cis_rhel10_7-2.3", "description": "No notes for control-id 7.2.3.", "props": [ @@ -9792,7 +9825,7 @@ ] }, { - "uuid": "d5aac704-a08b-453b-8b77-99d2efa3b629", + "uuid": "48d76205-7fc9-430f-ae63-96cbb81c7338", "control-id": "cis_rhel10_7-2.4", "description": "No notes for control-id 7.2.4.", "props": [ @@ -9809,7 +9842,7 @@ ] }, { - "uuid": "de2a32ed-d30e-4cc9-83f8-85ec9a32d736", + "uuid": "fdd9c754-ff7c-434c-9d40-b9f3f60646a3", "control-id": "cis_rhel10_7-2.5", "description": "No notes for control-id 7.2.5.", "props": [ @@ -9826,7 +9859,7 @@ ] }, { - "uuid": "761ef1c9-4dcc-4c2a-ab57-971e87d12cd9", + "uuid": "923f8125-df49-45a4-8c0e-2088717222c2", "control-id": "cis_rhel10_7-2.6", "description": "No notes for control-id 7.2.6.", "props": [ @@ -9843,7 +9876,7 @@ ] }, { - "uuid": "a5e186ff-be55-4232-b461-1a1b66216c2b", + "uuid": "2601088c-8029-4bf3-856b-13f002be320a", "control-id": "cis_rhel10_7-2.7", "description": "No notes for control-id 7.2.7.", "props": [ @@ -9860,7 +9893,7 @@ ] }, { - "uuid": "a88198db-8370-4b86-949d-30d95541ddd3", + "uuid": "1c30f43a-ec3a-4df6-9a40-4643faf319dc", "control-id": "cis_rhel10_7-2.8", "description": "No notes for control-id 7.2.8.", "props": [ @@ -9887,7 +9920,7 @@ ] }, { - "uuid": "6a3064a0-b0a6-4865-a98e-bcb520fb24a4", + "uuid": "61bf641d-10bd-4cf7-bffa-fb94be523cf4", "control-id": "cis_rhel10_7-2.9", "description": "No notes for control-id 7.2.9.", "props": [ @@ -17001,1759 +17034,1807 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_tmout", + "value": "no_invalid_shell_accounts_unlocked", "remarks": "rule_set_251" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Interactive Session Timeout", + "value": "Verify Non-Interactive Accounts Are Locked", "remarks": "rule_set_251" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_tmout", + "value": "no_invalid_shell_accounts_unlocked", "remarks": "rule_set_251" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Interactive Session Timeout", + "value": "Verify Non-Interactive Accounts Are Locked", "remarks": "rule_set_251" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_bashrc", + "value": "accounts_tmout", "remarks": "rule_set_252" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Bash Umask is Set Correctly", + "value": "Set Interactive Session Timeout", "remarks": "rule_set_252" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_bashrc", + "value": "accounts_tmout", "remarks": "rule_set_252" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Bash Umask is Set Correctly", + "value": "Set Interactive Session Timeout", "remarks": "rule_set_252" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_login_defs", + "value": "accounts_umask_etc_bashrc", "remarks": "rule_set_253" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Umask is Set Correctly in login.defs", + "value": "Ensure the Default Bash Umask is Set Correctly", "remarks": "rule_set_253" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_login_defs", + "value": "accounts_umask_etc_bashrc", "remarks": "rule_set_253" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Umask is Set Correctly in login.defs", + "value": "Ensure the Default Bash Umask is Set Correctly", "remarks": "rule_set_253" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_profile", + "value": "accounts_umask_etc_login_defs", "remarks": "rule_set_254" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Umask is Set Correctly in /etc/profile", + "value": "Ensure the Default Umask is Set Correctly in login.defs", "remarks": "rule_set_254" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_profile", + "value": "accounts_umask_etc_login_defs", "remarks": "rule_set_254" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Umask is Set Correctly in /etc/profile", + "value": "Ensure the Default Umask is Set Correctly in login.defs", "remarks": "rule_set_254" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_aide_installed", + "value": "accounts_umask_etc_profile", "remarks": "rule_set_255" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install AIDE", + "value": "Ensure the Default Umask is Set Correctly in /etc/profile", "remarks": "rule_set_255" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_aide_installed", + "value": "accounts_umask_etc_profile", "remarks": "rule_set_255" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install AIDE", + "value": "Ensure the Default Umask is Set Correctly in /etc/profile", "remarks": "rule_set_255" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_build_database", + "value": "package_aide_installed", "remarks": "rule_set_256" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Build and Test AIDE Database", + "value": "Install AIDE", "remarks": "rule_set_256" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_build_database", + "value": "package_aide_installed", "remarks": "rule_set_256" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Build and Test AIDE Database", + "value": "Install AIDE", "remarks": "rule_set_256" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_periodic_cron_checking", + "value": "aide_build_database", "remarks": "rule_set_257" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Periodic Execution of AIDE", + "value": "Build and Test AIDE Database", "remarks": "rule_set_257" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_periodic_cron_checking", + "value": "aide_build_database", "remarks": "rule_set_257" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Periodic Execution of AIDE", + "value": "Build and Test AIDE Database", "remarks": "rule_set_257" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_check_audit_tools", + "value": "aide_periodic_cron_checking", "remarks": "rule_set_258" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure AIDE to Verify the Audit Tools", + "value": "Configure Periodic Execution of AIDE", "remarks": "rule_set_258" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_check_audit_tools", + "value": "aide_periodic_cron_checking", "remarks": "rule_set_258" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure AIDE to Verify the Audit Tools", + "value": "Configure Periodic Execution of AIDE", "remarks": "rule_set_258" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_systemd-journald_enabled", + "value": "aide_check_audit_tools", "remarks": "rule_set_259" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable systemd-journald Service", + "value": "Configure AIDE to Verify the Audit Tools", "remarks": "rule_set_259" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_systemd-journald_enabled", + "value": "aide_check_audit_tools", "remarks": "rule_set_259" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable systemd-journald Service", + "value": "Configure AIDE to Verify the Audit Tools", "remarks": "rule_set_259" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_systemd-journal-remote_installed", + "value": "service_systemd-journald_enabled", "remarks": "rule_set_260" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install systemd-journal-remote Package", + "value": "Enable systemd-journald Service", "remarks": "rule_set_260" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_systemd-journal-remote_installed", + "value": "service_systemd-journald_enabled", "remarks": "rule_set_260" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install systemd-journal-remote Package", + "value": "Enable systemd-journald Service", "remarks": "rule_set_260" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_systemd-journal-upload_enabled", + "value": "ensure_journald_and_rsyslog_not_active_together", "remarks": "rule_set_261" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable systemd-journal-upload Service", + "value": "Ensure journald and rsyslog Are Not Active Together", "remarks": "rule_set_261" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_systemd-journal-upload_enabled", + "value": "ensure_journald_and_rsyslog_not_active_together", "remarks": "rule_set_261" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable systemd-journal-upload Service", + "value": "Ensure journald and rsyslog Are Not Active Together", "remarks": "rule_set_261" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "socket_systemd-journal-remote_disabled", + "value": "package_systemd-journal-remote_installed", "remarks": "rule_set_262" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable systemd-journal-remote Socket", + "value": "Install systemd-journal-remote Package", "remarks": "rule_set_262" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "socket_systemd-journal-remote_disabled", + "value": "package_systemd-journal-remote_installed", "remarks": "rule_set_262" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable systemd-journal-remote Socket", + "value": "Install systemd-journal-remote Package", "remarks": "rule_set_262" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_disable_forward_to_syslog", + "value": "service_systemd-journal-upload_enabled", "remarks": "rule_set_263" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald ForwardToSyslog is disabled", + "value": "Enable systemd-journal-upload Service", "remarks": "rule_set_263" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_disable_forward_to_syslog", + "value": "service_systemd-journal-upload_enabled", "remarks": "rule_set_263" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald ForwardToSyslog is disabled", + "value": "Enable systemd-journal-upload Service", "remarks": "rule_set_263" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_compress", + "value": "socket_systemd-journal-remote_disabled", "remarks": "rule_set_264" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald is configured to compress large log files", + "value": "Disable systemd-journal-remote Socket", "remarks": "rule_set_264" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_compress", + "value": "socket_systemd-journal-remote_disabled", "remarks": "rule_set_264" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald is configured to compress large log files", + "value": "Disable systemd-journal-remote Socket", "remarks": "rule_set_264" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_storage", + "value": "journald_disable_forward_to_syslog", "remarks": "rule_set_265" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald is configured to write log files to persistent disk", + "value": "Ensure journald ForwardToSyslog is disabled", "remarks": "rule_set_265" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_storage", + "value": "journald_disable_forward_to_syslog", "remarks": "rule_set_265" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald is configured to write log files to persistent disk", + "value": "Ensure journald ForwardToSyslog is disabled", "remarks": "rule_set_265" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_groupownership", + "value": "journald_compress", "remarks": "rule_set_266" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Log Files Are Owned By Appropriate Group", + "value": "Ensure journald is configured to compress large log files", "remarks": "rule_set_266" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_groupownership", + "value": "journald_compress", "remarks": "rule_set_266" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Log Files Are Owned By Appropriate Group", + "value": "Ensure journald is configured to compress large log files", "remarks": "rule_set_266" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_ownership", + "value": "journald_storage", "remarks": "rule_set_267" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Log Files Are Owned By Appropriate User", + "value": "Ensure journald is configured to write log files to persistent disk", "remarks": "rule_set_267" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_ownership", + "value": "journald_storage", "remarks": "rule_set_267" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Log Files Are Owned By Appropriate User", + "value": "Ensure journald is configured to write log files to persistent disk", "remarks": "rule_set_267" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_permissions", + "value": "rsyslog_files_groupownership", "remarks": "rule_set_268" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure System Log Files Have Correct Permissions", + "value": "Ensure Log Files Are Owned By Appropriate Group", "remarks": "rule_set_268" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_permissions", + "value": "rsyslog_files_groupownership", "remarks": "rule_set_268" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure System Log Files Have Correct Permissions", + "value": "Ensure Log Files Are Owned By Appropriate Group", "remarks": "rule_set_268" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_passwd", + "value": "rsyslog_files_ownership", "remarks": "rule_set_269" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns passwd File", + "value": "Ensure Log Files Are Owned By Appropriate User", "remarks": "rule_set_269" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_passwd", + "value": "rsyslog_files_ownership", "remarks": "rule_set_269" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns passwd File", + "value": "Ensure Log Files Are Owned By Appropriate User", "remarks": "rule_set_269" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_passwd", + "value": "rsyslog_files_permissions", "remarks": "rule_set_270" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns passwd File", + "value": "Ensure System Log Files Have Correct Permissions", "remarks": "rule_set_270" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_passwd", + "value": "rsyslog_files_permissions", "remarks": "rule_set_270" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns passwd File", + "value": "Ensure System Log Files Have Correct Permissions", "remarks": "rule_set_270" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_passwd", + "value": "file_groupowner_etc_passwd", "remarks": "rule_set_271" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on passwd File", + "value": "Verify Group Who Owns passwd File", "remarks": "rule_set_271" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_passwd", + "value": "file_groupowner_etc_passwd", "remarks": "rule_set_271" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on passwd File", + "value": "Verify Group Who Owns passwd File", "remarks": "rule_set_271" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_passwd", + "value": "file_owner_etc_passwd", "remarks": "rule_set_272" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup passwd File", + "value": "Verify User Who Owns passwd File", "remarks": "rule_set_272" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_passwd", + "value": "file_owner_etc_passwd", "remarks": "rule_set_272" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup passwd File", + "value": "Verify User Who Owns passwd File", "remarks": "rule_set_272" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_passwd", + "value": "file_permissions_etc_passwd", "remarks": "rule_set_273" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup passwd File", + "value": "Verify Permissions on passwd File", "remarks": "rule_set_273" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_passwd", + "value": "file_permissions_etc_passwd", "remarks": "rule_set_273" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup passwd File", + "value": "Verify Permissions on passwd File", "remarks": "rule_set_273" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_passwd", + "value": "file_groupowner_backup_etc_passwd", "remarks": "rule_set_274" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup passwd File", + "value": "Verify Group Who Owns Backup passwd File", "remarks": "rule_set_274" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_passwd", + "value": "file_groupowner_backup_etc_passwd", "remarks": "rule_set_274" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup passwd File", + "value": "Verify Group Who Owns Backup passwd File", "remarks": "rule_set_274" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_group", + "value": "file_owner_backup_etc_passwd", "remarks": "rule_set_275" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns group File", + "value": "Verify User Who Owns Backup passwd File", "remarks": "rule_set_275" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_group", + "value": "file_owner_backup_etc_passwd", "remarks": "rule_set_275" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns group File", + "value": "Verify User Who Owns Backup passwd File", "remarks": "rule_set_275" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_group", + "value": "file_permissions_backup_etc_passwd", "remarks": "rule_set_276" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns group File", + "value": "Verify Permissions on Backup passwd File", "remarks": "rule_set_276" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_group", + "value": "file_permissions_backup_etc_passwd", "remarks": "rule_set_276" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns group File", + "value": "Verify Permissions on Backup passwd File", "remarks": "rule_set_276" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_group", + "value": "file_groupowner_etc_group", "remarks": "rule_set_277" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on group File", + "value": "Verify Group Who Owns group File", "remarks": "rule_set_277" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_group", + "value": "file_groupowner_etc_group", "remarks": "rule_set_277" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on group File", + "value": "Verify Group Who Owns group File", "remarks": "rule_set_277" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_group", + "value": "file_owner_etc_group", "remarks": "rule_set_278" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup group File", + "value": "Verify User Who Owns group File", "remarks": "rule_set_278" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_group", + "value": "file_owner_etc_group", "remarks": "rule_set_278" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup group File", + "value": "Verify User Who Owns group File", "remarks": "rule_set_278" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_group", + "value": "file_permissions_etc_group", "remarks": "rule_set_279" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup group File", + "value": "Verify Permissions on group File", "remarks": "rule_set_279" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_group", + "value": "file_permissions_etc_group", "remarks": "rule_set_279" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup group File", + "value": "Verify Permissions on group File", "remarks": "rule_set_279" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_group", + "value": "file_groupowner_backup_etc_group", "remarks": "rule_set_280" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup group File", + "value": "Verify Group Who Owns Backup group File", "remarks": "rule_set_280" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_group", + "value": "file_groupowner_backup_etc_group", "remarks": "rule_set_280" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup group File", + "value": "Verify Group Who Owns Backup group File", "remarks": "rule_set_280" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_shadow", + "value": "file_owner_backup_etc_group", "remarks": "rule_set_281" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns shadow File", + "value": "Verify User Who Owns Backup group File", "remarks": "rule_set_281" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_shadow", + "value": "file_owner_backup_etc_group", "remarks": "rule_set_281" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns shadow File", + "value": "Verify User Who Owns Backup group File", "remarks": "rule_set_281" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_shadow", + "value": "file_permissions_backup_etc_group", "remarks": "rule_set_282" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns shadow File", + "value": "Verify Permissions on Backup group File", "remarks": "rule_set_282" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_shadow", + "value": "file_permissions_backup_etc_group", "remarks": "rule_set_282" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns shadow File", + "value": "Verify Permissions on Backup group File", "remarks": "rule_set_282" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_shadow", + "value": "file_owner_etc_shadow", "remarks": "rule_set_283" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on shadow File", + "value": "Verify User Who Owns shadow File", "remarks": "rule_set_283" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_shadow", + "value": "file_owner_etc_shadow", "remarks": "rule_set_283" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on shadow File", + "value": "Verify User Who Owns shadow File", "remarks": "rule_set_283" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_shadow", + "value": "file_groupowner_etc_shadow", "remarks": "rule_set_284" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup shadow File", + "value": "Verify Group Who Owns shadow File", "remarks": "rule_set_284" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_shadow", + "value": "file_groupowner_etc_shadow", "remarks": "rule_set_284" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup shadow File", + "value": "Verify Group Who Owns shadow File", "remarks": "rule_set_284" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_shadow", + "value": "file_permissions_etc_shadow", "remarks": "rule_set_285" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup shadow File", + "value": "Verify Permissions on shadow File", "remarks": "rule_set_285" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_shadow", + "value": "file_permissions_etc_shadow", "remarks": "rule_set_285" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup shadow File", + "value": "Verify Permissions on shadow File", "remarks": "rule_set_285" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_shadow", + "value": "file_groupowner_backup_etc_shadow", "remarks": "rule_set_286" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup shadow File", + "value": "Verify User Who Owns Backup shadow File", "remarks": "rule_set_286" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_shadow", + "value": "file_groupowner_backup_etc_shadow", "remarks": "rule_set_286" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup shadow File", + "value": "Verify User Who Owns Backup shadow File", "remarks": "rule_set_286" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_gshadow", + "value": "file_owner_backup_etc_shadow", "remarks": "rule_set_287" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns gshadow File", + "value": "Verify Group Who Owns Backup shadow File", "remarks": "rule_set_287" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_gshadow", + "value": "file_owner_backup_etc_shadow", "remarks": "rule_set_287" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns gshadow File", + "value": "Verify Group Who Owns Backup shadow File", "remarks": "rule_set_287" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_gshadow", + "value": "file_permissions_backup_etc_shadow", "remarks": "rule_set_288" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns gshadow File", + "value": "Verify Permissions on Backup shadow File", "remarks": "rule_set_288" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_gshadow", + "value": "file_permissions_backup_etc_shadow", "remarks": "rule_set_288" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns gshadow File", + "value": "Verify Permissions on Backup shadow File", "remarks": "rule_set_288" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_gshadow", + "value": "file_groupowner_etc_gshadow", "remarks": "rule_set_289" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on gshadow File", + "value": "Verify Group Who Owns gshadow File", "remarks": "rule_set_289" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_gshadow", + "value": "file_groupowner_etc_gshadow", "remarks": "rule_set_289" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on gshadow File", + "value": "Verify Group Who Owns gshadow File", "remarks": "rule_set_289" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_gshadow", + "value": "file_owner_etc_gshadow", "remarks": "rule_set_290" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup gshadow File", + "value": "Verify User Who Owns gshadow File", "remarks": "rule_set_290" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_gshadow", + "value": "file_owner_etc_gshadow", "remarks": "rule_set_290" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup gshadow File", + "value": "Verify User Who Owns gshadow File", "remarks": "rule_set_290" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_gshadow", + "value": "file_permissions_etc_gshadow", "remarks": "rule_set_291" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup gshadow File", + "value": "Verify Permissions on gshadow File", "remarks": "rule_set_291" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_gshadow", + "value": "file_permissions_etc_gshadow", "remarks": "rule_set_291" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup gshadow File", + "value": "Verify Permissions on gshadow File", "remarks": "rule_set_291" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_gshadow", + "value": "file_groupowner_backup_etc_gshadow", + "remarks": "rule_set_292" + }, + { + "name": "Rule_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Verify Group Who Owns Backup gshadow File", "remarks": "rule_set_292" }, + { + "name": "Check_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "file_groupowner_backup_etc_gshadow", + "remarks": "rule_set_292" + }, + { + "name": "Check_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Verify Group Who Owns Backup gshadow File", + "remarks": "rule_set_292" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "file_owner_backup_etc_gshadow", + "remarks": "rule_set_293" + }, + { + "name": "Rule_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Verify User Who Owns Backup gshadow File", + "remarks": "rule_set_293" + }, + { + "name": "Check_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "file_owner_backup_etc_gshadow", + "remarks": "rule_set_293" + }, + { + "name": "Check_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Verify User Who Owns Backup gshadow File", + "remarks": "rule_set_293" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "file_permissions_backup_etc_gshadow", + "remarks": "rule_set_294" + }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup gshadow File", - "remarks": "rule_set_292" + "remarks": "rule_set_294" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_gshadow", - "remarks": "rule_set_292" + "remarks": "rule_set_294" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup gshadow File", - "remarks": "rule_set_292" + "remarks": "rule_set_294" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shells", - "remarks": "rule_set_293" + "remarks": "rule_set_295" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/shells File", - "remarks": "rule_set_293" + "remarks": "rule_set_295" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shells", - "remarks": "rule_set_293" + "remarks": "rule_set_295" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/shells File", - "remarks": "rule_set_293" + "remarks": "rule_set_295" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shells", - "remarks": "rule_set_294" + "remarks": "rule_set_296" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Who Owns /etc/shells File", - "remarks": "rule_set_294" + "remarks": "rule_set_296" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shells", - "remarks": "rule_set_294" + "remarks": "rule_set_296" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Who Owns /etc/shells File", - "remarks": "rule_set_294" + "remarks": "rule_set_296" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shells", - "remarks": "rule_set_295" + "remarks": "rule_set_297" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/shells File", - "remarks": "rule_set_295" + "remarks": "rule_set_297" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shells", - "remarks": "rule_set_295" + "remarks": "rule_set_297" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/shells File", - "remarks": "rule_set_295" + "remarks": "rule_set_297" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd", - "remarks": "rule_set_296" + "remarks": "rule_set_298" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd File", - "remarks": "rule_set_296" + "remarks": "rule_set_298" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd", - "remarks": "rule_set_296" + "remarks": "rule_set_298" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd File", - "remarks": "rule_set_296" + "remarks": "rule_set_298" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd", - "remarks": "rule_set_297" + "remarks": "rule_set_299" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd File", - "remarks": "rule_set_297" + "remarks": "rule_set_299" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd", - "remarks": "rule_set_297" + "remarks": "rule_set_299" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd File", - "remarks": "rule_set_297" + "remarks": "rule_set_299" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd", - "remarks": "rule_set_298" + "remarks": "rule_set_300" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd File", - "remarks": "rule_set_298" + "remarks": "rule_set_300" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd", - "remarks": "rule_set_298" + "remarks": "rule_set_300" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd File", - "remarks": "rule_set_298" + "remarks": "rule_set_300" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd_old", - "remarks": "rule_set_299" + "remarks": "rule_set_301" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_299" + "remarks": "rule_set_301" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd_old", - "remarks": "rule_set_299" + "remarks": "rule_set_301" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_299" + "remarks": "rule_set_301" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd_old", - "remarks": "rule_set_300" + "remarks": "rule_set_302" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_300" + "remarks": "rule_set_302" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd_old", - "remarks": "rule_set_300" + "remarks": "rule_set_302" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_300" + "remarks": "rule_set_302" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd_old", - "remarks": "rule_set_301" + "remarks": "rule_set_303" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd.old File", - "remarks": "rule_set_301" + "remarks": "rule_set_303" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd_old", - "remarks": "rule_set_301" + "remarks": "rule_set_303" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd.old File", - "remarks": "rule_set_301" + "remarks": "rule_set_303" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_302" + "remarks": "rule_set_304" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_302" + "remarks": "rule_set_304" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_302" + "remarks": "rule_set_304" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_302" + "remarks": "rule_set_304" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_303" + "remarks": "rule_set_305" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_303" + "remarks": "rule_set_305" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_303" + "remarks": "rule_set_305" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_303" + "remarks": "rule_set_305" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_unowned_by_user", - "remarks": "rule_set_304" + "remarks": "rule_set_306" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a User", - "remarks": "rule_set_304" + "remarks": "rule_set_306" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_unowned_by_user", - "remarks": "rule_set_304" + "remarks": "rule_set_306" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a User", - "remarks": "rule_set_304" + "remarks": "rule_set_306" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_ungroupowned", - "remarks": "rule_set_305" + "remarks": "rule_set_307" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a Group", - "remarks": "rule_set_305" + "remarks": "rule_set_307" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_ungroupowned", - "remarks": "rule_set_305" + "remarks": "rule_set_307" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a Group", - "remarks": "rule_set_305" + "remarks": "rule_set_307" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_all_shadowed", - "remarks": "rule_set_306" + "remarks": "rule_set_308" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify All Account Password Hashes are Shadowed", - "remarks": "rule_set_306" + "remarks": "rule_set_308" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_all_shadowed", - "remarks": "rule_set_306" + "remarks": "rule_set_308" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify All Account Password Hashes are Shadowed", - "remarks": "rule_set_306" + "remarks": "rule_set_308" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords_etc_shadow", - "remarks": "rule_set_307" + "remarks": "rule_set_309" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure There Are No Accounts With Blank or Null Passwords", - "remarks": "rule_set_307" + "remarks": "rule_set_309" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords_etc_shadow", - "remarks": "rule_set_307" + "remarks": "rule_set_309" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure There Are No Accounts With Blank or Null Passwords", - "remarks": "rule_set_307" + "remarks": "rule_set_309" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gid_passwd_group_same", - "remarks": "rule_set_308" + "remarks": "rule_set_310" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", - "remarks": "rule_set_308" + "remarks": "rule_set_310" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gid_passwd_group_same", - "remarks": "rule_set_308" + "remarks": "rule_set_310" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", - "remarks": "rule_set_308" + "remarks": "rule_set_310" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_id", - "remarks": "rule_set_309" + "remarks": "rule_set_311" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique User IDs", - "remarks": "rule_set_309" + "remarks": "rule_set_311" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_id", - "remarks": "rule_set_309" + "remarks": "rule_set_311" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique User IDs", - "remarks": "rule_set_309" + "remarks": "rule_set_311" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_id", - "remarks": "rule_set_310" + "remarks": "rule_set_312" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group ID", - "remarks": "rule_set_310" + "remarks": "rule_set_312" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_id", - "remarks": "rule_set_310" + "remarks": "rule_set_312" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group ID", - "remarks": "rule_set_310" + "remarks": "rule_set_312" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_name", - "remarks": "rule_set_311" + "remarks": "rule_set_313" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique Names", - "remarks": "rule_set_311" + "remarks": "rule_set_313" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_name", - "remarks": "rule_set_311" + "remarks": "rule_set_313" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique Names", - "remarks": "rule_set_311" + "remarks": "rule_set_313" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_name", - "remarks": "rule_set_312" + "remarks": "rule_set_314" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group Names", - "remarks": "rule_set_312" + "remarks": "rule_set_314" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_name", - "remarks": "rule_set_312" + "remarks": "rule_set_314" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group Names", - "remarks": "rule_set_312" + "remarks": "rule_set_314" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_interactive_home_directory_exists", - "remarks": "rule_set_313" + "remarks": "rule_set_315" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive Users Home Directories Must Exist", - "remarks": "rule_set_313" + "remarks": "rule_set_315" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_interactive_home_directory_exists", - "remarks": "rule_set_313" + "remarks": "rule_set_315" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive Users Home Directories Must Exist", - "remarks": "rule_set_313" + "remarks": "rule_set_315" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_home_directories", - "remarks": "rule_set_314" + "remarks": "rule_set_316" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Be Owned By The Primary User", - "remarks": "rule_set_314" + "remarks": "rule_set_316" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_home_directories", - "remarks": "rule_set_314" + "remarks": "rule_set_316" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Be Owned By The Primary User", - "remarks": "rule_set_314" + "remarks": "rule_set_316" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_home_directories", - "remarks": "rule_set_315" + "remarks": "rule_set_317" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", - "remarks": "rule_set_315" + "remarks": "rule_set_317" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_home_directories", - "remarks": "rule_set_315" + "remarks": "rule_set_317" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", - "remarks": "rule_set_315" + "remarks": "rule_set_317" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_316" + "remarks": "rule_set_318" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_316" + "remarks": "rule_set_318" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_316" + "remarks": "rule_set_318" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_316" + "remarks": "rule_set_318" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_317" + "remarks": "rule_set_319" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_317" + "remarks": "rule_set_319" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_317" + "remarks": "rule_set_319" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_317" + "remarks": "rule_set_319" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_no_world_writable_programs", - "remarks": "rule_set_318" + "remarks": "rule_set_320" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Not Run World-Writable Programs", - "remarks": "rule_set_318" + "remarks": "rule_set_320" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_no_world_writable_programs", - "remarks": "rule_set_318" + "remarks": "rule_set_320" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Not Run World-Writable Programs", - "remarks": "rule_set_318" + "remarks": "rule_set_320" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_319" + "remarks": "rule_set_321" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_319" + "remarks": "rule_set_321" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_319" + "remarks": "rule_set_321" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_319" + "remarks": "rule_set_321" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_forward_files", - "remarks": "rule_set_320" + "remarks": "rule_set_322" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .forward Files Exist", - "remarks": "rule_set_320" + "remarks": "rule_set_322" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_forward_files", - "remarks": "rule_set_320" + "remarks": "rule_set_322" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .forward Files Exist", - "remarks": "rule_set_320" + "remarks": "rule_set_322" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_netrc_files", - "remarks": "rule_set_321" + "remarks": "rule_set_323" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No netrc Files Exist", - "remarks": "rule_set_321" + "remarks": "rule_set_323" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_netrc_files", - "remarks": "rule_set_321" + "remarks": "rule_set_323" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No netrc Files Exist", - "remarks": "rule_set_321" + "remarks": "rule_set_323" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rhost_files", - "remarks": "rule_set_322" + "remarks": "rule_set_324" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .rhost Files Exist", - "remarks": "rule_set_322" + "remarks": "rule_set_324" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rhost_files", - "remarks": "rule_set_322" + "remarks": "rule_set_324" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .rhost Files Exist", - "remarks": "rule_set_322" + "remarks": "rule_set_324" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_bash_history", - "remarks": "rule_set_323" + "remarks": "rule_set_325" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure User Bash History File Has Correct Permissions", - "remarks": "rule_set_323" + "remarks": "rule_set_325" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_bash_history", - "remarks": "rule_set_323" + "remarks": "rule_set_325" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure User Bash History File Has Correct Permissions", - "remarks": "rule_set_323" + "remarks": "rule_set_325" } ], "control-implementations": [ { - "uuid": "d58124c6-429c-4904-b9cf-e999c1521449", + "uuid": "bef020e7-c35e-4152-a54f-73c4ea2a85e9", "source": "trestle://profiles/rhel10-cis_rhel10-l1_server/profile.json", "description": "Control implementation for cis_server_l1", "props": [ @@ -19109,7 +19190,7 @@ ], "implemented-requirements": [ { - "uuid": "a84b7fce-f41f-4c06-87b2-abc2324ca124", + "uuid": "b0c207b9-6cdd-42b7-acb8-bf93423a1d41", "control-id": "reload_dconf_db", "description": "This is a helper rule to reload Dconf database correctly.", "props": [ @@ -19126,7 +19207,7 @@ ] }, { - "uuid": "7643d25f-eb05-44dc-ba97-b4f0ef1e7e6c", + "uuid": "775f2178-9568-439d-8af8-a6def471f80c", "control-id": "cis_rhel10_1-1.1.1", "description": "No notes for control-id 1.1.1.1.", "props": [ @@ -19143,7 +19224,7 @@ ] }, { - "uuid": "104475ff-cfbe-4476-bb3e-10702f619a61", + "uuid": "3231fc9d-7d42-4481-8f87-9c6100c58d9f", "control-id": "cis_rhel10_1-1.1.2", "description": "No notes for control-id 1.1.1.2.", "props": [ @@ -19160,7 +19241,7 @@ ] }, { - "uuid": "8695e271-cbac-4baf-b1f5-2cf2f0804b1c", + "uuid": "c493ef80-403c-4288-9d8e-a07340b5a434", "control-id": "cis_rhel10_1-1.1.3", "description": "No notes for control-id 1.1.1.3.", "props": [ @@ -19177,7 +19258,7 @@ ] }, { - "uuid": "3699e791-38a8-4b9e-9cc0-7764db63a9d3", + "uuid": "c4faaabd-df16-469f-ab5e-b6ea23a2c059", "control-id": "cis_rhel10_1-1.1.4", "description": "No notes for control-id 1.1.1.4.", "props": [ @@ -19194,7 +19275,7 @@ ] }, { - "uuid": "7a850cb6-4c26-4ef1-a1fc-443aeaad1fa3", + "uuid": "da9ae75a-650f-4952-8f80-5615efabbee9", "control-id": "cis_rhel10_1-1.1.5", "description": "No notes for control-id 1.1.1.5.", "props": [ @@ -19211,7 +19292,7 @@ ] }, { - "uuid": "c70e227e-7c7d-4cad-8556-6a8119a46507", + "uuid": "95fd9914-30b6-4920-954a-337d2e6f1480", "control-id": "cis_rhel10_1-1.1.9", "description": "No notes for control-id 1.1.1.9.", "props": [ @@ -19228,7 +19309,7 @@ ] }, { - "uuid": "35f2180a-93c2-46fb-9e07-3e6c0b1b64b8", + "uuid": "9741e902-d036-4224-91a1-a014509d83c3", "control-id": "cis_rhel10_1-1.1.10", "description": "No notes for control-id 1.1.1.10.", "props": [ @@ -19245,7 +19326,7 @@ ] }, { - "uuid": "b2cbd635-8f6c-46b3-ba23-28636743f8e1", + "uuid": "20aa9f30-87a7-4ac9-9071-67e3b459813d", "control-id": "cis_rhel10_1-1.1.11", "description": "The description for control-id cis_rhel10_1-1.1.11.", "props": [ @@ -19258,7 +19339,7 @@ ] }, { - "uuid": "fe214bcf-5d7e-431f-a898-ba59dd489884", + "uuid": "3382f383-d8b2-49a0-b581-284f24d495fb", "control-id": "cis_rhel10_1-1.2.1.1", "description": "No notes for control-id 1.1.2.1.1.", "props": [ @@ -19275,7 +19356,7 @@ ] }, { - "uuid": "8f4c4568-7e52-47c2-bf15-3b046147dc1d", + "uuid": "9b0ed9fa-68a8-4389-b81f-15cf79dfb5aa", "control-id": "cis_rhel10_1-1.2.1.2", "description": "No notes for control-id 1.1.2.1.2.", "props": [ @@ -19292,7 +19373,7 @@ ] }, { - "uuid": "fa60955c-ba1c-423d-9ab8-bcc3b2aba999", + "uuid": "4d2b2247-e59b-4641-90bf-5f9d0c3518f1", "control-id": "cis_rhel10_1-1.2.1.3", "description": "No notes for control-id 1.1.2.1.3.", "props": [ @@ -19309,7 +19390,7 @@ ] }, { - "uuid": "02252852-55b6-4d3e-a2a1-ceacd577d3cd", + "uuid": "0fb5b26d-2cc1-4a19-961b-da2e269d673c", "control-id": "cis_rhel10_1-1.2.1.4", "description": "No notes for control-id 1.1.2.1.4.", "props": [ @@ -19326,7 +19407,7 @@ ] }, { - "uuid": "fbe0399b-53a0-4610-aab2-4aad77c86793", + "uuid": "4758c16f-a290-4ba9-b6a4-dc9be59080b2", "control-id": "cis_rhel10_1-1.2.2.1", "description": "No notes for control-id 1.1.2.2.1.", "props": [ @@ -19343,7 +19424,7 @@ ] }, { - "uuid": "700cbe24-1678-4426-952e-04130877fbcd", + "uuid": "0cdbc572-99a1-466a-8355-9597afc52d04", "control-id": "cis_rhel10_1-1.2.2.2", "description": "No notes for control-id 1.1.2.2.2.", "props": [ @@ -19360,7 +19441,7 @@ ] }, { - "uuid": "873efada-c062-41c9-b65e-8203e4179dc3", + "uuid": "9d17cf64-20a5-4a22-afdd-9d2d7367f0e5", "control-id": "cis_rhel10_1-1.2.2.3", "description": "No notes for control-id 1.1.2.2.3.", "props": [ @@ -19377,7 +19458,7 @@ ] }, { - "uuid": "fb6aed97-77d8-4fdd-a3b6-23aa31f59f8a", + "uuid": "c31ff8c4-42a2-4483-b9df-be54b9ea730c", "control-id": "cis_rhel10_1-1.2.2.4", "description": "No notes for control-id 1.1.2.2.4.", "props": [ @@ -19394,7 +19475,7 @@ ] }, { - "uuid": "820a20cd-a92e-4f47-bb7e-921978e06f0b", + "uuid": "c28f497f-78b1-47e7-b249-f632afdc54fc", "control-id": "cis_rhel10_1-1.2.3.2", "description": "No notes for control-id 1.1.2.3.2.", "props": [ @@ -19411,7 +19492,7 @@ ] }, { - "uuid": "68ac265c-f78a-4419-ab9f-f3a33239a87d", + "uuid": "b29bec9f-c4ff-4ab5-891d-5fbc9f5c0f7f", "control-id": "cis_rhel10_1-1.2.3.3", "description": "No notes for control-id 1.1.2.3.3.", "props": [ @@ -19428,7 +19509,7 @@ ] }, { - "uuid": "e8dcaeb3-dd44-4e9d-b57c-a508916a64a7", + "uuid": "89386419-18cf-4cd1-8396-a60202bd4e88", "control-id": "cis_rhel10_1-1.2.4.2", "description": "No notes for control-id 1.1.2.4.2.", "props": [ @@ -19445,7 +19526,7 @@ ] }, { - "uuid": "659ed983-20cf-4007-bb94-56faac809d7d", + "uuid": "70274203-e7b9-4bc7-8f38-9e3873105699", "control-id": "cis_rhel10_1-1.2.4.3", "description": "No notes for control-id 1.1.2.4.3.", "props": [ @@ -19462,7 +19543,7 @@ ] }, { - "uuid": "c8d3f632-f522-431a-892d-3eb60f9d7012", + "uuid": "1c46d1d5-ee01-40fd-b70e-9c8988c5a224", "control-id": "cis_rhel10_1-1.2.5.2", "description": "No notes for control-id 1.1.2.5.2.", "props": [ @@ -19479,7 +19560,7 @@ ] }, { - "uuid": "1ac12e24-280d-4f67-8641-8823ca60e737", + "uuid": "b295277b-1a3c-4402-9f8a-b9f5890a06f7", "control-id": "cis_rhel10_1-1.2.5.3", "description": "No notes for control-id 1.1.2.5.3.", "props": [ @@ -19496,7 +19577,7 @@ ] }, { - "uuid": "38a00fa5-1a34-4950-a3af-e2667ec82b69", + "uuid": "88a51b37-eed7-49af-9430-6b93e26e8ae6", "control-id": "cis_rhel10_1-1.2.5.4", "description": "No notes for control-id 1.1.2.5.4.", "props": [ @@ -19513,7 +19594,7 @@ ] }, { - "uuid": "ab1a7e93-8c9c-4732-9174-e5ff4c110e80", + "uuid": "b6882636-b20e-44b4-9f5c-09f87814661c", "control-id": "cis_rhel10_1-1.2.6.2", "description": "No notes for control-id 1.1.2.6.2.", "props": [ @@ -19530,7 +19611,7 @@ ] }, { - "uuid": "fd973d5c-8297-49d0-81b8-c3ed0ed0b8ef", + "uuid": "c9d50719-b600-4076-a763-f429f505930b", "control-id": "cis_rhel10_1-1.2.6.3", "description": "No notes for control-id 1.1.2.6.3.", "props": [ @@ -19547,7 +19628,7 @@ ] }, { - "uuid": "c0cdeee1-4381-4424-9a5f-4b34aa272c51", + "uuid": "357fba8b-907a-4aa6-b7ba-524cc50c1298", "control-id": "cis_rhel10_1-1.2.6.4", "description": "No notes for control-id 1.1.2.6.4.", "props": [ @@ -19564,7 +19645,7 @@ ] }, { - "uuid": "14e4a448-e6dd-4e14-a405-5abe5d382adf", + "uuid": "a713993c-853d-4c96-bb61-93605b4f6da1", "control-id": "cis_rhel10_1-1.2.7.2", "description": "No notes for control-id 1.1.2.7.2.", "props": [ @@ -19581,7 +19662,7 @@ ] }, { - "uuid": "699b5fb7-ca6d-4a8d-a397-8c7e2f02998c", + "uuid": "bc64a377-7ba5-4639-accd-ef88cf1055ab", "control-id": "cis_rhel10_1-1.2.7.3", "description": "No notes for control-id 1.1.2.7.3.", "props": [ @@ -19598,7 +19679,7 @@ ] }, { - "uuid": "b172449c-2b53-4856-89fa-d43d5f9593eb", + "uuid": "9ec773a9-0838-4081-938b-f3749462dbfa", "control-id": "cis_rhel10_1-1.2.7.4", "description": "No notes for control-id 1.1.2.7.4.", "props": [ @@ -19615,7 +19696,7 @@ ] }, { - "uuid": "0e2fe632-38fd-46a3-8900-1eeeee14cdf3", + "uuid": "020295f5-19f6-451f-bd46-b17b9d9f7d24", "control-id": "cis_rhel10_1-2.1.1", "description": "The description for control-id cis_rhel10_1-2.1.1.", "props": [ @@ -19628,7 +19709,7 @@ ] }, { - "uuid": "90d7194b-b616-4492-bbb4-4afc289906db", + "uuid": "cbd80a12-7d51-4ccd-b638-1290168d4571", "control-id": "cis_rhel10_1-2.1.2", "description": "No notes for control-id 1.2.1.2.", "props": [ @@ -19645,7 +19726,7 @@ ] }, { - "uuid": "85b98d1e-a1c0-4b77-ab26-d31a04bb4e25", + "uuid": "2fa7f88c-a858-4b4a-9208-193764055684", "control-id": "cis_rhel10_1-2.1.4", "description": "The description for control-id cis_rhel10_1-2.1.4.", "props": [ @@ -19658,7 +19739,7 @@ ] }, { - "uuid": "5a0acaf7-339f-447e-90bf-a3874f873d39", + "uuid": "5a743e44-5a41-4825-bdee-f8c53f3c3fea", "control-id": "cis_rhel10_1-2.2.1", "description": "The description for control-id cis_rhel10_1-2.2.1.", "props": [ @@ -19671,7 +19752,7 @@ ] }, { - "uuid": "1440ccb9-2b12-4d0f-b878-8c9053d497e8", + "uuid": "b0e995fb-728d-45ba-8b80-6125162e3235", "control-id": "cis_rhel10_1-3.1.1", "description": "No notes for control-id 1.3.1.1.", "props": [ @@ -19688,7 +19769,7 @@ ] }, { - "uuid": "1d38dcda-1806-40fc-86a4-e04f90d8f4ce", + "uuid": "750b05d0-3b35-4361-9ec5-1766105cd87e", "control-id": "cis_rhel10_1-3.1.2", "description": "No notes for control-id 1.3.1.2.", "props": [ @@ -19705,7 +19786,7 @@ ] }, { - "uuid": "4c794244-ed8b-4d14-b8c0-9bfc5db81bae", + "uuid": "32ce57b3-b49d-4fa6-8b8d-c576ce598bc1", "control-id": "cis_rhel10_1-3.1.3", "description": "No notes for control-id 1.3.1.3.", "props": [ @@ -19722,7 +19803,7 @@ ] }, { - "uuid": "58178fc0-129b-4b4d-b065-53d0d04847a8", + "uuid": "d8506551-54c8-438b-8c1c-4d4cf851181b", "control-id": "cis_rhel10_1-3.1.4", "description": "No notes for control-id 1.3.1.4.", "props": [ @@ -19739,7 +19820,7 @@ ] }, { - "uuid": "f8dacd88-1473-4952-9382-028fb932808c", + "uuid": "6ac65844-1486-47ec-8153-83f94bd42e95", "control-id": "cis_rhel10_1-3.1.7", "description": "No notes for control-id 1.3.1.7.", "props": [ @@ -19756,7 +19837,7 @@ ] }, { - "uuid": "33c2fe71-fd86-4207-8808-89fcb1e112be", + "uuid": "6ba2c9c6-5e97-4837-b22e-b4e939c7abff", "control-id": "cis_rhel10_1-3.1.8", "description": "No notes for control-id 1.3.1.8.", "props": [ @@ -19773,7 +19854,7 @@ ] }, { - "uuid": "fc9b9eeb-5a7c-4616-959a-b109de3b97c3", + "uuid": "81a22036-3591-4b16-9105-e4342eebca80", "control-id": "cis_rhel10_1-4.1", "description": "There is no automated remediation for this rule and this is intentional.\nMore details in the rule description.", "props": [ @@ -19790,7 +19871,7 @@ ] }, { - "uuid": "9840d2dc-be3b-4e84-9abf-62d53e7ef066", + "uuid": "5ab935f1-4a70-4be0-adbc-0bc3f0de6f77", "control-id": "cis_rhel10_1-4.2", "description": "The description for control-id cis_rhel10_1-4.2.", "props": [ @@ -19833,7 +19914,7 @@ ] }, { - "uuid": "a294b661-36e0-4f6b-9180-e1e567b54711", + "uuid": "f3463120-b000-4006-adcd-6860ad4f9660", "control-id": "cis_rhel10_1-5.1", "description": "No notes for control-id 1.5.1.", "props": [ @@ -19850,7 +19931,7 @@ ] }, { - "uuid": "6e646914-f1cb-44ef-9f7b-509fe6a51016", + "uuid": "e852423d-4c7a-462c-aa69-fbb5adc13c51", "control-id": "cis_rhel10_1-5.2", "description": "No notes for control-id 1.5.2.", "props": [ @@ -19867,7 +19948,7 @@ ] }, { - "uuid": "0b2dd3cf-8fc8-45b0-8b74-90e9d2fb7d00", + "uuid": "ea53a6b7-46b1-4d59-96d3-6608cf3fcdba", "control-id": "cis_rhel10_1-5.4", "description": "No notes for control-id 1.5.4.", "props": [ @@ -19884,7 +19965,7 @@ ] }, { - "uuid": "7544ff4b-d8fd-4bb9-b81b-af169bec399a", + "uuid": "20fd71dd-3e10-45cd-ae50-cfd3c20aec92", "control-id": "cis_rhel10_1-5.5", "description": "No notes for control-id 1.5.5.", "props": [ @@ -19901,7 +19982,7 @@ ] }, { - "uuid": "a9cc942b-6333-4af2-b279-cacd85695d3d", + "uuid": "741e94e9-d774-42b2-9349-35c570ef6c36", "control-id": "cis_rhel10_1-5.6", "description": "No notes for control-id 1.5.6.", "props": [ @@ -19918,7 +19999,7 @@ ] }, { - "uuid": "bb6fc5cc-7763-40bd-9e06-941e3be00774", + "uuid": "e651768e-5bb3-42a8-b5e3-329323911c9c", "control-id": "cis_rhel10_1-5.7", "description": "No notes for control-id 1.5.7.", "props": [ @@ -19935,7 +20016,7 @@ ] }, { - "uuid": "411eddef-6d62-4ab2-9704-665d47115bff", + "uuid": "56ed57f8-8e98-49df-9e59-8c168d83b1a6", "control-id": "cis_rhel10_1-5.8", "description": "Address Space Layout Randomization (ASLR)", "props": [ @@ -19952,7 +20033,7 @@ ] }, { - "uuid": "6552adb0-4654-44be-b886-73a1da4abb9b", + "uuid": "f1be250d-5db4-4182-af77-1204f589d498", "control-id": "cis_rhel10_1-5.9", "description": "No notes for control-id 1.5.9.", "props": [ @@ -19969,7 +20050,7 @@ ] }, { - "uuid": "99a4db30-9fd9-40f5-88e1-4729ea63c326", + "uuid": "3363e28e-70e3-485a-ae2e-1d51b8e7a426", "control-id": "cis_rhel10_1-5.10", "description": "No notes for control-id 1.5.10.", "props": [ @@ -19986,7 +20067,7 @@ ] }, { - "uuid": "5b711e31-41ac-4625-8503-86601af67caa", + "uuid": "013a9580-8f84-45b4-a95a-e7063960a138", "control-id": "cis_rhel10_1-6.1", "description": "No notes for control-id 1.6.1.", "props": [ @@ -20003,7 +20084,7 @@ ] }, { - "uuid": "35da6dd5-a2f3-4dff-89fa-1c420c3c2851", + "uuid": "1d2e9ddb-7d73-4cb6-9839-123b9421cf0d", "control-id": "cis_rhel10_1-6.2", "description": "No notes for control-id 1.6.2.", "props": [ @@ -20020,7 +20101,7 @@ ] }, { - "uuid": "5656a88b-7741-4d40-86fc-5f83c5863556", + "uuid": "73440a79-ab4c-4ff4-ad9a-8056652a572b", "control-id": "cis_rhel10_1-6.3", "description": "No notes for control-id 1.6.3.", "props": [ @@ -20037,7 +20118,7 @@ ] }, { - "uuid": "b07b7b72-f132-4b2c-86b1-43a81eb2519b", + "uuid": "c3782387-14b5-4d54-b5db-1c1f95da9967", "control-id": "cis_rhel10_1-6.4", "description": "No notes for control-id 1.6.4.", "props": [ @@ -20054,7 +20135,7 @@ ] }, { - "uuid": "5a50b4ee-895c-4eb5-8162-55770b421c1c", + "uuid": "4a436afb-45cf-4a7d-a51c-c66c9e91cf82", "control-id": "cis_rhel10_1-7.1", "description": "No notes for control-id 1.7.1.", "props": [ @@ -20071,7 +20152,7 @@ ] }, { - "uuid": "a6e23494-d6e2-449d-948f-aa963a0bb0f2", + "uuid": "9d31b693-f856-43ce-b80e-4b7ed848fcaa", "control-id": "cis_rhel10_1-7.2", "description": "No notes for control-id 1.7.2.", "props": [ @@ -20088,7 +20169,7 @@ ] }, { - "uuid": "8e9c6dd9-ce5c-48c5-8886-d5219ee2d26c", + "uuid": "c0312622-ea81-42b4-bdd7-92a04d7ca598", "control-id": "cis_rhel10_1-7.3", "description": "No notes for control-id 1.7.3.", "props": [ @@ -20105,7 +20186,7 @@ ] }, { - "uuid": "4d9a9817-0a3e-4cb4-964d-eead8bcd40df", + "uuid": "0c685407-2324-410d-9105-d8d09a72386f", "control-id": "cis_rhel10_1-7.4", "description": "No notes for control-id 1.7.4.", "props": [ @@ -20132,7 +20213,7 @@ ] }, { - "uuid": "d6245c82-d5f5-4ec6-9b2c-57fd5a14a496", + "uuid": "8b4d765c-2500-4ed6-9701-4aa19bdb8c4d", "control-id": "cis_rhel10_1-7.5", "description": "No notes for control-id 1.7.5.", "props": [ @@ -20159,7 +20240,7 @@ ] }, { - "uuid": "07f62583-4269-44ac-8fc2-834c272931fa", + "uuid": "7a358384-e8ed-46ba-b113-0ec6b801feb5", "control-id": "cis_rhel10_1-7.6", "description": "No notes for control-id 1.7.6.", "props": [ @@ -20186,7 +20267,7 @@ ] }, { - "uuid": "422d528a-420c-4dd7-b8a7-cf919d90bbf5", + "uuid": "8e73ceb8-2fb4-4f52-a6a2-613729159b43", "control-id": "cis_rhel10_1-8.1", "description": "No notes for control-id 1.8.1.", "props": [ @@ -20208,7 +20289,7 @@ ] }, { - "uuid": "3736f82f-3176-479a-9c92-2573347dd651", + "uuid": "9f1c22e0-d32f-4d0a-87bb-a98be2c3baff", "control-id": "cis_rhel10_1-8.2", "description": "No notes for control-id 1.8.2.", "props": [ @@ -20225,7 +20306,7 @@ ] }, { - "uuid": "407f0e50-4b87-4453-b0fb-739a64ec8336", + "uuid": "c6238610-48dd-42ac-9d30-f386039ffabc", "control-id": "cis_rhel10_1-8.3", "description": "No notes for control-id 1.8.3.", "props": [ @@ -20257,7 +20338,7 @@ ] }, { - "uuid": "cbb440fb-dfca-4c63-b3a7-70f175dfc4b1", + "uuid": "4a7b7189-4282-4fdc-bfdf-4e6036373d56", "control-id": "cis_rhel10_1-8.4", "description": "No notes for control-id 1.8.4.", "props": [ @@ -20279,7 +20360,7 @@ ] }, { - "uuid": "24270689-ebe8-4f75-8638-8cfd4e9d3678", + "uuid": "de261535-5172-44e2-9099-5739f78db65a", "control-id": "cis_rhel10_1-8.5", "description": "No notes for control-id 1.8.5.", "props": [ @@ -20296,7 +20377,7 @@ ] }, { - "uuid": "ad6a1063-4037-4132-94b0-979ce8670e0e", + "uuid": "9247b373-56f9-4626-a083-0706cfe3ee16", "control-id": "cis_rhel10_2-1.1", "description": "No notes for control-id 2.1.1.", "props": [ @@ -20313,7 +20394,7 @@ ] }, { - "uuid": "d7998e5c-ff51-48dd-87fa-cb3122d2f323", + "uuid": "734158db-6915-4277-9cc7-06f67c293e23", "control-id": "cis_rhel10_2-1.2", "description": "No notes for control-id 2.1.2.", "props": [ @@ -20330,7 +20411,7 @@ ] }, { - "uuid": "5444c7c1-5206-498e-8fb5-7928d33bc004", + "uuid": "25cb2fe1-c2fe-4133-a230-fd6a2db0e0c1", "control-id": "cis_rhel10_2-1.4", "description": "No notes for control-id 2.1.4.", "props": [ @@ -20347,7 +20428,7 @@ ] }, { - "uuid": "05da1de4-9023-41e2-8c1d-c97aa5e2f32b", + "uuid": "2bb2b18c-2924-4bbe-84ad-a4b93be6f078", "control-id": "cis_rhel10_2-1.5", "description": "No notes for control-id 2.1.5.", "props": [ @@ -20364,7 +20445,7 @@ ] }, { - "uuid": "c75694ec-69b8-4df2-b1fe-f79263ac8f87", + "uuid": "697a7477-75de-4334-9f17-187addd320f6", "control-id": "cis_rhel10_2-1.6", "description": "No notes for control-id 2.1.6.", "props": [ @@ -20381,7 +20462,7 @@ ] }, { - "uuid": "8508403f-bebf-44d5-af25-e5f8f559fe54", + "uuid": "3ec313c9-a07a-424d-9480-53e01617c9ad", "control-id": "cis_rhel10_2-1.7", "description": "No notes for control-id 2.1.7.", "props": [ @@ -20398,7 +20479,7 @@ ] }, { - "uuid": "bd55ab90-fe1c-4070-9342-e3e3efb9bbe4", + "uuid": "b7b6e986-1aaf-496b-a315-0644d0eaf17d", "control-id": "cis_rhel10_2-1.8", "description": "No notes for control-id 2.1.8.", "props": [ @@ -20420,7 +20501,7 @@ ] }, { - "uuid": "fc39b76b-6ea2-4113-a7c2-a892117990d7", + "uuid": "c04a8b3b-bf7a-468d-bc01-3b347d091e53", "control-id": "cis_rhel10_2-1.9", "description": "Many of the libvirt packages used by Enterprise Linux virtualization are dependent on the\nnfs-utils package.", "props": [ @@ -20437,7 +20518,7 @@ ] }, { - "uuid": "f158e1fc-0d73-4107-81ca-a4bf1e2e77f8", + "uuid": "6ca0da44-c762-494e-a1bc-9d69aaf6f2d7", "control-id": "cis_rhel10_2-1.10", "description": "No notes for control-id 2.1.10.", "props": [ @@ -20454,7 +20535,7 @@ ] }, { - "uuid": "6c46efac-1651-4223-b6ce-036e8e076e72", + "uuid": "6254547f-7c34-4f2d-98e8-359f885a583e", "control-id": "cis_rhel10_2-1.11", "description": "Many of the libvirt packages used by Enterprise Linux virtualization, and the nfs-utils\npackage used for The Network File System (NFS), are dependent on the rpcbind package.", "props": [ @@ -20471,7 +20552,7 @@ ] }, { - "uuid": "d9c62a75-228b-468b-9b5b-69d96472189c", + "uuid": "cc24ffd5-033c-4928-aa11-99a842153439", "control-id": "cis_rhel10_2-1.12", "description": "No notes for control-id 2.1.12.", "props": [ @@ -20488,7 +20569,7 @@ ] }, { - "uuid": "01b92e57-8a5f-4004-82ef-3731d498eed6", + "uuid": "6bfac3d6-7a0c-46e4-bd6b-32b38b945290", "control-id": "cis_rhel10_2-1.13", "description": "No notes for control-id 2.1.13.", "props": [ @@ -20505,7 +20586,7 @@ ] }, { - "uuid": "e2916643-7cd5-4bc6-8ce0-a35b15cc9f8e", + "uuid": "52004caf-b8e3-4e77-b6d5-c551fb2385ae", "control-id": "cis_rhel10_2-1.14", "description": "No notes for control-id 2.1.14.", "props": [ @@ -20522,7 +20603,7 @@ ] }, { - "uuid": "fb77f6ab-e24a-4414-8aa8-b831a9781bfb", + "uuid": "d75ea387-f4cf-48c5-bd53-9837fb3d9fae", "control-id": "cis_rhel10_2-1.15", "description": "No notes for control-id 2.1.15.", "props": [ @@ -20539,7 +20620,7 @@ ] }, { - "uuid": "38557bf0-9df3-4036-8fbe-00e39d138bcd", + "uuid": "3c173687-fb00-4ef5-bbec-87cb39d86667", "control-id": "cis_rhel10_2-1.16", "description": "No notes for control-id 2.1.16.", "props": [ @@ -20556,7 +20637,7 @@ ] }, { - "uuid": "7aada54d-3e90-4b3d-bda7-2b79a50fa6f7", + "uuid": "4c5b1a7a-1d1d-415c-9ab1-05d56cb19a93", "control-id": "cis_rhel10_2-1.17", "description": "No notes for control-id 2.1.17.", "props": [ @@ -20573,7 +20654,7 @@ ] }, { - "uuid": "08b17ddd-7ab1-47b2-a1bd-bb02cb7be946", + "uuid": "3cc6cb59-3b4f-4d49-9831-5749ead97ac9", "control-id": "cis_rhel10_2-1.18", "description": "No notes for control-id 2.1.18.", "props": [ @@ -20595,7 +20676,7 @@ ] }, { - "uuid": "950a1601-87a3-49f9-87e9-32fea4644dcb", + "uuid": "8c81e0aa-d520-4c3a-a5c7-a3edbe853f09", "control-id": "cis_rhel10_2-1.21", "description": "No notes for control-id 2.1.21.", "props": [ @@ -20617,7 +20698,7 @@ ] }, { - "uuid": "3cfd3d2f-a662-4bc2-ab9e-37e2df3a061c", + "uuid": "e10c23f8-7811-4db6-8592-352136b4063f", "control-id": "cis_rhel10_2-1.22", "description": "The description for control-id cis_rhel10_2-1.22.", "props": [ @@ -20630,7 +20711,7 @@ ] }, { - "uuid": "16723f2c-f06e-4dea-8fb7-e7d36b4862cb", + "uuid": "8e22e529-6ee0-45c4-b0df-9ba1eb6809f6", "control-id": "cis_rhel10_2-2.1", "description": "No notes for control-id 2.2.1.", "props": [ @@ -20647,7 +20728,7 @@ ] }, { - "uuid": "a90519e9-8e67-4335-aaae-a9d166287fb2", + "uuid": "fa04e628-c32b-4190-8703-7b17b8aa4870", "control-id": "cis_rhel10_2-2.3", "description": "No notes for control-id 2.2.3.", "props": [ @@ -20664,7 +20745,7 @@ ] }, { - "uuid": "bc13f147-f620-441f-af91-bb227931b4fc", + "uuid": "3e35a286-0375-413c-ac61-3b2ae212e340", "control-id": "cis_rhel10_2-2.4", "description": "No notes for control-id 2.2.4.", "props": [ @@ -20681,7 +20762,7 @@ ] }, { - "uuid": "66d23b68-5ce9-40aa-a660-44b69a557200", + "uuid": "904ffc1d-fbf8-4039-af11-47181244a160", "control-id": "cis_rhel10_2-3.1", "description": "No notes for control-id 2.3.1.", "props": [ @@ -20693,7 +20774,7 @@ ] }, { - "uuid": "f5f00d00-60be-4a2c-b71f-187d48e18226", + "uuid": "8c36be3d-61f1-4590-af5d-25ddd5554cfc", "control-id": "cis_rhel10_2-3.2", "description": "No notes for control-id 2.3.2.", "props": [ @@ -20710,7 +20791,7 @@ ] }, { - "uuid": "32757e16-3f5b-4d12-98fa-b782350b4c51", + "uuid": "56ce8947-1c3d-4b2b-ba86-b130071b73fe", "control-id": "cis_rhel10_2-3.3", "description": "No notes for control-id 2.3.3.", "props": [ @@ -20727,7 +20808,7 @@ ] }, { - "uuid": "f557ccb8-ba47-4cf1-b375-7c00eb281792", + "uuid": "fd47cdc5-b3cf-42e7-9da7-d36e8bbc7425", "control-id": "cis_rhel10_2-4.1.1", "description": "No notes for control-id 2.4.1.1.", "props": [ @@ -20749,7 +20830,7 @@ ] }, { - "uuid": "38e311c6-f35a-49e2-b570-899da22419d9", + "uuid": "c08d4199-05c1-4cf6-9159-9eb96a78aed4", "control-id": "cis_rhel10_2-4.1.2", "description": "No notes for control-id 2.4.1.2.", "props": [ @@ -20776,7 +20857,7 @@ ] }, { - "uuid": "ab454479-f0e5-4e6a-83f4-8a0939d4748b", + "uuid": "a3cb79bf-2f82-48a0-8afe-69c0eeac2b1e", "control-id": "cis_rhel10_2-4.1.3", "description": "No notes for control-id 2.4.1.3.", "props": [ @@ -20803,7 +20884,7 @@ ] }, { - "uuid": "e6e4f43d-61c5-4608-bbdf-6d915e24c4de", + "uuid": "261aefb8-0e26-4d1c-8702-6c76895574bd", "control-id": "cis_rhel10_2-4.1.4", "description": "No notes for control-id 2.4.1.4.", "props": [ @@ -20830,7 +20911,7 @@ ] }, { - "uuid": "dc5a722c-87e5-4801-9ea3-84582cd5ca57", + "uuid": "e7ba8207-d2b8-4f4c-8f9f-0cb3a058d5a8", "control-id": "cis_rhel10_2-4.1.5", "description": "No notes for control-id 2.4.1.5.", "props": [ @@ -20857,7 +20938,7 @@ ] }, { - "uuid": "326b702c-f0c4-4fb1-9c90-6ed0add28951", + "uuid": "f642a569-cf95-407c-9401-eeb2eda9a181", "control-id": "cis_rhel10_2-4.1.6", "description": "No notes for control-id 2.4.1.6.", "props": [ @@ -20884,7 +20965,7 @@ ] }, { - "uuid": "2f028031-7580-41f4-9e01-a1abe203c834", + "uuid": "bcafeebe-1b02-40ef-b22b-52bba78e090c", "control-id": "cis_rhel10_2-4.1.7", "description": "No notes for control-id 2.4.1.7.", "props": [ @@ -20911,7 +20992,7 @@ ] }, { - "uuid": "321015bc-756c-4902-b060-dd7cd031e90f", + "uuid": "29939032-3f88-4503-a340-c6edf93cebaa", "control-id": "cis_rhel10_2-4.1.8", "description": "No notes for control-id 2.4.1.8.", "props": [ @@ -20938,7 +21019,7 @@ ] }, { - "uuid": "3de25d13-c22a-44df-b817-021de2daaeea", + "uuid": "ab9073fd-899e-4234-bd66-36f92efca468", "control-id": "cis_rhel10_2-4.1.9", "description": "No notes for control-id 2.4.1.9.", "props": [ @@ -20975,7 +21056,7 @@ ] }, { - "uuid": "d743b56c-78d7-401a-b75d-470c19960a27", + "uuid": "9fed46e6-2c0a-4c2c-b725-adb13b7c3cce", "control-id": "cis_rhel10_2-4.2.1", "description": "No notes for control-id 2.4.2.1.", "props": [ @@ -21012,7 +21093,7 @@ ] }, { - "uuid": "3840a27e-50c9-4ea5-90c1-3bd29c09bbf6", + "uuid": "7357f678-a14b-47fa-b337-06c4df2b4f91", "control-id": "cis_rhel10_3-1.1", "description": "The description for control-id cis_rhel10_3-1.1.", "props": [ @@ -21025,7 +21106,7 @@ ] }, { - "uuid": "4b5acafd-15af-4a4c-97a9-aaeaf2f4c481", + "uuid": "9e16d14a-d30d-4b5a-8b49-a27d9573671c", "control-id": "cis_rhel10_3-1.2", "description": "No notes for control-id 3.1.2.", "props": [ @@ -21042,7 +21123,7 @@ ] }, { - "uuid": "3f0758e7-1940-420d-ab0b-3e389a5e36be", + "uuid": "8da20200-7680-4000-95bb-78bd445a902b", "control-id": "cis_rhel10_3-1.3", "description": "No notes for control-id 3.1.3.", "props": [ @@ -21059,7 +21140,7 @@ ] }, { - "uuid": "52ad2602-bd04-48ee-be5b-1f5cab281064", + "uuid": "b684a35a-a9ca-4200-9329-01f66f53646e", "control-id": "cis_rhel10_3-2.1", "description": "No notes for control-id 3.2.1.", "props": [ @@ -21076,7 +21157,7 @@ ] }, { - "uuid": "bb576154-8d60-4bcc-9ff6-cc2c08076352", + "uuid": "5f5c4535-7de3-4995-8a15-2a8b660de069", "control-id": "cis_rhel10_3-2.2", "description": "No notes for control-id 3.2.2.", "props": [ @@ -21093,7 +21174,7 @@ ] }, { - "uuid": "e341fac4-9453-445e-ada9-0a8395fc158d", + "uuid": "634838d3-3694-4910-bfc1-82ea74122601", "control-id": "cis_rhel10_3-2.3", "description": "No notes for control-id 3.2.3.", "props": [ @@ -21110,7 +21191,7 @@ ] }, { - "uuid": "d44d0e1a-9739-43fa-951a-6c01423fb394", + "uuid": "1b042272-e542-48dc-8a43-b2ffc64d618c", "control-id": "cis_rhel10_3-2.4", "description": "No notes for control-id 3.2.4.", "props": [ @@ -21127,7 +21208,7 @@ ] }, { - "uuid": "c13ede47-d825-478b-92bd-a461c30b8fd9", + "uuid": "0e908f6a-8280-450d-9b16-cdace719d264", "control-id": "cis_rhel10_3-2.5", "description": "No notes for control-id 3.2.5.", "props": [ @@ -21144,7 +21225,7 @@ ] }, { - "uuid": "b78dda32-d729-491c-ab60-6422d66f1a6f", + "uuid": "17c89185-93cb-4f50-93a6-2e1fdfc3a76c", "control-id": "cis_rhel10_3-2.6", "description": "No notes for control-id 3.2.6.", "props": [ @@ -21161,7 +21242,7 @@ ] }, { - "uuid": "60a6a639-e8fe-425c-9752-9dc82240e250", + "uuid": "a0c32423-7979-4004-b9d9-4f4798c4f041", "control-id": "cis_rhel10_3-3.1.2", "description": "No notes for control-id 3.3.1.2.", "props": [ @@ -21178,7 +21259,7 @@ ] }, { - "uuid": "d4a02dd9-13d2-4451-b94b-1e5d02c4da17", + "uuid": "9571e1cf-1fef-4861-b339-2cb04ff63109", "control-id": "cis_rhel10_3-3.1.3", "description": "No notes for control-id 3.3.1.3.", "props": [ @@ -21195,7 +21276,7 @@ ] }, { - "uuid": "0d49a79d-0d6e-4265-ad91-7b84e18ba050", + "uuid": "f6a5f1d1-c9e4-43ab-8508-8ec595122df2", "control-id": "cis_rhel10_3-3.1.4", "description": "No notes for control-id 3.3.1.4.", "props": [ @@ -21212,7 +21293,7 @@ ] }, { - "uuid": "938ca415-e369-4095-9f88-f02e5f169d50", + "uuid": "5f747cae-7877-4a1a-951c-1ac7615ae45c", "control-id": "cis_rhel10_3-3.1.5", "description": "No notes for control-id 3.3.1.5.", "props": [ @@ -21229,7 +21310,7 @@ ] }, { - "uuid": "7ee1eb55-b99a-4ce7-9c5c-d9f4e35965f3", + "uuid": "aebe0af7-9ee5-4fbf-ae81-01f5862d6071", "control-id": "cis_rhel10_3-3.1.6", "description": "No notes for control-id 3.3.1.6.", "props": [ @@ -21246,7 +21327,7 @@ ] }, { - "uuid": "25ae80f8-8806-4691-819b-aaeedacc1dff", + "uuid": "39296134-4dd5-44fe-82f9-8e4d433c9f0e", "control-id": "cis_rhel10_3-3.1.7", "description": "No notes for control-id 3.3.1.7.", "props": [ @@ -21263,7 +21344,7 @@ ] }, { - "uuid": "ae06ce24-8227-4f5c-b9b3-f751c7fba570", + "uuid": "6b91149d-fa7a-4b17-9ed2-866f63b7df01", "control-id": "cis_rhel10_3-3.1.8", "description": "No notes for control-id 3.3.1.8.", "props": [ @@ -21280,7 +21361,7 @@ ] }, { - "uuid": "b894d12d-be78-4b7b-8daf-92c77bb71a8c", + "uuid": "f300d084-09e2-4134-b183-7b1ce651bbc4", "control-id": "cis_rhel10_3-3.1.9", "description": "No notes for control-id 3.3.1.9.", "props": [ @@ -21297,7 +21378,7 @@ ] }, { - "uuid": "978ac080-4969-4a04-97f6-6696385931f4", + "uuid": "defebabf-fa7e-4ab0-bfd2-cc68faa35e84", "control-id": "cis_rhel10_3-3.1.10", "description": "No notes for control-id 3.3.1.10.", "props": [ @@ -21314,7 +21395,7 @@ ] }, { - "uuid": "bb5f8ad8-6f6b-42a9-a17f-f0e2e21d35d0", + "uuid": "bf13de96-cfd1-421b-a258-43e17dc9f3a6", "control-id": "cis_rhel10_3-3.1.11", "description": "No notes for control-id 3.3.1.11.", "props": [ @@ -21331,7 +21412,7 @@ ] }, { - "uuid": "9941de8a-44e5-4da3-8262-f945e717f430", + "uuid": "c55722f7-b1b5-4629-901d-3f3951d07a77", "control-id": "cis_rhel10_3-3.1.12", "description": "No notes for control-id 3.3.1.12.", "props": [ @@ -21348,7 +21429,7 @@ ] }, { - "uuid": "5f474fd9-d2cb-4c3d-97ab-515255346545", + "uuid": "53b86adb-8f08-4058-97b1-e74b0da8cc7b", "control-id": "cis_rhel10_3-3.1.13", "description": "No notes for control-id 3.3.1.13.", "props": [ @@ -21365,7 +21446,7 @@ ] }, { - "uuid": "819189e1-fafe-42dc-9c64-9c757af15701", + "uuid": "93bdc799-b610-4c92-9bd1-3a3973cbc82f", "control-id": "cis_rhel10_3-3.1.14", "description": "No notes for control-id 3.3.1.14.", "props": [ @@ -21382,7 +21463,7 @@ ] }, { - "uuid": "2ce871d5-597e-43eb-a74f-9523c53fdc9c", + "uuid": "8d0f03e4-ae3b-41df-800f-c3f8061f6927", "control-id": "cis_rhel10_3-3.1.15", "description": "No notes for control-id 3.3.1.15.", "props": [ @@ -21399,7 +21480,7 @@ ] }, { - "uuid": "75466c27-0fe6-4288-a142-3be30cd6d098", + "uuid": "96ebd71b-bff3-4b7f-be12-2e87f36a89a7", "control-id": "cis_rhel10_3-3.1.16", "description": "No notes for control-id 3.3.1.16.", "props": [ @@ -21416,7 +21497,7 @@ ] }, { - "uuid": "84a812c8-4ed8-4b63-a4cc-029241c313a6", + "uuid": "6e730419-d961-41ca-b5c8-767e5f4ced93", "control-id": "cis_rhel10_3-3.1.17", "description": "No notes for control-id 3.3.1.17.", "props": [ @@ -21433,7 +21514,7 @@ ] }, { - "uuid": "58cc8d76-69c6-4e33-bdb5-774e99eee578", + "uuid": "b2bffc7b-0a56-46a5-a881-f4a113b6ab10", "control-id": "cis_rhel10_3-3.1.18", "description": "No notes for control-id 3.3.1.18.", "props": [ @@ -21450,7 +21531,7 @@ ] }, { - "uuid": "f08ee8a3-f92e-403d-a96e-c713a2bbc955", + "uuid": "c26e414d-5581-4db3-a0ad-15a0ed2740b8", "control-id": "cis_rhel10_3-3.2.1", "description": "No notes for control-id 3.3.2.1.", "props": [ @@ -21467,7 +21548,7 @@ ] }, { - "uuid": "07be062f-efad-4f88-b4c9-e23986b37295", + "uuid": "2ac1478b-a7e5-4728-ba59-ede60a11fbb9", "control-id": "cis_rhel10_3-3.2.2", "description": "No notes for control-id 3.3.2.2.", "props": [ @@ -21484,7 +21565,7 @@ ] }, { - "uuid": "ee278a33-4b67-4489-8944-e81c6f8068dd", + "uuid": "33b5e86a-c431-4a77-a087-b08d82113c7a", "control-id": "cis_rhel10_3-3.2.3", "description": "No notes for control-id 3.3.2.3.", "props": [ @@ -21501,7 +21582,7 @@ ] }, { - "uuid": "8a70c816-a6e5-476e-b6ee-8dae3e5d776b", + "uuid": "69bd9a34-9b68-49bd-9bd5-4276020ac4e1", "control-id": "cis_rhel10_3-3.2.4", "description": "No notes for control-id 3.3.2.4.", "props": [ @@ -21518,7 +21599,7 @@ ] }, { - "uuid": "2ea50e50-ebff-4066-97b9-0da2904ba056", + "uuid": "e566e649-53dc-4fcd-8d2f-10c3620985d6", "control-id": "cis_rhel10_3-3.2.5", "description": "No notes for control-id 3.3.2.5.", "props": [ @@ -21535,7 +21616,7 @@ ] }, { - "uuid": "0ace3033-20b9-4f11-9a45-85f19d923702", + "uuid": "4d381a10-527e-4f38-a504-f32fae8bb831", "control-id": "cis_rhel10_3-3.2.6", "description": "No notes for control-id 3.3.2.6.", "props": [ @@ -21552,7 +21633,7 @@ ] }, { - "uuid": "9db82b3a-4522-4002-a552-88856291289f", + "uuid": "5e8ada51-8b38-42b3-899f-acceca20a2cf", "control-id": "cis_rhel10_3-3.2.7", "description": "No notes for control-id 3.3.2.7.", "props": [ @@ -21569,7 +21650,7 @@ ] }, { - "uuid": "6593d7e3-961b-405b-ae07-1bd4a0285b3a", + "uuid": "c308cabe-96fb-4be6-aa8e-c4d0b6569cbf", "control-id": "cis_rhel10_3-3.2.8", "description": "No notes for control-id 3.3.2.8.", "props": [ @@ -21586,7 +21667,7 @@ ] }, { - "uuid": "723d2e11-3838-4108-bc34-1faa35d05ef5", + "uuid": "4f7cec16-e5ae-434b-b897-b4a797afe8e6", "control-id": "cis_rhel10_4-1.1", "description": "No notes for control-id 4.1.1.", "props": [ @@ -21603,7 +21684,7 @@ ] }, { - "uuid": "ece77698-5ed3-4c40-864a-c2c7189aa2b1", + "uuid": "a92db22b-fe7a-4248-b3e0-33a02b81974c", "control-id": "cis_rhel10_4-1.2", "description": "No notes for control-id 4.1.2.", "props": [ @@ -21620,7 +21701,7 @@ ] }, { - "uuid": "15e27f6f-34e5-4efb-b164-fca34e68670a", + "uuid": "8a1939ee-e87f-438a-b597-e84e22bc7ba6", "control-id": "cis_rhel10_4-1.3", "description": "No notes for control-id 4.1.3.", "props": [ @@ -21637,7 +21718,7 @@ ] }, { - "uuid": "5c2d3cfe-cce3-4f89-aecd-2b5045482f29", + "uuid": "fbf4fccf-dfec-4036-80b8-453ff9247297", "control-id": "cis_rhel10_4-1.4", "description": "The description for control-id cis_rhel10_4-1.4.", "props": [ @@ -21650,7 +21731,7 @@ ] }, { - "uuid": "5ccfbe1f-5a79-4b00-8757-e7ec756ec936", + "uuid": "59192f6e-b8d9-4d8f-a604-4306c699f1f4", "control-id": "cis_rhel10_4-1.5", "description": "Firewalld in Red Hat Enterprise Linux 10 accepts loopback traffic by default.", "props": [ @@ -21667,7 +21748,7 @@ ] }, { - "uuid": "089c194c-a9e8-49ab-89d2-e31c09e3d0c9", + "uuid": "62d5f69b-219a-4c4e-8cd1-d1f9ff691739", "control-id": "cis_rhel10_4-1.6", "description": "The description for control-id cis_rhel10_4-1.6.", "props": [ @@ -21680,7 +21761,7 @@ ] }, { - "uuid": "171f273a-9a86-45f7-a682-fd19bbece4b9", + "uuid": "772c1854-6ddf-4b0c-abba-2c85769c747c", "control-id": "cis_rhel10_4-1.7", "description": "The description for control-id cis_rhel10_4-1.7.", "props": [ @@ -21693,7 +21774,7 @@ ] }, { - "uuid": "2cd101c5-2c11-43f9-a7dd-00cf22972d59", + "uuid": "32736dfa-cdb0-4655-a370-b0b5b4b6e071", "control-id": "cis_rhel10_5-1.1", "description": "No notes for control-id 5.1.1.", "props": [ @@ -21750,7 +21831,7 @@ ] }, { - "uuid": "3d8aaad5-79c4-4fc1-bc30-125e82ab5a65", + "uuid": "a90a14ec-5703-44cc-8c90-a4d82aff4c7d", "control-id": "cis_rhel10_5-1.2", "description": "No notes for control-id 5.1.2.", "props": [ @@ -21777,7 +21858,7 @@ ] }, { - "uuid": "86caa51e-8df0-428a-9f8e-7c1d4c5baeef", + "uuid": "767e158b-a856-48a7-a484-87d8ac0010f3", "control-id": "cis_rhel10_5-1.3", "description": "No notes for control-id 5.1.3.", "props": [ @@ -21804,7 +21885,7 @@ ] }, { - "uuid": "6b0725b6-5746-49cf-89ba-55e52de38e9f", + "uuid": "be7859b7-13e0-43c9-b608-2b066365030e", "control-id": "cis_rhel10_5-1.4", "description": "No notes for control-id 5.1.4.", "props": [ @@ -21821,7 +21902,7 @@ ] }, { - "uuid": "7a9609c7-8ce4-4224-97d6-e7a69da2cc9f", + "uuid": "ccce755b-36fd-4724-a359-09d02b10e75b", "control-id": "cis_rhel10_5-1.5", "description": "No notes for control-id 5.1.5.", "props": [ @@ -21838,7 +21919,7 @@ ] }, { - "uuid": "01bab533-2f52-4793-9727-692518f752b0", + "uuid": "b9ffe0c7-a543-4d43-83af-b3847ad09ec1", "control-id": "cis_rhel10_5-1.6", "description": "No notes for control-id 5.1.6.", "props": [ @@ -21855,7 +21936,7 @@ ] }, { - "uuid": "5a8c8c9f-acb6-44fe-985f-b0147b3c9758", + "uuid": "133e88cc-414a-4550-8753-e44165e46791", "control-id": "cis_rhel10_5-1.7", "description": "The requirement gives an example of 45 seconds, but is flexible about the values. It is only\nnecessary to ensure there is a timeout configured in alignment to the site policy.", "props": [ @@ -21877,7 +21958,7 @@ ] }, { - "uuid": "7706ac1b-ae7b-4602-8a4c-d31f9398eef4", + "uuid": "35c2df3e-854e-485a-8693-dd496d4eac61", "control-id": "cis_rhel10_5-1.10", "description": "No notes for control-id 5.1.10.", "props": [ @@ -21894,7 +21975,7 @@ ] }, { - "uuid": "e219b648-fc1f-4ca4-8581-3be144a9f3f7", + "uuid": "1b6ed7ea-b38e-4a3b-a997-52dd38640299", "control-id": "cis_rhel10_5-1.11", "description": "No notes for control-id 5.1.11.", "props": [ @@ -21911,7 +21992,7 @@ ] }, { - "uuid": "def63e86-8eb5-4805-9166-10c2e6981515", + "uuid": "093f1d85-1c18-48a2-bdf0-a50e14fcb93a", "control-id": "cis_rhel10_5-1.12", "description": "The description for control-id cis_rhel10_5-1.12.", "props": [ @@ -21929,7 +22010,7 @@ ] }, { - "uuid": "13affd91-8b64-42e0-819b-07847dde53b9", + "uuid": "e8f00605-3bfc-471b-971d-7db45f109485", "control-id": "cis_rhel10_5-1.13", "description": "No notes for control-id 5.1.13.", "props": [ @@ -21946,7 +22027,7 @@ ] }, { - "uuid": "4818f592-4275-41eb-b71b-35827de13702", + "uuid": "c406429f-2bbf-4010-ad24-0a172d7ce632", "control-id": "cis_rhel10_5-1.14", "description": "The CIS benchmark is not opinionated about which loglevel is selected here. Here, this\nprofile uses VERBOSE by default, as it allows for the capture of login and logout activity\nas well as key fingerprints.", "props": [ @@ -21963,7 +22044,7 @@ ] }, { - "uuid": "0b18bf95-af7b-4559-a610-a0037e9258d2", + "uuid": "e3bb20da-260e-4fa8-96f2-54bd93ab731b", "control-id": "cis_rhel10_5-1.15", "description": "No notes for control-id 5.1.15.", "props": [ @@ -21980,7 +22061,7 @@ ] }, { - "uuid": "b3a1184b-8475-49b5-bdc5-60aff3f768f8", + "uuid": "30a1bbc3-248c-4feb-ae36-15513d2a9e16", "control-id": "cis_rhel10_5-1.16", "description": "No notes for control-id 5.1.16.", "props": [ @@ -21997,7 +22078,7 @@ ] }, { - "uuid": "752d49b4-c470-4a67-b0fa-24290a5240c4", + "uuid": "216d7164-9c67-48bd-aea8-4155775c2a2a", "control-id": "cis_rhel10_5-1.17", "description": "No notes for control-id 5.1.17.", "props": [ @@ -22014,7 +22095,7 @@ ] }, { - "uuid": "988b6ed2-713d-4534-b195-7323dc4a276d", + "uuid": "3e8c6698-db0d-47eb-ba80-0388339a362b", "control-id": "cis_rhel10_5-1.18", "description": "No notes for control-id 5.1.18.", "props": [ @@ -22031,7 +22112,7 @@ ] }, { - "uuid": "3ff2d34f-7fc5-4c04-b79c-bc67c9671bc7", + "uuid": "758b7391-e894-40ec-8c1b-11f1b7967cd8", "control-id": "cis_rhel10_5-1.19", "description": "No notes for control-id 5.1.19.", "props": [ @@ -22048,7 +22129,7 @@ ] }, { - "uuid": "face8a76-2be5-487d-9411-7caa86e1fbb7", + "uuid": "204bfd42-3dd1-4a47-bdba-5e456f579e70", "control-id": "cis_rhel10_5-1.20", "description": "No notes for control-id 5.1.20.", "props": [ @@ -22065,7 +22146,7 @@ ] }, { - "uuid": "6faec40b-6889-4b68-8a70-87848d7d1a4e", + "uuid": "1127904a-22c2-4533-9f24-423684ebad43", "control-id": "cis_rhel10_5-1.21", "description": "No notes for control-id 5.1.21.", "props": [ @@ -22082,7 +22163,7 @@ ] }, { - "uuid": "6042bcbf-fb46-497e-b5f9-092ff3889387", + "uuid": "98ce5bca-702a-4e6f-b633-9d5e94440689", "control-id": "cis_rhel10_5-1.22", "description": "No notes for control-id 5.1.22.", "props": [ @@ -22099,7 +22180,7 @@ ] }, { - "uuid": "58e05c7d-3f2e-4d08-90c7-f9496cb14396", + "uuid": "130f16d1-fbda-438e-a913-fb54fab216d1", "control-id": "cis_rhel10_5-2.1", "description": "No notes for control-id 5.2.1.", "props": [ @@ -22116,7 +22197,7 @@ ] }, { - "uuid": "4602c8ba-84a4-46b9-84d6-876f31a955b2", + "uuid": "1f6adc59-2e82-4e65-8e98-3d36129fdaf4", "control-id": "cis_rhel10_5-2.2", "description": "No notes for control-id 5.2.2.", "props": [ @@ -22133,7 +22214,7 @@ ] }, { - "uuid": "ba96efee-0189-4b5f-b8ad-70c2aa8f0e32", + "uuid": "ab978d0d-a1e9-4e50-91c3-f41b97548e2e", "control-id": "cis_rhel10_5-2.3", "description": "No notes for control-id 5.2.3.", "props": [ @@ -22150,7 +22231,7 @@ ] }, { - "uuid": "f976b5d6-ad83-4a3e-af72-52952714ad24", + "uuid": "7f52dccf-5fb7-4a78-a1d3-ee42ab8e05e3", "control-id": "cis_rhel10_5-2.5", "description": "No notes for control-id 5.2.5.", "props": [ @@ -22167,7 +22248,7 @@ ] }, { - "uuid": "1cd2fa9d-845c-41cb-bd5d-5fbbf4e30e02", + "uuid": "cfa29213-c349-4cc6-a0fb-7c6e337441d4", "control-id": "cis_rhel10_5-2.6", "description": "No notes for control-id 5.2.6.", "props": [ @@ -22184,7 +22265,7 @@ ] }, { - "uuid": "e8c1688a-8443-412c-8c8e-165f2852bc15", + "uuid": "dbfd0a0c-ce86-4fd6-bbf1-ec0dc9366259", "control-id": "cis_rhel10_5-2.7", "description": "Members of \"wheel\" or GID 0 groups are checked by default if the group option is not set for\npam_wheel.so module. The recommendation states the group should be empty to reinforce the\nuse of \"sudo\" for privileged access. Therefore, members of these groups should be manually\nchecked or a different group should be informed.", "props": [ @@ -22206,7 +22287,7 @@ ] }, { - "uuid": "06a89eca-3027-45ff-bbfc-da112d9e514e", + "uuid": "dcca67bd-51f1-4dd8-b3f8-c0272b30b5fb", "control-id": "cis_rhel10_5-3.1.1", "description": "This requirement is hard to be automated without any specific requirement. The policy even\nstates that provided commands are examples, other custom settings might be in place and the\nsettings might be different depending on site policies. The other rules will already make\nsure there is a correct autheselect profile regardless of the existing settings. It is\nnecessary to better discuss with CIS Community.", "props": [ @@ -22218,7 +22299,7 @@ ] }, { - "uuid": "43aed5d0-5bee-4126-ab07-6a312c0af0c0", + "uuid": "67f9daf7-c602-4433-8086-e1513b14f8ae", "control-id": "cis_rhel10_5-3.1.2", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.1.", "props": [ @@ -22240,7 +22321,7 @@ ] }, { - "uuid": "06cda8f1-a7a9-45ac-988d-b535fe1b0771", + "uuid": "e950b251-77d5-4d71-ab8c-7670558293a3", "control-id": "cis_rhel10_5-3.1.3", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.2.", "props": [ @@ -22267,7 +22348,7 @@ ] }, { - "uuid": "de2104c8-d303-4fd3-b9cb-a2fbca5b7892", + "uuid": "20fc657f-9f87-4899-b6d0-05dea6366f33", "control-id": "cis_rhel10_5-3.1.4", "description": "The module is properly enabled by the rules mentioned in related_rules.\nRequirements in 5.3.2.3 use these rules.", "props": [ @@ -22279,7 +22360,7 @@ ] }, { - "uuid": "e6ec4777-5b8b-4340-a429-7f7964349752", + "uuid": "8f1aad66-0903-4a6e-81b2-1150b4ccccdf", "control-id": "cis_rhel10_5-3.1.5", "description": "No notes for control-id 5.3.1.5.", "props": [ @@ -22296,7 +22377,7 @@ ] }, { - "uuid": "a093d86d-fc7d-4662-88cf-c9bbb02d52d8", + "uuid": "2c7d4002-1f66-4d99-a915-095bde46f614", "control-id": "cis_rhel10_5-3.2.1.1", "description": "No notes for control-id 5.3.2.1.1.", "props": [ @@ -22313,7 +22394,7 @@ ] }, { - "uuid": "7a3238bc-41db-492e-8438-fd3190eb351f", + "uuid": "c9c5d14a-d6cb-4990-aece-2d9637ddcc98", "control-id": "cis_rhel10_5-3.2.1.2", "description": "The policy also accepts value 0, which means the locked accounts should be manually unlocked\nby an administrator. However, it also mentions that using value 0 can facilitate a DoS\nattack to legitimate users.", "props": [ @@ -22330,7 +22411,7 @@ ] }, { - "uuid": "8e1284e8-dccb-4ff4-bb28-71a7c015bff5", + "uuid": "78373c7d-af29-4e4d-9062-4420b5a9deeb", "control-id": "cis_rhel10_5-3.2.2.1", "description": "No notes for control-id 5.3.2.2.1.", "props": [ @@ -22347,7 +22428,7 @@ ] }, { - "uuid": "9b6affa7-b52e-4243-bce3-4cbab87841d2", + "uuid": "185b2e87-35cb-49a2-aad4-020d0140c4a5", "control-id": "cis_rhel10_5-3.2.2.2", "description": "No notes for control-id 5.3.2.2.2.", "props": [ @@ -22364,7 +22445,7 @@ ] }, { - "uuid": "86057747-81c1-475b-88c5-39a279e27dbc", + "uuid": "85bfb0fd-dbd8-4703-9382-e1d8d673808a", "control-id": "cis_rhel10_5-3.2.2.3", "description": "This requirement is expected to be manual. However, in previous versions of the policy\nit was already automated the configuration of \"minclass\" option. This posture was kept for\nRHEL 10 in this new version. Rules related to other options are informed in related_rules.\nIn short, minclass=4 alone can achieve the same result achieved by the combination of the\nother 4 options mentioned in the policy.", "props": [ @@ -22381,7 +22462,7 @@ ] }, { - "uuid": "5d6b4af5-8fe0-4cbf-aa15-a65b25c24085", + "uuid": "ed417acf-d033-4886-971e-648bf2fae412", "control-id": "cis_rhel10_5-3.2.2.4", "description": "No notes for control-id 5.3.2.2.4.", "props": [ @@ -22398,7 +22479,7 @@ ] }, { - "uuid": "1ffd1a9a-d678-4a1e-be59-98d32ed389a4", + "uuid": "e6112461-9999-4f0b-b7f4-fb3cc5a34b28", "control-id": "cis_rhel10_5-3.2.2.5", "description": "No notes for control-id 5.3.2.2.5.", "props": [ @@ -22415,7 +22496,7 @@ ] }, { - "uuid": "6a6b4941-68a4-4506-b561-c0226cd64bc3", + "uuid": "e3ac5ac8-a375-406f-a1a6-d576618d8810", "control-id": "cis_rhel10_5-3.2.2.6", "description": "No notes for control-id 5.3.2.2.6.", "props": [ @@ -22432,7 +22513,7 @@ ] }, { - "uuid": "3ae07a13-c69c-4df4-ba02-159d14031f9c", + "uuid": "38733b07-5f0e-40ac-b282-10d0f2638f70", "control-id": "cis_rhel10_5-3.2.2.7", "description": "No notes for control-id 5.3.2.2.7.", "props": [ @@ -22449,7 +22530,7 @@ ] }, { - "uuid": "893eca1a-60cf-4f8e-bd44-fad4d61937b8", + "uuid": "9f1f10e0-e124-46f9-b94f-180400575a50", "control-id": "cis_rhel10_5-3.2.3.1", "description": "Although mentioned in the section 5.3.3.3, there is no explicit requirement to configure\nretry option of pam_pwhistory. If come in the future, the rule accounts_password_pam_retry\ncan be used.", "props": [ @@ -22471,7 +22552,7 @@ ] }, { - "uuid": "71457bc0-5900-4db8-a200-2232607435e5", + "uuid": "83f54c6d-3edf-470d-8971-635fbb14cb6f", "control-id": "cis_rhel10_5-3.2.3.2", "description": "No notes for control-id 5.3.2.3.2.", "props": [ @@ -22488,7 +22569,7 @@ ] }, { - "uuid": "8ed18c54-ef0d-4f3e-a5fb-5ca32c643bf7", + "uuid": "9b26ad3e-5dee-4245-8400-d29a210617b4", "control-id": "cis_rhel10_5-3.2.3.3", "description": "In RHEL 10 pam_pwhistory is enabled via authselect feature, as required in 5.3.1.4. The\nfeature automatically set \"use_authok\" option. In any case, we don't have a rule to check\nthis option specifically.", "props": [ @@ -22505,7 +22586,7 @@ ] }, { - "uuid": "9b0a202c-378c-4541-92e8-dcf56214f60d", + "uuid": "0bfec9cb-33b6-4a08-bee0-8aaf13954102", "control-id": "cis_rhel10_5-3.2.4.1", "description": "The rule more specifically used in this requirement also satify the requirement 5.3.1.5.", "props": [ @@ -22522,7 +22603,7 @@ ] }, { - "uuid": "1403c2b1-5df9-4cdd-b513-cf2e1b0e4029", + "uuid": "bddd1087-441a-4c27-9fb6-fa3132450dd6", "control-id": "cis_rhel10_5-3.2.4.2", "description": "Usage of pam_unix.so module together with \"remember\" option is deprecated and is not\nrecommended by this policy. Instead, it should be used remember option of pam_pwhistory\nmodule, as required in 5.3.2.3.1. See here for more details about pam_unix.so:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1778929", "props": [ @@ -22539,7 +22620,7 @@ ] }, { - "uuid": "f828a8b7-95c5-45c7-9109-773ac26579d6", + "uuid": "32f4b93f-b0d7-4350-ac6f-21ba43b141ce", "control-id": "cis_rhel10_5-3.2.4.3", "description": "Changes in logindefs mentioned in this requirement are more specifically covered by 5.4.1.4", "props": [ @@ -22561,7 +22642,7 @@ ] }, { - "uuid": "84b92051-d9fc-4bc0-9189-7f1f358c621a", + "uuid": "6baf82b9-0af9-4687-855d-33d1b02a05c6", "control-id": "cis_rhel10_5-3.2.4.4", "description": "In RHEL 10 pam_unix is enabled by default in all authselect profiles already with the\nuse_authtok option set. In any case, we don't have a rule to check this option specifically,\nlike in 5.3.2.3.3.", "props": [ @@ -22578,7 +22659,7 @@ ] }, { - "uuid": "c8b3e04e-5f8f-4081-89e3-ca4738ff174e", + "uuid": "b9755166-0a78-495e-9e7f-5466336462c5", "control-id": "cis_rhel10_5-4.1.1", "description": "No notes for control-id 5.4.1.1.", "props": [ @@ -22600,7 +22681,7 @@ ] }, { - "uuid": "2cba34c6-e207-4b25-9d47-85b3f87faee3", + "uuid": "e9751df0-73af-4c72-a093-3c2c9846bf1f", "control-id": "cis_rhel10_5-4.1.3", "description": "No notes for control-id 5.4.1.3.", "props": [ @@ -22622,7 +22703,7 @@ ] }, { - "uuid": "fb615ebe-157a-45d0-a716-a1a06ed5e183", + "uuid": "1cfc4606-3ba7-4fc5-a219-cc09c4afc2db", "control-id": "cis_rhel10_5-4.1.4", "description": "There's a \"new\" set of options in /etc/login.defs file to define the number of iterations\nperformed during the hashing process.", "props": [ @@ -22644,7 +22725,7 @@ ] }, { - "uuid": "a7067396-ce5b-4f3c-accd-093ddc2ac579", + "uuid": "5c064dff-4d39-4cfd-a9a7-65cdb764b03d", "control-id": "cis_rhel10_5-4.1.5", "description": "No notes for control-id 5.4.1.5.", "props": [ @@ -22666,7 +22747,7 @@ ] }, { - "uuid": "ddc4b213-f7fe-4c52-8bc5-414b6c53d03c", + "uuid": "5bfba4c1-4938-4b64-b97a-d0697ae834ed", "control-id": "cis_rhel10_5-4.1.6", "description": "No notes for control-id 5.4.1.6.", "props": [ @@ -22683,7 +22764,7 @@ ] }, { - "uuid": "3dcd0f7a-e7fa-41a6-bc5d-3a8d48d33e7e", + "uuid": "cf0d498e-14c7-484b-9d93-911155057f7e", "control-id": "cis_rhel10_5-4.2.1", "description": "No notes for control-id 5.4.2.1.", "props": [ @@ -22700,7 +22781,7 @@ ] }, { - "uuid": "9ce550db-5b1d-48e7-a84e-117df4c5f4e0", + "uuid": "e1fd25e5-9a2a-46d7-908a-d44fee5d04b4", "control-id": "cis_rhel10_5-4.2.2", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -22717,7 +22798,7 @@ ] }, { - "uuid": "3f017506-6ea6-4ac5-9a13-e1c8d978bbc1", + "uuid": "e6319006-4c60-4fa8-a6a4-d3fcb76dd473", "control-id": "cis_rhel10_5-4.2.3", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -22734,7 +22815,7 @@ ] }, { - "uuid": "bacc715c-82d4-4de8-95f1-47acf6d26717", + "uuid": "f28ccb01-371f-49f6-8a9d-70345da0ccf7", "control-id": "cis_rhel10_5-4.2.4", "description": "No notes for control-id 5.4.2.4.", "props": [ @@ -22751,7 +22832,7 @@ ] }, { - "uuid": "b323d327-a1fc-4539-b773-1f2dab847b14", + "uuid": "172a52d9-0aab-4348-b4ad-07de31c261cf", "control-id": "cis_rhel10_5-4.2.5", "description": "No notes for control-id 5.4.2.5.", "props": [ @@ -22773,7 +22854,7 @@ ] }, { - "uuid": "1bb7daaf-1632-45ed-962e-d3f25254a3a1", + "uuid": "229150c5-9c32-44d0-8b37-7f4805b234c7", "control-id": "cis_rhel10_5-4.2.6", "description": "No notes for control-id 5.4.2.6.", "props": [ @@ -22790,7 +22871,7 @@ ] }, { - "uuid": "cc3cb100-a263-4d66-a943-7c6572d295d8", + "uuid": "3cfaf28e-3ca8-412c-b0c8-35fa1ff906b8", "control-id": "cis_rhel10_5-4.2.7", "description": "No notes for control-id 5.4.2.7.", "props": [ @@ -22812,19 +22893,24 @@ ] }, { - "uuid": "001694d7-7214-4a7a-a0e1-98a5afa068a5", + "uuid": "ea09db1e-c3d5-494c-872c-ca8b6a83415a", "control-id": "cis_rhel10_5-4.2.8", - "description": "New rule is necessary.", + "description": "No notes for control-id 5.4.2.8.", "props": [ { "name": "implementation-status", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "implemented" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "no_invalid_shell_accounts_unlocked" } ] }, { - "uuid": "a7c3070b-7734-42a5-a49c-15a8e5c44a82", + "uuid": "89de46ec-3df9-4fa5-8c27-705d18ad4d9f", "control-id": "cis_rhel10_5-4.3.2", "description": "No notes for control-id 5.4.3.2.", "props": [ @@ -22841,7 +22927,7 @@ ] }, { - "uuid": "6ad5ffac-6105-40a9-ace6-dee8805a2dcd", + "uuid": "d6db00df-35f8-45ec-be31-bb2e0cbadffa", "control-id": "cis_rhel10_5-4.3.3", "description": "No notes for control-id 5.4.3.3.", "props": [ @@ -22868,7 +22954,7 @@ ] }, { - "uuid": "b01cab7b-f44c-469b-b3d6-58dc65f3fc56", + "uuid": "713d4c10-7afb-414a-8b98-138b8428f40f", "control-id": "cis_rhel10_6-1.1", "description": "No notes for control-id 6.1.1.", "props": [ @@ -22890,7 +22976,7 @@ ] }, { - "uuid": "dfcf0db7-515e-4c0f-b93e-abcf43e7f85c", + "uuid": "1d509467-25bb-490d-aa69-e19936eba5c6", "control-id": "cis_rhel10_6-1.2", "description": "No notes for control-id 6.1.2.", "props": [ @@ -22907,7 +22993,7 @@ ] }, { - "uuid": "32230886-c799-49e3-932b-28295a12b17e", + "uuid": "5f9babd8-cc15-4b8d-b87f-ea4182bd2304", "control-id": "cis_rhel10_6-1.3", "description": "No notes for control-id 6.1.3.", "props": [ @@ -22924,7 +23010,7 @@ ] }, { - "uuid": "3a78afa7-cf84-458f-a333-4fc2e8ad21d7", + "uuid": "d7a062b5-9912-4c72-9e32-7abcf2e41c41", "control-id": "cis_rhel10_6-2.1.1", "description": "No notes for control-id 6.2.1.1.", "props": [ @@ -22941,7 +23027,7 @@ ] }, { - "uuid": "3d448220-cebe-41cc-a93b-794de8124b76", + "uuid": "a176fa8c-1b7d-4fa5-816b-1c7a90bfa60e", "control-id": "cis_rhel10_6-2.1.2", "description": "The description for control-id cis_rhel10_6-2.1.2.", "props": [ @@ -22954,7 +23040,7 @@ ] }, { - "uuid": "c877ddca-2a30-44de-aca6-722e7808caa6", + "uuid": "ff1c520d-110c-4071-943f-b21a0bf6ad7d", "control-id": "cis_rhel10_6-2.1.3", "description": "The description for control-id cis_rhel10_6-2.1.3.", "props": [ @@ -22967,20 +23053,24 @@ ] }, { - "uuid": "527a5a5b-d0bb-4250-a632-225f2306c162", + "uuid": "2a10b0ef-53b6-4435-9caf-df64d97e69e1", "control-id": "cis_rhel10_6-2.1.4", - "description": "The description for control-id cis_rhel10_6-2.1.4.", + "description": "No notes for control-id 6.2.1.4.", "props": [ { "name": "implementation-status", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "alternative", - "remarks": "It is necessary to create a new rule to check the status of journald and rsyslog.\nIt would also be necessary a new rule to disable or remove rsyslog." + "value": "implemented" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "ensure_journald_and_rsyslog_not_active_together" } ] }, { - "uuid": "71d11a15-7ce8-4703-88ff-94beef319b2e", + "uuid": "6c1c6119-18a4-40c2-9095-96520796843b", "control-id": "cis_rhel10_6-2.2.1.1", "description": "No notes for control-id 6.2.2.1.1.", "props": [ @@ -22997,7 +23087,7 @@ ] }, { - "uuid": "0b556092-fcc8-41f0-9b61-55fcf03489b9", + "uuid": "11bfad72-b8ad-496e-8ccf-9e9fb3fbe3fc", "control-id": "cis_rhel10_6-2.2.1.2", "description": "The description for control-id cis_rhel10_6-2.2.1.2.", "props": [ @@ -23010,7 +23100,7 @@ ] }, { - "uuid": "7f667fe4-0a21-47f5-b37c-3ac489191396", + "uuid": "010dca8a-a596-4af8-9a0e-815f6005d1a6", "control-id": "cis_rhel10_6-2.2.1.3", "description": "No notes for control-id 6.2.2.1.3.", "props": [ @@ -23027,7 +23117,7 @@ ] }, { - "uuid": "368e248c-0246-47d6-a15c-e21356c8c3b1", + "uuid": "391e7831-a761-4f23-89a4-fec3145a0fca", "control-id": "cis_rhel10_6-2.2.1.4", "description": "No notes for control-id 6.2.2.1.4.", "props": [ @@ -23044,7 +23134,7 @@ ] }, { - "uuid": "4a47f2df-bc91-4d24-bdfa-24e8863b6e8d", + "uuid": "93f1e4d2-b005-4a29-8dfa-0e40b95621ca", "control-id": "cis_rhel10_6-2.2.2", "description": "No notes for control-id 6.2.2.2.", "props": [ @@ -23061,7 +23151,7 @@ ] }, { - "uuid": "75f4921b-9df9-46a1-9ced-aff1994f4433", + "uuid": "21109158-dca8-4c66-b083-1170b806b61d", "control-id": "cis_rhel10_6-2.2.3", "description": "No notes for control-id 6.2.2.3.", "props": [ @@ -23078,7 +23168,7 @@ ] }, { - "uuid": "ae737e6c-f98b-43d0-83ad-eda883a58e24", + "uuid": "a7e99c63-ce8d-4005-8ae6-87457f1e4747", "control-id": "cis_rhel10_6-2.2.4", "description": "No notes for control-id 6.2.2.4.", "props": [ @@ -23095,7 +23185,7 @@ ] }, { - "uuid": "620180c7-063c-4b8a-adec-98b8259a98c9", + "uuid": "5ac353f6-1adc-480b-80cf-82a00bd651f7", "control-id": "cis_rhel10_6-2.3.1", "description": "No notes for control-id 6.2.3.1.", "props": [ @@ -23107,7 +23197,7 @@ ] }, { - "uuid": "c56736e2-6d0b-4ef6-8d8e-515b8fe1d079", + "uuid": "8c9489c9-8ba2-4d64-9fd2-0ecad8a825ee", "control-id": "cis_rhel10_6-2.3.2", "description": "No notes for control-id 6.2.3.2.", "props": [ @@ -23119,7 +23209,7 @@ ] }, { - "uuid": "c0bea0ee-26d3-47a6-b55c-6751a3be3cb2", + "uuid": "08560bb7-86ee-45db-83f6-389ed5fbc8b3", "control-id": "cis_rhel10_6-2.3.3", "description": "No notes for control-id 6.2.3.3.", "props": [ @@ -23131,7 +23221,7 @@ ] }, { - "uuid": "9df2280a-aa0d-4b1c-b07b-3073acee14a7", + "uuid": "74ef5717-68a2-4883-b185-b2166a93fe1f", "control-id": "cis_rhel10_6-2.3.4", "description": "No notes for control-id 6.2.3.4.", "props": [ @@ -23143,7 +23233,7 @@ ] }, { - "uuid": "497dcd11-d678-4906-906f-e8445af0ef10", + "uuid": "bfa02308-fe75-42e9-82a0-8f0d09379bdc", "control-id": "cis_rhel10_6-2.3.5", "description": "The description for control-id cis_rhel10_6-2.3.5.", "props": [ @@ -23156,7 +23246,7 @@ ] }, { - "uuid": "ca46c5de-701e-4ada-a9a0-65013487b978", + "uuid": "66b9a42c-69dc-492b-baa8-a90a6f1d9486", "control-id": "cis_rhel10_6-2.3.6", "description": "The description for control-id cis_rhel10_6-2.3.6.", "props": [ @@ -23169,7 +23259,7 @@ ] }, { - "uuid": "1b372047-121d-4656-940e-8a3a8e8ae843", + "uuid": "78ebf3ba-87fe-4478-b3f3-3a48357d79e4", "control-id": "cis_rhel10_6-2.3.7", "description": "No notes for control-id 6.2.3.7.", "props": [ @@ -23181,7 +23271,7 @@ ] }, { - "uuid": "15234f9d-e313-4300-b611-32336b478ef5", + "uuid": "ff6e9e67-56d4-4a42-95c6-9283604ed0c7", "control-id": "cis_rhel10_6-2.3.8", "description": "The description for control-id cis_rhel10_6-2.3.8.", "props": [ @@ -23194,7 +23284,7 @@ ] }, { - "uuid": "a67eba2c-732a-4d6b-8180-0c936854c09e", + "uuid": "44676f57-c3a2-46ed-b5e8-cfc6cb2de379", "control-id": "cis_rhel10_6-2.4.1", "description": "It is not harmful to run these rules even if rsyslog is not installed or active.", "props": [ @@ -23221,7 +23311,7 @@ ] }, { - "uuid": "b3b67f6a-5653-4bdb-9548-ebfd1cd75114", + "uuid": "af6f2795-85bc-433a-9bf4-d42fbeb86689", "control-id": "cis_rhel10_7-1.1", "description": "No notes for control-id 7.1.1.", "props": [ @@ -23248,7 +23338,7 @@ ] }, { - "uuid": "a9d5ea18-1b9c-4264-b8da-a36719b78958", + "uuid": "7e917560-b77a-4c44-9ea3-ee6c42c0518a", "control-id": "cis_rhel10_7-1.2", "description": "No notes for control-id 7.1.2.", "props": [ @@ -23275,7 +23365,7 @@ ] }, { - "uuid": "e4ef02fc-9135-4bd7-88a5-6d98ec049d43", + "uuid": "a3efe93a-df07-4ca7-a171-49e027fb1026", "control-id": "cis_rhel10_7-1.3", "description": "No notes for control-id 7.1.3.", "props": [ @@ -23302,7 +23392,7 @@ ] }, { - "uuid": "1d4f7ecc-1b88-46cf-b3de-d214d56bfbb9", + "uuid": "d8767842-af11-47fb-9459-4d9c69c970f4", "control-id": "cis_rhel10_7-1.4", "description": "No notes for control-id 7.1.4.", "props": [ @@ -23329,7 +23419,7 @@ ] }, { - "uuid": "d376e5c4-4938-42ca-9a85-b84df7050f00", + "uuid": "a4692d18-abae-4e2b-ac93-0b4a212cb1f9", "control-id": "cis_rhel10_7-1.5", "description": "No notes for control-id 7.1.5.", "props": [ @@ -23356,7 +23446,7 @@ ] }, { - "uuid": "0b42e0b7-f50e-40c3-810a-144ed6b7bd8e", + "uuid": "30f5c8ff-61a6-4078-8cdb-569caf14da80", "control-id": "cis_rhel10_7-1.6", "description": "No notes for control-id 7.1.6.", "props": [ @@ -23383,7 +23473,7 @@ ] }, { - "uuid": "0ba433e5-c6d0-46df-aadf-b51e5df754c8", + "uuid": "ba046808-18be-48a3-bcde-d5f91618b364", "control-id": "cis_rhel10_7-1.7", "description": "No notes for control-id 7.1.7.", "props": [ @@ -23410,7 +23500,7 @@ ] }, { - "uuid": "b9f1f96b-acd8-4158-9430-250411afedac", + "uuid": "eed69d0d-6c69-432d-9d23-de51bc934fdf", "control-id": "cis_rhel10_7-1.8", "description": "No notes for control-id 7.1.8.", "props": [ @@ -23437,7 +23527,7 @@ ] }, { - "uuid": "2c8669a6-15e4-4660-a29a-d5dbd85ceb97", + "uuid": "f8b64401-7a2e-4961-b5dd-a0b828b29b90", "control-id": "cis_rhel10_7-1.9", "description": "No notes for control-id 7.1.9.", "props": [ @@ -23464,7 +23554,7 @@ ] }, { - "uuid": "4ca67396-1f1e-489b-856c-9f1ef8d575bc", + "uuid": "77300d1d-d60f-48f5-824f-66300d1af112", "control-id": "cis_rhel10_7-1.10", "description": "No notes for control-id 7.1.10.", "props": [ @@ -23506,7 +23596,7 @@ ] }, { - "uuid": "f86b5f58-2de7-43f1-8eee-0a52a0296a89", + "uuid": "b02c8a97-60ef-4219-bbb3-96791101a9b1", "control-id": "cis_rhel10_7-1.11", "description": "No notes for control-id 7.1.11.", "props": [ @@ -23528,7 +23618,7 @@ ] }, { - "uuid": "97a1d846-7ae1-4586-aa01-ec1c7cd01b39", + "uuid": "821d3d8c-a91b-4ef9-9afb-ef32991e3d93", "control-id": "cis_rhel10_7-1.12", "description": "No notes for control-id 7.1.12.", "props": [ @@ -23550,7 +23640,7 @@ ] }, { - "uuid": "2f509f30-d88c-429b-a91f-0517b0e60175", + "uuid": "3fddb3e7-6609-4a64-9329-cb1a92b32b5f", "control-id": "cis_rhel10_7-1.13", "description": "The description for control-id cis_rhel10_7-1.13.", "props": [ @@ -23563,7 +23653,7 @@ ] }, { - "uuid": "b099a0f3-64c1-4b8c-a421-89db28bf8038", + "uuid": "77fc315a-a843-43ea-85d9-b5b5526f8878", "control-id": "cis_rhel10_7-2.1", "description": "No notes for control-id 7.2.1.", "props": [ @@ -23580,7 +23670,7 @@ ] }, { - "uuid": "76f40cf6-b462-403f-8b6d-e7d6a565424c", + "uuid": "c8d4854b-4f22-4fdc-85fa-f625495aa7da", "control-id": "cis_rhel10_7-2.2", "description": "No notes for control-id 7.2.2.", "props": [ @@ -23597,7 +23687,7 @@ ] }, { - "uuid": "55379db7-e74e-422b-ae42-2bce3f15ea60", + "uuid": "ef697c6a-8834-4190-8546-444c4eaef083", "control-id": "cis_rhel10_7-2.3", "description": "No notes for control-id 7.2.3.", "props": [ @@ -23614,7 +23704,7 @@ ] }, { - "uuid": "0be76c73-0901-457f-ad0d-a9ee6362deac", + "uuid": "b1d529b9-109c-48aa-bb8f-f422ae9d7201", "control-id": "cis_rhel10_7-2.4", "description": "No notes for control-id 7.2.4.", "props": [ @@ -23631,7 +23721,7 @@ ] }, { - "uuid": "af74f374-5be3-4e43-9885-4cd4b712b150", + "uuid": "ca5a215b-2020-4507-8bf2-d61862673f6d", "control-id": "cis_rhel10_7-2.5", "description": "No notes for control-id 7.2.5.", "props": [ @@ -23648,7 +23738,7 @@ ] }, { - "uuid": "1ece051b-6dfb-46ff-99e3-f0ae042c02ad", + "uuid": "d5167ca7-69d3-4e3d-b2b0-80b4194388ce", "control-id": "cis_rhel10_7-2.6", "description": "No notes for control-id 7.2.6.", "props": [ @@ -23665,7 +23755,7 @@ ] }, { - "uuid": "8c626dc0-eaa1-4fd4-ab62-2071ac2553e5", + "uuid": "e71af825-d8f3-4458-9a8a-a22016230fec", "control-id": "cis_rhel10_7-2.7", "description": "No notes for control-id 7.2.7.", "props": [ @@ -23682,7 +23772,7 @@ ] }, { - "uuid": "0f0c6c6d-aaea-4f1f-ad77-77dc9e7a014a", + "uuid": "1f53c0bc-9100-453b-8ed9-cbf663f855f6", "control-id": "cis_rhel10_7-2.8", "description": "No notes for control-id 7.2.8.", "props": [ @@ -23709,7 +23799,7 @@ ] }, { - "uuid": "a110e0a7-6d77-419a-8aee-a30ad411aa0c", + "uuid": "d9245cfa-598c-4180-9556-1967b0352c7d", "control-id": "cis_rhel10_7-2.9", "description": "No notes for control-id 7.2.9.", "props": [ diff --git a/component-definitions/rhel10/rhel10-cis_rhel10-l1_workstation/component-definition.json b/component-definitions/rhel10/rhel10-cis_rhel10-l1_workstation/component-definition.json index 4b462a80..8bb4fbc4 100644 --- a/component-definitions/rhel10/rhel10-cis_rhel10-l1_workstation/component-definition.json +++ b/component-definitions/rhel10/rhel10-cis_rhel10-l1_workstation/component-definition.json @@ -3,8 +3,8 @@ "uuid": "f215e0d6-22bf-45fa-955c-4bc760e0ee55", "metadata": { "title": "Component definition for rhel10", - "last-modified": "2025-12-11T18:26:20.485703+00:00", - "version": "3.2", + "last-modified": "2025-12-15T16:32:32.837323+00:00", + "version": "3.3", "oscal-version": "1.1.3" }, "components": [ @@ -3971,883 +3971,907 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_tmout", + "value": "no_invalid_shell_accounts_unlocked", "remarks": "rule_set_244" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Interactive Session Timeout", + "value": "Verify Non-Interactive Accounts Are Locked", "remarks": "rule_set_244" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_bashrc", + "value": "accounts_tmout", "remarks": "rule_set_245" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Bash Umask is Set Correctly", + "value": "Set Interactive Session Timeout", "remarks": "rule_set_245" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_login_defs", + "value": "accounts_umask_etc_bashrc", "remarks": "rule_set_246" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Umask is Set Correctly in login.defs", + "value": "Ensure the Default Bash Umask is Set Correctly", "remarks": "rule_set_246" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_profile", + "value": "accounts_umask_etc_login_defs", "remarks": "rule_set_247" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Umask is Set Correctly in /etc/profile", + "value": "Ensure the Default Umask is Set Correctly in login.defs", "remarks": "rule_set_247" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_aide_installed", + "value": "accounts_umask_etc_profile", "remarks": "rule_set_248" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install AIDE", + "value": "Ensure the Default Umask is Set Correctly in /etc/profile", "remarks": "rule_set_248" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_build_database", + "value": "package_aide_installed", "remarks": "rule_set_249" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Build and Test AIDE Database", + "value": "Install AIDE", "remarks": "rule_set_249" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_periodic_cron_checking", + "value": "aide_build_database", "remarks": "rule_set_250" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Periodic Execution of AIDE", + "value": "Build and Test AIDE Database", "remarks": "rule_set_250" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_check_audit_tools", + "value": "aide_periodic_cron_checking", "remarks": "rule_set_251" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure AIDE to Verify the Audit Tools", + "value": "Configure Periodic Execution of AIDE", "remarks": "rule_set_251" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_systemd-journald_enabled", + "value": "aide_check_audit_tools", "remarks": "rule_set_252" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable systemd-journald Service", + "value": "Configure AIDE to Verify the Audit Tools", "remarks": "rule_set_252" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_systemd-journal-remote_installed", + "value": "service_systemd-journald_enabled", "remarks": "rule_set_253" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install systemd-journal-remote Package", + "value": "Enable systemd-journald Service", "remarks": "rule_set_253" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_systemd-journal-upload_enabled", + "value": "ensure_journald_and_rsyslog_not_active_together", "remarks": "rule_set_254" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable systemd-journal-upload Service", + "value": "Ensure journald and rsyslog Are Not Active Together", "remarks": "rule_set_254" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "socket_systemd-journal-remote_disabled", + "value": "package_systemd-journal-remote_installed", "remarks": "rule_set_255" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable systemd-journal-remote Socket", + "value": "Install systemd-journal-remote Package", "remarks": "rule_set_255" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_disable_forward_to_syslog", + "value": "service_systemd-journal-upload_enabled", "remarks": "rule_set_256" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald ForwardToSyslog is disabled", + "value": "Enable systemd-journal-upload Service", "remarks": "rule_set_256" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_compress", + "value": "socket_systemd-journal-remote_disabled", "remarks": "rule_set_257" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald is configured to compress large log files", + "value": "Disable systemd-journal-remote Socket", "remarks": "rule_set_257" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_storage", + "value": "journald_disable_forward_to_syslog", "remarks": "rule_set_258" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald is configured to write log files to persistent disk", + "value": "Ensure journald ForwardToSyslog is disabled", "remarks": "rule_set_258" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_groupownership", + "value": "journald_compress", "remarks": "rule_set_259" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Log Files Are Owned By Appropriate Group", + "value": "Ensure journald is configured to compress large log files", "remarks": "rule_set_259" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_ownership", + "value": "journald_storage", "remarks": "rule_set_260" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Log Files Are Owned By Appropriate User", + "value": "Ensure journald is configured to write log files to persistent disk", "remarks": "rule_set_260" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_permissions", + "value": "rsyslog_files_groupownership", "remarks": "rule_set_261" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure System Log Files Have Correct Permissions", + "value": "Ensure Log Files Are Owned By Appropriate Group", "remarks": "rule_set_261" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_passwd", + "value": "rsyslog_files_ownership", "remarks": "rule_set_262" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns passwd File", + "value": "Ensure Log Files Are Owned By Appropriate User", "remarks": "rule_set_262" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_passwd", + "value": "rsyslog_files_permissions", "remarks": "rule_set_263" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns passwd File", + "value": "Ensure System Log Files Have Correct Permissions", "remarks": "rule_set_263" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_passwd", + "value": "file_groupowner_etc_passwd", "remarks": "rule_set_264" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on passwd File", + "value": "Verify Group Who Owns passwd File", "remarks": "rule_set_264" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_passwd", + "value": "file_owner_etc_passwd", "remarks": "rule_set_265" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup passwd File", + "value": "Verify User Who Owns passwd File", "remarks": "rule_set_265" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_passwd", + "value": "file_permissions_etc_passwd", "remarks": "rule_set_266" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup passwd File", + "value": "Verify Permissions on passwd File", "remarks": "rule_set_266" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_passwd", + "value": "file_groupowner_backup_etc_passwd", "remarks": "rule_set_267" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup passwd File", + "value": "Verify Group Who Owns Backup passwd File", "remarks": "rule_set_267" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_group", + "value": "file_owner_backup_etc_passwd", "remarks": "rule_set_268" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns group File", + "value": "Verify User Who Owns Backup passwd File", "remarks": "rule_set_268" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_group", + "value": "file_permissions_backup_etc_passwd", "remarks": "rule_set_269" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns group File", + "value": "Verify Permissions on Backup passwd File", "remarks": "rule_set_269" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_group", + "value": "file_groupowner_etc_group", "remarks": "rule_set_270" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on group File", + "value": "Verify Group Who Owns group File", "remarks": "rule_set_270" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_group", + "value": "file_owner_etc_group", "remarks": "rule_set_271" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup group File", + "value": "Verify User Who Owns group File", "remarks": "rule_set_271" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_group", + "value": "file_permissions_etc_group", "remarks": "rule_set_272" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup group File", + "value": "Verify Permissions on group File", "remarks": "rule_set_272" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_group", + "value": "file_groupowner_backup_etc_group", "remarks": "rule_set_273" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup group File", + "value": "Verify Group Who Owns Backup group File", "remarks": "rule_set_273" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_shadow", + "value": "file_owner_backup_etc_group", "remarks": "rule_set_274" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns shadow File", + "value": "Verify User Who Owns Backup group File", "remarks": "rule_set_274" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_shadow", + "value": "file_permissions_backup_etc_group", "remarks": "rule_set_275" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns shadow File", + "value": "Verify Permissions on Backup group File", "remarks": "rule_set_275" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_shadow", + "value": "file_owner_etc_shadow", "remarks": "rule_set_276" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on shadow File", + "value": "Verify User Who Owns shadow File", "remarks": "rule_set_276" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_shadow", + "value": "file_groupowner_etc_shadow", "remarks": "rule_set_277" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup shadow File", + "value": "Verify Group Who Owns shadow File", "remarks": "rule_set_277" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_shadow", + "value": "file_permissions_etc_shadow", "remarks": "rule_set_278" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup shadow File", + "value": "Verify Permissions on shadow File", "remarks": "rule_set_278" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_shadow", + "value": "file_groupowner_backup_etc_shadow", "remarks": "rule_set_279" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup shadow File", + "value": "Verify User Who Owns Backup shadow File", "remarks": "rule_set_279" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_gshadow", + "value": "file_owner_backup_etc_shadow", "remarks": "rule_set_280" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns gshadow File", + "value": "Verify Group Who Owns Backup shadow File", "remarks": "rule_set_280" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_gshadow", + "value": "file_permissions_backup_etc_shadow", "remarks": "rule_set_281" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns gshadow File", + "value": "Verify Permissions on Backup shadow File", "remarks": "rule_set_281" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_gshadow", + "value": "file_groupowner_etc_gshadow", "remarks": "rule_set_282" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on gshadow File", + "value": "Verify Group Who Owns gshadow File", "remarks": "rule_set_282" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_gshadow", + "value": "file_owner_etc_gshadow", "remarks": "rule_set_283" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup gshadow File", + "value": "Verify User Who Owns gshadow File", "remarks": "rule_set_283" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_gshadow", + "value": "file_permissions_etc_gshadow", "remarks": "rule_set_284" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup gshadow File", + "value": "Verify Permissions on gshadow File", "remarks": "rule_set_284" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_gshadow", + "value": "file_groupowner_backup_etc_gshadow", "remarks": "rule_set_285" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup gshadow File", + "value": "Verify Group Who Owns Backup gshadow File", "remarks": "rule_set_285" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_shells", + "value": "file_owner_backup_etc_gshadow", "remarks": "rule_set_286" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns /etc/shells File", + "value": "Verify User Who Owns Backup gshadow File", "remarks": "rule_set_286" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_shells", + "value": "file_permissions_backup_etc_gshadow", "remarks": "rule_set_287" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Who Owns /etc/shells File", + "value": "Verify Permissions on Backup gshadow File", "remarks": "rule_set_287" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_shells", + "value": "file_groupowner_etc_shells", "remarks": "rule_set_288" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on /etc/shells File", + "value": "Verify Group Who Owns /etc/shells File", "remarks": "rule_set_288" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_security_opasswd", + "value": "file_owner_etc_shells", "remarks": "rule_set_289" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns /etc/security/opasswd File", + "value": "Verify Who Owns /etc/shells File", "remarks": "rule_set_289" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_security_opasswd", + "value": "file_permissions_etc_shells", "remarks": "rule_set_290" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns /etc/security/opasswd File", + "value": "Verify Permissions on /etc/shells File", "remarks": "rule_set_290" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_security_opasswd", + "value": "file_groupowner_etc_security_opasswd", "remarks": "rule_set_291" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on /etc/security/opasswd File", + "value": "Verify Group Who Owns /etc/security/opasswd File", "remarks": "rule_set_291" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_security_opasswd_old", + "value": "file_owner_etc_security_opasswd", "remarks": "rule_set_292" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns /etc/security/opasswd.old File", + "value": "Verify User Who Owns /etc/security/opasswd File", "remarks": "rule_set_292" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_security_opasswd_old", + "value": "file_permissions_etc_security_opasswd", "remarks": "rule_set_293" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns /etc/security/opasswd.old File", + "value": "Verify Permissions on /etc/security/opasswd File", "remarks": "rule_set_293" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_security_opasswd_old", + "value": "file_groupowner_etc_security_opasswd_old", "remarks": "rule_set_294" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on /etc/security/opasswd.old File", + "value": "Verify Group Who Owns /etc/security/opasswd.old File", "remarks": "rule_set_294" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_unauthorized_world_writable", + "value": "file_owner_etc_security_opasswd_old", "remarks": "rule_set_295" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure No World-Writable Files Exist", + "value": "Verify User Who Owns /etc/security/opasswd.old File", "remarks": "rule_set_295" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dir_perms_world_writable_sticky_bits", + "value": "file_permissions_etc_security_opasswd_old", "remarks": "rule_set_296" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify that All World-Writable Directories Have Sticky Bits Set", + "value": "Verify Permissions on /etc/security/opasswd.old File", "remarks": "rule_set_296" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_files_or_dirs_unowned_by_user", + "value": "file_permissions_unauthorized_world_writable", "remarks": "rule_set_297" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All Files And Directories Are Owned by a User", + "value": "Ensure No World-Writable Files Exist", "remarks": "rule_set_297" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_files_or_dirs_ungroupowned", + "value": "dir_perms_world_writable_sticky_bits", "remarks": "rule_set_298" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All Files And Directories Are Owned by a Group", + "value": "Verify that All World-Writable Directories Have Sticky Bits Set", "remarks": "rule_set_298" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_all_shadowed", + "value": "no_files_or_dirs_unowned_by_user", "remarks": "rule_set_299" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify All Account Password Hashes are Shadowed", + "value": "Ensure All Files And Directories Are Owned by a User", "remarks": "rule_set_299" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_empty_passwords_etc_shadow", + "value": "no_files_or_dirs_ungroupowned", "remarks": "rule_set_300" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure There Are No Accounts With Blank or Null Passwords", + "value": "Ensure All Files And Directories Are Owned by a Group", "remarks": "rule_set_300" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "gid_passwd_group_same", + "value": "accounts_password_all_shadowed", "remarks": "rule_set_301" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", + "value": "Verify All Account Password Hashes are Shadowed", "remarks": "rule_set_301" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "account_unique_id", + "value": "no_empty_passwords_etc_shadow", "remarks": "rule_set_302" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All Accounts on the System Have Unique User IDs", + "value": "Ensure There Are No Accounts With Blank or Null Passwords", "remarks": "rule_set_302" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "group_unique_id", + "value": "gid_passwd_group_same", "remarks": "rule_set_303" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All Groups on the System Have Unique Group ID", + "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", "remarks": "rule_set_303" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "account_unique_name", + "value": "account_unique_id", "remarks": "rule_set_304" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All Accounts on the System Have Unique Names", + "value": "Ensure All Accounts on the System Have Unique User IDs", "remarks": "rule_set_304" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "group_unique_name", + "value": "group_unique_id", "remarks": "rule_set_305" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All Groups on the System Have Unique Group Names", + "value": "Ensure All Groups on the System Have Unique Group ID", "remarks": "rule_set_305" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_user_interactive_home_directory_exists", + "value": "account_unique_name", "remarks": "rule_set_306" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All Interactive Users Home Directories Must Exist", + "value": "Ensure All Accounts on the System Have Unique Names", "remarks": "rule_set_306" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_ownership_home_directories", + "value": "group_unique_name", "remarks": "rule_set_307" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All Interactive User Home Directories Must Be Owned By The Primary User", + "value": "Ensure All Groups on the System Have Unique Group Names", "remarks": "rule_set_307" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_home_directories", + "value": "accounts_user_interactive_home_directory_exists", "remarks": "rule_set_308" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", + "value": "All Interactive Users Home Directories Must Exist", "remarks": "rule_set_308" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_user_dot_group_ownership", + "value": "file_ownership_home_directories", "remarks": "rule_set_309" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "User Initialization Files Must Be Group-Owned By The Primary Group", + "value": "All Interactive User Home Directories Must Be Owned By The Primary User", "remarks": "rule_set_309" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_user_dot_user_ownership", + "value": "file_permissions_home_directories", "remarks": "rule_set_310" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "User Initialization Files Must Be Owned By the Primary User", + "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", "remarks": "rule_set_310" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_user_dot_no_world_writable_programs", + "value": "accounts_user_dot_group_ownership", "remarks": "rule_set_311" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "User Initialization Files Must Not Run World-Writable Programs", + "value": "User Initialization Files Must Be Group-Owned By The Primary Group", "remarks": "rule_set_311" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permission_user_init_files", + "value": "accounts_user_dot_user_ownership", "remarks": "rule_set_312" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", + "value": "User Initialization Files Must Be Owned By the Primary User", "remarks": "rule_set_312" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_forward_files", + "value": "accounts_user_dot_no_world_writable_programs", "remarks": "rule_set_313" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify No .forward Files Exist", + "value": "User Initialization Files Must Not Run World-Writable Programs", "remarks": "rule_set_313" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_netrc_files", + "value": "file_permission_user_init_files", "remarks": "rule_set_314" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify No netrc Files Exist", + "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", "remarks": "rule_set_314" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_rhost_files", + "value": "no_forward_files", "remarks": "rule_set_315" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify No .rhost Files Exist", + "value": "Verify No .forward Files Exist", "remarks": "rule_set_315" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permission_user_bash_history", + "value": "no_netrc_files", "remarks": "rule_set_316" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure User Bash History File Has Correct Permissions", + "value": "Verify No netrc Files Exist", "remarks": "rule_set_316" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "no_rhost_files", + "remarks": "rule_set_317" + }, + { + "name": "Rule_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Verify No .rhost Files Exist", + "remarks": "rule_set_317" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "file_permission_user_bash_history", + "remarks": "rule_set_318" + }, + { + "name": "Rule_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Ensure User Bash History File Has Correct Permissions", + "remarks": "rule_set_318" } ], "control-implementations": [ { - "uuid": "42949130-a6b1-41d4-856a-e53a76c7971b", + "uuid": "8a73e529-8e5f-4a3e-9c35-1d17d5f9d5c4", "source": "trestle://profiles/rhel10-cis_rhel10-l1_workstation/profile.json", "description": "Control implementation for cis_workstation_l1", "props": [ @@ -5203,7 +5227,7 @@ ], "implemented-requirements": [ { - "uuid": "e7876106-cdb6-471c-9cef-b49911160ef8", + "uuid": "d581c60c-8dd4-4935-afe6-f7893d38e7f1", "control-id": "reload_dconf_db", "description": "This is a helper rule to reload Dconf database correctly.", "props": [ @@ -5220,7 +5244,7 @@ ] }, { - "uuid": "4cae9646-5c83-468d-a4a2-59ea7f9e170f", + "uuid": "90638108-e22d-4323-b363-3391b8556dde", "control-id": "cis_rhel10_1-1.1.1", "description": "No notes for control-id 1.1.1.1.", "props": [ @@ -5237,7 +5261,7 @@ ] }, { - "uuid": "87613717-27a0-4bdd-95e6-53fd0d39cad2", + "uuid": "78cc5eca-6fb6-4b31-98bd-c13192a2c16e", "control-id": "cis_rhel10_1-1.1.2", "description": "No notes for control-id 1.1.1.2.", "props": [ @@ -5254,7 +5278,7 @@ ] }, { - "uuid": "6b32f075-670a-4131-8b7e-ddfe2e699661", + "uuid": "7531136d-0afd-40ba-acc4-a8900d069768", "control-id": "cis_rhel10_1-1.1.3", "description": "No notes for control-id 1.1.1.3.", "props": [ @@ -5271,7 +5295,7 @@ ] }, { - "uuid": "ee565c6f-d678-4100-a686-1b9183bf7449", + "uuid": "cdf240af-2b89-4606-a44f-b1a71bda4dd0", "control-id": "cis_rhel10_1-1.1.4", "description": "No notes for control-id 1.1.1.4.", "props": [ @@ -5288,7 +5312,7 @@ ] }, { - "uuid": "edfaef65-2990-48e5-8cba-e7f94be6a078", + "uuid": "406780c0-6977-457b-a93e-cffeed0b6df6", "control-id": "cis_rhel10_1-1.1.5", "description": "No notes for control-id 1.1.1.5.", "props": [ @@ -5305,7 +5329,7 @@ ] }, { - "uuid": "7cf77426-b0e7-4378-ad1b-541d59254b50", + "uuid": "693c6e6d-c4ea-4c91-bf74-faedcf14f3ee", "control-id": "cis_rhel10_1-1.1.11", "description": "The description for control-id cis_rhel10_1-1.1.11.", "props": [ @@ -5318,7 +5342,7 @@ ] }, { - "uuid": "99130eec-ce1e-46f9-8c53-8a67bcd28755", + "uuid": "d64e85c0-9ffe-42b7-95ca-b2808ed875b1", "control-id": "cis_rhel10_1-1.2.1.1", "description": "No notes for control-id 1.1.2.1.1.", "props": [ @@ -5335,7 +5359,7 @@ ] }, { - "uuid": "547bf8c7-6309-4282-a6bd-1fa0bb1445ad", + "uuid": "304fbd92-fabf-4f99-8b35-9014727b8621", "control-id": "cis_rhel10_1-1.2.1.2", "description": "No notes for control-id 1.1.2.1.2.", "props": [ @@ -5352,7 +5376,7 @@ ] }, { - "uuid": "be3e7614-53a2-4936-8e0e-c9e83205710a", + "uuid": "7a610424-83b2-4999-8e93-7b6c16dede90", "control-id": "cis_rhel10_1-1.2.1.3", "description": "No notes for control-id 1.1.2.1.3.", "props": [ @@ -5369,7 +5393,7 @@ ] }, { - "uuid": "127a381a-5cdb-4954-adb6-d662391ea863", + "uuid": "269e88f4-957d-46e8-9d69-1f9102053217", "control-id": "cis_rhel10_1-1.2.1.4", "description": "No notes for control-id 1.1.2.1.4.", "props": [ @@ -5386,7 +5410,7 @@ ] }, { - "uuid": "46c904bf-f98d-4fd0-8430-64b7bf2e0777", + "uuid": "1ab5f0af-9214-4d26-a642-41dd75f1c8af", "control-id": "cis_rhel10_1-1.2.2.1", "description": "No notes for control-id 1.1.2.2.1.", "props": [ @@ -5403,7 +5427,7 @@ ] }, { - "uuid": "b8f010e1-0af6-4fae-8f3f-e63ac63f83e2", + "uuid": "67f87276-e182-4e93-8e5a-3e0df1727ae9", "control-id": "cis_rhel10_1-1.2.2.2", "description": "No notes for control-id 1.1.2.2.2.", "props": [ @@ -5420,7 +5444,7 @@ ] }, { - "uuid": "cb763c14-0567-403a-a2a1-cd862a0f28d7", + "uuid": "dd73728c-83d6-4d23-88e7-5bfa208fb637", "control-id": "cis_rhel10_1-1.2.2.3", "description": "No notes for control-id 1.1.2.2.3.", "props": [ @@ -5437,7 +5461,7 @@ ] }, { - "uuid": "a28e063a-7522-4750-9253-75a8d08792c8", + "uuid": "27e0a313-06d7-4974-9e0b-95dde1abcb7b", "control-id": "cis_rhel10_1-1.2.2.4", "description": "No notes for control-id 1.1.2.2.4.", "props": [ @@ -5454,7 +5478,7 @@ ] }, { - "uuid": "fdb2453d-d703-42b5-a124-dea3a0e608fc", + "uuid": "cb0ef65f-37f4-4d51-9971-6d892d74c8ec", "control-id": "cis_rhel10_1-1.2.3.2", "description": "No notes for control-id 1.1.2.3.2.", "props": [ @@ -5471,7 +5495,7 @@ ] }, { - "uuid": "3d179285-6fb3-4d35-9380-c4a2b0ecb5ea", + "uuid": "25046abe-ac95-4ddd-9422-2e9a52427abd", "control-id": "cis_rhel10_1-1.2.3.3", "description": "No notes for control-id 1.1.2.3.3.", "props": [ @@ -5488,7 +5512,7 @@ ] }, { - "uuid": "d2f8e068-bd23-4883-b318-76a9128c350c", + "uuid": "04818636-51bf-40c5-a9ca-278d12f6cf95", "control-id": "cis_rhel10_1-1.2.4.2", "description": "No notes for control-id 1.1.2.4.2.", "props": [ @@ -5505,7 +5529,7 @@ ] }, { - "uuid": "59531b73-d15d-4b07-9297-920d40c8d312", + "uuid": "8d04e229-25f8-44b9-b0d8-db1d88ccd4a4", "control-id": "cis_rhel10_1-1.2.4.3", "description": "No notes for control-id 1.1.2.4.3.", "props": [ @@ -5522,7 +5546,7 @@ ] }, { - "uuid": "6b39203c-8eaf-4ae9-98a7-1cba5fd34fec", + "uuid": "f6f94be3-ece0-487a-827d-0bad0dfee281", "control-id": "cis_rhel10_1-1.2.5.2", "description": "No notes for control-id 1.1.2.5.2.", "props": [ @@ -5539,7 +5563,7 @@ ] }, { - "uuid": "129a4d26-e41b-462b-825d-95d2cc5ea9d7", + "uuid": "36c1c084-c576-43c3-a5ec-2a973baf689f", "control-id": "cis_rhel10_1-1.2.5.3", "description": "No notes for control-id 1.1.2.5.3.", "props": [ @@ -5556,7 +5580,7 @@ ] }, { - "uuid": "abe9bdf5-e86b-4baf-84eb-8b1b24b1ab9c", + "uuid": "8c5e72bd-e426-4381-a1d3-85732c532439", "control-id": "cis_rhel10_1-1.2.5.4", "description": "No notes for control-id 1.1.2.5.4.", "props": [ @@ -5573,7 +5597,7 @@ ] }, { - "uuid": "c72cdf22-ba0a-40aa-8dee-cf7b0dbc505c", + "uuid": "75708904-e051-407f-a8e1-26940649dd95", "control-id": "cis_rhel10_1-1.2.6.2", "description": "No notes for control-id 1.1.2.6.2.", "props": [ @@ -5590,7 +5614,7 @@ ] }, { - "uuid": "3144cba9-a50c-4912-9d3a-ecf57680b9ed", + "uuid": "45b1eaff-72c6-46b8-8e87-7514250c85a2", "control-id": "cis_rhel10_1-1.2.6.3", "description": "No notes for control-id 1.1.2.6.3.", "props": [ @@ -5607,7 +5631,7 @@ ] }, { - "uuid": "dcaae566-feac-410e-8ecf-dab2b9d23a1c", + "uuid": "e00b3981-18d6-41e5-b478-f4d6167489f5", "control-id": "cis_rhel10_1-1.2.6.4", "description": "No notes for control-id 1.1.2.6.4.", "props": [ @@ -5624,7 +5648,7 @@ ] }, { - "uuid": "30773af8-e676-45c2-a398-a5098c1e5395", + "uuid": "04831c9f-898a-495e-84d5-f0313068640f", "control-id": "cis_rhel10_1-1.2.7.2", "description": "No notes for control-id 1.1.2.7.2.", "props": [ @@ -5641,7 +5665,7 @@ ] }, { - "uuid": "64539bee-3053-4c24-8849-0c18272b6247", + "uuid": "efa5bec0-8c80-4c03-b28b-27009a9dfdfc", "control-id": "cis_rhel10_1-1.2.7.3", "description": "No notes for control-id 1.1.2.7.3.", "props": [ @@ -5658,7 +5682,7 @@ ] }, { - "uuid": "fb60d8ec-d35c-4204-a105-b97a07f49b09", + "uuid": "f86a01e9-c0a9-4e65-8bc2-f086495b653e", "control-id": "cis_rhel10_1-1.2.7.4", "description": "No notes for control-id 1.1.2.7.4.", "props": [ @@ -5675,7 +5699,7 @@ ] }, { - "uuid": "f5f586c7-0378-4d1c-be0f-73d22cb005b2", + "uuid": "31991028-084d-42ee-9389-2f0b31d5125a", "control-id": "cis_rhel10_1-2.1.1", "description": "The description for control-id cis_rhel10_1-2.1.1.", "props": [ @@ -5688,7 +5712,7 @@ ] }, { - "uuid": "81c83dee-7e15-4d13-8d10-0b96019dbc08", + "uuid": "14fc8dcb-dcc9-4410-b4bd-f3d1204e035c", "control-id": "cis_rhel10_1-2.1.2", "description": "No notes for control-id 1.2.1.2.", "props": [ @@ -5705,7 +5729,7 @@ ] }, { - "uuid": "8d6b3d1d-45a2-4fa8-a23c-4744ad7dddee", + "uuid": "9e57e201-3674-413d-a6dd-e68e97626149", "control-id": "cis_rhel10_1-2.1.4", "description": "The description for control-id cis_rhel10_1-2.1.4.", "props": [ @@ -5718,7 +5742,7 @@ ] }, { - "uuid": "3156ac59-8ce2-490a-9416-9908e53ee875", + "uuid": "c60a1394-1011-4726-8966-3fab0f8e2429", "control-id": "cis_rhel10_1-2.2.1", "description": "The description for control-id cis_rhel10_1-2.2.1.", "props": [ @@ -5731,7 +5755,7 @@ ] }, { - "uuid": "4aecc71c-c7c3-4eed-8449-738130e3ac62", + "uuid": "93c1ae95-ddc3-4275-99ab-8b17e4c2af44", "control-id": "cis_rhel10_1-3.1.1", "description": "No notes for control-id 1.3.1.1.", "props": [ @@ -5748,7 +5772,7 @@ ] }, { - "uuid": "1573e3db-d72f-4c62-8a07-fc676c6e4ca4", + "uuid": "52f672b3-5aed-430b-a5b7-39fc435eeb05", "control-id": "cis_rhel10_1-3.1.2", "description": "No notes for control-id 1.3.1.2.", "props": [ @@ -5765,7 +5789,7 @@ ] }, { - "uuid": "7a06744a-c7af-4869-866e-401cf6c82d38", + "uuid": "5329f59d-e2d5-4d79-abc4-1f3b5f8cd448", "control-id": "cis_rhel10_1-3.1.3", "description": "No notes for control-id 1.3.1.3.", "props": [ @@ -5782,7 +5806,7 @@ ] }, { - "uuid": "802586a5-f011-49af-8b32-ea7ad9fc4d60", + "uuid": "817f32b6-5aab-4cb1-b86c-5c8b768cc26e", "control-id": "cis_rhel10_1-3.1.4", "description": "No notes for control-id 1.3.1.4.", "props": [ @@ -5799,7 +5823,7 @@ ] }, { - "uuid": "85ecac9d-a03c-4b1f-9f09-846071f20df3", + "uuid": "4483dae8-b676-4bc3-bf48-801c8e36e920", "control-id": "cis_rhel10_1-3.1.7", "description": "No notes for control-id 1.3.1.7.", "props": [ @@ -5816,7 +5840,7 @@ ] }, { - "uuid": "bd3af713-5b75-44cc-9cde-cb0ea3429f9d", + "uuid": "d73b86f2-fb15-4a18-bed1-037f1385efbe", "control-id": "cis_rhel10_1-4.1", "description": "There is no automated remediation for this rule and this is intentional.\nMore details in the rule description.", "props": [ @@ -5833,7 +5857,7 @@ ] }, { - "uuid": "d36e3e0f-b8ab-449c-ad94-d7034459a908", + "uuid": "34bb3127-4cc7-41f4-bece-7b99e2126a6d", "control-id": "cis_rhel10_1-4.2", "description": "The description for control-id cis_rhel10_1-4.2.", "props": [ @@ -5876,7 +5900,7 @@ ] }, { - "uuid": "0aa0a62c-c4a8-4323-8eee-36c3d6317407", + "uuid": "ffc0288a-5a3e-455f-844f-1c156f9f44b6", "control-id": "cis_rhel10_1-5.1", "description": "No notes for control-id 1.5.1.", "props": [ @@ -5893,7 +5917,7 @@ ] }, { - "uuid": "863b97f9-8ede-4779-9188-7fb06b1d446d", + "uuid": "e8fb93cf-e187-4d1f-bde1-588a4025c2d0", "control-id": "cis_rhel10_1-5.2", "description": "No notes for control-id 1.5.2.", "props": [ @@ -5910,7 +5934,7 @@ ] }, { - "uuid": "1615b6ba-1f6a-4586-a506-efa71d73a20d", + "uuid": "e19477d7-7edd-4c44-9a70-c85add65e491", "control-id": "cis_rhel10_1-5.4", "description": "No notes for control-id 1.5.4.", "props": [ @@ -5927,7 +5951,7 @@ ] }, { - "uuid": "df6858ad-6bef-432c-9051-ce3bf3e3d341", + "uuid": "206f34e9-c382-4254-be95-f939d5387a6a", "control-id": "cis_rhel10_1-5.5", "description": "No notes for control-id 1.5.5.", "props": [ @@ -5944,7 +5968,7 @@ ] }, { - "uuid": "75979fd9-f6a4-4b36-b85d-872a13c7b685", + "uuid": "8b0b0958-f003-4cd9-95c1-507cfb4cabdd", "control-id": "cis_rhel10_1-5.6", "description": "No notes for control-id 1.5.6.", "props": [ @@ -5961,7 +5985,7 @@ ] }, { - "uuid": "12818e28-879e-4724-8e49-4ea0cb87afa8", + "uuid": "c655c172-06fd-42bc-8609-cae109ce3be3", "control-id": "cis_rhel10_1-5.7", "description": "No notes for control-id 1.5.7.", "props": [ @@ -5978,7 +6002,7 @@ ] }, { - "uuid": "fbe1b448-34a4-44e4-8f65-9ca9afda97ce", + "uuid": "d6f7a7a5-5f45-4c93-8697-da03d18cc818", "control-id": "cis_rhel10_1-5.8", "description": "Address Space Layout Randomization (ASLR)", "props": [ @@ -5995,7 +6019,7 @@ ] }, { - "uuid": "b2a95098-e3e3-4c30-8936-7716d095ff14", + "uuid": "c0df9ede-00ac-4d5a-bd87-8641258bc10c", "control-id": "cis_rhel10_1-5.9", "description": "No notes for control-id 1.5.9.", "props": [ @@ -6012,7 +6036,7 @@ ] }, { - "uuid": "8ed74936-fa8c-4243-bdbb-16589327d7a1", + "uuid": "12b13939-93d0-410a-a99d-5c75038cbaf4", "control-id": "cis_rhel10_1-5.10", "description": "No notes for control-id 1.5.10.", "props": [ @@ -6029,7 +6053,7 @@ ] }, { - "uuid": "7c72ffa5-d96f-4680-a568-4d0a1c3c6954", + "uuid": "91c54113-0144-4c36-873b-75bcf51c8ff1", "control-id": "cis_rhel10_1-6.1", "description": "No notes for control-id 1.6.1.", "props": [ @@ -6046,7 +6070,7 @@ ] }, { - "uuid": "95742197-a5ff-43a9-89fb-04afa6ee73f3", + "uuid": "66ba9585-6564-4260-95c0-ecb78f245dc2", "control-id": "cis_rhel10_1-6.2", "description": "No notes for control-id 1.6.2.", "props": [ @@ -6063,7 +6087,7 @@ ] }, { - "uuid": "929af0ca-da0d-4805-9d87-13891e3bd737", + "uuid": "d708f36b-a628-4071-82cc-badd0292e8e7", "control-id": "cis_rhel10_1-6.3", "description": "No notes for control-id 1.6.3.", "props": [ @@ -6080,7 +6104,7 @@ ] }, { - "uuid": "95f23814-6db6-4bfd-8ba4-72e1e2138dae", + "uuid": "905775c0-fd6b-44ba-ac12-5ec055008031", "control-id": "cis_rhel10_1-6.4", "description": "No notes for control-id 1.6.4.", "props": [ @@ -6097,7 +6121,7 @@ ] }, { - "uuid": "092ef3f2-3b23-4a15-b6cb-996296830d6d", + "uuid": "9d108f3c-8564-4e65-b566-f5f81e916083", "control-id": "cis_rhel10_1-7.1", "description": "No notes for control-id 1.7.1.", "props": [ @@ -6114,7 +6138,7 @@ ] }, { - "uuid": "dcd2eb9d-47e7-4b67-8395-1a48d766c1fa", + "uuid": "982614be-2fd1-4de2-9b97-6878498c5423", "control-id": "cis_rhel10_1-7.2", "description": "No notes for control-id 1.7.2.", "props": [ @@ -6131,7 +6155,7 @@ ] }, { - "uuid": "39b3c71c-2bc0-480e-9eb2-fbbcd5263e7b", + "uuid": "c3d8362d-886c-40b0-9c1d-d3daa6ea2f9b", "control-id": "cis_rhel10_1-7.3", "description": "No notes for control-id 1.7.3.", "props": [ @@ -6148,7 +6172,7 @@ ] }, { - "uuid": "6bfb094e-de36-4f26-92ed-e4a6ea4d1842", + "uuid": "dd4a78b7-f2e7-4e3d-9ba4-81c446ea67d1", "control-id": "cis_rhel10_1-7.4", "description": "No notes for control-id 1.7.4.", "props": [ @@ -6175,7 +6199,7 @@ ] }, { - "uuid": "b1b11c25-7ec3-4a07-a195-89b7ac51333b", + "uuid": "ef896d3c-424d-4f8e-b020-db160fd708eb", "control-id": "cis_rhel10_1-7.5", "description": "No notes for control-id 1.7.5.", "props": [ @@ -6202,7 +6226,7 @@ ] }, { - "uuid": "383775a0-e0a9-4a05-be8e-8aff8bffb4f0", + "uuid": "b6ee4c54-bc45-4a11-a691-8f1d7e1d7590", "control-id": "cis_rhel10_1-7.6", "description": "No notes for control-id 1.7.6.", "props": [ @@ -6229,7 +6253,7 @@ ] }, { - "uuid": "738e0a0e-81f7-4eba-b86d-24ee4f93ee90", + "uuid": "14d446f7-ed22-4de8-a32f-775f21c267b1", "control-id": "cis_rhel10_1-8.1", "description": "No notes for control-id 1.8.1.", "props": [ @@ -6251,7 +6275,7 @@ ] }, { - "uuid": "6e224495-177b-4196-be07-954597a6ac34", + "uuid": "5d2955f2-e01c-49c5-814c-bdad0814424f", "control-id": "cis_rhel10_1-8.2", "description": "No notes for control-id 1.8.2.", "props": [ @@ -6268,7 +6292,7 @@ ] }, { - "uuid": "37d04f06-d5c0-4b72-98de-4aec356a8a76", + "uuid": "d5492aea-6159-4eac-8c22-05d6b0c1ea53", "control-id": "cis_rhel10_1-8.3", "description": "No notes for control-id 1.8.3.", "props": [ @@ -6300,7 +6324,7 @@ ] }, { - "uuid": "77853784-d218-43fb-87aa-30c53aab3af4", + "uuid": "330ffc64-77e5-496a-bbba-8e9f81773d88", "control-id": "cis_rhel10_1-8.5", "description": "No notes for control-id 1.8.5.", "props": [ @@ -6317,7 +6341,7 @@ ] }, { - "uuid": "2470ba2c-1104-4177-9a1f-193cbd88271d", + "uuid": "ea212318-7145-4f19-b6fc-9a18d9cba6e0", "control-id": "cis_rhel10_2-1.4", "description": "No notes for control-id 2.1.4.", "props": [ @@ -6334,7 +6358,7 @@ ] }, { - "uuid": "b40fd7b1-f7e0-46fb-b0e8-e902a8508900", + "uuid": "1e9d9f1c-073c-4cc0-9ac3-42bfecd7c29f", "control-id": "cis_rhel10_2-1.5", "description": "No notes for control-id 2.1.5.", "props": [ @@ -6351,7 +6375,7 @@ ] }, { - "uuid": "455d0896-2ad9-45f4-bf92-a6a42b76a274", + "uuid": "5b81d3aa-8aba-4555-ba5f-0b4ed684e2a0", "control-id": "cis_rhel10_2-1.6", "description": "No notes for control-id 2.1.6.", "props": [ @@ -6368,7 +6392,7 @@ ] }, { - "uuid": "4adc554b-0564-4a6e-82cc-fa498a6b7da8", + "uuid": "3c681b39-e6db-46d0-94fc-ec66f6c47880", "control-id": "cis_rhel10_2-1.7", "description": "No notes for control-id 2.1.7.", "props": [ @@ -6385,7 +6409,7 @@ ] }, { - "uuid": "a5f66099-95bf-4677-8e3a-11c4f6657ac7", + "uuid": "151f936b-06dc-4320-a0c2-32bc1af8b792", "control-id": "cis_rhel10_2-1.8", "description": "No notes for control-id 2.1.8.", "props": [ @@ -6407,7 +6431,7 @@ ] }, { - "uuid": "81443e4f-55c2-4d88-82df-1d9d63468c32", + "uuid": "f3480bd5-79c1-4cc6-ae12-002c257b728b", "control-id": "cis_rhel10_2-1.9", "description": "Many of the libvirt packages used by Enterprise Linux virtualization are dependent on the\nnfs-utils package.", "props": [ @@ -6424,7 +6448,7 @@ ] }, { - "uuid": "fc1c0e58-df0c-4d2e-8766-aa55470337ec", + "uuid": "87b7f04b-2f0c-4e3b-8371-1c0d090bc5b2", "control-id": "cis_rhel10_2-1.11", "description": "Many of the libvirt packages used by Enterprise Linux virtualization, and the nfs-utils\npackage used for The Network File System (NFS), are dependent on the rpcbind package.", "props": [ @@ -6441,7 +6465,7 @@ ] }, { - "uuid": "8bb469a3-0b23-44b8-850a-4a35466f3826", + "uuid": "0ae3a4c9-98ba-40ae-8135-85f9c0d69eea", "control-id": "cis_rhel10_2-1.12", "description": "No notes for control-id 2.1.12.", "props": [ @@ -6458,7 +6482,7 @@ ] }, { - "uuid": "993620db-1837-4aca-967c-57a324e5c47f", + "uuid": "85055e68-910e-4662-b94e-4c56a7b4aaaf", "control-id": "cis_rhel10_2-1.13", "description": "No notes for control-id 2.1.13.", "props": [ @@ -6475,7 +6499,7 @@ ] }, { - "uuid": "5ce6a8b7-b7c8-4478-b052-f88f472561c2", + "uuid": "774be665-0b2d-44fd-99a1-15823c875d5c", "control-id": "cis_rhel10_2-1.14", "description": "No notes for control-id 2.1.14.", "props": [ @@ -6492,7 +6516,7 @@ ] }, { - "uuid": "4f9c289a-e15e-41d0-ac26-aad12f5b8fdd", + "uuid": "467a8508-8adc-4666-9798-7625fee39345", "control-id": "cis_rhel10_2-1.15", "description": "No notes for control-id 2.1.15.", "props": [ @@ -6509,7 +6533,7 @@ ] }, { - "uuid": "c98d5fc6-89be-463d-8450-4b812e9b542a", + "uuid": "ed569bf3-41d2-43c5-866e-a1897d5a8db0", "control-id": "cis_rhel10_2-1.16", "description": "No notes for control-id 2.1.16.", "props": [ @@ -6526,7 +6550,7 @@ ] }, { - "uuid": "5c253b67-3742-426f-b9d7-d3adb91efc06", + "uuid": "0cfbb778-a2fe-4bc1-9a09-89df8426a22f", "control-id": "cis_rhel10_2-1.17", "description": "No notes for control-id 2.1.17.", "props": [ @@ -6543,7 +6567,7 @@ ] }, { - "uuid": "f5fb5c64-d867-45a7-972a-093a3ac4ebad", + "uuid": "073c57b2-ed3e-45b3-9141-8ef9653eae45", "control-id": "cis_rhel10_2-1.18", "description": "No notes for control-id 2.1.18.", "props": [ @@ -6565,7 +6589,7 @@ ] }, { - "uuid": "b415d9ba-052f-40b0-b0e0-395c925eee4c", + "uuid": "7782c003-1205-457b-acdd-eb412c0e2a64", "control-id": "cis_rhel10_2-1.21", "description": "No notes for control-id 2.1.21.", "props": [ @@ -6587,7 +6611,7 @@ ] }, { - "uuid": "d50b2c12-855b-4a26-8fe4-7f3ac1841ff9", + "uuid": "e0fce95f-5b0b-4c48-ad02-1bb02f330013", "control-id": "cis_rhel10_2-1.22", "description": "The description for control-id cis_rhel10_2-1.22.", "props": [ @@ -6600,7 +6624,7 @@ ] }, { - "uuid": "2942871c-b709-4a2e-b297-d22a975539f6", + "uuid": "a99e84b2-fd39-40bb-bde2-00e30fa3b268", "control-id": "cis_rhel10_2-2.1", "description": "No notes for control-id 2.2.1.", "props": [ @@ -6617,7 +6641,7 @@ ] }, { - "uuid": "be216724-3a97-43b9-b70f-8808501f142f", + "uuid": "e923807b-2eb2-4f65-a990-7d0f345c2f15", "control-id": "cis_rhel10_2-2.3", "description": "No notes for control-id 2.2.3.", "props": [ @@ -6634,7 +6658,7 @@ ] }, { - "uuid": "af37adfa-a9ae-41c3-981e-e4db82fb0e41", + "uuid": "94956244-90bd-453b-b565-5353f5a9673d", "control-id": "cis_rhel10_2-2.4", "description": "No notes for control-id 2.2.4.", "props": [ @@ -6651,7 +6675,7 @@ ] }, { - "uuid": "20b5daa2-ce8e-4826-81a0-9919492b0a56", + "uuid": "075408c0-c5f0-495b-8468-8dd60a97fd30", "control-id": "cis_rhel10_2-3.1", "description": "No notes for control-id 2.3.1.", "props": [ @@ -6663,7 +6687,7 @@ ] }, { - "uuid": "b416ff28-a01a-4b2e-938e-d9d9a1752482", + "uuid": "240be254-2fbc-4c9a-8311-a10c063b3561", "control-id": "cis_rhel10_2-3.2", "description": "No notes for control-id 2.3.2.", "props": [ @@ -6680,7 +6704,7 @@ ] }, { - "uuid": "db3cb8c4-5a49-4c9b-bfee-79b26b42759e", + "uuid": "80efd1d3-b186-4bd5-997f-6842de55f53d", "control-id": "cis_rhel10_2-3.3", "description": "No notes for control-id 2.3.3.", "props": [ @@ -6697,7 +6721,7 @@ ] }, { - "uuid": "e6976d17-7611-4fc5-9ece-9ef07f28619b", + "uuid": "8c2c6039-4d9f-4a10-8577-1e9cbb37b69e", "control-id": "cis_rhel10_2-4.1.1", "description": "No notes for control-id 2.4.1.1.", "props": [ @@ -6719,7 +6743,7 @@ ] }, { - "uuid": "327f01f0-9385-48c9-b63b-570496ff34f6", + "uuid": "c4b01876-e54c-401e-a196-c5690e703ba1", "control-id": "cis_rhel10_2-4.1.2", "description": "No notes for control-id 2.4.1.2.", "props": [ @@ -6746,7 +6770,7 @@ ] }, { - "uuid": "be997a5a-96aa-4423-b4a3-11bca77fac79", + "uuid": "5bc8d6b9-df63-4fb7-8475-49a01aaf7951", "control-id": "cis_rhel10_2-4.1.3", "description": "No notes for control-id 2.4.1.3.", "props": [ @@ -6773,7 +6797,7 @@ ] }, { - "uuid": "cb9b011c-e665-498f-95f2-9bfa835d4082", + "uuid": "4b7db673-68b0-4c13-9539-e679e477c664", "control-id": "cis_rhel10_2-4.1.4", "description": "No notes for control-id 2.4.1.4.", "props": [ @@ -6800,7 +6824,7 @@ ] }, { - "uuid": "bc4bbec5-f677-4fee-a051-88f6ed9bb501", + "uuid": "c89335e0-e957-4f06-9146-5062fe4854d4", "control-id": "cis_rhel10_2-4.1.5", "description": "No notes for control-id 2.4.1.5.", "props": [ @@ -6827,7 +6851,7 @@ ] }, { - "uuid": "02388989-aea0-4a5b-b5b4-d9c0e17d7a50", + "uuid": "0555d406-1ffc-4762-97e8-950f7c3b083d", "control-id": "cis_rhel10_2-4.1.6", "description": "No notes for control-id 2.4.1.6.", "props": [ @@ -6854,7 +6878,7 @@ ] }, { - "uuid": "9fe72845-a6bf-49d9-9124-980741396646", + "uuid": "aa8d532c-b832-4a24-bab8-a2776ec3300e", "control-id": "cis_rhel10_2-4.1.7", "description": "No notes for control-id 2.4.1.7.", "props": [ @@ -6881,7 +6905,7 @@ ] }, { - "uuid": "6e5007ad-1386-43e7-b40b-5713e80c9cff", + "uuid": "8752ef4f-6891-4251-bfa5-60b623c8fca5", "control-id": "cis_rhel10_2-4.1.8", "description": "No notes for control-id 2.4.1.8.", "props": [ @@ -6908,7 +6932,7 @@ ] }, { - "uuid": "3b499e76-7656-431e-b4e8-ca6be0b4e1c1", + "uuid": "b58b4bd1-20d7-449c-8d1c-5efdec642162", "control-id": "cis_rhel10_2-4.1.9", "description": "No notes for control-id 2.4.1.9.", "props": [ @@ -6945,7 +6969,7 @@ ] }, { - "uuid": "93fe6f40-14d4-49b2-bce1-fb2e86c3c3ed", + "uuid": "b0ad2365-a4ed-448c-aec2-62d1a276f972", "control-id": "cis_rhel10_2-4.2.1", "description": "No notes for control-id 2.4.2.1.", "props": [ @@ -6982,7 +7006,7 @@ ] }, { - "uuid": "42a4c19e-df7b-438a-8dcf-ccdf4b4ecbf9", + "uuid": "08b382d6-3854-4c9c-afac-ca6fe200c5e7", "control-id": "cis_rhel10_3-1.1", "description": "The description for control-id cis_rhel10_3-1.1.", "props": [ @@ -6995,7 +7019,7 @@ ] }, { - "uuid": "af92258e-f554-4dbc-88e8-335626aa3317", + "uuid": "40b77517-a632-4e94-89e1-0fbbdc6fe8a6", "control-id": "cis_rhel10_3-2.1", "description": "No notes for control-id 3.2.1.", "props": [ @@ -7012,7 +7036,7 @@ ] }, { - "uuid": "194cb2de-f11c-4b79-9760-7a8b9424fa2a", + "uuid": "4c8cb804-41d2-44ea-bac1-acab843032a5", "control-id": "cis_rhel10_3-2.2", "description": "No notes for control-id 3.2.2.", "props": [ @@ -7029,7 +7053,7 @@ ] }, { - "uuid": "20298a2d-6932-4988-87c7-d8e7b130a127", + "uuid": "f9f11f45-b65c-4b22-a1d4-c221d62a516e", "control-id": "cis_rhel10_3-2.3", "description": "No notes for control-id 3.2.3.", "props": [ @@ -7046,7 +7070,7 @@ ] }, { - "uuid": "7c9425ee-d88f-41a9-8560-1077e1e043aa", + "uuid": "76739f9e-9d8f-4053-b85e-7e24d2abb995", "control-id": "cis_rhel10_3-2.4", "description": "No notes for control-id 3.2.4.", "props": [ @@ -7063,7 +7087,7 @@ ] }, { - "uuid": "d24f3cf9-3039-4aad-b000-162b67a918c2", + "uuid": "546b9a4f-7b58-4deb-aa69-0bc58e888577", "control-id": "cis_rhel10_3-2.5", "description": "No notes for control-id 3.2.5.", "props": [ @@ -7080,7 +7104,7 @@ ] }, { - "uuid": "e0be4428-988c-4ee3-a2e0-7033b486294a", + "uuid": "c33d0890-c965-4fee-98a4-a682413d6a4b", "control-id": "cis_rhel10_3-2.6", "description": "No notes for control-id 3.2.6.", "props": [ @@ -7097,7 +7121,7 @@ ] }, { - "uuid": "47fd9798-1340-4ce2-8908-f633ce5f4381", + "uuid": "b34328ed-1b03-4f6f-aec6-381559f666ca", "control-id": "cis_rhel10_3-3.1.1", "description": "No notes for control-id 3.3.1.1.", "props": [ @@ -7114,7 +7138,7 @@ ] }, { - "uuid": "43c4b292-6dcf-4f03-a43e-6fe0179448a6", + "uuid": "cbdac553-6473-4225-ba53-2528a76156d4", "control-id": "cis_rhel10_3-3.1.2", "description": "No notes for control-id 3.3.1.2.", "props": [ @@ -7131,7 +7155,7 @@ ] }, { - "uuid": "63dc5cb9-c18c-4ae9-9383-a630dcced982", + "uuid": "9741e507-c0b4-4ab5-ae4c-1206b4a5ac3f", "control-id": "cis_rhel10_3-3.1.3", "description": "No notes for control-id 3.3.1.3.", "props": [ @@ -7148,7 +7172,7 @@ ] }, { - "uuid": "a66663cc-3336-45db-aa58-115a76604bc1", + "uuid": "0ec0bde7-9b6b-4cbf-89f3-de9540259037", "control-id": "cis_rhel10_3-3.1.4", "description": "No notes for control-id 3.3.1.4.", "props": [ @@ -7165,7 +7189,7 @@ ] }, { - "uuid": "58c55346-4c53-4277-9201-377416fecb6e", + "uuid": "a9eee3d7-3e57-4078-885f-1bae584dd955", "control-id": "cis_rhel10_3-3.1.5", "description": "No notes for control-id 3.3.1.5.", "props": [ @@ -7182,7 +7206,7 @@ ] }, { - "uuid": "380638b8-4295-4e62-8c78-0d97d3a91552", + "uuid": "143db3c0-5dee-4b11-8864-129e706209c0", "control-id": "cis_rhel10_3-3.1.6", "description": "No notes for control-id 3.3.1.6.", "props": [ @@ -7199,7 +7223,7 @@ ] }, { - "uuid": "d7b7431f-9b10-4af9-9669-0a2557a8970e", + "uuid": "719105be-8ad4-475d-b1e3-bba6a6abaaf4", "control-id": "cis_rhel10_3-3.1.7", "description": "No notes for control-id 3.3.1.7.", "props": [ @@ -7216,7 +7240,7 @@ ] }, { - "uuid": "4d2f9d1a-8cb2-4e90-8efd-d3ed12c131a6", + "uuid": "1546752a-b5f6-42f4-a667-195bf6671bd6", "control-id": "cis_rhel10_3-3.1.8", "description": "No notes for control-id 3.3.1.8.", "props": [ @@ -7233,7 +7257,7 @@ ] }, { - "uuid": "37c813d5-3356-4e76-aafa-df197543cc78", + "uuid": "fa693766-0237-4cb6-9d2a-e32f8d4421a5", "control-id": "cis_rhel10_3-3.1.9", "description": "No notes for control-id 3.3.1.9.", "props": [ @@ -7250,7 +7274,7 @@ ] }, { - "uuid": "b4b99c8f-4203-4e43-979e-70d4ce865554", + "uuid": "e3750e35-7eb9-474d-863a-439e3b1e04c3", "control-id": "cis_rhel10_3-3.1.10", "description": "No notes for control-id 3.3.1.10.", "props": [ @@ -7267,7 +7291,7 @@ ] }, { - "uuid": "ed601fe7-07ab-45b1-bc3a-59b9dfc217e4", + "uuid": "37620b22-0a9e-4b5b-acba-e2a5fceb80a1", "control-id": "cis_rhel10_3-3.1.11", "description": "No notes for control-id 3.3.1.11.", "props": [ @@ -7284,7 +7308,7 @@ ] }, { - "uuid": "ab2fcb4f-c7bd-4bfa-8626-91454b73e215", + "uuid": "25b3f355-8b93-4f69-bbed-cc3b9b9fff70", "control-id": "cis_rhel10_3-3.1.12", "description": "No notes for control-id 3.3.1.12.", "props": [ @@ -7301,7 +7325,7 @@ ] }, { - "uuid": "a6d81c8d-c2dc-4535-8de2-adb6e1b9437d", + "uuid": "67de8a92-33c9-4ae6-83f2-0d89b54d9837", "control-id": "cis_rhel10_3-3.1.13", "description": "No notes for control-id 3.3.1.13.", "props": [ @@ -7318,7 +7342,7 @@ ] }, { - "uuid": "f3812cb0-0208-4d9f-9504-16b444276b77", + "uuid": "bcb401c4-ac15-48f0-bdbe-350a36372edd", "control-id": "cis_rhel10_3-3.1.14", "description": "No notes for control-id 3.3.1.14.", "props": [ @@ -7335,7 +7359,7 @@ ] }, { - "uuid": "5e87690f-391e-4f6b-a6a6-70c5308602ff", + "uuid": "fac4df82-6f56-41b8-9e1e-ff097a3a34b6", "control-id": "cis_rhel10_3-3.1.15", "description": "No notes for control-id 3.3.1.15.", "props": [ @@ -7352,7 +7376,7 @@ ] }, { - "uuid": "34d10a7b-e0ba-4ed3-b2d1-d00c999b1bd7", + "uuid": "c6cbf4fd-3e52-4489-a1b4-5a24982917be", "control-id": "cis_rhel10_3-3.1.16", "description": "No notes for control-id 3.3.1.16.", "props": [ @@ -7369,7 +7393,7 @@ ] }, { - "uuid": "f8792fcb-5481-429f-ba6a-c4591d417ee3", + "uuid": "c7f72887-2078-4d9d-b15a-efac97cc6482", "control-id": "cis_rhel10_3-3.1.17", "description": "No notes for control-id 3.3.1.17.", "props": [ @@ -7386,7 +7410,7 @@ ] }, { - "uuid": "cc5671df-2367-4110-ac8c-cfdcba75f6c7", + "uuid": "70efff0c-4e1e-4261-a7fb-80bb173b64c3", "control-id": "cis_rhel10_3-3.1.18", "description": "No notes for control-id 3.3.1.18.", "props": [ @@ -7403,7 +7427,7 @@ ] }, { - "uuid": "7d62b138-9eb7-4e2c-a237-4696b282a556", + "uuid": "585ebd63-a871-4402-99d1-37fcc3a53a63", "control-id": "cis_rhel10_3-3.2.1", "description": "No notes for control-id 3.3.2.1.", "props": [ @@ -7420,7 +7444,7 @@ ] }, { - "uuid": "db1df86a-0cc9-4e11-92c5-82c9037dd19d", + "uuid": "ddaa596e-2c1e-48b0-9622-b36bc377bca5", "control-id": "cis_rhel10_3-3.2.2", "description": "No notes for control-id 3.3.2.2.", "props": [ @@ -7437,7 +7461,7 @@ ] }, { - "uuid": "f398cd8c-45fd-4430-8945-e4cf04aeafbc", + "uuid": "8f2aad0c-503a-4c54-b505-ec80fdcaabd4", "control-id": "cis_rhel10_3-3.2.3", "description": "No notes for control-id 3.3.2.3.", "props": [ @@ -7454,7 +7478,7 @@ ] }, { - "uuid": "bc2aeb2a-a808-490b-b31e-987a8ad88942", + "uuid": "03ca2a77-9b52-49f0-b93c-9ce2de623598", "control-id": "cis_rhel10_3-3.2.4", "description": "No notes for control-id 3.3.2.4.", "props": [ @@ -7471,7 +7495,7 @@ ] }, { - "uuid": "0903a0b0-4e7f-4468-a9e3-753e265aaeb5", + "uuid": "175af1df-00fe-4928-ab9b-52d042774e7b", "control-id": "cis_rhel10_3-3.2.5", "description": "No notes for control-id 3.3.2.5.", "props": [ @@ -7488,7 +7512,7 @@ ] }, { - "uuid": "cb7b2a60-e3d8-4281-b8a0-edea7c0464ad", + "uuid": "4f3dea1b-d881-4dd6-83a7-2b8774662387", "control-id": "cis_rhel10_3-3.2.6", "description": "No notes for control-id 3.3.2.6.", "props": [ @@ -7505,7 +7529,7 @@ ] }, { - "uuid": "bd568f0b-3d73-48a4-93de-a933067f5f15", + "uuid": "4ce278bc-d831-4ddc-8f3e-85e471056adf", "control-id": "cis_rhel10_3-3.2.7", "description": "No notes for control-id 3.3.2.7.", "props": [ @@ -7522,7 +7546,7 @@ ] }, { - "uuid": "5f47a603-8001-422f-a5c9-8ca333bb6d4f", + "uuid": "42c63f51-cb96-4c16-926f-e39f6f947bf2", "control-id": "cis_rhel10_3-3.2.8", "description": "No notes for control-id 3.3.2.8.", "props": [ @@ -7539,7 +7563,7 @@ ] }, { - "uuid": "60422053-659d-4389-94ea-ca82b95edc37", + "uuid": "ead75e16-3558-4626-9872-8ae2febfd5e9", "control-id": "cis_rhel10_4-1.1", "description": "No notes for control-id 4.1.1.", "props": [ @@ -7556,7 +7580,7 @@ ] }, { - "uuid": "e03c6f49-7fd1-45b4-b062-c8e332239cfe", + "uuid": "af2f9dd5-a107-4ec2-bd7a-979882e2170f", "control-id": "cis_rhel10_4-1.2", "description": "No notes for control-id 4.1.2.", "props": [ @@ -7573,7 +7597,7 @@ ] }, { - "uuid": "3b5cf75b-f507-4797-b1d8-fc8f0e75b8f2", + "uuid": "cdd30097-89d3-4ba7-be35-67552306feb2", "control-id": "cis_rhel10_4-1.3", "description": "No notes for control-id 4.1.3.", "props": [ @@ -7590,7 +7614,7 @@ ] }, { - "uuid": "cb1d0003-635b-4612-85d3-cd5a7b5c6d52", + "uuid": "47fc9ac5-0cd1-4876-b7b8-ac92b2089724", "control-id": "cis_rhel10_4-1.4", "description": "The description for control-id cis_rhel10_4-1.4.", "props": [ @@ -7603,7 +7627,7 @@ ] }, { - "uuid": "1a9645ad-d58d-4772-ad48-91e363e8dbe4", + "uuid": "fa4dc62b-76d7-48c5-b854-809329b4662d", "control-id": "cis_rhel10_4-1.5", "description": "Firewalld in Red Hat Enterprise Linux 10 accepts loopback traffic by default.", "props": [ @@ -7620,7 +7644,7 @@ ] }, { - "uuid": "5698178c-e32c-4a7f-a0fb-b121902adafd", + "uuid": "b0c10ef1-b7fa-416f-868f-61a6c3a2dd63", "control-id": "cis_rhel10_4-1.6", "description": "The description for control-id cis_rhel10_4-1.6.", "props": [ @@ -7633,7 +7657,7 @@ ] }, { - "uuid": "301c84aa-24d3-4b69-b2ed-8ed27979efeb", + "uuid": "a7cff8b7-fe55-4555-aa88-79c930a6b72a", "control-id": "cis_rhel10_4-1.7", "description": "The description for control-id cis_rhel10_4-1.7.", "props": [ @@ -7646,7 +7670,7 @@ ] }, { - "uuid": "ad81c7ca-3615-4cd6-9e15-fe39187ac3fb", + "uuid": "487b77ad-d75a-4c06-bcec-5d6942ddcf0d", "control-id": "cis_rhel10_5-1.1", "description": "No notes for control-id 5.1.1.", "props": [ @@ -7703,7 +7727,7 @@ ] }, { - "uuid": "fd897860-e630-4fe7-b0ee-c8eb31ff35d9", + "uuid": "cd704aec-6f40-43dd-8203-518b0cd68e77", "control-id": "cis_rhel10_5-1.2", "description": "No notes for control-id 5.1.2.", "props": [ @@ -7730,7 +7754,7 @@ ] }, { - "uuid": "66e52be8-69e4-46e9-8c84-45a245d4cd1b", + "uuid": "df1f6d66-551a-4276-9c06-5a4336761363", "control-id": "cis_rhel10_5-1.3", "description": "No notes for control-id 5.1.3.", "props": [ @@ -7757,7 +7781,7 @@ ] }, { - "uuid": "9c857b4c-a72b-4fe6-8afd-cf7355da0005", + "uuid": "f2054194-8dfe-4de7-9249-1dc75eaa7e0f", "control-id": "cis_rhel10_5-1.4", "description": "No notes for control-id 5.1.4.", "props": [ @@ -7774,7 +7798,7 @@ ] }, { - "uuid": "5f47a760-4f89-4f23-8807-3c8ae13719da", + "uuid": "c27f4fd0-ddc2-44c1-95f5-9299dbf432a2", "control-id": "cis_rhel10_5-1.5", "description": "No notes for control-id 5.1.5.", "props": [ @@ -7791,7 +7815,7 @@ ] }, { - "uuid": "b23a8c67-7d67-4a19-917c-ed93f251789f", + "uuid": "e62f00c6-885c-4725-a40b-5af5d5752efa", "control-id": "cis_rhel10_5-1.6", "description": "No notes for control-id 5.1.6.", "props": [ @@ -7808,7 +7832,7 @@ ] }, { - "uuid": "c4c65a47-130d-49d1-8538-2294d2bda794", + "uuid": "375dc08c-89f8-4b38-9510-5db06082a53e", "control-id": "cis_rhel10_5-1.7", "description": "The requirement gives an example of 45 seconds, but is flexible about the values. It is only\nnecessary to ensure there is a timeout configured in alignment to the site policy.", "props": [ @@ -7830,7 +7854,7 @@ ] }, { - "uuid": "73f82ea4-b9a8-4471-920c-d9ce7664549c", + "uuid": "01fb932a-c3bc-4f7a-9b1f-9c0aa1239c5d", "control-id": "cis_rhel10_5-1.8", "description": "No notes for control-id 5.1.8.", "props": [ @@ -7847,7 +7871,7 @@ ] }, { - "uuid": "92164194-821f-46a5-88c4-ba320c4c0204", + "uuid": "734f0e86-55ae-408d-9bd8-205b4bc9494a", "control-id": "cis_rhel10_5-1.9", "description": "No notes for control-id 5.1.9.", "props": [ @@ -7864,7 +7888,7 @@ ] }, { - "uuid": "50b542a5-1de7-4637-9314-1b3357e69926", + "uuid": "c9b24785-605e-47fa-8f54-908c66158b38", "control-id": "cis_rhel10_5-1.10", "description": "No notes for control-id 5.1.10.", "props": [ @@ -7881,7 +7905,7 @@ ] }, { - "uuid": "78199df7-f50c-462a-b63d-a3caaf6caa6a", + "uuid": "ec0758a4-cb10-4719-adb0-31640dfd60f9", "control-id": "cis_rhel10_5-1.11", "description": "No notes for control-id 5.1.11.", "props": [ @@ -7898,7 +7922,7 @@ ] }, { - "uuid": "214b4ed5-d6c9-432d-9005-b3b93ec6bae3", + "uuid": "9ff4431b-04ae-4e91-b0aa-0be1e987e0ed", "control-id": "cis_rhel10_5-1.12", "description": "The description for control-id cis_rhel10_5-1.12.", "props": [ @@ -7916,7 +7940,7 @@ ] }, { - "uuid": "75afa335-0c38-42a5-b909-8862e9782de3", + "uuid": "0ce8ddb0-cc71-4e40-85f6-fe10c549b48c", "control-id": "cis_rhel10_5-1.13", "description": "No notes for control-id 5.1.13.", "props": [ @@ -7933,7 +7957,7 @@ ] }, { - "uuid": "a9872c00-abb1-4603-a3e4-2f89a5b5ba63", + "uuid": "aa2a8c1b-d51e-458e-970a-f79d5a428a35", "control-id": "cis_rhel10_5-1.14", "description": "The CIS benchmark is not opinionated about which loglevel is selected here. Here, this\nprofile uses VERBOSE by default, as it allows for the capture of login and logout activity\nas well as key fingerprints.", "props": [ @@ -7950,7 +7974,7 @@ ] }, { - "uuid": "638012cb-350f-4a92-8705-c661fced5ed1", + "uuid": "e76271c6-2685-48e1-978c-01bc75db96a6", "control-id": "cis_rhel10_5-1.15", "description": "No notes for control-id 5.1.15.", "props": [ @@ -7967,7 +7991,7 @@ ] }, { - "uuid": "de6f198f-2a6c-4bb7-8e17-51194da4e853", + "uuid": "33a67eae-a16e-4d60-95c8-06e48f0fb1a7", "control-id": "cis_rhel10_5-1.16", "description": "No notes for control-id 5.1.16.", "props": [ @@ -7984,7 +8008,7 @@ ] }, { - "uuid": "f493b2a4-0050-4cf7-84ea-a381ad2d4469", + "uuid": "7e9251d7-b686-49de-aa88-631664ee9799", "control-id": "cis_rhel10_5-1.17", "description": "No notes for control-id 5.1.17.", "props": [ @@ -8001,7 +8025,7 @@ ] }, { - "uuid": "3325b516-2d31-4da4-8e57-ee527fbbb9be", + "uuid": "6bb44f00-f764-41f6-8a53-b0c158083c60", "control-id": "cis_rhel10_5-1.18", "description": "No notes for control-id 5.1.18.", "props": [ @@ -8018,7 +8042,7 @@ ] }, { - "uuid": "4e1f87cd-84af-40e1-aa34-41f4e98f2e7a", + "uuid": "6e3b4284-5e81-41b8-ab54-254ef02f739f", "control-id": "cis_rhel10_5-1.19", "description": "No notes for control-id 5.1.19.", "props": [ @@ -8035,7 +8059,7 @@ ] }, { - "uuid": "b57ee297-ff85-432a-9345-4342c9e8bf55", + "uuid": "663d348d-cc55-410b-8956-45b702126c3c", "control-id": "cis_rhel10_5-1.20", "description": "No notes for control-id 5.1.20.", "props": [ @@ -8052,7 +8076,7 @@ ] }, { - "uuid": "f0cb386b-ac1a-460b-a6ce-7575ed2b9745", + "uuid": "d39690ec-ad54-462c-a9b9-f82ffe7cb224", "control-id": "cis_rhel10_5-1.21", "description": "No notes for control-id 5.1.21.", "props": [ @@ -8069,7 +8093,7 @@ ] }, { - "uuid": "9c04f52f-1ea2-4a02-bdc6-581699ab802b", + "uuid": "08d4465b-ec69-4861-93b0-c705f6255ba6", "control-id": "cis_rhel10_5-1.22", "description": "No notes for control-id 5.1.22.", "props": [ @@ -8086,7 +8110,7 @@ ] }, { - "uuid": "646f9ab2-3d00-40e3-8f56-ab46b0049f67", + "uuid": "5019f10d-2d97-47cb-ad48-f05fe5f1d780", "control-id": "cis_rhel10_5-2.1", "description": "No notes for control-id 5.2.1.", "props": [ @@ -8103,7 +8127,7 @@ ] }, { - "uuid": "0e6fd26e-baae-419b-b7a5-289a5ce63f39", + "uuid": "17c3bd8b-31b9-42a5-960f-1826eb11a580", "control-id": "cis_rhel10_5-2.2", "description": "No notes for control-id 5.2.2.", "props": [ @@ -8120,7 +8144,7 @@ ] }, { - "uuid": "d41393e5-515e-4689-b773-13f49dec9473", + "uuid": "648054ab-af68-4dad-b3ff-c0b864ffbe24", "control-id": "cis_rhel10_5-2.3", "description": "No notes for control-id 5.2.3.", "props": [ @@ -8137,7 +8161,7 @@ ] }, { - "uuid": "60edd9f7-e14b-43a5-9894-32ae9320adb6", + "uuid": "155be212-23ba-4a86-b6ce-972e58ccae9b", "control-id": "cis_rhel10_5-2.5", "description": "No notes for control-id 5.2.5.", "props": [ @@ -8154,7 +8178,7 @@ ] }, { - "uuid": "fe9f3a2a-3077-4b78-a015-6d4c38b2bacc", + "uuid": "96310233-2257-4734-8a4b-a8b393d73f25", "control-id": "cis_rhel10_5-2.6", "description": "No notes for control-id 5.2.6.", "props": [ @@ -8171,7 +8195,7 @@ ] }, { - "uuid": "cca06061-fa55-43ad-aebc-c52f9fdb5bfa", + "uuid": "0b557a43-5c64-4abc-a943-41f8ade81eb9", "control-id": "cis_rhel10_5-2.7", "description": "Members of \"wheel\" or GID 0 groups are checked by default if the group option is not set for\npam_wheel.so module. The recommendation states the group should be empty to reinforce the\nuse of \"sudo\" for privileged access. Therefore, members of these groups should be manually\nchecked or a different group should be informed.", "props": [ @@ -8193,7 +8217,7 @@ ] }, { - "uuid": "8ba5bcab-aea2-4ae0-a420-b76cadd75f09", + "uuid": "aacb809e-2cad-4a89-95ac-c1ec3f34149c", "control-id": "cis_rhel10_5-3.1.1", "description": "This requirement is hard to be automated without any specific requirement. The policy even\nstates that provided commands are examples, other custom settings might be in place and the\nsettings might be different depending on site policies. The other rules will already make\nsure there is a correct autheselect profile regardless of the existing settings. It is\nnecessary to better discuss with CIS Community.", "props": [ @@ -8205,7 +8229,7 @@ ] }, { - "uuid": "e3816ed1-89b1-43ef-ad51-5beed8fc0a57", + "uuid": "0203c5a5-296a-423d-92e7-12f1fe3c76b1", "control-id": "cis_rhel10_5-3.1.2", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.1.", "props": [ @@ -8227,7 +8251,7 @@ ] }, { - "uuid": "0a0b4711-1bc2-4508-89e0-c90f02c5d47a", + "uuid": "9033d368-6dc5-49b6-93d6-7c8d8c97bd70", "control-id": "cis_rhel10_5-3.1.3", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.2.", "props": [ @@ -8254,7 +8278,7 @@ ] }, { - "uuid": "99eb3fb4-9864-4731-ab92-803adf5be2ea", + "uuid": "f52c51ea-9301-4c82-940e-f28c01fed7cd", "control-id": "cis_rhel10_5-3.1.4", "description": "The module is properly enabled by the rules mentioned in related_rules.\nRequirements in 5.3.2.3 use these rules.", "props": [ @@ -8266,7 +8290,7 @@ ] }, { - "uuid": "6b22b804-1910-453d-af24-94706e15eefd", + "uuid": "659bfd5d-4a78-4574-9330-e964f1219216", "control-id": "cis_rhel10_5-3.1.5", "description": "No notes for control-id 5.3.1.5.", "props": [ @@ -8283,7 +8307,7 @@ ] }, { - "uuid": "5176521d-d7a8-4c9e-9250-1e3c728ed041", + "uuid": "d93a3662-71f3-4eea-88a5-786dfbfa089b", "control-id": "cis_rhel10_5-3.2.1.1", "description": "No notes for control-id 5.3.2.1.1.", "props": [ @@ -8300,7 +8324,7 @@ ] }, { - "uuid": "cdebdc1e-bb31-4369-b224-6a479791c20d", + "uuid": "c35f218f-b824-43de-97f1-dbc91d2f95f8", "control-id": "cis_rhel10_5-3.2.1.2", "description": "The policy also accepts value 0, which means the locked accounts should be manually unlocked\nby an administrator. However, it also mentions that using value 0 can facilitate a DoS\nattack to legitimate users.", "props": [ @@ -8317,7 +8341,7 @@ ] }, { - "uuid": "fe219d15-9caf-4153-a32f-f9facca217c7", + "uuid": "cf22677b-c242-48e9-8145-a13e45443b9d", "control-id": "cis_rhel10_5-3.2.2.1", "description": "No notes for control-id 5.3.2.2.1.", "props": [ @@ -8334,7 +8358,7 @@ ] }, { - "uuid": "a53cf25e-86c3-4563-ade3-4a1fdc1170de", + "uuid": "df2763ba-171b-4d02-b8bc-837f1efbcddb", "control-id": "cis_rhel10_5-3.2.2.2", "description": "No notes for control-id 5.3.2.2.2.", "props": [ @@ -8351,7 +8375,7 @@ ] }, { - "uuid": "67cf4ddd-b185-451c-8d05-af36d817b605", + "uuid": "e63a89e0-a0d9-4293-a958-0245e0cadce7", "control-id": "cis_rhel10_5-3.2.2.3", "description": "This requirement is expected to be manual. However, in previous versions of the policy\nit was already automated the configuration of \"minclass\" option. This posture was kept for\nRHEL 10 in this new version. Rules related to other options are informed in related_rules.\nIn short, minclass=4 alone can achieve the same result achieved by the combination of the\nother 4 options mentioned in the policy.", "props": [ @@ -8368,7 +8392,7 @@ ] }, { - "uuid": "7372873f-9272-4deb-8197-c42bbe1df4c5", + "uuid": "406ded21-9431-4be6-9270-852dcf891b8c", "control-id": "cis_rhel10_5-3.2.2.4", "description": "No notes for control-id 5.3.2.2.4.", "props": [ @@ -8385,7 +8409,7 @@ ] }, { - "uuid": "6bce1e92-728f-4a6e-bfc8-9de6c5babde5", + "uuid": "bd05ee02-5035-4628-b21b-935991f09431", "control-id": "cis_rhel10_5-3.2.2.5", "description": "No notes for control-id 5.3.2.2.5.", "props": [ @@ -8402,7 +8426,7 @@ ] }, { - "uuid": "acb107c7-bcef-4747-a922-095323ab5af8", + "uuid": "3d6a65a9-e156-452a-8471-b8d3a30db9b5", "control-id": "cis_rhel10_5-3.2.2.6", "description": "No notes for control-id 5.3.2.2.6.", "props": [ @@ -8419,7 +8443,7 @@ ] }, { - "uuid": "549d0359-2a2d-4780-b89e-7598f7334464", + "uuid": "8417f693-8325-41b8-a9f8-03235654c169", "control-id": "cis_rhel10_5-3.2.2.7", "description": "No notes for control-id 5.3.2.2.7.", "props": [ @@ -8436,7 +8460,7 @@ ] }, { - "uuid": "3607fd91-f3c0-4a6a-852a-1058edafedb8", + "uuid": "8f4ae10b-5ac1-429a-84ff-5bf9659c87b3", "control-id": "cis_rhel10_5-3.2.3.1", "description": "Although mentioned in the section 5.3.3.3, there is no explicit requirement to configure\nretry option of pam_pwhistory. If come in the future, the rule accounts_password_pam_retry\ncan be used.", "props": [ @@ -8458,7 +8482,7 @@ ] }, { - "uuid": "a2180a0e-e72f-4ac6-9675-8f98870bb6f3", + "uuid": "816ba935-df04-486e-9300-6ebc6822b924", "control-id": "cis_rhel10_5-3.2.3.2", "description": "No notes for control-id 5.3.2.3.2.", "props": [ @@ -8475,7 +8499,7 @@ ] }, { - "uuid": "a7e4edd9-0583-48af-8742-169b1ad71fce", + "uuid": "b5202612-07c4-45aa-9118-8cbfaff19f5c", "control-id": "cis_rhel10_5-3.2.3.3", "description": "In RHEL 10 pam_pwhistory is enabled via authselect feature, as required in 5.3.1.4. The\nfeature automatically set \"use_authok\" option. In any case, we don't have a rule to check\nthis option specifically.", "props": [ @@ -8492,7 +8516,7 @@ ] }, { - "uuid": "1512144b-a59c-42f6-82ed-93fee577b9d1", + "uuid": "5917490b-9176-4bc9-9c28-65062206937e", "control-id": "cis_rhel10_5-3.2.4.1", "description": "The rule more specifically used in this requirement also satify the requirement 5.3.1.5.", "props": [ @@ -8509,7 +8533,7 @@ ] }, { - "uuid": "fa0e66e1-8e1b-4573-9db7-c4ea227c7c83", + "uuid": "218d0a36-436a-49ee-8018-6bc84be706ad", "control-id": "cis_rhel10_5-3.2.4.2", "description": "Usage of pam_unix.so module together with \"remember\" option is deprecated and is not\nrecommended by this policy. Instead, it should be used remember option of pam_pwhistory\nmodule, as required in 5.3.2.3.1. See here for more details about pam_unix.so:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1778929", "props": [ @@ -8526,7 +8550,7 @@ ] }, { - "uuid": "ccfcd1f4-22da-4d1b-bdcd-ded3373e171f", + "uuid": "3062fb5a-e920-4277-bca3-fa66c963a9da", "control-id": "cis_rhel10_5-3.2.4.3", "description": "Changes in logindefs mentioned in this requirement are more specifically covered by 5.4.1.4", "props": [ @@ -8548,7 +8572,7 @@ ] }, { - "uuid": "1783f2d8-7a90-40a8-8c88-4a7bd2c9d78d", + "uuid": "db36ec0f-0ed9-4a0e-b2e9-4cb9d015fe50", "control-id": "cis_rhel10_5-3.2.4.4", "description": "In RHEL 10 pam_unix is enabled by default in all authselect profiles already with the\nuse_authtok option set. In any case, we don't have a rule to check this option specifically,\nlike in 5.3.2.3.3.", "props": [ @@ -8565,7 +8589,7 @@ ] }, { - "uuid": "c04b2e49-956b-4f1c-a7e9-c08b647a1b54", + "uuid": "f23d9f4f-103b-4f0d-9954-75b8d9c48c3c", "control-id": "cis_rhel10_5-4.1.1", "description": "No notes for control-id 5.4.1.1.", "props": [ @@ -8587,7 +8611,7 @@ ] }, { - "uuid": "f7d6f1d6-0715-4059-92f8-f891a0a4fad6", + "uuid": "dfef2560-03cf-4045-9bc6-3b07f9a957f5", "control-id": "cis_rhel10_5-4.1.3", "description": "No notes for control-id 5.4.1.3.", "props": [ @@ -8609,7 +8633,7 @@ ] }, { - "uuid": "8729cd52-3931-4f53-ad56-6b3facef1582", + "uuid": "ef510436-454a-426d-9088-aa546f08d034", "control-id": "cis_rhel10_5-4.1.4", "description": "There's a \"new\" set of options in /etc/login.defs file to define the number of iterations\nperformed during the hashing process.", "props": [ @@ -8631,7 +8655,7 @@ ] }, { - "uuid": "98dfaae7-914d-41ca-87e8-690135d30c9b", + "uuid": "a18393fc-2a35-4e68-a9cf-cccfde15f138", "control-id": "cis_rhel10_5-4.1.5", "description": "No notes for control-id 5.4.1.5.", "props": [ @@ -8653,7 +8677,7 @@ ] }, { - "uuid": "c77045fe-c92b-4006-beaf-29dae5040ce6", + "uuid": "3055b407-9ebd-42f3-a98f-312fec63ff68", "control-id": "cis_rhel10_5-4.1.6", "description": "No notes for control-id 5.4.1.6.", "props": [ @@ -8670,7 +8694,7 @@ ] }, { - "uuid": "06c7e694-1db7-489f-9e70-75b9f6575a22", + "uuid": "376408ca-4e4b-4e2a-966f-c1f8f1c82b73", "control-id": "cis_rhel10_5-4.2.1", "description": "No notes for control-id 5.4.2.1.", "props": [ @@ -8687,7 +8711,7 @@ ] }, { - "uuid": "baa4dc42-b84d-498d-abcb-1dee2031e054", + "uuid": "e6020300-4083-434e-ac86-fdb020812001", "control-id": "cis_rhel10_5-4.2.2", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -8704,7 +8728,7 @@ ] }, { - "uuid": "58e0f37a-62dd-4097-aa59-fa7d06467053", + "uuid": "30eb4f22-d15e-42ac-a0cc-a338d96b6366", "control-id": "cis_rhel10_5-4.2.3", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -8721,7 +8745,7 @@ ] }, { - "uuid": "65aae962-3eee-466b-9b82-c91a6c96afec", + "uuid": "b03bdc76-ca53-494c-9bc3-86edf30dd49d", "control-id": "cis_rhel10_5-4.2.4", "description": "No notes for control-id 5.4.2.4.", "props": [ @@ -8738,7 +8762,7 @@ ] }, { - "uuid": "0315c6b7-7173-44a6-85b0-e822609863b2", + "uuid": "4125403a-94fa-4d78-bd1c-dd115b1a5bd8", "control-id": "cis_rhel10_5-4.2.5", "description": "No notes for control-id 5.4.2.5.", "props": [ @@ -8760,7 +8784,7 @@ ] }, { - "uuid": "0cf43bc1-57e9-4eae-94f1-b42d465ba605", + "uuid": "864539ea-0f2f-434c-8426-1bdfc7d06b14", "control-id": "cis_rhel10_5-4.2.6", "description": "No notes for control-id 5.4.2.6.", "props": [ @@ -8777,7 +8801,7 @@ ] }, { - "uuid": "4409f6a8-0c31-43be-9f6f-4c5d4f735aad", + "uuid": "306ccde7-b7e4-4d17-b57c-e6cd38514257", "control-id": "cis_rhel10_5-4.2.7", "description": "No notes for control-id 5.4.2.7.", "props": [ @@ -8799,19 +8823,24 @@ ] }, { - "uuid": "e6d30520-b326-4dcd-bc0b-eb63573f7c2d", + "uuid": "121ab8f4-2856-4c58-8bca-9b7b7b149f78", "control-id": "cis_rhel10_5-4.2.8", - "description": "New rule is necessary.", + "description": "No notes for control-id 5.4.2.8.", "props": [ { "name": "implementation-status", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "implemented" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "no_invalid_shell_accounts_unlocked" } ] }, { - "uuid": "2296775b-3cc1-4d9f-b606-c6ef5f2a42da", + "uuid": "41b4b057-c021-4233-a1ae-7afc05b0b8b6", "control-id": "cis_rhel10_5-4.3.2", "description": "No notes for control-id 5.4.3.2.", "props": [ @@ -8828,7 +8857,7 @@ ] }, { - "uuid": "4279755c-7304-4c34-983c-239cd71f612b", + "uuid": "43960514-bcda-4055-98ee-d5d3298554cd", "control-id": "cis_rhel10_5-4.3.3", "description": "No notes for control-id 5.4.3.3.", "props": [ @@ -8855,7 +8884,7 @@ ] }, { - "uuid": "dc1d533c-8eef-45be-a9ae-163273be80b6", + "uuid": "c87c30fb-dcb4-4e8c-b4be-e8f955ac7123", "control-id": "cis_rhel10_6-1.1", "description": "No notes for control-id 6.1.1.", "props": [ @@ -8877,7 +8906,7 @@ ] }, { - "uuid": "c0e9f410-71e8-421f-8223-653e88492f54", + "uuid": "20e54043-1e1a-4af4-bd96-e34b049fc62f", "control-id": "cis_rhel10_6-1.2", "description": "No notes for control-id 6.1.2.", "props": [ @@ -8894,7 +8923,7 @@ ] }, { - "uuid": "011605ad-d1d9-48be-830a-9baeecf80062", + "uuid": "62996004-1bf9-47a5-9fc8-e5f76f914515", "control-id": "cis_rhel10_6-1.3", "description": "No notes for control-id 6.1.3.", "props": [ @@ -8911,7 +8940,7 @@ ] }, { - "uuid": "be2e971e-7bef-4034-bcc7-891e5647d693", + "uuid": "93684fc0-1cc2-4015-981c-3535bc87d6c1", "control-id": "cis_rhel10_6-2.1.1", "description": "No notes for control-id 6.2.1.1.", "props": [ @@ -8928,7 +8957,7 @@ ] }, { - "uuid": "f2be1745-cd6e-4d5b-b7e0-2bc41caa3f53", + "uuid": "e6e19614-5218-4cc5-88f9-8a96b49f5145", "control-id": "cis_rhel10_6-2.1.2", "description": "The description for control-id cis_rhel10_6-2.1.2.", "props": [ @@ -8941,7 +8970,7 @@ ] }, { - "uuid": "e11fd7dc-4a63-4b5e-9f5d-40d132de580d", + "uuid": "545e3e6c-00c7-468c-8272-ea87fa106f0e", "control-id": "cis_rhel10_6-2.1.3", "description": "The description for control-id cis_rhel10_6-2.1.3.", "props": [ @@ -8954,20 +8983,24 @@ ] }, { - "uuid": "35595054-6a49-44f3-a51e-71bc7ce70eb4", + "uuid": "a379d0cf-bcab-4399-b60c-b0895167b3ef", "control-id": "cis_rhel10_6-2.1.4", - "description": "The description for control-id cis_rhel10_6-2.1.4.", + "description": "No notes for control-id 6.2.1.4.", "props": [ { "name": "implementation-status", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "alternative", - "remarks": "It is necessary to create a new rule to check the status of journald and rsyslog.\nIt would also be necessary a new rule to disable or remove rsyslog." + "value": "implemented" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "ensure_journald_and_rsyslog_not_active_together" } ] }, { - "uuid": "cb6ac739-3d9a-4df1-bd25-abfe2d647986", + "uuid": "d808ad0a-afa9-45c4-9941-4141724b5fc0", "control-id": "cis_rhel10_6-2.2.1.1", "description": "No notes for control-id 6.2.2.1.1.", "props": [ @@ -8984,7 +9017,7 @@ ] }, { - "uuid": "0fcb48a2-1a6c-464b-9075-8990de3cffd5", + "uuid": "810d7e80-e123-4d92-b5d6-6f4dcb2f1a6f", "control-id": "cis_rhel10_6-2.2.1.2", "description": "The description for control-id cis_rhel10_6-2.2.1.2.", "props": [ @@ -8997,7 +9030,7 @@ ] }, { - "uuid": "b8203bf1-7218-47f5-8512-e6efa938f78e", + "uuid": "c3978c22-66a6-4688-a30c-c03ed6655af5", "control-id": "cis_rhel10_6-2.2.1.3", "description": "No notes for control-id 6.2.2.1.3.", "props": [ @@ -9014,7 +9047,7 @@ ] }, { - "uuid": "18849776-ad5c-4ca2-b4d8-4c400dbc8e79", + "uuid": "aef28fe1-ae9f-481a-9594-9f875b367327", "control-id": "cis_rhel10_6-2.2.1.4", "description": "No notes for control-id 6.2.2.1.4.", "props": [ @@ -9031,7 +9064,7 @@ ] }, { - "uuid": "091bbacc-2825-4e46-9216-ea1555f06e0a", + "uuid": "50b77de1-3431-46a0-8415-9ca7376caa47", "control-id": "cis_rhel10_6-2.2.2", "description": "No notes for control-id 6.2.2.2.", "props": [ @@ -9048,7 +9081,7 @@ ] }, { - "uuid": "af06ef40-7563-4424-b4a9-0a26bcb09158", + "uuid": "4d2cacfe-505b-4753-bb23-1cb1bc87f87d", "control-id": "cis_rhel10_6-2.2.3", "description": "No notes for control-id 6.2.2.3.", "props": [ @@ -9065,7 +9098,7 @@ ] }, { - "uuid": "a34e24c5-f01c-42b2-bde6-d78a202d98bc", + "uuid": "78470d8f-60a0-449a-903f-392bc4dd3f6d", "control-id": "cis_rhel10_6-2.2.4", "description": "No notes for control-id 6.2.2.4.", "props": [ @@ -9082,7 +9115,7 @@ ] }, { - "uuid": "6aa54fdf-73fb-4d81-b11a-affc24308d11", + "uuid": "0ec0402f-a12f-4af0-b824-0aeacb71636a", "control-id": "cis_rhel10_6-2.3.1", "description": "No notes for control-id 6.2.3.1.", "props": [ @@ -9094,7 +9127,7 @@ ] }, { - "uuid": "a6d35f8a-d1fa-45c7-9a56-d81501b8fea7", + "uuid": "9fdf9a5d-ce18-4b71-97fe-f80f4d64d755", "control-id": "cis_rhel10_6-2.3.2", "description": "No notes for control-id 6.2.3.2.", "props": [ @@ -9106,7 +9139,7 @@ ] }, { - "uuid": "9b1c6719-b7c6-461a-bbed-00b8006799fb", + "uuid": "a13b88ca-e228-4e6e-8b9c-77f0f9facaec", "control-id": "cis_rhel10_6-2.3.3", "description": "No notes for control-id 6.2.3.3.", "props": [ @@ -9118,7 +9151,7 @@ ] }, { - "uuid": "10df7c08-617c-4eb3-b2f7-d75b169d624d", + "uuid": "7a0785fe-3c73-44ff-b0ae-6edfac323ae5", "control-id": "cis_rhel10_6-2.3.4", "description": "No notes for control-id 6.2.3.4.", "props": [ @@ -9130,7 +9163,7 @@ ] }, { - "uuid": "ce84d7be-f0f4-4089-9dd1-3add45dffede", + "uuid": "ccc02cde-bfe0-4d30-869b-1c625d72e27e", "control-id": "cis_rhel10_6-2.3.5", "description": "The description for control-id cis_rhel10_6-2.3.5.", "props": [ @@ -9143,7 +9176,7 @@ ] }, { - "uuid": "80feffe9-0427-433f-83de-9b8d99070494", + "uuid": "2b5218ef-1c63-407c-b3ef-671283d85706", "control-id": "cis_rhel10_6-2.3.6", "description": "The description for control-id cis_rhel10_6-2.3.6.", "props": [ @@ -9156,7 +9189,7 @@ ] }, { - "uuid": "6807b8b5-edda-42b9-9fce-05695c37a6d5", + "uuid": "0a7bd6d7-45b9-4772-a169-d53def63a49c", "control-id": "cis_rhel10_6-2.3.7", "description": "No notes for control-id 6.2.3.7.", "props": [ @@ -9168,7 +9201,7 @@ ] }, { - "uuid": "78be3ac8-74e7-42e4-ac01-5b58978ed56d", + "uuid": "cfa77e5f-36c3-4b52-a1b0-352aab2df50d", "control-id": "cis_rhel10_6-2.3.8", "description": "The description for control-id cis_rhel10_6-2.3.8.", "props": [ @@ -9181,7 +9214,7 @@ ] }, { - "uuid": "59c8f4b3-17fc-4407-8900-256ea38939ed", + "uuid": "25da556c-4fd9-4c26-9eea-867031aa861c", "control-id": "cis_rhel10_6-2.4.1", "description": "It is not harmful to run these rules even if rsyslog is not installed or active.", "props": [ @@ -9208,7 +9241,7 @@ ] }, { - "uuid": "9594c2e0-b71f-4868-8bb5-ca87bf357fd1", + "uuid": "33e41a07-9678-4eca-902a-bdb7fd162f7d", "control-id": "cis_rhel10_7-1.1", "description": "No notes for control-id 7.1.1.", "props": [ @@ -9235,7 +9268,7 @@ ] }, { - "uuid": "4fe73091-20eb-4f94-844c-c6e1fc06b2d9", + "uuid": "6b3f25fd-1b61-42c4-96b3-887a28d307d3", "control-id": "cis_rhel10_7-1.2", "description": "No notes for control-id 7.1.2.", "props": [ @@ -9262,7 +9295,7 @@ ] }, { - "uuid": "bf8c08c7-7027-4235-b6a8-e4eb78cf3e6c", + "uuid": "b79172d5-e1ba-4416-80d2-1effda6d77e7", "control-id": "cis_rhel10_7-1.3", "description": "No notes for control-id 7.1.3.", "props": [ @@ -9289,7 +9322,7 @@ ] }, { - "uuid": "7e0883bb-c909-463a-9109-33b6abb10c78", + "uuid": "e4f0a145-8f94-40c4-a4cf-757a958d8f9a", "control-id": "cis_rhel10_7-1.4", "description": "No notes for control-id 7.1.4.", "props": [ @@ -9316,7 +9349,7 @@ ] }, { - "uuid": "10c3239f-22eb-4676-9675-de74a92e8a45", + "uuid": "b0c4351a-b3d5-4f74-b4c0-53d5ecd79b01", "control-id": "cis_rhel10_7-1.5", "description": "No notes for control-id 7.1.5.", "props": [ @@ -9343,7 +9376,7 @@ ] }, { - "uuid": "671ff6ec-d4af-4474-bc4b-b128c3691a61", + "uuid": "c8b98624-9bc9-4895-90c3-fd3ae886e25c", "control-id": "cis_rhel10_7-1.6", "description": "No notes for control-id 7.1.6.", "props": [ @@ -9370,7 +9403,7 @@ ] }, { - "uuid": "2891408c-eef8-494d-98c3-93144e631485", + "uuid": "9a8d19a4-8e2d-4a1a-9a5d-fcef0a33330e", "control-id": "cis_rhel10_7-1.7", "description": "No notes for control-id 7.1.7.", "props": [ @@ -9397,7 +9430,7 @@ ] }, { - "uuid": "6a9260ae-9da1-4895-9020-1818320e39a0", + "uuid": "e9f08f97-c0eb-40cb-88c7-f917cd2ce0e9", "control-id": "cis_rhel10_7-1.8", "description": "No notes for control-id 7.1.8.", "props": [ @@ -9424,7 +9457,7 @@ ] }, { - "uuid": "82c1bda3-a4c2-449e-9035-c41936364929", + "uuid": "3b39e046-c552-4da6-9689-a0abfd0e94c0", "control-id": "cis_rhel10_7-1.9", "description": "No notes for control-id 7.1.9.", "props": [ @@ -9451,7 +9484,7 @@ ] }, { - "uuid": "456b8242-8e38-4f87-8df1-9c1d900c27e2", + "uuid": "22c05cca-2447-49b7-8c76-3ed3282e6309", "control-id": "cis_rhel10_7-1.10", "description": "No notes for control-id 7.1.10.", "props": [ @@ -9493,7 +9526,7 @@ ] }, { - "uuid": "f2b239aa-9230-498c-b4ba-7de5620aa292", + "uuid": "b7041267-b64d-4962-af24-1c6d9be4b110", "control-id": "cis_rhel10_7-1.11", "description": "No notes for control-id 7.1.11.", "props": [ @@ -9515,7 +9548,7 @@ ] }, { - "uuid": "f6b2a0ba-b6e0-4eb5-8098-c8c599b292b6", + "uuid": "eefbe65e-bd7b-4742-ac61-2cab5146f9a1", "control-id": "cis_rhel10_7-1.12", "description": "No notes for control-id 7.1.12.", "props": [ @@ -9537,7 +9570,7 @@ ] }, { - "uuid": "d4818c2e-c801-4422-8674-f21f074805d5", + "uuid": "a55b1d4b-874c-4309-a26f-9247cbc207c7", "control-id": "cis_rhel10_7-1.13", "description": "The description for control-id cis_rhel10_7-1.13.", "props": [ @@ -9550,7 +9583,7 @@ ] }, { - "uuid": "7f5857d1-57c6-4fef-9626-fd209d1ae1e9", + "uuid": "3ffcca71-b144-40b1-b5ec-23ac5a32d735", "control-id": "cis_rhel10_7-2.1", "description": "No notes for control-id 7.2.1.", "props": [ @@ -9567,7 +9600,7 @@ ] }, { - "uuid": "91b5de63-1739-4f98-a20d-2f1dc09ab1ca", + "uuid": "6b31c4e0-ba9c-4c99-a586-598a526b3c10", "control-id": "cis_rhel10_7-2.2", "description": "No notes for control-id 7.2.2.", "props": [ @@ -9584,7 +9617,7 @@ ] }, { - "uuid": "39208f53-ebe4-4842-b0e4-26632823c776", + "uuid": "ddb14fd1-3fb1-4892-93fa-412f2f6f3873", "control-id": "cis_rhel10_7-2.3", "description": "No notes for control-id 7.2.3.", "props": [ @@ -9601,7 +9634,7 @@ ] }, { - "uuid": "ff424e0d-a972-4de2-994f-1ac3c72784fa", + "uuid": "ef5b7c5d-d611-4ffd-8031-70abd2754247", "control-id": "cis_rhel10_7-2.4", "description": "No notes for control-id 7.2.4.", "props": [ @@ -9618,7 +9651,7 @@ ] }, { - "uuid": "e0bb9134-c35d-4f8c-bd5a-01ee7f82caca", + "uuid": "0bcabb4e-4980-44b7-af8d-2b908d7d2031", "control-id": "cis_rhel10_7-2.5", "description": "No notes for control-id 7.2.5.", "props": [ @@ -9635,7 +9668,7 @@ ] }, { - "uuid": "54d80d20-0568-489b-b544-87bdff724d0d", + "uuid": "b1ec177c-4919-4d4c-acd3-9318f38ff066", "control-id": "cis_rhel10_7-2.6", "description": "No notes for control-id 7.2.6.", "props": [ @@ -9652,7 +9685,7 @@ ] }, { - "uuid": "23fff9ff-fd25-4cf1-881e-c7276fe5d509", + "uuid": "b9643b66-088b-4376-80fe-a52373cf57ed", "control-id": "cis_rhel10_7-2.7", "description": "No notes for control-id 7.2.7.", "props": [ @@ -9669,7 +9702,7 @@ ] }, { - "uuid": "7faee12c-547a-4dce-b04e-1fda39fb0624", + "uuid": "d53339a3-34bd-4dfa-b8a9-d5765522acc2", "control-id": "cis_rhel10_7-2.8", "description": "No notes for control-id 7.2.8.", "props": [ @@ -9696,7 +9729,7 @@ ] }, { - "uuid": "1f5c56be-d83f-4867-adc8-5723986f5e8b", + "uuid": "a3ad7781-0424-4df5-afe2-f30b4375d056", "control-id": "cis_rhel10_7-2.9", "description": "No notes for control-id 7.2.9.", "props": [ @@ -16642,1759 +16675,1807 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_tmout", + "value": "no_invalid_shell_accounts_unlocked", "remarks": "rule_set_244" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Interactive Session Timeout", + "value": "Verify Non-Interactive Accounts Are Locked", "remarks": "rule_set_244" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_tmout", + "value": "no_invalid_shell_accounts_unlocked", "remarks": "rule_set_244" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Interactive Session Timeout", + "value": "Verify Non-Interactive Accounts Are Locked", "remarks": "rule_set_244" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_bashrc", + "value": "accounts_tmout", "remarks": "rule_set_245" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Bash Umask is Set Correctly", + "value": "Set Interactive Session Timeout", "remarks": "rule_set_245" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_bashrc", + "value": "accounts_tmout", "remarks": "rule_set_245" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Bash Umask is Set Correctly", + "value": "Set Interactive Session Timeout", "remarks": "rule_set_245" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_login_defs", + "value": "accounts_umask_etc_bashrc", "remarks": "rule_set_246" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Umask is Set Correctly in login.defs", + "value": "Ensure the Default Bash Umask is Set Correctly", "remarks": "rule_set_246" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_login_defs", + "value": "accounts_umask_etc_bashrc", "remarks": "rule_set_246" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Umask is Set Correctly in login.defs", + "value": "Ensure the Default Bash Umask is Set Correctly", "remarks": "rule_set_246" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_profile", + "value": "accounts_umask_etc_login_defs", "remarks": "rule_set_247" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Umask is Set Correctly in /etc/profile", + "value": "Ensure the Default Umask is Set Correctly in login.defs", "remarks": "rule_set_247" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_profile", + "value": "accounts_umask_etc_login_defs", "remarks": "rule_set_247" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Umask is Set Correctly in /etc/profile", + "value": "Ensure the Default Umask is Set Correctly in login.defs", "remarks": "rule_set_247" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_aide_installed", + "value": "accounts_umask_etc_profile", "remarks": "rule_set_248" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install AIDE", + "value": "Ensure the Default Umask is Set Correctly in /etc/profile", "remarks": "rule_set_248" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_aide_installed", + "value": "accounts_umask_etc_profile", "remarks": "rule_set_248" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install AIDE", + "value": "Ensure the Default Umask is Set Correctly in /etc/profile", "remarks": "rule_set_248" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_build_database", + "value": "package_aide_installed", "remarks": "rule_set_249" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Build and Test AIDE Database", + "value": "Install AIDE", "remarks": "rule_set_249" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_build_database", + "value": "package_aide_installed", "remarks": "rule_set_249" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Build and Test AIDE Database", + "value": "Install AIDE", "remarks": "rule_set_249" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_periodic_cron_checking", + "value": "aide_build_database", "remarks": "rule_set_250" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Periodic Execution of AIDE", + "value": "Build and Test AIDE Database", "remarks": "rule_set_250" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_periodic_cron_checking", + "value": "aide_build_database", "remarks": "rule_set_250" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Periodic Execution of AIDE", + "value": "Build and Test AIDE Database", "remarks": "rule_set_250" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_check_audit_tools", + "value": "aide_periodic_cron_checking", "remarks": "rule_set_251" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure AIDE to Verify the Audit Tools", + "value": "Configure Periodic Execution of AIDE", "remarks": "rule_set_251" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_check_audit_tools", + "value": "aide_periodic_cron_checking", "remarks": "rule_set_251" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure AIDE to Verify the Audit Tools", + "value": "Configure Periodic Execution of AIDE", "remarks": "rule_set_251" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_systemd-journald_enabled", + "value": "aide_check_audit_tools", "remarks": "rule_set_252" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable systemd-journald Service", + "value": "Configure AIDE to Verify the Audit Tools", "remarks": "rule_set_252" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_systemd-journald_enabled", + "value": "aide_check_audit_tools", "remarks": "rule_set_252" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable systemd-journald Service", + "value": "Configure AIDE to Verify the Audit Tools", "remarks": "rule_set_252" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_systemd-journal-remote_installed", + "value": "service_systemd-journald_enabled", "remarks": "rule_set_253" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install systemd-journal-remote Package", + "value": "Enable systemd-journald Service", "remarks": "rule_set_253" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_systemd-journal-remote_installed", + "value": "service_systemd-journald_enabled", "remarks": "rule_set_253" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install systemd-journal-remote Package", + "value": "Enable systemd-journald Service", "remarks": "rule_set_253" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_systemd-journal-upload_enabled", + "value": "ensure_journald_and_rsyslog_not_active_together", "remarks": "rule_set_254" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable systemd-journal-upload Service", + "value": "Ensure journald and rsyslog Are Not Active Together", "remarks": "rule_set_254" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_systemd-journal-upload_enabled", + "value": "ensure_journald_and_rsyslog_not_active_together", "remarks": "rule_set_254" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable systemd-journal-upload Service", + "value": "Ensure journald and rsyslog Are Not Active Together", "remarks": "rule_set_254" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "socket_systemd-journal-remote_disabled", + "value": "package_systemd-journal-remote_installed", "remarks": "rule_set_255" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable systemd-journal-remote Socket", + "value": "Install systemd-journal-remote Package", "remarks": "rule_set_255" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "socket_systemd-journal-remote_disabled", + "value": "package_systemd-journal-remote_installed", "remarks": "rule_set_255" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable systemd-journal-remote Socket", + "value": "Install systemd-journal-remote Package", "remarks": "rule_set_255" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_disable_forward_to_syslog", + "value": "service_systemd-journal-upload_enabled", "remarks": "rule_set_256" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald ForwardToSyslog is disabled", + "value": "Enable systemd-journal-upload Service", "remarks": "rule_set_256" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_disable_forward_to_syslog", + "value": "service_systemd-journal-upload_enabled", "remarks": "rule_set_256" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald ForwardToSyslog is disabled", + "value": "Enable systemd-journal-upload Service", "remarks": "rule_set_256" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_compress", + "value": "socket_systemd-journal-remote_disabled", "remarks": "rule_set_257" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald is configured to compress large log files", + "value": "Disable systemd-journal-remote Socket", "remarks": "rule_set_257" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_compress", + "value": "socket_systemd-journal-remote_disabled", "remarks": "rule_set_257" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald is configured to compress large log files", + "value": "Disable systemd-journal-remote Socket", "remarks": "rule_set_257" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_storage", + "value": "journald_disable_forward_to_syslog", "remarks": "rule_set_258" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald is configured to write log files to persistent disk", + "value": "Ensure journald ForwardToSyslog is disabled", "remarks": "rule_set_258" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_storage", + "value": "journald_disable_forward_to_syslog", "remarks": "rule_set_258" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald is configured to write log files to persistent disk", + "value": "Ensure journald ForwardToSyslog is disabled", "remarks": "rule_set_258" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_groupownership", + "value": "journald_compress", "remarks": "rule_set_259" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Log Files Are Owned By Appropriate Group", + "value": "Ensure journald is configured to compress large log files", "remarks": "rule_set_259" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_groupownership", + "value": "journald_compress", "remarks": "rule_set_259" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Log Files Are Owned By Appropriate Group", + "value": "Ensure journald is configured to compress large log files", "remarks": "rule_set_259" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_ownership", + "value": "journald_storage", "remarks": "rule_set_260" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Log Files Are Owned By Appropriate User", + "value": "Ensure journald is configured to write log files to persistent disk", "remarks": "rule_set_260" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_ownership", + "value": "journald_storage", "remarks": "rule_set_260" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Log Files Are Owned By Appropriate User", + "value": "Ensure journald is configured to write log files to persistent disk", "remarks": "rule_set_260" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_permissions", + "value": "rsyslog_files_groupownership", "remarks": "rule_set_261" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure System Log Files Have Correct Permissions", + "value": "Ensure Log Files Are Owned By Appropriate Group", "remarks": "rule_set_261" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_permissions", + "value": "rsyslog_files_groupownership", "remarks": "rule_set_261" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure System Log Files Have Correct Permissions", + "value": "Ensure Log Files Are Owned By Appropriate Group", "remarks": "rule_set_261" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_passwd", + "value": "rsyslog_files_ownership", "remarks": "rule_set_262" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns passwd File", + "value": "Ensure Log Files Are Owned By Appropriate User", "remarks": "rule_set_262" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_passwd", + "value": "rsyslog_files_ownership", "remarks": "rule_set_262" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns passwd File", + "value": "Ensure Log Files Are Owned By Appropriate User", "remarks": "rule_set_262" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_passwd", + "value": "rsyslog_files_permissions", "remarks": "rule_set_263" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns passwd File", + "value": "Ensure System Log Files Have Correct Permissions", "remarks": "rule_set_263" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_passwd", + "value": "rsyslog_files_permissions", "remarks": "rule_set_263" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns passwd File", + "value": "Ensure System Log Files Have Correct Permissions", "remarks": "rule_set_263" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_passwd", + "value": "file_groupowner_etc_passwd", "remarks": "rule_set_264" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on passwd File", + "value": "Verify Group Who Owns passwd File", "remarks": "rule_set_264" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_passwd", + "value": "file_groupowner_etc_passwd", "remarks": "rule_set_264" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on passwd File", + "value": "Verify Group Who Owns passwd File", "remarks": "rule_set_264" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_passwd", + "value": "file_owner_etc_passwd", "remarks": "rule_set_265" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup passwd File", + "value": "Verify User Who Owns passwd File", "remarks": "rule_set_265" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_passwd", + "value": "file_owner_etc_passwd", "remarks": "rule_set_265" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup passwd File", + "value": "Verify User Who Owns passwd File", "remarks": "rule_set_265" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_passwd", + "value": "file_permissions_etc_passwd", "remarks": "rule_set_266" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup passwd File", + "value": "Verify Permissions on passwd File", "remarks": "rule_set_266" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_passwd", + "value": "file_permissions_etc_passwd", "remarks": "rule_set_266" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup passwd File", + "value": "Verify Permissions on passwd File", "remarks": "rule_set_266" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_passwd", + "value": "file_groupowner_backup_etc_passwd", "remarks": "rule_set_267" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup passwd File", + "value": "Verify Group Who Owns Backup passwd File", "remarks": "rule_set_267" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_passwd", + "value": "file_groupowner_backup_etc_passwd", "remarks": "rule_set_267" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup passwd File", + "value": "Verify Group Who Owns Backup passwd File", "remarks": "rule_set_267" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_group", + "value": "file_owner_backup_etc_passwd", "remarks": "rule_set_268" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns group File", + "value": "Verify User Who Owns Backup passwd File", "remarks": "rule_set_268" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_group", + "value": "file_owner_backup_etc_passwd", "remarks": "rule_set_268" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns group File", + "value": "Verify User Who Owns Backup passwd File", "remarks": "rule_set_268" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_group", + "value": "file_permissions_backup_etc_passwd", "remarks": "rule_set_269" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns group File", + "value": "Verify Permissions on Backup passwd File", "remarks": "rule_set_269" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_group", + "value": "file_permissions_backup_etc_passwd", "remarks": "rule_set_269" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns group File", + "value": "Verify Permissions on Backup passwd File", "remarks": "rule_set_269" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_group", + "value": "file_groupowner_etc_group", "remarks": "rule_set_270" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on group File", + "value": "Verify Group Who Owns group File", "remarks": "rule_set_270" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_group", + "value": "file_groupowner_etc_group", "remarks": "rule_set_270" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on group File", + "value": "Verify Group Who Owns group File", "remarks": "rule_set_270" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_group", + "value": "file_owner_etc_group", "remarks": "rule_set_271" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup group File", + "value": "Verify User Who Owns group File", "remarks": "rule_set_271" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_group", + "value": "file_owner_etc_group", "remarks": "rule_set_271" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup group File", + "value": "Verify User Who Owns group File", "remarks": "rule_set_271" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_group", + "value": "file_permissions_etc_group", "remarks": "rule_set_272" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup group File", + "value": "Verify Permissions on group File", "remarks": "rule_set_272" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_group", + "value": "file_permissions_etc_group", "remarks": "rule_set_272" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup group File", + "value": "Verify Permissions on group File", "remarks": "rule_set_272" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_group", + "value": "file_groupowner_backup_etc_group", "remarks": "rule_set_273" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup group File", + "value": "Verify Group Who Owns Backup group File", "remarks": "rule_set_273" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_group", + "value": "file_groupowner_backup_etc_group", "remarks": "rule_set_273" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup group File", + "value": "Verify Group Who Owns Backup group File", "remarks": "rule_set_273" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_shadow", + "value": "file_owner_backup_etc_group", "remarks": "rule_set_274" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns shadow File", + "value": "Verify User Who Owns Backup group File", "remarks": "rule_set_274" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_shadow", + "value": "file_owner_backup_etc_group", "remarks": "rule_set_274" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns shadow File", + "value": "Verify User Who Owns Backup group File", "remarks": "rule_set_274" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_shadow", + "value": "file_permissions_backup_etc_group", "remarks": "rule_set_275" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns shadow File", + "value": "Verify Permissions on Backup group File", "remarks": "rule_set_275" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_shadow", + "value": "file_permissions_backup_etc_group", "remarks": "rule_set_275" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns shadow File", + "value": "Verify Permissions on Backup group File", "remarks": "rule_set_275" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_shadow", + "value": "file_owner_etc_shadow", "remarks": "rule_set_276" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on shadow File", + "value": "Verify User Who Owns shadow File", "remarks": "rule_set_276" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_shadow", + "value": "file_owner_etc_shadow", "remarks": "rule_set_276" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on shadow File", + "value": "Verify User Who Owns shadow File", "remarks": "rule_set_276" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_shadow", + "value": "file_groupowner_etc_shadow", "remarks": "rule_set_277" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup shadow File", + "value": "Verify Group Who Owns shadow File", "remarks": "rule_set_277" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_shadow", + "value": "file_groupowner_etc_shadow", "remarks": "rule_set_277" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup shadow File", + "value": "Verify Group Who Owns shadow File", "remarks": "rule_set_277" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_shadow", + "value": "file_permissions_etc_shadow", "remarks": "rule_set_278" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup shadow File", + "value": "Verify Permissions on shadow File", "remarks": "rule_set_278" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_shadow", + "value": "file_permissions_etc_shadow", "remarks": "rule_set_278" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup shadow File", + "value": "Verify Permissions on shadow File", "remarks": "rule_set_278" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_shadow", + "value": "file_groupowner_backup_etc_shadow", "remarks": "rule_set_279" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup shadow File", + "value": "Verify User Who Owns Backup shadow File", "remarks": "rule_set_279" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_shadow", + "value": "file_groupowner_backup_etc_shadow", "remarks": "rule_set_279" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup shadow File", + "value": "Verify User Who Owns Backup shadow File", "remarks": "rule_set_279" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_gshadow", + "value": "file_owner_backup_etc_shadow", "remarks": "rule_set_280" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns gshadow File", + "value": "Verify Group Who Owns Backup shadow File", "remarks": "rule_set_280" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_gshadow", + "value": "file_owner_backup_etc_shadow", "remarks": "rule_set_280" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns gshadow File", + "value": "Verify Group Who Owns Backup shadow File", "remarks": "rule_set_280" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_gshadow", + "value": "file_permissions_backup_etc_shadow", "remarks": "rule_set_281" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns gshadow File", + "value": "Verify Permissions on Backup shadow File", "remarks": "rule_set_281" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_gshadow", + "value": "file_permissions_backup_etc_shadow", "remarks": "rule_set_281" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns gshadow File", + "value": "Verify Permissions on Backup shadow File", "remarks": "rule_set_281" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_gshadow", + "value": "file_groupowner_etc_gshadow", "remarks": "rule_set_282" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on gshadow File", + "value": "Verify Group Who Owns gshadow File", "remarks": "rule_set_282" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_gshadow", + "value": "file_groupowner_etc_gshadow", "remarks": "rule_set_282" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on gshadow File", + "value": "Verify Group Who Owns gshadow File", "remarks": "rule_set_282" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_gshadow", + "value": "file_owner_etc_gshadow", "remarks": "rule_set_283" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup gshadow File", + "value": "Verify User Who Owns gshadow File", "remarks": "rule_set_283" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_gshadow", + "value": "file_owner_etc_gshadow", "remarks": "rule_set_283" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup gshadow File", + "value": "Verify User Who Owns gshadow File", "remarks": "rule_set_283" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_gshadow", + "value": "file_permissions_etc_gshadow", "remarks": "rule_set_284" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup gshadow File", + "value": "Verify Permissions on gshadow File", "remarks": "rule_set_284" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_gshadow", + "value": "file_permissions_etc_gshadow", "remarks": "rule_set_284" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup gshadow File", + "value": "Verify Permissions on gshadow File", "remarks": "rule_set_284" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_gshadow", + "value": "file_groupowner_backup_etc_gshadow", + "remarks": "rule_set_285" + }, + { + "name": "Rule_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Verify Group Who Owns Backup gshadow File", "remarks": "rule_set_285" }, + { + "name": "Check_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "file_groupowner_backup_etc_gshadow", + "remarks": "rule_set_285" + }, + { + "name": "Check_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Verify Group Who Owns Backup gshadow File", + "remarks": "rule_set_285" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "file_owner_backup_etc_gshadow", + "remarks": "rule_set_286" + }, + { + "name": "Rule_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Verify User Who Owns Backup gshadow File", + "remarks": "rule_set_286" + }, + { + "name": "Check_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "file_owner_backup_etc_gshadow", + "remarks": "rule_set_286" + }, + { + "name": "Check_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Verify User Who Owns Backup gshadow File", + "remarks": "rule_set_286" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "file_permissions_backup_etc_gshadow", + "remarks": "rule_set_287" + }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup gshadow File", - "remarks": "rule_set_285" + "remarks": "rule_set_287" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_gshadow", - "remarks": "rule_set_285" + "remarks": "rule_set_287" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup gshadow File", - "remarks": "rule_set_285" + "remarks": "rule_set_287" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shells", - "remarks": "rule_set_286" + "remarks": "rule_set_288" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/shells File", - "remarks": "rule_set_286" + "remarks": "rule_set_288" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shells", - "remarks": "rule_set_286" + "remarks": "rule_set_288" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/shells File", - "remarks": "rule_set_286" + "remarks": "rule_set_288" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shells", - "remarks": "rule_set_287" + "remarks": "rule_set_289" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Who Owns /etc/shells File", - "remarks": "rule_set_287" + "remarks": "rule_set_289" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shells", - "remarks": "rule_set_287" + "remarks": "rule_set_289" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Who Owns /etc/shells File", - "remarks": "rule_set_287" + "remarks": "rule_set_289" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shells", - "remarks": "rule_set_288" + "remarks": "rule_set_290" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/shells File", - "remarks": "rule_set_288" + "remarks": "rule_set_290" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shells", - "remarks": "rule_set_288" + "remarks": "rule_set_290" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/shells File", - "remarks": "rule_set_288" + "remarks": "rule_set_290" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd", - "remarks": "rule_set_289" + "remarks": "rule_set_291" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd File", - "remarks": "rule_set_289" + "remarks": "rule_set_291" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd", - "remarks": "rule_set_289" + "remarks": "rule_set_291" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd File", - "remarks": "rule_set_289" + "remarks": "rule_set_291" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd", - "remarks": "rule_set_290" + "remarks": "rule_set_292" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd File", - "remarks": "rule_set_290" + "remarks": "rule_set_292" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd", - "remarks": "rule_set_290" + "remarks": "rule_set_292" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd File", - "remarks": "rule_set_290" + "remarks": "rule_set_292" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd", - "remarks": "rule_set_291" + "remarks": "rule_set_293" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd File", - "remarks": "rule_set_291" + "remarks": "rule_set_293" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd", - "remarks": "rule_set_291" + "remarks": "rule_set_293" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd File", - "remarks": "rule_set_291" + "remarks": "rule_set_293" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd_old", - "remarks": "rule_set_292" + "remarks": "rule_set_294" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_292" + "remarks": "rule_set_294" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd_old", - "remarks": "rule_set_292" + "remarks": "rule_set_294" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_292" + "remarks": "rule_set_294" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd_old", - "remarks": "rule_set_293" + "remarks": "rule_set_295" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_293" + "remarks": "rule_set_295" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd_old", - "remarks": "rule_set_293" + "remarks": "rule_set_295" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_293" + "remarks": "rule_set_295" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd_old", - "remarks": "rule_set_294" + "remarks": "rule_set_296" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd.old File", - "remarks": "rule_set_294" + "remarks": "rule_set_296" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd_old", - "remarks": "rule_set_294" + "remarks": "rule_set_296" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd.old File", - "remarks": "rule_set_294" + "remarks": "rule_set_296" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_295" + "remarks": "rule_set_297" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_295" + "remarks": "rule_set_297" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_295" + "remarks": "rule_set_297" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_295" + "remarks": "rule_set_297" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_296" + "remarks": "rule_set_298" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_296" + "remarks": "rule_set_298" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_296" + "remarks": "rule_set_298" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_296" + "remarks": "rule_set_298" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_unowned_by_user", - "remarks": "rule_set_297" + "remarks": "rule_set_299" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a User", - "remarks": "rule_set_297" + "remarks": "rule_set_299" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_unowned_by_user", - "remarks": "rule_set_297" + "remarks": "rule_set_299" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a User", - "remarks": "rule_set_297" + "remarks": "rule_set_299" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_ungroupowned", - "remarks": "rule_set_298" + "remarks": "rule_set_300" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a Group", - "remarks": "rule_set_298" + "remarks": "rule_set_300" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_ungroupowned", - "remarks": "rule_set_298" + "remarks": "rule_set_300" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a Group", - "remarks": "rule_set_298" + "remarks": "rule_set_300" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_all_shadowed", - "remarks": "rule_set_299" + "remarks": "rule_set_301" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify All Account Password Hashes are Shadowed", - "remarks": "rule_set_299" + "remarks": "rule_set_301" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_all_shadowed", - "remarks": "rule_set_299" + "remarks": "rule_set_301" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify All Account Password Hashes are Shadowed", - "remarks": "rule_set_299" + "remarks": "rule_set_301" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords_etc_shadow", - "remarks": "rule_set_300" + "remarks": "rule_set_302" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure There Are No Accounts With Blank or Null Passwords", - "remarks": "rule_set_300" + "remarks": "rule_set_302" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords_etc_shadow", - "remarks": "rule_set_300" + "remarks": "rule_set_302" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure There Are No Accounts With Blank or Null Passwords", - "remarks": "rule_set_300" + "remarks": "rule_set_302" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gid_passwd_group_same", - "remarks": "rule_set_301" + "remarks": "rule_set_303" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", - "remarks": "rule_set_301" + "remarks": "rule_set_303" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gid_passwd_group_same", - "remarks": "rule_set_301" + "remarks": "rule_set_303" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", - "remarks": "rule_set_301" + "remarks": "rule_set_303" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_id", - "remarks": "rule_set_302" + "remarks": "rule_set_304" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique User IDs", - "remarks": "rule_set_302" + "remarks": "rule_set_304" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_id", - "remarks": "rule_set_302" + "remarks": "rule_set_304" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique User IDs", - "remarks": "rule_set_302" + "remarks": "rule_set_304" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_id", - "remarks": "rule_set_303" + "remarks": "rule_set_305" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group ID", - "remarks": "rule_set_303" + "remarks": "rule_set_305" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_id", - "remarks": "rule_set_303" + "remarks": "rule_set_305" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group ID", - "remarks": "rule_set_303" + "remarks": "rule_set_305" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_name", - "remarks": "rule_set_304" + "remarks": "rule_set_306" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique Names", - "remarks": "rule_set_304" + "remarks": "rule_set_306" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_name", - "remarks": "rule_set_304" + "remarks": "rule_set_306" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique Names", - "remarks": "rule_set_304" + "remarks": "rule_set_306" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_name", - "remarks": "rule_set_305" + "remarks": "rule_set_307" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group Names", - "remarks": "rule_set_305" + "remarks": "rule_set_307" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_name", - "remarks": "rule_set_305" + "remarks": "rule_set_307" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group Names", - "remarks": "rule_set_305" + "remarks": "rule_set_307" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_interactive_home_directory_exists", - "remarks": "rule_set_306" + "remarks": "rule_set_308" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive Users Home Directories Must Exist", - "remarks": "rule_set_306" + "remarks": "rule_set_308" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_interactive_home_directory_exists", - "remarks": "rule_set_306" + "remarks": "rule_set_308" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive Users Home Directories Must Exist", - "remarks": "rule_set_306" + "remarks": "rule_set_308" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_home_directories", - "remarks": "rule_set_307" + "remarks": "rule_set_309" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Be Owned By The Primary User", - "remarks": "rule_set_307" + "remarks": "rule_set_309" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_home_directories", - "remarks": "rule_set_307" + "remarks": "rule_set_309" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Be Owned By The Primary User", - "remarks": "rule_set_307" + "remarks": "rule_set_309" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_home_directories", - "remarks": "rule_set_308" + "remarks": "rule_set_310" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", - "remarks": "rule_set_308" + "remarks": "rule_set_310" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_home_directories", - "remarks": "rule_set_308" + "remarks": "rule_set_310" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", - "remarks": "rule_set_308" + "remarks": "rule_set_310" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_309" + "remarks": "rule_set_311" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_309" + "remarks": "rule_set_311" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_309" + "remarks": "rule_set_311" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_309" + "remarks": "rule_set_311" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_310" + "remarks": "rule_set_312" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_310" + "remarks": "rule_set_312" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_310" + "remarks": "rule_set_312" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_310" + "remarks": "rule_set_312" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_no_world_writable_programs", - "remarks": "rule_set_311" + "remarks": "rule_set_313" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Not Run World-Writable Programs", - "remarks": "rule_set_311" + "remarks": "rule_set_313" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_no_world_writable_programs", - "remarks": "rule_set_311" + "remarks": "rule_set_313" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Not Run World-Writable Programs", - "remarks": "rule_set_311" + "remarks": "rule_set_313" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_312" + "remarks": "rule_set_314" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_312" + "remarks": "rule_set_314" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_312" + "remarks": "rule_set_314" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_312" + "remarks": "rule_set_314" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_forward_files", - "remarks": "rule_set_313" + "remarks": "rule_set_315" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .forward Files Exist", - "remarks": "rule_set_313" + "remarks": "rule_set_315" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_forward_files", - "remarks": "rule_set_313" + "remarks": "rule_set_315" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .forward Files Exist", - "remarks": "rule_set_313" + "remarks": "rule_set_315" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_netrc_files", - "remarks": "rule_set_314" + "remarks": "rule_set_316" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No netrc Files Exist", - "remarks": "rule_set_314" + "remarks": "rule_set_316" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_netrc_files", - "remarks": "rule_set_314" + "remarks": "rule_set_316" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No netrc Files Exist", - "remarks": "rule_set_314" + "remarks": "rule_set_316" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rhost_files", - "remarks": "rule_set_315" + "remarks": "rule_set_317" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .rhost Files Exist", - "remarks": "rule_set_315" + "remarks": "rule_set_317" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rhost_files", - "remarks": "rule_set_315" + "remarks": "rule_set_317" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .rhost Files Exist", - "remarks": "rule_set_315" + "remarks": "rule_set_317" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_bash_history", - "remarks": "rule_set_316" + "remarks": "rule_set_318" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure User Bash History File Has Correct Permissions", - "remarks": "rule_set_316" + "remarks": "rule_set_318" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_bash_history", - "remarks": "rule_set_316" + "remarks": "rule_set_318" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure User Bash History File Has Correct Permissions", - "remarks": "rule_set_316" + "remarks": "rule_set_318" } ], "control-implementations": [ { - "uuid": "3d071398-e31c-4fc8-8dca-73aab9173f14", + "uuid": "b03e98ee-a479-4667-b1ac-edbf9a81c649", "source": "trestle://profiles/rhel10-cis_rhel10-l1_workstation/profile.json", "description": "Control implementation for cis_workstation_l1", "props": [ @@ -18750,7 +18831,7 @@ ], "implemented-requirements": [ { - "uuid": "71092472-0975-4617-b803-32c95f73b76d", + "uuid": "ea6fb3b6-d892-4e71-856c-de6e1d43b239", "control-id": "reload_dconf_db", "description": "This is a helper rule to reload Dconf database correctly.", "props": [ @@ -18767,7 +18848,7 @@ ] }, { - "uuid": "833b71dd-983a-4ae9-811b-3f1fb39bb9bb", + "uuid": "86e42138-8483-46cb-8ecd-9930a701c00c", "control-id": "cis_rhel10_1-1.1.1", "description": "No notes for control-id 1.1.1.1.", "props": [ @@ -18784,7 +18865,7 @@ ] }, { - "uuid": "5c2d5f68-2b19-4c5b-a7a6-9055414603b6", + "uuid": "ca821f60-c657-48d9-a87e-3e192e3f9224", "control-id": "cis_rhel10_1-1.1.2", "description": "No notes for control-id 1.1.1.2.", "props": [ @@ -18801,7 +18882,7 @@ ] }, { - "uuid": "470ed4d6-5c68-4095-a960-c74ddd44eae9", + "uuid": "c03af5f6-86af-4763-b449-b8d55735a7bd", "control-id": "cis_rhel10_1-1.1.3", "description": "No notes for control-id 1.1.1.3.", "props": [ @@ -18818,7 +18899,7 @@ ] }, { - "uuid": "b0b5ddf0-bf8e-45c7-b02b-3390dcd3ef37", + "uuid": "c642ccda-8f9c-4c8e-bc02-3f2545278939", "control-id": "cis_rhel10_1-1.1.4", "description": "No notes for control-id 1.1.1.4.", "props": [ @@ -18835,7 +18916,7 @@ ] }, { - "uuid": "eb58a640-3d4a-412c-8208-4200d77ab73d", + "uuid": "7427d240-eea3-4ebc-9cd9-d3a83126f386", "control-id": "cis_rhel10_1-1.1.5", "description": "No notes for control-id 1.1.1.5.", "props": [ @@ -18852,7 +18933,7 @@ ] }, { - "uuid": "3e46d7ef-7748-4e72-b9ea-632ff1fa400c", + "uuid": "b91d389b-e29e-4c49-bbb6-d8c314ce5a22", "control-id": "cis_rhel10_1-1.1.11", "description": "The description for control-id cis_rhel10_1-1.1.11.", "props": [ @@ -18865,7 +18946,7 @@ ] }, { - "uuid": "60976649-3867-4d63-8ae3-ff3d10f2f9e5", + "uuid": "de891798-d5f6-47d8-ab03-7f05e8960813", "control-id": "cis_rhel10_1-1.2.1.1", "description": "No notes for control-id 1.1.2.1.1.", "props": [ @@ -18882,7 +18963,7 @@ ] }, { - "uuid": "2b53c2af-a8ef-48b7-a10b-216ca8899887", + "uuid": "33448b23-c1bc-4684-8be6-2dd5f80716bd", "control-id": "cis_rhel10_1-1.2.1.2", "description": "No notes for control-id 1.1.2.1.2.", "props": [ @@ -18899,7 +18980,7 @@ ] }, { - "uuid": "f55b57f4-50f4-4a83-9661-52fab21ee137", + "uuid": "766aafcc-4bfc-4c2c-a948-70368f773604", "control-id": "cis_rhel10_1-1.2.1.3", "description": "No notes for control-id 1.1.2.1.3.", "props": [ @@ -18916,7 +18997,7 @@ ] }, { - "uuid": "98d8d54a-4c3b-4312-b289-0c38b9ee8a5b", + "uuid": "cff20eec-0780-4c4f-b9fb-24bbcef5caaf", "control-id": "cis_rhel10_1-1.2.1.4", "description": "No notes for control-id 1.1.2.1.4.", "props": [ @@ -18933,7 +19014,7 @@ ] }, { - "uuid": "cbf51e06-646c-4686-8b01-377f8854646e", + "uuid": "f4e63efc-3722-4f51-95d5-4b6e3034e846", "control-id": "cis_rhel10_1-1.2.2.1", "description": "No notes for control-id 1.1.2.2.1.", "props": [ @@ -18950,7 +19031,7 @@ ] }, { - "uuid": "66c79e99-0ab0-45b3-a8e5-54a874438cde", + "uuid": "d3d3b76f-ea7b-4432-b740-c0a0609254f7", "control-id": "cis_rhel10_1-1.2.2.2", "description": "No notes for control-id 1.1.2.2.2.", "props": [ @@ -18967,7 +19048,7 @@ ] }, { - "uuid": "16a24548-6590-4fef-9b63-2be15c7a04ee", + "uuid": "8b92d906-3641-4c3e-ac6e-0743a5534e50", "control-id": "cis_rhel10_1-1.2.2.3", "description": "No notes for control-id 1.1.2.2.3.", "props": [ @@ -18984,7 +19065,7 @@ ] }, { - "uuid": "3d63541a-4ddc-4862-92b4-dffc89586f29", + "uuid": "6fa53654-93be-46c7-b549-f7edb6ed2859", "control-id": "cis_rhel10_1-1.2.2.4", "description": "No notes for control-id 1.1.2.2.4.", "props": [ @@ -19001,7 +19082,7 @@ ] }, { - "uuid": "4697f731-a767-4a43-a4fd-a870cb432fff", + "uuid": "6a57bb9c-ceae-47ec-a91c-796dfcd96b9e", "control-id": "cis_rhel10_1-1.2.3.2", "description": "No notes for control-id 1.1.2.3.2.", "props": [ @@ -19018,7 +19099,7 @@ ] }, { - "uuid": "6e654300-dc25-4f6c-8938-733b079d55a6", + "uuid": "a64a80cd-a264-4b4b-9cd6-1a59f5f66bab", "control-id": "cis_rhel10_1-1.2.3.3", "description": "No notes for control-id 1.1.2.3.3.", "props": [ @@ -19035,7 +19116,7 @@ ] }, { - "uuid": "e27972ea-4525-434a-999a-c42e4a0eb88d", + "uuid": "e3824624-f6d4-4faf-9538-88a0a48a7f41", "control-id": "cis_rhel10_1-1.2.4.2", "description": "No notes for control-id 1.1.2.4.2.", "props": [ @@ -19052,7 +19133,7 @@ ] }, { - "uuid": "77827507-7f5f-418d-8a28-9822a3b8c31a", + "uuid": "47db601a-9da7-44fa-8c3d-6ecada7124c3", "control-id": "cis_rhel10_1-1.2.4.3", "description": "No notes for control-id 1.1.2.4.3.", "props": [ @@ -19069,7 +19150,7 @@ ] }, { - "uuid": "3b67b286-a1e3-4c04-8317-f8aaffcb54c6", + "uuid": "17c0c1f0-be64-4526-8e3b-3ef04804f9d0", "control-id": "cis_rhel10_1-1.2.5.2", "description": "No notes for control-id 1.1.2.5.2.", "props": [ @@ -19086,7 +19167,7 @@ ] }, { - "uuid": "7fa0b690-9a84-493a-b1e0-1af6e2da70eb", + "uuid": "58ea6b92-5d5c-4ff3-b665-b7e75e8ed12d", "control-id": "cis_rhel10_1-1.2.5.3", "description": "No notes for control-id 1.1.2.5.3.", "props": [ @@ -19103,7 +19184,7 @@ ] }, { - "uuid": "810700ca-e4ed-4af3-b46e-c478a8a7ee50", + "uuid": "82a6d28b-18c3-4bf5-8611-d3de9b5cdd34", "control-id": "cis_rhel10_1-1.2.5.4", "description": "No notes for control-id 1.1.2.5.4.", "props": [ @@ -19120,7 +19201,7 @@ ] }, { - "uuid": "d2cafa3f-2939-4a68-8ee4-bd4645ff6aa9", + "uuid": "8b756b17-1aeb-4b8c-abac-55614ab3c0aa", "control-id": "cis_rhel10_1-1.2.6.2", "description": "No notes for control-id 1.1.2.6.2.", "props": [ @@ -19137,7 +19218,7 @@ ] }, { - "uuid": "6f7acf4b-578c-4b03-a2b7-3712b64d5879", + "uuid": "337710bf-a2c6-428a-b053-16d385db4699", "control-id": "cis_rhel10_1-1.2.6.3", "description": "No notes for control-id 1.1.2.6.3.", "props": [ @@ -19154,7 +19235,7 @@ ] }, { - "uuid": "b7548f2c-8eba-45bb-9be5-1c715c02870d", + "uuid": "581a41d8-371a-48bf-af62-605e19e60659", "control-id": "cis_rhel10_1-1.2.6.4", "description": "No notes for control-id 1.1.2.6.4.", "props": [ @@ -19171,7 +19252,7 @@ ] }, { - "uuid": "5c87d0d1-b418-4469-9222-0970be30c7de", + "uuid": "eb9c9f81-c6d9-4780-ba63-db3cff1b9496", "control-id": "cis_rhel10_1-1.2.7.2", "description": "No notes for control-id 1.1.2.7.2.", "props": [ @@ -19188,7 +19269,7 @@ ] }, { - "uuid": "f0f053ca-9c44-4d13-b56e-05574ccf3c7e", + "uuid": "6fb71dc6-e619-44bb-8482-02e6903f0ae4", "control-id": "cis_rhel10_1-1.2.7.3", "description": "No notes for control-id 1.1.2.7.3.", "props": [ @@ -19205,7 +19286,7 @@ ] }, { - "uuid": "ca9751e6-99dc-430f-9fb0-3ca33af8677b", + "uuid": "77b0f072-14da-4d53-a3a3-06268249c239", "control-id": "cis_rhel10_1-1.2.7.4", "description": "No notes for control-id 1.1.2.7.4.", "props": [ @@ -19222,7 +19303,7 @@ ] }, { - "uuid": "b90e5060-1c1b-45b3-b882-4715aeece1c8", + "uuid": "0f893e66-c8a2-4d26-b113-3504b5cf36e0", "control-id": "cis_rhel10_1-2.1.1", "description": "The description for control-id cis_rhel10_1-2.1.1.", "props": [ @@ -19235,7 +19316,7 @@ ] }, { - "uuid": "ca383870-d62a-47f4-95b1-8e49f49dddc5", + "uuid": "73f488cb-b537-4b5e-94b4-e36bdb0664f3", "control-id": "cis_rhel10_1-2.1.2", "description": "No notes for control-id 1.2.1.2.", "props": [ @@ -19252,7 +19333,7 @@ ] }, { - "uuid": "ceaca091-26e0-4b43-906f-66bf8dff9410", + "uuid": "88e826f5-9d5c-48ab-9795-260e1d3df18b", "control-id": "cis_rhel10_1-2.1.4", "description": "The description for control-id cis_rhel10_1-2.1.4.", "props": [ @@ -19265,7 +19346,7 @@ ] }, { - "uuid": "a5d265be-2130-495d-a720-5b88964c8668", + "uuid": "55f6449b-0306-45c8-a2aa-2d86e4db7506", "control-id": "cis_rhel10_1-2.2.1", "description": "The description for control-id cis_rhel10_1-2.2.1.", "props": [ @@ -19278,7 +19359,7 @@ ] }, { - "uuid": "3d60d475-b25c-494d-abad-9e351067770a", + "uuid": "53bbdc31-086e-4cbb-9c13-fe4d85bc71ba", "control-id": "cis_rhel10_1-3.1.1", "description": "No notes for control-id 1.3.1.1.", "props": [ @@ -19295,7 +19376,7 @@ ] }, { - "uuid": "397cd45e-15c0-4a24-b11e-e8629a43895c", + "uuid": "eb704324-02dc-48f8-84ea-1015b3fb7915", "control-id": "cis_rhel10_1-3.1.2", "description": "No notes for control-id 1.3.1.2.", "props": [ @@ -19312,7 +19393,7 @@ ] }, { - "uuid": "e191a712-4938-4576-a737-57e3ab7b085c", + "uuid": "b3568751-1ab6-44b6-805d-59b4c3ca68eb", "control-id": "cis_rhel10_1-3.1.3", "description": "No notes for control-id 1.3.1.3.", "props": [ @@ -19329,7 +19410,7 @@ ] }, { - "uuid": "41f57554-1f5b-4aab-93fc-bfcc417fc851", + "uuid": "59552692-be70-4ba1-a186-0a8121bbdf98", "control-id": "cis_rhel10_1-3.1.4", "description": "No notes for control-id 1.3.1.4.", "props": [ @@ -19346,7 +19427,7 @@ ] }, { - "uuid": "e3933eab-e4bd-456d-be8c-cf31b47736d2", + "uuid": "80f78049-4daf-4c76-b0c2-7d1c665756b1", "control-id": "cis_rhel10_1-3.1.7", "description": "No notes for control-id 1.3.1.7.", "props": [ @@ -19363,7 +19444,7 @@ ] }, { - "uuid": "c3d9ac15-9d86-4678-a3ef-a7c1dc5f9a29", + "uuid": "7a7661a8-7cbc-45fe-9901-f01bbfe0ecba", "control-id": "cis_rhel10_1-4.1", "description": "There is no automated remediation for this rule and this is intentional.\nMore details in the rule description.", "props": [ @@ -19380,7 +19461,7 @@ ] }, { - "uuid": "5b34379c-33a9-475b-b46c-637e462f9991", + "uuid": "93e4b64e-b0de-4d2f-8411-9f5b911c1cee", "control-id": "cis_rhel10_1-4.2", "description": "The description for control-id cis_rhel10_1-4.2.", "props": [ @@ -19423,7 +19504,7 @@ ] }, { - "uuid": "43290bb7-2195-4d70-a845-ce0c74274079", + "uuid": "2dfc5ee7-c2e0-4427-8d62-cd8015103d2e", "control-id": "cis_rhel10_1-5.1", "description": "No notes for control-id 1.5.1.", "props": [ @@ -19440,7 +19521,7 @@ ] }, { - "uuid": "b228ef73-bf80-4be9-8401-5966fde435fa", + "uuid": "9888f0d5-e19c-4e2e-adac-e40f9988dd2a", "control-id": "cis_rhel10_1-5.2", "description": "No notes for control-id 1.5.2.", "props": [ @@ -19457,7 +19538,7 @@ ] }, { - "uuid": "8f1ef9b1-1d99-47bb-95cc-275daf7975a3", + "uuid": "9e063c7e-0d58-4550-8490-f4746df32060", "control-id": "cis_rhel10_1-5.4", "description": "No notes for control-id 1.5.4.", "props": [ @@ -19474,7 +19555,7 @@ ] }, { - "uuid": "3a49ccfb-5a55-441c-a2d4-384213a42d1f", + "uuid": "cdd1e4fb-ba28-41d6-92f0-3e11f23d71d3", "control-id": "cis_rhel10_1-5.5", "description": "No notes for control-id 1.5.5.", "props": [ @@ -19491,7 +19572,7 @@ ] }, { - "uuid": "fd22a53a-47bb-4ab0-86e9-5962c482b3cb", + "uuid": "9c6017cc-30c0-4654-8cef-20824af84af0", "control-id": "cis_rhel10_1-5.6", "description": "No notes for control-id 1.5.6.", "props": [ @@ -19508,7 +19589,7 @@ ] }, { - "uuid": "b9cc01a6-9edd-4b4f-82c9-0745f0373404", + "uuid": "98ea337e-9956-4aba-854c-21bdd495b6bc", "control-id": "cis_rhel10_1-5.7", "description": "No notes for control-id 1.5.7.", "props": [ @@ -19525,7 +19606,7 @@ ] }, { - "uuid": "fc0f8592-4510-4b07-a7f2-d79a866d5579", + "uuid": "de824afd-9958-4ac8-bb2e-6725a007c3c0", "control-id": "cis_rhel10_1-5.8", "description": "Address Space Layout Randomization (ASLR)", "props": [ @@ -19542,7 +19623,7 @@ ] }, { - "uuid": "31bc94fb-24b5-4b09-848d-259ab836079d", + "uuid": "c25228a6-65db-4e90-9d0d-d71bdc6d0888", "control-id": "cis_rhel10_1-5.9", "description": "No notes for control-id 1.5.9.", "props": [ @@ -19559,7 +19640,7 @@ ] }, { - "uuid": "5e37dafd-7356-416b-9d47-f0fbfd9d7b36", + "uuid": "0d6ca944-ee48-4040-86bf-15cd0bd615c7", "control-id": "cis_rhel10_1-5.10", "description": "No notes for control-id 1.5.10.", "props": [ @@ -19576,7 +19657,7 @@ ] }, { - "uuid": "21a04384-4549-4460-a796-92f8768545d9", + "uuid": "c15a7a88-bde1-4abf-afc2-b71473db1f6d", "control-id": "cis_rhel10_1-6.1", "description": "No notes for control-id 1.6.1.", "props": [ @@ -19593,7 +19674,7 @@ ] }, { - "uuid": "aed83e8d-a721-4b62-8829-dee80862a7f7", + "uuid": "4017d147-28cb-4ea0-ae08-ab217591db4f", "control-id": "cis_rhel10_1-6.2", "description": "No notes for control-id 1.6.2.", "props": [ @@ -19610,7 +19691,7 @@ ] }, { - "uuid": "a13f7ba1-3516-472e-9f51-e857880ac47d", + "uuid": "f3396550-2c11-49cd-84c8-1d1ea2b387a0", "control-id": "cis_rhel10_1-6.3", "description": "No notes for control-id 1.6.3.", "props": [ @@ -19627,7 +19708,7 @@ ] }, { - "uuid": "a2977359-2a49-4bfb-9cff-164083637fc6", + "uuid": "5ccf10a4-272e-4416-98b6-6311515d9ed0", "control-id": "cis_rhel10_1-6.4", "description": "No notes for control-id 1.6.4.", "props": [ @@ -19644,7 +19725,7 @@ ] }, { - "uuid": "be160b88-d0aa-44ff-a3d6-50c0b7f3114e", + "uuid": "44d307b9-3631-4f8c-ae2e-9424d0a8d036", "control-id": "cis_rhel10_1-7.1", "description": "No notes for control-id 1.7.1.", "props": [ @@ -19661,7 +19742,7 @@ ] }, { - "uuid": "4b346df8-5818-4a30-9b2f-e68cafc87881", + "uuid": "0856c725-ce97-4cae-a53b-989ea408733d", "control-id": "cis_rhel10_1-7.2", "description": "No notes for control-id 1.7.2.", "props": [ @@ -19678,7 +19759,7 @@ ] }, { - "uuid": "d7578567-cb14-47f9-ba3f-fc3b0321257d", + "uuid": "0f7c5323-4c0f-4812-97fa-f1afbdae8fe0", "control-id": "cis_rhel10_1-7.3", "description": "No notes for control-id 1.7.3.", "props": [ @@ -19695,7 +19776,7 @@ ] }, { - "uuid": "c394d285-7881-49bc-9946-7a9fa04df58c", + "uuid": "40f33d5a-9250-48c7-b2bc-51b2c2cb267d", "control-id": "cis_rhel10_1-7.4", "description": "No notes for control-id 1.7.4.", "props": [ @@ -19722,7 +19803,7 @@ ] }, { - "uuid": "74e0810c-74d8-4cc5-bf4d-dae06f968612", + "uuid": "13fb808f-2c5d-4f44-a1f9-01f5920dbe29", "control-id": "cis_rhel10_1-7.5", "description": "No notes for control-id 1.7.5.", "props": [ @@ -19749,7 +19830,7 @@ ] }, { - "uuid": "f037ada2-7479-4b47-aad2-151855c7add1", + "uuid": "08fe234f-b913-4e15-a117-fbbdce3e02a4", "control-id": "cis_rhel10_1-7.6", "description": "No notes for control-id 1.7.6.", "props": [ @@ -19776,7 +19857,7 @@ ] }, { - "uuid": "3fb580bc-c22d-4b01-8e66-0f102afa6b74", + "uuid": "12eeada5-8195-48f6-bb2f-9ae0c2b4665e", "control-id": "cis_rhel10_1-8.1", "description": "No notes for control-id 1.8.1.", "props": [ @@ -19798,7 +19879,7 @@ ] }, { - "uuid": "49956479-33be-4e37-bf1c-12aeb64a1845", + "uuid": "96aaa051-5945-4731-936c-a689fa7e2893", "control-id": "cis_rhel10_1-8.2", "description": "No notes for control-id 1.8.2.", "props": [ @@ -19815,7 +19896,7 @@ ] }, { - "uuid": "7c0c64dc-3a3b-47c9-af8f-7a9e203b857b", + "uuid": "e09f710d-753a-4782-bd9e-21ed5ed25e2a", "control-id": "cis_rhel10_1-8.3", "description": "No notes for control-id 1.8.3.", "props": [ @@ -19847,7 +19928,7 @@ ] }, { - "uuid": "04efb78d-1ae5-40ba-8518-903d6e0180ef", + "uuid": "9651eebe-7eaa-45b3-8c5b-2a02d507af49", "control-id": "cis_rhel10_1-8.5", "description": "No notes for control-id 1.8.5.", "props": [ @@ -19864,7 +19945,7 @@ ] }, { - "uuid": "ea8ce282-a05e-437a-9784-cfb852fb85fb", + "uuid": "9c98f3cd-2568-4fd4-be00-9cb5865ad5cb", "control-id": "cis_rhel10_2-1.4", "description": "No notes for control-id 2.1.4.", "props": [ @@ -19881,7 +19962,7 @@ ] }, { - "uuid": "d40b69c8-ee1b-4bb8-a55c-b57857cc7b6c", + "uuid": "2fc7746b-e1b7-4169-9081-1e25dee90c38", "control-id": "cis_rhel10_2-1.5", "description": "No notes for control-id 2.1.5.", "props": [ @@ -19898,7 +19979,7 @@ ] }, { - "uuid": "af831146-0914-4591-b1f2-45c6459cf7c7", + "uuid": "eb23add6-fa7b-404b-a8e4-edcdf0c28740", "control-id": "cis_rhel10_2-1.6", "description": "No notes for control-id 2.1.6.", "props": [ @@ -19915,7 +19996,7 @@ ] }, { - "uuid": "be9590a8-3a63-4b98-88d2-eabc49d5649f", + "uuid": "2d7ba315-7f8a-49f2-a5dd-b8378d57a221", "control-id": "cis_rhel10_2-1.7", "description": "No notes for control-id 2.1.7.", "props": [ @@ -19932,7 +20013,7 @@ ] }, { - "uuid": "f277db6c-e610-4bd9-80ea-aa956d451a52", + "uuid": "23374927-0534-4a39-8321-942058755caf", "control-id": "cis_rhel10_2-1.8", "description": "No notes for control-id 2.1.8.", "props": [ @@ -19954,7 +20035,7 @@ ] }, { - "uuid": "381608a1-0546-4da8-bf32-f94a34314f09", + "uuid": "095c81cd-b0e1-491e-83a6-6d3e0be1d9f0", "control-id": "cis_rhel10_2-1.9", "description": "Many of the libvirt packages used by Enterprise Linux virtualization are dependent on the\nnfs-utils package.", "props": [ @@ -19971,7 +20052,7 @@ ] }, { - "uuid": "4053d5d6-1a37-46bd-9139-3367afb26c2d", + "uuid": "26b0e9a3-4413-465f-bdc8-62630bd19f4c", "control-id": "cis_rhel10_2-1.11", "description": "Many of the libvirt packages used by Enterprise Linux virtualization, and the nfs-utils\npackage used for The Network File System (NFS), are dependent on the rpcbind package.", "props": [ @@ -19988,7 +20069,7 @@ ] }, { - "uuid": "bc0d232e-0c45-4c20-8a1d-e59f89d733a3", + "uuid": "54e122a1-740a-4f53-beec-df8a8b5ebc51", "control-id": "cis_rhel10_2-1.12", "description": "No notes for control-id 2.1.12.", "props": [ @@ -20005,7 +20086,7 @@ ] }, { - "uuid": "fb27708b-1479-4412-bd37-eed379a0c1f7", + "uuid": "fe588d28-ae38-48ee-b2c0-9f4d7a71177d", "control-id": "cis_rhel10_2-1.13", "description": "No notes for control-id 2.1.13.", "props": [ @@ -20022,7 +20103,7 @@ ] }, { - "uuid": "22c8f47a-ae55-45cc-a6c7-495f9620f5a4", + "uuid": "1b564a6a-e081-48d2-91de-1240e92134a8", "control-id": "cis_rhel10_2-1.14", "description": "No notes for control-id 2.1.14.", "props": [ @@ -20039,7 +20120,7 @@ ] }, { - "uuid": "166ef6ea-a46d-4f75-85b0-d5ba020aec3b", + "uuid": "9301a5a2-c8f3-4f68-aa4d-3b0fb0e2c2df", "control-id": "cis_rhel10_2-1.15", "description": "No notes for control-id 2.1.15.", "props": [ @@ -20056,7 +20137,7 @@ ] }, { - "uuid": "bd3362ec-54d3-475a-9699-5867f1f4a453", + "uuid": "70c8f4d8-b075-41d4-abcd-72e973444dd0", "control-id": "cis_rhel10_2-1.16", "description": "No notes for control-id 2.1.16.", "props": [ @@ -20073,7 +20154,7 @@ ] }, { - "uuid": "a731541d-d64f-492d-8c98-1f02eb8d9c9b", + "uuid": "2c03dcfc-1392-4058-90ed-5193d3c7aae2", "control-id": "cis_rhel10_2-1.17", "description": "No notes for control-id 2.1.17.", "props": [ @@ -20090,7 +20171,7 @@ ] }, { - "uuid": "c0183f5c-a3ce-4675-b7bc-8bd89ef5f0d7", + "uuid": "9315a16a-8477-4786-97ff-41fdc9f85712", "control-id": "cis_rhel10_2-1.18", "description": "No notes for control-id 2.1.18.", "props": [ @@ -20112,7 +20193,7 @@ ] }, { - "uuid": "fceb6e88-6a61-46ef-b362-b0257437f26d", + "uuid": "a4407fba-9ae8-4a2e-86f2-c64a4a629a8a", "control-id": "cis_rhel10_2-1.21", "description": "No notes for control-id 2.1.21.", "props": [ @@ -20134,7 +20215,7 @@ ] }, { - "uuid": "6d408da1-3faa-4a54-bcef-01e13cf549a7", + "uuid": "fe146252-1ae2-437c-97de-09a241825462", "control-id": "cis_rhel10_2-1.22", "description": "The description for control-id cis_rhel10_2-1.22.", "props": [ @@ -20147,7 +20228,7 @@ ] }, { - "uuid": "1c42230f-aa56-4b41-818b-47a5368c32db", + "uuid": "554955b2-e1c2-47b6-a0e1-78f37dbdcf75", "control-id": "cis_rhel10_2-2.1", "description": "No notes for control-id 2.2.1.", "props": [ @@ -20164,7 +20245,7 @@ ] }, { - "uuid": "fe68e6e0-7ee3-4ec5-85a1-180b0dffa605", + "uuid": "3a8e7308-53e0-45e7-b194-402882316966", "control-id": "cis_rhel10_2-2.3", "description": "No notes for control-id 2.2.3.", "props": [ @@ -20181,7 +20262,7 @@ ] }, { - "uuid": "0402cfa5-68f2-4e93-8a76-da90f78518ca", + "uuid": "795accd5-4273-4771-a30f-b6c9ad52c817", "control-id": "cis_rhel10_2-2.4", "description": "No notes for control-id 2.2.4.", "props": [ @@ -20198,7 +20279,7 @@ ] }, { - "uuid": "64dcde8a-ca73-4618-8a2e-03e5d909002f", + "uuid": "e5e51a50-e7e0-4db7-9170-73ccc89ceaef", "control-id": "cis_rhel10_2-3.1", "description": "No notes for control-id 2.3.1.", "props": [ @@ -20210,7 +20291,7 @@ ] }, { - "uuid": "1b0ec528-b276-4acf-ac7f-da99adbb26bc", + "uuid": "d832a366-7737-47e3-8fd9-688173fd5b04", "control-id": "cis_rhel10_2-3.2", "description": "No notes for control-id 2.3.2.", "props": [ @@ -20227,7 +20308,7 @@ ] }, { - "uuid": "74baa54f-52c8-468d-bf72-9c701275e445", + "uuid": "b59493c5-bd64-4eab-b6c3-a92dd9b80a35", "control-id": "cis_rhel10_2-3.3", "description": "No notes for control-id 2.3.3.", "props": [ @@ -20244,7 +20325,7 @@ ] }, { - "uuid": "c629d808-daca-439d-921a-25c6034b5447", + "uuid": "8a9f9c62-9277-4818-a425-7d2f073c8934", "control-id": "cis_rhel10_2-4.1.1", "description": "No notes for control-id 2.4.1.1.", "props": [ @@ -20266,7 +20347,7 @@ ] }, { - "uuid": "c04e6489-ea37-4294-a59d-37a310d4f632", + "uuid": "98a3ef95-c64f-4327-98ca-a76428c3382e", "control-id": "cis_rhel10_2-4.1.2", "description": "No notes for control-id 2.4.1.2.", "props": [ @@ -20293,7 +20374,7 @@ ] }, { - "uuid": "2cbf11b1-ab03-4e30-bad5-064cb9558da7", + "uuid": "77dc24d4-ab8a-44cf-9859-24879cd1e9df", "control-id": "cis_rhel10_2-4.1.3", "description": "No notes for control-id 2.4.1.3.", "props": [ @@ -20320,7 +20401,7 @@ ] }, { - "uuid": "dbe5c748-c0e7-49dd-ae65-8bff963d3195", + "uuid": "05c68920-5c9b-445d-a020-0891441c619b", "control-id": "cis_rhel10_2-4.1.4", "description": "No notes for control-id 2.4.1.4.", "props": [ @@ -20347,7 +20428,7 @@ ] }, { - "uuid": "eefb9b7d-dbc3-4fd2-8c36-2b49f039f7f7", + "uuid": "3ce81162-bf56-4a92-be15-046e77a1591e", "control-id": "cis_rhel10_2-4.1.5", "description": "No notes for control-id 2.4.1.5.", "props": [ @@ -20374,7 +20455,7 @@ ] }, { - "uuid": "423437e6-6efc-4114-94b3-d594785b1e9f", + "uuid": "b04129b4-3166-49c4-90b5-2c12abeb8d3d", "control-id": "cis_rhel10_2-4.1.6", "description": "No notes for control-id 2.4.1.6.", "props": [ @@ -20401,7 +20482,7 @@ ] }, { - "uuid": "2e6fc88c-15be-4008-b33c-092739dc60da", + "uuid": "a7ff0c5b-8bee-4b41-aea2-4add314a7b55", "control-id": "cis_rhel10_2-4.1.7", "description": "No notes for control-id 2.4.1.7.", "props": [ @@ -20428,7 +20509,7 @@ ] }, { - "uuid": "7ec779c0-094d-4d31-995f-ebd3a5efb9dd", + "uuid": "77a25256-3231-4154-9aa9-2107538542f9", "control-id": "cis_rhel10_2-4.1.8", "description": "No notes for control-id 2.4.1.8.", "props": [ @@ -20455,7 +20536,7 @@ ] }, { - "uuid": "0456a4fd-1727-4c18-9e66-564035054c7f", + "uuid": "a1f79bd1-d4fd-488f-98cf-ca185ad056f1", "control-id": "cis_rhel10_2-4.1.9", "description": "No notes for control-id 2.4.1.9.", "props": [ @@ -20492,7 +20573,7 @@ ] }, { - "uuid": "221fe3c9-4c51-4af6-b579-5c9e31aeecf9", + "uuid": "537cc8c0-31d7-4cc0-a1b2-fbc52259e2c6", "control-id": "cis_rhel10_2-4.2.1", "description": "No notes for control-id 2.4.2.1.", "props": [ @@ -20529,7 +20610,7 @@ ] }, { - "uuid": "c26beb50-03a0-4514-96cc-7f41b62bd0b8", + "uuid": "e12a5fc5-7a5d-4b2c-bda1-6289390581b6", "control-id": "cis_rhel10_3-1.1", "description": "The description for control-id cis_rhel10_3-1.1.", "props": [ @@ -20542,7 +20623,7 @@ ] }, { - "uuid": "70ba2019-2d1f-41b0-bffd-095c7d6c5e7a", + "uuid": "7b37d519-0703-4355-80a0-951a0e5bba5f", "control-id": "cis_rhel10_3-2.1", "description": "No notes for control-id 3.2.1.", "props": [ @@ -20559,7 +20640,7 @@ ] }, { - "uuid": "6bcc5eec-69dd-4981-8a4a-533efac1d909", + "uuid": "9790f014-0f93-47e6-bd67-957e12182cb3", "control-id": "cis_rhel10_3-2.2", "description": "No notes for control-id 3.2.2.", "props": [ @@ -20576,7 +20657,7 @@ ] }, { - "uuid": "20ed263b-dd69-4936-9cb1-b1d42b4bcd6c", + "uuid": "c82b5344-c6d8-4e13-a02f-44102d942823", "control-id": "cis_rhel10_3-2.3", "description": "No notes for control-id 3.2.3.", "props": [ @@ -20593,7 +20674,7 @@ ] }, { - "uuid": "164141f2-d4ee-447f-b920-ac4a83e64ba0", + "uuid": "c5620219-ac49-45d9-9d07-90a71a448957", "control-id": "cis_rhel10_3-2.4", "description": "No notes for control-id 3.2.4.", "props": [ @@ -20610,7 +20691,7 @@ ] }, { - "uuid": "5671c37a-75cf-421f-92ad-b8d0621b1e81", + "uuid": "29355baa-2106-43bb-90f4-8c0d6bc2baf5", "control-id": "cis_rhel10_3-2.5", "description": "No notes for control-id 3.2.5.", "props": [ @@ -20627,7 +20708,7 @@ ] }, { - "uuid": "fab95ecf-9208-4dcb-a7e7-d1cc6f2aa167", + "uuid": "d6af398a-8094-4480-85ba-1d56f3dc1434", "control-id": "cis_rhel10_3-2.6", "description": "No notes for control-id 3.2.6.", "props": [ @@ -20644,7 +20725,7 @@ ] }, { - "uuid": "911c6bf6-6964-4fb4-955c-9e673be2e80d", + "uuid": "076265ad-2837-4ef8-8157-83afcea64c53", "control-id": "cis_rhel10_3-3.1.1", "description": "No notes for control-id 3.3.1.1.", "props": [ @@ -20661,7 +20742,7 @@ ] }, { - "uuid": "5240c6ca-4f4d-4930-a8cf-902ded50be99", + "uuid": "79ea4826-9b5d-41d1-914e-693c981a7058", "control-id": "cis_rhel10_3-3.1.2", "description": "No notes for control-id 3.3.1.2.", "props": [ @@ -20678,7 +20759,7 @@ ] }, { - "uuid": "952df28c-42a2-45da-b9d7-07830fc6920e", + "uuid": "3df8ff0f-2616-413d-ad8e-9396e281fbf0", "control-id": "cis_rhel10_3-3.1.3", "description": "No notes for control-id 3.3.1.3.", "props": [ @@ -20695,7 +20776,7 @@ ] }, { - "uuid": "4ddafc69-5235-4f68-9f0a-e0ce3d887183", + "uuid": "3f111fcf-4207-4fc3-aae6-2ad9e420344c", "control-id": "cis_rhel10_3-3.1.4", "description": "No notes for control-id 3.3.1.4.", "props": [ @@ -20712,7 +20793,7 @@ ] }, { - "uuid": "c18600a8-b208-442d-bccd-5b2b1dbfa86d", + "uuid": "494ee604-6451-48d1-8daa-8259911d4339", "control-id": "cis_rhel10_3-3.1.5", "description": "No notes for control-id 3.3.1.5.", "props": [ @@ -20729,7 +20810,7 @@ ] }, { - "uuid": "1e3271a9-0f71-4cee-b45b-afc78cadf5b7", + "uuid": "67a6d1d3-0da1-4f6c-9c90-fd6c6dc01f73", "control-id": "cis_rhel10_3-3.1.6", "description": "No notes for control-id 3.3.1.6.", "props": [ @@ -20746,7 +20827,7 @@ ] }, { - "uuid": "7d6af1f1-4b81-4fd5-b6d5-1ca0fd1f6401", + "uuid": "566ea7c7-6854-4616-97ec-0f770602dab7", "control-id": "cis_rhel10_3-3.1.7", "description": "No notes for control-id 3.3.1.7.", "props": [ @@ -20763,7 +20844,7 @@ ] }, { - "uuid": "998c75a6-c4d2-4c62-8135-6ce6c7cc9bab", + "uuid": "f89d4bbd-a58c-4852-b902-43afc8b6a0c2", "control-id": "cis_rhel10_3-3.1.8", "description": "No notes for control-id 3.3.1.8.", "props": [ @@ -20780,7 +20861,7 @@ ] }, { - "uuid": "7bbf1800-2064-4b6f-86f4-064a71f5236c", + "uuid": "4b2ee9fa-6bdf-4428-b5b4-fb94d12e8654", "control-id": "cis_rhel10_3-3.1.9", "description": "No notes for control-id 3.3.1.9.", "props": [ @@ -20797,7 +20878,7 @@ ] }, { - "uuid": "58f1a170-0dac-43a5-815f-276bb87df567", + "uuid": "e3c0ae17-9fc7-4e0d-bd8f-05768efcd9b6", "control-id": "cis_rhel10_3-3.1.10", "description": "No notes for control-id 3.3.1.10.", "props": [ @@ -20814,7 +20895,7 @@ ] }, { - "uuid": "3e61024f-8345-4824-a84d-98992ce3f7d3", + "uuid": "449a28f5-523f-44ee-a122-bd179cf129d0", "control-id": "cis_rhel10_3-3.1.11", "description": "No notes for control-id 3.3.1.11.", "props": [ @@ -20831,7 +20912,7 @@ ] }, { - "uuid": "b0b135b7-86f2-4c9c-85b8-16ea9a4f76ab", + "uuid": "f0dd90fe-3d70-4c2c-bc61-4f9ba3495934", "control-id": "cis_rhel10_3-3.1.12", "description": "No notes for control-id 3.3.1.12.", "props": [ @@ -20848,7 +20929,7 @@ ] }, { - "uuid": "bd524869-5fc4-4c2e-bf9d-e47be3c7ffe3", + "uuid": "5d3f55d2-f627-406b-a304-81fc09e3be0c", "control-id": "cis_rhel10_3-3.1.13", "description": "No notes for control-id 3.3.1.13.", "props": [ @@ -20865,7 +20946,7 @@ ] }, { - "uuid": "dad22f08-bcb7-470b-9cfc-ad02003eb39e", + "uuid": "e0bd8355-9836-4e57-99b0-529b032e0446", "control-id": "cis_rhel10_3-3.1.14", "description": "No notes for control-id 3.3.1.14.", "props": [ @@ -20882,7 +20963,7 @@ ] }, { - "uuid": "3e44654c-1053-49f3-b291-a0f560cd04bc", + "uuid": "9b449795-6b36-4693-847f-106ecfa204dd", "control-id": "cis_rhel10_3-3.1.15", "description": "No notes for control-id 3.3.1.15.", "props": [ @@ -20899,7 +20980,7 @@ ] }, { - "uuid": "8bc4675f-0237-4829-8c54-e643eb83a7e3", + "uuid": "fd36a91c-fa65-4a9e-b91a-57c2ddf9e57d", "control-id": "cis_rhel10_3-3.1.16", "description": "No notes for control-id 3.3.1.16.", "props": [ @@ -20916,7 +20997,7 @@ ] }, { - "uuid": "46d39529-4284-4eae-8adf-b853b6a30787", + "uuid": "297518ea-36a4-49be-9711-554f6c62e52e", "control-id": "cis_rhel10_3-3.1.17", "description": "No notes for control-id 3.3.1.17.", "props": [ @@ -20933,7 +21014,7 @@ ] }, { - "uuid": "a65c9b9a-5517-4731-90fe-df113a9854be", + "uuid": "26551d96-1c70-4869-b7ec-61a5115da8b2", "control-id": "cis_rhel10_3-3.1.18", "description": "No notes for control-id 3.3.1.18.", "props": [ @@ -20950,7 +21031,7 @@ ] }, { - "uuid": "f0a65dba-6d13-457e-9d44-b65f652ea3a9", + "uuid": "ab58aa16-e304-4a40-95d7-a1b65fb1c7ac", "control-id": "cis_rhel10_3-3.2.1", "description": "No notes for control-id 3.3.2.1.", "props": [ @@ -20967,7 +21048,7 @@ ] }, { - "uuid": "4805446a-6502-47ca-8b4a-f16e08ae723d", + "uuid": "f2cdb369-ad6f-4b5a-8107-b0c2d2541589", "control-id": "cis_rhel10_3-3.2.2", "description": "No notes for control-id 3.3.2.2.", "props": [ @@ -20984,7 +21065,7 @@ ] }, { - "uuid": "9b190c71-cb6e-4a44-8d19-69e4d76e84ef", + "uuid": "a142006d-e9b5-4353-9f51-c563c9e8a58d", "control-id": "cis_rhel10_3-3.2.3", "description": "No notes for control-id 3.3.2.3.", "props": [ @@ -21001,7 +21082,7 @@ ] }, { - "uuid": "a2f94c0f-588a-42ad-9d9c-000e7a952fa5", + "uuid": "69dd000d-0ebb-47a7-8562-f12c07a5aa24", "control-id": "cis_rhel10_3-3.2.4", "description": "No notes for control-id 3.3.2.4.", "props": [ @@ -21018,7 +21099,7 @@ ] }, { - "uuid": "901df8c6-15b6-4ac3-98f1-0237f2939b3f", + "uuid": "9776b864-f083-45eb-8294-106f52ceb800", "control-id": "cis_rhel10_3-3.2.5", "description": "No notes for control-id 3.3.2.5.", "props": [ @@ -21035,7 +21116,7 @@ ] }, { - "uuid": "3c736001-763d-4b6c-8c8e-5e91b0d6c030", + "uuid": "3b0ee3ca-b525-4876-b17b-9c181dc906cf", "control-id": "cis_rhel10_3-3.2.6", "description": "No notes for control-id 3.3.2.6.", "props": [ @@ -21052,7 +21133,7 @@ ] }, { - "uuid": "e8fae310-c2d6-43f4-968a-fd83d24052ba", + "uuid": "5e6126a6-542f-4c1d-ad0c-f7f5a191a771", "control-id": "cis_rhel10_3-3.2.7", "description": "No notes for control-id 3.3.2.7.", "props": [ @@ -21069,7 +21150,7 @@ ] }, { - "uuid": "077715f9-a02c-4ac3-b768-91cd11922888", + "uuid": "7ae9cbc0-c021-4316-95b1-910caceede7c", "control-id": "cis_rhel10_3-3.2.8", "description": "No notes for control-id 3.3.2.8.", "props": [ @@ -21086,7 +21167,7 @@ ] }, { - "uuid": "e33319c6-6d93-4901-9ec2-e9bcd4020208", + "uuid": "5d2ab20b-c760-4465-ad68-fa669240f9ef", "control-id": "cis_rhel10_4-1.1", "description": "No notes for control-id 4.1.1.", "props": [ @@ -21103,7 +21184,7 @@ ] }, { - "uuid": "2f67e57f-f3de-4f5b-afd6-4bdbe0995afa", + "uuid": "5242eb6c-bbbf-4c0a-ad32-8eb581796875", "control-id": "cis_rhel10_4-1.2", "description": "No notes for control-id 4.1.2.", "props": [ @@ -21120,7 +21201,7 @@ ] }, { - "uuid": "808f46b1-8ff0-4ce4-9cc7-86b03a6bca05", + "uuid": "fe3fa4ec-f0be-4f71-8e2e-128fc2ddb88d", "control-id": "cis_rhel10_4-1.3", "description": "No notes for control-id 4.1.3.", "props": [ @@ -21137,7 +21218,7 @@ ] }, { - "uuid": "cbd5b3a8-a447-471a-81ce-dd5b01bf46b2", + "uuid": "366b50b0-894f-45d7-86f4-11eb1ebb95d4", "control-id": "cis_rhel10_4-1.4", "description": "The description for control-id cis_rhel10_4-1.4.", "props": [ @@ -21150,7 +21231,7 @@ ] }, { - "uuid": "91dd50cd-7ba8-4112-9f36-58452b1fe134", + "uuid": "1bd59013-c33e-476b-949f-a8896504b0e0", "control-id": "cis_rhel10_4-1.5", "description": "Firewalld in Red Hat Enterprise Linux 10 accepts loopback traffic by default.", "props": [ @@ -21167,7 +21248,7 @@ ] }, { - "uuid": "284e9f65-7eb5-4e10-a5bd-3ca30e905e51", + "uuid": "057112dc-5258-4161-bbb4-5e2aa32e3451", "control-id": "cis_rhel10_4-1.6", "description": "The description for control-id cis_rhel10_4-1.6.", "props": [ @@ -21180,7 +21261,7 @@ ] }, { - "uuid": "e34b1379-93ff-4a5d-b406-d93912aa4d93", + "uuid": "8a805fab-9dc6-471c-b04c-594c4fb474a2", "control-id": "cis_rhel10_4-1.7", "description": "The description for control-id cis_rhel10_4-1.7.", "props": [ @@ -21193,7 +21274,7 @@ ] }, { - "uuid": "43e29281-892a-4fcc-8ce2-32f74ab18f26", + "uuid": "059c7196-f281-4e18-b352-635ed6d34483", "control-id": "cis_rhel10_5-1.1", "description": "No notes for control-id 5.1.1.", "props": [ @@ -21250,7 +21331,7 @@ ] }, { - "uuid": "0235b6cb-1f67-4b5f-8248-68656ed773e5", + "uuid": "4d6c3ad7-6835-46d2-b1c8-7120a7fa7ccd", "control-id": "cis_rhel10_5-1.2", "description": "No notes for control-id 5.1.2.", "props": [ @@ -21277,7 +21358,7 @@ ] }, { - "uuid": "03665b2d-e8eb-4300-8298-ca9a9de1da73", + "uuid": "7061e44b-c914-47d4-97c9-737c42405dc5", "control-id": "cis_rhel10_5-1.3", "description": "No notes for control-id 5.1.3.", "props": [ @@ -21304,7 +21385,7 @@ ] }, { - "uuid": "08850eb2-54d8-4be5-b2a0-279b3e01255d", + "uuid": "44f632f2-efe1-42d1-adc8-d4b7c09b107a", "control-id": "cis_rhel10_5-1.4", "description": "No notes for control-id 5.1.4.", "props": [ @@ -21321,7 +21402,7 @@ ] }, { - "uuid": "0b74127f-156a-4d0a-b8b5-18b7aeece29b", + "uuid": "afa9ee67-bfd6-4a36-8871-dad98b165fe5", "control-id": "cis_rhel10_5-1.5", "description": "No notes for control-id 5.1.5.", "props": [ @@ -21338,7 +21419,7 @@ ] }, { - "uuid": "df9b9dd6-a3bf-458b-9c81-6939cf5007a5", + "uuid": "21450aed-896d-4f13-8bb7-afdc86b5703e", "control-id": "cis_rhel10_5-1.6", "description": "No notes for control-id 5.1.6.", "props": [ @@ -21355,7 +21436,7 @@ ] }, { - "uuid": "9355a51d-d1fc-4ab6-8f00-8f3caed91ae0", + "uuid": "bb05c3c0-dda4-4190-ad26-984fd3b49d59", "control-id": "cis_rhel10_5-1.7", "description": "The requirement gives an example of 45 seconds, but is flexible about the values. It is only\nnecessary to ensure there is a timeout configured in alignment to the site policy.", "props": [ @@ -21377,7 +21458,7 @@ ] }, { - "uuid": "b1662812-13b3-4f78-b43b-3ac23b1d075d", + "uuid": "44f5ee0a-97a9-433d-9410-4d2765675bd1", "control-id": "cis_rhel10_5-1.8", "description": "No notes for control-id 5.1.8.", "props": [ @@ -21394,7 +21475,7 @@ ] }, { - "uuid": "f300e25e-b21d-45c1-addd-071d479bcb64", + "uuid": "6600a0ef-ae5c-4408-839d-dfabf01edd7d", "control-id": "cis_rhel10_5-1.9", "description": "No notes for control-id 5.1.9.", "props": [ @@ -21411,7 +21492,7 @@ ] }, { - "uuid": "ff48d9e5-3e2b-4050-acc4-d60e216839c7", + "uuid": "6d3e7590-6a2c-4f36-a5c5-924a7a720d98", "control-id": "cis_rhel10_5-1.10", "description": "No notes for control-id 5.1.10.", "props": [ @@ -21428,7 +21509,7 @@ ] }, { - "uuid": "eab34bdd-3f5b-4503-87a0-697242e861f6", + "uuid": "700313ea-10e7-419d-a6c1-17f897a7f38e", "control-id": "cis_rhel10_5-1.11", "description": "No notes for control-id 5.1.11.", "props": [ @@ -21445,7 +21526,7 @@ ] }, { - "uuid": "1fdf078d-e4b0-4b50-91ac-fc7f67a5369d", + "uuid": "d1a1b20f-f0a1-49aa-b819-a1f5ee16d59f", "control-id": "cis_rhel10_5-1.12", "description": "The description for control-id cis_rhel10_5-1.12.", "props": [ @@ -21463,7 +21544,7 @@ ] }, { - "uuid": "2f0ead6b-c817-4f43-adb8-820b818e6f81", + "uuid": "5645e36d-d6b0-4e3f-8249-034b8e09e3a9", "control-id": "cis_rhel10_5-1.13", "description": "No notes for control-id 5.1.13.", "props": [ @@ -21480,7 +21561,7 @@ ] }, { - "uuid": "7585215e-fcef-427a-848b-f4634bd50a93", + "uuid": "09492bcb-412c-489b-ba2c-d817896673c3", "control-id": "cis_rhel10_5-1.14", "description": "The CIS benchmark is not opinionated about which loglevel is selected here. Here, this\nprofile uses VERBOSE by default, as it allows for the capture of login and logout activity\nas well as key fingerprints.", "props": [ @@ -21497,7 +21578,7 @@ ] }, { - "uuid": "4de4f898-1ede-4639-9a58-03e758090e55", + "uuid": "5fbb3448-2502-4398-a79e-240c1f792fee", "control-id": "cis_rhel10_5-1.15", "description": "No notes for control-id 5.1.15.", "props": [ @@ -21514,7 +21595,7 @@ ] }, { - "uuid": "0acb5aad-4e23-460d-b969-587282e11c27", + "uuid": "fa8f67f4-d4b9-4740-8de8-9027881f8d4e", "control-id": "cis_rhel10_5-1.16", "description": "No notes for control-id 5.1.16.", "props": [ @@ -21531,7 +21612,7 @@ ] }, { - "uuid": "854e6c28-984b-44fe-823e-112fdb59f125", + "uuid": "f8e31e8d-0825-4875-b7dd-41acfe2b4957", "control-id": "cis_rhel10_5-1.17", "description": "No notes for control-id 5.1.17.", "props": [ @@ -21548,7 +21629,7 @@ ] }, { - "uuid": "60ec599c-7171-46c3-a6fc-6883d997615b", + "uuid": "d5e23df2-203c-4b77-afc9-fdcaaeff3a31", "control-id": "cis_rhel10_5-1.18", "description": "No notes for control-id 5.1.18.", "props": [ @@ -21565,7 +21646,7 @@ ] }, { - "uuid": "14bf5925-8e88-477b-9c6f-54a6bccc0006", + "uuid": "1d9fe40e-e8e8-4ef6-a16e-6edc39eb5d47", "control-id": "cis_rhel10_5-1.19", "description": "No notes for control-id 5.1.19.", "props": [ @@ -21582,7 +21663,7 @@ ] }, { - "uuid": "44fda8c0-217f-4082-9214-dd5f3dc81c70", + "uuid": "dab3bdd1-6d0e-49f9-b559-ba011203aa1c", "control-id": "cis_rhel10_5-1.20", "description": "No notes for control-id 5.1.20.", "props": [ @@ -21599,7 +21680,7 @@ ] }, { - "uuid": "1077af38-f08a-4549-8c9c-9c20937fc9f4", + "uuid": "01e1a399-1be5-4607-bfdf-31fdd58d087a", "control-id": "cis_rhel10_5-1.21", "description": "No notes for control-id 5.1.21.", "props": [ @@ -21616,7 +21697,7 @@ ] }, { - "uuid": "c0329ba5-1960-482d-a68b-9555f4438b0b", + "uuid": "ec663976-e361-4149-b477-b6203eaea006", "control-id": "cis_rhel10_5-1.22", "description": "No notes for control-id 5.1.22.", "props": [ @@ -21633,7 +21714,7 @@ ] }, { - "uuid": "189fe849-8367-4304-ade8-45ed582fb522", + "uuid": "6fd09694-3678-4d1e-a058-af5326fb64c0", "control-id": "cis_rhel10_5-2.1", "description": "No notes for control-id 5.2.1.", "props": [ @@ -21650,7 +21731,7 @@ ] }, { - "uuid": "8008f894-01c7-4be8-b2b3-4d830daf3e5d", + "uuid": "d3080060-db33-4656-af14-db890d21cae3", "control-id": "cis_rhel10_5-2.2", "description": "No notes for control-id 5.2.2.", "props": [ @@ -21667,7 +21748,7 @@ ] }, { - "uuid": "252b0edf-551f-428a-bb30-ed7ad47898f7", + "uuid": "0965c664-e0ea-414c-be55-9eb90cee23d4", "control-id": "cis_rhel10_5-2.3", "description": "No notes for control-id 5.2.3.", "props": [ @@ -21684,7 +21765,7 @@ ] }, { - "uuid": "8ee805e8-1a70-428f-8504-1f9417345359", + "uuid": "56594c1a-7e90-4a60-9b92-443249e0bc89", "control-id": "cis_rhel10_5-2.5", "description": "No notes for control-id 5.2.5.", "props": [ @@ -21701,7 +21782,7 @@ ] }, { - "uuid": "1ea2eda4-6a2a-4e5c-bb09-f0c66f03af83", + "uuid": "dba32c85-6c8e-4877-9abd-c73f3594f0bf", "control-id": "cis_rhel10_5-2.6", "description": "No notes for control-id 5.2.6.", "props": [ @@ -21718,7 +21799,7 @@ ] }, { - "uuid": "0af8fe3e-7b99-467f-8065-65f3f64ad1ef", + "uuid": "860ffe5b-9765-4712-bb7b-8d7ae86d94bf", "control-id": "cis_rhel10_5-2.7", "description": "Members of \"wheel\" or GID 0 groups are checked by default if the group option is not set for\npam_wheel.so module. The recommendation states the group should be empty to reinforce the\nuse of \"sudo\" for privileged access. Therefore, members of these groups should be manually\nchecked or a different group should be informed.", "props": [ @@ -21740,7 +21821,7 @@ ] }, { - "uuid": "6902e79e-72e6-43a6-9c87-2fa9a86987b4", + "uuid": "365c74b2-fb81-4ad0-b44b-47540921cf55", "control-id": "cis_rhel10_5-3.1.1", "description": "This requirement is hard to be automated without any specific requirement. The policy even\nstates that provided commands are examples, other custom settings might be in place and the\nsettings might be different depending on site policies. The other rules will already make\nsure there is a correct autheselect profile regardless of the existing settings. It is\nnecessary to better discuss with CIS Community.", "props": [ @@ -21752,7 +21833,7 @@ ] }, { - "uuid": "d37886e0-e1a3-49f5-a721-7825465087a6", + "uuid": "a39fc55f-0a45-45c8-b5db-9b5c182412c2", "control-id": "cis_rhel10_5-3.1.2", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.1.", "props": [ @@ -21774,7 +21855,7 @@ ] }, { - "uuid": "1d9867f7-c9a6-475e-b3be-23c2a8f09714", + "uuid": "0cff3673-07aa-4adf-80af-46e1516dfeb2", "control-id": "cis_rhel10_5-3.1.3", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.2.", "props": [ @@ -21801,7 +21882,7 @@ ] }, { - "uuid": "67cb6f00-d7f5-4453-aea6-b97a11631928", + "uuid": "5ac13780-c732-4c2f-8492-be6d3f638c67", "control-id": "cis_rhel10_5-3.1.4", "description": "The module is properly enabled by the rules mentioned in related_rules.\nRequirements in 5.3.2.3 use these rules.", "props": [ @@ -21813,7 +21894,7 @@ ] }, { - "uuid": "a6c922b3-4dbe-417e-95b5-623431f7d576", + "uuid": "a7109ab8-f7f5-4bfd-9b88-8f855b4edd35", "control-id": "cis_rhel10_5-3.1.5", "description": "No notes for control-id 5.3.1.5.", "props": [ @@ -21830,7 +21911,7 @@ ] }, { - "uuid": "9a01f87f-95f7-4b93-bdd0-2dfaa0df9b64", + "uuid": "d4978b6c-9177-4079-a4b4-be06866d4553", "control-id": "cis_rhel10_5-3.2.1.1", "description": "No notes for control-id 5.3.2.1.1.", "props": [ @@ -21847,7 +21928,7 @@ ] }, { - "uuid": "3437c3ea-c8e0-416b-a16a-8af236be1890", + "uuid": "da876bb2-6565-4e20-89d1-5cf6ee4885bb", "control-id": "cis_rhel10_5-3.2.1.2", "description": "The policy also accepts value 0, which means the locked accounts should be manually unlocked\nby an administrator. However, it also mentions that using value 0 can facilitate a DoS\nattack to legitimate users.", "props": [ @@ -21864,7 +21945,7 @@ ] }, { - "uuid": "3f15b388-7251-4c7f-a29b-0baa2dd6ddd8", + "uuid": "89febe26-c24d-4958-96b6-0066004515f9", "control-id": "cis_rhel10_5-3.2.2.1", "description": "No notes for control-id 5.3.2.2.1.", "props": [ @@ -21881,7 +21962,7 @@ ] }, { - "uuid": "bf32567d-1090-47ba-b38d-8bf8735e7a30", + "uuid": "ce139378-00bc-4c88-bad8-0fe5492c10a6", "control-id": "cis_rhel10_5-3.2.2.2", "description": "No notes for control-id 5.3.2.2.2.", "props": [ @@ -21898,7 +21979,7 @@ ] }, { - "uuid": "19d27cb0-16bb-4325-8979-f21f9649a751", + "uuid": "f2a31460-0cf1-4517-950a-cac0277fe410", "control-id": "cis_rhel10_5-3.2.2.3", "description": "This requirement is expected to be manual. However, in previous versions of the policy\nit was already automated the configuration of \"minclass\" option. This posture was kept for\nRHEL 10 in this new version. Rules related to other options are informed in related_rules.\nIn short, minclass=4 alone can achieve the same result achieved by the combination of the\nother 4 options mentioned in the policy.", "props": [ @@ -21915,7 +21996,7 @@ ] }, { - "uuid": "a3448ada-1d37-477b-9641-f7c416c62c92", + "uuid": "f05369cc-3e98-40bb-8009-1a0b6b361cfb", "control-id": "cis_rhel10_5-3.2.2.4", "description": "No notes for control-id 5.3.2.2.4.", "props": [ @@ -21932,7 +22013,7 @@ ] }, { - "uuid": "0404a399-e8b9-4293-8e01-29e19335c932", + "uuid": "4b2edcff-f4dd-414a-9758-2d8a81e0f547", "control-id": "cis_rhel10_5-3.2.2.5", "description": "No notes for control-id 5.3.2.2.5.", "props": [ @@ -21949,7 +22030,7 @@ ] }, { - "uuid": "93dfeacc-d016-4c27-8f5e-756ffe4e1b3d", + "uuid": "3df4ef5d-3972-4b1a-acad-4f6a69d91348", "control-id": "cis_rhel10_5-3.2.2.6", "description": "No notes for control-id 5.3.2.2.6.", "props": [ @@ -21966,7 +22047,7 @@ ] }, { - "uuid": "cd63028c-7db6-469c-b8cf-8cb3cc8c5eb6", + "uuid": "051bd556-acad-4303-abbb-aa8cc8c30027", "control-id": "cis_rhel10_5-3.2.2.7", "description": "No notes for control-id 5.3.2.2.7.", "props": [ @@ -21983,7 +22064,7 @@ ] }, { - "uuid": "2c8ace40-2de6-4b87-82d1-8829ec4ea34b", + "uuid": "27efb34a-5831-45eb-ad3b-6fbd5cc0d125", "control-id": "cis_rhel10_5-3.2.3.1", "description": "Although mentioned in the section 5.3.3.3, there is no explicit requirement to configure\nretry option of pam_pwhistory. If come in the future, the rule accounts_password_pam_retry\ncan be used.", "props": [ @@ -22005,7 +22086,7 @@ ] }, { - "uuid": "cd4c7755-983d-4314-8f32-f909beee0d80", + "uuid": "433961a6-8501-408e-99fe-695d59e6fce6", "control-id": "cis_rhel10_5-3.2.3.2", "description": "No notes for control-id 5.3.2.3.2.", "props": [ @@ -22022,7 +22103,7 @@ ] }, { - "uuid": "36deb29f-520f-48f6-8cf3-d04cf08624d6", + "uuid": "10c9ca15-9470-4cf2-9e2f-343e03c2a9ef", "control-id": "cis_rhel10_5-3.2.3.3", "description": "In RHEL 10 pam_pwhistory is enabled via authselect feature, as required in 5.3.1.4. The\nfeature automatically set \"use_authok\" option. In any case, we don't have a rule to check\nthis option specifically.", "props": [ @@ -22039,7 +22120,7 @@ ] }, { - "uuid": "90222bd9-9a7c-43e1-9def-80c930be97fc", + "uuid": "4c07300b-8b7f-4212-8ce2-d6014eaff839", "control-id": "cis_rhel10_5-3.2.4.1", "description": "The rule more specifically used in this requirement also satify the requirement 5.3.1.5.", "props": [ @@ -22056,7 +22137,7 @@ ] }, { - "uuid": "57545d1f-9e11-4557-8e35-1ea8fe8977d9", + "uuid": "1c4324c6-0b03-4e1d-9258-b67f4e6299bc", "control-id": "cis_rhel10_5-3.2.4.2", "description": "Usage of pam_unix.so module together with \"remember\" option is deprecated and is not\nrecommended by this policy. Instead, it should be used remember option of pam_pwhistory\nmodule, as required in 5.3.2.3.1. See here for more details about pam_unix.so:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1778929", "props": [ @@ -22073,7 +22154,7 @@ ] }, { - "uuid": "f5e234ad-a88d-4f19-9e0c-46bc615516b6", + "uuid": "a9ffde6d-5939-43eb-8a5b-125a9bad4792", "control-id": "cis_rhel10_5-3.2.4.3", "description": "Changes in logindefs mentioned in this requirement are more specifically covered by 5.4.1.4", "props": [ @@ -22095,7 +22176,7 @@ ] }, { - "uuid": "38d19767-fa05-4d3b-aad9-f6809a1b0da3", + "uuid": "e683cf0a-f3ef-4c75-824c-f81c75f1002d", "control-id": "cis_rhel10_5-3.2.4.4", "description": "In RHEL 10 pam_unix is enabled by default in all authselect profiles already with the\nuse_authtok option set. In any case, we don't have a rule to check this option specifically,\nlike in 5.3.2.3.3.", "props": [ @@ -22112,7 +22193,7 @@ ] }, { - "uuid": "01678de3-8cb3-40c3-bd6b-9260aa5e4c41", + "uuid": "675b34e5-f825-4d5c-87cd-366059c4f979", "control-id": "cis_rhel10_5-4.1.1", "description": "No notes for control-id 5.4.1.1.", "props": [ @@ -22134,7 +22215,7 @@ ] }, { - "uuid": "cb0975e8-025d-49a6-9e69-12774607919b", + "uuid": "5b9fceda-2165-4553-8ca2-52e17160e345", "control-id": "cis_rhel10_5-4.1.3", "description": "No notes for control-id 5.4.1.3.", "props": [ @@ -22156,7 +22237,7 @@ ] }, { - "uuid": "a04690e6-7805-4455-a35c-d21730a466b8", + "uuid": "7437a7b4-b5c1-4809-a5c3-4e570bcf8307", "control-id": "cis_rhel10_5-4.1.4", "description": "There's a \"new\" set of options in /etc/login.defs file to define the number of iterations\nperformed during the hashing process.", "props": [ @@ -22178,7 +22259,7 @@ ] }, { - "uuid": "31ea9a40-baff-40e4-9e43-22040efa225d", + "uuid": "37a2c0b9-1b1b-4ecc-8051-417c409751bf", "control-id": "cis_rhel10_5-4.1.5", "description": "No notes for control-id 5.4.1.5.", "props": [ @@ -22200,7 +22281,7 @@ ] }, { - "uuid": "9116b6cf-bdda-4b6f-9394-780f26173df2", + "uuid": "897837e3-15a4-4c97-a976-f901426f071c", "control-id": "cis_rhel10_5-4.1.6", "description": "No notes for control-id 5.4.1.6.", "props": [ @@ -22217,7 +22298,7 @@ ] }, { - "uuid": "43768857-aaa9-4b90-ba89-a0f3a7de9110", + "uuid": "cdb9b476-80a6-4d21-a931-4a1073b3ed79", "control-id": "cis_rhel10_5-4.2.1", "description": "No notes for control-id 5.4.2.1.", "props": [ @@ -22234,7 +22315,7 @@ ] }, { - "uuid": "d5b44e57-9763-441c-b52a-2abede4a1d87", + "uuid": "7abc7b84-c74d-4ca7-ac4e-796d99797eb6", "control-id": "cis_rhel10_5-4.2.2", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -22251,7 +22332,7 @@ ] }, { - "uuid": "dc0e8993-ded5-4eab-bfcd-11a85346d918", + "uuid": "0979c1dd-d234-48ab-9114-bfa8ca59d649", "control-id": "cis_rhel10_5-4.2.3", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -22268,7 +22349,7 @@ ] }, { - "uuid": "1a5502dd-b500-43d3-96dc-9fcf80d32d33", + "uuid": "fa38cbb7-7588-44e8-bc0f-bf3bb1943e8c", "control-id": "cis_rhel10_5-4.2.4", "description": "No notes for control-id 5.4.2.4.", "props": [ @@ -22285,7 +22366,7 @@ ] }, { - "uuid": "5572866c-9323-43d0-ae81-769dbc889070", + "uuid": "7e368546-9683-4f82-afb0-3ef234124d5f", "control-id": "cis_rhel10_5-4.2.5", "description": "No notes for control-id 5.4.2.5.", "props": [ @@ -22307,7 +22388,7 @@ ] }, { - "uuid": "01f4964f-3dc6-415c-93b1-c0f68171576f", + "uuid": "107edae4-5062-47aa-8fcd-769123b8cd8b", "control-id": "cis_rhel10_5-4.2.6", "description": "No notes for control-id 5.4.2.6.", "props": [ @@ -22324,7 +22405,7 @@ ] }, { - "uuid": "f0ff81ab-a475-4e45-8eea-96fa556ef0bc", + "uuid": "d3202878-4579-4956-a638-a28a31471bf9", "control-id": "cis_rhel10_5-4.2.7", "description": "No notes for control-id 5.4.2.7.", "props": [ @@ -22346,19 +22427,24 @@ ] }, { - "uuid": "ace22baa-9989-4e42-9842-c7c10709e359", + "uuid": "70d0d979-2aeb-47fc-b90a-70ede655e436", "control-id": "cis_rhel10_5-4.2.8", - "description": "New rule is necessary.", + "description": "No notes for control-id 5.4.2.8.", "props": [ { "name": "implementation-status", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "implemented" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "no_invalid_shell_accounts_unlocked" } ] }, { - "uuid": "b4cc2a82-8d8f-475e-8b29-597319adc26a", + "uuid": "15cacf28-b598-41c9-82ea-7c6b6bd31ad3", "control-id": "cis_rhel10_5-4.3.2", "description": "No notes for control-id 5.4.3.2.", "props": [ @@ -22375,7 +22461,7 @@ ] }, { - "uuid": "78651c36-1efa-4206-a2c2-d7bfe32b9c9a", + "uuid": "f2d8f6d1-31c9-4d09-b33a-bf46030c2378", "control-id": "cis_rhel10_5-4.3.3", "description": "No notes for control-id 5.4.3.3.", "props": [ @@ -22402,7 +22488,7 @@ ] }, { - "uuid": "a3b10178-0432-43d8-ad4d-67f6a309abad", + "uuid": "88432148-603d-458a-9233-31f0cdb54130", "control-id": "cis_rhel10_6-1.1", "description": "No notes for control-id 6.1.1.", "props": [ @@ -22424,7 +22510,7 @@ ] }, { - "uuid": "b201d034-1361-49ce-a004-9e7d147f2d4e", + "uuid": "70797d88-4860-4082-ae42-d05ab4c85992", "control-id": "cis_rhel10_6-1.2", "description": "No notes for control-id 6.1.2.", "props": [ @@ -22441,7 +22527,7 @@ ] }, { - "uuid": "7025ae96-2482-41c9-9d80-501e5d5eb9f2", + "uuid": "ee49ee3f-669c-4335-92dd-a4bea29e83cd", "control-id": "cis_rhel10_6-1.3", "description": "No notes for control-id 6.1.3.", "props": [ @@ -22458,7 +22544,7 @@ ] }, { - "uuid": "7baeb9f0-cdde-4b98-a73d-66d26b1bb57e", + "uuid": "fbad3a23-2b78-4874-a0cd-e02c298b0970", "control-id": "cis_rhel10_6-2.1.1", "description": "No notes for control-id 6.2.1.1.", "props": [ @@ -22475,7 +22561,7 @@ ] }, { - "uuid": "11e55cd5-15d8-44fc-a728-468ece731146", + "uuid": "d4ebeaed-e275-43e3-aefe-1522ec747d76", "control-id": "cis_rhel10_6-2.1.2", "description": "The description for control-id cis_rhel10_6-2.1.2.", "props": [ @@ -22488,7 +22574,7 @@ ] }, { - "uuid": "98afe2b2-d2d1-4525-a224-eee411ad29fd", + "uuid": "18d06440-e0eb-4720-b072-0116f2821517", "control-id": "cis_rhel10_6-2.1.3", "description": "The description for control-id cis_rhel10_6-2.1.3.", "props": [ @@ -22501,20 +22587,24 @@ ] }, { - "uuid": "076ab3b8-0aac-4648-b99d-eb26ae8983da", + "uuid": "d704e652-2340-46c3-af03-9dee3feeb3de", "control-id": "cis_rhel10_6-2.1.4", - "description": "The description for control-id cis_rhel10_6-2.1.4.", + "description": "No notes for control-id 6.2.1.4.", "props": [ { "name": "implementation-status", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "alternative", - "remarks": "It is necessary to create a new rule to check the status of journald and rsyslog.\nIt would also be necessary a new rule to disable or remove rsyslog." + "value": "implemented" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "ensure_journald_and_rsyslog_not_active_together" } ] }, { - "uuid": "54ad5d0b-3818-4f6b-a618-ceaa240acdbc", + "uuid": "1bed8bf6-3b60-4917-b223-911caee23b48", "control-id": "cis_rhel10_6-2.2.1.1", "description": "No notes for control-id 6.2.2.1.1.", "props": [ @@ -22531,7 +22621,7 @@ ] }, { - "uuid": "91f3e584-efdf-4ba4-b6cb-a9a8b5cfcf53", + "uuid": "89eb6dd4-1f6a-4a4f-a06d-501d0b37a3a1", "control-id": "cis_rhel10_6-2.2.1.2", "description": "The description for control-id cis_rhel10_6-2.2.1.2.", "props": [ @@ -22544,7 +22634,7 @@ ] }, { - "uuid": "09742a85-965e-4150-a2a1-6f798b4c1e7e", + "uuid": "65c78250-f51e-4879-b394-277b79a63b7b", "control-id": "cis_rhel10_6-2.2.1.3", "description": "No notes for control-id 6.2.2.1.3.", "props": [ @@ -22561,7 +22651,7 @@ ] }, { - "uuid": "189dd756-b2db-4e76-8e94-b1bc99dccc7d", + "uuid": "dc030c30-66ec-4a0e-bb69-5601f79f5cd3", "control-id": "cis_rhel10_6-2.2.1.4", "description": "No notes for control-id 6.2.2.1.4.", "props": [ @@ -22578,7 +22668,7 @@ ] }, { - "uuid": "343efc7e-3269-49a6-83e8-980b82e4b197", + "uuid": "564d10c3-d257-48b4-bbc1-ee7a7c895f18", "control-id": "cis_rhel10_6-2.2.2", "description": "No notes for control-id 6.2.2.2.", "props": [ @@ -22595,7 +22685,7 @@ ] }, { - "uuid": "e488d7b2-533b-4d30-8c4b-abf27d5008cf", + "uuid": "e2d3de21-399d-4a34-92d8-90746c5564b2", "control-id": "cis_rhel10_6-2.2.3", "description": "No notes for control-id 6.2.2.3.", "props": [ @@ -22612,7 +22702,7 @@ ] }, { - "uuid": "fa896ef9-a4a7-4046-bc3c-fd9f15cde7e9", + "uuid": "fc29f35e-60da-401c-8992-b793a0a97337", "control-id": "cis_rhel10_6-2.2.4", "description": "No notes for control-id 6.2.2.4.", "props": [ @@ -22629,7 +22719,7 @@ ] }, { - "uuid": "a9334ea6-ed35-48fc-a225-5e7ec0f2615b", + "uuid": "991a7eba-9941-43f9-9295-fc2aa206f016", "control-id": "cis_rhel10_6-2.3.1", "description": "No notes for control-id 6.2.3.1.", "props": [ @@ -22641,7 +22731,7 @@ ] }, { - "uuid": "6db47d05-74db-4695-ac50-8e1f5ee50e03", + "uuid": "1751235f-3c7b-4a1f-913e-583ab5b16e34", "control-id": "cis_rhel10_6-2.3.2", "description": "No notes for control-id 6.2.3.2.", "props": [ @@ -22653,7 +22743,7 @@ ] }, { - "uuid": "b241582a-25f0-4d4f-a2f8-084939336b58", + "uuid": "dc18f654-e0fc-40c2-89b8-ad32070c1fab", "control-id": "cis_rhel10_6-2.3.3", "description": "No notes for control-id 6.2.3.3.", "props": [ @@ -22665,7 +22755,7 @@ ] }, { - "uuid": "de8bca02-89d1-479c-9ada-0d9d96efaa31", + "uuid": "52c5df5e-8700-4b04-ba27-6f58054fc84c", "control-id": "cis_rhel10_6-2.3.4", "description": "No notes for control-id 6.2.3.4.", "props": [ @@ -22677,7 +22767,7 @@ ] }, { - "uuid": "9cad0a82-20a1-433b-981a-74b07f8f8120", + "uuid": "16fd68b5-0cbd-4418-a306-210dd3c46a91", "control-id": "cis_rhel10_6-2.3.5", "description": "The description for control-id cis_rhel10_6-2.3.5.", "props": [ @@ -22690,7 +22780,7 @@ ] }, { - "uuid": "06063c0d-ad6a-4463-bf09-c406ec086cb4", + "uuid": "077adc2e-bdc9-4913-99e2-6d75013fc2e7", "control-id": "cis_rhel10_6-2.3.6", "description": "The description for control-id cis_rhel10_6-2.3.6.", "props": [ @@ -22703,7 +22793,7 @@ ] }, { - "uuid": "e6b87ad1-e1ef-462c-aaa4-117a60c44d26", + "uuid": "6dcac26c-8628-4305-9cde-86caee1a4494", "control-id": "cis_rhel10_6-2.3.7", "description": "No notes for control-id 6.2.3.7.", "props": [ @@ -22715,7 +22805,7 @@ ] }, { - "uuid": "3204cce6-e8db-4c9b-bf71-c56ee7c6451a", + "uuid": "4e35e39e-8ace-49f7-8932-2560be4012a7", "control-id": "cis_rhel10_6-2.3.8", "description": "The description for control-id cis_rhel10_6-2.3.8.", "props": [ @@ -22728,7 +22818,7 @@ ] }, { - "uuid": "c63a5230-0190-45d4-8a50-bf57ad221602", + "uuid": "f39f1789-43c9-4aa4-8c8b-51eb1e3be237", "control-id": "cis_rhel10_6-2.4.1", "description": "It is not harmful to run these rules even if rsyslog is not installed or active.", "props": [ @@ -22755,7 +22845,7 @@ ] }, { - "uuid": "690eeb85-7ab5-4a0d-a335-8a90bb105e10", + "uuid": "540205ca-1c1d-4013-9d3f-f3e58a89fea2", "control-id": "cis_rhel10_7-1.1", "description": "No notes for control-id 7.1.1.", "props": [ @@ -22782,7 +22872,7 @@ ] }, { - "uuid": "23816218-7d66-421a-ab44-241178c36476", + "uuid": "8478afe6-2927-4ce8-90e9-c87388727ce3", "control-id": "cis_rhel10_7-1.2", "description": "No notes for control-id 7.1.2.", "props": [ @@ -22809,7 +22899,7 @@ ] }, { - "uuid": "2b32b8ea-e045-4ca6-a683-62ecea7221ed", + "uuid": "38c1e038-80eb-44dc-ac3e-e2bd7471ac52", "control-id": "cis_rhel10_7-1.3", "description": "No notes for control-id 7.1.3.", "props": [ @@ -22836,7 +22926,7 @@ ] }, { - "uuid": "e085cc5e-20e7-444b-a4b3-8b25d40ca7f5", + "uuid": "e60d0b45-3179-4e00-9230-f6c662b201b8", "control-id": "cis_rhel10_7-1.4", "description": "No notes for control-id 7.1.4.", "props": [ @@ -22863,7 +22953,7 @@ ] }, { - "uuid": "12bdf529-51a6-4657-b9a7-9b851e17adac", + "uuid": "78fcd5a5-5f86-4a85-a16a-167dd65b4bf6", "control-id": "cis_rhel10_7-1.5", "description": "No notes for control-id 7.1.5.", "props": [ @@ -22890,7 +22980,7 @@ ] }, { - "uuid": "99705a84-8a4b-47cb-b126-56a9b0e200a1", + "uuid": "d2b66ae8-3891-45d3-8958-9a91e6ddd7da", "control-id": "cis_rhel10_7-1.6", "description": "No notes for control-id 7.1.6.", "props": [ @@ -22917,7 +23007,7 @@ ] }, { - "uuid": "18e64bac-7823-4fdd-bbfb-55dc2a620d89", + "uuid": "f3d6d9a8-c810-4110-af4d-0dea41da040b", "control-id": "cis_rhel10_7-1.7", "description": "No notes for control-id 7.1.7.", "props": [ @@ -22944,7 +23034,7 @@ ] }, { - "uuid": "f34f9eba-6e1b-4894-936d-582b52508a5a", + "uuid": "fb0e0c7c-c8a8-4c48-94ad-4e6e5f7a4102", "control-id": "cis_rhel10_7-1.8", "description": "No notes for control-id 7.1.8.", "props": [ @@ -22971,7 +23061,7 @@ ] }, { - "uuid": "4e4659ff-0f34-4711-bbf9-1d0319a70ca9", + "uuid": "7e4e6dae-798e-4c16-81d3-c2021657935e", "control-id": "cis_rhel10_7-1.9", "description": "No notes for control-id 7.1.9.", "props": [ @@ -22998,7 +23088,7 @@ ] }, { - "uuid": "86bda1c7-11aa-4ea8-a12e-db2ed90f2d8b", + "uuid": "c9dd94b0-97e0-4009-a735-b511a70bc29f", "control-id": "cis_rhel10_7-1.10", "description": "No notes for control-id 7.1.10.", "props": [ @@ -23040,7 +23130,7 @@ ] }, { - "uuid": "7c99d064-77fb-4b31-a3c5-1dbffafa4335", + "uuid": "b9addea0-4093-4d94-a131-e011a6989561", "control-id": "cis_rhel10_7-1.11", "description": "No notes for control-id 7.1.11.", "props": [ @@ -23062,7 +23152,7 @@ ] }, { - "uuid": "dc84c9b8-68ab-4884-9cf7-35c45c44ef3f", + "uuid": "962809bc-94af-42cb-85b9-fef44a93e42a", "control-id": "cis_rhel10_7-1.12", "description": "No notes for control-id 7.1.12.", "props": [ @@ -23084,7 +23174,7 @@ ] }, { - "uuid": "a32b6846-11a5-468c-b424-fe2e46400d24", + "uuid": "2ebb0503-dcb5-4e92-bb92-5db3e1e5b432", "control-id": "cis_rhel10_7-1.13", "description": "The description for control-id cis_rhel10_7-1.13.", "props": [ @@ -23097,7 +23187,7 @@ ] }, { - "uuid": "52cc77b4-138f-428c-b2a1-9ebde34316cf", + "uuid": "e1b9ebe1-d208-469d-b40f-7f3039821654", "control-id": "cis_rhel10_7-2.1", "description": "No notes for control-id 7.2.1.", "props": [ @@ -23114,7 +23204,7 @@ ] }, { - "uuid": "ef3bbb0f-249f-4acd-8154-62a3bde92d13", + "uuid": "619651e2-974c-4348-a4ad-ab138b837e8e", "control-id": "cis_rhel10_7-2.2", "description": "No notes for control-id 7.2.2.", "props": [ @@ -23131,7 +23221,7 @@ ] }, { - "uuid": "8908b513-a0ec-457a-bc3e-70f7bd52e306", + "uuid": "3fa929d1-9762-4930-832b-d43486384427", "control-id": "cis_rhel10_7-2.3", "description": "No notes for control-id 7.2.3.", "props": [ @@ -23148,7 +23238,7 @@ ] }, { - "uuid": "44f5e9b5-1bd7-421c-b36b-80641a128bd6", + "uuid": "20db0e1b-0484-4414-a1c1-f50e665a1589", "control-id": "cis_rhel10_7-2.4", "description": "No notes for control-id 7.2.4.", "props": [ @@ -23165,7 +23255,7 @@ ] }, { - "uuid": "c3973af8-4a9d-463e-85b8-77543a3c9a4c", + "uuid": "afe383bb-dee8-4f03-aa84-c02283abe405", "control-id": "cis_rhel10_7-2.5", "description": "No notes for control-id 7.2.5.", "props": [ @@ -23182,7 +23272,7 @@ ] }, { - "uuid": "4773dbc7-1cf4-4fb7-958a-47f8ba9f0570", + "uuid": "fb63f207-fd8f-4194-9f3f-9ad467a2a9ff", "control-id": "cis_rhel10_7-2.6", "description": "No notes for control-id 7.2.6.", "props": [ @@ -23199,7 +23289,7 @@ ] }, { - "uuid": "d031379d-0759-4a88-b663-3556c62eb52c", + "uuid": "6b09dd32-64bd-4f16-895a-a13de0d4b5a6", "control-id": "cis_rhel10_7-2.7", "description": "No notes for control-id 7.2.7.", "props": [ @@ -23216,7 +23306,7 @@ ] }, { - "uuid": "ed208fce-f4ee-4bb4-bb51-907408e6b17e", + "uuid": "e8fa9507-459b-4d0b-a606-a0d1e5785c4f", "control-id": "cis_rhel10_7-2.8", "description": "No notes for control-id 7.2.8.", "props": [ @@ -23243,7 +23333,7 @@ ] }, { - "uuid": "61ede15b-ce46-4d86-b6cd-c55486505043", + "uuid": "50ba8791-7919-49c4-b1bb-1dcf5653bab5", "control-id": "cis_rhel10_7-2.9", "description": "No notes for control-id 7.2.9.", "props": [ diff --git a/component-definitions/rhel10/rhel10-cis_rhel10-l2_server/component-definition.json b/component-definitions/rhel10/rhel10-cis_rhel10-l2_server/component-definition.json index 887fdf82..b7244625 100644 --- a/component-definitions/rhel10/rhel10-cis_rhel10-l2_server/component-definition.json +++ b/component-definitions/rhel10/rhel10-cis_rhel10-l2_server/component-definition.json @@ -3,8 +3,8 @@ "uuid": "6531a0d9-efde-405d-ba52-aab8178414c4", "metadata": { "title": "Component definition for rhel10", - "last-modified": "2025-12-11T18:24:45.474598+00:00", - "version": "4.5", + "last-modified": "2025-12-15T16:30:46.140460+00:00", + "version": "4.6", "oscal-version": "1.1.3" }, "components": [ @@ -4235,2239 +4235,2263 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_tmout", + "value": "no_invalid_shell_accounts_unlocked", "remarks": "rule_set_251" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Interactive Session Timeout", + "value": "Verify Non-Interactive Accounts Are Locked", "remarks": "rule_set_251" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_bashrc", + "value": "accounts_tmout", "remarks": "rule_set_252" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Bash Umask is Set Correctly", + "value": "Set Interactive Session Timeout", "remarks": "rule_set_252" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_login_defs", + "value": "accounts_umask_etc_bashrc", "remarks": "rule_set_253" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Umask is Set Correctly in login.defs", + "value": "Ensure the Default Bash Umask is Set Correctly", "remarks": "rule_set_253" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_profile", + "value": "accounts_umask_etc_login_defs", "remarks": "rule_set_254" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Umask is Set Correctly in /etc/profile", + "value": "Ensure the Default Umask is Set Correctly in login.defs", "remarks": "rule_set_254" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_aide_installed", + "value": "accounts_umask_etc_profile", "remarks": "rule_set_255" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install AIDE", + "value": "Ensure the Default Umask is Set Correctly in /etc/profile", "remarks": "rule_set_255" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_build_database", + "value": "package_aide_installed", "remarks": "rule_set_256" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Build and Test AIDE Database", + "value": "Install AIDE", "remarks": "rule_set_256" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_periodic_cron_checking", + "value": "aide_build_database", "remarks": "rule_set_257" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Periodic Execution of AIDE", + "value": "Build and Test AIDE Database", "remarks": "rule_set_257" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_check_audit_tools", + "value": "aide_periodic_cron_checking", "remarks": "rule_set_258" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure AIDE to Verify the Audit Tools", + "value": "Configure Periodic Execution of AIDE", "remarks": "rule_set_258" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_systemd-journald_enabled", + "value": "aide_check_audit_tools", "remarks": "rule_set_259" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable systemd-journald Service", + "value": "Configure AIDE to Verify the Audit Tools", "remarks": "rule_set_259" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_systemd-journal-remote_installed", + "value": "service_systemd-journald_enabled", "remarks": "rule_set_260" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install systemd-journal-remote Package", + "value": "Enable systemd-journald Service", "remarks": "rule_set_260" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_systemd-journal-upload_enabled", + "value": "ensure_journald_and_rsyslog_not_active_together", "remarks": "rule_set_261" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable systemd-journal-upload Service", + "value": "Ensure journald and rsyslog Are Not Active Together", "remarks": "rule_set_261" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "socket_systemd-journal-remote_disabled", + "value": "package_systemd-journal-remote_installed", "remarks": "rule_set_262" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable systemd-journal-remote Socket", + "value": "Install systemd-journal-remote Package", "remarks": "rule_set_262" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_disable_forward_to_syslog", + "value": "service_systemd-journal-upload_enabled", "remarks": "rule_set_263" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald ForwardToSyslog is disabled", + "value": "Enable systemd-journal-upload Service", "remarks": "rule_set_263" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_compress", + "value": "socket_systemd-journal-remote_disabled", "remarks": "rule_set_264" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald is configured to compress large log files", + "value": "Disable systemd-journal-remote Socket", "remarks": "rule_set_264" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_storage", + "value": "journald_disable_forward_to_syslog", "remarks": "rule_set_265" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald is configured to write log files to persistent disk", + "value": "Ensure journald ForwardToSyslog is disabled", "remarks": "rule_set_265" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_groupownership", + "value": "journald_compress", "remarks": "rule_set_266" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Log Files Are Owned By Appropriate Group", + "value": "Ensure journald is configured to compress large log files", "remarks": "rule_set_266" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_ownership", + "value": "journald_storage", "remarks": "rule_set_267" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Log Files Are Owned By Appropriate User", + "value": "Ensure journald is configured to write log files to persistent disk", "remarks": "rule_set_267" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_permissions", + "value": "rsyslog_files_groupownership", "remarks": "rule_set_268" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure System Log Files Have Correct Permissions", + "value": "Ensure Log Files Are Owned By Appropriate Group", "remarks": "rule_set_268" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_passwd", + "value": "rsyslog_files_ownership", "remarks": "rule_set_269" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns passwd File", + "value": "Ensure Log Files Are Owned By Appropriate User", "remarks": "rule_set_269" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_passwd", + "value": "rsyslog_files_permissions", "remarks": "rule_set_270" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns passwd File", + "value": "Ensure System Log Files Have Correct Permissions", "remarks": "rule_set_270" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_passwd", + "value": "file_groupowner_etc_passwd", "remarks": "rule_set_271" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on passwd File", + "value": "Verify Group Who Owns passwd File", "remarks": "rule_set_271" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_passwd", + "value": "file_owner_etc_passwd", "remarks": "rule_set_272" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup passwd File", + "value": "Verify User Who Owns passwd File", "remarks": "rule_set_272" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_passwd", + "value": "file_permissions_etc_passwd", "remarks": "rule_set_273" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup passwd File", + "value": "Verify Permissions on passwd File", "remarks": "rule_set_273" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_passwd", + "value": "file_groupowner_backup_etc_passwd", "remarks": "rule_set_274" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup passwd File", + "value": "Verify Group Who Owns Backup passwd File", "remarks": "rule_set_274" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_group", + "value": "file_owner_backup_etc_passwd", "remarks": "rule_set_275" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns group File", + "value": "Verify User Who Owns Backup passwd File", "remarks": "rule_set_275" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_group", + "value": "file_permissions_backup_etc_passwd", "remarks": "rule_set_276" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns group File", + "value": "Verify Permissions on Backup passwd File", "remarks": "rule_set_276" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_group", + "value": "file_groupowner_etc_group", "remarks": "rule_set_277" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on group File", + "value": "Verify Group Who Owns group File", "remarks": "rule_set_277" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_group", + "value": "file_owner_etc_group", "remarks": "rule_set_278" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup group File", + "value": "Verify User Who Owns group File", "remarks": "rule_set_278" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_group", + "value": "file_permissions_etc_group", "remarks": "rule_set_279" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup group File", + "value": "Verify Permissions on group File", "remarks": "rule_set_279" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_group", + "value": "file_groupowner_backup_etc_group", "remarks": "rule_set_280" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup group File", + "value": "Verify Group Who Owns Backup group File", "remarks": "rule_set_280" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_shadow", + "value": "file_owner_backup_etc_group", "remarks": "rule_set_281" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns shadow File", + "value": "Verify User Who Owns Backup group File", "remarks": "rule_set_281" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_shadow", + "value": "file_permissions_backup_etc_group", "remarks": "rule_set_282" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns shadow File", + "value": "Verify Permissions on Backup group File", "remarks": "rule_set_282" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_shadow", + "value": "file_owner_etc_shadow", "remarks": "rule_set_283" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on shadow File", + "value": "Verify User Who Owns shadow File", "remarks": "rule_set_283" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_shadow", + "value": "file_groupowner_etc_shadow", "remarks": "rule_set_284" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup shadow File", + "value": "Verify Group Who Owns shadow File", "remarks": "rule_set_284" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_shadow", + "value": "file_permissions_etc_shadow", "remarks": "rule_set_285" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup shadow File", + "value": "Verify Permissions on shadow File", "remarks": "rule_set_285" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_shadow", + "value": "file_groupowner_backup_etc_shadow", "remarks": "rule_set_286" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup shadow File", + "value": "Verify User Who Owns Backup shadow File", "remarks": "rule_set_286" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_gshadow", + "value": "file_owner_backup_etc_shadow", "remarks": "rule_set_287" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns gshadow File", + "value": "Verify Group Who Owns Backup shadow File", "remarks": "rule_set_287" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_gshadow", + "value": "file_permissions_backup_etc_shadow", "remarks": "rule_set_288" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns gshadow File", + "value": "Verify Permissions on Backup shadow File", "remarks": "rule_set_288" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_gshadow", + "value": "file_groupowner_etc_gshadow", "remarks": "rule_set_289" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on gshadow File", + "value": "Verify Group Who Owns gshadow File", "remarks": "rule_set_289" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_gshadow", + "value": "file_owner_etc_gshadow", "remarks": "rule_set_290" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup gshadow File", + "value": "Verify User Who Owns gshadow File", "remarks": "rule_set_290" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_gshadow", + "value": "file_permissions_etc_gshadow", "remarks": "rule_set_291" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup gshadow File", + "value": "Verify Permissions on gshadow File", "remarks": "rule_set_291" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_gshadow", + "value": "file_groupowner_backup_etc_gshadow", "remarks": "rule_set_292" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup gshadow File", + "value": "Verify Group Who Owns Backup gshadow File", "remarks": "rule_set_292" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_shells", + "value": "file_owner_backup_etc_gshadow", "remarks": "rule_set_293" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns /etc/shells File", + "value": "Verify User Who Owns Backup gshadow File", "remarks": "rule_set_293" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_shells", + "value": "file_permissions_backup_etc_gshadow", "remarks": "rule_set_294" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Who Owns /etc/shells File", + "value": "Verify Permissions on Backup gshadow File", "remarks": "rule_set_294" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_shells", + "value": "file_groupowner_etc_shells", "remarks": "rule_set_295" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on /etc/shells File", + "value": "Verify Group Who Owns /etc/shells File", "remarks": "rule_set_295" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_security_opasswd", + "value": "file_owner_etc_shells", "remarks": "rule_set_296" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns /etc/security/opasswd File", + "value": "Verify Who Owns /etc/shells File", "remarks": "rule_set_296" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_security_opasswd", + "value": "file_permissions_etc_shells", "remarks": "rule_set_297" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns /etc/security/opasswd File", + "value": "Verify Permissions on /etc/shells File", "remarks": "rule_set_297" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_security_opasswd", + "value": "file_groupowner_etc_security_opasswd", "remarks": "rule_set_298" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on /etc/security/opasswd File", + "value": "Verify Group Who Owns /etc/security/opasswd File", "remarks": "rule_set_298" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_security_opasswd_old", + "value": "file_owner_etc_security_opasswd", "remarks": "rule_set_299" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns /etc/security/opasswd.old File", + "value": "Verify User Who Owns /etc/security/opasswd File", "remarks": "rule_set_299" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_security_opasswd_old", + "value": "file_permissions_etc_security_opasswd", "remarks": "rule_set_300" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns /etc/security/opasswd.old File", + "value": "Verify Permissions on /etc/security/opasswd File", "remarks": "rule_set_300" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_security_opasswd_old", + "value": "file_groupowner_etc_security_opasswd_old", "remarks": "rule_set_301" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on /etc/security/opasswd.old File", + "value": "Verify Group Who Owns /etc/security/opasswd.old File", "remarks": "rule_set_301" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_unauthorized_world_writable", + "value": "file_owner_etc_security_opasswd_old", "remarks": "rule_set_302" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure No World-Writable Files Exist", + "value": "Verify User Who Owns /etc/security/opasswd.old File", "remarks": "rule_set_302" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dir_perms_world_writable_sticky_bits", + "value": "file_permissions_etc_security_opasswd_old", "remarks": "rule_set_303" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify that All World-Writable Directories Have Sticky Bits Set", + "value": "Verify Permissions on /etc/security/opasswd.old File", "remarks": "rule_set_303" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_files_or_dirs_unowned_by_user", + "value": "file_permissions_unauthorized_world_writable", "remarks": "rule_set_304" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All Files And Directories Are Owned by a User", + "value": "Ensure No World-Writable Files Exist", "remarks": "rule_set_304" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_files_or_dirs_ungroupowned", + "value": "dir_perms_world_writable_sticky_bits", "remarks": "rule_set_305" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All Files And Directories Are Owned by a Group", + "value": "Verify that All World-Writable Directories Have Sticky Bits Set", "remarks": "rule_set_305" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_all_shadowed", + "value": "no_files_or_dirs_unowned_by_user", "remarks": "rule_set_306" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify All Account Password Hashes are Shadowed", + "value": "Ensure All Files And Directories Are Owned by a User", "remarks": "rule_set_306" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_empty_passwords_etc_shadow", + "value": "no_files_or_dirs_ungroupowned", "remarks": "rule_set_307" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure There Are No Accounts With Blank or Null Passwords", + "value": "Ensure All Files And Directories Are Owned by a Group", "remarks": "rule_set_307" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "gid_passwd_group_same", + "value": "accounts_password_all_shadowed", "remarks": "rule_set_308" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", + "value": "Verify All Account Password Hashes are Shadowed", "remarks": "rule_set_308" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "account_unique_id", + "value": "no_empty_passwords_etc_shadow", "remarks": "rule_set_309" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All Accounts on the System Have Unique User IDs", + "value": "Ensure There Are No Accounts With Blank or Null Passwords", "remarks": "rule_set_309" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "group_unique_id", + "value": "gid_passwd_group_same", "remarks": "rule_set_310" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All Groups on the System Have Unique Group ID", + "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", "remarks": "rule_set_310" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "account_unique_name", + "value": "account_unique_id", "remarks": "rule_set_311" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All Accounts on the System Have Unique Names", + "value": "Ensure All Accounts on the System Have Unique User IDs", "remarks": "rule_set_311" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "group_unique_name", + "value": "group_unique_id", "remarks": "rule_set_312" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All Groups on the System Have Unique Group Names", + "value": "Ensure All Groups on the System Have Unique Group ID", "remarks": "rule_set_312" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_user_interactive_home_directory_exists", + "value": "account_unique_name", "remarks": "rule_set_313" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All Interactive Users Home Directories Must Exist", + "value": "Ensure All Accounts on the System Have Unique Names", "remarks": "rule_set_313" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_ownership_home_directories", + "value": "group_unique_name", "remarks": "rule_set_314" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All Interactive User Home Directories Must Be Owned By The Primary User", + "value": "Ensure All Groups on the System Have Unique Group Names", "remarks": "rule_set_314" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_home_directories", + "value": "accounts_user_interactive_home_directory_exists", "remarks": "rule_set_315" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", + "value": "All Interactive Users Home Directories Must Exist", "remarks": "rule_set_315" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_user_dot_group_ownership", + "value": "file_ownership_home_directories", "remarks": "rule_set_316" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "User Initialization Files Must Be Group-Owned By The Primary Group", + "value": "All Interactive User Home Directories Must Be Owned By The Primary User", "remarks": "rule_set_316" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_user_dot_user_ownership", + "value": "file_permissions_home_directories", "remarks": "rule_set_317" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "User Initialization Files Must Be Owned By the Primary User", + "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", "remarks": "rule_set_317" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_user_dot_no_world_writable_programs", + "value": "accounts_user_dot_group_ownership", "remarks": "rule_set_318" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "User Initialization Files Must Not Run World-Writable Programs", + "value": "User Initialization Files Must Be Group-Owned By The Primary Group", "remarks": "rule_set_318" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permission_user_init_files", + "value": "accounts_user_dot_user_ownership", "remarks": "rule_set_319" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", + "value": "User Initialization Files Must Be Owned By the Primary User", "remarks": "rule_set_319" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_forward_files", + "value": "accounts_user_dot_no_world_writable_programs", "remarks": "rule_set_320" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify No .forward Files Exist", + "value": "User Initialization Files Must Not Run World-Writable Programs", "remarks": "rule_set_320" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_netrc_files", + "value": "file_permission_user_init_files", "remarks": "rule_set_321" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify No netrc Files Exist", + "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", "remarks": "rule_set_321" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_rhost_files", + "value": "no_forward_files", "remarks": "rule_set_322" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify No .rhost Files Exist", + "value": "Verify No .forward Files Exist", "remarks": "rule_set_322" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permission_user_bash_history", + "value": "no_netrc_files", "remarks": "rule_set_323" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure User Bash History File Has Correct Permissions", + "value": "Verify No netrc Files Exist", "remarks": "rule_set_323" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "kernel_module_overlayfs_disabled", + "value": "no_rhost_files", "remarks": "rule_set_324" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure overlayfs kernel module is not available", + "value": "Verify No .rhost Files Exist", "remarks": "rule_set_324" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "kernel_module_squashfs_disabled", + "value": "file_permission_user_bash_history", "remarks": "rule_set_325" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Mounting of squashfs", + "value": "Ensure User Bash History File Has Correct Permissions", "remarks": "rule_set_325" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "kernel_module_udf_disabled", + "value": "kernel_module_overlayfs_disabled", "remarks": "rule_set_326" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Mounting of udf", + "value": "Ensure overlayfs kernel module is not available", "remarks": "rule_set_326" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "partition_for_home", + "value": "kernel_module_squashfs_disabled", "remarks": "rule_set_327" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure /home Located On Separate Partition", + "value": "Disable Mounting of squashfs", "remarks": "rule_set_327" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "partition_for_var", + "value": "kernel_module_udf_disabled", "remarks": "rule_set_328" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure /var Located On Separate Partition", + "value": "Disable Mounting of udf", "remarks": "rule_set_328" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "partition_for_var_tmp", + "value": "partition_for_home", "remarks": "rule_set_329" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure /var/tmp Located On Separate Partition", + "value": "Ensure /home Located On Separate Partition", "remarks": "rule_set_329" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "partition_for_var_log", + "value": "partition_for_var", "remarks": "rule_set_330" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure /var/log Located On Separate Partition", + "value": "Ensure /var Located On Separate Partition", "remarks": "rule_set_330" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "partition_for_var_log_audit", + "value": "partition_for_var_tmp", "remarks": "rule_set_331" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure /var/log/audit Located On Separate Partition", + "value": "Ensure /var/tmp Located On Separate Partition", "remarks": "rule_set_331" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "disable_weak_deps", + "value": "partition_for_var_log", "remarks": "rule_set_332" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Installation of Weak Dependencies in DNF", + "value": "Ensure /var/log Located On Separate Partition", "remarks": "rule_set_332" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "selinux_state", + "value": "partition_for_var_log_audit", "remarks": "rule_set_333" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure SELinux State is Enforcing", + "value": "Ensure /var/log/audit Located On Separate Partition", "remarks": "rule_set_333" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_protected_symlinks", + "value": "disable_weak_deps", "remarks": "rule_set_334" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", + "value": "Disable Installation of Weak Dependencies in DNF", "remarks": "rule_set_334" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "xwayland_disabled", + "value": "selinux_state", "remarks": "rule_set_335" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable XWayland", + "value": "Ensure SELinux State is Enforcing", "remarks": "rule_set_335" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_cockpit_disabled", + "value": "sysctl_fs_protected_symlinks", "remarks": "rule_set_336" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Cockpit Management Server", + "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", "remarks": "rule_set_336" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_gdm_removed", + "value": "xwayland_disabled", "remarks": "rule_set_337" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove the GDM Package Group", + "value": "Disable XWayland", "remarks": "rule_set_337" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_xorg-x11-server-Xwayland_removed", + "value": "service_cockpit_disabled", "remarks": "rule_set_338" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove the X Windows Xwayland Package", + "value": "Disable Cockpit Management Server", "remarks": "rule_set_338" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_openldap-clients_removed", + "value": "package_gdm_removed", "remarks": "rule_set_339" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure LDAP client is not installed", + "value": "Remove the GDM Package Group", "remarks": "rule_set_339" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_ip_forward", + "value": "package_xorg-x11-server-Xwayland_removed", "remarks": "rule_set_340" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for IP Forwarding on IPv4 Interfaces", + "value": "Remove the X Windows Xwayland Package", "remarks": "rule_set_340" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_forwarding", + "value": "package_openldap-clients_removed", "remarks": "rule_set_341" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Forwarding", + "value": "Ensure LDAP client is not installed", "remarks": "rule_set_341" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_gssapi_auth", + "value": "sysctl_net_ipv4_ip_forward", "remarks": "rule_set_342" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable GSSAPI Authentication", + "value": "Disable Kernel Parameter for IP Forwarding on IPv4 Interfaces", "remarks": "rule_set_342" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sudo_remove_nopasswd", + "value": "sshd_disable_forwarding", "remarks": "rule_set_343" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD", + "value": "Disable SSH Forwarding", "remarks": "rule_set_343" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_passwords_pam_faillock_deny_root", + "value": "sshd_disable_gssapi_auth", "remarks": "rule_set_344" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure the root Account for Failed Password Attempts", + "value": "Disable GSSAPI Authentication", "remarks": "rule_set_344" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_minimum_age_login_defs", + "value": "sudo_remove_nopasswd", "remarks": "rule_set_345" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Minimum Age", + "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD", "remarks": "rule_set_345" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_set_min_life_existing", + "value": "accounts_passwords_pam_faillock_deny_root", "remarks": "rule_set_346" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Existing Passwords Minimum Age", + "value": "Configure the root Account for Failed Password Attempts", "remarks": "rule_set_346" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_nologin_in_shells", + "value": "accounts_minimum_age_login_defs", "remarks": "rule_set_347" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure nologin Shell is Not Listed in /etc/shells", + "value": "Set Password Minimum Age", "remarks": "rule_set_347" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_audit_installed", + "value": "accounts_password_set_min_life_existing", "remarks": "rule_set_348" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the audit Subsystem is Installed", + "value": "Set Existing Passwords Minimum Age", "remarks": "rule_set_348" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_audit-libs_installed", + "value": "no_nologin_in_shells", "remarks": "rule_set_349" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the audit-libs package as a part of audit Subsystem is Installed", + "value": "Ensure nologin Shell is Not Listed in /etc/shells", "remarks": "rule_set_349" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_audit_argument", + "value": "package_audit_installed", "remarks": "rule_set_350" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Auditing for Processes Which Start Prior to the Audit Daemon", + "value": "Ensure the audit Subsystem is Installed", "remarks": "rule_set_350" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_audit_backlog_limit_argument", + "value": "package_audit-libs_installed", "remarks": "rule_set_351" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Extend Audit Backlog Limit for the Audit Daemon", + "value": "Ensure the audit-libs package as a part of audit Subsystem is Installed", "remarks": "rule_set_351" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_auditd_enabled", + "value": "grub2_audit_argument", "remarks": "rule_set_352" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable auditd Service", + "value": "Enable Auditing for Processes Which Start Prior to the Audit Daemon", "remarks": "rule_set_352" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "auditd_data_retention_max_log_file", + "value": "grub2_audit_backlog_limit_argument", "remarks": "rule_set_353" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure auditd Max Log File Size", + "value": "Extend Audit Backlog Limit for the Audit Daemon", "remarks": "rule_set_353" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "auditd_data_retention_max_log_file_action", + "value": "service_auditd_enabled", "remarks": "rule_set_354" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure auditd max_log_file_action Upon Reaching Maximum Log Size", + "value": "Enable auditd Service", "remarks": "rule_set_354" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "auditd_data_disk_error_action", + "value": "auditd_data_retention_max_log_file", "remarks": "rule_set_355" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure auditd Disk Error Action on Disk Error", + "value": "Configure auditd Max Log File Size", "remarks": "rule_set_355" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "auditd_data_disk_full_action", + "value": "auditd_data_retention_max_log_file_action", "remarks": "rule_set_356" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure auditd Disk Full Action when Disk Space Is Full", + "value": "Configure auditd max_log_file_action Upon Reaching Maximum Log Size", "remarks": "rule_set_356" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "auditd_data_retention_admin_space_left_action", + "value": "auditd_data_disk_error_action", "remarks": "rule_set_357" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure auditd admin_space_left Action on Low Disk Space", + "value": "Configure auditd Disk Error Action on Disk Error", "remarks": "rule_set_357" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "auditd_data_retention_space_left_action", + "value": "auditd_data_disk_full_action", "remarks": "rule_set_358" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure auditd space_left Action on Low Disk Space", + "value": "Configure auditd Disk Full Action when Disk Space Is Full", "remarks": "rule_set_358" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_sysadmin_actions", + "value": "auditd_data_retention_admin_space_left_action", "remarks": "rule_set_359" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure auditd Collects System Administrator Actions", + "value": "Configure auditd admin_space_left Action on Low Disk Space", "remarks": "rule_set_359" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_suid_auid_privilege_function", + "value": "auditd_data_retention_space_left_action", "remarks": "rule_set_360" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events When Executables Are Run As Another User", + "value": "Configure auditd space_left Action on Low Disk Space", "remarks": "rule_set_360" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_sudo_log_events", + "value": "audit_rules_sysadmin_actions", "remarks": "rule_set_361" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to perform maintenance activities", + "value": "Ensure auditd Collects System Administrator Actions", "remarks": "rule_set_361" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_time_adjtimex", + "value": "audit_rules_suid_auid_privilege_function", "remarks": "rule_set_362" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record attempts to alter time through adjtimex", + "value": "Record Events When Executables Are Run As Another User", "remarks": "rule_set_362" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_time_settimeofday", + "value": "audit_sudo_log_events", "remarks": "rule_set_363" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record attempts to alter time through settimeofday", + "value": "Record Attempts to perform maintenance activities", "remarks": "rule_set_363" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_time_clock_settime", + "value": "audit_rules_time_adjtimex", "remarks": "rule_set_364" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Time Through clock_settime", + "value": "Record attempts to alter time through adjtimex", "remarks": "rule_set_364" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_time_watch_localtime", + "value": "audit_rules_time_settimeofday", "remarks": "rule_set_365" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter the localtime File", + "value": "Record attempts to alter time through settimeofday", "remarks": "rule_set_365" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_networkconfig_modification_setdomainname", + "value": "audit_rules_time_clock_settime", "remarks": "rule_set_366" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Network Environment - setdomainname", + "value": "Record Attempts to Alter Time Through clock_settime", "remarks": "rule_set_366" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_networkconfig_modification_sethostname", + "value": "audit_rules_time_watch_localtime", "remarks": "rule_set_367" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Network Environment - sethostname", + "value": "Record Attempts to Alter the localtime File", "remarks": "rule_set_367" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_networkconfig_modification_etc_issue", + "value": "audit_rules_networkconfig_modification_setdomainname", "remarks": "rule_set_368" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Network Environment - /etc/issue", + "value": "Record Events that Modify the System's Network Environment - setdomainname", "remarks": "rule_set_368" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_networkconfig_modification_etc_issue_net", + "value": "audit_rules_networkconfig_modification_sethostname", "remarks": "rule_set_369" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Network Environment - /etc/issue.net", + "value": "Record Events that Modify the System's Network Environment - sethostname", "remarks": "rule_set_369" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_networkconfig_modification_etc_hosts", + "value": "audit_rules_networkconfig_modification_etc_issue", "remarks": "rule_set_370" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Network Environment - /etc/hosts", + "value": "Record Events that Modify the System's Network Environment - /etc/issue", "remarks": "rule_set_370" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_networkconfig_modification_hostname_file", + "value": "audit_rules_networkconfig_modification_etc_issue_net", "remarks": "rule_set_371" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Network Environment - /etc/hostname", + "value": "Record Events that Modify the System's Network Environment - /etc/issue.net", "remarks": "rule_set_371" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_networkconfig_modification_etc_sysconfig_network", + "value": "audit_rules_networkconfig_modification_etc_hosts", "remarks": "rule_set_372" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Network Environment - /etc/sysconfig/network", + "value": "Record Events that Modify the System's Network Environment - /etc/hosts", "remarks": "rule_set_372" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_networkconfig_modification_etc_networkmanager_system_connections", + "value": "audit_rules_networkconfig_modification_hostname_file", "remarks": "rule_set_373" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/system-connections/", + "value": "Record Events that Modify the System's Network Environment - /etc/hostname", "remarks": "rule_set_373" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_networkconfig_modification_networkmanager", + "value": "audit_rules_networkconfig_modification_etc_sysconfig_network", "remarks": "rule_set_374" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/", + "value": "Record Events that Modify the System's Network Environment - /etc/sysconfig/network", "remarks": "rule_set_374" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_privileged_commands", + "value": "audit_rules_networkconfig_modification_etc_networkmanager_system_connections", "remarks": "rule_set_375" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure auditd Collects Information on the Use of Privileged Commands", + "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/system-connections/", "remarks": "rule_set_375" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_unsuccessful_file_modification_creat", + "value": "audit_rules_networkconfig_modification_networkmanager", "remarks": "rule_set_376" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Unsuccessful Access Attempts to Files - creat", + "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/", "remarks": "rule_set_376" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_unsuccessful_file_modification_ftruncate", + "value": "audit_rules_privileged_commands", "remarks": "rule_set_377" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Unsuccessful Access Attempts to Files - ftruncate", + "value": "Ensure auditd Collects Information on the Use of Privileged Commands", "remarks": "rule_set_377" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_unsuccessful_file_modification_open", + "value": "audit_rules_unsuccessful_file_modification_creat", "remarks": "rule_set_378" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Unsuccessful Access Attempts to Files - open", + "value": "Record Unsuccessful Access Attempts to Files - creat", "remarks": "rule_set_378" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_unsuccessful_file_modification_openat", + "value": "audit_rules_unsuccessful_file_modification_ftruncate", "remarks": "rule_set_379" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Unsuccessful Access Attempts to Files - openat", + "value": "Record Unsuccessful Access Attempts to Files - ftruncate", "remarks": "rule_set_379" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_unsuccessful_file_modification_truncate", + "value": "audit_rules_unsuccessful_file_modification_open", "remarks": "rule_set_380" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Unsuccessful Access Attempts to Files - truncate", + "value": "Record Unsuccessful Access Attempts to Files - open", "remarks": "rule_set_380" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_usergroup_modification_group", + "value": "audit_rules_unsuccessful_file_modification_openat", "remarks": "rule_set_381" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify User/Group Information - /etc/group", + "value": "Record Unsuccessful Access Attempts to Files - openat", "remarks": "rule_set_381" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_usergroup_modification_passwd", + "value": "audit_rules_unsuccessful_file_modification_truncate", "remarks": "rule_set_382" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify User/Group Information - /etc/passwd", + "value": "Record Unsuccessful Access Attempts to Files - truncate", "remarks": "rule_set_382" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_usergroup_modification_gshadow", + "value": "audit_rules_usergroup_modification_group", "remarks": "rule_set_383" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify User/Group Information - /etc/gshadow", + "value": "Record Events that Modify User/Group Information - /etc/group", "remarks": "rule_set_383" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_usergroup_modification_shadow", + "value": "audit_rules_usergroup_modification_passwd", "remarks": "rule_set_384" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify User/Group Information - /etc/shadow", + "value": "Record Events that Modify User/Group Information - /etc/passwd", "remarks": "rule_set_384" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_usergroup_modification_opasswd", + "value": "audit_rules_usergroup_modification_gshadow", "remarks": "rule_set_385" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", + "value": "Record Events that Modify User/Group Information - /etc/gshadow", "remarks": "rule_set_385" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_usergroup_modification_nsswitch_conf", + "value": "audit_rules_usergroup_modification_shadow", "remarks": "rule_set_386" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify User/Group Information - /etc/nsswitch.conf", + "value": "Record Events that Modify User/Group Information - /etc/shadow", "remarks": "rule_set_386" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_usergroup_modification_pam_conf", + "value": "audit_rules_usergroup_modification_opasswd", "remarks": "rule_set_387" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify User/Group Information - /etc/pam.conf", + "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", "remarks": "rule_set_387" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_usergroup_modification_pamd", + "value": "audit_rules_usergroup_modification_nsswitch_conf", "remarks": "rule_set_388" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify User/Group Information - /etc/pam.d/", + "value": "Record Events that Modify User/Group Information - /etc/nsswitch.conf", "remarks": "rule_set_388" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_dac_modification_chmod", + "value": "audit_rules_usergroup_modification_pam_conf", "remarks": "rule_set_389" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", + "value": "Record Events that Modify User/Group Information - /etc/pam.conf", "remarks": "rule_set_389" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_dac_modification_fchmod", + "value": "audit_rules_usergroup_modification_pamd", "remarks": "rule_set_390" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Discretionary Access Controls - fchmod", + "value": "Record Events that Modify User/Group Information - /etc/pam.d/", "remarks": "rule_set_390" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_dac_modification_fchmodat", + "value": "audit_rules_dac_modification_chmod", "remarks": "rule_set_391" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat", + "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", "remarks": "rule_set_391" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_dac_modification_fchmodat2", + "value": "audit_rules_dac_modification_fchmod", "remarks": "rule_set_392" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat2", + "value": "Record Events that Modify the System's Discretionary Access Controls - fchmod", "remarks": "rule_set_392" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_dac_modification_chown", + "value": "audit_rules_dac_modification_fchmodat", "remarks": "rule_set_393" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Discretionary Access Controls - chown", + "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat", "remarks": "rule_set_393" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_dac_modification_fchown", + "value": "audit_rules_dac_modification_fchmodat2", "remarks": "rule_set_394" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Discretionary Access Controls - fchown", + "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat2", "remarks": "rule_set_394" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_dac_modification_fchownat", + "value": "audit_rules_dac_modification_chown", "remarks": "rule_set_395" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Discretionary Access Controls - fchownat", + "value": "Record Events that Modify the System's Discretionary Access Controls - chown", "remarks": "rule_set_395" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_dac_modification_lchown", + "value": "audit_rules_dac_modification_fchown", "remarks": "rule_set_396" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Discretionary Access Controls - lchown", + "value": "Record Events that Modify the System's Discretionary Access Controls - fchown", "remarks": "rule_set_396" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_dac_modification_fremovexattr", + "value": "audit_rules_dac_modification_fchownat", "remarks": "rule_set_397" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Discretionary Access Controls - fremovexattr", + "value": "Record Events that Modify the System's Discretionary Access Controls - fchownat", "remarks": "rule_set_397" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_dac_modification_fsetxattr", + "value": "audit_rules_dac_modification_lchown", "remarks": "rule_set_398" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Discretionary Access Controls - fsetxattr", + "value": "Record Events that Modify the System's Discretionary Access Controls - lchown", "remarks": "rule_set_398" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_dac_modification_lremovexattr", + "value": "audit_rules_dac_modification_fremovexattr", "remarks": "rule_set_399" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Discretionary Access Controls - lremovexattr", + "value": "Record Events that Modify the System's Discretionary Access Controls - fremovexattr", "remarks": "rule_set_399" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_dac_modification_lsetxattr", + "value": "audit_rules_dac_modification_fsetxattr", "remarks": "rule_set_400" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Discretionary Access Controls - lsetxattr", + "value": "Record Events that Modify the System's Discretionary Access Controls - fsetxattr", "remarks": "rule_set_400" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_dac_modification_removexattr", + "value": "audit_rules_dac_modification_lremovexattr", "remarks": "rule_set_401" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Discretionary Access Controls - removexattr", + "value": "Record Events that Modify the System's Discretionary Access Controls - lremovexattr", "remarks": "rule_set_401" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_dac_modification_setxattr", + "value": "audit_rules_dac_modification_lsetxattr", "remarks": "rule_set_402" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Discretionary Access Controls - setxattr", + "value": "Record Events that Modify the System's Discretionary Access Controls - lsetxattr", "remarks": "rule_set_402" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_media_export", + "value": "audit_rules_dac_modification_removexattr", "remarks": "rule_set_403" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure auditd Collects Information on Exporting to Media (successful)", + "value": "Record Events that Modify the System's Discretionary Access Controls - removexattr", "remarks": "rule_set_403" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_session_events_utmp", + "value": "audit_rules_dac_modification_setxattr", "remarks": "rule_set_404" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Process and Session Initiation Information utmp", + "value": "Record Events that Modify the System's Discretionary Access Controls - setxattr", "remarks": "rule_set_404" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_session_events_btmp", + "value": "audit_rules_media_export", "remarks": "rule_set_405" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Process and Session Initiation Information btmp", + "value": "Ensure auditd Collects Information on Exporting to Media (successful)", "remarks": "rule_set_405" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_session_events_wtmp", + "value": "audit_rules_session_events_utmp", "remarks": "rule_set_406" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", + "value": "Record Attempts to Alter Process and Session Initiation Information utmp", "remarks": "rule_set_406" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_login_events_faillock", + "value": "audit_rules_session_events_btmp", "remarks": "rule_set_407" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Logon and Logout Events - faillock", + "value": "Record Attempts to Alter Process and Session Initiation Information btmp", "remarks": "rule_set_407" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_login_events_lastlog", + "value": "audit_rules_session_events_wtmp", "remarks": "rule_set_408" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Logon and Logout Events - lastlog", + "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", "remarks": "rule_set_408" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_file_deletion_events_unlink", + "value": "audit_rules_login_events_faillock", "remarks": "rule_set_409" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure auditd Collects File Deletion Events by User - unlink", + "value": "Record Attempts to Alter Logon and Logout Events - faillock", "remarks": "rule_set_409" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_file_deletion_events_unlinkat", + "value": "audit_rules_login_events_lastlog", "remarks": "rule_set_410" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure auditd Collects File Deletion Events by User - unlinkat", + "value": "Record Attempts to Alter Logon and Logout Events - lastlog", "remarks": "rule_set_410" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_file_deletion_events_rename", + "value": "audit_rules_file_deletion_events_unlink", "remarks": "rule_set_411" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure auditd Collects File Deletion Events by User - rename", + "value": "Ensure auditd Collects File Deletion Events by User - unlink", "remarks": "rule_set_411" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_file_deletion_events_renameat", + "value": "audit_rules_file_deletion_events_unlinkat", "remarks": "rule_set_412" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure auditd Collects File Deletion Events by User - renameat", + "value": "Ensure auditd Collects File Deletion Events by User - unlinkat", "remarks": "rule_set_412" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_file_deletion_events_renameat2", + "value": "audit_rules_file_deletion_events_rename", "remarks": "rule_set_413" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure auditd Collects File Deletion Events by User - renameat2", + "value": "Ensure auditd Collects File Deletion Events by User - rename", "remarks": "rule_set_413" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_mac_modification_etc_selinux", + "value": "audit_rules_file_deletion_events_renameat", "remarks": "rule_set_414" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Mandatory Access Controls (/etc/selinux)", + "value": "Ensure auditd Collects File Deletion Events by User - renameat", "remarks": "rule_set_414" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_mac_modification_usr_share", + "value": "audit_rules_file_deletion_events_renameat2", "remarks": "rule_set_415" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Mandatory Access Controls in usr/share", + "value": "Ensure auditd Collects File Deletion Events by User - renameat2", "remarks": "rule_set_415" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_execution_chcon", + "value": "audit_rules_mac_modification_etc_selinux", "remarks": "rule_set_416" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Any Attempts to Run chcon", + "value": "Record Events that Modify the System's Mandatory Access Controls (/etc/selinux)", "remarks": "rule_set_416" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_execution_setfacl", + "value": "audit_rules_mac_modification_usr_share", "remarks": "rule_set_417" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Any Attempts to Run setfacl", + "value": "Record Events that Modify the System's Mandatory Access Controls in usr/share", "remarks": "rule_set_417" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_execution_chacl", + "value": "audit_rules_execution_chcon", "remarks": "rule_set_418" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Any Attempts to Run chacl", + "value": "Record Any Attempts to Run chcon", "remarks": "rule_set_418" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_privileged_commands_usermod", + "value": "audit_rules_execution_setfacl", "remarks": "rule_set_419" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure auditd Collects Information on the Use of Privileged Commands - usermod", + "value": "Record Any Attempts to Run setfacl", "remarks": "rule_set_419" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_privileged_commands_kmod", + "value": "audit_rules_execution_chacl", "remarks": "rule_set_420" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure auditd Collects Information on the Use of Privileged Commands - kmod", + "value": "Record Any Attempts to Run chacl", "remarks": "rule_set_420" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_kernel_module_loading_init", + "value": "audit_rules_privileged_commands_usermod", "remarks": "rule_set_421" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure auditd Collects Information on Kernel Module Loading - init_module", + "value": "Ensure auditd Collects Information on the Use of Privileged Commands - usermod", "remarks": "rule_set_421" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_kernel_module_loading_finit", + "value": "audit_rules_privileged_commands_kmod", "remarks": "rule_set_422" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - finit_module", + "value": "Ensure auditd Collects Information on the Use of Privileged Commands - kmod", "remarks": "rule_set_422" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_kernel_module_loading_delete", + "value": "audit_rules_kernel_module_loading_init", "remarks": "rule_set_423" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure auditd Collects Information on Kernel Module Unloading - delete_module", + "value": "Ensure auditd Collects Information on Kernel Module Loading - init_module", "remarks": "rule_set_423" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_kernel_module_loading_query", + "value": "audit_rules_kernel_module_loading_finit", "remarks": "rule_set_424" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - query_module", + "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - finit_module", "remarks": "rule_set_424" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_continue_loading", + "value": "audit_rules_kernel_module_loading_delete", "remarks": "rule_set_425" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Audit Configuration is Loaded Regardless of Errors", + "value": "Ensure auditd Collects Information on Kernel Module Unloading - delete_module", "remarks": "rule_set_425" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_immutable", + "value": "audit_rules_kernel_module_loading_query", "remarks": "rule_set_426" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Make the auditd Configuration Immutable", + "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - query_module", "remarks": "rule_set_426" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "directory_permissions_var_log_audit", + "value": "audit_rules_continue_loading", "remarks": "rule_set_427" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "System Audit Logs Must Have Mode 0750 or Less Permissive", + "value": "Ensure the Audit Configuration is Loaded Regardless of Errors", "remarks": "rule_set_427" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_var_log_audit", + "value": "audit_rules_immutable", "remarks": "rule_set_428" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "System Audit Logs Must Have Mode 0640 or Less Permissive", + "value": "Make the auditd Configuration Immutable", "remarks": "rule_set_428" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_ownership_var_log_audit_stig", + "value": "directory_permissions_var_log_audit", "remarks": "rule_set_429" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "System Audit Logs Must Be Owned By Root", + "value": "System Audit Logs Must Have Mode 0750 or Less Permissive", "remarks": "rule_set_429" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_group_ownership_var_log_audit", + "value": "file_permissions_var_log_audit", "remarks": "rule_set_430" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "System Audit Logs Must Be Group Owned By Root", + "value": "System Audit Logs Must Have Mode 0640 or Less Permissive", "remarks": "rule_set_430" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_audit_configuration", + "value": "file_ownership_var_log_audit_stig", "remarks": "rule_set_431" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Audit Configuration Files Permissions are 640 or More Restrictive", + "value": "System Audit Logs Must Be Owned By Root", "remarks": "rule_set_431" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_ownership_audit_configuration", + "value": "file_group_ownership_var_log_audit", "remarks": "rule_set_432" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Audit Configuration Files Must Be Owned By Root", + "value": "System Audit Logs Must Be Group Owned By Root", "remarks": "rule_set_432" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupownership_audit_configuration", + "value": "file_permissions_audit_configuration", "remarks": "rule_set_433" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Audit Configuration Files Must Be Owned By Group root", + "value": "Audit Configuration Files Permissions are 640 or More Restrictive", "remarks": "rule_set_433" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_audit_binaries", + "value": "file_ownership_audit_configuration", "remarks": "rule_set_434" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify that audit tools Have Mode 0755 or less", + "value": "Audit Configuration Files Must Be Owned By Root", "remarks": "rule_set_434" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_ownership_audit_binaries", + "value": "file_groupownership_audit_configuration", "remarks": "rule_set_435" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify that audit tools are owned by root", + "value": "Audit Configuration Files Must Be Owned By Group root", "remarks": "rule_set_435" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupownership_audit_binaries", + "value": "file_permissions_audit_binaries", "remarks": "rule_set_436" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify that audit tools are owned by group root", + "value": "Verify that audit tools Have Mode 0755 or less", "remarks": "rule_set_436" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "file_ownership_audit_binaries", + "remarks": "rule_set_437" + }, + { + "name": "Rule_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Verify that audit tools are owned by root", + "remarks": "rule_set_437" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "file_groupownership_audit_binaries", + "remarks": "rule_set_438" + }, + { + "name": "Rule_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Verify that audit tools are owned by group root", + "remarks": "rule_set_438" } ], "control-implementations": [ { - "uuid": "c1d2a913-8b3b-40b3-8c25-c284560f568c", + "uuid": "3e1d3517-503f-47da-9689-141026c8b80d", "source": "trestle://profiles/rhel10-cis_rhel10-l2_server/profile.json", "description": "Control implementation for cis", "props": [ @@ -6883,7 +6907,7 @@ ], "implemented-requirements": [ { - "uuid": "6d6344d6-f4d5-460a-aeca-e54b0378a266", + "uuid": "a2415e21-8082-49fb-9c5d-a070cdb5e2da", "control-id": "cis_rhel10_1-1.1.6", "description": "No notes for control-id 1.1.1.6.", "props": [ @@ -6900,7 +6924,7 @@ ] }, { - "uuid": "103e11b5-f69e-4e91-965d-3e22b4047041", + "uuid": "ae4d4ea7-0edb-4992-81fc-93f9c99ae848", "control-id": "cis_rhel10_1-1.1.7", "description": "No notes for control-id 1.1.1.7.", "props": [ @@ -6917,7 +6941,7 @@ ] }, { - "uuid": "78eeb7da-c986-456b-a1f7-a0e164c12d90", + "uuid": "57d943c1-37d3-4822-9b30-69908bee45d5", "control-id": "cis_rhel10_1-1.1.8", "description": "No notes for control-id 1.1.1.8.", "props": [ @@ -6934,7 +6958,7 @@ ] }, { - "uuid": "9d1d4900-c464-4693-bbb6-52bde2691a4d", + "uuid": "23038421-5cb4-44b9-8039-6e53ec31e462", "control-id": "cis_rhel10_1-1.2.3.1", "description": "No notes for control-id 1.1.2.3.1.", "props": [ @@ -6951,7 +6975,7 @@ ] }, { - "uuid": "dcbc4748-9a90-4c13-86fe-34b6f563fc63", + "uuid": "fd96260a-00e1-46fd-a4d8-1d3e3479f785", "control-id": "cis_rhel10_1-1.2.4.1", "description": "No notes for control-id 1.1.2.4.1.", "props": [ @@ -6968,7 +6992,7 @@ ] }, { - "uuid": "ba064367-b839-48b2-bc7e-3d238fd71c97", + "uuid": "98826772-5de3-4168-88b8-5352d0810784", "control-id": "cis_rhel10_1-1.2.5.1", "description": "No notes for control-id 1.1.2.5.1.", "props": [ @@ -6985,7 +7009,7 @@ ] }, { - "uuid": "b02edf5b-5ccb-4c52-b8c3-5bd259b12933", + "uuid": "7489e472-222b-48bb-9199-05cefe86146b", "control-id": "cis_rhel10_1-1.2.6.1", "description": "No notes for control-id 1.1.2.6.1.", "props": [ @@ -7002,7 +7026,7 @@ ] }, { - "uuid": "b08d9533-167b-4608-8fc2-7c58d9411ed3", + "uuid": "2fe69f9b-3bc0-40ff-b423-847eee34ba2c", "control-id": "cis_rhel10_1-1.2.7.1", "description": "No notes for control-id 1.1.2.7.1.", "props": [ @@ -7019,7 +7043,7 @@ ] }, { - "uuid": "9eeb0bc2-1b6b-4aaf-b990-95f2508ba10c", + "uuid": "6f86f55d-d429-46a2-8916-7c71cfcdd25a", "control-id": "cis_rhel10_1-2.1.3", "description": "The description for control-id cis_rhel10_1-2.1.3.", "props": [ @@ -7032,7 +7056,7 @@ ] }, { - "uuid": "25973778-8247-4097-84a2-48b4ea27484b", + "uuid": "8a236fac-8429-47ba-ac9b-31d84cf98bca", "control-id": "cis_rhel10_1-2.1.5", "description": "No notes for control-id 1.2.1.5.", "props": [ @@ -7049,7 +7073,7 @@ ] }, { - "uuid": "1a075dba-7979-4697-9457-d9482d89e4c7", + "uuid": "26fb547b-792b-4cb1-9827-7646bb31e92b", "control-id": "cis_rhel10_1-3.1.5", "description": "No notes for control-id 1.3.1.5.", "props": [ @@ -7066,7 +7090,7 @@ ] }, { - "uuid": "b1c61839-5a77-4b47-aea0-eccc2c12483e", + "uuid": "7682a560-47a3-43a1-a524-30a6af52818e", "control-id": "cis_rhel10_1-3.1.6", "description": "The description for control-id cis_rhel10_1-3.1.6.", "props": [ @@ -7079,7 +7103,7 @@ ] }, { - "uuid": "d3e20480-d74a-4782-ad2f-2aa3332f85e3", + "uuid": "f01bd672-faff-4522-8e67-039d3ebaf661", "control-id": "cis_rhel10_1-5.3", "description": "No notes for control-id 1.5.3.", "props": [ @@ -7096,7 +7120,7 @@ ] }, { - "uuid": "40e79094-b239-4f81-8057-0bf5aa13aede", + "uuid": "4557faa8-3bff-47c8-a37e-0a66fdae02c7", "control-id": "cis_rhel10_1-8.6", "description": "No notes for control-id 1.8.6.", "props": [ @@ -7113,7 +7137,7 @@ ] }, { - "uuid": "648a66d0-c246-46ae-8110-ebb0b8881c96", + "uuid": "577375a4-1e9c-4686-a4ce-beef1a97f864", "control-id": "cis_rhel10_2-1.3", "description": "No notes for control-id 2.1.3.", "props": [ @@ -7130,7 +7154,7 @@ ] }, { - "uuid": "be2f29fe-84ad-4de8-bf79-6a49f64c6f25", + "uuid": "2fceae92-060a-4276-b919-db789898bcfe", "control-id": "cis_rhel10_2-1.19", "description": "No notes for control-id 2.1.19.", "props": [ @@ -7147,7 +7171,7 @@ ] }, { - "uuid": "a4ee8b99-2429-476c-84a4-839ce32ac852", + "uuid": "97fa8dce-63a3-4561-8c05-883048683a88", "control-id": "cis_rhel10_2-1.20", "description": "No notes for control-id 2.1.20.", "props": [ @@ -7164,7 +7188,7 @@ ] }, { - "uuid": "3264ca19-e69b-4c2d-b55b-02f9679ee625", + "uuid": "8b9f6118-448a-4e96-9fc5-0fe35bddb8a4", "control-id": "cis_rhel10_2-2.2", "description": "No notes for control-id 2.2.2.", "props": [ @@ -7181,7 +7205,7 @@ ] }, { - "uuid": "163c241b-a780-4dbc-8a46-457d53ce7aa1", + "uuid": "ab9d5cbd-0433-49f8-a857-f7bfb0a95814", "control-id": "cis_rhel10_3-3.1.1", "description": "No notes for control-id 3.3.1.1.", "props": [ @@ -7198,7 +7222,7 @@ ] }, { - "uuid": "ba40f570-4316-49d5-8c60-a787548c3e07", + "uuid": "c0876afb-3eb8-4749-afb6-b3fda3edb7cf", "control-id": "cis_rhel10_5-1.8", "description": "No notes for control-id 5.1.8.", "props": [ @@ -7215,7 +7239,7 @@ ] }, { - "uuid": "6c5b81a0-5486-4c35-9fb0-37c8a0f793f9", + "uuid": "bb98337a-7a62-4260-9ad5-622780dc87f3", "control-id": "cis_rhel10_5-1.9", "description": "No notes for control-id 5.1.9.", "props": [ @@ -7232,7 +7256,7 @@ ] }, { - "uuid": "f6daf154-429c-4cbe-9ff6-ecc27414c5e6", + "uuid": "86ba9a70-5c4a-4393-80e1-af82924392b8", "control-id": "cis_rhel10_5-2.4", "description": "No notes for control-id 5.2.4.", "props": [ @@ -7249,7 +7273,7 @@ ] }, { - "uuid": "f9a198cc-fd04-4f7e-9645-c1525aa9cafb", + "uuid": "017ceca0-a449-4a06-9c02-b904ce8480e8", "control-id": "cis_rhel10_5-3.2.1.3", "description": "No notes for control-id 5.3.2.1.3.", "props": [ @@ -7266,7 +7290,7 @@ ] }, { - "uuid": "d2faf37c-2705-41cb-9d4b-c7fcffdd9887", + "uuid": "9682baf1-8bce-4a21-9e88-775b42e7912f", "control-id": "cis_rhel10_5-4.1.2", "description": "No notes for control-id 5.4.1.2.", "props": [ @@ -7288,7 +7312,7 @@ ] }, { - "uuid": "8156dd40-a3ff-411f-a8ff-df82dd0864ae", + "uuid": "16cdcf35-4f2f-4a07-91e9-69fe6d06280c", "control-id": "cis_rhel10_5-4.3.1", "description": "No notes for control-id 5.4.3.1.", "props": [ @@ -7305,7 +7329,7 @@ ] }, { - "uuid": "9118f619-e027-484f-ad1b-e72978fc0b39", + "uuid": "ec9c9509-2b78-48da-94cd-68a100e99e66", "control-id": "cis_rhel10_6-3.1.1", "description": "No notes for control-id 6.3.1.1.", "props": [ @@ -7327,7 +7351,7 @@ ] }, { - "uuid": "59b0a617-f265-4d09-ac7e-7171c0648179", + "uuid": "3fe11f3e-bb59-4187-b05a-b118efd3f9bc", "control-id": "cis_rhel10_6-3.1.2", "description": "No notes for control-id 6.3.1.2.", "props": [ @@ -7344,7 +7368,7 @@ ] }, { - "uuid": "11ee246c-5389-426d-94d6-1ed25f3774ef", + "uuid": "fcf5868c-4729-4798-8bb6-370bd4d741f2", "control-id": "cis_rhel10_6-3.1.3", "description": "No notes for control-id 6.3.1.3.", "props": [ @@ -7361,7 +7385,7 @@ ] }, { - "uuid": "c58c7f29-cfab-41e8-a54a-e6bda76c85f1", + "uuid": "9108f169-eebb-491d-93d1-c1e1f15f99b8", "control-id": "cis_rhel10_6-3.1.4", "description": "No notes for control-id 6.3.1.4.", "props": [ @@ -7378,7 +7402,7 @@ ] }, { - "uuid": "5fbc36fc-73b2-47a5-9310-6399d3d6e254", + "uuid": "a715d9f8-7f06-4b39-9f6e-15d2d222fff6", "control-id": "cis_rhel10_6-3.2.1", "description": "No notes for control-id 6.3.2.1.", "props": [ @@ -7395,7 +7419,7 @@ ] }, { - "uuid": "ccf80745-94d3-4755-8f8d-4f19f627951b", + "uuid": "bdb7057b-f62c-4c9c-a7b7-5c0763e53093", "control-id": "cis_rhel10_6-3.2.2", "description": "No notes for control-id 6.3.2.2.", "props": [ @@ -7412,7 +7436,7 @@ ] }, { - "uuid": "324737a7-2fcf-44c3-9cba-628acc4d522b", + "uuid": "d6fd8c0d-6b60-4245-b718-0fbab1fd051c", "control-id": "cis_rhel10_6-3.2.3", "description": "No notes for control-id 6.3.2.3.", "props": [ @@ -7434,7 +7458,7 @@ ] }, { - "uuid": "3ba5b075-3afa-44aa-842c-641f583845e2", + "uuid": "3292e0bf-25a1-47b2-a4fa-5634a2b13fa6", "control-id": "cis_rhel10_6-3.2.4", "description": "No notes for control-id 6.3.2.4.", "props": [ @@ -7456,7 +7480,7 @@ ] }, { - "uuid": "bd1ae7a3-3f17-4ef7-a2fc-80d15b81908a", + "uuid": "5460c975-e7cb-4ee7-9fe2-dce340424380", "control-id": "cis_rhel10_6-3.3.1", "description": "No notes for control-id 6.3.3.1.", "props": [ @@ -7473,7 +7497,7 @@ ] }, { - "uuid": "3e7e1917-227f-4bd3-b884-d18add076879", + "uuid": "95760766-e504-4052-b2bd-337c281eb3e1", "control-id": "cis_rhel10_6-3.3.2", "description": "No notes for control-id 6.3.3.2.", "props": [ @@ -7490,7 +7514,7 @@ ] }, { - "uuid": "654b20d6-0c98-4fda-a7a2-22c1de3c95e5", + "uuid": "4c694be9-ee7f-4130-b33d-10ef5748a38d", "control-id": "cis_rhel10_6-3.3.3", "description": "No notes for control-id 6.3.3.3.", "props": [ @@ -7507,7 +7531,7 @@ ] }, { - "uuid": "45fbe780-bc4d-4460-b305-a9fa6ac2ac5c", + "uuid": "9650181b-00a6-407d-bf8d-1a3c87b18ad3", "control-id": "cis_rhel10_6-3.3.4", "description": "No notes for control-id 6.3.3.4.", "props": [ @@ -7539,7 +7563,7 @@ ] }, { - "uuid": "5d57f263-9874-4f42-b146-c168c8eb125d", + "uuid": "1b55602d-d62c-425e-812f-642cdfb971ed", "control-id": "cis_rhel10_6-3.3.5", "description": "No notes for control-id 6.3.3.5.", "props": [ @@ -7561,7 +7585,7 @@ ] }, { - "uuid": "8b38e2cb-bc63-4ccb-90c5-d61b9b3e0f07", + "uuid": "7377e204-4149-416b-afae-4c032ebd1218", "control-id": "cis_rhel10_6-3.3.6", "description": "No notes for control-id 6.3.3.6.", "props": [ @@ -7583,7 +7607,7 @@ ] }, { - "uuid": "92ff4f3d-a2a8-4bc0-a3ab-968d8a766947", + "uuid": "275ad94f-ee40-48c6-bc9d-8471cb09eff4", "control-id": "cis_rhel10_6-3.3.7", "description": "No notes for control-id 6.3.3.7.", "props": [ @@ -7605,7 +7629,7 @@ ] }, { - "uuid": "03c2fd87-ac88-43ac-a024-7bdfd36db5bb", + "uuid": "fee788b6-2d52-4b04-9711-7d24fbe083b9", "control-id": "cis_rhel10_6-3.3.8", "description": "No notes for control-id 6.3.3.8.", "props": [ @@ -7627,7 +7651,7 @@ ] }, { - "uuid": "3532800d-9f78-4c89-89a3-7ccda449bbdd", + "uuid": "e12cbfbb-e320-4d89-ae23-d55da8000f7f", "control-id": "cis_rhel10_6-3.3.9", "description": "No notes for control-id 6.3.3.9.", "props": [ @@ -7644,7 +7668,7 @@ ] }, { - "uuid": "7bdc67cd-7551-4e6c-8bf8-e34d3a7cc4a2", + "uuid": "23e3b771-40ea-490a-827f-2d0381bb7742", "control-id": "cis_rhel10_6-3.3.10", "description": "No notes for control-id 6.3.3.10.", "props": [ @@ -7661,7 +7685,7 @@ ] }, { - "uuid": "e4539beb-4f2e-4ab4-84d8-ede618310fc6", + "uuid": "902aa7c1-6eeb-49f7-93a4-530fbdef4bfc", "control-id": "cis_rhel10_6-3.3.11", "description": "No notes for control-id 6.3.3.11.", "props": [ @@ -7698,7 +7722,7 @@ ] }, { - "uuid": "839bfece-7177-480a-b1f0-6d0b2522fa78", + "uuid": "e51c83fb-4147-4ecd-8781-4c74e6eea226", "control-id": "cis_rhel10_6-3.3.12", "description": "No notes for control-id 6.3.3.12.", "props": [ @@ -7715,7 +7739,7 @@ ] }, { - "uuid": "2386ea60-86e5-4370-bcd8-29f82a4e3275", + "uuid": "47db96af-61ae-4ff0-a40a-32bd9cbe02a1", "control-id": "cis_rhel10_6-3.3.13", "description": "No notes for control-id 6.3.3.13.", "props": [ @@ -7732,7 +7756,7 @@ ] }, { - "uuid": "71fd6fd0-ae7c-4e3f-b355-667d81f6ab5a", + "uuid": "65e440c5-8b25-432d-8950-58fb0170bea0", "control-id": "cis_rhel10_6-3.3.14", "description": "No notes for control-id 6.3.3.14.", "props": [ @@ -7754,7 +7778,7 @@ ] }, { - "uuid": "ff4f5c29-dc2d-4769-9541-4c88815c718d", + "uuid": "e0ffbe58-7d1f-44be-96c2-f42d84322c03", "control-id": "cis_rhel10_6-3.3.15", "description": "No notes for control-id 6.3.3.15.", "props": [ @@ -7771,7 +7795,7 @@ ] }, { - "uuid": "4b0be3c4-81ab-42e7-ad9d-4f860ba31223", + "uuid": "254efaa1-80ec-4cc6-b644-3a6929055ba3", "control-id": "cis_rhel10_6-3.3.16", "description": "No notes for control-id 6.3.3.16.", "props": [ @@ -7788,7 +7812,7 @@ ] }, { - "uuid": "2a3cb5e1-45bd-4c21-aec7-44033dcaa8e1", + "uuid": "495776f8-0e33-4db4-a0b4-8d3df4ee36f9", "control-id": "cis_rhel10_6-3.3.17", "description": "No notes for control-id 6.3.3.17.", "props": [ @@ -7810,7 +7834,7 @@ ] }, { - "uuid": "a8204588-ecbf-48da-9b88-a7a80b64475a", + "uuid": "fa0d448e-9999-4122-90f9-361275ac4785", "control-id": "cis_rhel10_6-3.3.18", "description": "No notes for control-id 6.3.3.18.", "props": [ @@ -7842,7 +7866,7 @@ ] }, { - "uuid": "b9745d75-b8c4-4898-98b8-cba2291ec5f3", + "uuid": "3cc0d7f4-dc67-446b-a4cd-206e50e3d157", "control-id": "cis_rhel10_6-3.3.19", "description": "No notes for control-id 6.3.3.19.", "props": [ @@ -7874,7 +7898,7 @@ ] }, { - "uuid": "509bff24-30e0-4b79-af5a-e6da3385459b", + "uuid": "7b92f5b7-1091-4002-93be-4dc30f5eff95", "control-id": "cis_rhel10_6-3.3.20", "description": "No notes for control-id 6.3.3.20.", "props": [ @@ -7916,7 +7940,7 @@ ] }, { - "uuid": "2d46ccf8-5190-4ea2-bd11-fe05617193d1", + "uuid": "582d368a-fa19-4ceb-892f-d637e85df130", "control-id": "cis_rhel10_6-3.3.21", "description": "No notes for control-id 6.3.3.21.", "props": [ @@ -7933,7 +7957,7 @@ ] }, { - "uuid": "8f5e3cb4-4828-40bb-b726-b40b8dc2ec8f", + "uuid": "eff4d450-b88c-43cf-a416-2dab1796cb32", "control-id": "cis_rhel10_6-3.3.22", "description": "No notes for control-id 6.3.3.22.", "props": [ @@ -7960,7 +7984,7 @@ ] }, { - "uuid": "5838cd91-c335-4177-a87b-348c5050208e", + "uuid": "08133392-bd44-41f4-9802-b2f87d091d9b", "control-id": "cis_rhel10_6-3.3.23", "description": "No notes for control-id 6.3.3.23.", "props": [ @@ -7982,7 +8006,7 @@ ] }, { - "uuid": "13d526bd-6143-4cc3-b076-0c809983e917", + "uuid": "12c08845-66d7-4ebd-ac42-68737874cda5", "control-id": "cis_rhel10_6-3.3.24", "description": "No notes for control-id 6.3.3.24.", "props": [ @@ -8004,7 +8028,7 @@ ] }, { - "uuid": "02907321-c6a5-481c-a83d-6f719312ed83", + "uuid": "3ed9c243-6aa1-447f-985d-c13448434283", "control-id": "cis_rhel10_6-3.3.25", "description": "No notes for control-id 6.3.3.25.", "props": [ @@ -8031,7 +8055,7 @@ ] }, { - "uuid": "7725dd8f-4715-4cb5-b315-e57e8fe8141a", + "uuid": "92321aac-3cac-48cf-848a-357621c4b07d", "control-id": "cis_rhel10_6-3.3.26", "description": "No notes for control-id 6.3.3.26.", "props": [ @@ -8053,7 +8077,7 @@ ] }, { - "uuid": "23b4bb48-9f30-4316-9fc9-f19f9e7c60f7", + "uuid": "219d692c-54de-43a7-8b81-6c0e5962ff16", "control-id": "cis_rhel10_6-3.3.27", "description": "No notes for control-id 6.3.3.27.", "props": [ @@ -8070,7 +8094,7 @@ ] }, { - "uuid": "9339e356-e4dc-4e66-a497-a75ea36cd802", + "uuid": "81901f20-d941-46c1-ac4f-814f56d8ff9f", "control-id": "cis_rhel10_6-3.3.28", "description": "No notes for control-id 6.3.3.28.", "props": [ @@ -8087,7 +8111,7 @@ ] }, { - "uuid": "b4c4fd74-f828-4f5e-b9de-e31293cde9dc", + "uuid": "ef5bb93c-dfeb-4345-b33b-4339b3d56be6", "control-id": "cis_rhel10_6-3.3.29", "description": "No notes for control-id 6.3.3.29.", "props": [ @@ -8104,7 +8128,7 @@ ] }, { - "uuid": "884afd79-4653-44a2-8d85-874dc078eb97", + "uuid": "89b355b6-6099-4ec8-8fac-13c5fffa0d56", "control-id": "cis_rhel10_6-3.3.30", "description": "No notes for control-id 6.3.3.30.", "props": [ @@ -8121,7 +8145,7 @@ ] }, { - "uuid": "985cc5d3-5511-488d-8f6d-06d555e1b640", + "uuid": "3bf3cadb-ebf8-4c3d-b42b-763c8a50bcc0", "control-id": "cis_rhel10_6-3.3.31", "description": "No notes for control-id 6.3.3.31.", "props": [ @@ -8138,7 +8162,7 @@ ] }, { - "uuid": "36f82a13-d0ca-4eb1-928f-4d7f57d5a623", + "uuid": "276d72e2-29d1-41e4-97c0-d057769bdd78", "control-id": "cis_rhel10_6-3.3.32", "description": "No notes for control-id 6.3.3.32.", "props": [ @@ -8160,7 +8184,7 @@ ] }, { - "uuid": "42361023-10e4-485d-ba13-b0f6b07a0382", + "uuid": "82b0a3ed-c8c1-4ec6-8c61-05acdcbfd2c2", "control-id": "cis_rhel10_6-3.3.33", "description": "No notes for control-id 6.3.3.33.", "props": [ @@ -8177,7 +8201,7 @@ ] }, { - "uuid": "f462cdc8-a92f-4781-aaa7-cfb5812eaca1", + "uuid": "ba9280d8-4146-4143-8229-d1a11a8fab28", "control-id": "cis_rhel10_6-3.3.34", "description": "No notes for control-id 6.3.3.34.", "props": [ @@ -8194,7 +8218,7 @@ ] }, { - "uuid": "2268889a-94ac-483e-b876-1237e1ed3d28", + "uuid": "823e1c91-3bed-41c3-87bf-d9b19842d90e", "control-id": "cis_rhel10_6-3.3.35", "description": "No notes for control-id 6.3.3.35.", "props": [ @@ -8211,7 +8235,7 @@ ] }, { - "uuid": "21b52178-6182-46c1-b344-b03cea420dbc", + "uuid": "1d2416b1-a1ed-4c54-b2b4-6ce124cd385b", "control-id": "cis_rhel10_6-3.3.36", "description": "No notes for control-id 6.3.3.36.", "props": [ @@ -8228,7 +8252,7 @@ ] }, { - "uuid": "a5bf2483-f85b-40be-bf92-72e0450b6e0e", + "uuid": "bf5d8e77-cec1-4b6a-898d-a7fffeb409c1", "control-id": "cis_rhel10_6-3.3.37", "description": "The description for control-id cis_rhel10_6-3.3.37.", "props": [ @@ -8241,7 +8265,7 @@ ] }, { - "uuid": "77d5b346-ea8f-4a0c-9a38-ce8448186006", + "uuid": "33b0017d-97d3-471c-9d96-0c7eeca29a5c", "control-id": "cis_rhel10_6-3.4.1", "description": "No notes for control-id 6.3.4.1.", "props": [ @@ -8258,7 +8282,7 @@ ] }, { - "uuid": "64880293-ca5b-4298-aa66-3b1b71c4d441", + "uuid": "6bf99192-d675-41fd-bec2-6741aeefd73d", "control-id": "cis_rhel10_6-3.4.2", "description": "No notes for control-id 6.3.4.2.", "props": [ @@ -8275,7 +8299,7 @@ ] }, { - "uuid": "d1bc42e9-598c-4e54-8a72-7285a9e813cb", + "uuid": "bc0d85f7-e1c7-4449-b8d1-cd5a3ccfb505", "control-id": "cis_rhel10_6-3.4.3", "description": "No notes for control-id 6.3.4.3.", "props": [ @@ -8292,7 +8316,7 @@ ] }, { - "uuid": "487eb87a-2f04-416f-b27a-958286c2702c", + "uuid": "014c554c-8ae7-47b1-87da-32923208fd92", "control-id": "cis_rhel10_6-3.4.4", "description": "No notes for control-id 6.3.4.4.", "props": [ @@ -8309,7 +8333,7 @@ ] }, { - "uuid": "80cc660b-442c-4168-a1ee-72a028d62082", + "uuid": "365c3ff0-3b42-4607-a5b7-2c8d6b62fc3d", "control-id": "cis_rhel10_6-3.4.5", "description": "No notes for control-id 6.3.4.5.", "props": [ @@ -8326,7 +8350,7 @@ ] }, { - "uuid": "2c690971-1f0c-452c-af7e-f949ad66a093", + "uuid": "f4813709-709a-4eaa-b863-2531420add20", "control-id": "cis_rhel10_6-3.4.6", "description": "No notes for control-id 6.3.4.6.", "props": [ @@ -8343,7 +8367,7 @@ ] }, { - "uuid": "9e107b25-7a28-4e0b-a219-3d54e1d9a185", + "uuid": "f011e80c-bdd0-45bf-910f-f85ea387de92", "control-id": "cis_rhel10_6-3.4.7", "description": "No notes for control-id 6.3.4.7.", "props": [ @@ -8360,7 +8384,7 @@ ] }, { - "uuid": "107cd39a-d6b0-4e4c-95d3-f15961c8f9cd", + "uuid": "0562c013-e36c-4175-8470-45430ff0be65", "control-id": "cis_rhel10_6-3.4.8", "description": "No notes for control-id 6.3.4.8.", "props": [ @@ -8377,7 +8401,7 @@ ] }, { - "uuid": "d031a6ee-1e1d-4add-9309-c43fed9107a5", + "uuid": "58a4c015-8bcb-4472-a73e-0bb4fbb0f448", "control-id": "cis_rhel10_6-3.4.9", "description": "No notes for control-id 6.3.4.9.", "props": [ @@ -8394,7 +8418,7 @@ ] }, { - "uuid": "8bfdae3b-edfa-44f2-8fb6-94da1af27f4d", + "uuid": "c068f846-a460-429a-b1f4-1b7c9885c824", "control-id": "cis_rhel10_6-3.4.10", "description": "No notes for control-id 6.3.4.10.", "props": [ @@ -8411,7 +8435,7 @@ ] }, { - "uuid": "ec72dd54-79ad-436d-a86b-026dd37b04e2", + "uuid": "d7e4694c-a085-459c-9d6e-a435ef7c9497", "control-id": "reload_dconf_db", "description": "This is a helper rule to reload Dconf database correctly.", "props": [ @@ -8428,7 +8452,7 @@ ] }, { - "uuid": "087cd9dc-7460-4cea-9bd9-8830aecf8690", + "uuid": "72c840e6-44bb-4532-8ff1-64b7039b3d6c", "control-id": "cis_rhel10_1-1.1.1", "description": "No notes for control-id 1.1.1.1.", "props": [ @@ -8445,7 +8469,7 @@ ] }, { - "uuid": "2b83adbd-6a98-4f73-b4d2-69ecbfaf1389", + "uuid": "429ab9c8-ecc6-41ba-8d45-967be83cc9c2", "control-id": "cis_rhel10_1-1.1.2", "description": "No notes for control-id 1.1.1.2.", "props": [ @@ -8462,7 +8486,7 @@ ] }, { - "uuid": "ac3b30d4-f090-4e3c-9d0c-3288cd64f5a6", + "uuid": "067abcce-9b12-4eb7-8369-a486e6ed0e91", "control-id": "cis_rhel10_1-1.1.3", "description": "No notes for control-id 1.1.1.3.", "props": [ @@ -8479,7 +8503,7 @@ ] }, { - "uuid": "e0309c5b-4fe5-4a4a-bbfe-00f39b3b2b12", + "uuid": "40ae3669-7575-4b96-9d77-4fa7c43d5028", "control-id": "cis_rhel10_1-1.1.4", "description": "No notes for control-id 1.1.1.4.", "props": [ @@ -8496,7 +8520,7 @@ ] }, { - "uuid": "cda022e6-ba41-4c68-be42-d6eaf6d07dab", + "uuid": "971341a4-2bb7-406e-95c6-b65f6a9c73a3", "control-id": "cis_rhel10_1-1.1.5", "description": "No notes for control-id 1.1.1.5.", "props": [ @@ -8513,7 +8537,7 @@ ] }, { - "uuid": "1acfb59b-57c3-44b6-99c1-a6f1a5eebfc8", + "uuid": "b396002a-92a6-4264-9a01-406fd7445010", "control-id": "cis_rhel10_1-1.1.9", "description": "No notes for control-id 1.1.1.9.", "props": [ @@ -8530,7 +8554,7 @@ ] }, { - "uuid": "f15d00eb-64ab-44ee-9fd4-984da398e0cf", + "uuid": "83353c66-a9fd-4fb8-86d6-22ae158a1888", "control-id": "cis_rhel10_1-1.1.10", "description": "No notes for control-id 1.1.1.10.", "props": [ @@ -8547,7 +8571,7 @@ ] }, { - "uuid": "b224770c-60a8-42f2-866d-4e64c669ce61", + "uuid": "b408493e-14f4-431d-ae00-86ec807525c2", "control-id": "cis_rhel10_1-1.1.11", "description": "The description for control-id cis_rhel10_1-1.1.11.", "props": [ @@ -8560,7 +8584,7 @@ ] }, { - "uuid": "340f4653-bdac-4ba9-b115-db1b9038620f", + "uuid": "99273373-229f-46d2-aeef-a8a29cdf24ca", "control-id": "cis_rhel10_1-1.2.1.1", "description": "No notes for control-id 1.1.2.1.1.", "props": [ @@ -8577,7 +8601,7 @@ ] }, { - "uuid": "45e9bc3d-946c-4199-b1ed-a038037b1b0f", + "uuid": "95fd5a5c-5bc7-49e9-93a0-b734d79879fc", "control-id": "cis_rhel10_1-1.2.1.2", "description": "No notes for control-id 1.1.2.1.2.", "props": [ @@ -8594,7 +8618,7 @@ ] }, { - "uuid": "0ac37e63-20f7-4329-9820-c1b8f9a222df", + "uuid": "11dca27b-c1e8-42d7-955f-34a182dbe439", "control-id": "cis_rhel10_1-1.2.1.3", "description": "No notes for control-id 1.1.2.1.3.", "props": [ @@ -8611,7 +8635,7 @@ ] }, { - "uuid": "155a03c4-4ea4-4884-ae1a-d5ff096e4bea", + "uuid": "1b7033d3-e537-4070-9a50-db243c1690b6", "control-id": "cis_rhel10_1-1.2.1.4", "description": "No notes for control-id 1.1.2.1.4.", "props": [ @@ -8628,7 +8652,7 @@ ] }, { - "uuid": "d710525e-821e-46ca-91b5-3d431a2d6e45", + "uuid": "0efa8342-8185-499c-aadd-75cfb10e5e9b", "control-id": "cis_rhel10_1-1.2.2.1", "description": "No notes for control-id 1.1.2.2.1.", "props": [ @@ -8645,7 +8669,7 @@ ] }, { - "uuid": "fd1c04bc-887f-476d-8da7-67fea6be7725", + "uuid": "1fb0c09b-2049-4fc9-857c-4199cc165c80", "control-id": "cis_rhel10_1-1.2.2.2", "description": "No notes for control-id 1.1.2.2.2.", "props": [ @@ -8662,7 +8686,7 @@ ] }, { - "uuid": "4016f546-8c23-4a53-b8b9-059580766d8b", + "uuid": "1e383d52-ecc4-45ba-a20e-ab69a8f6d57b", "control-id": "cis_rhel10_1-1.2.2.3", "description": "No notes for control-id 1.1.2.2.3.", "props": [ @@ -8679,7 +8703,7 @@ ] }, { - "uuid": "0e9b81e8-7e05-4d7d-9f25-085422b7ca09", + "uuid": "2fe08d52-fc9b-4c86-95d2-25a86143d5b5", "control-id": "cis_rhel10_1-1.2.2.4", "description": "No notes for control-id 1.1.2.2.4.", "props": [ @@ -8696,7 +8720,7 @@ ] }, { - "uuid": "b32e83c7-9147-4144-b582-665f9a11561e", + "uuid": "e046ddc1-fd8d-4c57-a22d-7e74c24380cb", "control-id": "cis_rhel10_1-1.2.3.2", "description": "No notes for control-id 1.1.2.3.2.", "props": [ @@ -8713,7 +8737,7 @@ ] }, { - "uuid": "82b4a16a-2e3d-4aa2-8227-4abac8a9a4be", + "uuid": "ed3e0d44-7c59-4fda-a7f4-c0182ede9582", "control-id": "cis_rhel10_1-1.2.3.3", "description": "No notes for control-id 1.1.2.3.3.", "props": [ @@ -8730,7 +8754,7 @@ ] }, { - "uuid": "72b8e263-5d32-4679-a68b-350a698d0230", + "uuid": "da80e779-ac37-4fc9-813d-54b7a342d38d", "control-id": "cis_rhel10_1-1.2.4.2", "description": "No notes for control-id 1.1.2.4.2.", "props": [ @@ -8747,7 +8771,7 @@ ] }, { - "uuid": "dfb7ca2c-78c3-45f3-9b5c-e5908989e4a6", + "uuid": "9b2e360b-529c-445b-9baa-428d6ef6dd14", "control-id": "cis_rhel10_1-1.2.4.3", "description": "No notes for control-id 1.1.2.4.3.", "props": [ @@ -8764,7 +8788,7 @@ ] }, { - "uuid": "b6ffdd1c-9313-42b2-bee9-b3e7f94e343a", + "uuid": "b3e160be-f43e-45d2-a4c7-6402f5e0bc99", "control-id": "cis_rhel10_1-1.2.5.2", "description": "No notes for control-id 1.1.2.5.2.", "props": [ @@ -8781,7 +8805,7 @@ ] }, { - "uuid": "fe397e6f-35f8-4aa2-9840-ed87623799b4", + "uuid": "add95b1c-b08d-48b4-83e0-1a1696f4dea8", "control-id": "cis_rhel10_1-1.2.5.3", "description": "No notes for control-id 1.1.2.5.3.", "props": [ @@ -8798,7 +8822,7 @@ ] }, { - "uuid": "666fd9e2-4ca8-4bc1-a48a-87bfa7b1bebd", + "uuid": "e8406b9d-980e-43f8-a28b-376b39b67546", "control-id": "cis_rhel10_1-1.2.5.4", "description": "No notes for control-id 1.1.2.5.4.", "props": [ @@ -8815,7 +8839,7 @@ ] }, { - "uuid": "0ba3812c-193a-41d0-a537-35e0762805ff", + "uuid": "f595c925-7219-4ec0-8732-a7262c6185f0", "control-id": "cis_rhel10_1-1.2.6.2", "description": "No notes for control-id 1.1.2.6.2.", "props": [ @@ -8832,7 +8856,7 @@ ] }, { - "uuid": "5a718a51-6ff1-4b45-ab4c-9308aa628f99", + "uuid": "26130a03-b774-4100-bd72-9d1ddd45faa7", "control-id": "cis_rhel10_1-1.2.6.3", "description": "No notes for control-id 1.1.2.6.3.", "props": [ @@ -8849,7 +8873,7 @@ ] }, { - "uuid": "cd7d704d-3619-4c30-a08f-2d780c66ca7f", + "uuid": "dfdb0bcd-87b8-45f6-9f51-2a52f4604937", "control-id": "cis_rhel10_1-1.2.6.4", "description": "No notes for control-id 1.1.2.6.4.", "props": [ @@ -8866,7 +8890,7 @@ ] }, { - "uuid": "bd066cb4-9e9c-4773-b4c9-63da7383a12d", + "uuid": "2cbf60e2-4777-4ba6-9686-1f0051724163", "control-id": "cis_rhel10_1-1.2.7.2", "description": "No notes for control-id 1.1.2.7.2.", "props": [ @@ -8883,7 +8907,7 @@ ] }, { - "uuid": "fb8b1604-9582-4f0c-80ad-3281e1b80ad9", + "uuid": "cedf42ba-e5a4-4678-80b8-7489fdd56f10", "control-id": "cis_rhel10_1-1.2.7.3", "description": "No notes for control-id 1.1.2.7.3.", "props": [ @@ -8900,7 +8924,7 @@ ] }, { - "uuid": "b4aca79f-1abd-498a-a378-0bc5f3607588", + "uuid": "47146c3d-e38d-4f65-9563-e3d197e88864", "control-id": "cis_rhel10_1-1.2.7.4", "description": "No notes for control-id 1.1.2.7.4.", "props": [ @@ -8917,7 +8941,7 @@ ] }, { - "uuid": "01042e80-d731-4135-b891-087dac3a2356", + "uuid": "9868d95d-7c93-4bad-915c-64652df03ecc", "control-id": "cis_rhel10_1-2.1.1", "description": "The description for control-id cis_rhel10_1-2.1.1.", "props": [ @@ -8930,7 +8954,7 @@ ] }, { - "uuid": "04d3f5be-8b45-4bff-858f-79d37acca83b", + "uuid": "81909519-0548-417d-bf6b-68e1f661651c", "control-id": "cis_rhel10_1-2.1.2", "description": "No notes for control-id 1.2.1.2.", "props": [ @@ -8947,7 +8971,7 @@ ] }, { - "uuid": "fc790e89-f9ec-45b0-8c80-04f34ccf7901", + "uuid": "9dd3ca95-8a17-4dae-b441-84fd4d9bf25c", "control-id": "cis_rhel10_1-2.1.4", "description": "The description for control-id cis_rhel10_1-2.1.4.", "props": [ @@ -8960,7 +8984,7 @@ ] }, { - "uuid": "8ac05e6c-a7c8-4424-94a2-cbebfe17cffa", + "uuid": "4a7bd2e1-f531-4186-82b8-9ff40e44b02a", "control-id": "cis_rhel10_1-2.2.1", "description": "The description for control-id cis_rhel10_1-2.2.1.", "props": [ @@ -8973,7 +8997,7 @@ ] }, { - "uuid": "34b78005-bbcb-47fa-bd50-f5a372bd9f2a", + "uuid": "9fe1db59-644f-4a50-bee3-5ed85ecd9225", "control-id": "cis_rhel10_1-3.1.1", "description": "No notes for control-id 1.3.1.1.", "props": [ @@ -8990,7 +9014,7 @@ ] }, { - "uuid": "48291d75-88a5-4a3e-9e9d-ec7b3b4ac882", + "uuid": "f9897398-acf8-4dce-a8c6-18145a299c44", "control-id": "cis_rhel10_1-3.1.2", "description": "No notes for control-id 1.3.1.2.", "props": [ @@ -9007,7 +9031,7 @@ ] }, { - "uuid": "ea609bdf-2466-4cd7-a348-d24969c1c27e", + "uuid": "91a06eca-1e9f-4cde-9e1f-885f6dc78282", "control-id": "cis_rhel10_1-3.1.3", "description": "No notes for control-id 1.3.1.3.", "props": [ @@ -9024,7 +9048,7 @@ ] }, { - "uuid": "47d3184f-5020-4135-8959-beaa901dd2ba", + "uuid": "35075290-6190-44b7-873b-305e3d17f556", "control-id": "cis_rhel10_1-3.1.4", "description": "No notes for control-id 1.3.1.4.", "props": [ @@ -9041,7 +9065,7 @@ ] }, { - "uuid": "7bf04605-8c3a-43e2-9d94-64854d6b255c", + "uuid": "8db20c47-9a43-4386-92c0-ffbbb9c30f27", "control-id": "cis_rhel10_1-3.1.7", "description": "No notes for control-id 1.3.1.7.", "props": [ @@ -9058,7 +9082,7 @@ ] }, { - "uuid": "5d164646-fb2b-4dc4-baa4-2f9a38e1fb34", + "uuid": "b91d9882-22bc-4c17-94a3-dd04a59b697e", "control-id": "cis_rhel10_1-3.1.8", "description": "No notes for control-id 1.3.1.8.", "props": [ @@ -9075,7 +9099,7 @@ ] }, { - "uuid": "ba272c23-8cc1-4ad0-b7ce-03be5a873de9", + "uuid": "b636c9a3-3886-4888-b541-a1172bac7701", "control-id": "cis_rhel10_1-4.1", "description": "There is no automated remediation for this rule and this is intentional.\nMore details in the rule description.", "props": [ @@ -9092,7 +9116,7 @@ ] }, { - "uuid": "ea52f93d-6b4a-4334-b9b1-fbe4651c7dc6", + "uuid": "1b70e1f6-cc83-423a-9b6a-38387fc143c8", "control-id": "cis_rhel10_1-4.2", "description": "The description for control-id cis_rhel10_1-4.2.", "props": [ @@ -9135,7 +9159,7 @@ ] }, { - "uuid": "2feeb82a-8661-4e1f-9be9-fbcf618d7f10", + "uuid": "743d7b98-aa87-4fde-aaee-1f9577547429", "control-id": "cis_rhel10_1-5.1", "description": "No notes for control-id 1.5.1.", "props": [ @@ -9152,7 +9176,7 @@ ] }, { - "uuid": "a32bee64-aa78-4aac-af3a-88cea73cd209", + "uuid": "8aaa33f9-92fc-4220-bfff-7ad117d3e6c8", "control-id": "cis_rhel10_1-5.2", "description": "No notes for control-id 1.5.2.", "props": [ @@ -9169,7 +9193,7 @@ ] }, { - "uuid": "577f8a27-e2b8-41dd-8262-6d83fe143f08", + "uuid": "9a577d9c-f9a1-411c-8377-68be8b188e89", "control-id": "cis_rhel10_1-5.4", "description": "No notes for control-id 1.5.4.", "props": [ @@ -9186,7 +9210,7 @@ ] }, { - "uuid": "ac0883c3-3b91-489b-8aac-1e8fd9734c79", + "uuid": "7435eef7-48a5-459a-9d8c-150a884aca90", "control-id": "cis_rhel10_1-5.5", "description": "No notes for control-id 1.5.5.", "props": [ @@ -9203,7 +9227,7 @@ ] }, { - "uuid": "1794053c-c32e-4176-b749-b54412f10b31", + "uuid": "03897313-b8f3-43f2-a06c-21cde0283253", "control-id": "cis_rhel10_1-5.6", "description": "No notes for control-id 1.5.6.", "props": [ @@ -9220,7 +9244,7 @@ ] }, { - "uuid": "2d01b258-6db7-434e-b62f-08beebd4b6c5", + "uuid": "6d762863-9449-4a93-a6e6-4245cab4b337", "control-id": "cis_rhel10_1-5.7", "description": "No notes for control-id 1.5.7.", "props": [ @@ -9237,7 +9261,7 @@ ] }, { - "uuid": "4b343785-90f9-4992-9f99-71fa762ff92e", + "uuid": "4627d456-71ed-4723-ae82-f00faa285b71", "control-id": "cis_rhel10_1-5.8", "description": "Address Space Layout Randomization (ASLR)", "props": [ @@ -9254,7 +9278,7 @@ ] }, { - "uuid": "7620a750-2726-4155-8d27-2e45c6b3bc0b", + "uuid": "bd66a061-358d-4b9b-86e2-8cfc0b5268b6", "control-id": "cis_rhel10_1-5.9", "description": "No notes for control-id 1.5.9.", "props": [ @@ -9271,7 +9295,7 @@ ] }, { - "uuid": "dc313cbb-87dd-457c-9ad1-4bc621f0fde5", + "uuid": "e187086f-f24a-446d-8536-5ea5168a8d04", "control-id": "cis_rhel10_1-5.10", "description": "No notes for control-id 1.5.10.", "props": [ @@ -9288,7 +9312,7 @@ ] }, { - "uuid": "bde130dd-89e7-405a-881b-8ac8ded9c23b", + "uuid": "376fa6bd-2239-4cdf-891b-7f7b3f2e6e79", "control-id": "cis_rhel10_1-6.1", "description": "No notes for control-id 1.6.1.", "props": [ @@ -9305,7 +9329,7 @@ ] }, { - "uuid": "ff60fb3f-c37a-4869-9413-9b07c280d91d", + "uuid": "8fa106e8-a37c-427d-9246-b3af511ad262", "control-id": "cis_rhel10_1-6.2", "description": "No notes for control-id 1.6.2.", "props": [ @@ -9322,7 +9346,7 @@ ] }, { - "uuid": "88b97659-b4d1-413f-b4c2-03a807677fa4", + "uuid": "32793b1e-715b-4cd8-815d-c8c5f70c7a44", "control-id": "cis_rhel10_1-6.3", "description": "No notes for control-id 1.6.3.", "props": [ @@ -9339,7 +9363,7 @@ ] }, { - "uuid": "af682449-0ff9-44bb-ba21-86c47993a878", + "uuid": "75e3d062-cf12-4d10-8706-318a5bd12752", "control-id": "cis_rhel10_1-6.4", "description": "No notes for control-id 1.6.4.", "props": [ @@ -9356,7 +9380,7 @@ ] }, { - "uuid": "c22a34a3-3173-4bb0-ae0b-91a5aadd1de4", + "uuid": "97795c74-6041-4e6b-a758-86364fd27b71", "control-id": "cis_rhel10_1-7.1", "description": "No notes for control-id 1.7.1.", "props": [ @@ -9373,7 +9397,7 @@ ] }, { - "uuid": "54b9ee06-7c19-4223-ae22-4cca5ffcda4c", + "uuid": "4388a206-06fe-485a-a447-b9f51d6ed304", "control-id": "cis_rhel10_1-7.2", "description": "No notes for control-id 1.7.2.", "props": [ @@ -9390,7 +9414,7 @@ ] }, { - "uuid": "2254286b-cac3-4008-81d2-cd450e836a97", + "uuid": "1381936f-26f9-4321-b94b-671f9df5cac3", "control-id": "cis_rhel10_1-7.3", "description": "No notes for control-id 1.7.3.", "props": [ @@ -9407,7 +9431,7 @@ ] }, { - "uuid": "bf03fe3a-22ad-46e7-8669-e8fae2c7bf1f", + "uuid": "b7bff27f-3f21-4023-83ec-80abe812c9f8", "control-id": "cis_rhel10_1-7.4", "description": "No notes for control-id 1.7.4.", "props": [ @@ -9434,7 +9458,7 @@ ] }, { - "uuid": "0e06a505-4bb5-4ed4-9d26-71ba18b9934e", + "uuid": "5f9fb131-4378-42f2-bd65-1899a47633b3", "control-id": "cis_rhel10_1-7.5", "description": "No notes for control-id 1.7.5.", "props": [ @@ -9461,7 +9485,7 @@ ] }, { - "uuid": "4e103579-446f-42b0-9539-dab4458e7bd8", + "uuid": "c3736b36-a2d8-4a54-be4d-4839d071b4dc", "control-id": "cis_rhel10_1-7.6", "description": "No notes for control-id 1.7.6.", "props": [ @@ -9488,7 +9512,7 @@ ] }, { - "uuid": "da62bb38-127b-4c11-aef2-58a6725b4965", + "uuid": "0f23043f-8824-4acb-947b-5a9bf336db37", "control-id": "cis_rhel10_1-8.1", "description": "No notes for control-id 1.8.1.", "props": [ @@ -9510,7 +9534,7 @@ ] }, { - "uuid": "b738c606-3de0-4bcb-9924-24de1fb507a5", + "uuid": "d0ed4302-a620-42a3-b2fe-b823222bdb47", "control-id": "cis_rhel10_1-8.2", "description": "No notes for control-id 1.8.2.", "props": [ @@ -9527,7 +9551,7 @@ ] }, { - "uuid": "226ba9ac-9f2f-4043-a2dd-9c4e4e9cf172", + "uuid": "5b56d83a-11d9-4cb4-a084-bceb03f1ade4", "control-id": "cis_rhel10_1-8.3", "description": "No notes for control-id 1.8.3.", "props": [ @@ -9559,7 +9583,7 @@ ] }, { - "uuid": "3ef2bceb-6d13-4467-a42a-c698e7408b3e", + "uuid": "1a7e9864-269a-41e9-b0c0-e3e66e128705", "control-id": "cis_rhel10_1-8.4", "description": "No notes for control-id 1.8.4.", "props": [ @@ -9581,7 +9605,7 @@ ] }, { - "uuid": "b4a409f0-bf7b-45ca-881f-cf4e7c856670", + "uuid": "905750d6-965b-4fc7-aaab-8553064218c8", "control-id": "cis_rhel10_1-8.5", "description": "No notes for control-id 1.8.5.", "props": [ @@ -9598,7 +9622,7 @@ ] }, { - "uuid": "07e754d9-497b-4d7c-9e28-f47774b473ef", + "uuid": "3549db24-6598-4665-a76e-956ffb94535a", "control-id": "cis_rhel10_2-1.1", "description": "No notes for control-id 2.1.1.", "props": [ @@ -9615,7 +9639,7 @@ ] }, { - "uuid": "62153bcd-093d-49a2-883e-02a4a8cf7f5a", + "uuid": "64f476d5-c055-49ac-8a2a-40d210e1a8c7", "control-id": "cis_rhel10_2-1.2", "description": "No notes for control-id 2.1.2.", "props": [ @@ -9632,7 +9656,7 @@ ] }, { - "uuid": "46c920d2-13a7-4c90-b0ed-f38227ab5aea", + "uuid": "c9ad5eff-e145-4ab5-9f52-9b042cface29", "control-id": "cis_rhel10_2-1.4", "description": "No notes for control-id 2.1.4.", "props": [ @@ -9649,7 +9673,7 @@ ] }, { - "uuid": "87429fea-7844-4f27-abc3-83f52bd49ef9", + "uuid": "218fc716-6883-478c-98b7-4760ac489369", "control-id": "cis_rhel10_2-1.5", "description": "No notes for control-id 2.1.5.", "props": [ @@ -9666,7 +9690,7 @@ ] }, { - "uuid": "56e09e25-c16b-4326-80ed-7cb1e3e280fd", + "uuid": "c35e3df7-3f46-4c86-953e-c18517668530", "control-id": "cis_rhel10_2-1.6", "description": "No notes for control-id 2.1.6.", "props": [ @@ -9683,7 +9707,7 @@ ] }, { - "uuid": "6ac286d6-ef97-40be-bce8-48e69e55ddc4", + "uuid": "e64fe2f4-6d29-40d9-a366-e5b37c792ef7", "control-id": "cis_rhel10_2-1.7", "description": "No notes for control-id 2.1.7.", "props": [ @@ -9700,7 +9724,7 @@ ] }, { - "uuid": "20df4dad-677a-4303-a84a-376762623419", + "uuid": "d8b9ea13-8565-49ce-8cf6-0ee207938101", "control-id": "cis_rhel10_2-1.8", "description": "No notes for control-id 2.1.8.", "props": [ @@ -9722,7 +9746,7 @@ ] }, { - "uuid": "c6a4775b-378e-4c17-98b7-9a7a4fa21bcf", + "uuid": "533972c4-4288-4ee8-89ca-1f3b9de2f856", "control-id": "cis_rhel10_2-1.9", "description": "Many of the libvirt packages used by Enterprise Linux virtualization are dependent on the\nnfs-utils package.", "props": [ @@ -9739,7 +9763,7 @@ ] }, { - "uuid": "9827336d-57d0-4c6a-821d-28ba92194817", + "uuid": "526b04cb-c6fd-49ac-ac2b-4f4215b7f692", "control-id": "cis_rhel10_2-1.10", "description": "No notes for control-id 2.1.10.", "props": [ @@ -9756,7 +9780,7 @@ ] }, { - "uuid": "52c5f026-5562-4ec2-a00c-99cad69395a2", + "uuid": "5f836e06-a5fd-4c69-a000-f1f360386bef", "control-id": "cis_rhel10_2-1.11", "description": "Many of the libvirt packages used by Enterprise Linux virtualization, and the nfs-utils\npackage used for The Network File System (NFS), are dependent on the rpcbind package.", "props": [ @@ -9773,7 +9797,7 @@ ] }, { - "uuid": "d6a46cac-38e6-4ee8-96ca-8634ad7fe0c4", + "uuid": "d70e43d7-71a9-4949-a1f1-6a6d52d5f629", "control-id": "cis_rhel10_2-1.12", "description": "No notes for control-id 2.1.12.", "props": [ @@ -9790,7 +9814,7 @@ ] }, { - "uuid": "65ec810d-cffe-473f-a51b-2503cacc8db7", + "uuid": "3d29e29d-795d-45eb-ab77-bc69a4a90eb9", "control-id": "cis_rhel10_2-1.13", "description": "No notes for control-id 2.1.13.", "props": [ @@ -9807,7 +9831,7 @@ ] }, { - "uuid": "d24bc1dd-0b0c-4ec9-ae2d-173097d0d8db", + "uuid": "7f5e4ace-53d5-475f-a76c-547ead17704b", "control-id": "cis_rhel10_2-1.14", "description": "No notes for control-id 2.1.14.", "props": [ @@ -9824,7 +9848,7 @@ ] }, { - "uuid": "d5b82e92-91fa-4a7d-b85a-5f964b6683b5", + "uuid": "ba2afbd3-471a-4739-a3d0-e7c21a978945", "control-id": "cis_rhel10_2-1.15", "description": "No notes for control-id 2.1.15.", "props": [ @@ -9841,7 +9865,7 @@ ] }, { - "uuid": "b9ece650-4b62-470d-8a76-43eee90ba1ec", + "uuid": "f78760eb-69a3-4fbb-9d8d-4f2f86dc9f6a", "control-id": "cis_rhel10_2-1.16", "description": "No notes for control-id 2.1.16.", "props": [ @@ -9858,7 +9882,7 @@ ] }, { - "uuid": "86da9e8a-c547-4249-86cb-e52810d45479", + "uuid": "b8f787ab-77fc-43cb-8390-fce72dd252b4", "control-id": "cis_rhel10_2-1.17", "description": "No notes for control-id 2.1.17.", "props": [ @@ -9875,7 +9899,7 @@ ] }, { - "uuid": "68b69deb-c500-49a9-a158-1caf99cb0562", + "uuid": "eee988ed-6588-4fa5-9f98-4dc5223f351d", "control-id": "cis_rhel10_2-1.18", "description": "No notes for control-id 2.1.18.", "props": [ @@ -9897,7 +9921,7 @@ ] }, { - "uuid": "3ae93e2a-c1cd-4972-9e5c-eba767aeef63", + "uuid": "eacc0c02-6876-419e-aab3-f0f4b20fe516", "control-id": "cis_rhel10_2-1.21", "description": "No notes for control-id 2.1.21.", "props": [ @@ -9919,7 +9943,7 @@ ] }, { - "uuid": "7584abfd-835e-491d-aeba-c9ee0db83c68", + "uuid": "230c8834-eaf1-4dc5-93f7-113e8e0929ba", "control-id": "cis_rhel10_2-1.22", "description": "The description for control-id cis_rhel10_2-1.22.", "props": [ @@ -9932,7 +9956,7 @@ ] }, { - "uuid": "2a6a98bd-f657-41e8-b458-94633324d6af", + "uuid": "f4c15a40-f625-4f93-af2e-fea146574abf", "control-id": "cis_rhel10_2-2.1", "description": "No notes for control-id 2.2.1.", "props": [ @@ -9949,7 +9973,7 @@ ] }, { - "uuid": "4bc3124f-4b2b-4bf3-9225-5d38b954faa1", + "uuid": "157fc945-ecc6-46f5-9b8f-d20cc75125c9", "control-id": "cis_rhel10_2-2.3", "description": "No notes for control-id 2.2.3.", "props": [ @@ -9966,7 +9990,7 @@ ] }, { - "uuid": "c9f25d33-d339-4c3f-818b-7428d894ee69", + "uuid": "9639b75b-2eec-4e2b-ab07-9b22e6d5fb4f", "control-id": "cis_rhel10_2-2.4", "description": "No notes for control-id 2.2.4.", "props": [ @@ -9983,7 +10007,7 @@ ] }, { - "uuid": "9be93da7-2a87-40f6-a5a0-3c794f203401", + "uuid": "25e11a79-75a7-4af4-a1b2-9be1ac38443c", "control-id": "cis_rhel10_2-3.1", "description": "No notes for control-id 2.3.1.", "props": [ @@ -9995,7 +10019,7 @@ ] }, { - "uuid": "e537e44f-b674-4df4-a6d0-e65bf0ae6178", + "uuid": "371dd61b-24be-4089-a7ef-eb7c32fad259", "control-id": "cis_rhel10_2-3.2", "description": "No notes for control-id 2.3.2.", "props": [ @@ -10012,7 +10036,7 @@ ] }, { - "uuid": "6936ef89-dffe-417b-b284-672b03f9a3dd", + "uuid": "dd6f90c0-8995-474a-8978-811c88fbaa37", "control-id": "cis_rhel10_2-3.3", "description": "No notes for control-id 2.3.3.", "props": [ @@ -10029,7 +10053,7 @@ ] }, { - "uuid": "a540f6e0-1a4c-415f-a975-18455371e9ef", + "uuid": "ae628e00-c58c-4a9c-b638-84b3e20959c6", "control-id": "cis_rhel10_2-4.1.1", "description": "No notes for control-id 2.4.1.1.", "props": [ @@ -10051,7 +10075,7 @@ ] }, { - "uuid": "bb4d5819-d51d-4155-97ac-f99ac2d8b5e9", + "uuid": "4b06f842-98e2-48a6-97f6-9699c314dc48", "control-id": "cis_rhel10_2-4.1.2", "description": "No notes for control-id 2.4.1.2.", "props": [ @@ -10078,7 +10102,7 @@ ] }, { - "uuid": "d4fbc031-4c2f-436a-a7cc-f089e9814930", + "uuid": "488091da-769c-4923-920d-16bd232350f1", "control-id": "cis_rhel10_2-4.1.3", "description": "No notes for control-id 2.4.1.3.", "props": [ @@ -10105,7 +10129,7 @@ ] }, { - "uuid": "72f91144-6fc9-485f-83a4-a5a569e7431b", + "uuid": "f07612b8-d81e-4a18-8dd0-1769b531c7bc", "control-id": "cis_rhel10_2-4.1.4", "description": "No notes for control-id 2.4.1.4.", "props": [ @@ -10132,7 +10156,7 @@ ] }, { - "uuid": "16506c82-9f3c-4a3c-a5e5-134d24faebe8", + "uuid": "c9703487-b47e-42a6-9ba0-5a7885b69680", "control-id": "cis_rhel10_2-4.1.5", "description": "No notes for control-id 2.4.1.5.", "props": [ @@ -10159,7 +10183,7 @@ ] }, { - "uuid": "5d885ddb-0d34-4e74-ad8f-745142e7f313", + "uuid": "73c1b6d0-baf7-460a-b533-e0fc28c49691", "control-id": "cis_rhel10_2-4.1.6", "description": "No notes for control-id 2.4.1.6.", "props": [ @@ -10186,7 +10210,7 @@ ] }, { - "uuid": "d6f598fe-fb69-44a2-883c-5439706dedff", + "uuid": "9135b971-2ea2-43dc-ae2f-3f892feb4bc9", "control-id": "cis_rhel10_2-4.1.7", "description": "No notes for control-id 2.4.1.7.", "props": [ @@ -10213,7 +10237,7 @@ ] }, { - "uuid": "d5e01d48-e495-478d-8edf-6c6062639db2", + "uuid": "67c4728a-aecf-4082-b85e-cf417ae473b0", "control-id": "cis_rhel10_2-4.1.8", "description": "No notes for control-id 2.4.1.8.", "props": [ @@ -10240,7 +10264,7 @@ ] }, { - "uuid": "c2494650-d069-489c-9986-88e519a32c80", + "uuid": "f135f782-3df0-4878-8489-5deb7e0cc72d", "control-id": "cis_rhel10_2-4.1.9", "description": "No notes for control-id 2.4.1.9.", "props": [ @@ -10277,7 +10301,7 @@ ] }, { - "uuid": "d5ac6599-67ef-4641-a347-21264b31b1a9", + "uuid": "526d2eda-9d8c-457b-8efe-8d5a8cf2076a", "control-id": "cis_rhel10_2-4.2.1", "description": "No notes for control-id 2.4.2.1.", "props": [ @@ -10314,7 +10338,7 @@ ] }, { - "uuid": "b26a21a3-40d5-4dea-8fc5-b8e24a2c4df4", + "uuid": "e3344401-d7ed-40c0-89d2-ceca9339faac", "control-id": "cis_rhel10_3-1.1", "description": "The description for control-id cis_rhel10_3-1.1.", "props": [ @@ -10327,7 +10351,7 @@ ] }, { - "uuid": "ffbdf9bd-1010-4d19-91d7-6ac87dd6fd05", + "uuid": "0da8391f-807d-4f88-b6a8-f4a5efa07b29", "control-id": "cis_rhel10_3-1.2", "description": "No notes for control-id 3.1.2.", "props": [ @@ -10344,7 +10368,7 @@ ] }, { - "uuid": "40203210-9db1-473d-bcd0-f9904506ce59", + "uuid": "253d7587-92c1-405f-babf-9d94e58d5c7d", "control-id": "cis_rhel10_3-1.3", "description": "No notes for control-id 3.1.3.", "props": [ @@ -10361,7 +10385,7 @@ ] }, { - "uuid": "f68731ca-1a8e-45ad-810e-b2db92f79eb4", + "uuid": "470b178d-5578-48ca-a192-c2c10d66cbe7", "control-id": "cis_rhel10_3-2.1", "description": "No notes for control-id 3.2.1.", "props": [ @@ -10378,7 +10402,7 @@ ] }, { - "uuid": "30b4a479-afd6-4330-afe3-86d935c9ebd5", + "uuid": "bbbeedcf-2659-430d-98a8-49ea047745a8", "control-id": "cis_rhel10_3-2.2", "description": "No notes for control-id 3.2.2.", "props": [ @@ -10395,7 +10419,7 @@ ] }, { - "uuid": "26af96a0-6d77-4688-97c7-488b5976e509", + "uuid": "5b0c4fb7-faa1-453c-a65d-ee9c2cbef5dc", "control-id": "cis_rhel10_3-2.3", "description": "No notes for control-id 3.2.3.", "props": [ @@ -10412,7 +10436,7 @@ ] }, { - "uuid": "87c31c96-212a-4073-be1a-0edba39f098e", + "uuid": "397880ae-9497-4c9e-95ea-6549481377ec", "control-id": "cis_rhel10_3-2.4", "description": "No notes for control-id 3.2.4.", "props": [ @@ -10429,7 +10453,7 @@ ] }, { - "uuid": "52c5554d-7c86-4031-9924-69deb5005567", + "uuid": "432a0a03-a69f-4f12-9972-66bbcec22171", "control-id": "cis_rhel10_3-2.5", "description": "No notes for control-id 3.2.5.", "props": [ @@ -10446,7 +10470,7 @@ ] }, { - "uuid": "9058fdef-2394-4f62-8645-4472523f919d", + "uuid": "fb209614-2bea-41aa-8680-2e3ff8086110", "control-id": "cis_rhel10_3-2.6", "description": "No notes for control-id 3.2.6.", "props": [ @@ -10463,7 +10487,7 @@ ] }, { - "uuid": "ae391a91-10fb-48e2-bc85-36129a33546a", + "uuid": "5a051be2-48ee-4c87-9877-dfe575918a0d", "control-id": "cis_rhel10_3-3.1.2", "description": "No notes for control-id 3.3.1.2.", "props": [ @@ -10480,7 +10504,7 @@ ] }, { - "uuid": "4f69c2fe-c28d-454a-a904-43cf2d71a30c", + "uuid": "fcd60b3e-a3e4-4f1f-ab72-365442c8f645", "control-id": "cis_rhel10_3-3.1.3", "description": "No notes for control-id 3.3.1.3.", "props": [ @@ -10497,7 +10521,7 @@ ] }, { - "uuid": "66d62f4f-4257-4505-95c7-6864dabaa714", + "uuid": "e4cf70ce-5189-4ddc-b78a-f3cdf720abe2", "control-id": "cis_rhel10_3-3.1.4", "description": "No notes for control-id 3.3.1.4.", "props": [ @@ -10514,7 +10538,7 @@ ] }, { - "uuid": "dbbca925-48f8-4d9b-bb19-8587e665e387", + "uuid": "a963ccdf-dd98-45f9-b2e6-9c3d7919bdac", "control-id": "cis_rhel10_3-3.1.5", "description": "No notes for control-id 3.3.1.5.", "props": [ @@ -10531,7 +10555,7 @@ ] }, { - "uuid": "948565b2-1fd5-43cd-8c7e-b2468cceed8b", + "uuid": "67e49808-4c01-4661-88da-9671722f8c1c", "control-id": "cis_rhel10_3-3.1.6", "description": "No notes for control-id 3.3.1.6.", "props": [ @@ -10548,7 +10572,7 @@ ] }, { - "uuid": "a02a2772-6313-4320-9a46-6cc1882e7e1b", + "uuid": "ec4ef1d7-acae-4b6c-ba27-0acd8aa8f240", "control-id": "cis_rhel10_3-3.1.7", "description": "No notes for control-id 3.3.1.7.", "props": [ @@ -10565,7 +10589,7 @@ ] }, { - "uuid": "f4651789-ec28-4b37-b4f9-9c211490aa5a", + "uuid": "ff161c9a-cf80-4004-a0c5-78c8d2ab11a5", "control-id": "cis_rhel10_3-3.1.8", "description": "No notes for control-id 3.3.1.8.", "props": [ @@ -10582,7 +10606,7 @@ ] }, { - "uuid": "cb4d7420-6319-48c8-aedb-9ba4d20dbd23", + "uuid": "c9d27a1f-7ed6-4269-85dc-6333885222d1", "control-id": "cis_rhel10_3-3.1.9", "description": "No notes for control-id 3.3.1.9.", "props": [ @@ -10599,7 +10623,7 @@ ] }, { - "uuid": "62c29a51-180c-4bd2-a12b-a34f7b66c86d", + "uuid": "bb79b254-c90b-4445-a969-f7b66adbfc0a", "control-id": "cis_rhel10_3-3.1.10", "description": "No notes for control-id 3.3.1.10.", "props": [ @@ -10616,7 +10640,7 @@ ] }, { - "uuid": "16598b2a-9b67-44fc-95e3-bff5cd9df52f", + "uuid": "ea91f4d3-078a-4b25-868b-fe443afea0c2", "control-id": "cis_rhel10_3-3.1.11", "description": "No notes for control-id 3.3.1.11.", "props": [ @@ -10633,7 +10657,7 @@ ] }, { - "uuid": "95e58991-ee55-4f02-8c5d-dc0c7b2f1ed0", + "uuid": "6052c04f-053a-4394-a734-55f65dbc6872", "control-id": "cis_rhel10_3-3.1.12", "description": "No notes for control-id 3.3.1.12.", "props": [ @@ -10650,7 +10674,7 @@ ] }, { - "uuid": "0100ec9f-5964-48bb-89fb-758774792d40", + "uuid": "d3ef1c88-1458-45ee-8c20-78ff61d16706", "control-id": "cis_rhel10_3-3.1.13", "description": "No notes for control-id 3.3.1.13.", "props": [ @@ -10667,7 +10691,7 @@ ] }, { - "uuid": "c23aa5e7-bbf1-44f9-829a-c77c74b8609c", + "uuid": "c1cde79e-85cd-4084-9d6b-6aabe181413c", "control-id": "cis_rhel10_3-3.1.14", "description": "No notes for control-id 3.3.1.14.", "props": [ @@ -10684,7 +10708,7 @@ ] }, { - "uuid": "5fcb0150-f3e3-45ec-b477-4fce5e0a5543", + "uuid": "9a0da855-9b88-4a3a-9090-be6aa08a553c", "control-id": "cis_rhel10_3-3.1.15", "description": "No notes for control-id 3.3.1.15.", "props": [ @@ -10701,7 +10725,7 @@ ] }, { - "uuid": "100875ab-64f8-4dbd-be36-9035a44134b9", + "uuid": "5bf7ac65-50b0-4971-8431-e1aad81c6401", "control-id": "cis_rhel10_3-3.1.16", "description": "No notes for control-id 3.3.1.16.", "props": [ @@ -10718,7 +10742,7 @@ ] }, { - "uuid": "ee0caffd-2fa5-4bd2-89b2-6d14e03d4892", + "uuid": "33194423-f24c-4a64-b875-ea08ab22f426", "control-id": "cis_rhel10_3-3.1.17", "description": "No notes for control-id 3.3.1.17.", "props": [ @@ -10735,7 +10759,7 @@ ] }, { - "uuid": "ab63b42b-e581-44fc-89c4-fa4c1b8e5716", + "uuid": "b4a4c7c8-fbee-441f-989d-1071683f0a2c", "control-id": "cis_rhel10_3-3.1.18", "description": "No notes for control-id 3.3.1.18.", "props": [ @@ -10752,7 +10776,7 @@ ] }, { - "uuid": "f71d4412-7a20-4ffc-9692-83eeae672dbc", + "uuid": "ff557ac8-a6ba-4ce2-9c39-8d1253868f4e", "control-id": "cis_rhel10_3-3.2.1", "description": "No notes for control-id 3.3.2.1.", "props": [ @@ -10769,7 +10793,7 @@ ] }, { - "uuid": "90e8329e-71b7-42c6-82dc-173432a13e54", + "uuid": "200c713d-7de0-4240-b7b7-29411c7aa1ed", "control-id": "cis_rhel10_3-3.2.2", "description": "No notes for control-id 3.3.2.2.", "props": [ @@ -10786,7 +10810,7 @@ ] }, { - "uuid": "4f076c6b-428b-4e72-9dc1-99212dcdf8c3", + "uuid": "b5ed2126-0118-4192-9b9b-0e78ad8ff445", "control-id": "cis_rhel10_3-3.2.3", "description": "No notes for control-id 3.3.2.3.", "props": [ @@ -10803,7 +10827,7 @@ ] }, { - "uuid": "1b2f6c09-9adb-4ce2-8c31-e29883ffe957", + "uuid": "75a734ab-980d-4d07-a396-93b5d3de1c59", "control-id": "cis_rhel10_3-3.2.4", "description": "No notes for control-id 3.3.2.4.", "props": [ @@ -10820,7 +10844,7 @@ ] }, { - "uuid": "8c963cb8-c1b1-421b-81c2-25683e8551c6", + "uuid": "ac0ffa08-7818-4dca-a4e2-5ca609e17336", "control-id": "cis_rhel10_3-3.2.5", "description": "No notes for control-id 3.3.2.5.", "props": [ @@ -10837,7 +10861,7 @@ ] }, { - "uuid": "b8c92e1b-337e-4eb1-87d1-8d778d35bf03", + "uuid": "5188749b-ad79-49cd-8898-facd2e4d88d9", "control-id": "cis_rhel10_3-3.2.6", "description": "No notes for control-id 3.3.2.6.", "props": [ @@ -10854,7 +10878,7 @@ ] }, { - "uuid": "6077233f-9582-440a-b089-4ea2c99309d9", + "uuid": "45b89984-2a61-421d-88c1-d9ae7e05d5b9", "control-id": "cis_rhel10_3-3.2.7", "description": "No notes for control-id 3.3.2.7.", "props": [ @@ -10871,7 +10895,7 @@ ] }, { - "uuid": "9d250700-2099-41bf-801e-21c568dd2fb0", + "uuid": "bedb0377-c70a-4a23-8fae-9353eb9e3b05", "control-id": "cis_rhel10_3-3.2.8", "description": "No notes for control-id 3.3.2.8.", "props": [ @@ -10888,7 +10912,7 @@ ] }, { - "uuid": "66645de4-45d4-43f3-8cdd-4bae6c32f680", + "uuid": "98a1ffb9-c36c-4cef-99c4-01a0cd91e415", "control-id": "cis_rhel10_4-1.1", "description": "No notes for control-id 4.1.1.", "props": [ @@ -10905,7 +10929,7 @@ ] }, { - "uuid": "38c1ff4e-9e58-4a05-ac37-b84a750db36f", + "uuid": "62c0cd07-11e4-4933-92f3-ab6e9df8e76e", "control-id": "cis_rhel10_4-1.2", "description": "No notes for control-id 4.1.2.", "props": [ @@ -10922,7 +10946,7 @@ ] }, { - "uuid": "f53928c9-00ce-4215-ba33-ced6f6a6743a", + "uuid": "c37f04e8-ae78-4600-8e55-35cc69e66d7c", "control-id": "cis_rhel10_4-1.3", "description": "No notes for control-id 4.1.3.", "props": [ @@ -10939,7 +10963,7 @@ ] }, { - "uuid": "ff3e8b15-6fe7-44a1-860d-ba0af8cdf352", + "uuid": "440cbd69-94da-45f0-b0c7-befbb7e85c02", "control-id": "cis_rhel10_4-1.4", "description": "The description for control-id cis_rhel10_4-1.4.", "props": [ @@ -10952,7 +10976,7 @@ ] }, { - "uuid": "2262d209-ae6f-464e-9e49-350202bbed38", + "uuid": "61b62fa9-2a8f-4638-8942-95844ef20317", "control-id": "cis_rhel10_4-1.5", "description": "Firewalld in Red Hat Enterprise Linux 10 accepts loopback traffic by default.", "props": [ @@ -10969,7 +10993,7 @@ ] }, { - "uuid": "d9868571-71a6-4e4e-a094-faf876ecba8d", + "uuid": "fa70609e-487d-4577-9bca-7177d0701f6d", "control-id": "cis_rhel10_4-1.6", "description": "The description for control-id cis_rhel10_4-1.6.", "props": [ @@ -10982,7 +11006,7 @@ ] }, { - "uuid": "25adfd45-d4d0-4b5a-8622-1359882caafa", + "uuid": "51dac9cb-d5d7-4155-a8c5-db0d91a06088", "control-id": "cis_rhel10_4-1.7", "description": "The description for control-id cis_rhel10_4-1.7.", "props": [ @@ -10995,7 +11019,7 @@ ] }, { - "uuid": "3643f3d0-b51e-4e9f-8ce7-eb91d2cd38e4", + "uuid": "77c14ce9-81fc-4561-97a3-d0752d2f46ea", "control-id": "cis_rhel10_5-1.1", "description": "No notes for control-id 5.1.1.", "props": [ @@ -11052,7 +11076,7 @@ ] }, { - "uuid": "2c261f33-b9f2-4af6-ae84-7e3469c407bf", + "uuid": "74e44274-73ca-4d97-ba78-26c79d07f292", "control-id": "cis_rhel10_5-1.2", "description": "No notes for control-id 5.1.2.", "props": [ @@ -11079,7 +11103,7 @@ ] }, { - "uuid": "4c2d4e2c-817e-46d2-9c6b-67df561a8b1a", + "uuid": "3ec9d482-be31-4860-9642-494d08fee5dc", "control-id": "cis_rhel10_5-1.3", "description": "No notes for control-id 5.1.3.", "props": [ @@ -11106,7 +11130,7 @@ ] }, { - "uuid": "06472d15-7c11-490a-9c83-3691e7c90e82", + "uuid": "67320758-83ad-4e13-a7e4-4f414c892e98", "control-id": "cis_rhel10_5-1.4", "description": "No notes for control-id 5.1.4.", "props": [ @@ -11123,7 +11147,7 @@ ] }, { - "uuid": "9d2a8c0a-6573-4bdc-b0c6-350fb56a1474", + "uuid": "3970ce1e-8147-4814-b46c-00900a9040f6", "control-id": "cis_rhel10_5-1.5", "description": "No notes for control-id 5.1.5.", "props": [ @@ -11140,7 +11164,7 @@ ] }, { - "uuid": "9c32e1e5-944b-4c44-a5de-5591f4683c52", + "uuid": "f00017f5-8f87-44e9-84e4-d037a6eae866", "control-id": "cis_rhel10_5-1.6", "description": "No notes for control-id 5.1.6.", "props": [ @@ -11157,7 +11181,7 @@ ] }, { - "uuid": "f2641cfd-f246-45c0-b081-731f4e767472", + "uuid": "acc2345c-9952-4a04-ab50-11e083c87c2a", "control-id": "cis_rhel10_5-1.7", "description": "The requirement gives an example of 45 seconds, but is flexible about the values. It is only\nnecessary to ensure there is a timeout configured in alignment to the site policy.", "props": [ @@ -11179,7 +11203,7 @@ ] }, { - "uuid": "42471d30-59a5-4bbe-b130-60719a619ed5", + "uuid": "aa098eb6-5d70-408b-b355-69ca1808a0ab", "control-id": "cis_rhel10_5-1.10", "description": "No notes for control-id 5.1.10.", "props": [ @@ -11196,7 +11220,7 @@ ] }, { - "uuid": "1c8dd8a9-f8af-4704-98df-411eb39d8baa", + "uuid": "d90052b6-7851-48fa-82bf-8103aef934ef", "control-id": "cis_rhel10_5-1.11", "description": "No notes for control-id 5.1.11.", "props": [ @@ -11213,7 +11237,7 @@ ] }, { - "uuid": "a0b8f841-91c1-40e8-9524-9cc332b1ae96", + "uuid": "42ce937f-5386-4636-9213-aa44022d009f", "control-id": "cis_rhel10_5-1.12", "description": "The description for control-id cis_rhel10_5-1.12.", "props": [ @@ -11231,7 +11255,7 @@ ] }, { - "uuid": "19d4f47f-8ffb-40db-b83f-a7d12084ffa0", + "uuid": "d73a1b45-189a-4e9f-b2a9-11d79286d2e7", "control-id": "cis_rhel10_5-1.13", "description": "No notes for control-id 5.1.13.", "props": [ @@ -11248,7 +11272,7 @@ ] }, { - "uuid": "eac49577-991f-42bf-ad5c-bf52df8903af", + "uuid": "f5351309-5534-4974-9896-6746a7e218c4", "control-id": "cis_rhel10_5-1.14", "description": "The CIS benchmark is not opinionated about which loglevel is selected here. Here, this\nprofile uses VERBOSE by default, as it allows for the capture of login and logout activity\nas well as key fingerprints.", "props": [ @@ -11265,7 +11289,7 @@ ] }, { - "uuid": "b4602c53-6b6a-492f-a443-875e1d7968f6", + "uuid": "9233ea19-e0b6-4486-9a0c-a3035f8b1e5d", "control-id": "cis_rhel10_5-1.15", "description": "No notes for control-id 5.1.15.", "props": [ @@ -11282,7 +11306,7 @@ ] }, { - "uuid": "6806503b-062e-407d-b301-3cc1c489154f", + "uuid": "91f75136-c679-4369-b67c-55af5961b21e", "control-id": "cis_rhel10_5-1.16", "description": "No notes for control-id 5.1.16.", "props": [ @@ -11299,7 +11323,7 @@ ] }, { - "uuid": "713b92b6-deaf-4960-b355-02f41dc3ea3a", + "uuid": "f1a4dc47-ca7c-42f2-86ea-89fb2e9865d7", "control-id": "cis_rhel10_5-1.17", "description": "No notes for control-id 5.1.17.", "props": [ @@ -11316,7 +11340,7 @@ ] }, { - "uuid": "3c84e40c-03e3-4ddb-9185-220676a71ada", + "uuid": "d1b04c6b-3f42-47e1-8e2d-122e2b74ba2b", "control-id": "cis_rhel10_5-1.18", "description": "No notes for control-id 5.1.18.", "props": [ @@ -11333,7 +11357,7 @@ ] }, { - "uuid": "b68ee52f-5822-4a1c-8977-78b6854a1850", + "uuid": "b053b248-26ee-435d-9997-9d548083d1e2", "control-id": "cis_rhel10_5-1.19", "description": "No notes for control-id 5.1.19.", "props": [ @@ -11350,7 +11374,7 @@ ] }, { - "uuid": "982eec55-2075-45a3-b593-93fbc276e386", + "uuid": "b8f01e11-a8b1-4f32-9a85-5a9a00fe8333", "control-id": "cis_rhel10_5-1.20", "description": "No notes for control-id 5.1.20.", "props": [ @@ -11367,7 +11391,7 @@ ] }, { - "uuid": "3cbce45d-d14b-4c88-81f3-f6da859ecbcc", + "uuid": "d304101d-eb32-4253-9c2e-72971c37871c", "control-id": "cis_rhel10_5-1.21", "description": "No notes for control-id 5.1.21.", "props": [ @@ -11384,7 +11408,7 @@ ] }, { - "uuid": "3899caa9-e2d2-4759-888e-147b9aca893b", + "uuid": "2e68bc97-6d98-46fd-81d1-762f8cf0dfba", "control-id": "cis_rhel10_5-1.22", "description": "No notes for control-id 5.1.22.", "props": [ @@ -11401,7 +11425,7 @@ ] }, { - "uuid": "89c9332d-849f-4205-8c8d-44ebc209daa7", + "uuid": "8a15f522-ce0d-4d93-bf01-7c0cfa3c9173", "control-id": "cis_rhel10_5-2.1", "description": "No notes for control-id 5.2.1.", "props": [ @@ -11418,7 +11442,7 @@ ] }, { - "uuid": "517f60d4-9ba6-44fa-964d-ad426aaa8c5b", + "uuid": "52111d45-3d5b-490f-be55-1d0d605567ac", "control-id": "cis_rhel10_5-2.2", "description": "No notes for control-id 5.2.2.", "props": [ @@ -11435,7 +11459,7 @@ ] }, { - "uuid": "19bb61a1-377a-4a4f-bbfb-c1df3506fea1", + "uuid": "c4055552-fde0-4000-b59a-238ec13beaf7", "control-id": "cis_rhel10_5-2.3", "description": "No notes for control-id 5.2.3.", "props": [ @@ -11452,7 +11476,7 @@ ] }, { - "uuid": "8dd7fb70-cbc4-4bad-b026-2b71f30a301c", + "uuid": "66034426-088e-47ba-a478-a09f5ab4e2b1", "control-id": "cis_rhel10_5-2.5", "description": "No notes for control-id 5.2.5.", "props": [ @@ -11469,7 +11493,7 @@ ] }, { - "uuid": "bb69d3ea-311b-4038-9414-ba510769157b", + "uuid": "eac2989d-b17e-445c-a687-affa08d55dbc", "control-id": "cis_rhel10_5-2.6", "description": "No notes for control-id 5.2.6.", "props": [ @@ -11486,7 +11510,7 @@ ] }, { - "uuid": "2c6dcbcf-a8f4-4b08-8dbb-a40797506f1f", + "uuid": "a1c733be-2585-4149-b035-b26bcb7fe06d", "control-id": "cis_rhel10_5-2.7", "description": "Members of \"wheel\" or GID 0 groups are checked by default if the group option is not set for\npam_wheel.so module. The recommendation states the group should be empty to reinforce the\nuse of \"sudo\" for privileged access. Therefore, members of these groups should be manually\nchecked or a different group should be informed.", "props": [ @@ -11508,7 +11532,7 @@ ] }, { - "uuid": "8bcb2ed2-217a-4f40-9a38-aa042908efd1", + "uuid": "cefb3f0f-3941-40c4-87b2-32578ba2eea9", "control-id": "cis_rhel10_5-3.1.1", "description": "This requirement is hard to be automated without any specific requirement. The policy even\nstates that provided commands are examples, other custom settings might be in place and the\nsettings might be different depending on site policies. The other rules will already make\nsure there is a correct autheselect profile regardless of the existing settings. It is\nnecessary to better discuss with CIS Community.", "props": [ @@ -11520,7 +11544,7 @@ ] }, { - "uuid": "fde3ebdb-e9bb-48e8-a043-3d22fb5e8b0c", + "uuid": "cae9f83b-2faa-4c90-b206-fbeb140c7e75", "control-id": "cis_rhel10_5-3.1.2", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.1.", "props": [ @@ -11542,7 +11566,7 @@ ] }, { - "uuid": "b37c07aa-fffd-48d4-99cf-4d4a8ad48864", + "uuid": "58839197-1fa9-412b-b4df-407b631218c6", "control-id": "cis_rhel10_5-3.1.3", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.2.", "props": [ @@ -11569,7 +11593,7 @@ ] }, { - "uuid": "4bf2f61e-0309-4355-9fa2-93abd4873e9f", + "uuid": "4225e97d-bf86-4d3e-9296-09b56739bc66", "control-id": "cis_rhel10_5-3.1.4", "description": "The module is properly enabled by the rules mentioned in related_rules.\nRequirements in 5.3.2.3 use these rules.", "props": [ @@ -11581,7 +11605,7 @@ ] }, { - "uuid": "d410f7f6-52e4-4cea-b29a-15bdd75196ed", + "uuid": "b8b46b08-3a7c-444c-9616-f2fdc4f97938", "control-id": "cis_rhel10_5-3.1.5", "description": "No notes for control-id 5.3.1.5.", "props": [ @@ -11598,7 +11622,7 @@ ] }, { - "uuid": "14cbb457-24e1-4680-b7cb-0bcdf6ead047", + "uuid": "8baee14c-0115-4583-8221-3cf1b21c6f0c", "control-id": "cis_rhel10_5-3.2.1.1", "description": "No notes for control-id 5.3.2.1.1.", "props": [ @@ -11615,7 +11639,7 @@ ] }, { - "uuid": "1dc5adad-1488-43e1-8b32-d996c4f3547f", + "uuid": "4df69264-bf55-4b0d-b8a0-6c39a2746d69", "control-id": "cis_rhel10_5-3.2.1.2", "description": "The policy also accepts value 0, which means the locked accounts should be manually unlocked\nby an administrator. However, it also mentions that using value 0 can facilitate a DoS\nattack to legitimate users.", "props": [ @@ -11632,7 +11656,7 @@ ] }, { - "uuid": "9d86dfef-8ed5-457e-969d-2074cf071d0d", + "uuid": "3b46dbbb-44ec-4e47-9558-27a697f2dc68", "control-id": "cis_rhel10_5-3.2.2.1", "description": "No notes for control-id 5.3.2.2.1.", "props": [ @@ -11649,7 +11673,7 @@ ] }, { - "uuid": "bbc1ad8a-ef0a-4de2-8e19-fee245488cab", + "uuid": "42b30290-39dd-4c40-990e-7b9734b09ca2", "control-id": "cis_rhel10_5-3.2.2.2", "description": "No notes for control-id 5.3.2.2.2.", "props": [ @@ -11666,7 +11690,7 @@ ] }, { - "uuid": "6e2f5526-d29d-4b77-9296-296ee5930305", + "uuid": "1ef82755-f713-4bab-af00-53369b111bd5", "control-id": "cis_rhel10_5-3.2.2.3", "description": "This requirement is expected to be manual. However, in previous versions of the policy\nit was already automated the configuration of \"minclass\" option. This posture was kept for\nRHEL 10 in this new version. Rules related to other options are informed in related_rules.\nIn short, minclass=4 alone can achieve the same result achieved by the combination of the\nother 4 options mentioned in the policy.", "props": [ @@ -11683,7 +11707,7 @@ ] }, { - "uuid": "8a8c44ce-1708-4730-8674-0d688714c7bf", + "uuid": "e591f141-b103-411b-8f9b-4eabebac445a", "control-id": "cis_rhel10_5-3.2.2.4", "description": "No notes for control-id 5.3.2.2.4.", "props": [ @@ -11700,7 +11724,7 @@ ] }, { - "uuid": "24f38608-0fb7-4654-a1aa-3da110b5e476", + "uuid": "15b098b6-ede6-43a3-a437-b970fadbad24", "control-id": "cis_rhel10_5-3.2.2.5", "description": "No notes for control-id 5.3.2.2.5.", "props": [ @@ -11717,7 +11741,7 @@ ] }, { - "uuid": "ec4986db-3035-44e3-bf41-044d5784bf60", + "uuid": "6867606b-8b64-4abf-8c0e-d5b0db125f7d", "control-id": "cis_rhel10_5-3.2.2.6", "description": "No notes for control-id 5.3.2.2.6.", "props": [ @@ -11734,7 +11758,7 @@ ] }, { - "uuid": "d7a714f2-ba79-41ad-8661-67816da0795d", + "uuid": "234f8dd9-5288-4739-bb8c-ebce9d921b82", "control-id": "cis_rhel10_5-3.2.2.7", "description": "No notes for control-id 5.3.2.2.7.", "props": [ @@ -11751,7 +11775,7 @@ ] }, { - "uuid": "ab0a4ed5-188b-4270-8dfb-c87c9b666f24", + "uuid": "70d814bd-291e-4e3a-8449-3528e913fe8a", "control-id": "cis_rhel10_5-3.2.3.1", "description": "Although mentioned in the section 5.3.3.3, there is no explicit requirement to configure\nretry option of pam_pwhistory. If come in the future, the rule accounts_password_pam_retry\ncan be used.", "props": [ @@ -11773,7 +11797,7 @@ ] }, { - "uuid": "0bf9a4af-0489-4ea6-966c-141d1584a08d", + "uuid": "3b83414d-09ea-455b-aabe-e86e731ca03b", "control-id": "cis_rhel10_5-3.2.3.2", "description": "No notes for control-id 5.3.2.3.2.", "props": [ @@ -11790,7 +11814,7 @@ ] }, { - "uuid": "25e2a95b-acd9-4165-b1ca-622a994c2c3f", + "uuid": "c040a495-66e6-4908-a36d-bddbe5b45a25", "control-id": "cis_rhel10_5-3.2.3.3", "description": "In RHEL 10 pam_pwhistory is enabled via authselect feature, as required in 5.3.1.4. The\nfeature automatically set \"use_authok\" option. In any case, we don't have a rule to check\nthis option specifically.", "props": [ @@ -11807,7 +11831,7 @@ ] }, { - "uuid": "a992b3c7-783c-483b-a07c-67fe0327dd07", + "uuid": "a79224e3-4e48-4290-b8f7-f75a8e8d79ad", "control-id": "cis_rhel10_5-3.2.4.1", "description": "The rule more specifically used in this requirement also satify the requirement 5.3.1.5.", "props": [ @@ -11824,7 +11848,7 @@ ] }, { - "uuid": "5abd317d-b8c6-43d5-b9a4-478fad651aff", + "uuid": "d2faeb53-94e9-42e4-a4dc-b4ff1264461b", "control-id": "cis_rhel10_5-3.2.4.2", "description": "Usage of pam_unix.so module together with \"remember\" option is deprecated and is not\nrecommended by this policy. Instead, it should be used remember option of pam_pwhistory\nmodule, as required in 5.3.2.3.1. See here for more details about pam_unix.so:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1778929", "props": [ @@ -11841,7 +11865,7 @@ ] }, { - "uuid": "8fe072a6-3dc6-43d7-b185-1ddf60f3bf23", + "uuid": "32696ec8-6ba8-475b-95c6-74d6bb061e2c", "control-id": "cis_rhel10_5-3.2.4.3", "description": "Changes in logindefs mentioned in this requirement are more specifically covered by 5.4.1.4", "props": [ @@ -11863,7 +11887,7 @@ ] }, { - "uuid": "4afad90b-511f-4d75-9119-e68043f2b439", + "uuid": "1e72a065-4942-4415-b42b-f2cf9585c66e", "control-id": "cis_rhel10_5-3.2.4.4", "description": "In RHEL 10 pam_unix is enabled by default in all authselect profiles already with the\nuse_authtok option set. In any case, we don't have a rule to check this option specifically,\nlike in 5.3.2.3.3.", "props": [ @@ -11880,7 +11904,7 @@ ] }, { - "uuid": "307ae57a-e91b-4f7e-8b78-fa2d4567be1d", + "uuid": "85092c48-c63f-4a95-9dff-f4954711bc06", "control-id": "cis_rhel10_5-4.1.1", "description": "No notes for control-id 5.4.1.1.", "props": [ @@ -11902,7 +11926,7 @@ ] }, { - "uuid": "44c63d72-729e-4610-bd7e-da5582168c06", + "uuid": "213fda20-4a7e-4dee-aa31-586b0c8a954e", "control-id": "cis_rhel10_5-4.1.3", "description": "No notes for control-id 5.4.1.3.", "props": [ @@ -11924,7 +11948,7 @@ ] }, { - "uuid": "c42d67ea-465c-4c5e-a205-25bbcaabf4e3", + "uuid": "8796d0f4-64a4-4b90-99ac-fd5f669d2f8f", "control-id": "cis_rhel10_5-4.1.4", "description": "There's a \"new\" set of options in /etc/login.defs file to define the number of iterations\nperformed during the hashing process.", "props": [ @@ -11946,7 +11970,7 @@ ] }, { - "uuid": "65bc839f-5dff-4505-9f63-c3d92279f02b", + "uuid": "4d5259f6-8439-4a52-921a-08cdd93b8b35", "control-id": "cis_rhel10_5-4.1.5", "description": "No notes for control-id 5.4.1.5.", "props": [ @@ -11968,7 +11992,7 @@ ] }, { - "uuid": "ab0fa185-1668-4221-97f3-f47f3ed204e5", + "uuid": "f1c21d6d-9b4b-45d7-a6b0-0c1268a24ddd", "control-id": "cis_rhel10_5-4.1.6", "description": "No notes for control-id 5.4.1.6.", "props": [ @@ -11985,7 +12009,7 @@ ] }, { - "uuid": "60ca7650-80f7-479c-83a7-7584e0f718f9", + "uuid": "c11524ea-8c32-47ae-b53a-34fdbb676b5a", "control-id": "cis_rhel10_5-4.2.1", "description": "No notes for control-id 5.4.2.1.", "props": [ @@ -12002,7 +12026,7 @@ ] }, { - "uuid": "1f77df8e-ca38-4bd9-ad66-e4775c5e1d35", + "uuid": "e2607765-d3d6-4c2b-a8be-3a4477537003", "control-id": "cis_rhel10_5-4.2.2", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -12019,7 +12043,7 @@ ] }, { - "uuid": "777881f5-26ae-4f0e-9d69-a9125e7ad45d", + "uuid": "09c7ca00-c491-4579-8fb8-d98fd2f25806", "control-id": "cis_rhel10_5-4.2.3", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -12036,7 +12060,7 @@ ] }, { - "uuid": "25bcf619-583c-4f8d-9514-b199a80726d5", + "uuid": "e239a355-d401-4d97-a4b9-a57b7a59ab19", "control-id": "cis_rhel10_5-4.2.4", "description": "No notes for control-id 5.4.2.4.", "props": [ @@ -12053,7 +12077,7 @@ ] }, { - "uuid": "7fcd8e9d-a719-4c25-b9e6-9bb82b81551e", + "uuid": "ea01b703-4825-42d6-bc4c-fc080881fe2a", "control-id": "cis_rhel10_5-4.2.5", "description": "No notes for control-id 5.4.2.5.", "props": [ @@ -12075,7 +12099,7 @@ ] }, { - "uuid": "72b5e61c-c697-419b-84a4-b238e3737285", + "uuid": "96e76059-cca2-45aa-bbd7-4f2cd7dd14a7", "control-id": "cis_rhel10_5-4.2.6", "description": "No notes for control-id 5.4.2.6.", "props": [ @@ -12092,7 +12116,7 @@ ] }, { - "uuid": "19fe9b2f-5476-4d4c-9ae2-a8e709b2704d", + "uuid": "1b8008c1-5336-42ef-9b65-6777811bcc29", "control-id": "cis_rhel10_5-4.2.7", "description": "No notes for control-id 5.4.2.7.", "props": [ @@ -12114,19 +12138,24 @@ ] }, { - "uuid": "e9fa1278-9940-4056-be9b-af96575a7486", + "uuid": "030a62da-dadc-4820-9c2f-d26e27a009ca", "control-id": "cis_rhel10_5-4.2.8", - "description": "New rule is necessary.", + "description": "No notes for control-id 5.4.2.8.", "props": [ { "name": "implementation-status", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "implemented" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "no_invalid_shell_accounts_unlocked" } ] }, { - "uuid": "54427256-39c0-4298-9c6e-5ffcb6b8c8dc", + "uuid": "04cd0938-2220-40da-8bb9-e6f56482ff45", "control-id": "cis_rhel10_5-4.3.2", "description": "No notes for control-id 5.4.3.2.", "props": [ @@ -12143,7 +12172,7 @@ ] }, { - "uuid": "ed8fb88d-4ed8-4b6a-981e-a353d46c82dd", + "uuid": "b0e4e996-73b5-4903-890a-45ef990bc82e", "control-id": "cis_rhel10_5-4.3.3", "description": "No notes for control-id 5.4.3.3.", "props": [ @@ -12170,7 +12199,7 @@ ] }, { - "uuid": "07fe1ea4-a76f-4ea4-be85-061968f42051", + "uuid": "60028d14-141f-4d84-880d-2e4916e7ed19", "control-id": "cis_rhel10_6-1.1", "description": "No notes for control-id 6.1.1.", "props": [ @@ -12192,7 +12221,7 @@ ] }, { - "uuid": "1e2fb1a8-5faf-40c6-890d-907482632820", + "uuid": "96775ee9-f550-4b2a-8b39-64b782fa011d", "control-id": "cis_rhel10_6-1.2", "description": "No notes for control-id 6.1.2.", "props": [ @@ -12209,7 +12238,7 @@ ] }, { - "uuid": "8768bf93-8388-485d-a433-dedba2ba7517", + "uuid": "b8131b78-edc8-4abf-80a8-d8c8e50a0b21", "control-id": "cis_rhel10_6-1.3", "description": "No notes for control-id 6.1.3.", "props": [ @@ -12226,7 +12255,7 @@ ] }, { - "uuid": "df84cbe6-cd17-464f-80f7-41181eec22cc", + "uuid": "0aff2ebc-99e7-4ea2-b5f6-71bba66d482c", "control-id": "cis_rhel10_6-2.1.1", "description": "No notes for control-id 6.2.1.1.", "props": [ @@ -12243,7 +12272,7 @@ ] }, { - "uuid": "445bad0a-0662-4d91-a87f-85a18f0ed5b5", + "uuid": "41fe832c-4223-4768-98e9-a66a253256e7", "control-id": "cis_rhel10_6-2.1.2", "description": "The description for control-id cis_rhel10_6-2.1.2.", "props": [ @@ -12256,7 +12285,7 @@ ] }, { - "uuid": "c77e168c-3d38-4a0e-9c70-65e512c54a05", + "uuid": "9bb91d17-f131-433a-bb7e-154bb24df7cc", "control-id": "cis_rhel10_6-2.1.3", "description": "The description for control-id cis_rhel10_6-2.1.3.", "props": [ @@ -12269,20 +12298,24 @@ ] }, { - "uuid": "a93c923e-4df0-486a-b5c9-50a70a075c04", + "uuid": "d5ff2bb2-ef1b-46ce-ba96-7ca56aadface", "control-id": "cis_rhel10_6-2.1.4", - "description": "The description for control-id cis_rhel10_6-2.1.4.", + "description": "No notes for control-id 6.2.1.4.", "props": [ { "name": "implementation-status", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "alternative", - "remarks": "It is necessary to create a new rule to check the status of journald and rsyslog.\nIt would also be necessary a new rule to disable or remove rsyslog." + "value": "implemented" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "ensure_journald_and_rsyslog_not_active_together" } ] }, { - "uuid": "9cc1436e-b4a1-48af-b01a-29714908efa7", + "uuid": "4165ad9c-a9d1-4ae9-ab6c-2b0f6163e03d", "control-id": "cis_rhel10_6-2.2.1.1", "description": "No notes for control-id 6.2.2.1.1.", "props": [ @@ -12299,7 +12332,7 @@ ] }, { - "uuid": "71b30580-d463-43a2-a7c5-487122b9cd12", + "uuid": "d919324b-ae55-4950-80ce-90c3d89c5690", "control-id": "cis_rhel10_6-2.2.1.2", "description": "The description for control-id cis_rhel10_6-2.2.1.2.", "props": [ @@ -12312,7 +12345,7 @@ ] }, { - "uuid": "9ace68a9-03be-4c3a-afc0-fef2c8e76cea", + "uuid": "d731b5bd-cff6-4b14-b6b8-a9b1ba3ae330", "control-id": "cis_rhel10_6-2.2.1.3", "description": "No notes for control-id 6.2.2.1.3.", "props": [ @@ -12329,7 +12362,7 @@ ] }, { - "uuid": "0bec7dbb-30b0-4f72-9bc6-693d8873daad", + "uuid": "7bb4918b-bb25-493f-a074-1720d5c75bcf", "control-id": "cis_rhel10_6-2.2.1.4", "description": "No notes for control-id 6.2.2.1.4.", "props": [ @@ -12346,7 +12379,7 @@ ] }, { - "uuid": "9bf42666-1bc3-44f2-9330-5b16c21284d9", + "uuid": "9b15aa17-b43b-4183-b490-1a31a23dcea4", "control-id": "cis_rhel10_6-2.2.2", "description": "No notes for control-id 6.2.2.2.", "props": [ @@ -12363,7 +12396,7 @@ ] }, { - "uuid": "849b78ac-4fc1-4a46-ae13-35d80be865b1", + "uuid": "bcc0fa7a-f245-4bfa-9192-d2b285e1a721", "control-id": "cis_rhel10_6-2.2.3", "description": "No notes for control-id 6.2.2.3.", "props": [ @@ -12380,7 +12413,7 @@ ] }, { - "uuid": "9dd20509-a5b4-4ebc-83b5-ec85cbb1d6ae", + "uuid": "3b0d692c-0e25-42a7-8b33-4f44815c8b8d", "control-id": "cis_rhel10_6-2.2.4", "description": "No notes for control-id 6.2.2.4.", "props": [ @@ -12397,7 +12430,7 @@ ] }, { - "uuid": "2cf324fc-2982-44f3-a0db-461c78bde907", + "uuid": "7e1c0fcd-e305-4137-aa94-062b58c586ca", "control-id": "cis_rhel10_6-2.3.1", "description": "No notes for control-id 6.2.3.1.", "props": [ @@ -12409,7 +12442,7 @@ ] }, { - "uuid": "01205518-5e64-4ae0-943b-9081a8b1b374", + "uuid": "de7e933f-09b7-449b-b4a0-f7b35b1ff319", "control-id": "cis_rhel10_6-2.3.2", "description": "No notes for control-id 6.2.3.2.", "props": [ @@ -12421,7 +12454,7 @@ ] }, { - "uuid": "5c01ba64-4115-4a03-9340-4630d2c3516c", + "uuid": "b7dd3855-a295-4256-96bd-5bdff753d6a8", "control-id": "cis_rhel10_6-2.3.3", "description": "No notes for control-id 6.2.3.3.", "props": [ @@ -12433,7 +12466,7 @@ ] }, { - "uuid": "3e45221a-b470-48df-bb27-48ec555e88bf", + "uuid": "db9e4eda-62d0-48f9-b5c7-deff117d9fc3", "control-id": "cis_rhel10_6-2.3.4", "description": "No notes for control-id 6.2.3.4.", "props": [ @@ -12445,7 +12478,7 @@ ] }, { - "uuid": "94aebf68-1d29-48c5-af6c-ebc7e17878f5", + "uuid": "a947d8a7-4b60-43be-81df-1329e6a04de9", "control-id": "cis_rhel10_6-2.3.5", "description": "The description for control-id cis_rhel10_6-2.3.5.", "props": [ @@ -12458,7 +12491,7 @@ ] }, { - "uuid": "dd4fc54b-ae6a-4887-b383-84c58b188433", + "uuid": "84aadb28-bd66-4687-9449-98ed0fd8efc8", "control-id": "cis_rhel10_6-2.3.6", "description": "The description for control-id cis_rhel10_6-2.3.6.", "props": [ @@ -12471,7 +12504,7 @@ ] }, { - "uuid": "e2b57679-d485-4758-b8f1-f07256ef7e10", + "uuid": "cf6045d1-e8a0-41f0-8900-c1423d866ea5", "control-id": "cis_rhel10_6-2.3.7", "description": "No notes for control-id 6.2.3.7.", "props": [ @@ -12483,7 +12516,7 @@ ] }, { - "uuid": "2d77df30-c796-4d61-b655-15f2849a9cb9", + "uuid": "e7beb7b4-45e9-4f28-823b-5fd22e32fead", "control-id": "cis_rhel10_6-2.3.8", "description": "The description for control-id cis_rhel10_6-2.3.8.", "props": [ @@ -12496,7 +12529,7 @@ ] }, { - "uuid": "99d838f3-166f-4a5a-bcb4-362374d6b03f", + "uuid": "718d5242-4bdc-4a73-88c5-bdbb9d2d4a71", "control-id": "cis_rhel10_6-2.4.1", "description": "It is not harmful to run these rules even if rsyslog is not installed or active.", "props": [ @@ -12523,7 +12556,7 @@ ] }, { - "uuid": "89d5c1c2-7119-47ef-98bc-5156a90a2da4", + "uuid": "90de383a-5781-4e21-81b9-e085dca6b9d6", "control-id": "cis_rhel10_7-1.1", "description": "No notes for control-id 7.1.1.", "props": [ @@ -12550,7 +12583,7 @@ ] }, { - "uuid": "2e4d40c8-3d61-48d9-97cf-c451e07308b1", + "uuid": "9fa6bdef-20f8-4f50-bdc0-656cdb216ead", "control-id": "cis_rhel10_7-1.2", "description": "No notes for control-id 7.1.2.", "props": [ @@ -12577,7 +12610,7 @@ ] }, { - "uuid": "e163cbe1-75eb-411a-adfe-74341251b26c", + "uuid": "01f3ef43-ad73-4075-bf43-dd06c990cf9f", "control-id": "cis_rhel10_7-1.3", "description": "No notes for control-id 7.1.3.", "props": [ @@ -12604,7 +12637,7 @@ ] }, { - "uuid": "3f645730-45ff-49dd-973d-31a708a86943", + "uuid": "f39023f5-f7fd-429c-9e21-383a12e4f086", "control-id": "cis_rhel10_7-1.4", "description": "No notes for control-id 7.1.4.", "props": [ @@ -12631,7 +12664,7 @@ ] }, { - "uuid": "a6983ffe-6f9f-4da5-93a7-38aff083be31", + "uuid": "be839d18-b458-428c-be3e-686c2e5c1a94", "control-id": "cis_rhel10_7-1.5", "description": "No notes for control-id 7.1.5.", "props": [ @@ -12658,7 +12691,7 @@ ] }, { - "uuid": "42e607d6-c8c6-4091-bf56-cdc25c95fe9e", + "uuid": "16221182-1a1b-45c1-8019-a6feae08ef4b", "control-id": "cis_rhel10_7-1.6", "description": "No notes for control-id 7.1.6.", "props": [ @@ -12685,7 +12718,7 @@ ] }, { - "uuid": "8c888dbc-e395-4eb3-9739-a0c457b747bf", + "uuid": "6d81a5cf-0f3c-4729-b80c-928b2b655196", "control-id": "cis_rhel10_7-1.7", "description": "No notes for control-id 7.1.7.", "props": [ @@ -12712,7 +12745,7 @@ ] }, { - "uuid": "e8b2bcf8-d2cd-4410-afce-8d6d6b44ad6a", + "uuid": "bb96e4ae-6d22-4681-ba9d-deea4e770aa5", "control-id": "cis_rhel10_7-1.8", "description": "No notes for control-id 7.1.8.", "props": [ @@ -12739,7 +12772,7 @@ ] }, { - "uuid": "6ca6e7ea-0e10-461c-a708-37c22743a54e", + "uuid": "99f30337-d91b-4ee9-ad6a-38241590c6e1", "control-id": "cis_rhel10_7-1.9", "description": "No notes for control-id 7.1.9.", "props": [ @@ -12766,7 +12799,7 @@ ] }, { - "uuid": "e452d1f8-9fa4-4217-a0ee-ff7948f250b6", + "uuid": "ddfacb17-d7dd-4daa-9448-c528e0316518", "control-id": "cis_rhel10_7-1.10", "description": "No notes for control-id 7.1.10.", "props": [ @@ -12808,7 +12841,7 @@ ] }, { - "uuid": "de1003a3-f2fe-4fbc-b2b9-da6ed86477f2", + "uuid": "37494c06-fabb-4c9b-bcd7-53f0be76a0e7", "control-id": "cis_rhel10_7-1.11", "description": "No notes for control-id 7.1.11.", "props": [ @@ -12830,7 +12863,7 @@ ] }, { - "uuid": "3ea76713-bc8c-49ef-915d-9a652f88baa6", + "uuid": "ad8e9e23-3969-4e1f-8fee-e5ec5a9494dd", "control-id": "cis_rhel10_7-1.12", "description": "No notes for control-id 7.1.12.", "props": [ @@ -12852,7 +12885,7 @@ ] }, { - "uuid": "f8beb1a7-a803-46df-b343-17d35f9abf41", + "uuid": "a58864d8-0dab-4535-bea0-9b9af1b26013", "control-id": "cis_rhel10_7-1.13", "description": "The description for control-id cis_rhel10_7-1.13.", "props": [ @@ -12865,7 +12898,7 @@ ] }, { - "uuid": "0451958f-48a7-4e6a-b161-5dbbeee5b4db", + "uuid": "603ff561-318f-4095-aab3-988381ba5137", "control-id": "cis_rhel10_7-2.1", "description": "No notes for control-id 7.2.1.", "props": [ @@ -12882,7 +12915,7 @@ ] }, { - "uuid": "9f0094e2-e200-4265-8173-1901d4407b9d", + "uuid": "d7c84c38-4c9c-49e7-a59b-1bd33162bd8a", "control-id": "cis_rhel10_7-2.2", "description": "No notes for control-id 7.2.2.", "props": [ @@ -12899,7 +12932,7 @@ ] }, { - "uuid": "1eab7d24-c1f5-40ba-a4ed-da84d62de9e2", + "uuid": "822446d9-5217-4121-9f9d-dab256b84227", "control-id": "cis_rhel10_7-2.3", "description": "No notes for control-id 7.2.3.", "props": [ @@ -12916,7 +12949,7 @@ ] }, { - "uuid": "041c58e0-4f2e-4d61-8849-05f0e26b3f09", + "uuid": "7550f725-a678-4f59-986e-4cd8d74241bd", "control-id": "cis_rhel10_7-2.4", "description": "No notes for control-id 7.2.4.", "props": [ @@ -12933,7 +12966,7 @@ ] }, { - "uuid": "4469529e-f737-4341-9a7e-339d6ed1215f", + "uuid": "209a6303-b02b-42e7-9399-a3099244b398", "control-id": "cis_rhel10_7-2.5", "description": "No notes for control-id 7.2.5.", "props": [ @@ -12950,7 +12983,7 @@ ] }, { - "uuid": "eefa37b0-0889-4e3a-ac2b-06ca4caabca7", + "uuid": "f15178d0-8e67-4dd9-bb5c-c0f0d9c48da2", "control-id": "cis_rhel10_7-2.6", "description": "No notes for control-id 7.2.6.", "props": [ @@ -12967,7 +13000,7 @@ ] }, { - "uuid": "8634ea62-b655-4170-93a9-2899c73a74a5", + "uuid": "8879c3a8-a3a2-4c5b-abcc-e1129d7b20e9", "control-id": "cis_rhel10_7-2.7", "description": "No notes for control-id 7.2.7.", "props": [ @@ -12984,7 +13017,7 @@ ] }, { - "uuid": "28607342-7df6-4b86-bae0-c53cda398c06", + "uuid": "7b4c6dbb-24fd-45be-acab-78802c15af1f", "control-id": "cis_rhel10_7-2.8", "description": "No notes for control-id 7.2.8.", "props": [ @@ -13011,7 +13044,7 @@ ] }, { - "uuid": "4d82aa11-5d9f-48dc-a2b0-9ddbecd8f8e3", + "uuid": "5faaa507-baef-42ed-982d-e43baba04755", "control-id": "cis_rhel10_7-2.9", "description": "No notes for control-id 7.2.9.", "props": [ @@ -20305,4471 +20338,4519 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_tmout", + "value": "no_invalid_shell_accounts_unlocked", "remarks": "rule_set_251" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Interactive Session Timeout", + "value": "Verify Non-Interactive Accounts Are Locked", "remarks": "rule_set_251" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_tmout", + "value": "no_invalid_shell_accounts_unlocked", "remarks": "rule_set_251" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Interactive Session Timeout", + "value": "Verify Non-Interactive Accounts Are Locked", "remarks": "rule_set_251" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_bashrc", + "value": "accounts_tmout", "remarks": "rule_set_252" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Bash Umask is Set Correctly", + "value": "Set Interactive Session Timeout", "remarks": "rule_set_252" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_bashrc", + "value": "accounts_tmout", "remarks": "rule_set_252" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Bash Umask is Set Correctly", + "value": "Set Interactive Session Timeout", "remarks": "rule_set_252" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_login_defs", + "value": "accounts_umask_etc_bashrc", "remarks": "rule_set_253" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Umask is Set Correctly in login.defs", + "value": "Ensure the Default Bash Umask is Set Correctly", "remarks": "rule_set_253" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_login_defs", + "value": "accounts_umask_etc_bashrc", "remarks": "rule_set_253" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Umask is Set Correctly in login.defs", + "value": "Ensure the Default Bash Umask is Set Correctly", "remarks": "rule_set_253" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_profile", + "value": "accounts_umask_etc_login_defs", "remarks": "rule_set_254" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Umask is Set Correctly in /etc/profile", + "value": "Ensure the Default Umask is Set Correctly in login.defs", "remarks": "rule_set_254" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_profile", + "value": "accounts_umask_etc_login_defs", "remarks": "rule_set_254" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Umask is Set Correctly in /etc/profile", + "value": "Ensure the Default Umask is Set Correctly in login.defs", "remarks": "rule_set_254" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_aide_installed", + "value": "accounts_umask_etc_profile", "remarks": "rule_set_255" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install AIDE", + "value": "Ensure the Default Umask is Set Correctly in /etc/profile", "remarks": "rule_set_255" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_aide_installed", + "value": "accounts_umask_etc_profile", "remarks": "rule_set_255" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install AIDE", + "value": "Ensure the Default Umask is Set Correctly in /etc/profile", "remarks": "rule_set_255" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_build_database", + "value": "package_aide_installed", "remarks": "rule_set_256" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Build and Test AIDE Database", + "value": "Install AIDE", "remarks": "rule_set_256" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_build_database", + "value": "package_aide_installed", "remarks": "rule_set_256" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Build and Test AIDE Database", + "value": "Install AIDE", "remarks": "rule_set_256" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_periodic_cron_checking", + "value": "aide_build_database", "remarks": "rule_set_257" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Periodic Execution of AIDE", + "value": "Build and Test AIDE Database", "remarks": "rule_set_257" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_periodic_cron_checking", + "value": "aide_build_database", "remarks": "rule_set_257" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Periodic Execution of AIDE", + "value": "Build and Test AIDE Database", "remarks": "rule_set_257" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_check_audit_tools", + "value": "aide_periodic_cron_checking", "remarks": "rule_set_258" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure AIDE to Verify the Audit Tools", + "value": "Configure Periodic Execution of AIDE", "remarks": "rule_set_258" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_check_audit_tools", + "value": "aide_periodic_cron_checking", "remarks": "rule_set_258" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure AIDE to Verify the Audit Tools", + "value": "Configure Periodic Execution of AIDE", "remarks": "rule_set_258" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_systemd-journald_enabled", + "value": "aide_check_audit_tools", "remarks": "rule_set_259" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable systemd-journald Service", + "value": "Configure AIDE to Verify the Audit Tools", "remarks": "rule_set_259" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_systemd-journald_enabled", + "value": "aide_check_audit_tools", "remarks": "rule_set_259" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable systemd-journald Service", + "value": "Configure AIDE to Verify the Audit Tools", "remarks": "rule_set_259" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_systemd-journal-remote_installed", + "value": "service_systemd-journald_enabled", "remarks": "rule_set_260" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install systemd-journal-remote Package", + "value": "Enable systemd-journald Service", "remarks": "rule_set_260" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_systemd-journal-remote_installed", + "value": "service_systemd-journald_enabled", "remarks": "rule_set_260" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install systemd-journal-remote Package", + "value": "Enable systemd-journald Service", "remarks": "rule_set_260" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_systemd-journal-upload_enabled", + "value": "ensure_journald_and_rsyslog_not_active_together", "remarks": "rule_set_261" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable systemd-journal-upload Service", + "value": "Ensure journald and rsyslog Are Not Active Together", "remarks": "rule_set_261" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_systemd-journal-upload_enabled", + "value": "ensure_journald_and_rsyslog_not_active_together", "remarks": "rule_set_261" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable systemd-journal-upload Service", + "value": "Ensure journald and rsyslog Are Not Active Together", "remarks": "rule_set_261" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "socket_systemd-journal-remote_disabled", + "value": "package_systemd-journal-remote_installed", "remarks": "rule_set_262" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable systemd-journal-remote Socket", + "value": "Install systemd-journal-remote Package", "remarks": "rule_set_262" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "socket_systemd-journal-remote_disabled", + "value": "package_systemd-journal-remote_installed", "remarks": "rule_set_262" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable systemd-journal-remote Socket", + "value": "Install systemd-journal-remote Package", "remarks": "rule_set_262" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_disable_forward_to_syslog", + "value": "service_systemd-journal-upload_enabled", "remarks": "rule_set_263" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald ForwardToSyslog is disabled", + "value": "Enable systemd-journal-upload Service", "remarks": "rule_set_263" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_disable_forward_to_syslog", + "value": "service_systemd-journal-upload_enabled", "remarks": "rule_set_263" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald ForwardToSyslog is disabled", + "value": "Enable systemd-journal-upload Service", "remarks": "rule_set_263" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_compress", + "value": "socket_systemd-journal-remote_disabled", "remarks": "rule_set_264" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald is configured to compress large log files", + "value": "Disable systemd-journal-remote Socket", "remarks": "rule_set_264" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_compress", + "value": "socket_systemd-journal-remote_disabled", "remarks": "rule_set_264" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald is configured to compress large log files", + "value": "Disable systemd-journal-remote Socket", "remarks": "rule_set_264" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_storage", + "value": "journald_disable_forward_to_syslog", "remarks": "rule_set_265" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald is configured to write log files to persistent disk", + "value": "Ensure journald ForwardToSyslog is disabled", "remarks": "rule_set_265" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_storage", + "value": "journald_disable_forward_to_syslog", "remarks": "rule_set_265" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald is configured to write log files to persistent disk", + "value": "Ensure journald ForwardToSyslog is disabled", "remarks": "rule_set_265" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_groupownership", + "value": "journald_compress", "remarks": "rule_set_266" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Log Files Are Owned By Appropriate Group", + "value": "Ensure journald is configured to compress large log files", "remarks": "rule_set_266" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_groupownership", + "value": "journald_compress", "remarks": "rule_set_266" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Log Files Are Owned By Appropriate Group", + "value": "Ensure journald is configured to compress large log files", "remarks": "rule_set_266" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_ownership", + "value": "journald_storage", "remarks": "rule_set_267" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Log Files Are Owned By Appropriate User", + "value": "Ensure journald is configured to write log files to persistent disk", "remarks": "rule_set_267" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_ownership", + "value": "journald_storage", "remarks": "rule_set_267" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Log Files Are Owned By Appropriate User", + "value": "Ensure journald is configured to write log files to persistent disk", "remarks": "rule_set_267" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_permissions", + "value": "rsyslog_files_groupownership", "remarks": "rule_set_268" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure System Log Files Have Correct Permissions", + "value": "Ensure Log Files Are Owned By Appropriate Group", "remarks": "rule_set_268" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_permissions", + "value": "rsyslog_files_groupownership", "remarks": "rule_set_268" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure System Log Files Have Correct Permissions", + "value": "Ensure Log Files Are Owned By Appropriate Group", "remarks": "rule_set_268" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_passwd", + "value": "rsyslog_files_ownership", "remarks": "rule_set_269" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns passwd File", + "value": "Ensure Log Files Are Owned By Appropriate User", "remarks": "rule_set_269" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_passwd", + "value": "rsyslog_files_ownership", "remarks": "rule_set_269" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns passwd File", + "value": "Ensure Log Files Are Owned By Appropriate User", "remarks": "rule_set_269" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_passwd", + "value": "rsyslog_files_permissions", "remarks": "rule_set_270" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns passwd File", + "value": "Ensure System Log Files Have Correct Permissions", "remarks": "rule_set_270" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_passwd", + "value": "rsyslog_files_permissions", "remarks": "rule_set_270" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns passwd File", + "value": "Ensure System Log Files Have Correct Permissions", "remarks": "rule_set_270" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_passwd", + "value": "file_groupowner_etc_passwd", "remarks": "rule_set_271" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on passwd File", + "value": "Verify Group Who Owns passwd File", "remarks": "rule_set_271" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_passwd", + "value": "file_groupowner_etc_passwd", "remarks": "rule_set_271" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on passwd File", + "value": "Verify Group Who Owns passwd File", "remarks": "rule_set_271" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_passwd", + "value": "file_owner_etc_passwd", "remarks": "rule_set_272" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup passwd File", + "value": "Verify User Who Owns passwd File", "remarks": "rule_set_272" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_passwd", + "value": "file_owner_etc_passwd", "remarks": "rule_set_272" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup passwd File", + "value": "Verify User Who Owns passwd File", "remarks": "rule_set_272" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_passwd", + "value": "file_permissions_etc_passwd", "remarks": "rule_set_273" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup passwd File", + "value": "Verify Permissions on passwd File", "remarks": "rule_set_273" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_passwd", + "value": "file_permissions_etc_passwd", "remarks": "rule_set_273" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup passwd File", + "value": "Verify Permissions on passwd File", "remarks": "rule_set_273" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_passwd", + "value": "file_groupowner_backup_etc_passwd", "remarks": "rule_set_274" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup passwd File", + "value": "Verify Group Who Owns Backup passwd File", "remarks": "rule_set_274" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_passwd", + "value": "file_groupowner_backup_etc_passwd", "remarks": "rule_set_274" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup passwd File", + "value": "Verify Group Who Owns Backup passwd File", "remarks": "rule_set_274" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_group", + "value": "file_owner_backup_etc_passwd", "remarks": "rule_set_275" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns group File", + "value": "Verify User Who Owns Backup passwd File", "remarks": "rule_set_275" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_group", + "value": "file_owner_backup_etc_passwd", "remarks": "rule_set_275" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns group File", + "value": "Verify User Who Owns Backup passwd File", "remarks": "rule_set_275" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_group", + "value": "file_permissions_backup_etc_passwd", "remarks": "rule_set_276" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns group File", + "value": "Verify Permissions on Backup passwd File", "remarks": "rule_set_276" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_group", + "value": "file_permissions_backup_etc_passwd", "remarks": "rule_set_276" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns group File", + "value": "Verify Permissions on Backup passwd File", "remarks": "rule_set_276" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_group", + "value": "file_groupowner_etc_group", + "remarks": "rule_set_277" + }, + { + "name": "Rule_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Verify Group Who Owns group File", + "remarks": "rule_set_277" + }, + { + "name": "Check_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "file_groupowner_etc_group", + "remarks": "rule_set_277" + }, + { + "name": "Check_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Verify Group Who Owns group File", "remarks": "rule_set_277" }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "file_owner_etc_group", + "remarks": "rule_set_278" + }, + { + "name": "Rule_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Verify User Who Owns group File", + "remarks": "rule_set_278" + }, + { + "name": "Check_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "file_owner_etc_group", + "remarks": "rule_set_278" + }, + { + "name": "Check_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Verify User Who Owns group File", + "remarks": "rule_set_278" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "file_permissions_etc_group", + "remarks": "rule_set_279" + }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on group File", - "remarks": "rule_set_277" + "remarks": "rule_set_279" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_group", - "remarks": "rule_set_277" + "remarks": "rule_set_279" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on group File", - "remarks": "rule_set_277" + "remarks": "rule_set_279" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_group", - "remarks": "rule_set_278" + "remarks": "rule_set_280" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup group File", - "remarks": "rule_set_278" + "remarks": "rule_set_280" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_group", - "remarks": "rule_set_278" + "remarks": "rule_set_280" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup group File", - "remarks": "rule_set_278" + "remarks": "rule_set_280" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_group", - "remarks": "rule_set_279" + "remarks": "rule_set_281" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup group File", - "remarks": "rule_set_279" + "remarks": "rule_set_281" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_group", - "remarks": "rule_set_279" + "remarks": "rule_set_281" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup group File", - "remarks": "rule_set_279" + "remarks": "rule_set_281" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_group", - "remarks": "rule_set_280" + "remarks": "rule_set_282" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup group File", - "remarks": "rule_set_280" + "remarks": "rule_set_282" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_group", - "remarks": "rule_set_280" + "remarks": "rule_set_282" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup group File", - "remarks": "rule_set_280" + "remarks": "rule_set_282" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shadow", - "remarks": "rule_set_281" + "remarks": "rule_set_283" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns shadow File", - "remarks": "rule_set_281" + "remarks": "rule_set_283" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shadow", - "remarks": "rule_set_281" + "remarks": "rule_set_283" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns shadow File", - "remarks": "rule_set_281" + "remarks": "rule_set_283" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shadow", - "remarks": "rule_set_282" + "remarks": "rule_set_284" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns shadow File", - "remarks": "rule_set_282" + "remarks": "rule_set_284" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shadow", - "remarks": "rule_set_282" + "remarks": "rule_set_284" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns shadow File", - "remarks": "rule_set_282" + "remarks": "rule_set_284" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shadow", - "remarks": "rule_set_283" + "remarks": "rule_set_285" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on shadow File", - "remarks": "rule_set_283" + "remarks": "rule_set_285" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shadow", - "remarks": "rule_set_283" + "remarks": "rule_set_285" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on shadow File", - "remarks": "rule_set_283" + "remarks": "rule_set_285" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_shadow", - "remarks": "rule_set_284" + "remarks": "rule_set_286" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup shadow File", - "remarks": "rule_set_284" + "remarks": "rule_set_286" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_shadow", - "remarks": "rule_set_284" + "remarks": "rule_set_286" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup shadow File", - "remarks": "rule_set_284" + "remarks": "rule_set_286" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_shadow", - "remarks": "rule_set_285" + "remarks": "rule_set_287" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup shadow File", - "remarks": "rule_set_285" + "remarks": "rule_set_287" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_shadow", - "remarks": "rule_set_285" + "remarks": "rule_set_287" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup shadow File", - "remarks": "rule_set_285" + "remarks": "rule_set_287" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_shadow", - "remarks": "rule_set_286" + "remarks": "rule_set_288" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup shadow File", - "remarks": "rule_set_286" + "remarks": "rule_set_288" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_shadow", - "remarks": "rule_set_286" + "remarks": "rule_set_288" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup shadow File", - "remarks": "rule_set_286" + "remarks": "rule_set_288" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_gshadow", - "remarks": "rule_set_287" + "remarks": "rule_set_289" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns gshadow File", - "remarks": "rule_set_287" + "remarks": "rule_set_289" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_gshadow", - "remarks": "rule_set_287" + "remarks": "rule_set_289" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns gshadow File", - "remarks": "rule_set_287" + "remarks": "rule_set_289" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_gshadow", - "remarks": "rule_set_288" + "remarks": "rule_set_290" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns gshadow File", - "remarks": "rule_set_288" + "remarks": "rule_set_290" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_gshadow", - "remarks": "rule_set_288" + "remarks": "rule_set_290" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns gshadow File", - "remarks": "rule_set_288" + "remarks": "rule_set_290" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_gshadow", - "remarks": "rule_set_289" + "remarks": "rule_set_291" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on gshadow File", - "remarks": "rule_set_289" + "remarks": "rule_set_291" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_gshadow", - "remarks": "rule_set_289" + "remarks": "rule_set_291" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on gshadow File", - "remarks": "rule_set_289" + "remarks": "rule_set_291" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_gshadow", - "remarks": "rule_set_290" + "remarks": "rule_set_292" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup gshadow File", - "remarks": "rule_set_290" + "remarks": "rule_set_292" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_gshadow", - "remarks": "rule_set_290" + "remarks": "rule_set_292" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup gshadow File", - "remarks": "rule_set_290" + "remarks": "rule_set_292" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_gshadow", - "remarks": "rule_set_291" + "remarks": "rule_set_293" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup gshadow File", - "remarks": "rule_set_291" + "remarks": "rule_set_293" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_gshadow", - "remarks": "rule_set_291" + "remarks": "rule_set_293" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup gshadow File", - "remarks": "rule_set_291" + "remarks": "rule_set_293" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_gshadow", - "remarks": "rule_set_292" + "remarks": "rule_set_294" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup gshadow File", - "remarks": "rule_set_292" + "remarks": "rule_set_294" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_gshadow", - "remarks": "rule_set_292" + "remarks": "rule_set_294" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup gshadow File", - "remarks": "rule_set_292" + "remarks": "rule_set_294" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shells", - "remarks": "rule_set_293" + "remarks": "rule_set_295" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/shells File", - "remarks": "rule_set_293" + "remarks": "rule_set_295" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shells", - "remarks": "rule_set_293" + "remarks": "rule_set_295" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/shells File", - "remarks": "rule_set_293" + "remarks": "rule_set_295" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shells", - "remarks": "rule_set_294" + "remarks": "rule_set_296" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Who Owns /etc/shells File", - "remarks": "rule_set_294" + "remarks": "rule_set_296" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shells", - "remarks": "rule_set_294" + "remarks": "rule_set_296" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Who Owns /etc/shells File", - "remarks": "rule_set_294" + "remarks": "rule_set_296" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shells", - "remarks": "rule_set_295" + "remarks": "rule_set_297" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/shells File", - "remarks": "rule_set_295" + "remarks": "rule_set_297" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shells", - "remarks": "rule_set_295" + "remarks": "rule_set_297" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/shells File", - "remarks": "rule_set_295" + "remarks": "rule_set_297" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd", - "remarks": "rule_set_296" + "remarks": "rule_set_298" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd File", - "remarks": "rule_set_296" + "remarks": "rule_set_298" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd", - "remarks": "rule_set_296" + "remarks": "rule_set_298" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd File", - "remarks": "rule_set_296" + "remarks": "rule_set_298" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd", - "remarks": "rule_set_297" + "remarks": "rule_set_299" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd File", - "remarks": "rule_set_297" + "remarks": "rule_set_299" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd", - "remarks": "rule_set_297" + "remarks": "rule_set_299" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd File", - "remarks": "rule_set_297" + "remarks": "rule_set_299" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd", - "remarks": "rule_set_298" + "remarks": "rule_set_300" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd File", - "remarks": "rule_set_298" + "remarks": "rule_set_300" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd", - "remarks": "rule_set_298" + "remarks": "rule_set_300" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd File", - "remarks": "rule_set_298" + "remarks": "rule_set_300" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd_old", - "remarks": "rule_set_299" + "remarks": "rule_set_301" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_299" + "remarks": "rule_set_301" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd_old", - "remarks": "rule_set_299" + "remarks": "rule_set_301" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_299" + "remarks": "rule_set_301" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd_old", - "remarks": "rule_set_300" + "remarks": "rule_set_302" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_300" + "remarks": "rule_set_302" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd_old", - "remarks": "rule_set_300" + "remarks": "rule_set_302" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_300" + "remarks": "rule_set_302" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd_old", - "remarks": "rule_set_301" + "remarks": "rule_set_303" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd.old File", - "remarks": "rule_set_301" + "remarks": "rule_set_303" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd_old", - "remarks": "rule_set_301" + "remarks": "rule_set_303" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd.old File", - "remarks": "rule_set_301" + "remarks": "rule_set_303" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_302" + "remarks": "rule_set_304" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_302" + "remarks": "rule_set_304" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_302" + "remarks": "rule_set_304" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_302" + "remarks": "rule_set_304" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_303" + "remarks": "rule_set_305" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_303" + "remarks": "rule_set_305" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_303" + "remarks": "rule_set_305" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_303" + "remarks": "rule_set_305" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_unowned_by_user", - "remarks": "rule_set_304" + "remarks": "rule_set_306" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a User", - "remarks": "rule_set_304" + "remarks": "rule_set_306" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_unowned_by_user", - "remarks": "rule_set_304" + "remarks": "rule_set_306" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a User", - "remarks": "rule_set_304" + "remarks": "rule_set_306" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_ungroupowned", - "remarks": "rule_set_305" + "remarks": "rule_set_307" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a Group", - "remarks": "rule_set_305" + "remarks": "rule_set_307" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_ungroupowned", - "remarks": "rule_set_305" + "remarks": "rule_set_307" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a Group", - "remarks": "rule_set_305" + "remarks": "rule_set_307" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_all_shadowed", - "remarks": "rule_set_306" + "remarks": "rule_set_308" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify All Account Password Hashes are Shadowed", - "remarks": "rule_set_306" + "remarks": "rule_set_308" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_all_shadowed", - "remarks": "rule_set_306" + "remarks": "rule_set_308" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify All Account Password Hashes are Shadowed", - "remarks": "rule_set_306" + "remarks": "rule_set_308" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords_etc_shadow", - "remarks": "rule_set_307" + "remarks": "rule_set_309" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure There Are No Accounts With Blank or Null Passwords", - "remarks": "rule_set_307" + "remarks": "rule_set_309" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords_etc_shadow", - "remarks": "rule_set_307" + "remarks": "rule_set_309" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure There Are No Accounts With Blank or Null Passwords", - "remarks": "rule_set_307" + "remarks": "rule_set_309" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gid_passwd_group_same", - "remarks": "rule_set_308" + "remarks": "rule_set_310" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", - "remarks": "rule_set_308" + "remarks": "rule_set_310" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gid_passwd_group_same", - "remarks": "rule_set_308" + "remarks": "rule_set_310" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", - "remarks": "rule_set_308" + "remarks": "rule_set_310" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_id", - "remarks": "rule_set_309" + "remarks": "rule_set_311" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique User IDs", - "remarks": "rule_set_309" + "remarks": "rule_set_311" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_id", - "remarks": "rule_set_309" + "remarks": "rule_set_311" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique User IDs", - "remarks": "rule_set_309" + "remarks": "rule_set_311" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_id", - "remarks": "rule_set_310" + "remarks": "rule_set_312" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group ID", - "remarks": "rule_set_310" + "remarks": "rule_set_312" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_id", - "remarks": "rule_set_310" + "remarks": "rule_set_312" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group ID", - "remarks": "rule_set_310" + "remarks": "rule_set_312" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_name", - "remarks": "rule_set_311" + "remarks": "rule_set_313" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique Names", - "remarks": "rule_set_311" + "remarks": "rule_set_313" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_name", - "remarks": "rule_set_311" + "remarks": "rule_set_313" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique Names", - "remarks": "rule_set_311" + "remarks": "rule_set_313" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_name", - "remarks": "rule_set_312" + "remarks": "rule_set_314" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group Names", - "remarks": "rule_set_312" + "remarks": "rule_set_314" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_name", - "remarks": "rule_set_312" + "remarks": "rule_set_314" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group Names", - "remarks": "rule_set_312" + "remarks": "rule_set_314" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_interactive_home_directory_exists", - "remarks": "rule_set_313" + "remarks": "rule_set_315" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive Users Home Directories Must Exist", - "remarks": "rule_set_313" + "remarks": "rule_set_315" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_interactive_home_directory_exists", - "remarks": "rule_set_313" + "remarks": "rule_set_315" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive Users Home Directories Must Exist", - "remarks": "rule_set_313" + "remarks": "rule_set_315" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_home_directories", - "remarks": "rule_set_314" + "remarks": "rule_set_316" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Be Owned By The Primary User", - "remarks": "rule_set_314" + "remarks": "rule_set_316" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_home_directories", - "remarks": "rule_set_314" + "remarks": "rule_set_316" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Be Owned By The Primary User", - "remarks": "rule_set_314" + "remarks": "rule_set_316" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_home_directories", - "remarks": "rule_set_315" + "remarks": "rule_set_317" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", - "remarks": "rule_set_315" + "remarks": "rule_set_317" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_home_directories", - "remarks": "rule_set_315" + "remarks": "rule_set_317" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", - "remarks": "rule_set_315" + "remarks": "rule_set_317" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_316" + "remarks": "rule_set_318" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_316" + "remarks": "rule_set_318" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_316" + "remarks": "rule_set_318" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_316" + "remarks": "rule_set_318" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_317" + "remarks": "rule_set_319" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_317" + "remarks": "rule_set_319" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_317" + "remarks": "rule_set_319" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_317" + "remarks": "rule_set_319" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_no_world_writable_programs", - "remarks": "rule_set_318" + "remarks": "rule_set_320" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Not Run World-Writable Programs", - "remarks": "rule_set_318" + "remarks": "rule_set_320" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_no_world_writable_programs", - "remarks": "rule_set_318" + "remarks": "rule_set_320" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Not Run World-Writable Programs", - "remarks": "rule_set_318" + "remarks": "rule_set_320" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_319" + "remarks": "rule_set_321" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_319" + "remarks": "rule_set_321" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_319" + "remarks": "rule_set_321" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_319" + "remarks": "rule_set_321" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_forward_files", - "remarks": "rule_set_320" + "remarks": "rule_set_322" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .forward Files Exist", - "remarks": "rule_set_320" + "remarks": "rule_set_322" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_forward_files", - "remarks": "rule_set_320" + "remarks": "rule_set_322" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .forward Files Exist", - "remarks": "rule_set_320" + "remarks": "rule_set_322" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_netrc_files", - "remarks": "rule_set_321" + "remarks": "rule_set_323" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No netrc Files Exist", - "remarks": "rule_set_321" + "remarks": "rule_set_323" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_netrc_files", - "remarks": "rule_set_321" + "remarks": "rule_set_323" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No netrc Files Exist", - "remarks": "rule_set_321" + "remarks": "rule_set_323" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rhost_files", - "remarks": "rule_set_322" + "remarks": "rule_set_324" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .rhost Files Exist", - "remarks": "rule_set_322" + "remarks": "rule_set_324" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rhost_files", - "remarks": "rule_set_322" + "remarks": "rule_set_324" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .rhost Files Exist", - "remarks": "rule_set_322" + "remarks": "rule_set_324" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_bash_history", - "remarks": "rule_set_323" + "remarks": "rule_set_325" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure User Bash History File Has Correct Permissions", - "remarks": "rule_set_323" + "remarks": "rule_set_325" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_bash_history", - "remarks": "rule_set_323" + "remarks": "rule_set_325" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure User Bash History File Has Correct Permissions", - "remarks": "rule_set_323" + "remarks": "rule_set_325" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_overlayfs_disabled", - "remarks": "rule_set_324" + "remarks": "rule_set_326" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure overlayfs kernel module is not available", - "remarks": "rule_set_324" + "remarks": "rule_set_326" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_overlayfs_disabled", - "remarks": "rule_set_324" + "remarks": "rule_set_326" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure overlayfs kernel module is not available", - "remarks": "rule_set_324" + "remarks": "rule_set_326" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_squashfs_disabled", - "remarks": "rule_set_325" + "remarks": "rule_set_327" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Mounting of squashfs", - "remarks": "rule_set_325" + "remarks": "rule_set_327" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_squashfs_disabled", - "remarks": "rule_set_325" + "remarks": "rule_set_327" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Mounting of squashfs", - "remarks": "rule_set_325" + "remarks": "rule_set_327" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_udf_disabled", - "remarks": "rule_set_326" + "remarks": "rule_set_328" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Mounting of udf", - "remarks": "rule_set_326" + "remarks": "rule_set_328" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_udf_disabled", - "remarks": "rule_set_326" + "remarks": "rule_set_328" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Mounting of udf", - "remarks": "rule_set_326" + "remarks": "rule_set_328" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_home", - "remarks": "rule_set_327" + "remarks": "rule_set_329" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /home Located On Separate Partition", - "remarks": "rule_set_327" + "remarks": "rule_set_329" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_home", - "remarks": "rule_set_327" + "remarks": "rule_set_329" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /home Located On Separate Partition", - "remarks": "rule_set_327" + "remarks": "rule_set_329" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var", - "remarks": "rule_set_328" + "remarks": "rule_set_330" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var Located On Separate Partition", - "remarks": "rule_set_328" + "remarks": "rule_set_330" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var", - "remarks": "rule_set_328" + "remarks": "rule_set_330" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var Located On Separate Partition", - "remarks": "rule_set_328" + "remarks": "rule_set_330" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_tmp", - "remarks": "rule_set_329" + "remarks": "rule_set_331" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/tmp Located On Separate Partition", - "remarks": "rule_set_329" + "remarks": "rule_set_331" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_tmp", - "remarks": "rule_set_329" + "remarks": "rule_set_331" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/tmp Located On Separate Partition", - "remarks": "rule_set_329" + "remarks": "rule_set_331" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log", - "remarks": "rule_set_330" + "remarks": "rule_set_332" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log Located On Separate Partition", - "remarks": "rule_set_330" + "remarks": "rule_set_332" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log", - "remarks": "rule_set_330" + "remarks": "rule_set_332" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log Located On Separate Partition", - "remarks": "rule_set_330" + "remarks": "rule_set_332" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log_audit", - "remarks": "rule_set_331" + "remarks": "rule_set_333" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log/audit Located On Separate Partition", - "remarks": "rule_set_331" + "remarks": "rule_set_333" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log_audit", - "remarks": "rule_set_331" + "remarks": "rule_set_333" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log/audit Located On Separate Partition", - "remarks": "rule_set_331" + "remarks": "rule_set_333" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_weak_deps", - "remarks": "rule_set_332" + "remarks": "rule_set_334" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Installation of Weak Dependencies in DNF", - "remarks": "rule_set_332" + "remarks": "rule_set_334" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_weak_deps", - "remarks": "rule_set_332" + "remarks": "rule_set_334" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Installation of Weak Dependencies in DNF", - "remarks": "rule_set_332" + "remarks": "rule_set_334" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_state", - "remarks": "rule_set_333" + "remarks": "rule_set_335" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SELinux State is Enforcing", - "remarks": "rule_set_333" + "remarks": "rule_set_335" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_state", - "remarks": "rule_set_333" + "remarks": "rule_set_335" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SELinux State is Enforcing", - "remarks": "rule_set_333" + "remarks": "rule_set_335" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_symlinks", - "remarks": "rule_set_334" + "remarks": "rule_set_336" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", - "remarks": "rule_set_334" + "remarks": "rule_set_336" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_symlinks", - "remarks": "rule_set_334" + "remarks": "rule_set_336" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", - "remarks": "rule_set_334" + "remarks": "rule_set_336" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "xwayland_disabled", - "remarks": "rule_set_335" + "remarks": "rule_set_337" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable XWayland", - "remarks": "rule_set_335" + "remarks": "rule_set_337" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "xwayland_disabled", - "remarks": "rule_set_335" + "remarks": "rule_set_337" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable XWayland", - "remarks": "rule_set_335" + "remarks": "rule_set_337" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_cockpit_disabled", - "remarks": "rule_set_336" + "remarks": "rule_set_338" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Cockpit Management Server", - "remarks": "rule_set_336" + "remarks": "rule_set_338" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_cockpit_disabled", - "remarks": "rule_set_336" + "remarks": "rule_set_338" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Cockpit Management Server", - "remarks": "rule_set_336" + "remarks": "rule_set_338" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_gdm_removed", - "remarks": "rule_set_337" + "remarks": "rule_set_339" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove the GDM Package Group", - "remarks": "rule_set_337" + "remarks": "rule_set_339" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_gdm_removed", - "remarks": "rule_set_337" + "remarks": "rule_set_339" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove the GDM Package Group", - "remarks": "rule_set_337" + "remarks": "rule_set_339" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_xorg-x11-server-Xwayland_removed", - "remarks": "rule_set_338" + "remarks": "rule_set_340" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove the X Windows Xwayland Package", - "remarks": "rule_set_338" + "remarks": "rule_set_340" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_xorg-x11-server-Xwayland_removed", - "remarks": "rule_set_338" + "remarks": "rule_set_340" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove the X Windows Xwayland Package", - "remarks": "rule_set_338" + "remarks": "rule_set_340" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_openldap-clients_removed", - "remarks": "rule_set_339" + "remarks": "rule_set_341" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure LDAP client is not installed", - "remarks": "rule_set_339" + "remarks": "rule_set_341" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_openldap-clients_removed", - "remarks": "rule_set_339" + "remarks": "rule_set_341" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure LDAP client is not installed", - "remarks": "rule_set_339" + "remarks": "rule_set_341" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_ip_forward", - "remarks": "rule_set_340" + "remarks": "rule_set_342" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IP Forwarding on IPv4 Interfaces", - "remarks": "rule_set_340" + "remarks": "rule_set_342" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_ip_forward", - "remarks": "rule_set_340" + "remarks": "rule_set_342" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IP Forwarding on IPv4 Interfaces", - "remarks": "rule_set_340" + "remarks": "rule_set_342" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_forwarding", - "remarks": "rule_set_341" + "remarks": "rule_set_343" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Forwarding", - "remarks": "rule_set_341" + "remarks": "rule_set_343" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_forwarding", - "remarks": "rule_set_341" + "remarks": "rule_set_343" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Forwarding", - "remarks": "rule_set_341" + "remarks": "rule_set_343" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_gssapi_auth", - "remarks": "rule_set_342" + "remarks": "rule_set_344" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GSSAPI Authentication", - "remarks": "rule_set_342" + "remarks": "rule_set_344" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_gssapi_auth", - "remarks": "rule_set_342" + "remarks": "rule_set_344" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GSSAPI Authentication", - "remarks": "rule_set_342" + "remarks": "rule_set_344" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_nopasswd", - "remarks": "rule_set_343" + "remarks": "rule_set_345" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD", - "remarks": "rule_set_343" + "remarks": "rule_set_345" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_nopasswd", - "remarks": "rule_set_343" + "remarks": "rule_set_345" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD", - "remarks": "rule_set_343" + "remarks": "rule_set_345" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny_root", - "remarks": "rule_set_344" + "remarks": "rule_set_346" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the root Account for Failed Password Attempts", - "remarks": "rule_set_344" + "remarks": "rule_set_346" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny_root", - "remarks": "rule_set_344" + "remarks": "rule_set_346" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the root Account for Failed Password Attempts", - "remarks": "rule_set_344" + "remarks": "rule_set_346" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_minimum_age_login_defs", - "remarks": "rule_set_345" + "remarks": "rule_set_347" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Minimum Age", - "remarks": "rule_set_345" + "remarks": "rule_set_347" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_minimum_age_login_defs", - "remarks": "rule_set_345" + "remarks": "rule_set_347" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Minimum Age", - "remarks": "rule_set_345" + "remarks": "rule_set_347" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_min_life_existing", - "remarks": "rule_set_346" + "remarks": "rule_set_348" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Minimum Age", - "remarks": "rule_set_346" + "remarks": "rule_set_348" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_min_life_existing", - "remarks": "rule_set_346" + "remarks": "rule_set_348" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Minimum Age", - "remarks": "rule_set_346" + "remarks": "rule_set_348" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_nologin_in_shells", - "remarks": "rule_set_347" + "remarks": "rule_set_349" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure nologin Shell is Not Listed in /etc/shells", - "remarks": "rule_set_347" + "remarks": "rule_set_349" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_nologin_in_shells", - "remarks": "rule_set_347" + "remarks": "rule_set_349" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure nologin Shell is Not Listed in /etc/shells", - "remarks": "rule_set_347" + "remarks": "rule_set_349" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit_installed", - "remarks": "rule_set_348" + "remarks": "rule_set_350" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit Subsystem is Installed", - "remarks": "rule_set_348" + "remarks": "rule_set_350" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit_installed", - "remarks": "rule_set_348" + "remarks": "rule_set_350" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit Subsystem is Installed", - "remarks": "rule_set_348" + "remarks": "rule_set_350" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit-libs_installed", - "remarks": "rule_set_349" + "remarks": "rule_set_351" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit-libs package as a part of audit Subsystem is Installed", - "remarks": "rule_set_349" + "remarks": "rule_set_351" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit-libs_installed", - "remarks": "rule_set_349" + "remarks": "rule_set_351" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit-libs package as a part of audit Subsystem is Installed", - "remarks": "rule_set_349" + "remarks": "rule_set_351" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_argument", - "remarks": "rule_set_350" + "remarks": "rule_set_352" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Auditing for Processes Which Start Prior to the Audit Daemon", - "remarks": "rule_set_350" + "remarks": "rule_set_352" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_argument", - "remarks": "rule_set_350" + "remarks": "rule_set_352" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Auditing for Processes Which Start Prior to the Audit Daemon", - "remarks": "rule_set_350" + "remarks": "rule_set_352" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_backlog_limit_argument", - "remarks": "rule_set_351" + "remarks": "rule_set_353" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Extend Audit Backlog Limit for the Audit Daemon", - "remarks": "rule_set_351" + "remarks": "rule_set_353" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_backlog_limit_argument", - "remarks": "rule_set_351" + "remarks": "rule_set_353" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Extend Audit Backlog Limit for the Audit Daemon", - "remarks": "rule_set_351" + "remarks": "rule_set_353" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_auditd_enabled", - "remarks": "rule_set_352" + "remarks": "rule_set_354" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable auditd Service", - "remarks": "rule_set_352" + "remarks": "rule_set_354" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_auditd_enabled", - "remarks": "rule_set_352" + "remarks": "rule_set_354" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable auditd Service", - "remarks": "rule_set_352" + "remarks": "rule_set_354" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_max_log_file", - "remarks": "rule_set_353" + "remarks": "rule_set_355" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Max Log File Size", - "remarks": "rule_set_353" + "remarks": "rule_set_355" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_max_log_file", - "remarks": "rule_set_353" + "remarks": "rule_set_355" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Max Log File Size", - "remarks": "rule_set_353" + "remarks": "rule_set_355" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_max_log_file_action", - "remarks": "rule_set_354" + "remarks": "rule_set_356" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd max_log_file_action Upon Reaching Maximum Log Size", - "remarks": "rule_set_354" + "remarks": "rule_set_356" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_max_log_file_action", - "remarks": "rule_set_354" + "remarks": "rule_set_356" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd max_log_file_action Upon Reaching Maximum Log Size", - "remarks": "rule_set_354" + "remarks": "rule_set_356" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_disk_error_action", - "remarks": "rule_set_355" + "remarks": "rule_set_357" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Disk Error Action on Disk Error", - "remarks": "rule_set_355" + "remarks": "rule_set_357" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_disk_error_action", - "remarks": "rule_set_355" + "remarks": "rule_set_357" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Disk Error Action on Disk Error", - "remarks": "rule_set_355" + "remarks": "rule_set_357" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_disk_full_action", - "remarks": "rule_set_356" + "remarks": "rule_set_358" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Disk Full Action when Disk Space Is Full", - "remarks": "rule_set_356" + "remarks": "rule_set_358" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_disk_full_action", - "remarks": "rule_set_356" + "remarks": "rule_set_358" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Disk Full Action when Disk Space Is Full", - "remarks": "rule_set_356" + "remarks": "rule_set_358" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_admin_space_left_action", - "remarks": "rule_set_357" + "remarks": "rule_set_359" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd admin_space_left Action on Low Disk Space", - "remarks": "rule_set_357" + "remarks": "rule_set_359" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_admin_space_left_action", - "remarks": "rule_set_357" + "remarks": "rule_set_359" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd admin_space_left Action on Low Disk Space", - "remarks": "rule_set_357" + "remarks": "rule_set_359" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_space_left_action", - "remarks": "rule_set_358" + "remarks": "rule_set_360" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd space_left Action on Low Disk Space", - "remarks": "rule_set_358" + "remarks": "rule_set_360" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_space_left_action", - "remarks": "rule_set_358" + "remarks": "rule_set_360" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd space_left Action on Low Disk Space", - "remarks": "rule_set_358" + "remarks": "rule_set_360" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_sysadmin_actions", - "remarks": "rule_set_359" + "remarks": "rule_set_361" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects System Administrator Actions", - "remarks": "rule_set_359" + "remarks": "rule_set_361" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_sysadmin_actions", - "remarks": "rule_set_359" + "remarks": "rule_set_361" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects System Administrator Actions", - "remarks": "rule_set_359" + "remarks": "rule_set_361" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_suid_auid_privilege_function", - "remarks": "rule_set_360" + "remarks": "rule_set_362" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events When Executables Are Run As Another User", - "remarks": "rule_set_360" + "remarks": "rule_set_362" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_suid_auid_privilege_function", - "remarks": "rule_set_360" + "remarks": "rule_set_362" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events When Executables Are Run As Another User", - "remarks": "rule_set_360" + "remarks": "rule_set_362" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_sudo_log_events", - "remarks": "rule_set_361" + "remarks": "rule_set_363" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to perform maintenance activities", - "remarks": "rule_set_361" + "remarks": "rule_set_363" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_sudo_log_events", - "remarks": "rule_set_361" + "remarks": "rule_set_363" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to perform maintenance activities", - "remarks": "rule_set_361" + "remarks": "rule_set_363" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_adjtimex", - "remarks": "rule_set_362" + "remarks": "rule_set_364" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through adjtimex", - "remarks": "rule_set_362" + "remarks": "rule_set_364" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_adjtimex", - "remarks": "rule_set_362" + "remarks": "rule_set_364" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through adjtimex", - "remarks": "rule_set_362" + "remarks": "rule_set_364" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_settimeofday", - "remarks": "rule_set_363" + "remarks": "rule_set_365" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through settimeofday", - "remarks": "rule_set_363" + "remarks": "rule_set_365" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_settimeofday", - "remarks": "rule_set_363" + "remarks": "rule_set_365" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through settimeofday", - "remarks": "rule_set_363" + "remarks": "rule_set_365" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_clock_settime", - "remarks": "rule_set_364" + "remarks": "rule_set_366" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through clock_settime", - "remarks": "rule_set_364" + "remarks": "rule_set_366" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_clock_settime", - "remarks": "rule_set_364" + "remarks": "rule_set_366" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through clock_settime", - "remarks": "rule_set_364" + "remarks": "rule_set_366" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_watch_localtime", - "remarks": "rule_set_365" + "remarks": "rule_set_367" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter the localtime File", - "remarks": "rule_set_365" + "remarks": "rule_set_367" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_watch_localtime", - "remarks": "rule_set_365" + "remarks": "rule_set_367" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter the localtime File", - "remarks": "rule_set_365" + "remarks": "rule_set_367" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_setdomainname", - "remarks": "rule_set_366" + "remarks": "rule_set_368" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - setdomainname", - "remarks": "rule_set_366" + "remarks": "rule_set_368" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_setdomainname", - "remarks": "rule_set_366" + "remarks": "rule_set_368" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - setdomainname", - "remarks": "rule_set_366" + "remarks": "rule_set_368" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_sethostname", - "remarks": "rule_set_367" + "remarks": "rule_set_369" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - sethostname", - "remarks": "rule_set_367" + "remarks": "rule_set_369" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_sethostname", - "remarks": "rule_set_367" + "remarks": "rule_set_369" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - sethostname", - "remarks": "rule_set_367" + "remarks": "rule_set_369" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_issue", - "remarks": "rule_set_368" + "remarks": "rule_set_370" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/issue", - "remarks": "rule_set_368" + "remarks": "rule_set_370" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_issue", - "remarks": "rule_set_368" + "remarks": "rule_set_370" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/issue", - "remarks": "rule_set_368" + "remarks": "rule_set_370" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_issue_net", - "remarks": "rule_set_369" + "remarks": "rule_set_371" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/issue.net", - "remarks": "rule_set_369" + "remarks": "rule_set_371" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_issue_net", - "remarks": "rule_set_369" + "remarks": "rule_set_371" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/issue.net", - "remarks": "rule_set_369" + "remarks": "rule_set_371" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_hosts", - "remarks": "rule_set_370" + "remarks": "rule_set_372" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/hosts", - "remarks": "rule_set_370" + "remarks": "rule_set_372" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_hosts", - "remarks": "rule_set_370" + "remarks": "rule_set_372" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/hosts", - "remarks": "rule_set_370" + "remarks": "rule_set_372" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_hostname_file", - "remarks": "rule_set_371" + "remarks": "rule_set_373" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/hostname", - "remarks": "rule_set_371" + "remarks": "rule_set_373" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_hostname_file", - "remarks": "rule_set_371" + "remarks": "rule_set_373" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/hostname", - "remarks": "rule_set_371" + "remarks": "rule_set_373" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_sysconfig_network", - "remarks": "rule_set_372" + "remarks": "rule_set_374" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/sysconfig/network", - "remarks": "rule_set_372" + "remarks": "rule_set_374" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_sysconfig_network", - "remarks": "rule_set_372" + "remarks": "rule_set_374" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/sysconfig/network", - "remarks": "rule_set_372" + "remarks": "rule_set_374" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_networkmanager_system_connections", - "remarks": "rule_set_373" + "remarks": "rule_set_375" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/system-connections/", - "remarks": "rule_set_373" + "remarks": "rule_set_375" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_networkmanager_system_connections", - "remarks": "rule_set_373" + "remarks": "rule_set_375" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/system-connections/", - "remarks": "rule_set_373" + "remarks": "rule_set_375" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_networkmanager", - "remarks": "rule_set_374" + "remarks": "rule_set_376" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/", - "remarks": "rule_set_374" + "remarks": "rule_set_376" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_networkmanager", - "remarks": "rule_set_374" + "remarks": "rule_set_376" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/", - "remarks": "rule_set_374" + "remarks": "rule_set_376" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands", - "remarks": "rule_set_375" + "remarks": "rule_set_377" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands", - "remarks": "rule_set_375" + "remarks": "rule_set_377" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands", - "remarks": "rule_set_375" + "remarks": "rule_set_377" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands", - "remarks": "rule_set_375" + "remarks": "rule_set_377" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_creat", - "remarks": "rule_set_376" + "remarks": "rule_set_378" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - creat", - "remarks": "rule_set_376" + "remarks": "rule_set_378" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_creat", - "remarks": "rule_set_376" + "remarks": "rule_set_378" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - creat", - "remarks": "rule_set_376" + "remarks": "rule_set_378" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_ftruncate", - "remarks": "rule_set_377" + "remarks": "rule_set_379" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - ftruncate", - "remarks": "rule_set_377" + "remarks": "rule_set_379" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_ftruncate", - "remarks": "rule_set_377" + "remarks": "rule_set_379" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - ftruncate", - "remarks": "rule_set_377" + "remarks": "rule_set_379" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_open", - "remarks": "rule_set_378" + "remarks": "rule_set_380" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - open", - "remarks": "rule_set_378" + "remarks": "rule_set_380" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_open", - "remarks": "rule_set_378" + "remarks": "rule_set_380" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - open", - "remarks": "rule_set_378" + "remarks": "rule_set_380" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_openat", - "remarks": "rule_set_379" + "remarks": "rule_set_381" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - openat", - "remarks": "rule_set_379" + "remarks": "rule_set_381" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_openat", - "remarks": "rule_set_379" + "remarks": "rule_set_381" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - openat", - "remarks": "rule_set_379" + "remarks": "rule_set_381" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_truncate", - "remarks": "rule_set_380" + "remarks": "rule_set_382" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - truncate", - "remarks": "rule_set_380" + "remarks": "rule_set_382" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_truncate", - "remarks": "rule_set_380" + "remarks": "rule_set_382" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - truncate", - "remarks": "rule_set_380" + "remarks": "rule_set_382" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_group", - "remarks": "rule_set_381" + "remarks": "rule_set_383" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/group", - "remarks": "rule_set_381" + "remarks": "rule_set_383" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_group", - "remarks": "rule_set_381" + "remarks": "rule_set_383" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/group", - "remarks": "rule_set_381" + "remarks": "rule_set_383" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_passwd", - "remarks": "rule_set_382" + "remarks": "rule_set_384" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/passwd", - "remarks": "rule_set_382" + "remarks": "rule_set_384" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_passwd", - "remarks": "rule_set_382" + "remarks": "rule_set_384" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/passwd", - "remarks": "rule_set_382" + "remarks": "rule_set_384" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_gshadow", - "remarks": "rule_set_383" + "remarks": "rule_set_385" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/gshadow", - "remarks": "rule_set_383" + "remarks": "rule_set_385" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_gshadow", - "remarks": "rule_set_383" + "remarks": "rule_set_385" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/gshadow", - "remarks": "rule_set_383" + "remarks": "rule_set_385" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_shadow", - "remarks": "rule_set_384" + "remarks": "rule_set_386" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/shadow", - "remarks": "rule_set_384" + "remarks": "rule_set_386" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_shadow", - "remarks": "rule_set_384" + "remarks": "rule_set_386" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/shadow", - "remarks": "rule_set_384" + "remarks": "rule_set_386" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_opasswd", - "remarks": "rule_set_385" + "remarks": "rule_set_387" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", - "remarks": "rule_set_385" + "remarks": "rule_set_387" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_opasswd", - "remarks": "rule_set_385" + "remarks": "rule_set_387" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", - "remarks": "rule_set_385" + "remarks": "rule_set_387" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_nsswitch_conf", - "remarks": "rule_set_386" + "remarks": "rule_set_388" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/nsswitch.conf", - "remarks": "rule_set_386" + "remarks": "rule_set_388" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_nsswitch_conf", - "remarks": "rule_set_386" + "remarks": "rule_set_388" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/nsswitch.conf", - "remarks": "rule_set_386" + "remarks": "rule_set_388" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_pam_conf", - "remarks": "rule_set_387" + "remarks": "rule_set_389" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/pam.conf", - "remarks": "rule_set_387" + "remarks": "rule_set_389" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_pam_conf", - "remarks": "rule_set_387" + "remarks": "rule_set_389" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/pam.conf", - "remarks": "rule_set_387" + "remarks": "rule_set_389" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_pamd", - "remarks": "rule_set_388" + "remarks": "rule_set_390" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/pam.d/", - "remarks": "rule_set_388" + "remarks": "rule_set_390" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_pamd", - "remarks": "rule_set_388" + "remarks": "rule_set_390" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/pam.d/", - "remarks": "rule_set_388" + "remarks": "rule_set_390" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chmod", - "remarks": "rule_set_389" + "remarks": "rule_set_391" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", - "remarks": "rule_set_389" + "remarks": "rule_set_391" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chmod", - "remarks": "rule_set_389" + "remarks": "rule_set_391" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", - "remarks": "rule_set_389" + "remarks": "rule_set_391" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmod", - "remarks": "rule_set_390" + "remarks": "rule_set_392" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmod", - "remarks": "rule_set_390" + "remarks": "rule_set_392" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmod", - "remarks": "rule_set_390" + "remarks": "rule_set_392" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmod", - "remarks": "rule_set_390" + "remarks": "rule_set_392" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat", - "remarks": "rule_set_391" + "remarks": "rule_set_393" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat", - "remarks": "rule_set_391" + "remarks": "rule_set_393" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat", - "remarks": "rule_set_391" + "remarks": "rule_set_393" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat", - "remarks": "rule_set_391" + "remarks": "rule_set_393" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat2", - "remarks": "rule_set_392" + "remarks": "rule_set_394" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat2", - "remarks": "rule_set_392" + "remarks": "rule_set_394" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat2", - "remarks": "rule_set_392" + "remarks": "rule_set_394" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat2", - "remarks": "rule_set_392" + "remarks": "rule_set_394" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chown", - "remarks": "rule_set_393" + "remarks": "rule_set_395" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chown", - "remarks": "rule_set_393" + "remarks": "rule_set_395" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chown", - "remarks": "rule_set_393" + "remarks": "rule_set_395" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chown", - "remarks": "rule_set_393" + "remarks": "rule_set_395" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchown", - "remarks": "rule_set_394" + "remarks": "rule_set_396" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchown", - "remarks": "rule_set_394" + "remarks": "rule_set_396" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchown", - "remarks": "rule_set_394" + "remarks": "rule_set_396" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchown", - "remarks": "rule_set_394" + "remarks": "rule_set_396" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchownat", - "remarks": "rule_set_395" + "remarks": "rule_set_397" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchownat", - "remarks": "rule_set_395" + "remarks": "rule_set_397" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchownat", - "remarks": "rule_set_395" + "remarks": "rule_set_397" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchownat", - "remarks": "rule_set_395" + "remarks": "rule_set_397" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lchown", - "remarks": "rule_set_396" + "remarks": "rule_set_398" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lchown", - "remarks": "rule_set_396" + "remarks": "rule_set_398" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lchown", - "remarks": "rule_set_396" + "remarks": "rule_set_398" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lchown", - "remarks": "rule_set_396" + "remarks": "rule_set_398" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fremovexattr", - "remarks": "rule_set_397" + "remarks": "rule_set_399" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fremovexattr", - "remarks": "rule_set_397" + "remarks": "rule_set_399" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fremovexattr", - "remarks": "rule_set_397" + "remarks": "rule_set_399" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fremovexattr", - "remarks": "rule_set_397" + "remarks": "rule_set_399" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fsetxattr", - "remarks": "rule_set_398" + "remarks": "rule_set_400" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fsetxattr", - "remarks": "rule_set_398" + "remarks": "rule_set_400" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fsetxattr", - "remarks": "rule_set_398" + "remarks": "rule_set_400" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fsetxattr", - "remarks": "rule_set_398" + "remarks": "rule_set_400" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lremovexattr", - "remarks": "rule_set_399" + "remarks": "rule_set_401" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lremovexattr", - "remarks": "rule_set_399" + "remarks": "rule_set_401" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lremovexattr", - "remarks": "rule_set_399" + "remarks": "rule_set_401" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lremovexattr", - "remarks": "rule_set_399" + "remarks": "rule_set_401" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lsetxattr", - "remarks": "rule_set_400" + "remarks": "rule_set_402" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lsetxattr", - "remarks": "rule_set_400" + "remarks": "rule_set_402" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lsetxattr", - "remarks": "rule_set_400" + "remarks": "rule_set_402" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lsetxattr", - "remarks": "rule_set_400" + "remarks": "rule_set_402" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_removexattr", - "remarks": "rule_set_401" + "remarks": "rule_set_403" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - removexattr", - "remarks": "rule_set_401" + "remarks": "rule_set_403" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_removexattr", - "remarks": "rule_set_401" + "remarks": "rule_set_403" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - removexattr", - "remarks": "rule_set_401" + "remarks": "rule_set_403" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_setxattr", - "remarks": "rule_set_402" + "remarks": "rule_set_404" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - setxattr", - "remarks": "rule_set_402" + "remarks": "rule_set_404" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_setxattr", - "remarks": "rule_set_402" + "remarks": "rule_set_404" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - setxattr", - "remarks": "rule_set_402" + "remarks": "rule_set_404" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_media_export", - "remarks": "rule_set_403" + "remarks": "rule_set_405" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Exporting to Media (successful)", - "remarks": "rule_set_403" + "remarks": "rule_set_405" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_media_export", - "remarks": "rule_set_403" + "remarks": "rule_set_405" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Exporting to Media (successful)", - "remarks": "rule_set_403" + "remarks": "rule_set_405" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_utmp", - "remarks": "rule_set_404" + "remarks": "rule_set_406" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information utmp", - "remarks": "rule_set_404" + "remarks": "rule_set_406" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_utmp", - "remarks": "rule_set_404" + "remarks": "rule_set_406" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information utmp", - "remarks": "rule_set_404" + "remarks": "rule_set_406" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_btmp", - "remarks": "rule_set_405" + "remarks": "rule_set_407" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information btmp", - "remarks": "rule_set_405" + "remarks": "rule_set_407" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_btmp", - "remarks": "rule_set_405" + "remarks": "rule_set_407" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information btmp", - "remarks": "rule_set_405" + "remarks": "rule_set_407" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_wtmp", - "remarks": "rule_set_406" + "remarks": "rule_set_408" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", - "remarks": "rule_set_406" + "remarks": "rule_set_408" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_wtmp", - "remarks": "rule_set_406" + "remarks": "rule_set_408" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", - "remarks": "rule_set_406" + "remarks": "rule_set_408" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_faillock", - "remarks": "rule_set_407" + "remarks": "rule_set_409" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - faillock", - "remarks": "rule_set_407" + "remarks": "rule_set_409" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_faillock", - "remarks": "rule_set_407" + "remarks": "rule_set_409" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - faillock", - "remarks": "rule_set_407" + "remarks": "rule_set_409" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_lastlog", - "remarks": "rule_set_408" + "remarks": "rule_set_410" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - lastlog", - "remarks": "rule_set_408" + "remarks": "rule_set_410" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_lastlog", - "remarks": "rule_set_408" + "remarks": "rule_set_410" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - lastlog", - "remarks": "rule_set_408" + "remarks": "rule_set_410" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlink", - "remarks": "rule_set_409" + "remarks": "rule_set_411" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlink", - "remarks": "rule_set_409" + "remarks": "rule_set_411" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlink", - "remarks": "rule_set_409" + "remarks": "rule_set_411" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlink", - "remarks": "rule_set_409" + "remarks": "rule_set_411" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlinkat", - "remarks": "rule_set_410" + "remarks": "rule_set_412" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlinkat", - "remarks": "rule_set_410" + "remarks": "rule_set_412" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlinkat", - "remarks": "rule_set_410" + "remarks": "rule_set_412" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlinkat", - "remarks": "rule_set_410" + "remarks": "rule_set_412" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rename", - "remarks": "rule_set_411" + "remarks": "rule_set_413" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rename", - "remarks": "rule_set_411" + "remarks": "rule_set_413" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rename", - "remarks": "rule_set_411" + "remarks": "rule_set_413" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rename", - "remarks": "rule_set_411" + "remarks": "rule_set_413" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat", - "remarks": "rule_set_412" + "remarks": "rule_set_414" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat", - "remarks": "rule_set_412" + "remarks": "rule_set_414" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat", - "remarks": "rule_set_412" + "remarks": "rule_set_414" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat", - "remarks": "rule_set_412" + "remarks": "rule_set_414" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat2", - "remarks": "rule_set_413" + "remarks": "rule_set_415" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat2", - "remarks": "rule_set_413" + "remarks": "rule_set_415" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat2", - "remarks": "rule_set_413" + "remarks": "rule_set_415" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat2", - "remarks": "rule_set_413" + "remarks": "rule_set_415" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_etc_selinux", - "remarks": "rule_set_414" + "remarks": "rule_set_416" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls (/etc/selinux)", - "remarks": "rule_set_414" + "remarks": "rule_set_416" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_etc_selinux", - "remarks": "rule_set_414" + "remarks": "rule_set_416" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls (/etc/selinux)", - "remarks": "rule_set_414" + "remarks": "rule_set_416" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_usr_share", - "remarks": "rule_set_415" + "remarks": "rule_set_417" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls in usr/share", - "remarks": "rule_set_415" + "remarks": "rule_set_417" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_usr_share", - "remarks": "rule_set_415" + "remarks": "rule_set_417" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls in usr/share", - "remarks": "rule_set_415" + "remarks": "rule_set_417" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chcon", - "remarks": "rule_set_416" + "remarks": "rule_set_418" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chcon", - "remarks": "rule_set_416" + "remarks": "rule_set_418" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chcon", - "remarks": "rule_set_416" + "remarks": "rule_set_418" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chcon", - "remarks": "rule_set_416" + "remarks": "rule_set_418" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_setfacl", - "remarks": "rule_set_417" + "remarks": "rule_set_419" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run setfacl", - "remarks": "rule_set_417" + "remarks": "rule_set_419" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_setfacl", - "remarks": "rule_set_417" + "remarks": "rule_set_419" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run setfacl", - "remarks": "rule_set_417" + "remarks": "rule_set_419" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chacl", - "remarks": "rule_set_418" + "remarks": "rule_set_420" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chacl", - "remarks": "rule_set_418" + "remarks": "rule_set_420" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chacl", - "remarks": "rule_set_418" + "remarks": "rule_set_420" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chacl", - "remarks": "rule_set_418" + "remarks": "rule_set_420" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_usermod", - "remarks": "rule_set_419" + "remarks": "rule_set_421" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - usermod", - "remarks": "rule_set_419" + "remarks": "rule_set_421" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_usermod", - "remarks": "rule_set_419" + "remarks": "rule_set_421" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - usermod", - "remarks": "rule_set_419" + "remarks": "rule_set_421" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_kmod", - "remarks": "rule_set_420" + "remarks": "rule_set_422" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - kmod", - "remarks": "rule_set_420" + "remarks": "rule_set_422" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_kmod", - "remarks": "rule_set_420" + "remarks": "rule_set_422" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - kmod", - "remarks": "rule_set_420" + "remarks": "rule_set_422" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_init", - "remarks": "rule_set_421" + "remarks": "rule_set_423" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading - init_module", - "remarks": "rule_set_421" + "remarks": "rule_set_423" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_init", - "remarks": "rule_set_421" + "remarks": "rule_set_423" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading - init_module", - "remarks": "rule_set_421" + "remarks": "rule_set_423" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_finit", - "remarks": "rule_set_422" + "remarks": "rule_set_424" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - finit_module", - "remarks": "rule_set_422" + "remarks": "rule_set_424" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_finit", - "remarks": "rule_set_422" + "remarks": "rule_set_424" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - finit_module", - "remarks": "rule_set_422" + "remarks": "rule_set_424" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_delete", - "remarks": "rule_set_423" + "remarks": "rule_set_425" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Unloading - delete_module", - "remarks": "rule_set_423" + "remarks": "rule_set_425" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_delete", - "remarks": "rule_set_423" + "remarks": "rule_set_425" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Unloading - delete_module", - "remarks": "rule_set_423" + "remarks": "rule_set_425" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_query", - "remarks": "rule_set_424" + "remarks": "rule_set_426" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - query_module", - "remarks": "rule_set_424" + "remarks": "rule_set_426" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_query", - "remarks": "rule_set_424" + "remarks": "rule_set_426" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - query_module", - "remarks": "rule_set_424" + "remarks": "rule_set_426" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_continue_loading", - "remarks": "rule_set_425" + "remarks": "rule_set_427" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Audit Configuration is Loaded Regardless of Errors", - "remarks": "rule_set_425" + "remarks": "rule_set_427" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_continue_loading", - "remarks": "rule_set_425" + "remarks": "rule_set_427" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Audit Configuration is Loaded Regardless of Errors", - "remarks": "rule_set_425" + "remarks": "rule_set_427" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_immutable", - "remarks": "rule_set_426" + "remarks": "rule_set_428" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Make the auditd Configuration Immutable", - "remarks": "rule_set_426" + "remarks": "rule_set_428" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_immutable", - "remarks": "rule_set_426" + "remarks": "rule_set_428" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Make the auditd Configuration Immutable", - "remarks": "rule_set_426" + "remarks": "rule_set_428" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_var_log_audit", - "remarks": "rule_set_427" + "remarks": "rule_set_429" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0750 or Less Permissive", - "remarks": "rule_set_427" + "remarks": "rule_set_429" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_var_log_audit", - "remarks": "rule_set_427" + "remarks": "rule_set_429" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0750 or Less Permissive", - "remarks": "rule_set_427" + "remarks": "rule_set_429" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_var_log_audit", - "remarks": "rule_set_428" + "remarks": "rule_set_430" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0640 or Less Permissive", - "remarks": "rule_set_428" + "remarks": "rule_set_430" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_var_log_audit", - "remarks": "rule_set_428" + "remarks": "rule_set_430" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0640 or Less Permissive", - "remarks": "rule_set_428" + "remarks": "rule_set_430" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_var_log_audit_stig", - "remarks": "rule_set_429" + "remarks": "rule_set_431" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Owned By Root", - "remarks": "rule_set_429" + "remarks": "rule_set_431" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_var_log_audit_stig", - "remarks": "rule_set_429" + "remarks": "rule_set_431" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Owned By Root", - "remarks": "rule_set_429" + "remarks": "rule_set_431" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_group_ownership_var_log_audit", - "remarks": "rule_set_430" + "remarks": "rule_set_432" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Group Owned By Root", - "remarks": "rule_set_430" + "remarks": "rule_set_432" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_group_ownership_var_log_audit", - "remarks": "rule_set_430" + "remarks": "rule_set_432" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Group Owned By Root", - "remarks": "rule_set_430" + "remarks": "rule_set_432" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_audit_configuration", - "remarks": "rule_set_431" + "remarks": "rule_set_433" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Permissions are 640 or More Restrictive", - "remarks": "rule_set_431" + "remarks": "rule_set_433" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_audit_configuration", - "remarks": "rule_set_431" + "remarks": "rule_set_433" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Permissions are 640 or More Restrictive", - "remarks": "rule_set_431" + "remarks": "rule_set_433" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_audit_configuration", - "remarks": "rule_set_432" + "remarks": "rule_set_434" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Must Be Owned By Root", - "remarks": "rule_set_432" + "remarks": "rule_set_434" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_audit_configuration", - "remarks": "rule_set_432" + "remarks": "rule_set_434" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Must Be Owned By Root", - "remarks": "rule_set_432" + "remarks": "rule_set_434" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_audit_configuration", - "remarks": "rule_set_433" + "remarks": "rule_set_435" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Must Be Owned By Group root", - "remarks": "rule_set_433" + "remarks": "rule_set_435" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_audit_configuration", - "remarks": "rule_set_433" + "remarks": "rule_set_435" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Must Be Owned By Group root", - "remarks": "rule_set_433" + "remarks": "rule_set_435" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_audit_binaries", - "remarks": "rule_set_434" + "remarks": "rule_set_436" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools Have Mode 0755 or less", - "remarks": "rule_set_434" + "remarks": "rule_set_436" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_audit_binaries", - "remarks": "rule_set_434" + "remarks": "rule_set_436" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools Have Mode 0755 or less", - "remarks": "rule_set_434" + "remarks": "rule_set_436" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_audit_binaries", - "remarks": "rule_set_435" + "remarks": "rule_set_437" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools are owned by root", - "remarks": "rule_set_435" + "remarks": "rule_set_437" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_audit_binaries", - "remarks": "rule_set_435" + "remarks": "rule_set_437" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools are owned by root", - "remarks": "rule_set_435" + "remarks": "rule_set_437" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_audit_binaries", - "remarks": "rule_set_436" + "remarks": "rule_set_438" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools are owned by group root", - "remarks": "rule_set_436" + "remarks": "rule_set_438" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_audit_binaries", - "remarks": "rule_set_436" + "remarks": "rule_set_438" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools are owned by group root", - "remarks": "rule_set_436" + "remarks": "rule_set_438" } ], "control-implementations": [ { - "uuid": "97051fd1-971d-4471-aedb-785dca3fec18", + "uuid": "7775bf24-0b9a-45b0-ab98-c71b6b694543", "source": "trestle://profiles/rhel10-cis_rhel10-l2_server/profile.json", "description": "Control implementation for cis", "props": [ @@ -25185,7 +25266,7 @@ ], "implemented-requirements": [ { - "uuid": "10aef46e-ae50-4f28-aa24-91dc13e883ba", + "uuid": "51f40174-4f7d-4332-87fd-151d378c9481", "control-id": "cis_rhel10_1-1.1.6", "description": "No notes for control-id 1.1.1.6.", "props": [ @@ -25202,7 +25283,7 @@ ] }, { - "uuid": "54de2065-325c-46e0-90a3-f84d534a214d", + "uuid": "36493181-3457-467a-a606-cbd06c4e99d1", "control-id": "cis_rhel10_1-1.1.7", "description": "No notes for control-id 1.1.1.7.", "props": [ @@ -25219,7 +25300,7 @@ ] }, { - "uuid": "5a492a7e-e566-4a48-920e-6996a193218c", + "uuid": "0a211ad4-5ab7-49a3-b9e3-2be9f2c84898", "control-id": "cis_rhel10_1-1.1.8", "description": "No notes for control-id 1.1.1.8.", "props": [ @@ -25236,7 +25317,7 @@ ] }, { - "uuid": "fa045f47-6005-41b4-a5a7-3aa4695f0da7", + "uuid": "f97e5326-ffc8-4cf3-a3ec-5d7492c49db6", "control-id": "cis_rhel10_1-1.2.3.1", "description": "No notes for control-id 1.1.2.3.1.", "props": [ @@ -25253,7 +25334,7 @@ ] }, { - "uuid": "8e62d389-dbbd-435d-8c63-0b138d583452", + "uuid": "632c4123-3743-4199-b9da-99bf0f7d0d69", "control-id": "cis_rhel10_1-1.2.4.1", "description": "No notes for control-id 1.1.2.4.1.", "props": [ @@ -25270,7 +25351,7 @@ ] }, { - "uuid": "1eff69e7-bf23-419f-8085-c388a77a66aa", + "uuid": "f6df4a66-6b58-4fd4-95fa-f21a7f7d4b22", "control-id": "cis_rhel10_1-1.2.5.1", "description": "No notes for control-id 1.1.2.5.1.", "props": [ @@ -25287,7 +25368,7 @@ ] }, { - "uuid": "ac7fd204-41f8-4aff-9968-ef93dbabd13c", + "uuid": "bcbd5d5a-a666-4999-8104-7aa0814e7461", "control-id": "cis_rhel10_1-1.2.6.1", "description": "No notes for control-id 1.1.2.6.1.", "props": [ @@ -25304,7 +25385,7 @@ ] }, { - "uuid": "1f5099f6-62dc-45a4-a7cd-c4c6dd22e212", + "uuid": "2f70e406-7310-40da-a5ea-26bbe9f88188", "control-id": "cis_rhel10_1-1.2.7.1", "description": "No notes for control-id 1.1.2.7.1.", "props": [ @@ -25321,7 +25402,7 @@ ] }, { - "uuid": "59f8349c-6ccc-49fd-86a5-d9d3dbd9a01d", + "uuid": "b0da200c-57e4-41a6-a88e-61b96a7acaf8", "control-id": "cis_rhel10_1-2.1.3", "description": "The description for control-id cis_rhel10_1-2.1.3.", "props": [ @@ -25334,7 +25415,7 @@ ] }, { - "uuid": "25eec27e-5ad3-41b2-97bb-8ad1375841ea", + "uuid": "a168a144-9fa3-407a-8480-3e29031343c4", "control-id": "cis_rhel10_1-2.1.5", "description": "No notes for control-id 1.2.1.5.", "props": [ @@ -25351,7 +25432,7 @@ ] }, { - "uuid": "a60748b9-a0f9-4f7a-a757-e3a529cca049", + "uuid": "23bca976-42a2-48af-85e4-9bb5d952d516", "control-id": "cis_rhel10_1-3.1.5", "description": "No notes for control-id 1.3.1.5.", "props": [ @@ -25368,7 +25449,7 @@ ] }, { - "uuid": "3bb8175d-e29e-4794-953b-6cb8b3061e7d", + "uuid": "16a1a92e-4572-48f9-8d10-f78065735a7e", "control-id": "cis_rhel10_1-3.1.6", "description": "The description for control-id cis_rhel10_1-3.1.6.", "props": [ @@ -25381,7 +25462,7 @@ ] }, { - "uuid": "f9c66471-9524-48bc-9d97-81eee2c7b61f", + "uuid": "15ff9d5e-7020-4802-828e-bc44de189af2", "control-id": "cis_rhel10_1-5.3", "description": "No notes for control-id 1.5.3.", "props": [ @@ -25398,7 +25479,7 @@ ] }, { - "uuid": "f8b46712-78b3-4688-9554-343af9f03b9a", + "uuid": "83fcc49a-dfde-402a-a29d-d0312f920d97", "control-id": "cis_rhel10_1-8.6", "description": "No notes for control-id 1.8.6.", "props": [ @@ -25415,7 +25496,7 @@ ] }, { - "uuid": "4d500c23-d9c5-43d2-8c39-bbdf9076cdca", + "uuid": "26a6252e-7c48-4ef5-b77e-117d8d4157ca", "control-id": "cis_rhel10_2-1.3", "description": "No notes for control-id 2.1.3.", "props": [ @@ -25432,7 +25513,7 @@ ] }, { - "uuid": "efac2534-99b9-4361-9d01-e66c77ca8b71", + "uuid": "55da12ad-0623-46cb-82b3-90342e689770", "control-id": "cis_rhel10_2-1.19", "description": "No notes for control-id 2.1.19.", "props": [ @@ -25449,7 +25530,7 @@ ] }, { - "uuid": "5922287c-264c-4a28-bf84-cc8475fd3526", + "uuid": "290f78c1-5e19-4496-af5d-d3e58df83f97", "control-id": "cis_rhel10_2-1.20", "description": "No notes for control-id 2.1.20.", "props": [ @@ -25466,7 +25547,7 @@ ] }, { - "uuid": "b5575d9b-4cd0-4c69-8eaf-df0cdfd9b494", + "uuid": "2e5dda27-4ac6-40fb-90ef-38df474ef186", "control-id": "cis_rhel10_2-2.2", "description": "No notes for control-id 2.2.2.", "props": [ @@ -25483,7 +25564,7 @@ ] }, { - "uuid": "93782e2a-0d72-412a-927c-5092d5781d9e", + "uuid": "a4696476-1842-43ee-bab5-63b71f2dd3cb", "control-id": "cis_rhel10_3-3.1.1", "description": "No notes for control-id 3.3.1.1.", "props": [ @@ -25500,7 +25581,7 @@ ] }, { - "uuid": "c8bb4aa1-8d00-4c1d-b464-5f93471d2b87", + "uuid": "ab940c5f-08f8-4986-90e0-e28dd639cd97", "control-id": "cis_rhel10_5-1.8", "description": "No notes for control-id 5.1.8.", "props": [ @@ -25517,7 +25598,7 @@ ] }, { - "uuid": "d8a4712c-4359-4545-93f9-436e4f63f7cb", + "uuid": "ad42af86-cefa-4b2a-84ef-23942c3e5e2b", "control-id": "cis_rhel10_5-1.9", "description": "No notes for control-id 5.1.9.", "props": [ @@ -25534,7 +25615,7 @@ ] }, { - "uuid": "460f4ba3-24a0-4abd-860d-6590752bb22b", + "uuid": "4fee4f1d-877d-4c8d-95be-621e300c0999", "control-id": "cis_rhel10_5-2.4", "description": "No notes for control-id 5.2.4.", "props": [ @@ -25551,7 +25632,7 @@ ] }, { - "uuid": "d2802b44-36ad-468d-b91b-a603be386ef9", + "uuid": "4992f003-7350-4faa-85c7-c4816a002dfb", "control-id": "cis_rhel10_5-3.2.1.3", "description": "No notes for control-id 5.3.2.1.3.", "props": [ @@ -25568,7 +25649,7 @@ ] }, { - "uuid": "a786ec18-54f1-490b-a19e-b3a42e89c379", + "uuid": "bbe9fe70-077a-40ff-a6ab-c00a3f9f20e5", "control-id": "cis_rhel10_5-4.1.2", "description": "No notes for control-id 5.4.1.2.", "props": [ @@ -25590,7 +25671,7 @@ ] }, { - "uuid": "d32a3d59-a6d9-4e91-bf18-4617e2a4d53a", + "uuid": "3be4ed5c-7aa9-4cd5-afdb-1ae010608895", "control-id": "cis_rhel10_5-4.3.1", "description": "No notes for control-id 5.4.3.1.", "props": [ @@ -25607,7 +25688,7 @@ ] }, { - "uuid": "6a79ff9d-6b49-4f7e-8b01-7ca3ed573166", + "uuid": "9121c560-bea3-4dcf-9813-6df02f8f2938", "control-id": "cis_rhel10_6-3.1.1", "description": "No notes for control-id 6.3.1.1.", "props": [ @@ -25629,7 +25710,7 @@ ] }, { - "uuid": "48be2c9d-1ddc-4301-bb11-5cdccf856b5f", + "uuid": "d71e478f-82d4-45d6-88d9-e073141b504d", "control-id": "cis_rhel10_6-3.1.2", "description": "No notes for control-id 6.3.1.2.", "props": [ @@ -25646,7 +25727,7 @@ ] }, { - "uuid": "2764e2cc-6ab1-4c80-aaae-8f8b3edd2dea", + "uuid": "8a4adf86-3f3d-4a7b-aa0a-513826d792ca", "control-id": "cis_rhel10_6-3.1.3", "description": "No notes for control-id 6.3.1.3.", "props": [ @@ -25663,7 +25744,7 @@ ] }, { - "uuid": "5bc3580b-34f3-40a4-bc90-0b6c7a2fc031", + "uuid": "da4e1a36-721d-4c12-94dd-f04dc9507bd6", "control-id": "cis_rhel10_6-3.1.4", "description": "No notes for control-id 6.3.1.4.", "props": [ @@ -25680,7 +25761,7 @@ ] }, { - "uuid": "4dc6a099-93ff-4a56-97f9-26269d663a43", + "uuid": "140afe82-170a-4094-9308-478c0a3ce295", "control-id": "cis_rhel10_6-3.2.1", "description": "No notes for control-id 6.3.2.1.", "props": [ @@ -25697,7 +25778,7 @@ ] }, { - "uuid": "9d96b7a8-120f-460d-957b-59e34c17911d", + "uuid": "156bbecd-8de7-49c0-9881-8ac656dafbc2", "control-id": "cis_rhel10_6-3.2.2", "description": "No notes for control-id 6.3.2.2.", "props": [ @@ -25714,7 +25795,7 @@ ] }, { - "uuid": "f54b1e00-c1eb-425c-b03c-3edae9e78100", + "uuid": "96cd26cb-ca71-4368-a640-aec712ae18ee", "control-id": "cis_rhel10_6-3.2.3", "description": "No notes for control-id 6.3.2.3.", "props": [ @@ -25736,7 +25817,7 @@ ] }, { - "uuid": "130a3ccb-6480-41f7-a77d-d24916048c3f", + "uuid": "2a363e07-7ede-4877-8e0e-1340528f70ee", "control-id": "cis_rhel10_6-3.2.4", "description": "No notes for control-id 6.3.2.4.", "props": [ @@ -25758,7 +25839,7 @@ ] }, { - "uuid": "44d67536-7a89-4dbf-89b8-9edeb99e50e5", + "uuid": "70c2e36c-d053-48be-b739-07a8e1043b5a", "control-id": "cis_rhel10_6-3.3.1", "description": "No notes for control-id 6.3.3.1.", "props": [ @@ -25775,7 +25856,7 @@ ] }, { - "uuid": "6d8e506e-a22a-47bd-86f1-049bae22a790", + "uuid": "dfda5cfa-ab74-495d-9893-1b56346f635c", "control-id": "cis_rhel10_6-3.3.2", "description": "No notes for control-id 6.3.3.2.", "props": [ @@ -25792,7 +25873,7 @@ ] }, { - "uuid": "b6f086bc-9d62-47c3-8106-b5afccc5a5f0", + "uuid": "369af7a5-f624-4682-882b-eabf1d27a1fb", "control-id": "cis_rhel10_6-3.3.3", "description": "No notes for control-id 6.3.3.3.", "props": [ @@ -25809,7 +25890,7 @@ ] }, { - "uuid": "32b2711b-de15-480d-8beb-b9c6ebb45daa", + "uuid": "8887056b-559e-4b38-8dc6-7a40352dda96", "control-id": "cis_rhel10_6-3.3.4", "description": "No notes for control-id 6.3.3.4.", "props": [ @@ -25841,7 +25922,7 @@ ] }, { - "uuid": "b3d079b3-5d19-4977-abeb-63bcded3fa4e", + "uuid": "2822747c-837c-40d4-a131-8e9ec15d9b7c", "control-id": "cis_rhel10_6-3.3.5", "description": "No notes for control-id 6.3.3.5.", "props": [ @@ -25863,7 +25944,7 @@ ] }, { - "uuid": "39ae3826-0c62-4a4f-8b10-0c68fd5a8549", + "uuid": "7a064eaa-4e0a-4052-b12b-9afba785f655", "control-id": "cis_rhel10_6-3.3.6", "description": "No notes for control-id 6.3.3.6.", "props": [ @@ -25885,7 +25966,7 @@ ] }, { - "uuid": "13c84c3d-4715-43aa-90bc-9bd681fae1f8", + "uuid": "3f6b4e3f-3268-4eb3-978e-bd5b9dca4567", "control-id": "cis_rhel10_6-3.3.7", "description": "No notes for control-id 6.3.3.7.", "props": [ @@ -25907,7 +25988,7 @@ ] }, { - "uuid": "7024583d-1fac-4ccb-bd45-f4d092d9191c", + "uuid": "24394f19-6a0e-4efe-a0fb-c3ef922df2f2", "control-id": "cis_rhel10_6-3.3.8", "description": "No notes for control-id 6.3.3.8.", "props": [ @@ -25929,7 +26010,7 @@ ] }, { - "uuid": "7d49de91-f65e-4999-947c-a6db1276ed38", + "uuid": "c7e91010-a052-465b-9ab9-291befd5bff8", "control-id": "cis_rhel10_6-3.3.9", "description": "No notes for control-id 6.3.3.9.", "props": [ @@ -25946,7 +26027,7 @@ ] }, { - "uuid": "ca2e0aad-a2aa-4434-9e41-4660e2103bcb", + "uuid": "711a8df4-998f-4652-8bc5-1b520fbba82e", "control-id": "cis_rhel10_6-3.3.10", "description": "No notes for control-id 6.3.3.10.", "props": [ @@ -25963,7 +26044,7 @@ ] }, { - "uuid": "d5a2a893-951b-430e-82e6-7b1b62121420", + "uuid": "dddea162-14b6-461a-a795-cf83e8741cf9", "control-id": "cis_rhel10_6-3.3.11", "description": "No notes for control-id 6.3.3.11.", "props": [ @@ -26000,7 +26081,7 @@ ] }, { - "uuid": "da9e79ba-d726-4e3f-859c-dd32e21980db", + "uuid": "9944aa3c-8759-40f1-ac10-45ea44401f21", "control-id": "cis_rhel10_6-3.3.12", "description": "No notes for control-id 6.3.3.12.", "props": [ @@ -26017,7 +26098,7 @@ ] }, { - "uuid": "a461a80a-64a8-4167-b9f6-3b7e5fa9beaa", + "uuid": "4a552990-b02b-42c0-a114-0be8457dc83b", "control-id": "cis_rhel10_6-3.3.13", "description": "No notes for control-id 6.3.3.13.", "props": [ @@ -26034,7 +26115,7 @@ ] }, { - "uuid": "a3fa7e8a-2252-4691-9c8d-60f3102e4a96", + "uuid": "54cd34d2-f3d7-4a6a-9fdb-734327f5efee", "control-id": "cis_rhel10_6-3.3.14", "description": "No notes for control-id 6.3.3.14.", "props": [ @@ -26056,7 +26137,7 @@ ] }, { - "uuid": "8b13ba38-e152-4922-99d5-dd54d83408b7", + "uuid": "eca6cd65-e65d-4b5f-b3ee-458c8c8c7c8a", "control-id": "cis_rhel10_6-3.3.15", "description": "No notes for control-id 6.3.3.15.", "props": [ @@ -26073,7 +26154,7 @@ ] }, { - "uuid": "02c060e9-ef0e-483b-803b-b6a39944e4ce", + "uuid": "12fed3f3-754c-49fe-a0fa-a2fdd81c7af1", "control-id": "cis_rhel10_6-3.3.16", "description": "No notes for control-id 6.3.3.16.", "props": [ @@ -26090,7 +26171,7 @@ ] }, { - "uuid": "a209fadf-d78d-4ad2-b040-210c06855731", + "uuid": "d29016ee-30ae-4681-ba3d-9b78d87516d2", "control-id": "cis_rhel10_6-3.3.17", "description": "No notes for control-id 6.3.3.17.", "props": [ @@ -26112,7 +26193,7 @@ ] }, { - "uuid": "05a524b9-cc9a-4678-8cfa-3501ae465efd", + "uuid": "2cd7c636-450e-49aa-8f51-549f8fcd7568", "control-id": "cis_rhel10_6-3.3.18", "description": "No notes for control-id 6.3.3.18.", "props": [ @@ -26144,7 +26225,7 @@ ] }, { - "uuid": "622a9e64-24fd-4f64-8d63-ce900e1e9d9f", + "uuid": "fe282819-ad0c-4003-a01d-b0a2428fb467", "control-id": "cis_rhel10_6-3.3.19", "description": "No notes for control-id 6.3.3.19.", "props": [ @@ -26176,7 +26257,7 @@ ] }, { - "uuid": "330a20dc-bc3d-41b6-9b6d-7f6189e5c7b8", + "uuid": "0bbbc94b-ad55-4b04-80b4-72e7f187103b", "control-id": "cis_rhel10_6-3.3.20", "description": "No notes for control-id 6.3.3.20.", "props": [ @@ -26218,7 +26299,7 @@ ] }, { - "uuid": "d256d1ea-0de6-4a94-b537-39ff8989177a", + "uuid": "9e682a1a-d472-46f2-9a01-8d3c10f3df3d", "control-id": "cis_rhel10_6-3.3.21", "description": "No notes for control-id 6.3.3.21.", "props": [ @@ -26235,7 +26316,7 @@ ] }, { - "uuid": "830b8a3e-eeb2-49a0-96b1-bd3b94dfd7ec", + "uuid": "cd776e91-3270-48ca-8bd1-369a9d4a87e3", "control-id": "cis_rhel10_6-3.3.22", "description": "No notes for control-id 6.3.3.22.", "props": [ @@ -26262,7 +26343,7 @@ ] }, { - "uuid": "abccb135-bec0-4760-ba24-368c5b7fdfe5", + "uuid": "b152958c-358d-41bc-a266-27b85de28710", "control-id": "cis_rhel10_6-3.3.23", "description": "No notes for control-id 6.3.3.23.", "props": [ @@ -26284,7 +26365,7 @@ ] }, { - "uuid": "0ce26247-f3d2-45e6-8a48-19f7e4e6b2ab", + "uuid": "802a799b-cdc1-40dd-829a-c9774c91e034", "control-id": "cis_rhel10_6-3.3.24", "description": "No notes for control-id 6.3.3.24.", "props": [ @@ -26306,7 +26387,7 @@ ] }, { - "uuid": "3ec1e6db-d47c-4210-abb4-55e1b01c343b", + "uuid": "22e9d805-4769-4f4c-910b-9a7738a85ae0", "control-id": "cis_rhel10_6-3.3.25", "description": "No notes for control-id 6.3.3.25.", "props": [ @@ -26333,7 +26414,7 @@ ] }, { - "uuid": "a2b5ccf2-2d6e-4dca-a73c-53099d38ab2c", + "uuid": "38c4f24a-c4d0-4453-89df-a407af6833a9", "control-id": "cis_rhel10_6-3.3.26", "description": "No notes for control-id 6.3.3.26.", "props": [ @@ -26355,7 +26436,7 @@ ] }, { - "uuid": "efa4dcde-c11b-4197-9597-28d82e97c3d0", + "uuid": "7e19016e-d59d-4794-b68a-ae3e7ada320e", "control-id": "cis_rhel10_6-3.3.27", "description": "No notes for control-id 6.3.3.27.", "props": [ @@ -26372,7 +26453,7 @@ ] }, { - "uuid": "784ad5e3-2b35-4ae1-a2a6-a7837c6998b0", + "uuid": "a9ae9c82-648b-4936-894d-bd9267eb3a68", "control-id": "cis_rhel10_6-3.3.28", "description": "No notes for control-id 6.3.3.28.", "props": [ @@ -26389,7 +26470,7 @@ ] }, { - "uuid": "37e47a66-a850-436d-bd67-92c6b8d1eb13", + "uuid": "84fbb5a0-54ec-49a2-b30f-09f5215c4862", "control-id": "cis_rhel10_6-3.3.29", "description": "No notes for control-id 6.3.3.29.", "props": [ @@ -26406,7 +26487,7 @@ ] }, { - "uuid": "f466c002-5ae9-47f7-ad2d-536847e04105", + "uuid": "adab8e6a-f740-4acd-ae31-3316be620ccd", "control-id": "cis_rhel10_6-3.3.30", "description": "No notes for control-id 6.3.3.30.", "props": [ @@ -26423,7 +26504,7 @@ ] }, { - "uuid": "b88aa1ca-6611-4746-8042-d9f885263b0c", + "uuid": "91a112e7-864b-4084-a9f7-1c6d14c70066", "control-id": "cis_rhel10_6-3.3.31", "description": "No notes for control-id 6.3.3.31.", "props": [ @@ -26440,7 +26521,7 @@ ] }, { - "uuid": "c245df21-a432-4571-b8e9-369f31b328ba", + "uuid": "117bce7c-679a-4564-b1a7-e86ce7cb7593", "control-id": "cis_rhel10_6-3.3.32", "description": "No notes for control-id 6.3.3.32.", "props": [ @@ -26462,7 +26543,7 @@ ] }, { - "uuid": "2658c054-fc1f-42ba-a53c-8dbbab0f76be", + "uuid": "eddb5d0a-a2f8-468d-8660-af15420d328e", "control-id": "cis_rhel10_6-3.3.33", "description": "No notes for control-id 6.3.3.33.", "props": [ @@ -26479,7 +26560,7 @@ ] }, { - "uuid": "6e2f3618-3036-47a0-9464-5d5f027f3061", + "uuid": "bc7bb521-d99c-4cc3-a680-2767a24a4b29", "control-id": "cis_rhel10_6-3.3.34", "description": "No notes for control-id 6.3.3.34.", "props": [ @@ -26496,7 +26577,7 @@ ] }, { - "uuid": "a495f63d-8302-4b64-8f2f-dd2088e5f99c", + "uuid": "aaf18982-0902-4b93-b35f-54a7cbfc68d6", "control-id": "cis_rhel10_6-3.3.35", "description": "No notes for control-id 6.3.3.35.", "props": [ @@ -26513,7 +26594,7 @@ ] }, { - "uuid": "8c4d3a19-ba5f-49ac-926b-f665ab742e57", + "uuid": "380c4661-7077-4fa8-bab9-c3fda22302b9", "control-id": "cis_rhel10_6-3.3.36", "description": "No notes for control-id 6.3.3.36.", "props": [ @@ -26530,7 +26611,7 @@ ] }, { - "uuid": "2ba9b75c-97ad-4eed-8873-c434a5e5246a", + "uuid": "be63db8f-6a07-4a52-b67a-d132f06667b5", "control-id": "cis_rhel10_6-3.3.37", "description": "The description for control-id cis_rhel10_6-3.3.37.", "props": [ @@ -26543,7 +26624,7 @@ ] }, { - "uuid": "43c9a3db-b746-4203-8812-3acd51fc09a0", + "uuid": "eefc1c27-1ea6-430e-9c85-1475a1c19bce", "control-id": "cis_rhel10_6-3.4.1", "description": "No notes for control-id 6.3.4.1.", "props": [ @@ -26560,7 +26641,7 @@ ] }, { - "uuid": "4d65010a-6011-4d6d-8699-d049fdff8f18", + "uuid": "35064aa4-bd51-4665-9da4-a83b16a666e1", "control-id": "cis_rhel10_6-3.4.2", "description": "No notes for control-id 6.3.4.2.", "props": [ @@ -26577,7 +26658,7 @@ ] }, { - "uuid": "466b591e-5e32-4a22-ab5c-7ab7af08bd0f", + "uuid": "6228b9f8-5aba-4f5d-bd55-308181d803c8", "control-id": "cis_rhel10_6-3.4.3", "description": "No notes for control-id 6.3.4.3.", "props": [ @@ -26594,7 +26675,7 @@ ] }, { - "uuid": "928cf784-f39f-48c6-a0da-4cab1e24e564", + "uuid": "5edda0f5-dc00-4e0f-bd9d-4a3676167d9e", "control-id": "cis_rhel10_6-3.4.4", "description": "No notes for control-id 6.3.4.4.", "props": [ @@ -26611,7 +26692,7 @@ ] }, { - "uuid": "6ba96701-ce68-4ef7-95e0-7d6c0f3a24d1", + "uuid": "0de29e48-39f0-4929-a2de-4df65280677f", "control-id": "cis_rhel10_6-3.4.5", "description": "No notes for control-id 6.3.4.5.", "props": [ @@ -26628,7 +26709,7 @@ ] }, { - "uuid": "53a80263-fe28-4cc3-8788-100b08b6a6d7", + "uuid": "965ec1f8-b47d-4631-89f3-904941c2fd23", "control-id": "cis_rhel10_6-3.4.6", "description": "No notes for control-id 6.3.4.6.", "props": [ @@ -26645,7 +26726,7 @@ ] }, { - "uuid": "5ea4a14d-771d-46bc-8aef-88527af131fb", + "uuid": "7e0a3cc4-c5ec-4456-b4d6-b443f3043727", "control-id": "cis_rhel10_6-3.4.7", "description": "No notes for control-id 6.3.4.7.", "props": [ @@ -26662,7 +26743,7 @@ ] }, { - "uuid": "0436792a-0bb4-4d43-abb3-394ed03ad030", + "uuid": "a769a052-2c6b-4702-8e1f-2685868da0c8", "control-id": "cis_rhel10_6-3.4.8", "description": "No notes for control-id 6.3.4.8.", "props": [ @@ -26679,7 +26760,7 @@ ] }, { - "uuid": "49ad1cdc-7c9e-48ea-847b-4920f67aeb9a", + "uuid": "fb4fb8c2-aa4f-408b-9769-39234f0bc236", "control-id": "cis_rhel10_6-3.4.9", "description": "No notes for control-id 6.3.4.9.", "props": [ @@ -26696,7 +26777,7 @@ ] }, { - "uuid": "531d0511-3bf9-4561-830d-5cf465111df1", + "uuid": "6f580f95-640d-4b1a-9f6e-c56a412f9cc0", "control-id": "cis_rhel10_6-3.4.10", "description": "No notes for control-id 6.3.4.10.", "props": [ @@ -26713,7 +26794,7 @@ ] }, { - "uuid": "14ce16f0-3b12-4cdf-9513-202ed281bdd3", + "uuid": "fb2d8d3c-573b-4a84-bc34-376301a80def", "control-id": "reload_dconf_db", "description": "This is a helper rule to reload Dconf database correctly.", "props": [ @@ -26730,7 +26811,7 @@ ] }, { - "uuid": "a7ca7e1e-3451-40b9-817e-fcc223fb3d70", + "uuid": "f0810aa4-b9d8-4c06-870e-1a12ec428ae5", "control-id": "cis_rhel10_1-1.1.1", "description": "No notes for control-id 1.1.1.1.", "props": [ @@ -26747,7 +26828,7 @@ ] }, { - "uuid": "c00b0b91-4cab-4eea-ba11-8ecd232002a9", + "uuid": "4eed4f06-a99f-465c-9462-8df19dab74d8", "control-id": "cis_rhel10_1-1.1.2", "description": "No notes for control-id 1.1.1.2.", "props": [ @@ -26764,7 +26845,7 @@ ] }, { - "uuid": "b813acd8-6c60-41b7-9ff2-4fe85babed93", + "uuid": "1c4a7e28-7651-4bc1-be14-e0a3b95a2621", "control-id": "cis_rhel10_1-1.1.3", "description": "No notes for control-id 1.1.1.3.", "props": [ @@ -26781,7 +26862,7 @@ ] }, { - "uuid": "c2daad06-52e4-485e-aff7-e127636c21cd", + "uuid": "651406d4-53e8-457d-8c43-186ea0332bad", "control-id": "cis_rhel10_1-1.1.4", "description": "No notes for control-id 1.1.1.4.", "props": [ @@ -26798,7 +26879,7 @@ ] }, { - "uuid": "2c675e38-ebc4-4354-811b-5cb7b1863639", + "uuid": "7aa9d6a2-4068-4c5b-9d07-88040764db60", "control-id": "cis_rhel10_1-1.1.5", "description": "No notes for control-id 1.1.1.5.", "props": [ @@ -26815,7 +26896,7 @@ ] }, { - "uuid": "f2a326bd-b171-4a91-97e9-0a9703292e79", + "uuid": "0ddb39fd-e80d-4563-b6c2-e9772bfffc26", "control-id": "cis_rhel10_1-1.1.9", "description": "No notes for control-id 1.1.1.9.", "props": [ @@ -26832,7 +26913,7 @@ ] }, { - "uuid": "3db3be49-b6bd-4a5e-9027-d860c8493bdb", + "uuid": "8213fea5-4252-422d-ae8d-64db35487822", "control-id": "cis_rhel10_1-1.1.10", "description": "No notes for control-id 1.1.1.10.", "props": [ @@ -26849,7 +26930,7 @@ ] }, { - "uuid": "d0358ec0-3e7c-48bb-81db-57ae33b2c5f2", + "uuid": "636030d6-e083-4e72-a44b-547056b42807", "control-id": "cis_rhel10_1-1.1.11", "description": "The description for control-id cis_rhel10_1-1.1.11.", "props": [ @@ -26862,7 +26943,7 @@ ] }, { - "uuid": "2edb4fef-50a3-4a98-9a65-42a98f7a3ec4", + "uuid": "4b297ced-26fb-4544-8ee8-3624ba9abba9", "control-id": "cis_rhel10_1-1.2.1.1", "description": "No notes for control-id 1.1.2.1.1.", "props": [ @@ -26879,7 +26960,7 @@ ] }, { - "uuid": "2159fdd8-4b5b-4f57-9c62-6009b9446ccd", + "uuid": "2eedaa8b-4301-429a-be74-edc33fd01a0c", "control-id": "cis_rhel10_1-1.2.1.2", "description": "No notes for control-id 1.1.2.1.2.", "props": [ @@ -26896,7 +26977,7 @@ ] }, { - "uuid": "df8b65be-48ec-4afd-a743-659dd6bf2f12", + "uuid": "bda507d4-c99e-42d6-8193-c5bbce805c84", "control-id": "cis_rhel10_1-1.2.1.3", "description": "No notes for control-id 1.1.2.1.3.", "props": [ @@ -26913,7 +26994,7 @@ ] }, { - "uuid": "a8db656d-ae6f-432d-81fe-22aacadf3d6f", + "uuid": "a58499e0-2d8d-4b32-894a-4f9579243a70", "control-id": "cis_rhel10_1-1.2.1.4", "description": "No notes for control-id 1.1.2.1.4.", "props": [ @@ -26930,7 +27011,7 @@ ] }, { - "uuid": "82ac80f7-4542-437d-badc-8e54c2b3508d", + "uuid": "e5a46b95-454c-4d97-afbe-8e902387db43", "control-id": "cis_rhel10_1-1.2.2.1", "description": "No notes for control-id 1.1.2.2.1.", "props": [ @@ -26947,7 +27028,7 @@ ] }, { - "uuid": "fb14635d-b090-4c74-9104-151e9f210239", + "uuid": "7351dfc9-9cdb-4ead-87d2-b68c5c791e9d", "control-id": "cis_rhel10_1-1.2.2.2", "description": "No notes for control-id 1.1.2.2.2.", "props": [ @@ -26964,7 +27045,7 @@ ] }, { - "uuid": "d9bedc4e-294e-4a10-9a20-9dd6d464abfc", + "uuid": "c00a77b0-a517-46aa-a000-7d40e1461ea4", "control-id": "cis_rhel10_1-1.2.2.3", "description": "No notes for control-id 1.1.2.2.3.", "props": [ @@ -26981,7 +27062,7 @@ ] }, { - "uuid": "995af2d0-6eb1-4d4f-ae4a-62a9a9202f1f", + "uuid": "39297dff-7185-4447-964a-3dd6af6a9e3c", "control-id": "cis_rhel10_1-1.2.2.4", "description": "No notes for control-id 1.1.2.2.4.", "props": [ @@ -26998,7 +27079,7 @@ ] }, { - "uuid": "43544b43-2468-492b-baac-a24df4b7d981", + "uuid": "dbd89ad3-b1c4-419c-834a-3d37b40405a9", "control-id": "cis_rhel10_1-1.2.3.2", "description": "No notes for control-id 1.1.2.3.2.", "props": [ @@ -27015,7 +27096,7 @@ ] }, { - "uuid": "10829dab-d31a-441c-8ac7-3ae56a7ff4d8", + "uuid": "dfccf500-ced3-4fd9-b169-3f438637ef35", "control-id": "cis_rhel10_1-1.2.3.3", "description": "No notes for control-id 1.1.2.3.3.", "props": [ @@ -27032,7 +27113,7 @@ ] }, { - "uuid": "10d09029-937c-475c-92b9-1ae8c752ed59", + "uuid": "368c81e2-edfb-4cf7-9ba8-e437ec166119", "control-id": "cis_rhel10_1-1.2.4.2", "description": "No notes for control-id 1.1.2.4.2.", "props": [ @@ -27049,7 +27130,7 @@ ] }, { - "uuid": "35b6d692-5ce7-481a-a4d0-77a9182de96d", + "uuid": "3f72a0c4-f7e5-41c8-a434-8f14fa9f7a89", "control-id": "cis_rhel10_1-1.2.4.3", "description": "No notes for control-id 1.1.2.4.3.", "props": [ @@ -27066,7 +27147,7 @@ ] }, { - "uuid": "5c4c5b09-62d2-4ac9-8bf4-937d240ddf59", + "uuid": "a07f77ea-17e5-43c6-b5b5-f42c4763fe21", "control-id": "cis_rhel10_1-1.2.5.2", "description": "No notes for control-id 1.1.2.5.2.", "props": [ @@ -27083,7 +27164,7 @@ ] }, { - "uuid": "63bc7b04-b735-4b92-9eaa-5c23987c39ed", + "uuid": "22cdf68d-4bbb-40f5-88cf-06d85d6a2754", "control-id": "cis_rhel10_1-1.2.5.3", "description": "No notes for control-id 1.1.2.5.3.", "props": [ @@ -27100,7 +27181,7 @@ ] }, { - "uuid": "2756b3ed-e5e5-4868-878e-d10433f2a32a", + "uuid": "01b16d19-9607-4744-9d34-ad48208dc1b0", "control-id": "cis_rhel10_1-1.2.5.4", "description": "No notes for control-id 1.1.2.5.4.", "props": [ @@ -27117,7 +27198,7 @@ ] }, { - "uuid": "6e05dc28-dfe9-4e7f-a60a-2c73a46ccfd8", + "uuid": "762de24f-d757-4a51-b33a-3e91273fb994", "control-id": "cis_rhel10_1-1.2.6.2", "description": "No notes for control-id 1.1.2.6.2.", "props": [ @@ -27134,7 +27215,7 @@ ] }, { - "uuid": "fe99fbc6-3d1c-4307-8d8a-49c36b45280e", + "uuid": "eda535a2-68fe-40fe-aa83-9d8d1bccba34", "control-id": "cis_rhel10_1-1.2.6.3", "description": "No notes for control-id 1.1.2.6.3.", "props": [ @@ -27151,7 +27232,7 @@ ] }, { - "uuid": "410f68ce-20d1-471c-b04f-a1c4bb3ff6f3", + "uuid": "9d37546b-c980-4b54-9362-0cbe71a885db", "control-id": "cis_rhel10_1-1.2.6.4", "description": "No notes for control-id 1.1.2.6.4.", "props": [ @@ -27168,7 +27249,7 @@ ] }, { - "uuid": "31123dd8-9d19-4102-b202-9a55ecb2998d", + "uuid": "904e344d-274a-4e1b-8cae-28b4fdcc4da3", "control-id": "cis_rhel10_1-1.2.7.2", "description": "No notes for control-id 1.1.2.7.2.", "props": [ @@ -27185,7 +27266,7 @@ ] }, { - "uuid": "4746b771-8edf-485e-a90a-48a63d11ad09", + "uuid": "783376c1-6a3f-4564-9d1c-d83b54a191d4", "control-id": "cis_rhel10_1-1.2.7.3", "description": "No notes for control-id 1.1.2.7.3.", "props": [ @@ -27202,7 +27283,7 @@ ] }, { - "uuid": "d6ebdc76-952f-4f6c-82c2-15bf8336734d", + "uuid": "074ce163-d5ef-46c2-88c6-f99a643c41f8", "control-id": "cis_rhel10_1-1.2.7.4", "description": "No notes for control-id 1.1.2.7.4.", "props": [ @@ -27219,7 +27300,7 @@ ] }, { - "uuid": "e38e087f-412d-4b3b-b13f-f784c4f4edd5", + "uuid": "a071a0e9-1d91-4bb3-8e97-d00d72f5ffd3", "control-id": "cis_rhel10_1-2.1.1", "description": "The description for control-id cis_rhel10_1-2.1.1.", "props": [ @@ -27232,7 +27313,7 @@ ] }, { - "uuid": "6819b764-f17c-4162-9616-4064a8ca8ae4", + "uuid": "c5bff484-02b1-4886-be18-c3e231ef0221", "control-id": "cis_rhel10_1-2.1.2", "description": "No notes for control-id 1.2.1.2.", "props": [ @@ -27249,7 +27330,7 @@ ] }, { - "uuid": "7460c3d2-9d9f-4634-bd01-296ae05aea96", + "uuid": "5a525901-2b61-4965-9339-2ed6106cc99e", "control-id": "cis_rhel10_1-2.1.4", "description": "The description for control-id cis_rhel10_1-2.1.4.", "props": [ @@ -27262,7 +27343,7 @@ ] }, { - "uuid": "36ba4bca-cd42-410a-8724-da6f450857f9", + "uuid": "cf081890-ec66-4c40-9d34-3027a2373b88", "control-id": "cis_rhel10_1-2.2.1", "description": "The description for control-id cis_rhel10_1-2.2.1.", "props": [ @@ -27275,7 +27356,7 @@ ] }, { - "uuid": "dad48d59-f26c-48de-a791-65e48ce8db38", + "uuid": "47cdc0ac-75cd-4a78-a61d-10c660563a80", "control-id": "cis_rhel10_1-3.1.1", "description": "No notes for control-id 1.3.1.1.", "props": [ @@ -27292,7 +27373,7 @@ ] }, { - "uuid": "06d18c76-5a42-401a-a98a-a99539772065", + "uuid": "b42897ed-b16d-44c1-a3eb-a9eb3c1ee875", "control-id": "cis_rhel10_1-3.1.2", "description": "No notes for control-id 1.3.1.2.", "props": [ @@ -27309,7 +27390,7 @@ ] }, { - "uuid": "f5ac151c-3e61-4934-b038-072826d53141", + "uuid": "e3b75e47-f214-40fd-b524-5fe85a3f4949", "control-id": "cis_rhel10_1-3.1.3", "description": "No notes for control-id 1.3.1.3.", "props": [ @@ -27326,7 +27407,7 @@ ] }, { - "uuid": "fb1f6a1a-995a-4081-98a2-3a5bf860f34f", + "uuid": "c8855c2e-e452-46fd-934b-be886ce70609", "control-id": "cis_rhel10_1-3.1.4", "description": "No notes for control-id 1.3.1.4.", "props": [ @@ -27343,7 +27424,7 @@ ] }, { - "uuid": "d92ccb21-1d1b-45e7-8cec-4daca67c3e01", + "uuid": "9c1c54a0-4ef2-4671-ac44-674f8fd581e2", "control-id": "cis_rhel10_1-3.1.7", "description": "No notes for control-id 1.3.1.7.", "props": [ @@ -27360,7 +27441,7 @@ ] }, { - "uuid": "31f6bf3a-88b4-40af-ba8f-94851643d559", + "uuid": "821beaf4-f05f-4f86-bb79-25ba2f108e2b", "control-id": "cis_rhel10_1-3.1.8", "description": "No notes for control-id 1.3.1.8.", "props": [ @@ -27377,7 +27458,7 @@ ] }, { - "uuid": "8200bf45-341c-45d1-ba90-30fa7996cdb4", + "uuid": "aa257ee8-74c4-43f6-bec9-93bffb8741ab", "control-id": "cis_rhel10_1-4.1", "description": "There is no automated remediation for this rule and this is intentional.\nMore details in the rule description.", "props": [ @@ -27394,7 +27475,7 @@ ] }, { - "uuid": "10d55948-1c84-44de-a63e-75942179b8f1", + "uuid": "0aca636c-c361-40d4-9e4e-9f6fa4a58aab", "control-id": "cis_rhel10_1-4.2", "description": "The description for control-id cis_rhel10_1-4.2.", "props": [ @@ -27437,7 +27518,7 @@ ] }, { - "uuid": "6f5f58b3-979b-4a19-98a7-761d3cadc66b", + "uuid": "bd732d90-a3f4-4bde-b952-71d900cd0f0a", "control-id": "cis_rhel10_1-5.1", "description": "No notes for control-id 1.5.1.", "props": [ @@ -27454,7 +27535,7 @@ ] }, { - "uuid": "cf21b2dd-870f-4177-9301-b81ad5cf4f56", + "uuid": "d60de18c-801c-485d-ba00-f5b1c8c78ce8", "control-id": "cis_rhel10_1-5.2", "description": "No notes for control-id 1.5.2.", "props": [ @@ -27471,7 +27552,7 @@ ] }, { - "uuid": "9ddd6ded-10fa-4ab4-bc45-ed1fdc91f4bc", + "uuid": "4aaf6330-6b52-4304-977b-e7b242490ec8", "control-id": "cis_rhel10_1-5.4", "description": "No notes for control-id 1.5.4.", "props": [ @@ -27488,7 +27569,7 @@ ] }, { - "uuid": "f44bb8c4-555f-4b30-b9d6-9fd1b69a55f7", + "uuid": "5303162a-fef5-4925-93e0-2c606d5b55b6", "control-id": "cis_rhel10_1-5.5", "description": "No notes for control-id 1.5.5.", "props": [ @@ -27505,7 +27586,7 @@ ] }, { - "uuid": "9ea8fada-1c64-45a0-bc5b-3d48cb76ba7a", + "uuid": "387b0a7a-2560-4e19-856a-e120814cf4b6", "control-id": "cis_rhel10_1-5.6", "description": "No notes for control-id 1.5.6.", "props": [ @@ -27522,7 +27603,7 @@ ] }, { - "uuid": "211ee73c-ce39-4535-a74a-4e8b40b88182", + "uuid": "cc6bf17e-bd19-472a-ae20-12cc588767c7", "control-id": "cis_rhel10_1-5.7", "description": "No notes for control-id 1.5.7.", "props": [ @@ -27539,7 +27620,7 @@ ] }, { - "uuid": "8ef99294-9d04-45ae-bbff-98881373f251", + "uuid": "69dd8a44-db60-440d-ac88-7e7689881764", "control-id": "cis_rhel10_1-5.8", "description": "Address Space Layout Randomization (ASLR)", "props": [ @@ -27556,7 +27637,7 @@ ] }, { - "uuid": "21ff0df7-5272-4d58-be3f-17535f33e727", + "uuid": "fc27a765-8547-4db3-b30f-c2d3fd9eb4d7", "control-id": "cis_rhel10_1-5.9", "description": "No notes for control-id 1.5.9.", "props": [ @@ -27573,7 +27654,7 @@ ] }, { - "uuid": "9b174271-fe46-41e6-bbd6-a29a3679c4fc", + "uuid": "fda21a9e-e2b5-406a-b1cd-8171cc71fdb9", "control-id": "cis_rhel10_1-5.10", "description": "No notes for control-id 1.5.10.", "props": [ @@ -27590,7 +27671,7 @@ ] }, { - "uuid": "a99865c6-066a-4d10-8322-1ce8df2c2992", + "uuid": "a1ae9bdc-56bf-4956-85ca-d4207256b2b8", "control-id": "cis_rhel10_1-6.1", "description": "No notes for control-id 1.6.1.", "props": [ @@ -27607,7 +27688,7 @@ ] }, { - "uuid": "e9b931ab-edf8-48d4-9334-a11c8e2f679a", + "uuid": "ded5839e-f9d1-46fd-82c4-59b23a2e715a", "control-id": "cis_rhel10_1-6.2", "description": "No notes for control-id 1.6.2.", "props": [ @@ -27624,7 +27705,7 @@ ] }, { - "uuid": "d247f35a-346d-4324-8c98-1168fb9bf4a6", + "uuid": "f53a5194-547b-4a91-bff3-9cf13c455a9a", "control-id": "cis_rhel10_1-6.3", "description": "No notes for control-id 1.6.3.", "props": [ @@ -27641,7 +27722,7 @@ ] }, { - "uuid": "22f9226e-63b7-46c8-bfa4-ded2525a95ae", + "uuid": "be7576d0-c3a9-447e-9a35-af9334c148f8", "control-id": "cis_rhel10_1-6.4", "description": "No notes for control-id 1.6.4.", "props": [ @@ -27658,7 +27739,7 @@ ] }, { - "uuid": "104657c8-23bb-46ed-a813-5c5e2a2e70fe", + "uuid": "7331e308-c0b7-4097-bc1e-f51a8687eb39", "control-id": "cis_rhel10_1-7.1", "description": "No notes for control-id 1.7.1.", "props": [ @@ -27675,7 +27756,7 @@ ] }, { - "uuid": "28ade757-4779-4190-bb3f-a618c669ac4f", + "uuid": "990f8a12-ff62-4e48-a828-42914b6ca926", "control-id": "cis_rhel10_1-7.2", "description": "No notes for control-id 1.7.2.", "props": [ @@ -27692,7 +27773,7 @@ ] }, { - "uuid": "d8f81c9e-23ff-4c19-bf04-1d37699709c6", + "uuid": "d2bf7d07-d047-4caf-b228-f1e65b46ce4e", "control-id": "cis_rhel10_1-7.3", "description": "No notes for control-id 1.7.3.", "props": [ @@ -27709,7 +27790,7 @@ ] }, { - "uuid": "6738da32-f2dc-4215-be88-e7a88b2cf89d", + "uuid": "58aad08b-ab75-45f5-b7dc-fdb2fcbcd649", "control-id": "cis_rhel10_1-7.4", "description": "No notes for control-id 1.7.4.", "props": [ @@ -27736,7 +27817,7 @@ ] }, { - "uuid": "0683c5e5-7e1f-447e-b8ff-e5357f3a4a60", + "uuid": "acfefad3-1362-4766-86fe-a6ebbe95f62e", "control-id": "cis_rhel10_1-7.5", "description": "No notes for control-id 1.7.5.", "props": [ @@ -27763,7 +27844,7 @@ ] }, { - "uuid": "9a037463-eeb4-4f94-a861-0ec205435fe8", + "uuid": "ce082933-0131-459e-9c08-ad7705a4b1cd", "control-id": "cis_rhel10_1-7.6", "description": "No notes for control-id 1.7.6.", "props": [ @@ -27790,7 +27871,7 @@ ] }, { - "uuid": "2f148b9e-0bab-4893-92b5-13201bb9053e", + "uuid": "0562fdf9-44f5-4118-ba0b-1ed7beb525cf", "control-id": "cis_rhel10_1-8.1", "description": "No notes for control-id 1.8.1.", "props": [ @@ -27812,7 +27893,7 @@ ] }, { - "uuid": "8e8f7a25-abb3-44d8-b2c0-85a2813a99dd", + "uuid": "3de2036c-5e52-4645-bb4f-252fb13fd2a9", "control-id": "cis_rhel10_1-8.2", "description": "No notes for control-id 1.8.2.", "props": [ @@ -27829,7 +27910,7 @@ ] }, { - "uuid": "6cf14e6f-3959-49fc-9353-3b779f37b0d6", + "uuid": "7a0bbb19-ebb4-4981-8a93-f8b0dd407e7f", "control-id": "cis_rhel10_1-8.3", "description": "No notes for control-id 1.8.3.", "props": [ @@ -27861,7 +27942,7 @@ ] }, { - "uuid": "2eac318a-0116-42ed-a0d5-062aa1276fdf", + "uuid": "b5edbe72-49ae-4f6d-bd22-661655d89d09", "control-id": "cis_rhel10_1-8.4", "description": "No notes for control-id 1.8.4.", "props": [ @@ -27883,7 +27964,7 @@ ] }, { - "uuid": "df0580bd-86c0-4d64-926a-54247b8034a2", + "uuid": "4415b1f0-8fc2-45d5-9c30-dc5e2f464c01", "control-id": "cis_rhel10_1-8.5", "description": "No notes for control-id 1.8.5.", "props": [ @@ -27900,7 +27981,7 @@ ] }, { - "uuid": "52ef88b3-7dc3-44ae-99a1-583c6cbe28ea", + "uuid": "c8fe1124-6c97-4929-a729-bfc4f5ae6fd4", "control-id": "cis_rhel10_2-1.1", "description": "No notes for control-id 2.1.1.", "props": [ @@ -27917,7 +27998,7 @@ ] }, { - "uuid": "d68ed86f-de11-452b-a35f-1c5bbfa9f0ae", + "uuid": "d62a3850-502f-4db3-8680-2e45fbf194fb", "control-id": "cis_rhel10_2-1.2", "description": "No notes for control-id 2.1.2.", "props": [ @@ -27934,7 +28015,7 @@ ] }, { - "uuid": "b37d2c62-2020-4eee-bc43-7097ca895d27", + "uuid": "ec606762-bfbe-41ae-89f2-49f74a141563", "control-id": "cis_rhel10_2-1.4", "description": "No notes for control-id 2.1.4.", "props": [ @@ -27951,7 +28032,7 @@ ] }, { - "uuid": "80458ec7-d236-4461-9457-9d40104bafd3", + "uuid": "6ffcf211-c175-4bb7-a173-ade9a143ec47", "control-id": "cis_rhel10_2-1.5", "description": "No notes for control-id 2.1.5.", "props": [ @@ -27968,7 +28049,7 @@ ] }, { - "uuid": "acd79aa3-aea6-4ec7-9c0a-9f0555b31c46", + "uuid": "68fd9c4e-f9db-4c77-9438-4eb2d60697dd", "control-id": "cis_rhel10_2-1.6", "description": "No notes for control-id 2.1.6.", "props": [ @@ -27985,7 +28066,7 @@ ] }, { - "uuid": "1e105da0-8f43-42fc-8de3-b2a005eeb11b", + "uuid": "f1cbffac-fda1-4e8a-8383-4e754434c36a", "control-id": "cis_rhel10_2-1.7", "description": "No notes for control-id 2.1.7.", "props": [ @@ -28002,7 +28083,7 @@ ] }, { - "uuid": "96e92e92-c298-4b2c-9a6a-68e337c791de", + "uuid": "ac2cdc8f-8087-43ed-b160-b88f273f8dc5", "control-id": "cis_rhel10_2-1.8", "description": "No notes for control-id 2.1.8.", "props": [ @@ -28024,7 +28105,7 @@ ] }, { - "uuid": "462c59ef-b4df-4cbd-b452-bea3ea60d859", + "uuid": "b892feec-acb7-45e5-bf83-5532b64105f0", "control-id": "cis_rhel10_2-1.9", "description": "Many of the libvirt packages used by Enterprise Linux virtualization are dependent on the\nnfs-utils package.", "props": [ @@ -28041,7 +28122,7 @@ ] }, { - "uuid": "6f8a627d-be99-459e-8d58-3bcf739db82b", + "uuid": "f566fdda-008a-4b7f-9f9e-168b68b641f5", "control-id": "cis_rhel10_2-1.10", "description": "No notes for control-id 2.1.10.", "props": [ @@ -28058,7 +28139,7 @@ ] }, { - "uuid": "bbab8bd4-1cf0-4f30-94c0-38a2ee7800c5", + "uuid": "ada9d9e9-8e52-47d6-ae51-f441b68edacc", "control-id": "cis_rhel10_2-1.11", "description": "Many of the libvirt packages used by Enterprise Linux virtualization, and the nfs-utils\npackage used for The Network File System (NFS), are dependent on the rpcbind package.", "props": [ @@ -28075,7 +28156,7 @@ ] }, { - "uuid": "2ae95b5e-7d56-4833-b43a-ca582050935e", + "uuid": "e5984007-ab8c-4ce5-ad23-fceef05eb35c", "control-id": "cis_rhel10_2-1.12", "description": "No notes for control-id 2.1.12.", "props": [ @@ -28092,7 +28173,7 @@ ] }, { - "uuid": "33d7fb0c-15a7-4a2c-8271-409271abbf99", + "uuid": "6390f162-1e8f-49ac-bad0-517659ae0f55", "control-id": "cis_rhel10_2-1.13", "description": "No notes for control-id 2.1.13.", "props": [ @@ -28109,7 +28190,7 @@ ] }, { - "uuid": "43b91c21-9950-4884-820f-0ee74da54cd5", + "uuid": "0cd1de82-5354-4f4b-9f07-95e773f13579", "control-id": "cis_rhel10_2-1.14", "description": "No notes for control-id 2.1.14.", "props": [ @@ -28126,7 +28207,7 @@ ] }, { - "uuid": "48ccf0d0-883b-4eb3-91af-e3266d3ee778", + "uuid": "97188940-4adf-4967-88bd-2c21b4955606", "control-id": "cis_rhel10_2-1.15", "description": "No notes for control-id 2.1.15.", "props": [ @@ -28143,7 +28224,7 @@ ] }, { - "uuid": "6bc53204-cbf6-4f37-ac9b-7e4d251b1d2c", + "uuid": "da9bf111-cb4d-4492-beb8-9cfc2eac1a17", "control-id": "cis_rhel10_2-1.16", "description": "No notes for control-id 2.1.16.", "props": [ @@ -28160,7 +28241,7 @@ ] }, { - "uuid": "010de78c-4666-48a0-bdc3-20d7540c37e8", + "uuid": "6717e8af-7dde-4632-a1e6-c90fd2f1f8d3", "control-id": "cis_rhel10_2-1.17", "description": "No notes for control-id 2.1.17.", "props": [ @@ -28177,7 +28258,7 @@ ] }, { - "uuid": "9da439d3-8393-4dac-b25c-abe0dbf6b164", + "uuid": "0030cb5b-36c9-4c47-b343-c3d3ec7eb5a7", "control-id": "cis_rhel10_2-1.18", "description": "No notes for control-id 2.1.18.", "props": [ @@ -28199,7 +28280,7 @@ ] }, { - "uuid": "2071e540-686b-47d2-bcf9-9fa925c79f77", + "uuid": "aedcebb2-77f4-487e-957c-03315923f53d", "control-id": "cis_rhel10_2-1.21", "description": "No notes for control-id 2.1.21.", "props": [ @@ -28221,7 +28302,7 @@ ] }, { - "uuid": "135d154b-9225-479f-873e-358e8cdd8275", + "uuid": "f976c958-d575-41e7-8d1d-74f935f3d034", "control-id": "cis_rhel10_2-1.22", "description": "The description for control-id cis_rhel10_2-1.22.", "props": [ @@ -28234,7 +28315,7 @@ ] }, { - "uuid": "7a39a166-38e2-4fcd-937d-3e2297b763dc", + "uuid": "f5cb39ca-70c0-4eb3-8756-1053a86fb22a", "control-id": "cis_rhel10_2-2.1", "description": "No notes for control-id 2.2.1.", "props": [ @@ -28251,7 +28332,7 @@ ] }, { - "uuid": "36533a87-b984-406f-9450-80a772bc1287", + "uuid": "4bffd6ce-e420-4f58-9a85-79a7478c40a3", "control-id": "cis_rhel10_2-2.3", "description": "No notes for control-id 2.2.3.", "props": [ @@ -28268,7 +28349,7 @@ ] }, { - "uuid": "500a13e4-7b13-43c8-bfb3-e55df9467326", + "uuid": "0984e463-4a22-4e80-8016-cf27d16b11d2", "control-id": "cis_rhel10_2-2.4", "description": "No notes for control-id 2.2.4.", "props": [ @@ -28285,7 +28366,7 @@ ] }, { - "uuid": "2736178c-f466-4ea9-97ee-15f9d9b71956", + "uuid": "17702452-6c28-46ab-9eb0-4a85f3b84b0e", "control-id": "cis_rhel10_2-3.1", "description": "No notes for control-id 2.3.1.", "props": [ @@ -28297,7 +28378,7 @@ ] }, { - "uuid": "d5c34448-5023-4619-8c9b-e833b6c2b7a0", + "uuid": "07055a22-3f9f-4167-a96e-746044e5effb", "control-id": "cis_rhel10_2-3.2", "description": "No notes for control-id 2.3.2.", "props": [ @@ -28314,7 +28395,7 @@ ] }, { - "uuid": "f171dca2-ac99-4239-94ad-e7a97d6f4cc6", + "uuid": "401894cb-14f2-4968-a629-b43a7967f260", "control-id": "cis_rhel10_2-3.3", "description": "No notes for control-id 2.3.3.", "props": [ @@ -28331,7 +28412,7 @@ ] }, { - "uuid": "d0d567bf-0054-4ada-9f6a-cc2e9925bc23", + "uuid": "601154e8-b088-4981-84be-9c9292f123ce", "control-id": "cis_rhel10_2-4.1.1", "description": "No notes for control-id 2.4.1.1.", "props": [ @@ -28353,7 +28434,7 @@ ] }, { - "uuid": "bbb0334d-b2fb-4cd1-9216-87ace981b641", + "uuid": "44e1d3dd-6900-4d13-869b-6c6d943d1f21", "control-id": "cis_rhel10_2-4.1.2", "description": "No notes for control-id 2.4.1.2.", "props": [ @@ -28380,7 +28461,7 @@ ] }, { - "uuid": "50ede21d-9cb5-4394-bc66-5bf344216a1a", + "uuid": "02e84d35-334e-4d02-9c86-c0a6a97e58af", "control-id": "cis_rhel10_2-4.1.3", "description": "No notes for control-id 2.4.1.3.", "props": [ @@ -28407,7 +28488,7 @@ ] }, { - "uuid": "dc754726-a64a-4b11-ac47-e2a11ea14d11", + "uuid": "f2c11aa1-45ac-4e09-842f-d3c33d0a964c", "control-id": "cis_rhel10_2-4.1.4", "description": "No notes for control-id 2.4.1.4.", "props": [ @@ -28434,7 +28515,7 @@ ] }, { - "uuid": "f9dac5da-a664-44f0-9a42-93a43288a340", + "uuid": "05252a9f-840e-4ed6-9b4d-60d6a6c3dd86", "control-id": "cis_rhel10_2-4.1.5", "description": "No notes for control-id 2.4.1.5.", "props": [ @@ -28461,7 +28542,7 @@ ] }, { - "uuid": "7d646790-857b-4304-92a5-8808800b5865", + "uuid": "0662b804-fab2-4a3b-aa7e-c2f417810325", "control-id": "cis_rhel10_2-4.1.6", "description": "No notes for control-id 2.4.1.6.", "props": [ @@ -28488,7 +28569,7 @@ ] }, { - "uuid": "f04fef06-6b17-4910-a23e-2271937623f9", + "uuid": "a48b87ba-fd05-4ee6-82e4-881649ce0cff", "control-id": "cis_rhel10_2-4.1.7", "description": "No notes for control-id 2.4.1.7.", "props": [ @@ -28515,7 +28596,7 @@ ] }, { - "uuid": "ae99d271-e6c7-4e31-a799-0465125a461f", + "uuid": "dceee609-8a1c-4baf-9441-e94f863d682b", "control-id": "cis_rhel10_2-4.1.8", "description": "No notes for control-id 2.4.1.8.", "props": [ @@ -28542,7 +28623,7 @@ ] }, { - "uuid": "9d81408a-e2e6-44bb-9e8d-46a72eddc0b1", + "uuid": "924b8f07-05d5-4f6c-bf3f-48452547ec6d", "control-id": "cis_rhel10_2-4.1.9", "description": "No notes for control-id 2.4.1.9.", "props": [ @@ -28579,7 +28660,7 @@ ] }, { - "uuid": "704e79b4-1d45-42c2-a28f-51bba20ab2e5", + "uuid": "af378f71-4272-4553-8b63-a26598bb77ba", "control-id": "cis_rhel10_2-4.2.1", "description": "No notes for control-id 2.4.2.1.", "props": [ @@ -28616,7 +28697,7 @@ ] }, { - "uuid": "60d1b68e-51b3-49c4-b028-99f6a5dbed4a", + "uuid": "7d6b5085-6281-4158-8c7f-43fb20320cd7", "control-id": "cis_rhel10_3-1.1", "description": "The description for control-id cis_rhel10_3-1.1.", "props": [ @@ -28629,7 +28710,7 @@ ] }, { - "uuid": "14bc72de-9cba-4ff4-aed5-ed0361a68c15", + "uuid": "2d41d14d-e5ea-4418-b346-03e12638a4db", "control-id": "cis_rhel10_3-1.2", "description": "No notes for control-id 3.1.2.", "props": [ @@ -28646,7 +28727,7 @@ ] }, { - "uuid": "0ba08cf2-456a-4557-9d85-841d0105203c", + "uuid": "71aa9e62-42b4-41a8-9666-b09dde0bb95b", "control-id": "cis_rhel10_3-1.3", "description": "No notes for control-id 3.1.3.", "props": [ @@ -28663,7 +28744,7 @@ ] }, { - "uuid": "4128ad8b-2761-47e1-bc67-cb02cb1a7083", + "uuid": "f2447090-0dde-452c-9a26-474a2227b5c5", "control-id": "cis_rhel10_3-2.1", "description": "No notes for control-id 3.2.1.", "props": [ @@ -28680,7 +28761,7 @@ ] }, { - "uuid": "b9b64174-f629-4769-b2f4-6b95aca98359", + "uuid": "96769c55-99bc-48fe-a893-b9c96228eb59", "control-id": "cis_rhel10_3-2.2", "description": "No notes for control-id 3.2.2.", "props": [ @@ -28697,7 +28778,7 @@ ] }, { - "uuid": "64d0a18b-fd04-485e-9fe9-020f32229bc5", + "uuid": "892b7f56-2f8e-4b91-998b-52d23e09f75e", "control-id": "cis_rhel10_3-2.3", "description": "No notes for control-id 3.2.3.", "props": [ @@ -28714,7 +28795,7 @@ ] }, { - "uuid": "5e3235e0-609f-405b-89e9-fdd04ea97a3d", + "uuid": "d0d7271e-a417-42cb-afb1-0e829c788723", "control-id": "cis_rhel10_3-2.4", "description": "No notes for control-id 3.2.4.", "props": [ @@ -28731,7 +28812,7 @@ ] }, { - "uuid": "da5d33f6-8f43-462a-89c1-dad069451e06", + "uuid": "c8f60f6e-681c-4478-b573-287eca81beff", "control-id": "cis_rhel10_3-2.5", "description": "No notes for control-id 3.2.5.", "props": [ @@ -28748,7 +28829,7 @@ ] }, { - "uuid": "6ef61ce9-2a2e-4955-8762-499b01d1251c", + "uuid": "b2085564-5ac4-4a42-ba6a-61c62a3e8a7f", "control-id": "cis_rhel10_3-2.6", "description": "No notes for control-id 3.2.6.", "props": [ @@ -28765,7 +28846,7 @@ ] }, { - "uuid": "f2755a0f-d819-465c-bd08-8856dbf498af", + "uuid": "f549f3ea-bc40-42a0-93e4-b83056079400", "control-id": "cis_rhel10_3-3.1.2", "description": "No notes for control-id 3.3.1.2.", "props": [ @@ -28782,7 +28863,7 @@ ] }, { - "uuid": "ad2c3928-4687-4d23-960f-a79d83ef6ae8", + "uuid": "a226f7c9-147a-4240-b51b-91b87bab2f9d", "control-id": "cis_rhel10_3-3.1.3", "description": "No notes for control-id 3.3.1.3.", "props": [ @@ -28799,7 +28880,7 @@ ] }, { - "uuid": "016b32cb-e8d4-43c0-8a52-2162fee360bf", + "uuid": "136e61c6-15b8-4736-b2f3-353d1df6c7e9", "control-id": "cis_rhel10_3-3.1.4", "description": "No notes for control-id 3.3.1.4.", "props": [ @@ -28816,7 +28897,7 @@ ] }, { - "uuid": "3ece15c4-6ce0-4d63-ac4b-cf72990adfdd", + "uuid": "28839c5d-348b-4ebb-b8ee-93239ed0668a", "control-id": "cis_rhel10_3-3.1.5", "description": "No notes for control-id 3.3.1.5.", "props": [ @@ -28833,7 +28914,7 @@ ] }, { - "uuid": "a384733a-eb8d-4d25-b4cd-6d1a876cd01b", + "uuid": "0cc3589e-8bed-4b32-96f0-b7f8f0636b3b", "control-id": "cis_rhel10_3-3.1.6", "description": "No notes for control-id 3.3.1.6.", "props": [ @@ -28850,7 +28931,7 @@ ] }, { - "uuid": "20291887-143c-4cb5-858f-9d1258047c0e", + "uuid": "7bdd2c84-7f3e-4bdb-ba67-7794d9954113", "control-id": "cis_rhel10_3-3.1.7", "description": "No notes for control-id 3.3.1.7.", "props": [ @@ -28867,7 +28948,7 @@ ] }, { - "uuid": "cb8c84a2-02e3-43ba-9c37-a2c64cdb5cc4", + "uuid": "85328743-7f2d-4919-b199-2abfc1bb092b", "control-id": "cis_rhel10_3-3.1.8", "description": "No notes for control-id 3.3.1.8.", "props": [ @@ -28884,7 +28965,7 @@ ] }, { - "uuid": "cba89ffd-58df-4f5a-86a2-dac1988b73ab", + "uuid": "95a6f148-d8ce-4e95-8061-2b2e2f13b250", "control-id": "cis_rhel10_3-3.1.9", "description": "No notes for control-id 3.3.1.9.", "props": [ @@ -28901,7 +28982,7 @@ ] }, { - "uuid": "92a1e6ba-3646-4d97-b704-e34e62da22ad", + "uuid": "6d8bd879-0597-4f68-b5b3-d73ff08079ea", "control-id": "cis_rhel10_3-3.1.10", "description": "No notes for control-id 3.3.1.10.", "props": [ @@ -28918,7 +28999,7 @@ ] }, { - "uuid": "8cb3bd36-cdd4-422a-aa88-40eb8261b999", + "uuid": "276c06f3-5671-46b3-a6eb-64316559d05c", "control-id": "cis_rhel10_3-3.1.11", "description": "No notes for control-id 3.3.1.11.", "props": [ @@ -28935,7 +29016,7 @@ ] }, { - "uuid": "00ff322b-f94a-4a3a-9986-b8a3bab8d934", + "uuid": "26d56451-4b3d-411b-be3a-71a9b09f55c8", "control-id": "cis_rhel10_3-3.1.12", "description": "No notes for control-id 3.3.1.12.", "props": [ @@ -28952,7 +29033,7 @@ ] }, { - "uuid": "33a08ee6-349e-4f68-b837-5cbb931116d7", + "uuid": "9827809e-840c-4de9-93fc-c76298ac31f0", "control-id": "cis_rhel10_3-3.1.13", "description": "No notes for control-id 3.3.1.13.", "props": [ @@ -28969,7 +29050,7 @@ ] }, { - "uuid": "08195d7a-3e51-4cca-9d2b-09d28d7efdf0", + "uuid": "32cdd04f-b5a8-45cb-b969-c0490ddf6cdd", "control-id": "cis_rhel10_3-3.1.14", "description": "No notes for control-id 3.3.1.14.", "props": [ @@ -28986,7 +29067,7 @@ ] }, { - "uuid": "96372339-91f3-43ae-9990-ee0462b52781", + "uuid": "a5421be9-a4ee-4ea2-90a8-bb253164f29d", "control-id": "cis_rhel10_3-3.1.15", "description": "No notes for control-id 3.3.1.15.", "props": [ @@ -29003,7 +29084,7 @@ ] }, { - "uuid": "a7a1ca42-a990-499a-86ff-835ebea2649b", + "uuid": "f2804ac9-ba4f-483c-acec-0629c8439832", "control-id": "cis_rhel10_3-3.1.16", "description": "No notes for control-id 3.3.1.16.", "props": [ @@ -29020,7 +29101,7 @@ ] }, { - "uuid": "38c10a0e-88ea-456e-abb3-949cc8eafc57", + "uuid": "9620d2e1-c278-4b93-9918-a96da7c6824e", "control-id": "cis_rhel10_3-3.1.17", "description": "No notes for control-id 3.3.1.17.", "props": [ @@ -29037,7 +29118,7 @@ ] }, { - "uuid": "4268c86e-00b7-4849-9481-aa162a36e19b", + "uuid": "b07a55b3-4570-419b-94b0-d074da80a59d", "control-id": "cis_rhel10_3-3.1.18", "description": "No notes for control-id 3.3.1.18.", "props": [ @@ -29054,7 +29135,7 @@ ] }, { - "uuid": "1d3da3da-9d41-4bd9-b288-cf118212aa49", + "uuid": "f6d19135-bc29-4b2b-b430-f75f5031037a", "control-id": "cis_rhel10_3-3.2.1", "description": "No notes for control-id 3.3.2.1.", "props": [ @@ -29071,7 +29152,7 @@ ] }, { - "uuid": "ee0b9bbe-e416-453c-99fa-58d396fbee17", + "uuid": "f45c122b-46ad-421d-8dec-8a4d36588a15", "control-id": "cis_rhel10_3-3.2.2", "description": "No notes for control-id 3.3.2.2.", "props": [ @@ -29088,7 +29169,7 @@ ] }, { - "uuid": "d9a863d8-c21f-49ff-a3f8-a0146d22ee7f", + "uuid": "6442e47e-fb78-4d7d-9e46-0532e58bd42f", "control-id": "cis_rhel10_3-3.2.3", "description": "No notes for control-id 3.3.2.3.", "props": [ @@ -29105,7 +29186,7 @@ ] }, { - "uuid": "9c10b306-64f4-4b6d-bb4e-f97cafff29ca", + "uuid": "01584378-048b-4ad5-9e68-1585431c4846", "control-id": "cis_rhel10_3-3.2.4", "description": "No notes for control-id 3.3.2.4.", "props": [ @@ -29122,7 +29203,7 @@ ] }, { - "uuid": "6806079c-f1ef-497e-a934-973354de86d9", + "uuid": "153943d8-5d08-489a-8798-ca0a88a7f349", "control-id": "cis_rhel10_3-3.2.5", "description": "No notes for control-id 3.3.2.5.", "props": [ @@ -29139,7 +29220,7 @@ ] }, { - "uuid": "a56345d2-e26e-4585-9eca-3f116e2d906a", + "uuid": "d393cf42-a339-4ed4-b960-ec98a8fbd191", "control-id": "cis_rhel10_3-3.2.6", "description": "No notes for control-id 3.3.2.6.", "props": [ @@ -29156,7 +29237,7 @@ ] }, { - "uuid": "3f714526-c99d-45c9-9a26-7b6610f397b7", + "uuid": "ff0feb74-5ae8-4072-9c5e-4ecae0ebfa69", "control-id": "cis_rhel10_3-3.2.7", "description": "No notes for control-id 3.3.2.7.", "props": [ @@ -29173,7 +29254,7 @@ ] }, { - "uuid": "0055c561-e6a5-4c81-8764-9f92b5dd1b70", + "uuid": "97700e36-927b-44b9-8f85-be31515385a6", "control-id": "cis_rhel10_3-3.2.8", "description": "No notes for control-id 3.3.2.8.", "props": [ @@ -29190,7 +29271,7 @@ ] }, { - "uuid": "965f9bcf-96c4-4f7b-bf1e-e63f799a9c31", + "uuid": "f79abb36-cfce-4f3e-9eba-f2b8f4d3dfd4", "control-id": "cis_rhel10_4-1.1", "description": "No notes for control-id 4.1.1.", "props": [ @@ -29207,7 +29288,7 @@ ] }, { - "uuid": "6fb99015-1c05-4a13-bd66-e981b7bb1b73", + "uuid": "cc744d5c-6913-4edb-89da-08358ccfe082", "control-id": "cis_rhel10_4-1.2", "description": "No notes for control-id 4.1.2.", "props": [ @@ -29224,7 +29305,7 @@ ] }, { - "uuid": "1f6f2e84-8e79-419b-b4de-084bb3a4359a", + "uuid": "123361c7-9fcf-4e7c-b133-156a984c74a6", "control-id": "cis_rhel10_4-1.3", "description": "No notes for control-id 4.1.3.", "props": [ @@ -29241,7 +29322,7 @@ ] }, { - "uuid": "9d3baf9d-2982-4c48-9a79-7e085169b21d", + "uuid": "325437dc-310e-41c3-a975-c5a352a2d391", "control-id": "cis_rhel10_4-1.4", "description": "The description for control-id cis_rhel10_4-1.4.", "props": [ @@ -29254,7 +29335,7 @@ ] }, { - "uuid": "d988df1b-83d7-46bd-9583-d4d38979c2ec", + "uuid": "b139c749-5756-4e80-a2d8-8f1725ec0214", "control-id": "cis_rhel10_4-1.5", "description": "Firewalld in Red Hat Enterprise Linux 10 accepts loopback traffic by default.", "props": [ @@ -29271,7 +29352,7 @@ ] }, { - "uuid": "7cfb4da0-84c1-44f6-a070-58908eb5568b", + "uuid": "e06659ac-b53b-46be-82c5-424ce918d8ff", "control-id": "cis_rhel10_4-1.6", "description": "The description for control-id cis_rhel10_4-1.6.", "props": [ @@ -29284,7 +29365,7 @@ ] }, { - "uuid": "b5c2970c-34b4-4a9c-a89f-56cef11fd652", + "uuid": "7fc53d82-cf98-4b34-b3d4-0cbd89c0bcaa", "control-id": "cis_rhel10_4-1.7", "description": "The description for control-id cis_rhel10_4-1.7.", "props": [ @@ -29297,7 +29378,7 @@ ] }, { - "uuid": "4f1c98d6-89d8-49b9-8903-9906b9443328", + "uuid": "115f83b4-7323-4250-87cc-b828cc18ce97", "control-id": "cis_rhel10_5-1.1", "description": "No notes for control-id 5.1.1.", "props": [ @@ -29354,7 +29435,7 @@ ] }, { - "uuid": "295c9ddd-7de7-4535-8abd-9a411dad08c5", + "uuid": "5025de4b-42f9-4491-881d-68d62969dfb9", "control-id": "cis_rhel10_5-1.2", "description": "No notes for control-id 5.1.2.", "props": [ @@ -29381,7 +29462,7 @@ ] }, { - "uuid": "d8581c1a-56f3-4ad8-8dea-39022febf84a", + "uuid": "3e1e64cb-2e0b-448f-b782-0b4e5717297b", "control-id": "cis_rhel10_5-1.3", "description": "No notes for control-id 5.1.3.", "props": [ @@ -29408,7 +29489,7 @@ ] }, { - "uuid": "ad1688d3-d687-4239-a521-4ba3ea28a1db", + "uuid": "04b851fc-51e5-4645-b613-6928cc991413", "control-id": "cis_rhel10_5-1.4", "description": "No notes for control-id 5.1.4.", "props": [ @@ -29425,7 +29506,7 @@ ] }, { - "uuid": "97c2b490-3929-4225-92e2-960bf15bfdff", + "uuid": "4a7b6e2f-6d84-4581-b01d-f7a14bd478c0", "control-id": "cis_rhel10_5-1.5", "description": "No notes for control-id 5.1.5.", "props": [ @@ -29442,7 +29523,7 @@ ] }, { - "uuid": "4c1ea0c7-edda-48ae-bdbe-61dffe24de48", + "uuid": "a4449f37-564f-4a5e-9a1f-aacdf1d368a0", "control-id": "cis_rhel10_5-1.6", "description": "No notes for control-id 5.1.6.", "props": [ @@ -29459,7 +29540,7 @@ ] }, { - "uuid": "dc623b16-cd7e-4685-81aa-d7c688c15607", + "uuid": "75fbbac4-9e88-40a7-a2e7-64ff28d856de", "control-id": "cis_rhel10_5-1.7", "description": "The requirement gives an example of 45 seconds, but is flexible about the values. It is only\nnecessary to ensure there is a timeout configured in alignment to the site policy.", "props": [ @@ -29481,7 +29562,7 @@ ] }, { - "uuid": "aa638a9c-9411-45e5-903c-034044346179", + "uuid": "388a49a4-4551-409e-86ce-3fef0bc32e0b", "control-id": "cis_rhel10_5-1.10", "description": "No notes for control-id 5.1.10.", "props": [ @@ -29498,7 +29579,7 @@ ] }, { - "uuid": "eb3be091-6aa6-4993-95a4-70e44d822bac", + "uuid": "d1c94dab-1d46-463a-a611-f4adf231fda1", "control-id": "cis_rhel10_5-1.11", "description": "No notes for control-id 5.1.11.", "props": [ @@ -29515,7 +29596,7 @@ ] }, { - "uuid": "8ab89840-ba42-4c56-bf41-f8681f9d69ca", + "uuid": "e71c7d1f-52dd-4c6c-9528-a8c54ce960fb", "control-id": "cis_rhel10_5-1.12", "description": "The description for control-id cis_rhel10_5-1.12.", "props": [ @@ -29533,7 +29614,7 @@ ] }, { - "uuid": "d8f76811-83e7-4b2a-877a-007db4ec82df", + "uuid": "9cc86a46-6fc7-465c-9545-20052b52370b", "control-id": "cis_rhel10_5-1.13", "description": "No notes for control-id 5.1.13.", "props": [ @@ -29550,7 +29631,7 @@ ] }, { - "uuid": "3c01bb18-a7de-4f4b-ae7b-0dfb55c59430", + "uuid": "79195621-2873-4275-941f-4d1cd6b78e08", "control-id": "cis_rhel10_5-1.14", "description": "The CIS benchmark is not opinionated about which loglevel is selected here. Here, this\nprofile uses VERBOSE by default, as it allows for the capture of login and logout activity\nas well as key fingerprints.", "props": [ @@ -29567,7 +29648,7 @@ ] }, { - "uuid": "493cabaa-ea87-4a3a-bfdc-62587a9b142e", + "uuid": "6183235b-07ee-411a-9a3b-01533efe6624", "control-id": "cis_rhel10_5-1.15", "description": "No notes for control-id 5.1.15.", "props": [ @@ -29584,7 +29665,7 @@ ] }, { - "uuid": "e7dc442f-a167-4033-ada7-c4408a0c5437", + "uuid": "d5fd3ab3-c8e6-4cd2-935e-3e7bef36a704", "control-id": "cis_rhel10_5-1.16", "description": "No notes for control-id 5.1.16.", "props": [ @@ -29601,7 +29682,7 @@ ] }, { - "uuid": "340dc963-a592-408d-9cb4-a918d160a846", + "uuid": "78389d05-7c8c-466a-bf5e-9639b4db6938", "control-id": "cis_rhel10_5-1.17", "description": "No notes for control-id 5.1.17.", "props": [ @@ -29618,7 +29699,7 @@ ] }, { - "uuid": "a403ceba-b849-4960-9dfa-17f813e0934e", + "uuid": "e8b4f8cb-9848-450f-ac58-7859d0e00212", "control-id": "cis_rhel10_5-1.18", "description": "No notes for control-id 5.1.18.", "props": [ @@ -29635,7 +29716,7 @@ ] }, { - "uuid": "97d089b7-ab1f-4a9f-bb39-2c79dec521c9", + "uuid": "4a4190dd-5178-46c1-a0b4-c002908a143d", "control-id": "cis_rhel10_5-1.19", "description": "No notes for control-id 5.1.19.", "props": [ @@ -29652,7 +29733,7 @@ ] }, { - "uuid": "f6aa29d7-d9d4-4882-a278-2e9702fee65e", + "uuid": "b335f861-737c-4d01-a21c-d2cb492de555", "control-id": "cis_rhel10_5-1.20", "description": "No notes for control-id 5.1.20.", "props": [ @@ -29669,7 +29750,7 @@ ] }, { - "uuid": "831fa02b-ba62-40f8-b774-27b35831eb47", + "uuid": "b12a233a-9ae3-4be8-a483-68834383af0b", "control-id": "cis_rhel10_5-1.21", "description": "No notes for control-id 5.1.21.", "props": [ @@ -29686,7 +29767,7 @@ ] }, { - "uuid": "82016305-674f-499a-8db4-38782fd45db4", + "uuid": "d6826da9-e18e-40a6-b99e-20118c97ca12", "control-id": "cis_rhel10_5-1.22", "description": "No notes for control-id 5.1.22.", "props": [ @@ -29703,7 +29784,7 @@ ] }, { - "uuid": "5f6904c0-aefd-438c-a347-d2aa912ee29b", + "uuid": "2e10f02c-e568-4b06-a5a5-1a8301de0faa", "control-id": "cis_rhel10_5-2.1", "description": "No notes for control-id 5.2.1.", "props": [ @@ -29720,7 +29801,7 @@ ] }, { - "uuid": "168c7024-58f0-495a-bc5c-2403a905d232", + "uuid": "3e4ceaef-ef15-475f-a935-c3872677b2eb", "control-id": "cis_rhel10_5-2.2", "description": "No notes for control-id 5.2.2.", "props": [ @@ -29737,7 +29818,7 @@ ] }, { - "uuid": "21afe0ab-bc07-4d49-9728-e4e40f4d7c26", + "uuid": "c2743713-ad4d-4129-904f-69c0716d23c5", "control-id": "cis_rhel10_5-2.3", "description": "No notes for control-id 5.2.3.", "props": [ @@ -29754,7 +29835,7 @@ ] }, { - "uuid": "e1d4b996-bbae-4736-8cd0-c05cfdc3f168", + "uuid": "186eb317-56df-4853-8387-3e49c9bc0632", "control-id": "cis_rhel10_5-2.5", "description": "No notes for control-id 5.2.5.", "props": [ @@ -29771,7 +29852,7 @@ ] }, { - "uuid": "77bd3d84-c6f3-4c17-acb6-e3f6c59ad4df", + "uuid": "f7b432c3-1085-48ca-adff-d9667206b4e2", "control-id": "cis_rhel10_5-2.6", "description": "No notes for control-id 5.2.6.", "props": [ @@ -29788,7 +29869,7 @@ ] }, { - "uuid": "77cae2e5-e348-4103-b61c-fa484601e9f2", + "uuid": "9b7d3f28-96a0-45b5-a2c4-145bf2ff76ca", "control-id": "cis_rhel10_5-2.7", "description": "Members of \"wheel\" or GID 0 groups are checked by default if the group option is not set for\npam_wheel.so module. The recommendation states the group should be empty to reinforce the\nuse of \"sudo\" for privileged access. Therefore, members of these groups should be manually\nchecked or a different group should be informed.", "props": [ @@ -29810,7 +29891,7 @@ ] }, { - "uuid": "d0a5695c-fb8e-4794-b25b-33272dedb232", + "uuid": "9aacec40-0e93-4a6c-b603-068cef75ea64", "control-id": "cis_rhel10_5-3.1.1", "description": "This requirement is hard to be automated without any specific requirement. The policy even\nstates that provided commands are examples, other custom settings might be in place and the\nsettings might be different depending on site policies. The other rules will already make\nsure there is a correct autheselect profile regardless of the existing settings. It is\nnecessary to better discuss with CIS Community.", "props": [ @@ -29822,7 +29903,7 @@ ] }, { - "uuid": "0eb61000-2ee3-4307-a3ce-7af5b0485aae", + "uuid": "87812294-8e4c-470a-9e73-e3246c76646a", "control-id": "cis_rhel10_5-3.1.2", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.1.", "props": [ @@ -29844,7 +29925,7 @@ ] }, { - "uuid": "517b3445-18d5-4973-81b9-607747e68979", + "uuid": "9870a318-625f-4997-affa-e4367d35bff3", "control-id": "cis_rhel10_5-3.1.3", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.2.", "props": [ @@ -29871,7 +29952,7 @@ ] }, { - "uuid": "d4db87f3-ca1e-4fbf-952e-d9716e2c3497", + "uuid": "49f89900-edbf-44ac-9d17-f4a861e13c61", "control-id": "cis_rhel10_5-3.1.4", "description": "The module is properly enabled by the rules mentioned in related_rules.\nRequirements in 5.3.2.3 use these rules.", "props": [ @@ -29883,7 +29964,7 @@ ] }, { - "uuid": "bc478cae-56d8-4038-8ecf-91570d7bd331", + "uuid": "e406f9d7-ee31-48e1-9c65-f22856507b47", "control-id": "cis_rhel10_5-3.1.5", "description": "No notes for control-id 5.3.1.5.", "props": [ @@ -29900,7 +29981,7 @@ ] }, { - "uuid": "93bd4178-add7-4f1f-8960-d99bf41667dd", + "uuid": "edb3e79d-7824-4f4d-ac83-a92e71c6959f", "control-id": "cis_rhel10_5-3.2.1.1", "description": "No notes for control-id 5.3.2.1.1.", "props": [ @@ -29917,7 +29998,7 @@ ] }, { - "uuid": "a6b5636c-d1a0-4ca9-83ef-bfc49a6e59e3", + "uuid": "da84570d-0f08-4078-ab9a-899f0c33ad83", "control-id": "cis_rhel10_5-3.2.1.2", "description": "The policy also accepts value 0, which means the locked accounts should be manually unlocked\nby an administrator. However, it also mentions that using value 0 can facilitate a DoS\nattack to legitimate users.", "props": [ @@ -29934,7 +30015,7 @@ ] }, { - "uuid": "7555693e-c66c-4cd5-8164-24a2b3f1e224", + "uuid": "8a738286-b8e4-4211-a5ad-3cc45276d0cf", "control-id": "cis_rhel10_5-3.2.2.1", "description": "No notes for control-id 5.3.2.2.1.", "props": [ @@ -29951,7 +30032,7 @@ ] }, { - "uuid": "a59c9b55-f069-4939-a37a-462100c8e647", + "uuid": "b71ca97a-4d2f-49a4-be74-4d901bc5ef68", "control-id": "cis_rhel10_5-3.2.2.2", "description": "No notes for control-id 5.3.2.2.2.", "props": [ @@ -29968,7 +30049,7 @@ ] }, { - "uuid": "9aa760b3-eab7-43e7-b4fe-4f90ea70bac7", + "uuid": "cc09f2c0-59e5-474e-b5eb-02a76b36629d", "control-id": "cis_rhel10_5-3.2.2.3", "description": "This requirement is expected to be manual. However, in previous versions of the policy\nit was already automated the configuration of \"minclass\" option. This posture was kept for\nRHEL 10 in this new version. Rules related to other options are informed in related_rules.\nIn short, minclass=4 alone can achieve the same result achieved by the combination of the\nother 4 options mentioned in the policy.", "props": [ @@ -29985,7 +30066,7 @@ ] }, { - "uuid": "8f348608-dbed-4181-94e7-38c115caab3f", + "uuid": "77cbd447-a3d7-4c0d-99fb-cd79e5533de3", "control-id": "cis_rhel10_5-3.2.2.4", "description": "No notes for control-id 5.3.2.2.4.", "props": [ @@ -30002,7 +30083,7 @@ ] }, { - "uuid": "973ad207-ba7b-49a1-8fcb-5e5f7c9dbf72", + "uuid": "47384c2c-ba74-4abf-a7e4-8d54c13dc4d6", "control-id": "cis_rhel10_5-3.2.2.5", "description": "No notes for control-id 5.3.2.2.5.", "props": [ @@ -30019,7 +30100,7 @@ ] }, { - "uuid": "93089651-6a22-4889-b7a8-e45e5beda36f", + "uuid": "eb608ffe-13e0-4da8-aeff-4aade4937e86", "control-id": "cis_rhel10_5-3.2.2.6", "description": "No notes for control-id 5.3.2.2.6.", "props": [ @@ -30036,7 +30117,7 @@ ] }, { - "uuid": "e9245dea-9487-47af-b9ad-276c77cb0a3a", + "uuid": "14ce8ca7-5ad6-411a-9d67-301c5bec0b72", "control-id": "cis_rhel10_5-3.2.2.7", "description": "No notes for control-id 5.3.2.2.7.", "props": [ @@ -30053,7 +30134,7 @@ ] }, { - "uuid": "122b47ae-f6d5-48d3-9c17-74c48e51c89b", + "uuid": "27d880d5-9507-4a1f-aab0-d20570233588", "control-id": "cis_rhel10_5-3.2.3.1", "description": "Although mentioned in the section 5.3.3.3, there is no explicit requirement to configure\nretry option of pam_pwhistory. If come in the future, the rule accounts_password_pam_retry\ncan be used.", "props": [ @@ -30075,7 +30156,7 @@ ] }, { - "uuid": "c3d8b5b3-affc-4434-b705-2b9e5868897a", + "uuid": "952a7af3-d0e2-4b90-b7e1-d788bb409d66", "control-id": "cis_rhel10_5-3.2.3.2", "description": "No notes for control-id 5.3.2.3.2.", "props": [ @@ -30092,7 +30173,7 @@ ] }, { - "uuid": "80b82fcd-c8b5-4b39-bd02-805a8d516dd4", + "uuid": "07d5df1f-4cd5-4a7c-a6bc-fb4a8f7b4349", "control-id": "cis_rhel10_5-3.2.3.3", "description": "In RHEL 10 pam_pwhistory is enabled via authselect feature, as required in 5.3.1.4. The\nfeature automatically set \"use_authok\" option. In any case, we don't have a rule to check\nthis option specifically.", "props": [ @@ -30109,7 +30190,7 @@ ] }, { - "uuid": "04ce474e-c37e-4391-884a-51077ade60e1", + "uuid": "4f85f904-dc13-4dc5-894a-7dd9b797f1f7", "control-id": "cis_rhel10_5-3.2.4.1", "description": "The rule more specifically used in this requirement also satify the requirement 5.3.1.5.", "props": [ @@ -30126,7 +30207,7 @@ ] }, { - "uuid": "3f30518f-8088-4ed3-95b4-1e6d26b544a6", + "uuid": "0bffd58f-328f-4a98-aca3-2896f498362e", "control-id": "cis_rhel10_5-3.2.4.2", "description": "Usage of pam_unix.so module together with \"remember\" option is deprecated and is not\nrecommended by this policy. Instead, it should be used remember option of pam_pwhistory\nmodule, as required in 5.3.2.3.1. See here for more details about pam_unix.so:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1778929", "props": [ @@ -30143,7 +30224,7 @@ ] }, { - "uuid": "bc7c3c8a-5f3c-4531-bd07-ced45f86268d", + "uuid": "15827763-9963-40cd-84fa-86feaf0abe25", "control-id": "cis_rhel10_5-3.2.4.3", "description": "Changes in logindefs mentioned in this requirement are more specifically covered by 5.4.1.4", "props": [ @@ -30165,7 +30246,7 @@ ] }, { - "uuid": "0f1a44a6-be6a-4266-8100-1c5d44edf471", + "uuid": "eaca231a-7f6a-4930-899d-c8dde840c82c", "control-id": "cis_rhel10_5-3.2.4.4", "description": "In RHEL 10 pam_unix is enabled by default in all authselect profiles already with the\nuse_authtok option set. In any case, we don't have a rule to check this option specifically,\nlike in 5.3.2.3.3.", "props": [ @@ -30182,7 +30263,7 @@ ] }, { - "uuid": "9a6c438d-1a8f-4ac7-99bb-802d32f71ebd", + "uuid": "136ab7ee-89cc-451b-8c0c-42a0da9b07f6", "control-id": "cis_rhel10_5-4.1.1", "description": "No notes for control-id 5.4.1.1.", "props": [ @@ -30204,7 +30285,7 @@ ] }, { - "uuid": "8dd14ecb-7361-4ee4-98ed-78bb5052d1bd", + "uuid": "d9c719e4-f291-4ff1-accc-915a7aa9005e", "control-id": "cis_rhel10_5-4.1.3", "description": "No notes for control-id 5.4.1.3.", "props": [ @@ -30226,7 +30307,7 @@ ] }, { - "uuid": "479bc838-00a6-4e7a-8ec7-e047b317228d", + "uuid": "e22f6968-66a0-4886-be55-6dd3bf16095e", "control-id": "cis_rhel10_5-4.1.4", "description": "There's a \"new\" set of options in /etc/login.defs file to define the number of iterations\nperformed during the hashing process.", "props": [ @@ -30248,7 +30329,7 @@ ] }, { - "uuid": "3fc86471-f698-40ea-a1c4-08c157d917bc", + "uuid": "e829575f-6356-49e1-9d1e-4b0479eef15a", "control-id": "cis_rhel10_5-4.1.5", "description": "No notes for control-id 5.4.1.5.", "props": [ @@ -30270,7 +30351,7 @@ ] }, { - "uuid": "0d45a161-f39b-4eb4-bb36-37823e5acd24", + "uuid": "fb6e205a-fa2e-436e-a55d-17c68ca9ef7e", "control-id": "cis_rhel10_5-4.1.6", "description": "No notes for control-id 5.4.1.6.", "props": [ @@ -30287,7 +30368,7 @@ ] }, { - "uuid": "62429839-28c0-4ce9-a382-d9839250d6a6", + "uuid": "ae6d203b-1002-448c-b49f-a94726914b90", "control-id": "cis_rhel10_5-4.2.1", "description": "No notes for control-id 5.4.2.1.", "props": [ @@ -30304,7 +30385,7 @@ ] }, { - "uuid": "5fb63d4a-e739-42a0-a353-d49bee0a4559", + "uuid": "155dfc6c-51e8-42a1-b288-1cf111c9e271", "control-id": "cis_rhel10_5-4.2.2", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -30321,7 +30402,7 @@ ] }, { - "uuid": "95b89d04-835b-462a-8aff-fbefe5adf249", + "uuid": "3ea23490-dbc5-4e29-b5ff-4ac4659cd491", "control-id": "cis_rhel10_5-4.2.3", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -30338,7 +30419,7 @@ ] }, { - "uuid": "46accdb3-a0fc-4134-b7ca-8cb0f2f11e00", + "uuid": "23b0d7f4-b0c2-4ae1-ae27-096a5d1e35c4", "control-id": "cis_rhel10_5-4.2.4", "description": "No notes for control-id 5.4.2.4.", "props": [ @@ -30355,7 +30436,7 @@ ] }, { - "uuid": "1cc8944e-657c-43fd-9f98-7959347b7b4b", + "uuid": "43495795-6a79-4e95-8b1e-f99ecbb79dea", "control-id": "cis_rhel10_5-4.2.5", "description": "No notes for control-id 5.4.2.5.", "props": [ @@ -30377,7 +30458,7 @@ ] }, { - "uuid": "45a0e049-26c7-4f6a-9103-efda8b92ab84", + "uuid": "16823c31-558e-4ebd-9e41-9810e29d3d5b", "control-id": "cis_rhel10_5-4.2.6", "description": "No notes for control-id 5.4.2.6.", "props": [ @@ -30394,7 +30475,7 @@ ] }, { - "uuid": "1ec07de3-1371-4cd8-ad8e-9c727150029b", + "uuid": "9a11181a-8c26-463b-ae54-6d5d741d1d79", "control-id": "cis_rhel10_5-4.2.7", "description": "No notes for control-id 5.4.2.7.", "props": [ @@ -30416,19 +30497,24 @@ ] }, { - "uuid": "52eaa073-ff62-4f5b-a00f-8e1f81bcf282", + "uuid": "e9c819a0-0518-4c14-ab92-d82cca34e7e8", "control-id": "cis_rhel10_5-4.2.8", - "description": "New rule is necessary.", + "description": "No notes for control-id 5.4.2.8.", "props": [ { "name": "implementation-status", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "implemented" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "no_invalid_shell_accounts_unlocked" } ] }, { - "uuid": "76353950-c64f-4bda-899c-894c34e0921f", + "uuid": "f563e182-48ca-4b64-8922-0e032baa599a", "control-id": "cis_rhel10_5-4.3.2", "description": "No notes for control-id 5.4.3.2.", "props": [ @@ -30445,7 +30531,7 @@ ] }, { - "uuid": "7a90ab90-dedc-4e49-8633-836550910ced", + "uuid": "0181aa61-d5f3-4cd5-8b89-2b5585d4fe45", "control-id": "cis_rhel10_5-4.3.3", "description": "No notes for control-id 5.4.3.3.", "props": [ @@ -30472,7 +30558,7 @@ ] }, { - "uuid": "1ea04409-605c-4cfd-877a-67fba3e8435d", + "uuid": "1a48f010-6b50-4048-81af-57fbedb14abe", "control-id": "cis_rhel10_6-1.1", "description": "No notes for control-id 6.1.1.", "props": [ @@ -30494,7 +30580,7 @@ ] }, { - "uuid": "85f4031d-7a93-4b95-b5cd-b3ee227a3712", + "uuid": "e07552a5-6610-4a17-941f-f6ef93b1853a", "control-id": "cis_rhel10_6-1.2", "description": "No notes for control-id 6.1.2.", "props": [ @@ -30511,7 +30597,7 @@ ] }, { - "uuid": "402bec13-ee86-47eb-a6a5-81b262c34e6b", + "uuid": "28713621-de2b-4557-bf17-9b481a1a2aa6", "control-id": "cis_rhel10_6-1.3", "description": "No notes for control-id 6.1.3.", "props": [ @@ -30528,7 +30614,7 @@ ] }, { - "uuid": "eb77692a-8025-44de-afd1-2a3a768d818c", + "uuid": "c1dd35fd-11f0-41bf-a060-35a37adfa193", "control-id": "cis_rhel10_6-2.1.1", "description": "No notes for control-id 6.2.1.1.", "props": [ @@ -30545,7 +30631,7 @@ ] }, { - "uuid": "786aeba6-1ece-4e24-b34d-a39e65c728b3", + "uuid": "e8e3326b-ebca-46f6-897d-2c525214e56a", "control-id": "cis_rhel10_6-2.1.2", "description": "The description for control-id cis_rhel10_6-2.1.2.", "props": [ @@ -30558,7 +30644,7 @@ ] }, { - "uuid": "f0289534-633e-402d-b603-75a30c5dc43c", + "uuid": "5f2d4f88-dc5b-44ed-9c9b-4b7a4d3e7b8f", "control-id": "cis_rhel10_6-2.1.3", "description": "The description for control-id cis_rhel10_6-2.1.3.", "props": [ @@ -30571,20 +30657,24 @@ ] }, { - "uuid": "7f081707-daad-422c-8bb5-80c7e9d199e6", + "uuid": "7e7ee7b4-b1e0-4ab1-ade0-5d9950770d15", "control-id": "cis_rhel10_6-2.1.4", - "description": "The description for control-id cis_rhel10_6-2.1.4.", + "description": "No notes for control-id 6.2.1.4.", "props": [ { "name": "implementation-status", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "alternative", - "remarks": "It is necessary to create a new rule to check the status of journald and rsyslog.\nIt would also be necessary a new rule to disable or remove rsyslog." + "value": "implemented" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "ensure_journald_and_rsyslog_not_active_together" } ] }, { - "uuid": "4b562ebc-fe77-4f69-b832-4430f52b53b2", + "uuid": "66201e7d-a519-4f1e-a811-614b9fa47a26", "control-id": "cis_rhel10_6-2.2.1.1", "description": "No notes for control-id 6.2.2.1.1.", "props": [ @@ -30601,7 +30691,7 @@ ] }, { - "uuid": "c9ea5d6c-5960-42fd-84e9-51e4ead8bdfe", + "uuid": "be307ae5-259b-499a-871c-00cafdc31a78", "control-id": "cis_rhel10_6-2.2.1.2", "description": "The description for control-id cis_rhel10_6-2.2.1.2.", "props": [ @@ -30614,7 +30704,7 @@ ] }, { - "uuid": "e8fdba55-b933-4058-847e-6b93071b44df", + "uuid": "eac2df58-b995-4a95-b854-cd47867fcef3", "control-id": "cis_rhel10_6-2.2.1.3", "description": "No notes for control-id 6.2.2.1.3.", "props": [ @@ -30631,7 +30721,7 @@ ] }, { - "uuid": "e9f66b54-6dde-42c3-9e64-ef16d9ec9eb5", + "uuid": "78606759-74cb-43b2-b504-f11ed8564798", "control-id": "cis_rhel10_6-2.2.1.4", "description": "No notes for control-id 6.2.2.1.4.", "props": [ @@ -30648,7 +30738,7 @@ ] }, { - "uuid": "70b08482-f8d7-47ed-8972-5e8e0d3143f6", + "uuid": "b351a412-62c9-4559-8d15-e86a54af8ba5", "control-id": "cis_rhel10_6-2.2.2", "description": "No notes for control-id 6.2.2.2.", "props": [ @@ -30665,7 +30755,7 @@ ] }, { - "uuid": "7e6dd914-cda3-4439-adda-c6a2f3b1f70b", + "uuid": "429a0c38-4351-4ed6-899a-2af33a3f6044", "control-id": "cis_rhel10_6-2.2.3", "description": "No notes for control-id 6.2.2.3.", "props": [ @@ -30682,7 +30772,7 @@ ] }, { - "uuid": "e8e94e4b-90a5-45ac-a073-db9c7f330f8d", + "uuid": "89e771c0-9b29-46f1-b88c-e24fe0b94a75", "control-id": "cis_rhel10_6-2.2.4", "description": "No notes for control-id 6.2.2.4.", "props": [ @@ -30699,7 +30789,7 @@ ] }, { - "uuid": "b70d037a-f02f-4e5b-ae85-2751741fd9ba", + "uuid": "1c0638fc-c162-4b16-a326-a6d94fcc065a", "control-id": "cis_rhel10_6-2.3.1", "description": "No notes for control-id 6.2.3.1.", "props": [ @@ -30711,7 +30801,7 @@ ] }, { - "uuid": "49e506c4-0788-4d5f-ad27-e276205890b5", + "uuid": "a8e0e41c-ea01-4a0d-a9cb-9bc8d959657b", "control-id": "cis_rhel10_6-2.3.2", "description": "No notes for control-id 6.2.3.2.", "props": [ @@ -30723,7 +30813,7 @@ ] }, { - "uuid": "69993a99-29ed-4927-8735-68bab1b165df", + "uuid": "55b2498e-658f-4d13-bfe2-a2c97aae2805", "control-id": "cis_rhel10_6-2.3.3", "description": "No notes for control-id 6.2.3.3.", "props": [ @@ -30735,7 +30825,7 @@ ] }, { - "uuid": "6f5be2fa-8149-4d4a-a10d-53d3e5031290", + "uuid": "28727ce7-df8c-4089-ac7d-3c5b9f9e178a", "control-id": "cis_rhel10_6-2.3.4", "description": "No notes for control-id 6.2.3.4.", "props": [ @@ -30747,7 +30837,7 @@ ] }, { - "uuid": "84738ad5-c417-4d45-921d-16ff5948abec", + "uuid": "b5eaabf8-6636-471c-b9d5-7ec8d6b9d579", "control-id": "cis_rhel10_6-2.3.5", "description": "The description for control-id cis_rhel10_6-2.3.5.", "props": [ @@ -30760,7 +30850,7 @@ ] }, { - "uuid": "74b7147a-95ae-4411-8512-806d898396ca", + "uuid": "ec5872f2-117a-48e3-b170-a8fd2f9d0b2a", "control-id": "cis_rhel10_6-2.3.6", "description": "The description for control-id cis_rhel10_6-2.3.6.", "props": [ @@ -30773,7 +30863,7 @@ ] }, { - "uuid": "99445702-d773-4f43-8bfc-9ea5342ed123", + "uuid": "1e5460bb-4d28-4592-80bc-8f1852b766a6", "control-id": "cis_rhel10_6-2.3.7", "description": "No notes for control-id 6.2.3.7.", "props": [ @@ -30785,7 +30875,7 @@ ] }, { - "uuid": "3a6a2d20-1919-418d-a3ce-825c166a4060", + "uuid": "f264b966-0209-4286-b4ec-68f1ff432413", "control-id": "cis_rhel10_6-2.3.8", "description": "The description for control-id cis_rhel10_6-2.3.8.", "props": [ @@ -30798,7 +30888,7 @@ ] }, { - "uuid": "5e4d3e35-80d9-4389-8a2c-6747ba66e3d9", + "uuid": "fd585079-a96b-40a5-8824-9d64f9a63b55", "control-id": "cis_rhel10_6-2.4.1", "description": "It is not harmful to run these rules even if rsyslog is not installed or active.", "props": [ @@ -30825,7 +30915,7 @@ ] }, { - "uuid": "a7b931ee-b709-4603-b5e6-47ac52a77283", + "uuid": "233bee3d-8537-4638-ba18-79effb8fe945", "control-id": "cis_rhel10_7-1.1", "description": "No notes for control-id 7.1.1.", "props": [ @@ -30852,7 +30942,7 @@ ] }, { - "uuid": "1d1e8d70-7454-49ae-ae2f-6ae494312b30", + "uuid": "70e4e706-6776-4c9f-9613-e18a5c246d97", "control-id": "cis_rhel10_7-1.2", "description": "No notes for control-id 7.1.2.", "props": [ @@ -30879,7 +30969,7 @@ ] }, { - "uuid": "2b02eced-91e0-463a-9566-af7df4e1a9c6", + "uuid": "54d11a66-ee06-424a-9ffe-17fd73687690", "control-id": "cis_rhel10_7-1.3", "description": "No notes for control-id 7.1.3.", "props": [ @@ -30906,7 +30996,7 @@ ] }, { - "uuid": "9aeb05cd-fd60-4a19-a192-ddafb38cdb6f", + "uuid": "ee9d44cc-7dcf-4c6a-8d68-2dfdc9ea01dc", "control-id": "cis_rhel10_7-1.4", "description": "No notes for control-id 7.1.4.", "props": [ @@ -30933,7 +31023,7 @@ ] }, { - "uuid": "e9f22566-fa06-4b15-a7e9-df2770de3c17", + "uuid": "993fdb30-ae5d-4abd-b9ca-0f5e2021052d", "control-id": "cis_rhel10_7-1.5", "description": "No notes for control-id 7.1.5.", "props": [ @@ -30960,7 +31050,7 @@ ] }, { - "uuid": "aef625c8-ed5f-415c-a09e-9065b59f5b05", + "uuid": "1a0f3374-4648-4888-9a8f-b6e6bee456dc", "control-id": "cis_rhel10_7-1.6", "description": "No notes for control-id 7.1.6.", "props": [ @@ -30987,7 +31077,7 @@ ] }, { - "uuid": "b257be93-91f9-43b1-9029-9fbd1eb83c86", + "uuid": "3ee8a08b-ffaf-4c28-9ae7-d5463fee671c", "control-id": "cis_rhel10_7-1.7", "description": "No notes for control-id 7.1.7.", "props": [ @@ -31014,7 +31104,7 @@ ] }, { - "uuid": "c14cc767-c754-4a58-a6e3-f210bee46d30", + "uuid": "814da729-be96-4ee6-b768-8e07d4e0b7f4", "control-id": "cis_rhel10_7-1.8", "description": "No notes for control-id 7.1.8.", "props": [ @@ -31041,7 +31131,7 @@ ] }, { - "uuid": "dcd19737-bd71-4495-a4a2-1a5ba786854f", + "uuid": "01dfd7ed-5095-40d5-9847-4ab3ee047b0a", "control-id": "cis_rhel10_7-1.9", "description": "No notes for control-id 7.1.9.", "props": [ @@ -31068,7 +31158,7 @@ ] }, { - "uuid": "ab0998c9-f9fe-4d37-8420-038114b44d44", + "uuid": "7deb6c14-6234-4e5a-9d98-068d87da2591", "control-id": "cis_rhel10_7-1.10", "description": "No notes for control-id 7.1.10.", "props": [ @@ -31110,7 +31200,7 @@ ] }, { - "uuid": "a19c3232-d320-4c8e-a445-783251920684", + "uuid": "aa4b1ed5-5d53-4003-a42d-ed9b5c05debd", "control-id": "cis_rhel10_7-1.11", "description": "No notes for control-id 7.1.11.", "props": [ @@ -31132,7 +31222,7 @@ ] }, { - "uuid": "652efb64-0fbb-4a8f-85a0-d1dd8d18b59a", + "uuid": "3e976702-2081-4c34-b9cd-c4c9bb7726b6", "control-id": "cis_rhel10_7-1.12", "description": "No notes for control-id 7.1.12.", "props": [ @@ -31154,7 +31244,7 @@ ] }, { - "uuid": "1f2aff2b-e1b1-44d4-b522-50978370a8cf", + "uuid": "db9114a1-782c-4205-9c4f-dc1723067a30", "control-id": "cis_rhel10_7-1.13", "description": "The description for control-id cis_rhel10_7-1.13.", "props": [ @@ -31167,7 +31257,7 @@ ] }, { - "uuid": "8cea2946-51d6-4f68-bdaf-b4a7e16f0095", + "uuid": "e18266ce-629e-42dd-b7de-aea17b92a41c", "control-id": "cis_rhel10_7-2.1", "description": "No notes for control-id 7.2.1.", "props": [ @@ -31184,7 +31274,7 @@ ] }, { - "uuid": "89f74498-8d19-4fe7-9a94-64e34410d19c", + "uuid": "dd5c959f-187a-49d8-9cd4-1673d5dc91ef", "control-id": "cis_rhel10_7-2.2", "description": "No notes for control-id 7.2.2.", "props": [ @@ -31201,7 +31291,7 @@ ] }, { - "uuid": "18a1b8c2-da21-4e57-a439-52d73d65da64", + "uuid": "41656683-7ef0-4595-a754-e98373c4ec18", "control-id": "cis_rhel10_7-2.3", "description": "No notes for control-id 7.2.3.", "props": [ @@ -31218,7 +31308,7 @@ ] }, { - "uuid": "b03cad7e-c5a5-4adc-9f8f-59e0f4a35239", + "uuid": "f7fc01d9-94d5-4cb4-8df7-ce729ed95ed7", "control-id": "cis_rhel10_7-2.4", "description": "No notes for control-id 7.2.4.", "props": [ @@ -31235,7 +31325,7 @@ ] }, { - "uuid": "fe160430-2bf3-43fc-be42-2e3f0cabfb5e", + "uuid": "56ffe900-0209-4929-84e9-22cb7a72383b", "control-id": "cis_rhel10_7-2.5", "description": "No notes for control-id 7.2.5.", "props": [ @@ -31252,7 +31342,7 @@ ] }, { - "uuid": "c3c6dd21-4c7f-468f-9fa8-a0f54660f2bd", + "uuid": "4347f8ff-d50d-4912-89ce-ed68711e32d9", "control-id": "cis_rhel10_7-2.6", "description": "No notes for control-id 7.2.6.", "props": [ @@ -31269,7 +31359,7 @@ ] }, { - "uuid": "db500e5c-e96f-4599-ac69-8c34cf999552", + "uuid": "9da46c20-4f5d-44fe-9924-6934e09f4d77", "control-id": "cis_rhel10_7-2.7", "description": "No notes for control-id 7.2.7.", "props": [ @@ -31286,7 +31376,7 @@ ] }, { - "uuid": "e812c160-9c9c-43ef-9f58-4e667ef58e26", + "uuid": "db7a6030-6463-4ea7-bbad-dc3e6ff652ed", "control-id": "cis_rhel10_7-2.8", "description": "No notes for control-id 7.2.8.", "props": [ @@ -31313,7 +31403,7 @@ ] }, { - "uuid": "950ad4ab-2f32-4781-abc1-d9a2c4dddf5f", + "uuid": "c8defcae-e335-4be9-a3c4-273347ec51d3", "control-id": "cis_rhel10_7-2.9", "description": "No notes for control-id 7.2.9.", "props": [ diff --git a/component-definitions/rhel10/rhel10-cis_rhel10-l2_workstation/component-definition.json b/component-definitions/rhel10/rhel10-cis_rhel10-l2_workstation/component-definition.json index c312eafd..f85b4159 100644 --- a/component-definitions/rhel10/rhel10-cis_rhel10-l2_workstation/component-definition.json +++ b/component-definitions/rhel10/rhel10-cis_rhel10-l2_workstation/component-definition.json @@ -3,8 +3,8 @@ "uuid": "9025707c-c78d-4c60-a2df-d0a822467a29", "metadata": { "title": "Component definition for rhel10", - "last-modified": "2025-12-11T18:27:13.164275+00:00", - "version": "4.3", + "last-modified": "2025-12-15T16:33:32.096994+00:00", + "version": "4.4", "oscal-version": "1.1.3" }, "components": [ @@ -4151,2263 +4151,2287 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_tmout", + "value": "no_invalid_shell_accounts_unlocked", "remarks": "rule_set_244" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Interactive Session Timeout", + "value": "Verify Non-Interactive Accounts Are Locked", "remarks": "rule_set_244" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_bashrc", + "value": "accounts_tmout", "remarks": "rule_set_245" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Bash Umask is Set Correctly", + "value": "Set Interactive Session Timeout", "remarks": "rule_set_245" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_login_defs", + "value": "accounts_umask_etc_bashrc", "remarks": "rule_set_246" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Umask is Set Correctly in login.defs", + "value": "Ensure the Default Bash Umask is Set Correctly", "remarks": "rule_set_246" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_profile", + "value": "accounts_umask_etc_login_defs", "remarks": "rule_set_247" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Umask is Set Correctly in /etc/profile", + "value": "Ensure the Default Umask is Set Correctly in login.defs", "remarks": "rule_set_247" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_aide_installed", + "value": "accounts_umask_etc_profile", "remarks": "rule_set_248" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install AIDE", + "value": "Ensure the Default Umask is Set Correctly in /etc/profile", "remarks": "rule_set_248" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_build_database", + "value": "package_aide_installed", "remarks": "rule_set_249" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Build and Test AIDE Database", + "value": "Install AIDE", "remarks": "rule_set_249" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_periodic_cron_checking", + "value": "aide_build_database", "remarks": "rule_set_250" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Periodic Execution of AIDE", + "value": "Build and Test AIDE Database", "remarks": "rule_set_250" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_check_audit_tools", + "value": "aide_periodic_cron_checking", "remarks": "rule_set_251" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure AIDE to Verify the Audit Tools", + "value": "Configure Periodic Execution of AIDE", "remarks": "rule_set_251" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_systemd-journald_enabled", + "value": "aide_check_audit_tools", "remarks": "rule_set_252" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable systemd-journald Service", + "value": "Configure AIDE to Verify the Audit Tools", "remarks": "rule_set_252" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_systemd-journal-remote_installed", + "value": "service_systemd-journald_enabled", "remarks": "rule_set_253" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install systemd-journal-remote Package", + "value": "Enable systemd-journald Service", "remarks": "rule_set_253" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_systemd-journal-upload_enabled", + "value": "ensure_journald_and_rsyslog_not_active_together", "remarks": "rule_set_254" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable systemd-journal-upload Service", + "value": "Ensure journald and rsyslog Are Not Active Together", "remarks": "rule_set_254" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "socket_systemd-journal-remote_disabled", + "value": "package_systemd-journal-remote_installed", "remarks": "rule_set_255" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable systemd-journal-remote Socket", + "value": "Install systemd-journal-remote Package", "remarks": "rule_set_255" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_disable_forward_to_syslog", + "value": "service_systemd-journal-upload_enabled", "remarks": "rule_set_256" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald ForwardToSyslog is disabled", + "value": "Enable systemd-journal-upload Service", "remarks": "rule_set_256" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_compress", + "value": "socket_systemd-journal-remote_disabled", "remarks": "rule_set_257" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald is configured to compress large log files", + "value": "Disable systemd-journal-remote Socket", "remarks": "rule_set_257" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_storage", + "value": "journald_disable_forward_to_syslog", "remarks": "rule_set_258" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald is configured to write log files to persistent disk", + "value": "Ensure journald ForwardToSyslog is disabled", "remarks": "rule_set_258" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_groupownership", + "value": "journald_compress", "remarks": "rule_set_259" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Log Files Are Owned By Appropriate Group", + "value": "Ensure journald is configured to compress large log files", "remarks": "rule_set_259" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_ownership", + "value": "journald_storage", "remarks": "rule_set_260" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Log Files Are Owned By Appropriate User", + "value": "Ensure journald is configured to write log files to persistent disk", "remarks": "rule_set_260" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_permissions", + "value": "rsyslog_files_groupownership", "remarks": "rule_set_261" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure System Log Files Have Correct Permissions", + "value": "Ensure Log Files Are Owned By Appropriate Group", "remarks": "rule_set_261" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_passwd", + "value": "rsyslog_files_ownership", "remarks": "rule_set_262" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns passwd File", + "value": "Ensure Log Files Are Owned By Appropriate User", "remarks": "rule_set_262" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_passwd", + "value": "rsyslog_files_permissions", "remarks": "rule_set_263" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns passwd File", + "value": "Ensure System Log Files Have Correct Permissions", "remarks": "rule_set_263" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_passwd", + "value": "file_groupowner_etc_passwd", "remarks": "rule_set_264" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on passwd File", + "value": "Verify Group Who Owns passwd File", "remarks": "rule_set_264" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_passwd", + "value": "file_owner_etc_passwd", "remarks": "rule_set_265" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup passwd File", + "value": "Verify User Who Owns passwd File", "remarks": "rule_set_265" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_passwd", + "value": "file_permissions_etc_passwd", "remarks": "rule_set_266" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup passwd File", + "value": "Verify Permissions on passwd File", "remarks": "rule_set_266" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_passwd", + "value": "file_groupowner_backup_etc_passwd", "remarks": "rule_set_267" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup passwd File", + "value": "Verify Group Who Owns Backup passwd File", "remarks": "rule_set_267" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_group", + "value": "file_owner_backup_etc_passwd", "remarks": "rule_set_268" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns group File", + "value": "Verify User Who Owns Backup passwd File", "remarks": "rule_set_268" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_group", + "value": "file_permissions_backup_etc_passwd", "remarks": "rule_set_269" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns group File", + "value": "Verify Permissions on Backup passwd File", "remarks": "rule_set_269" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_group", + "value": "file_groupowner_etc_group", "remarks": "rule_set_270" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on group File", + "value": "Verify Group Who Owns group File", "remarks": "rule_set_270" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_group", + "value": "file_owner_etc_group", "remarks": "rule_set_271" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup group File", + "value": "Verify User Who Owns group File", "remarks": "rule_set_271" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_group", + "value": "file_permissions_etc_group", "remarks": "rule_set_272" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup group File", + "value": "Verify Permissions on group File", "remarks": "rule_set_272" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_group", + "value": "file_groupowner_backup_etc_group", "remarks": "rule_set_273" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup group File", + "value": "Verify Group Who Owns Backup group File", "remarks": "rule_set_273" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_shadow", + "value": "file_owner_backup_etc_group", "remarks": "rule_set_274" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns shadow File", + "value": "Verify User Who Owns Backup group File", "remarks": "rule_set_274" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_shadow", + "value": "file_permissions_backup_etc_group", "remarks": "rule_set_275" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns shadow File", + "value": "Verify Permissions on Backup group File", "remarks": "rule_set_275" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_shadow", + "value": "file_owner_etc_shadow", "remarks": "rule_set_276" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on shadow File", + "value": "Verify User Who Owns shadow File", "remarks": "rule_set_276" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_shadow", + "value": "file_groupowner_etc_shadow", "remarks": "rule_set_277" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup shadow File", + "value": "Verify Group Who Owns shadow File", "remarks": "rule_set_277" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_shadow", + "value": "file_permissions_etc_shadow", "remarks": "rule_set_278" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup shadow File", + "value": "Verify Permissions on shadow File", "remarks": "rule_set_278" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_shadow", + "value": "file_groupowner_backup_etc_shadow", "remarks": "rule_set_279" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup shadow File", + "value": "Verify User Who Owns Backup shadow File", "remarks": "rule_set_279" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_gshadow", + "value": "file_owner_backup_etc_shadow", "remarks": "rule_set_280" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns gshadow File", + "value": "Verify Group Who Owns Backup shadow File", "remarks": "rule_set_280" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_gshadow", + "value": "file_permissions_backup_etc_shadow", "remarks": "rule_set_281" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns gshadow File", + "value": "Verify Permissions on Backup shadow File", "remarks": "rule_set_281" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_gshadow", + "value": "file_groupowner_etc_gshadow", "remarks": "rule_set_282" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on gshadow File", + "value": "Verify Group Who Owns gshadow File", "remarks": "rule_set_282" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_gshadow", + "value": "file_owner_etc_gshadow", "remarks": "rule_set_283" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup gshadow File", + "value": "Verify User Who Owns gshadow File", "remarks": "rule_set_283" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_gshadow", + "value": "file_permissions_etc_gshadow", "remarks": "rule_set_284" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup gshadow File", + "value": "Verify Permissions on gshadow File", "remarks": "rule_set_284" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_gshadow", + "value": "file_groupowner_backup_etc_gshadow", "remarks": "rule_set_285" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup gshadow File", + "value": "Verify Group Who Owns Backup gshadow File", "remarks": "rule_set_285" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_shells", + "value": "file_owner_backup_etc_gshadow", "remarks": "rule_set_286" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns /etc/shells File", + "value": "Verify User Who Owns Backup gshadow File", "remarks": "rule_set_286" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_shells", + "value": "file_permissions_backup_etc_gshadow", "remarks": "rule_set_287" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Who Owns /etc/shells File", + "value": "Verify Permissions on Backup gshadow File", "remarks": "rule_set_287" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_shells", + "value": "file_groupowner_etc_shells", "remarks": "rule_set_288" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on /etc/shells File", + "value": "Verify Group Who Owns /etc/shells File", "remarks": "rule_set_288" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_security_opasswd", + "value": "file_owner_etc_shells", "remarks": "rule_set_289" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns /etc/security/opasswd File", + "value": "Verify Who Owns /etc/shells File", "remarks": "rule_set_289" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_security_opasswd", + "value": "file_permissions_etc_shells", "remarks": "rule_set_290" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns /etc/security/opasswd File", + "value": "Verify Permissions on /etc/shells File", "remarks": "rule_set_290" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_security_opasswd", + "value": "file_groupowner_etc_security_opasswd", "remarks": "rule_set_291" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on /etc/security/opasswd File", + "value": "Verify Group Who Owns /etc/security/opasswd File", "remarks": "rule_set_291" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_security_opasswd_old", + "value": "file_owner_etc_security_opasswd", "remarks": "rule_set_292" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns /etc/security/opasswd.old File", + "value": "Verify User Who Owns /etc/security/opasswd File", "remarks": "rule_set_292" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_security_opasswd_old", + "value": "file_permissions_etc_security_opasswd", "remarks": "rule_set_293" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns /etc/security/opasswd.old File", + "value": "Verify Permissions on /etc/security/opasswd File", "remarks": "rule_set_293" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_security_opasswd_old", + "value": "file_groupowner_etc_security_opasswd_old", "remarks": "rule_set_294" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on /etc/security/opasswd.old File", + "value": "Verify Group Who Owns /etc/security/opasswd.old File", "remarks": "rule_set_294" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_unauthorized_world_writable", + "value": "file_owner_etc_security_opasswd_old", "remarks": "rule_set_295" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure No World-Writable Files Exist", + "value": "Verify User Who Owns /etc/security/opasswd.old File", "remarks": "rule_set_295" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dir_perms_world_writable_sticky_bits", + "value": "file_permissions_etc_security_opasswd_old", "remarks": "rule_set_296" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify that All World-Writable Directories Have Sticky Bits Set", + "value": "Verify Permissions on /etc/security/opasswd.old File", "remarks": "rule_set_296" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_files_or_dirs_unowned_by_user", + "value": "file_permissions_unauthorized_world_writable", "remarks": "rule_set_297" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All Files And Directories Are Owned by a User", + "value": "Ensure No World-Writable Files Exist", "remarks": "rule_set_297" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_files_or_dirs_ungroupowned", + "value": "dir_perms_world_writable_sticky_bits", "remarks": "rule_set_298" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All Files And Directories Are Owned by a Group", + "value": "Verify that All World-Writable Directories Have Sticky Bits Set", "remarks": "rule_set_298" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_all_shadowed", + "value": "no_files_or_dirs_unowned_by_user", "remarks": "rule_set_299" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify All Account Password Hashes are Shadowed", + "value": "Ensure All Files And Directories Are Owned by a User", "remarks": "rule_set_299" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_empty_passwords_etc_shadow", + "value": "no_files_or_dirs_ungroupowned", "remarks": "rule_set_300" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure There Are No Accounts With Blank or Null Passwords", + "value": "Ensure All Files And Directories Are Owned by a Group", "remarks": "rule_set_300" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "gid_passwd_group_same", + "value": "accounts_password_all_shadowed", "remarks": "rule_set_301" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", + "value": "Verify All Account Password Hashes are Shadowed", "remarks": "rule_set_301" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "account_unique_id", + "value": "no_empty_passwords_etc_shadow", "remarks": "rule_set_302" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All Accounts on the System Have Unique User IDs", + "value": "Ensure There Are No Accounts With Blank or Null Passwords", "remarks": "rule_set_302" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "group_unique_id", + "value": "gid_passwd_group_same", "remarks": "rule_set_303" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All Groups on the System Have Unique Group ID", + "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", "remarks": "rule_set_303" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "account_unique_name", + "value": "account_unique_id", "remarks": "rule_set_304" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All Accounts on the System Have Unique Names", + "value": "Ensure All Accounts on the System Have Unique User IDs", "remarks": "rule_set_304" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "group_unique_name", + "value": "group_unique_id", "remarks": "rule_set_305" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All Groups on the System Have Unique Group Names", + "value": "Ensure All Groups on the System Have Unique Group ID", "remarks": "rule_set_305" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_user_interactive_home_directory_exists", + "value": "account_unique_name", "remarks": "rule_set_306" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All Interactive Users Home Directories Must Exist", + "value": "Ensure All Accounts on the System Have Unique Names", "remarks": "rule_set_306" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_ownership_home_directories", + "value": "group_unique_name", "remarks": "rule_set_307" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All Interactive User Home Directories Must Be Owned By The Primary User", + "value": "Ensure All Groups on the System Have Unique Group Names", "remarks": "rule_set_307" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_home_directories", + "value": "accounts_user_interactive_home_directory_exists", "remarks": "rule_set_308" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", + "value": "All Interactive Users Home Directories Must Exist", "remarks": "rule_set_308" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_user_dot_group_ownership", + "value": "file_ownership_home_directories", "remarks": "rule_set_309" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "User Initialization Files Must Be Group-Owned By The Primary Group", + "value": "All Interactive User Home Directories Must Be Owned By The Primary User", "remarks": "rule_set_309" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_user_dot_user_ownership", + "value": "file_permissions_home_directories", "remarks": "rule_set_310" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "User Initialization Files Must Be Owned By the Primary User", + "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", "remarks": "rule_set_310" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_user_dot_no_world_writable_programs", + "value": "accounts_user_dot_group_ownership", "remarks": "rule_set_311" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "User Initialization Files Must Not Run World-Writable Programs", + "value": "User Initialization Files Must Be Group-Owned By The Primary Group", "remarks": "rule_set_311" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permission_user_init_files", + "value": "accounts_user_dot_user_ownership", "remarks": "rule_set_312" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", + "value": "User Initialization Files Must Be Owned By the Primary User", "remarks": "rule_set_312" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_forward_files", + "value": "accounts_user_dot_no_world_writable_programs", "remarks": "rule_set_313" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify No .forward Files Exist", + "value": "User Initialization Files Must Not Run World-Writable Programs", "remarks": "rule_set_313" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_netrc_files", + "value": "file_permission_user_init_files", "remarks": "rule_set_314" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify No netrc Files Exist", + "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", "remarks": "rule_set_314" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_rhost_files", + "value": "no_forward_files", "remarks": "rule_set_315" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify No .rhost Files Exist", + "value": "Verify No .forward Files Exist", "remarks": "rule_set_315" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permission_user_bash_history", + "value": "no_netrc_files", "remarks": "rule_set_316" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure User Bash History File Has Correct Permissions", + "value": "Verify No netrc Files Exist", "remarks": "rule_set_316" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "kernel_module_overlayfs_disabled", + "value": "no_rhost_files", "remarks": "rule_set_317" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure overlayfs kernel module is not available", + "value": "Verify No .rhost Files Exist", "remarks": "rule_set_317" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "kernel_module_squashfs_disabled", + "value": "file_permission_user_bash_history", "remarks": "rule_set_318" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Mounting of squashfs", + "value": "Ensure User Bash History File Has Correct Permissions", "remarks": "rule_set_318" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "kernel_module_udf_disabled", + "value": "kernel_module_overlayfs_disabled", "remarks": "rule_set_319" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Mounting of udf", + "value": "Ensure overlayfs kernel module is not available", "remarks": "rule_set_319" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "kernel_module_firewire-core_disabled", + "value": "kernel_module_squashfs_disabled", "remarks": "rule_set_320" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable IEEE 1394 (FireWire) Support", + "value": "Disable Mounting of squashfs", "remarks": "rule_set_320" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "kernel_module_usb-storage_disabled", + "value": "kernel_module_udf_disabled", "remarks": "rule_set_321" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Modprobe Loading of USB Storage Driver", + "value": "Disable Mounting of udf", "remarks": "rule_set_321" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "partition_for_home", + "value": "kernel_module_firewire-core_disabled", "remarks": "rule_set_322" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure /home Located On Separate Partition", + "value": "Disable IEEE 1394 (FireWire) Support", "remarks": "rule_set_322" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "partition_for_var", + "value": "kernel_module_usb-storage_disabled", "remarks": "rule_set_323" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure /var Located On Separate Partition", + "value": "Disable Modprobe Loading of USB Storage Driver", "remarks": "rule_set_323" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "partition_for_var_tmp", + "value": "partition_for_home", "remarks": "rule_set_324" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure /var/tmp Located On Separate Partition", + "value": "Ensure /home Located On Separate Partition", "remarks": "rule_set_324" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "partition_for_var_log", + "value": "partition_for_var", "remarks": "rule_set_325" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure /var/log Located On Separate Partition", + "value": "Ensure /var Located On Separate Partition", "remarks": "rule_set_325" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "partition_for_var_log_audit", + "value": "partition_for_var_tmp", "remarks": "rule_set_326" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure /var/log/audit Located On Separate Partition", + "value": "Ensure /var/tmp Located On Separate Partition", "remarks": "rule_set_326" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "disable_weak_deps", + "value": "partition_for_var_log", "remarks": "rule_set_327" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Installation of Weak Dependencies in DNF", + "value": "Ensure /var/log Located On Separate Partition", "remarks": "rule_set_327" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "selinux_state", + "value": "partition_for_var_log_audit", "remarks": "rule_set_328" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure SELinux State is Enforcing", + "value": "Ensure /var/log/audit Located On Separate Partition", "remarks": "rule_set_328" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_protected_symlinks", + "value": "disable_weak_deps", "remarks": "rule_set_329" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", + "value": "Disable Installation of Weak Dependencies in DNF", "remarks": "rule_set_329" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_disable_automount", + "value": "selinux_state", "remarks": "rule_set_330" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable GNOME3 Automounting", + "value": "Ensure SELinux State is Enforcing", "remarks": "rule_set_330" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_disable_automount_open", + "value": "sysctl_fs_protected_symlinks", "remarks": "rule_set_331" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable GNOME3 Automount Opening", + "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", "remarks": "rule_set_331" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "xwayland_disabled", + "value": "dconf_gnome_disable_automount", "remarks": "rule_set_332" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable XWayland", + "value": "Disable GNOME3 Automounting", "remarks": "rule_set_332" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_autofs_disabled", + "value": "dconf_gnome_disable_automount_open", "remarks": "rule_set_333" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable the Automounter", + "value": "Disable GNOME3 Automount Opening", "remarks": "rule_set_333" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_avahi-daemon_disabled", + "value": "xwayland_disabled", "remarks": "rule_set_334" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Avahi Server Software", + "value": "Disable XWayland", "remarks": "rule_set_334" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_cockpit_disabled", + "value": "service_autofs_disabled", "remarks": "rule_set_335" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Cockpit Management Server", + "value": "Disable the Automounter", "remarks": "rule_set_335" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_openldap-clients_removed", + "value": "service_avahi-daemon_disabled", "remarks": "rule_set_336" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure LDAP client is not installed", + "value": "Disable Avahi Server Software", "remarks": "rule_set_336" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_bluetooth_disabled", + "value": "service_cockpit_disabled", "remarks": "rule_set_337" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Bluetooth Service", + "value": "Disable Cockpit Management Server", "remarks": "rule_set_337" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sudo_remove_nopasswd", + "value": "package_openldap-clients_removed", "remarks": "rule_set_338" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD", + "value": "Ensure LDAP client is not installed", "remarks": "rule_set_338" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_passwords_pam_faillock_deny_root", + "value": "service_bluetooth_disabled", "remarks": "rule_set_339" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure the root Account for Failed Password Attempts", + "value": "Disable Bluetooth Service", "remarks": "rule_set_339" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_minimum_age_login_defs", + "value": "sudo_remove_nopasswd", "remarks": "rule_set_340" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Minimum Age", + "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD", "remarks": "rule_set_340" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_set_min_life_existing", + "value": "accounts_passwords_pam_faillock_deny_root", "remarks": "rule_set_341" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Existing Passwords Minimum Age", + "value": "Configure the root Account for Failed Password Attempts", "remarks": "rule_set_341" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_nologin_in_shells", + "value": "accounts_minimum_age_login_defs", "remarks": "rule_set_342" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure nologin Shell is Not Listed in /etc/shells", + "value": "Set Password Minimum Age", "remarks": "rule_set_342" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_audit_installed", + "value": "accounts_password_set_min_life_existing", "remarks": "rule_set_343" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the audit Subsystem is Installed", + "value": "Set Existing Passwords Minimum Age", "remarks": "rule_set_343" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_audit-libs_installed", + "value": "no_nologin_in_shells", "remarks": "rule_set_344" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the audit-libs package as a part of audit Subsystem is Installed", + "value": "Ensure nologin Shell is Not Listed in /etc/shells", "remarks": "rule_set_344" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_audit_argument", + "value": "package_audit_installed", "remarks": "rule_set_345" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Auditing for Processes Which Start Prior to the Audit Daemon", + "value": "Ensure the audit Subsystem is Installed", "remarks": "rule_set_345" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_audit_backlog_limit_argument", + "value": "package_audit-libs_installed", "remarks": "rule_set_346" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Extend Audit Backlog Limit for the Audit Daemon", + "value": "Ensure the audit-libs package as a part of audit Subsystem is Installed", "remarks": "rule_set_346" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_auditd_enabled", + "value": "grub2_audit_argument", "remarks": "rule_set_347" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable auditd Service", + "value": "Enable Auditing for Processes Which Start Prior to the Audit Daemon", "remarks": "rule_set_347" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "auditd_data_retention_max_log_file", + "value": "grub2_audit_backlog_limit_argument", "remarks": "rule_set_348" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure auditd Max Log File Size", + "value": "Extend Audit Backlog Limit for the Audit Daemon", "remarks": "rule_set_348" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "auditd_data_retention_max_log_file_action", + "value": "service_auditd_enabled", "remarks": "rule_set_349" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure auditd max_log_file_action Upon Reaching Maximum Log Size", + "value": "Enable auditd Service", "remarks": "rule_set_349" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "auditd_data_disk_error_action", + "value": "auditd_data_retention_max_log_file", "remarks": "rule_set_350" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure auditd Disk Error Action on Disk Error", + "value": "Configure auditd Max Log File Size", "remarks": "rule_set_350" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "auditd_data_disk_full_action", + "value": "auditd_data_retention_max_log_file_action", "remarks": "rule_set_351" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure auditd Disk Full Action when Disk Space Is Full", + "value": "Configure auditd max_log_file_action Upon Reaching Maximum Log Size", "remarks": "rule_set_351" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "auditd_data_retention_admin_space_left_action", + "value": "auditd_data_disk_error_action", "remarks": "rule_set_352" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure auditd admin_space_left Action on Low Disk Space", + "value": "Configure auditd Disk Error Action on Disk Error", "remarks": "rule_set_352" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "auditd_data_retention_space_left_action", + "value": "auditd_data_disk_full_action", "remarks": "rule_set_353" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure auditd space_left Action on Low Disk Space", + "value": "Configure auditd Disk Full Action when Disk Space Is Full", "remarks": "rule_set_353" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_sysadmin_actions", + "value": "auditd_data_retention_admin_space_left_action", "remarks": "rule_set_354" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure auditd Collects System Administrator Actions", + "value": "Configure auditd admin_space_left Action on Low Disk Space", "remarks": "rule_set_354" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_suid_auid_privilege_function", + "value": "auditd_data_retention_space_left_action", "remarks": "rule_set_355" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events When Executables Are Run As Another User", + "value": "Configure auditd space_left Action on Low Disk Space", "remarks": "rule_set_355" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_sudo_log_events", + "value": "audit_rules_sysadmin_actions", "remarks": "rule_set_356" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to perform maintenance activities", + "value": "Ensure auditd Collects System Administrator Actions", "remarks": "rule_set_356" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_time_adjtimex", + "value": "audit_rules_suid_auid_privilege_function", "remarks": "rule_set_357" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record attempts to alter time through adjtimex", + "value": "Record Events When Executables Are Run As Another User", "remarks": "rule_set_357" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_time_settimeofday", + "value": "audit_sudo_log_events", "remarks": "rule_set_358" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record attempts to alter time through settimeofday", + "value": "Record Attempts to perform maintenance activities", "remarks": "rule_set_358" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_time_clock_settime", + "value": "audit_rules_time_adjtimex", "remarks": "rule_set_359" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Time Through clock_settime", + "value": "Record attempts to alter time through adjtimex", "remarks": "rule_set_359" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_time_watch_localtime", + "value": "audit_rules_time_settimeofday", "remarks": "rule_set_360" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter the localtime File", + "value": "Record attempts to alter time through settimeofday", "remarks": "rule_set_360" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_networkconfig_modification_setdomainname", + "value": "audit_rules_time_clock_settime", "remarks": "rule_set_361" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Network Environment - setdomainname", + "value": "Record Attempts to Alter Time Through clock_settime", "remarks": "rule_set_361" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_networkconfig_modification_sethostname", + "value": "audit_rules_time_watch_localtime", "remarks": "rule_set_362" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Network Environment - sethostname", + "value": "Record Attempts to Alter the localtime File", "remarks": "rule_set_362" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_networkconfig_modification_etc_issue", + "value": "audit_rules_networkconfig_modification_setdomainname", "remarks": "rule_set_363" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Network Environment - /etc/issue", + "value": "Record Events that Modify the System's Network Environment - setdomainname", "remarks": "rule_set_363" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_networkconfig_modification_etc_issue_net", + "value": "audit_rules_networkconfig_modification_sethostname", "remarks": "rule_set_364" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Network Environment - /etc/issue.net", + "value": "Record Events that Modify the System's Network Environment - sethostname", "remarks": "rule_set_364" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_networkconfig_modification_etc_hosts", + "value": "audit_rules_networkconfig_modification_etc_issue", "remarks": "rule_set_365" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Network Environment - /etc/hosts", + "value": "Record Events that Modify the System's Network Environment - /etc/issue", "remarks": "rule_set_365" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_networkconfig_modification_hostname_file", + "value": "audit_rules_networkconfig_modification_etc_issue_net", "remarks": "rule_set_366" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Network Environment - /etc/hostname", + "value": "Record Events that Modify the System's Network Environment - /etc/issue.net", "remarks": "rule_set_366" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_networkconfig_modification_etc_sysconfig_network", + "value": "audit_rules_networkconfig_modification_etc_hosts", "remarks": "rule_set_367" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Network Environment - /etc/sysconfig/network", + "value": "Record Events that Modify the System's Network Environment - /etc/hosts", "remarks": "rule_set_367" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_networkconfig_modification_etc_networkmanager_system_connections", + "value": "audit_rules_networkconfig_modification_hostname_file", "remarks": "rule_set_368" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/system-connections/", + "value": "Record Events that Modify the System's Network Environment - /etc/hostname", "remarks": "rule_set_368" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_networkconfig_modification_networkmanager", + "value": "audit_rules_networkconfig_modification_etc_sysconfig_network", "remarks": "rule_set_369" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/", + "value": "Record Events that Modify the System's Network Environment - /etc/sysconfig/network", "remarks": "rule_set_369" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_privileged_commands", + "value": "audit_rules_networkconfig_modification_etc_networkmanager_system_connections", "remarks": "rule_set_370" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure auditd Collects Information on the Use of Privileged Commands", + "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/system-connections/", "remarks": "rule_set_370" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_unsuccessful_file_modification_creat", + "value": "audit_rules_networkconfig_modification_networkmanager", "remarks": "rule_set_371" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Unsuccessful Access Attempts to Files - creat", + "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/", "remarks": "rule_set_371" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_unsuccessful_file_modification_ftruncate", + "value": "audit_rules_privileged_commands", "remarks": "rule_set_372" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Unsuccessful Access Attempts to Files - ftruncate", + "value": "Ensure auditd Collects Information on the Use of Privileged Commands", "remarks": "rule_set_372" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_unsuccessful_file_modification_open", + "value": "audit_rules_unsuccessful_file_modification_creat", "remarks": "rule_set_373" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Unsuccessful Access Attempts to Files - open", + "value": "Record Unsuccessful Access Attempts to Files - creat", "remarks": "rule_set_373" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_unsuccessful_file_modification_openat", + "value": "audit_rules_unsuccessful_file_modification_ftruncate", "remarks": "rule_set_374" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Unsuccessful Access Attempts to Files - openat", + "value": "Record Unsuccessful Access Attempts to Files - ftruncate", "remarks": "rule_set_374" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_unsuccessful_file_modification_truncate", + "value": "audit_rules_unsuccessful_file_modification_open", "remarks": "rule_set_375" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Unsuccessful Access Attempts to Files - truncate", + "value": "Record Unsuccessful Access Attempts to Files - open", "remarks": "rule_set_375" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_usergroup_modification_group", + "value": "audit_rules_unsuccessful_file_modification_openat", "remarks": "rule_set_376" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify User/Group Information - /etc/group", + "value": "Record Unsuccessful Access Attempts to Files - openat", "remarks": "rule_set_376" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_usergroup_modification_passwd", + "value": "audit_rules_unsuccessful_file_modification_truncate", "remarks": "rule_set_377" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify User/Group Information - /etc/passwd", + "value": "Record Unsuccessful Access Attempts to Files - truncate", "remarks": "rule_set_377" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_usergroup_modification_gshadow", + "value": "audit_rules_usergroup_modification_group", "remarks": "rule_set_378" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify User/Group Information - /etc/gshadow", + "value": "Record Events that Modify User/Group Information - /etc/group", "remarks": "rule_set_378" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_usergroup_modification_shadow", + "value": "audit_rules_usergroup_modification_passwd", "remarks": "rule_set_379" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify User/Group Information - /etc/shadow", + "value": "Record Events that Modify User/Group Information - /etc/passwd", "remarks": "rule_set_379" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_usergroup_modification_opasswd", + "value": "audit_rules_usergroup_modification_gshadow", "remarks": "rule_set_380" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", + "value": "Record Events that Modify User/Group Information - /etc/gshadow", "remarks": "rule_set_380" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_usergroup_modification_nsswitch_conf", + "value": "audit_rules_usergroup_modification_shadow", "remarks": "rule_set_381" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify User/Group Information - /etc/nsswitch.conf", + "value": "Record Events that Modify User/Group Information - /etc/shadow", "remarks": "rule_set_381" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_usergroup_modification_pam_conf", + "value": "audit_rules_usergroup_modification_opasswd", "remarks": "rule_set_382" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify User/Group Information - /etc/pam.conf", + "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", "remarks": "rule_set_382" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_usergroup_modification_pamd", + "value": "audit_rules_usergroup_modification_nsswitch_conf", "remarks": "rule_set_383" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify User/Group Information - /etc/pam.d/", + "value": "Record Events that Modify User/Group Information - /etc/nsswitch.conf", "remarks": "rule_set_383" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_dac_modification_chmod", + "value": "audit_rules_usergroup_modification_pam_conf", "remarks": "rule_set_384" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", + "value": "Record Events that Modify User/Group Information - /etc/pam.conf", "remarks": "rule_set_384" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_dac_modification_fchmod", + "value": "audit_rules_usergroup_modification_pamd", "remarks": "rule_set_385" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Discretionary Access Controls - fchmod", + "value": "Record Events that Modify User/Group Information - /etc/pam.d/", "remarks": "rule_set_385" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_dac_modification_fchmodat", + "value": "audit_rules_dac_modification_chmod", "remarks": "rule_set_386" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat", + "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", "remarks": "rule_set_386" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_dac_modification_fchmodat2", + "value": "audit_rules_dac_modification_fchmod", "remarks": "rule_set_387" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat2", + "value": "Record Events that Modify the System's Discretionary Access Controls - fchmod", "remarks": "rule_set_387" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_dac_modification_chown", + "value": "audit_rules_dac_modification_fchmodat", "remarks": "rule_set_388" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Discretionary Access Controls - chown", + "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat", "remarks": "rule_set_388" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_dac_modification_fchown", + "value": "audit_rules_dac_modification_fchmodat2", "remarks": "rule_set_389" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Discretionary Access Controls - fchown", + "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat2", "remarks": "rule_set_389" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_dac_modification_fchownat", + "value": "audit_rules_dac_modification_chown", "remarks": "rule_set_390" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Discretionary Access Controls - fchownat", + "value": "Record Events that Modify the System's Discretionary Access Controls - chown", "remarks": "rule_set_390" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_dac_modification_lchown", + "value": "audit_rules_dac_modification_fchown", "remarks": "rule_set_391" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Discretionary Access Controls - lchown", + "value": "Record Events that Modify the System's Discretionary Access Controls - fchown", "remarks": "rule_set_391" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_dac_modification_fremovexattr", + "value": "audit_rules_dac_modification_fchownat", "remarks": "rule_set_392" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Discretionary Access Controls - fremovexattr", + "value": "Record Events that Modify the System's Discretionary Access Controls - fchownat", "remarks": "rule_set_392" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_dac_modification_fsetxattr", + "value": "audit_rules_dac_modification_lchown", "remarks": "rule_set_393" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Discretionary Access Controls - fsetxattr", + "value": "Record Events that Modify the System's Discretionary Access Controls - lchown", "remarks": "rule_set_393" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_dac_modification_lremovexattr", + "value": "audit_rules_dac_modification_fremovexattr", "remarks": "rule_set_394" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Discretionary Access Controls - lremovexattr", + "value": "Record Events that Modify the System's Discretionary Access Controls - fremovexattr", "remarks": "rule_set_394" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_dac_modification_lsetxattr", + "value": "audit_rules_dac_modification_fsetxattr", "remarks": "rule_set_395" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Discretionary Access Controls - lsetxattr", + "value": "Record Events that Modify the System's Discretionary Access Controls - fsetxattr", "remarks": "rule_set_395" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_dac_modification_removexattr", + "value": "audit_rules_dac_modification_lremovexattr", "remarks": "rule_set_396" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Discretionary Access Controls - removexattr", + "value": "Record Events that Modify the System's Discretionary Access Controls - lremovexattr", "remarks": "rule_set_396" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_dac_modification_setxattr", + "value": "audit_rules_dac_modification_lsetxattr", "remarks": "rule_set_397" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Discretionary Access Controls - setxattr", + "value": "Record Events that Modify the System's Discretionary Access Controls - lsetxattr", "remarks": "rule_set_397" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_media_export", + "value": "audit_rules_dac_modification_removexattr", "remarks": "rule_set_398" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure auditd Collects Information on Exporting to Media (successful)", + "value": "Record Events that Modify the System's Discretionary Access Controls - removexattr", "remarks": "rule_set_398" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_session_events_utmp", + "value": "audit_rules_dac_modification_setxattr", "remarks": "rule_set_399" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Process and Session Initiation Information utmp", + "value": "Record Events that Modify the System's Discretionary Access Controls - setxattr", "remarks": "rule_set_399" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_session_events_btmp", + "value": "audit_rules_media_export", "remarks": "rule_set_400" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Process and Session Initiation Information btmp", + "value": "Ensure auditd Collects Information on Exporting to Media (successful)", "remarks": "rule_set_400" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_session_events_wtmp", + "value": "audit_rules_session_events_utmp", "remarks": "rule_set_401" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", + "value": "Record Attempts to Alter Process and Session Initiation Information utmp", "remarks": "rule_set_401" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_login_events_faillock", + "value": "audit_rules_session_events_btmp", "remarks": "rule_set_402" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Logon and Logout Events - faillock", + "value": "Record Attempts to Alter Process and Session Initiation Information btmp", "remarks": "rule_set_402" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_login_events_lastlog", + "value": "audit_rules_session_events_wtmp", "remarks": "rule_set_403" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Logon and Logout Events - lastlog", + "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", "remarks": "rule_set_403" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_file_deletion_events_unlink", + "value": "audit_rules_login_events_faillock", "remarks": "rule_set_404" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure auditd Collects File Deletion Events by User - unlink", + "value": "Record Attempts to Alter Logon and Logout Events - faillock", "remarks": "rule_set_404" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_file_deletion_events_unlinkat", + "value": "audit_rules_login_events_lastlog", "remarks": "rule_set_405" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure auditd Collects File Deletion Events by User - unlinkat", + "value": "Record Attempts to Alter Logon and Logout Events - lastlog", "remarks": "rule_set_405" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_file_deletion_events_rename", + "value": "audit_rules_file_deletion_events_unlink", "remarks": "rule_set_406" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure auditd Collects File Deletion Events by User - rename", + "value": "Ensure auditd Collects File Deletion Events by User - unlink", "remarks": "rule_set_406" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_file_deletion_events_renameat", + "value": "audit_rules_file_deletion_events_unlinkat", "remarks": "rule_set_407" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure auditd Collects File Deletion Events by User - renameat", + "value": "Ensure auditd Collects File Deletion Events by User - unlinkat", "remarks": "rule_set_407" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_file_deletion_events_renameat2", + "value": "audit_rules_file_deletion_events_rename", "remarks": "rule_set_408" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure auditd Collects File Deletion Events by User - renameat2", + "value": "Ensure auditd Collects File Deletion Events by User - rename", "remarks": "rule_set_408" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_mac_modification_etc_selinux", + "value": "audit_rules_file_deletion_events_renameat", "remarks": "rule_set_409" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Mandatory Access Controls (/etc/selinux)", + "value": "Ensure auditd Collects File Deletion Events by User - renameat", "remarks": "rule_set_409" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_mac_modification_usr_share", + "value": "audit_rules_file_deletion_events_renameat2", "remarks": "rule_set_410" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Mandatory Access Controls in usr/share", + "value": "Ensure auditd Collects File Deletion Events by User - renameat2", "remarks": "rule_set_410" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_execution_chcon", + "value": "audit_rules_mac_modification_etc_selinux", "remarks": "rule_set_411" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Any Attempts to Run chcon", + "value": "Record Events that Modify the System's Mandatory Access Controls (/etc/selinux)", "remarks": "rule_set_411" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_execution_setfacl", + "value": "audit_rules_mac_modification_usr_share", "remarks": "rule_set_412" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Any Attempts to Run setfacl", + "value": "Record Events that Modify the System's Mandatory Access Controls in usr/share", "remarks": "rule_set_412" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_execution_chacl", + "value": "audit_rules_execution_chcon", "remarks": "rule_set_413" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Any Attempts to Run chacl", + "value": "Record Any Attempts to Run chcon", "remarks": "rule_set_413" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_privileged_commands_usermod", + "value": "audit_rules_execution_setfacl", "remarks": "rule_set_414" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure auditd Collects Information on the Use of Privileged Commands - usermod", + "value": "Record Any Attempts to Run setfacl", "remarks": "rule_set_414" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_privileged_commands_kmod", + "value": "audit_rules_execution_chacl", "remarks": "rule_set_415" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure auditd Collects Information on the Use of Privileged Commands - kmod", + "value": "Record Any Attempts to Run chacl", "remarks": "rule_set_415" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_kernel_module_loading_init", + "value": "audit_rules_privileged_commands_usermod", "remarks": "rule_set_416" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure auditd Collects Information on Kernel Module Loading - init_module", + "value": "Ensure auditd Collects Information on the Use of Privileged Commands - usermod", "remarks": "rule_set_416" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_kernel_module_loading_finit", + "value": "audit_rules_privileged_commands_kmod", "remarks": "rule_set_417" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - finit_module", + "value": "Ensure auditd Collects Information on the Use of Privileged Commands - kmod", "remarks": "rule_set_417" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_kernel_module_loading_delete", + "value": "audit_rules_kernel_module_loading_init", "remarks": "rule_set_418" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure auditd Collects Information on Kernel Module Unloading - delete_module", + "value": "Ensure auditd Collects Information on Kernel Module Loading - init_module", "remarks": "rule_set_418" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_kernel_module_loading_query", + "value": "audit_rules_kernel_module_loading_finit", "remarks": "rule_set_419" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - query_module", + "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - finit_module", "remarks": "rule_set_419" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_continue_loading", + "value": "audit_rules_kernel_module_loading_delete", "remarks": "rule_set_420" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Audit Configuration is Loaded Regardless of Errors", + "value": "Ensure auditd Collects Information on Kernel Module Unloading - delete_module", "remarks": "rule_set_420" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_immutable", + "value": "audit_rules_kernel_module_loading_query", "remarks": "rule_set_421" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Make the auditd Configuration Immutable", + "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - query_module", "remarks": "rule_set_421" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "directory_permissions_var_log_audit", + "value": "audit_rules_continue_loading", "remarks": "rule_set_422" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "System Audit Logs Must Have Mode 0750 or Less Permissive", + "value": "Ensure the Audit Configuration is Loaded Regardless of Errors", "remarks": "rule_set_422" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_var_log_audit", + "value": "audit_rules_immutable", "remarks": "rule_set_423" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "System Audit Logs Must Have Mode 0640 or Less Permissive", + "value": "Make the auditd Configuration Immutable", "remarks": "rule_set_423" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_ownership_var_log_audit_stig", + "value": "directory_permissions_var_log_audit", "remarks": "rule_set_424" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "System Audit Logs Must Be Owned By Root", + "value": "System Audit Logs Must Have Mode 0750 or Less Permissive", "remarks": "rule_set_424" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_group_ownership_var_log_audit", + "value": "file_permissions_var_log_audit", "remarks": "rule_set_425" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "System Audit Logs Must Be Group Owned By Root", + "value": "System Audit Logs Must Have Mode 0640 or Less Permissive", "remarks": "rule_set_425" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_audit_configuration", + "value": "file_ownership_var_log_audit_stig", "remarks": "rule_set_426" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Audit Configuration Files Permissions are 640 or More Restrictive", + "value": "System Audit Logs Must Be Owned By Root", "remarks": "rule_set_426" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_ownership_audit_configuration", + "value": "file_group_ownership_var_log_audit", "remarks": "rule_set_427" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Audit Configuration Files Must Be Owned By Root", + "value": "System Audit Logs Must Be Group Owned By Root", "remarks": "rule_set_427" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupownership_audit_configuration", + "value": "file_permissions_audit_configuration", "remarks": "rule_set_428" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Audit Configuration Files Must Be Owned By Group root", + "value": "Audit Configuration Files Permissions are 640 or More Restrictive", "remarks": "rule_set_428" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_audit_binaries", + "value": "file_ownership_audit_configuration", "remarks": "rule_set_429" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify that audit tools Have Mode 0755 or less", + "value": "Audit Configuration Files Must Be Owned By Root", "remarks": "rule_set_429" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_ownership_audit_binaries", + "value": "file_groupownership_audit_configuration", "remarks": "rule_set_430" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify that audit tools are owned by root", + "value": "Audit Configuration Files Must Be Owned By Group root", "remarks": "rule_set_430" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupownership_audit_binaries", + "value": "file_permissions_audit_binaries", "remarks": "rule_set_431" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify that audit tools are owned by group root", + "value": "Verify that audit tools Have Mode 0755 or less", "remarks": "rule_set_431" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "file_ownership_audit_binaries", + "remarks": "rule_set_432" + }, + { + "name": "Rule_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Verify that audit tools are owned by root", + "remarks": "rule_set_432" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "file_groupownership_audit_binaries", + "remarks": "rule_set_433" + }, + { + "name": "Rule_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Verify that audit tools are owned by group root", + "remarks": "rule_set_433" } ], "control-implementations": [ { - "uuid": "60d511bf-6a00-4e7b-a527-f870316b1cd3", + "uuid": "0be94f20-1d17-4699-91d3-62a04cc3b8ec", "source": "trestle://profiles/rhel10-cis_rhel10-l2_workstation/profile.json", "description": "Control implementation for cis_workstation_l2", "props": [ @@ -6823,7 +6847,7 @@ ], "implemented-requirements": [ { - "uuid": "cf339821-9f52-4927-aaf6-629394e81c11", + "uuid": "a3dc2ced-d785-43e7-8992-dd3c2ca5797e", "control-id": "cis_rhel10_1-1.1.6", "description": "No notes for control-id 1.1.1.6.", "props": [ @@ -6840,7 +6864,7 @@ ] }, { - "uuid": "78be2251-11dc-4faa-a666-03317f00d2be", + "uuid": "a782163f-50e2-456f-ab7c-260e456fef7a", "control-id": "cis_rhel10_1-1.1.7", "description": "No notes for control-id 1.1.1.7.", "props": [ @@ -6857,7 +6881,7 @@ ] }, { - "uuid": "d0f33c35-eadd-4a1f-8ea4-fdcf5582cacc", + "uuid": "4a95d705-4a2a-4d04-b1bb-f89f9cd2c892", "control-id": "cis_rhel10_1-1.1.8", "description": "No notes for control-id 1.1.1.8.", "props": [ @@ -6874,7 +6898,7 @@ ] }, { - "uuid": "505bea8f-75a9-4cf0-86cb-fca400d2eee1", + "uuid": "e0d1678b-be99-406d-bb79-a312d39c2b39", "control-id": "cis_rhel10_1-1.1.9", "description": "No notes for control-id 1.1.1.9.", "props": [ @@ -6891,7 +6915,7 @@ ] }, { - "uuid": "4dfb7670-dc8f-4837-aa57-7087cab43eb8", + "uuid": "897d775d-3aca-4f5d-b9d4-5e95232cb8fc", "control-id": "cis_rhel10_1-1.1.10", "description": "No notes for control-id 1.1.1.10.", "props": [ @@ -6908,7 +6932,7 @@ ] }, { - "uuid": "40888cd6-a0a4-4d24-ac92-9928d71cf9a1", + "uuid": "90c40d2d-5a80-4d60-85fb-73747f02806f", "control-id": "cis_rhel10_1-1.2.3.1", "description": "No notes for control-id 1.1.2.3.1.", "props": [ @@ -6925,7 +6949,7 @@ ] }, { - "uuid": "e1017742-50c6-4dac-8241-fb66d8ff97cf", + "uuid": "bad7225f-52fa-4b30-89e0-67bae66a90ad", "control-id": "cis_rhel10_1-1.2.4.1", "description": "No notes for control-id 1.1.2.4.1.", "props": [ @@ -6942,7 +6966,7 @@ ] }, { - "uuid": "5a944ce4-a07f-4d35-a96d-74c5b014d9b4", + "uuid": "d96a4e51-f560-4e16-9311-f9605efe7cae", "control-id": "cis_rhel10_1-1.2.5.1", "description": "No notes for control-id 1.1.2.5.1.", "props": [ @@ -6959,7 +6983,7 @@ ] }, { - "uuid": "ccd7ce35-57a4-4a09-80d2-628111a98499", + "uuid": "c01b8f1b-5777-4a16-bd97-16232bb97843", "control-id": "cis_rhel10_1-1.2.6.1", "description": "No notes for control-id 1.1.2.6.1.", "props": [ @@ -6976,7 +7000,7 @@ ] }, { - "uuid": "272fdeee-ae0b-4c11-91e7-695c4f0bdc9b", + "uuid": "89558872-7852-4df7-b614-5199439b7df9", "control-id": "cis_rhel10_1-1.2.7.1", "description": "No notes for control-id 1.1.2.7.1.", "props": [ @@ -6993,7 +7017,7 @@ ] }, { - "uuid": "b23ad79d-2e11-4648-a57b-4c9ac572f39b", + "uuid": "5f21e900-4b6b-422f-a0af-bbd1c92317f8", "control-id": "cis_rhel10_1-2.1.3", "description": "The description for control-id cis_rhel10_1-2.1.3.", "props": [ @@ -7006,7 +7030,7 @@ ] }, { - "uuid": "f2956e5e-e60c-4c5c-bb3e-8731c803b6bc", + "uuid": "4e762eab-a02d-4097-8046-772ad93958f5", "control-id": "cis_rhel10_1-2.1.5", "description": "No notes for control-id 1.2.1.5.", "props": [ @@ -7023,7 +7047,7 @@ ] }, { - "uuid": "129f5105-962a-4ded-a4bd-19b212e7c03a", + "uuid": "22c5046f-d458-4698-9e4b-35f47a661673", "control-id": "cis_rhel10_1-3.1.5", "description": "No notes for control-id 1.3.1.5.", "props": [ @@ -7040,7 +7064,7 @@ ] }, { - "uuid": "67976ec1-7b9a-4df3-a957-fd4d7aaa5920", + "uuid": "f7854195-8c27-406e-b2cb-37f3f95766d0", "control-id": "cis_rhel10_1-3.1.6", "description": "The description for control-id cis_rhel10_1-3.1.6.", "props": [ @@ -7053,7 +7077,7 @@ ] }, { - "uuid": "40e40151-6e72-4e75-9fbf-edf3a9b3fa28", + "uuid": "48a35d04-ddde-451c-b028-e17e23849a27", "control-id": "cis_rhel10_1-5.3", "description": "No notes for control-id 1.5.3.", "props": [ @@ -7070,7 +7094,7 @@ ] }, { - "uuid": "1aa2de5c-57a2-4a3b-bad2-25e48af4e3fe", + "uuid": "943b3490-2019-4986-863c-43fdcc7a4152", "control-id": "cis_rhel10_1-8.4", "description": "No notes for control-id 1.8.4.", "props": [ @@ -7092,7 +7116,7 @@ ] }, { - "uuid": "c10a6f92-3261-4a7c-89b6-22c9732ade90", + "uuid": "44ef7705-bec3-4771-a596-6b3e90239414", "control-id": "cis_rhel10_1-8.6", "description": "No notes for control-id 1.8.6.", "props": [ @@ -7109,7 +7133,7 @@ ] }, { - "uuid": "17e744fa-9fb0-4109-bf0c-ad57e21af649", + "uuid": "eee10fd6-4255-494a-900b-29a5b8c1f440", "control-id": "cis_rhel10_2-1.1", "description": "No notes for control-id 2.1.1.", "props": [ @@ -7126,7 +7150,7 @@ ] }, { - "uuid": "4b3a9c9e-4180-406e-89d2-8137d451c638", + "uuid": "7d833fd4-1ad0-454e-a9b2-be7a45ccc362", "control-id": "cis_rhel10_2-1.2", "description": "No notes for control-id 2.1.2.", "props": [ @@ -7143,7 +7167,7 @@ ] }, { - "uuid": "e64dd92a-74a2-4754-9a4e-02576f84624c", + "uuid": "528f8e2b-8871-4055-86a7-55acab15e0ea", "control-id": "cis_rhel10_2-1.3", "description": "No notes for control-id 2.1.3.", "props": [ @@ -7160,7 +7184,7 @@ ] }, { - "uuid": "d9875df1-d168-4b11-af22-cac4b56126b6", + "uuid": "66e5241c-4345-4742-9447-c94b05f61b81", "control-id": "cis_rhel10_2-2.2", "description": "No notes for control-id 2.2.2.", "props": [ @@ -7177,7 +7201,7 @@ ] }, { - "uuid": "61097340-5ace-43b1-9e66-c32f50793edf", + "uuid": "16af65e3-7900-4d0e-81c6-9adcd4a6944b", "control-id": "cis_rhel10_3-1.3", "description": "No notes for control-id 3.1.3.", "props": [ @@ -7194,7 +7218,7 @@ ] }, { - "uuid": "d101b068-b3b2-4ef1-af2d-95f5623e3b9d", + "uuid": "e1609546-b920-40b8-9bb7-732e9b9bd7f8", "control-id": "cis_rhel10_5-2.4", "description": "No notes for control-id 5.2.4.", "props": [ @@ -7211,7 +7235,7 @@ ] }, { - "uuid": "cc90ba9d-e94e-47a5-981e-6934fa94d81c", + "uuid": "aaebebc3-f5c1-439a-aeeb-40045f6738da", "control-id": "cis_rhel10_5-3.2.1.3", "description": "No notes for control-id 5.3.2.1.3.", "props": [ @@ -7228,7 +7252,7 @@ ] }, { - "uuid": "b74be0cf-7991-4660-b696-bb6d97dd8601", + "uuid": "b42b4005-d815-4bef-a207-183dfa85b094", "control-id": "cis_rhel10_5-4.1.2", "description": "No notes for control-id 5.4.1.2.", "props": [ @@ -7250,7 +7274,7 @@ ] }, { - "uuid": "f4b20e8c-3dae-48ff-abe8-3c0c2b9a92a7", + "uuid": "3aac84f3-798c-4909-bd76-ac066a49b5a6", "control-id": "cis_rhel10_5-4.3.1", "description": "No notes for control-id 5.4.3.1.", "props": [ @@ -7267,7 +7291,7 @@ ] }, { - "uuid": "b53db268-26fa-4812-a468-1c11a78c1fb2", + "uuid": "4ffe0cf7-21c8-41f3-989c-d45e2f664f61", "control-id": "cis_rhel10_6-3.1.1", "description": "No notes for control-id 6.3.1.1.", "props": [ @@ -7289,7 +7313,7 @@ ] }, { - "uuid": "eed322dd-4cbf-41fa-afd2-fe210548eb4c", + "uuid": "96a495dd-62cd-4bf4-bd33-56c39f4f3ec1", "control-id": "cis_rhel10_6-3.1.2", "description": "No notes for control-id 6.3.1.2.", "props": [ @@ -7306,7 +7330,7 @@ ] }, { - "uuid": "fd3198ac-b7da-48ff-bd3a-10cdab0a7e77", + "uuid": "2be9d952-f42c-4898-8dcc-ccda44636498", "control-id": "cis_rhel10_6-3.1.3", "description": "No notes for control-id 6.3.1.3.", "props": [ @@ -7323,7 +7347,7 @@ ] }, { - "uuid": "7d6a5cb9-ef5b-4b9a-b187-43784988a5e3", + "uuid": "34da38d0-6bc9-455f-8151-64e821df2116", "control-id": "cis_rhel10_6-3.1.4", "description": "No notes for control-id 6.3.1.4.", "props": [ @@ -7340,7 +7364,7 @@ ] }, { - "uuid": "d094d210-8179-493d-b5cc-71bf9e1bc950", + "uuid": "46833f68-3b80-42b0-853e-3f852107bc7e", "control-id": "cis_rhel10_6-3.2.1", "description": "No notes for control-id 6.3.2.1.", "props": [ @@ -7357,7 +7381,7 @@ ] }, { - "uuid": "c62eb240-0255-4ac1-916a-12896c66fbdf", + "uuid": "b5e48bdf-9cb6-4284-b773-528d79bc2415", "control-id": "cis_rhel10_6-3.2.2", "description": "No notes for control-id 6.3.2.2.", "props": [ @@ -7374,7 +7398,7 @@ ] }, { - "uuid": "df5d7da8-cbce-4ffc-886e-480c20ff11c6", + "uuid": "1d154458-1cb4-4181-8853-2f72993f1a15", "control-id": "cis_rhel10_6-3.2.3", "description": "No notes for control-id 6.3.2.3.", "props": [ @@ -7396,7 +7420,7 @@ ] }, { - "uuid": "932012b2-ae17-4a47-9d49-ae199bd35911", + "uuid": "978f3d8b-dc6f-4490-9de3-3924ab9a9cf2", "control-id": "cis_rhel10_6-3.2.4", "description": "No notes for control-id 6.3.2.4.", "props": [ @@ -7418,7 +7442,7 @@ ] }, { - "uuid": "8e181452-0081-4cf7-b60f-eee05ed03e21", + "uuid": "30d93606-9f3c-49b6-951a-d4622c1cba2f", "control-id": "cis_rhel10_6-3.3.1", "description": "No notes for control-id 6.3.3.1.", "props": [ @@ -7435,7 +7459,7 @@ ] }, { - "uuid": "14296927-e469-4ace-8ce4-430d55e1797b", + "uuid": "129fc28e-81bb-45e6-9cd4-cb76955ac64b", "control-id": "cis_rhel10_6-3.3.2", "description": "No notes for control-id 6.3.3.2.", "props": [ @@ -7452,7 +7476,7 @@ ] }, { - "uuid": "1b61b881-5784-45b9-b491-6fb8400e98d5", + "uuid": "59a83d89-1644-418d-9708-d34cc3762ca9", "control-id": "cis_rhel10_6-3.3.3", "description": "No notes for control-id 6.3.3.3.", "props": [ @@ -7469,7 +7493,7 @@ ] }, { - "uuid": "a1c16c8e-27ad-4e73-a3cd-ba25593cbd64", + "uuid": "35c8fd50-2d74-4823-9305-229aa4b7b699", "control-id": "cis_rhel10_6-3.3.4", "description": "No notes for control-id 6.3.3.4.", "props": [ @@ -7501,7 +7525,7 @@ ] }, { - "uuid": "70fa8869-875a-45c4-ae73-9f7af98a195a", + "uuid": "603ebb19-d36a-4295-98fb-9443173c90b4", "control-id": "cis_rhel10_6-3.3.5", "description": "No notes for control-id 6.3.3.5.", "props": [ @@ -7523,7 +7547,7 @@ ] }, { - "uuid": "b596cc90-5a58-4990-a3a9-8fb77a480ed0", + "uuid": "6bc3997c-c14f-4ca8-8629-961fb274065b", "control-id": "cis_rhel10_6-3.3.6", "description": "No notes for control-id 6.3.3.6.", "props": [ @@ -7545,7 +7569,7 @@ ] }, { - "uuid": "fb9654e8-b77f-4a90-ab57-7112b654913b", + "uuid": "106a5b35-f1ee-4361-8922-509501a4be33", "control-id": "cis_rhel10_6-3.3.7", "description": "No notes for control-id 6.3.3.7.", "props": [ @@ -7567,7 +7591,7 @@ ] }, { - "uuid": "a2584e4f-ce06-4ae3-987f-ae72bfc4e038", + "uuid": "5ca38d72-16a4-4fa8-8a2f-9055afeeca43", "control-id": "cis_rhel10_6-3.3.8", "description": "No notes for control-id 6.3.3.8.", "props": [ @@ -7589,7 +7613,7 @@ ] }, { - "uuid": "fc54118f-7c88-46f4-9367-dfd0e83487a4", + "uuid": "d1997c09-6bcf-43f3-8b94-8ad89e3b2a98", "control-id": "cis_rhel10_6-3.3.9", "description": "No notes for control-id 6.3.3.9.", "props": [ @@ -7606,7 +7630,7 @@ ] }, { - "uuid": "05997b60-7b68-403d-883c-cbb46563f32f", + "uuid": "737a8043-1337-4dc0-88a6-8e4f5acadafb", "control-id": "cis_rhel10_6-3.3.10", "description": "No notes for control-id 6.3.3.10.", "props": [ @@ -7623,7 +7647,7 @@ ] }, { - "uuid": "0ce1b37e-1781-4a9f-8890-04c7727c62c8", + "uuid": "06c7bde9-9999-4266-9e7e-d36bb3355b3f", "control-id": "cis_rhel10_6-3.3.11", "description": "No notes for control-id 6.3.3.11.", "props": [ @@ -7660,7 +7684,7 @@ ] }, { - "uuid": "300210da-479a-4d3b-8b25-3a72438392c1", + "uuid": "8c34070e-174e-4bd0-8092-544c35568c66", "control-id": "cis_rhel10_6-3.3.12", "description": "No notes for control-id 6.3.3.12.", "props": [ @@ -7677,7 +7701,7 @@ ] }, { - "uuid": "a033454f-e16a-4549-97a1-00da50b842df", + "uuid": "ebc1d440-a0f4-4dd6-a9bf-7907227df009", "control-id": "cis_rhel10_6-3.3.13", "description": "No notes for control-id 6.3.3.13.", "props": [ @@ -7694,7 +7718,7 @@ ] }, { - "uuid": "afc4fe09-83ed-4bd9-a415-da8979042f73", + "uuid": "a0942c3d-51f1-45a3-8df6-9e092932527b", "control-id": "cis_rhel10_6-3.3.14", "description": "No notes for control-id 6.3.3.14.", "props": [ @@ -7716,7 +7740,7 @@ ] }, { - "uuid": "68dfc189-b1fa-4f31-9bfd-2c0ff31bcf3a", + "uuid": "d8d6f7e7-ce1d-4395-bbf5-8e7e22ab24c6", "control-id": "cis_rhel10_6-3.3.15", "description": "No notes for control-id 6.3.3.15.", "props": [ @@ -7733,7 +7757,7 @@ ] }, { - "uuid": "88f865f0-1d27-4932-86c2-593faa5f1463", + "uuid": "6435520c-2404-4ef8-826a-3d28aee180b4", "control-id": "cis_rhel10_6-3.3.16", "description": "No notes for control-id 6.3.3.16.", "props": [ @@ -7750,7 +7774,7 @@ ] }, { - "uuid": "af9cff86-c8eb-4637-b30d-f028b826221c", + "uuid": "edc7f9c3-b385-4508-a4d4-b40d940667d9", "control-id": "cis_rhel10_6-3.3.17", "description": "No notes for control-id 6.3.3.17.", "props": [ @@ -7772,7 +7796,7 @@ ] }, { - "uuid": "6a9ecae1-c5e9-4aae-8b41-c64b0e05504d", + "uuid": "2ef5bcf3-203b-4b4e-ae40-551f132c43cd", "control-id": "cis_rhel10_6-3.3.18", "description": "No notes for control-id 6.3.3.18.", "props": [ @@ -7804,7 +7828,7 @@ ] }, { - "uuid": "8c3f4bb8-d5a4-4bfe-98f1-c493c4f95fd9", + "uuid": "373f877e-9ae1-4582-a3f9-34c5dfd5d235", "control-id": "cis_rhel10_6-3.3.19", "description": "No notes for control-id 6.3.3.19.", "props": [ @@ -7836,7 +7860,7 @@ ] }, { - "uuid": "65c8c751-7453-4b2b-b6a6-b94ef99453d4", + "uuid": "087dc219-5b38-41e8-8330-19e9fc560b1d", "control-id": "cis_rhel10_6-3.3.20", "description": "No notes for control-id 6.3.3.20.", "props": [ @@ -7878,7 +7902,7 @@ ] }, { - "uuid": "1e8c009f-7d55-4671-8f43-197da03ef059", + "uuid": "d341655f-0798-4500-a067-017e3e41d385", "control-id": "cis_rhel10_6-3.3.21", "description": "No notes for control-id 6.3.3.21.", "props": [ @@ -7895,7 +7919,7 @@ ] }, { - "uuid": "fa8813ec-7f16-4eda-ae1d-20e8417ada78", + "uuid": "863c6bca-a5d6-4241-ae01-c206ac9f2e53", "control-id": "cis_rhel10_6-3.3.22", "description": "No notes for control-id 6.3.3.22.", "props": [ @@ -7922,7 +7946,7 @@ ] }, { - "uuid": "249cf0b3-e0be-46c0-80a3-46961d86d731", + "uuid": "8d6a5f23-b852-4e92-8c39-4eb1acaf4ea2", "control-id": "cis_rhel10_6-3.3.23", "description": "No notes for control-id 6.3.3.23.", "props": [ @@ -7944,7 +7968,7 @@ ] }, { - "uuid": "54c04cf0-3081-4ad1-9d03-3666405fcfd8", + "uuid": "66dc1ac1-4f73-4ae8-8f60-1500bef03dff", "control-id": "cis_rhel10_6-3.3.24", "description": "No notes for control-id 6.3.3.24.", "props": [ @@ -7966,7 +7990,7 @@ ] }, { - "uuid": "4afc11c6-0ab0-4103-bca1-18c20c5d5076", + "uuid": "ab54e25b-2c08-4ad7-97f7-b89eb36620dc", "control-id": "cis_rhel10_6-3.3.25", "description": "No notes for control-id 6.3.3.25.", "props": [ @@ -7993,7 +8017,7 @@ ] }, { - "uuid": "00206bc7-1bb6-4c89-9687-199982c9fef5", + "uuid": "5b7ab4fe-9169-435a-bfff-7be013bd57db", "control-id": "cis_rhel10_6-3.3.26", "description": "No notes for control-id 6.3.3.26.", "props": [ @@ -8015,7 +8039,7 @@ ] }, { - "uuid": "21496cc4-f054-4d5e-ba7f-3d27303bbb63", + "uuid": "d4363bc0-52b0-41dd-95e3-ca979613a007", "control-id": "cis_rhel10_6-3.3.27", "description": "No notes for control-id 6.3.3.27.", "props": [ @@ -8032,7 +8056,7 @@ ] }, { - "uuid": "af071812-2f62-4b21-9571-e0df93b280eb", + "uuid": "2b141338-8395-40a5-8b30-3cb928f75a37", "control-id": "cis_rhel10_6-3.3.28", "description": "No notes for control-id 6.3.3.28.", "props": [ @@ -8049,7 +8073,7 @@ ] }, { - "uuid": "58ef4f46-6942-49d0-a034-cddb9abb2580", + "uuid": "4dadfd16-dfa3-4996-b6e1-a12a3d660f9f", "control-id": "cis_rhel10_6-3.3.29", "description": "No notes for control-id 6.3.3.29.", "props": [ @@ -8066,7 +8090,7 @@ ] }, { - "uuid": "6c2bd459-47a3-4bfd-a6f2-aeca26a6f277", + "uuid": "7c8c8eff-0436-4216-b510-20346532c4ba", "control-id": "cis_rhel10_6-3.3.30", "description": "No notes for control-id 6.3.3.30.", "props": [ @@ -8083,7 +8107,7 @@ ] }, { - "uuid": "ac2c4a8f-7b56-4a79-887a-21f7c23026fe", + "uuid": "78c0d1ed-f498-4256-9b32-bd60c113fba8", "control-id": "cis_rhel10_6-3.3.31", "description": "No notes for control-id 6.3.3.31.", "props": [ @@ -8100,7 +8124,7 @@ ] }, { - "uuid": "843b2796-3679-4122-bb0c-1ff501aac2d4", + "uuid": "492e1355-4cdc-427f-9698-b3d0060c1610", "control-id": "cis_rhel10_6-3.3.32", "description": "No notes for control-id 6.3.3.32.", "props": [ @@ -8122,7 +8146,7 @@ ] }, { - "uuid": "76528cc9-bd71-474a-bae2-c8612a84e832", + "uuid": "1b64fed8-a6ad-4b22-869a-c4b7e0d23deb", "control-id": "cis_rhel10_6-3.3.33", "description": "No notes for control-id 6.3.3.33.", "props": [ @@ -8139,7 +8163,7 @@ ] }, { - "uuid": "22c39215-edbe-48c8-9123-4f1cd0b910a2", + "uuid": "314cf364-3288-45df-9508-9c342512edce", "control-id": "cis_rhel10_6-3.3.34", "description": "No notes for control-id 6.3.3.34.", "props": [ @@ -8156,7 +8180,7 @@ ] }, { - "uuid": "7da68387-2d04-47e9-b6a0-b19f9f6f9465", + "uuid": "5ef33ba2-fbe2-4b6d-916f-92619bd1da7f", "control-id": "cis_rhel10_6-3.3.35", "description": "No notes for control-id 6.3.3.35.", "props": [ @@ -8173,7 +8197,7 @@ ] }, { - "uuid": "f1e25532-cf4f-4857-bf5f-faf415b8e600", + "uuid": "aecf4e26-d120-4bc0-85c8-cfe9493a8327", "control-id": "cis_rhel10_6-3.3.36", "description": "No notes for control-id 6.3.3.36.", "props": [ @@ -8190,7 +8214,7 @@ ] }, { - "uuid": "9db48288-1030-4997-9f6d-22516fb1445b", + "uuid": "0acdfd82-e3ef-4430-aa7d-e202c40afd81", "control-id": "cis_rhel10_6-3.3.37", "description": "The description for control-id cis_rhel10_6-3.3.37.", "props": [ @@ -8203,7 +8227,7 @@ ] }, { - "uuid": "c3fc56a2-d1a9-48f7-9857-bb124b6f8294", + "uuid": "bf170cdd-2092-4821-a294-15f3022ff679", "control-id": "cis_rhel10_6-3.4.1", "description": "No notes for control-id 6.3.4.1.", "props": [ @@ -8220,7 +8244,7 @@ ] }, { - "uuid": "0b7b02bb-27d1-4481-a01a-64aae530f69a", + "uuid": "69804f11-d1de-42ae-9d68-7547d844d1ad", "control-id": "cis_rhel10_6-3.4.2", "description": "No notes for control-id 6.3.4.2.", "props": [ @@ -8237,7 +8261,7 @@ ] }, { - "uuid": "21e16f61-eef0-43fe-9bda-11051ead1bc5", + "uuid": "39bbe776-c1ed-4cc9-9c86-8b70b9ed5da6", "control-id": "cis_rhel10_6-3.4.3", "description": "No notes for control-id 6.3.4.3.", "props": [ @@ -8254,7 +8278,7 @@ ] }, { - "uuid": "5b7e1510-566b-47b1-b92b-ca5d93a14f2a", + "uuid": "7d5ccd96-eaba-4c1f-b519-1e320c290627", "control-id": "cis_rhel10_6-3.4.4", "description": "No notes for control-id 6.3.4.4.", "props": [ @@ -8271,7 +8295,7 @@ ] }, { - "uuid": "1878cb15-0365-4198-b3ec-4e1682285e5c", + "uuid": "e0248030-92a8-4383-a39a-0b7f6dbdda5a", "control-id": "cis_rhel10_6-3.4.5", "description": "No notes for control-id 6.3.4.5.", "props": [ @@ -8288,7 +8312,7 @@ ] }, { - "uuid": "9b6d84f5-fbe8-4fbf-b002-2b4572552899", + "uuid": "0ab21235-7761-47eb-b771-b245fde44a8f", "control-id": "cis_rhel10_6-3.4.6", "description": "No notes for control-id 6.3.4.6.", "props": [ @@ -8305,7 +8329,7 @@ ] }, { - "uuid": "809ad483-83e4-4ed1-9305-3e464fed6127", + "uuid": "e52c3e6b-fac4-4b7f-bdd4-56fce69ff5a3", "control-id": "cis_rhel10_6-3.4.7", "description": "No notes for control-id 6.3.4.7.", "props": [ @@ -8322,7 +8346,7 @@ ] }, { - "uuid": "4e9d7cbd-ad70-4200-9691-3e349cb36861", + "uuid": "73e180e6-b786-4573-be6d-c9cb73bcd954", "control-id": "cis_rhel10_6-3.4.8", "description": "No notes for control-id 6.3.4.8.", "props": [ @@ -8339,7 +8363,7 @@ ] }, { - "uuid": "2110efde-df84-4069-b2b3-430f0399c51b", + "uuid": "1c445b03-39bd-469d-9760-e117c576ea7a", "control-id": "cis_rhel10_6-3.4.9", "description": "No notes for control-id 6.3.4.9.", "props": [ @@ -8356,7 +8380,7 @@ ] }, { - "uuid": "fd01bbee-3315-4941-9379-bfbe3820009f", + "uuid": "900a1d38-2df1-4964-97f0-3e003fb0cbf7", "control-id": "cis_rhel10_6-3.4.10", "description": "No notes for control-id 6.3.4.10.", "props": [ @@ -8373,7 +8397,7 @@ ] }, { - "uuid": "0ca5117d-05c5-48e0-87b3-999b14389272", + "uuid": "899f677e-b692-4e9a-a520-34cf71ceeffb", "control-id": "reload_dconf_db", "description": "This is a helper rule to reload Dconf database correctly.", "props": [ @@ -8390,7 +8414,7 @@ ] }, { - "uuid": "886bcdf3-9973-439c-95a3-6ed541e8b7b9", + "uuid": "5fd301f2-6f3e-4d61-ad99-f7322073f1b6", "control-id": "cis_rhel10_1-1.1.1", "description": "No notes for control-id 1.1.1.1.", "props": [ @@ -8407,7 +8431,7 @@ ] }, { - "uuid": "2da95d79-d726-44cd-9cd5-c29bb2ff4304", + "uuid": "4989f86e-8b8d-4a21-af06-a7c1d3b1b204", "control-id": "cis_rhel10_1-1.1.2", "description": "No notes for control-id 1.1.1.2.", "props": [ @@ -8424,7 +8448,7 @@ ] }, { - "uuid": "58fab43d-799c-4bf1-b752-1ba404c83ad4", + "uuid": "062a08ee-fd9a-4c3f-b44f-624bdb77a5f0", "control-id": "cis_rhel10_1-1.1.3", "description": "No notes for control-id 1.1.1.3.", "props": [ @@ -8441,7 +8465,7 @@ ] }, { - "uuid": "a645d0b8-4523-4790-8c44-28ed16f5e990", + "uuid": "039af6cf-1874-421e-ba4a-2e6a3a357089", "control-id": "cis_rhel10_1-1.1.4", "description": "No notes for control-id 1.1.1.4.", "props": [ @@ -8458,7 +8482,7 @@ ] }, { - "uuid": "8fa2fc17-f28a-4c1e-89cd-3eb404aab7f0", + "uuid": "f48e85c0-516d-4326-91fe-1c08fdfc3256", "control-id": "cis_rhel10_1-1.1.5", "description": "No notes for control-id 1.1.1.5.", "props": [ @@ -8475,7 +8499,7 @@ ] }, { - "uuid": "6546863a-bf79-47b1-a67a-16a3462b0863", + "uuid": "8f33022c-73e9-4280-8892-413741233be2", "control-id": "cis_rhel10_1-1.1.11", "description": "The description for control-id cis_rhel10_1-1.1.11.", "props": [ @@ -8488,7 +8512,7 @@ ] }, { - "uuid": "1a8cfe80-90eb-4c18-8e45-1fbfb2ad1e40", + "uuid": "56dc5088-cc88-4d44-937f-9dbb1e309b17", "control-id": "cis_rhel10_1-1.2.1.1", "description": "No notes for control-id 1.1.2.1.1.", "props": [ @@ -8505,7 +8529,7 @@ ] }, { - "uuid": "47454aed-d623-4361-91f0-1092d2c66011", + "uuid": "1e5b6f3b-0994-4552-b750-f5a30bcd3e32", "control-id": "cis_rhel10_1-1.2.1.2", "description": "No notes for control-id 1.1.2.1.2.", "props": [ @@ -8522,7 +8546,7 @@ ] }, { - "uuid": "7035d8de-d770-451a-ac98-f7689c38d127", + "uuid": "8d054722-58d6-4214-9565-bc9b261e30a3", "control-id": "cis_rhel10_1-1.2.1.3", "description": "No notes for control-id 1.1.2.1.3.", "props": [ @@ -8539,7 +8563,7 @@ ] }, { - "uuid": "48fbcaa3-5eb0-40d8-8a90-4b5bfbe638f3", + "uuid": "e3fac93f-1eb5-4514-b174-6c3649f10f5a", "control-id": "cis_rhel10_1-1.2.1.4", "description": "No notes for control-id 1.1.2.1.4.", "props": [ @@ -8556,7 +8580,7 @@ ] }, { - "uuid": "3858a098-d817-4dec-a2bb-dec6a15374b4", + "uuid": "e228bcec-cb9a-49f1-8f04-7dbcc9324ea8", "control-id": "cis_rhel10_1-1.2.2.1", "description": "No notes for control-id 1.1.2.2.1.", "props": [ @@ -8573,7 +8597,7 @@ ] }, { - "uuid": "92701be7-e993-4628-bb80-b10aaf7387fa", + "uuid": "2363f651-cf05-47b3-86b4-90477987c18c", "control-id": "cis_rhel10_1-1.2.2.2", "description": "No notes for control-id 1.1.2.2.2.", "props": [ @@ -8590,7 +8614,7 @@ ] }, { - "uuid": "7d83b373-4460-489f-8cd4-c9c7e251e6fc", + "uuid": "5c9028ab-40b3-41b9-aa40-29dbad46d4b4", "control-id": "cis_rhel10_1-1.2.2.3", "description": "No notes for control-id 1.1.2.2.3.", "props": [ @@ -8607,7 +8631,7 @@ ] }, { - "uuid": "8f86b0e3-eb86-430d-8379-8cd20e14a854", + "uuid": "f6235371-1e4a-44d3-86f9-dd1563efe2bf", "control-id": "cis_rhel10_1-1.2.2.4", "description": "No notes for control-id 1.1.2.2.4.", "props": [ @@ -8624,7 +8648,7 @@ ] }, { - "uuid": "87e6a761-2e55-4f27-8d98-d43ad8f777dd", + "uuid": "dd2d4c3c-f299-4310-99d0-9ccbf5cc5d72", "control-id": "cis_rhel10_1-1.2.3.2", "description": "No notes for control-id 1.1.2.3.2.", "props": [ @@ -8641,7 +8665,7 @@ ] }, { - "uuid": "1d4545c8-2007-42ca-8b49-1a3ae1bd8dca", + "uuid": "008c10b2-b75c-4d7b-b692-1618ca4b3b5f", "control-id": "cis_rhel10_1-1.2.3.3", "description": "No notes for control-id 1.1.2.3.3.", "props": [ @@ -8658,7 +8682,7 @@ ] }, { - "uuid": "e39dd72b-b6f3-4c34-9921-853e19e14bbb", + "uuid": "28b84a07-2069-4652-afd0-d45dc70cb625", "control-id": "cis_rhel10_1-1.2.4.2", "description": "No notes for control-id 1.1.2.4.2.", "props": [ @@ -8675,7 +8699,7 @@ ] }, { - "uuid": "9e1b6707-7b44-4654-a5a0-bb218e588b8d", + "uuid": "4d825603-5b34-46a8-ae36-c31c832a6758", "control-id": "cis_rhel10_1-1.2.4.3", "description": "No notes for control-id 1.1.2.4.3.", "props": [ @@ -8692,7 +8716,7 @@ ] }, { - "uuid": "55f73c5d-c7ec-4929-b65c-016e5031de47", + "uuid": "42282b35-f934-4d51-8109-19379b6c60b9", "control-id": "cis_rhel10_1-1.2.5.2", "description": "No notes for control-id 1.1.2.5.2.", "props": [ @@ -8709,7 +8733,7 @@ ] }, { - "uuid": "08a60ece-3f53-42b9-9e28-885d83ec539a", + "uuid": "72b3a086-a0e7-4f5f-a47f-ec3f0ed14886", "control-id": "cis_rhel10_1-1.2.5.3", "description": "No notes for control-id 1.1.2.5.3.", "props": [ @@ -8726,7 +8750,7 @@ ] }, { - "uuid": "7b84ba40-1b83-4695-a4f3-b350b3552cc6", + "uuid": "83f23883-d68d-460d-8bbc-cc78cae31365", "control-id": "cis_rhel10_1-1.2.5.4", "description": "No notes for control-id 1.1.2.5.4.", "props": [ @@ -8743,7 +8767,7 @@ ] }, { - "uuid": "1e31c8e1-4387-4ce2-8ae4-ba673a1f3199", + "uuid": "381a1072-1e1c-45ed-ab8b-7466aad2b8ca", "control-id": "cis_rhel10_1-1.2.6.2", "description": "No notes for control-id 1.1.2.6.2.", "props": [ @@ -8760,7 +8784,7 @@ ] }, { - "uuid": "54804716-55fa-466b-a0d5-3ca4245eb2a8", + "uuid": "caa3a059-3ce9-461f-aa99-042b98543edc", "control-id": "cis_rhel10_1-1.2.6.3", "description": "No notes for control-id 1.1.2.6.3.", "props": [ @@ -8777,7 +8801,7 @@ ] }, { - "uuid": "c7ae7a9f-9367-44fd-8475-ee563f70d040", + "uuid": "5e54cbbe-c5a5-4781-9751-18a580756608", "control-id": "cis_rhel10_1-1.2.6.4", "description": "No notes for control-id 1.1.2.6.4.", "props": [ @@ -8794,7 +8818,7 @@ ] }, { - "uuid": "79c464da-24f2-400c-b184-9ee4fe0ef10a", + "uuid": "5ca7e999-c1f3-4fb2-a6d6-fbea304871e6", "control-id": "cis_rhel10_1-1.2.7.2", "description": "No notes for control-id 1.1.2.7.2.", "props": [ @@ -8811,7 +8835,7 @@ ] }, { - "uuid": "5f454521-d934-4893-9a5f-e0364e42a0ed", + "uuid": "f6b14611-1c0f-4be7-9eaf-3d36d595a191", "control-id": "cis_rhel10_1-1.2.7.3", "description": "No notes for control-id 1.1.2.7.3.", "props": [ @@ -8828,7 +8852,7 @@ ] }, { - "uuid": "7048709e-18b1-4c1d-baaf-45d4cbb0b154", + "uuid": "74153b02-14ec-4bbf-bb10-df477855132e", "control-id": "cis_rhel10_1-1.2.7.4", "description": "No notes for control-id 1.1.2.7.4.", "props": [ @@ -8845,7 +8869,7 @@ ] }, { - "uuid": "e3059ab2-3639-472d-83bd-ea53e3f71dca", + "uuid": "a3d1d1db-5ba5-4da4-bf6e-4a8b4e909607", "control-id": "cis_rhel10_1-2.1.1", "description": "The description for control-id cis_rhel10_1-2.1.1.", "props": [ @@ -8858,7 +8882,7 @@ ] }, { - "uuid": "12114ac0-8e6c-48f6-bca2-2fe55bc216d6", + "uuid": "8266298a-5675-43e4-9823-c29e53fc693d", "control-id": "cis_rhel10_1-2.1.2", "description": "No notes for control-id 1.2.1.2.", "props": [ @@ -8875,7 +8899,7 @@ ] }, { - "uuid": "108309c6-dc79-4f97-979f-65073cd748d9", + "uuid": "66b82bb9-e1ce-4aa7-aef2-9567530b55f5", "control-id": "cis_rhel10_1-2.1.4", "description": "The description for control-id cis_rhel10_1-2.1.4.", "props": [ @@ -8888,7 +8912,7 @@ ] }, { - "uuid": "f4d53f2c-6668-47dc-bcbb-069591eca5ff", + "uuid": "0c16b575-5821-4644-8cf0-371d58f17c80", "control-id": "cis_rhel10_1-2.2.1", "description": "The description for control-id cis_rhel10_1-2.2.1.", "props": [ @@ -8901,7 +8925,7 @@ ] }, { - "uuid": "95b89fff-1d0d-4f2b-8637-a7444c0f7d6c", + "uuid": "7ffa7f6f-0df5-4966-af31-eebb9adcf36f", "control-id": "cis_rhel10_1-3.1.1", "description": "No notes for control-id 1.3.1.1.", "props": [ @@ -8918,7 +8942,7 @@ ] }, { - "uuid": "c2210c87-e95a-40c4-991d-4d593f3acc55", + "uuid": "6dbefb55-f819-49e3-9146-0cdd6f1e6296", "control-id": "cis_rhel10_1-3.1.2", "description": "No notes for control-id 1.3.1.2.", "props": [ @@ -8935,7 +8959,7 @@ ] }, { - "uuid": "d43f1a38-e523-4230-aa77-d0b11c7b95a4", + "uuid": "5ebc033d-ccc4-4fea-887c-5259c4921f70", "control-id": "cis_rhel10_1-3.1.3", "description": "No notes for control-id 1.3.1.3.", "props": [ @@ -8952,7 +8976,7 @@ ] }, { - "uuid": "e66b1687-a0e9-4b6d-830a-4c7f60f5d7ee", + "uuid": "c13e7831-aad2-4253-a35b-5ab66b7945fd", "control-id": "cis_rhel10_1-3.1.4", "description": "No notes for control-id 1.3.1.4.", "props": [ @@ -8969,7 +8993,7 @@ ] }, { - "uuid": "b709d7d8-6da3-4ee7-b0d3-28dce195f18a", + "uuid": "69e3fed5-583a-459a-83e2-f95081f4b2ef", "control-id": "cis_rhel10_1-3.1.7", "description": "No notes for control-id 1.3.1.7.", "props": [ @@ -8986,7 +9010,7 @@ ] }, { - "uuid": "f9aad468-92ad-4d35-9c59-11ce16ca3861", + "uuid": "bcdb7c01-f289-45bf-b489-ef4b7d003be5", "control-id": "cis_rhel10_1-4.1", "description": "There is no automated remediation for this rule and this is intentional.\nMore details in the rule description.", "props": [ @@ -9003,7 +9027,7 @@ ] }, { - "uuid": "308a7cbf-d3c6-4538-ab44-267954b21d74", + "uuid": "f57f3d29-613d-4527-92bc-695d9b3fb09a", "control-id": "cis_rhel10_1-4.2", "description": "The description for control-id cis_rhel10_1-4.2.", "props": [ @@ -9046,7 +9070,7 @@ ] }, { - "uuid": "1b7d2b84-a11b-4db4-b26b-e00329faaa52", + "uuid": "ae5c3afe-20b6-4dd8-b1a2-9bc9393bc9d4", "control-id": "cis_rhel10_1-5.1", "description": "No notes for control-id 1.5.1.", "props": [ @@ -9063,7 +9087,7 @@ ] }, { - "uuid": "84d1948d-d375-4b20-9f13-4603a45bc53e", + "uuid": "54206f4c-117d-48be-ba99-06a77b9b53eb", "control-id": "cis_rhel10_1-5.2", "description": "No notes for control-id 1.5.2.", "props": [ @@ -9080,7 +9104,7 @@ ] }, { - "uuid": "c8aa3af2-84b9-4344-a415-3122cef83386", + "uuid": "eb4868b4-7a44-44e8-828f-ee9f333be071", "control-id": "cis_rhel10_1-5.4", "description": "No notes for control-id 1.5.4.", "props": [ @@ -9097,7 +9121,7 @@ ] }, { - "uuid": "efbe2879-4102-4b3b-ba53-c578e3004c3e", + "uuid": "bf654ffe-121d-47e7-aa5d-2371e3fd914f", "control-id": "cis_rhel10_1-5.5", "description": "No notes for control-id 1.5.5.", "props": [ @@ -9114,7 +9138,7 @@ ] }, { - "uuid": "4d332ccc-d1a0-438a-b65c-8941ea746f3a", + "uuid": "c79df9f3-39ce-4d3b-8734-86e32800cd6e", "control-id": "cis_rhel10_1-5.6", "description": "No notes for control-id 1.5.6.", "props": [ @@ -9131,7 +9155,7 @@ ] }, { - "uuid": "b1af54f0-a2ff-4867-9217-d64861ced93a", + "uuid": "9c6f1d1e-d545-4d52-9a63-723f36368e6b", "control-id": "cis_rhel10_1-5.7", "description": "No notes for control-id 1.5.7.", "props": [ @@ -9148,7 +9172,7 @@ ] }, { - "uuid": "64fa6c73-48f0-4b85-9010-fbf0d32e52a3", + "uuid": "d45855b7-ca55-4ec0-9d52-b8af228dacf7", "control-id": "cis_rhel10_1-5.8", "description": "Address Space Layout Randomization (ASLR)", "props": [ @@ -9165,7 +9189,7 @@ ] }, { - "uuid": "63bde298-b452-4566-875a-0c485c907896", + "uuid": "f714a85d-f8b8-46b8-8448-93ab3762712d", "control-id": "cis_rhel10_1-5.9", "description": "No notes for control-id 1.5.9.", "props": [ @@ -9182,7 +9206,7 @@ ] }, { - "uuid": "70c9661b-dcc0-4ecc-8d27-89f4583e3037", + "uuid": "a4a9adbd-f755-44dd-bd56-19715b6b4e3e", "control-id": "cis_rhel10_1-5.10", "description": "No notes for control-id 1.5.10.", "props": [ @@ -9199,7 +9223,7 @@ ] }, { - "uuid": "3ef36ca6-eca2-48e7-a0b9-a975a7b1c9b0", + "uuid": "9c9ced2f-2f16-4a84-87a0-2ba73d4b9b59", "control-id": "cis_rhel10_1-6.1", "description": "No notes for control-id 1.6.1.", "props": [ @@ -9216,7 +9240,7 @@ ] }, { - "uuid": "7bf2be69-8f7c-48d1-afae-487f785360db", + "uuid": "23891ecc-2faa-4f8b-bcad-7921f428c6da", "control-id": "cis_rhel10_1-6.2", "description": "No notes for control-id 1.6.2.", "props": [ @@ -9233,7 +9257,7 @@ ] }, { - "uuid": "fa8126d6-e534-4417-98b0-0d3ed032828b", + "uuid": "4db25ec7-d511-4c8e-8208-522a23263e02", "control-id": "cis_rhel10_1-6.3", "description": "No notes for control-id 1.6.3.", "props": [ @@ -9250,7 +9274,7 @@ ] }, { - "uuid": "aad019aa-477b-4e66-a9a2-a69a82783f9c", + "uuid": "341f329d-d5c5-4f72-b4bb-81a1887a6ef7", "control-id": "cis_rhel10_1-6.4", "description": "No notes for control-id 1.6.4.", "props": [ @@ -9267,7 +9291,7 @@ ] }, { - "uuid": "697a30ca-ea46-40b6-b8f9-a952e209fe25", + "uuid": "25efe80d-6f93-4893-99a5-9662a55f3a34", "control-id": "cis_rhel10_1-7.1", "description": "No notes for control-id 1.7.1.", "props": [ @@ -9284,7 +9308,7 @@ ] }, { - "uuid": "4aed5a47-2926-4a9d-82a9-3f8caf376b22", + "uuid": "a3629e63-8820-4dec-afc1-4b070298094d", "control-id": "cis_rhel10_1-7.2", "description": "No notes for control-id 1.7.2.", "props": [ @@ -9301,7 +9325,7 @@ ] }, { - "uuid": "b5c1232c-8f4b-49c4-ac3f-f22eed2ed2c7", + "uuid": "95d06db8-9821-4e55-913e-2e12089639a3", "control-id": "cis_rhel10_1-7.3", "description": "No notes for control-id 1.7.3.", "props": [ @@ -9318,7 +9342,7 @@ ] }, { - "uuid": "d12c3260-66b2-46c0-b247-3ad73c0ae4a5", + "uuid": "9b789e27-5292-4bee-a115-ec47ff1b0e99", "control-id": "cis_rhel10_1-7.4", "description": "No notes for control-id 1.7.4.", "props": [ @@ -9345,7 +9369,7 @@ ] }, { - "uuid": "3420f41b-314d-4e93-9bbd-61e5b922bbcf", + "uuid": "e322f206-e412-4f11-94e7-61315aa32055", "control-id": "cis_rhel10_1-7.5", "description": "No notes for control-id 1.7.5.", "props": [ @@ -9372,7 +9396,7 @@ ] }, { - "uuid": "0e1e3ddc-dd47-4ecb-b21b-d1e57d1fefec", + "uuid": "82e5e6a5-0415-473a-af0c-81886ca26e4d", "control-id": "cis_rhel10_1-7.6", "description": "No notes for control-id 1.7.6.", "props": [ @@ -9399,7 +9423,7 @@ ] }, { - "uuid": "57942125-1821-4101-9d03-670504f66fae", + "uuid": "3f5d3062-4f3c-4c69-a544-d0f41db2170b", "control-id": "cis_rhel10_1-8.1", "description": "No notes for control-id 1.8.1.", "props": [ @@ -9421,7 +9445,7 @@ ] }, { - "uuid": "ef3b6d23-29d5-421f-9e44-2c78f4fac1c5", + "uuid": "ee1c1ab9-1a3f-4fb8-bf91-80a79458f073", "control-id": "cis_rhel10_1-8.2", "description": "No notes for control-id 1.8.2.", "props": [ @@ -9438,7 +9462,7 @@ ] }, { - "uuid": "108601b1-acf8-40bd-8594-9a163d14d720", + "uuid": "4e0015af-6df3-4bea-bf15-000c8209d272", "control-id": "cis_rhel10_1-8.3", "description": "No notes for control-id 1.8.3.", "props": [ @@ -9470,7 +9494,7 @@ ] }, { - "uuid": "fc9263a0-256b-42ca-bc52-54bd2017a493", + "uuid": "c317e1d5-115e-4617-b2a5-c6be508e31d4", "control-id": "cis_rhel10_1-8.5", "description": "No notes for control-id 1.8.5.", "props": [ @@ -9487,7 +9511,7 @@ ] }, { - "uuid": "31aebc3f-471b-4ce6-aea0-327e9362f988", + "uuid": "316159c8-a58c-4461-be2b-81c5c21af72d", "control-id": "cis_rhel10_2-1.4", "description": "No notes for control-id 2.1.4.", "props": [ @@ -9504,7 +9528,7 @@ ] }, { - "uuid": "82308030-117b-4de4-b422-66854f07f0ee", + "uuid": "74518def-70e2-414c-8738-0341f5129f75", "control-id": "cis_rhel10_2-1.5", "description": "No notes for control-id 2.1.5.", "props": [ @@ -9521,7 +9545,7 @@ ] }, { - "uuid": "075ad1b5-3327-452f-9858-df618b741713", + "uuid": "81d5bfba-c1d7-424f-8387-ccde5c7e4799", "control-id": "cis_rhel10_2-1.6", "description": "No notes for control-id 2.1.6.", "props": [ @@ -9538,7 +9562,7 @@ ] }, { - "uuid": "d378d09b-f164-4f60-8f8d-40e9413b3c18", + "uuid": "bf5543d3-1e5c-46e6-affa-b52e54eef9ae", "control-id": "cis_rhel10_2-1.7", "description": "No notes for control-id 2.1.7.", "props": [ @@ -9555,7 +9579,7 @@ ] }, { - "uuid": "8bc2af46-8f87-4069-b825-83c6fafe8c17", + "uuid": "c6bf3dbe-877e-4f81-a735-eab8aeda4bc7", "control-id": "cis_rhel10_2-1.8", "description": "No notes for control-id 2.1.8.", "props": [ @@ -9577,7 +9601,7 @@ ] }, { - "uuid": "707f216f-aad3-4368-83ef-2c74026b91eb", + "uuid": "8e56de6c-1aaf-4dd7-aa69-765df4360a81", "control-id": "cis_rhel10_2-1.9", "description": "Many of the libvirt packages used by Enterprise Linux virtualization are dependent on the\nnfs-utils package.", "props": [ @@ -9594,7 +9618,7 @@ ] }, { - "uuid": "c4c6722b-1e7f-4232-8402-4d2f61b98291", + "uuid": "91f2d9c8-46bd-40a3-b2b7-a2eba0606669", "control-id": "cis_rhel10_2-1.11", "description": "Many of the libvirt packages used by Enterprise Linux virtualization, and the nfs-utils\npackage used for The Network File System (NFS), are dependent on the rpcbind package.", "props": [ @@ -9611,7 +9635,7 @@ ] }, { - "uuid": "a0f262c7-7878-4e28-ba6a-0fdc84f036a4", + "uuid": "6632c036-e443-4ebc-8356-f025dc8bfe28", "control-id": "cis_rhel10_2-1.12", "description": "No notes for control-id 2.1.12.", "props": [ @@ -9628,7 +9652,7 @@ ] }, { - "uuid": "285d4b5b-157c-440c-aa79-246a6809f992", + "uuid": "f17edb4a-2d24-4e59-8345-730924392aa2", "control-id": "cis_rhel10_2-1.13", "description": "No notes for control-id 2.1.13.", "props": [ @@ -9645,7 +9669,7 @@ ] }, { - "uuid": "401a4911-d78b-43d1-857f-f73a4c2db19a", + "uuid": "ceff9384-d1f8-44c2-b747-b5133558a2d3", "control-id": "cis_rhel10_2-1.14", "description": "No notes for control-id 2.1.14.", "props": [ @@ -9662,7 +9686,7 @@ ] }, { - "uuid": "16dd149c-ed36-464c-845f-1bbdbe4d7cda", + "uuid": "f417da7d-1113-489b-b9db-faa69ccb4f67", "control-id": "cis_rhel10_2-1.15", "description": "No notes for control-id 2.1.15.", "props": [ @@ -9679,7 +9703,7 @@ ] }, { - "uuid": "eaed0844-7a2f-4a77-867e-23b7cdbadbc6", + "uuid": "25c45c53-ab7e-4019-8ddf-29dfcefcff48", "control-id": "cis_rhel10_2-1.16", "description": "No notes for control-id 2.1.16.", "props": [ @@ -9696,7 +9720,7 @@ ] }, { - "uuid": "b6652023-d079-46b3-a838-6f3ff384c468", + "uuid": "be7b6e8c-cad8-4e9d-b02f-46656a76b6cc", "control-id": "cis_rhel10_2-1.17", "description": "No notes for control-id 2.1.17.", "props": [ @@ -9713,7 +9737,7 @@ ] }, { - "uuid": "a543c6ef-22a3-4fd2-89ec-ec75e322a4ef", + "uuid": "7708a2a0-ce31-4ebb-b3ac-a532d1c3806b", "control-id": "cis_rhel10_2-1.18", "description": "No notes for control-id 2.1.18.", "props": [ @@ -9735,7 +9759,7 @@ ] }, { - "uuid": "b41c81d3-d47d-4fb2-832c-a137b48cc2bc", + "uuid": "426bec1a-04e2-4c79-93a5-5d8b8d5ce04a", "control-id": "cis_rhel10_2-1.21", "description": "No notes for control-id 2.1.21.", "props": [ @@ -9757,7 +9781,7 @@ ] }, { - "uuid": "16ee730c-ceec-4a37-a080-08480be1c532", + "uuid": "0b43046a-d51e-4a80-8ffc-b44dff2e21cf", "control-id": "cis_rhel10_2-1.22", "description": "The description for control-id cis_rhel10_2-1.22.", "props": [ @@ -9770,7 +9794,7 @@ ] }, { - "uuid": "44a79a30-77e8-492e-9187-eaafb47c0646", + "uuid": "cdda78e8-ef43-4328-968c-55d3184fffc5", "control-id": "cis_rhel10_2-2.1", "description": "No notes for control-id 2.2.1.", "props": [ @@ -9787,7 +9811,7 @@ ] }, { - "uuid": "d9cfa103-e47d-4404-9616-82d59c8314c4", + "uuid": "6953da60-9a91-4f28-8499-f52ab9dac445", "control-id": "cis_rhel10_2-2.3", "description": "No notes for control-id 2.2.3.", "props": [ @@ -9804,7 +9828,7 @@ ] }, { - "uuid": "ab4230c9-fe83-4917-b00c-ac24a03ee816", + "uuid": "b5cc4296-03aa-47c1-8f71-a2badace617f", "control-id": "cis_rhel10_2-2.4", "description": "No notes for control-id 2.2.4.", "props": [ @@ -9821,7 +9845,7 @@ ] }, { - "uuid": "adccb0fb-1da4-4246-a686-4e1b3b3911f1", + "uuid": "a4996da5-9e80-46c3-aaf9-7b03c087c882", "control-id": "cis_rhel10_2-3.1", "description": "No notes for control-id 2.3.1.", "props": [ @@ -9833,7 +9857,7 @@ ] }, { - "uuid": "b7a86627-a8ea-48a4-b885-5cdbda814f03", + "uuid": "44f33fc3-0614-4e9e-97e4-ea0c5e35dcab", "control-id": "cis_rhel10_2-3.2", "description": "No notes for control-id 2.3.2.", "props": [ @@ -9850,7 +9874,7 @@ ] }, { - "uuid": "1050ceb5-878f-4255-b256-e9104ff6da06", + "uuid": "2403992c-3a72-4594-85c8-cd0db0cc3252", "control-id": "cis_rhel10_2-3.3", "description": "No notes for control-id 2.3.3.", "props": [ @@ -9867,7 +9891,7 @@ ] }, { - "uuid": "c169aa67-9c0a-4aec-895c-690d976b1c1b", + "uuid": "00672342-3f34-425b-9e25-f592500898ae", "control-id": "cis_rhel10_2-4.1.1", "description": "No notes for control-id 2.4.1.1.", "props": [ @@ -9889,7 +9913,7 @@ ] }, { - "uuid": "fcf8bde9-1c50-46da-bc65-d680a2826efa", + "uuid": "01838605-d2bc-40f3-a2d0-95ac8749f0f3", "control-id": "cis_rhel10_2-4.1.2", "description": "No notes for control-id 2.4.1.2.", "props": [ @@ -9916,7 +9940,7 @@ ] }, { - "uuid": "9077cc6a-419d-4c40-90fb-eed267288370", + "uuid": "81da97de-e73b-4165-b729-502f4150a971", "control-id": "cis_rhel10_2-4.1.3", "description": "No notes for control-id 2.4.1.3.", "props": [ @@ -9943,7 +9967,7 @@ ] }, { - "uuid": "761ee774-478d-42db-b0e7-505796082e71", + "uuid": "42355531-c723-4154-8d96-df130fa1040a", "control-id": "cis_rhel10_2-4.1.4", "description": "No notes for control-id 2.4.1.4.", "props": [ @@ -9970,7 +9994,7 @@ ] }, { - "uuid": "5f409cc4-55ba-4c74-bd70-5f81fe9ff7af", + "uuid": "d310b4e3-88fe-4257-8053-3275864c5eb8", "control-id": "cis_rhel10_2-4.1.5", "description": "No notes for control-id 2.4.1.5.", "props": [ @@ -9997,7 +10021,7 @@ ] }, { - "uuid": "747faf5a-1634-4f57-b290-7bd1d7fce861", + "uuid": "b67afc8a-9f6e-405c-ad78-5827b5f6da47", "control-id": "cis_rhel10_2-4.1.6", "description": "No notes for control-id 2.4.1.6.", "props": [ @@ -10024,7 +10048,7 @@ ] }, { - "uuid": "e6ed8c95-2805-401b-b32f-b0fc4e895b33", + "uuid": "dd475cfe-0a9f-474f-b8e7-4a30a47e943e", "control-id": "cis_rhel10_2-4.1.7", "description": "No notes for control-id 2.4.1.7.", "props": [ @@ -10051,7 +10075,7 @@ ] }, { - "uuid": "9e00f998-fdaa-4c08-9a1f-d8a94e7ce0f2", + "uuid": "3c604415-7721-4cee-b405-ca392a65c57e", "control-id": "cis_rhel10_2-4.1.8", "description": "No notes for control-id 2.4.1.8.", "props": [ @@ -10078,7 +10102,7 @@ ] }, { - "uuid": "bc0ee78c-e3ba-4430-8029-1857e6b89516", + "uuid": "29a271a7-a927-451d-baed-425a9a33bdd4", "control-id": "cis_rhel10_2-4.1.9", "description": "No notes for control-id 2.4.1.9.", "props": [ @@ -10115,7 +10139,7 @@ ] }, { - "uuid": "d5cfc9d5-337e-45ce-863d-71b1ceb9704f", + "uuid": "4a9d3b30-0e02-4f71-8d97-5aad7754f5f0", "control-id": "cis_rhel10_2-4.2.1", "description": "No notes for control-id 2.4.2.1.", "props": [ @@ -10152,7 +10176,7 @@ ] }, { - "uuid": "8671e08b-39bc-40e0-b10c-907b11113263", + "uuid": "3f75eb8a-b4ce-434a-9a8d-13d9b9a7e7dd", "control-id": "cis_rhel10_3-1.1", "description": "The description for control-id cis_rhel10_3-1.1.", "props": [ @@ -10165,7 +10189,7 @@ ] }, { - "uuid": "bcacf0c5-59b8-4a09-aa59-c7665396210c", + "uuid": "2efc2eae-0613-4d00-a2d0-9211054efefa", "control-id": "cis_rhel10_3-2.1", "description": "No notes for control-id 3.2.1.", "props": [ @@ -10182,7 +10206,7 @@ ] }, { - "uuid": "f0548128-c0fa-4ac8-b51a-22c6ad03bddf", + "uuid": "5a749e68-f23c-4fb4-95c1-0d0aa4176b04", "control-id": "cis_rhel10_3-2.2", "description": "No notes for control-id 3.2.2.", "props": [ @@ -10199,7 +10223,7 @@ ] }, { - "uuid": "d4cb662d-c676-4a92-a1d0-9280bf79c47e", + "uuid": "ee1e4b0c-58c1-49a2-8ba7-581d6b964005", "control-id": "cis_rhel10_3-2.3", "description": "No notes for control-id 3.2.3.", "props": [ @@ -10216,7 +10240,7 @@ ] }, { - "uuid": "40ca9560-5d41-4e5c-922e-2a077e613e62", + "uuid": "683480ae-609b-4073-8012-aa46b28c60c9", "control-id": "cis_rhel10_3-2.4", "description": "No notes for control-id 3.2.4.", "props": [ @@ -10233,7 +10257,7 @@ ] }, { - "uuid": "adb60164-c127-4531-8754-0fdb28c1c012", + "uuid": "ca33b915-c200-4391-a5b3-d7056ac22bbc", "control-id": "cis_rhel10_3-2.5", "description": "No notes for control-id 3.2.5.", "props": [ @@ -10250,7 +10274,7 @@ ] }, { - "uuid": "c281b290-b620-4cc4-b81e-d077309d1147", + "uuid": "82835fc6-6597-4450-997b-4f43a6e3a7ca", "control-id": "cis_rhel10_3-2.6", "description": "No notes for control-id 3.2.6.", "props": [ @@ -10267,7 +10291,7 @@ ] }, { - "uuid": "ca9f8b2e-6381-45cf-87cb-01bafca7f094", + "uuid": "cc638aa7-aacb-46b0-900a-cb544ec718b7", "control-id": "cis_rhel10_3-3.1.1", "description": "No notes for control-id 3.3.1.1.", "props": [ @@ -10284,7 +10308,7 @@ ] }, { - "uuid": "2cba13d1-e435-4206-b2a3-8be183fc85ae", + "uuid": "8fd76ff5-9b30-4004-8715-6134976b0759", "control-id": "cis_rhel10_3-3.1.2", "description": "No notes for control-id 3.3.1.2.", "props": [ @@ -10301,7 +10325,7 @@ ] }, { - "uuid": "c9658fe2-be28-478b-a010-4592a223062f", + "uuid": "347d75df-89bc-4e1a-8cf4-19bc22f42fa6", "control-id": "cis_rhel10_3-3.1.3", "description": "No notes for control-id 3.3.1.3.", "props": [ @@ -10318,7 +10342,7 @@ ] }, { - "uuid": "bf1cf98e-0465-4ed7-9b35-c9f87e2e1f31", + "uuid": "783646c8-35ba-4516-a1ad-67ea4de8a84a", "control-id": "cis_rhel10_3-3.1.4", "description": "No notes for control-id 3.3.1.4.", "props": [ @@ -10335,7 +10359,7 @@ ] }, { - "uuid": "57bd4bd1-de22-4af5-a79b-f564003f7f01", + "uuid": "f2ea1c6d-1cc3-4a9d-8d0d-186b18d4e77d", "control-id": "cis_rhel10_3-3.1.5", "description": "No notes for control-id 3.3.1.5.", "props": [ @@ -10352,7 +10376,7 @@ ] }, { - "uuid": "85cdd2ce-0df4-489c-b5b8-82bdfbae9ef6", + "uuid": "42c2d044-7e4b-4a88-9241-bde058aa8e64", "control-id": "cis_rhel10_3-3.1.6", "description": "No notes for control-id 3.3.1.6.", "props": [ @@ -10369,7 +10393,7 @@ ] }, { - "uuid": "5ebad471-0471-461f-817e-c869bb90314a", + "uuid": "ea351856-0f65-4113-8c76-47a110f12156", "control-id": "cis_rhel10_3-3.1.7", "description": "No notes for control-id 3.3.1.7.", "props": [ @@ -10386,7 +10410,7 @@ ] }, { - "uuid": "2276df0b-4a91-4715-bcfb-262362316e26", + "uuid": "40241c53-fff6-4d60-8888-c41bcb2e7022", "control-id": "cis_rhel10_3-3.1.8", "description": "No notes for control-id 3.3.1.8.", "props": [ @@ -10403,7 +10427,7 @@ ] }, { - "uuid": "2d35e034-0994-4b00-a7d5-4a1c8b5d3cd7", + "uuid": "253452d7-48a2-4bb2-afbe-9e2991f3f36a", "control-id": "cis_rhel10_3-3.1.9", "description": "No notes for control-id 3.3.1.9.", "props": [ @@ -10420,7 +10444,7 @@ ] }, { - "uuid": "cab742ee-018b-4891-aa01-718c2d29e08b", + "uuid": "757faacf-ade9-4a68-a303-45b4c547b77b", "control-id": "cis_rhel10_3-3.1.10", "description": "No notes for control-id 3.3.1.10.", "props": [ @@ -10437,7 +10461,7 @@ ] }, { - "uuid": "6fcb93ac-9b64-4f4f-bfbf-716cf59c4c28", + "uuid": "78cb0815-b2b7-4fa1-9474-bffb7f911cb5", "control-id": "cis_rhel10_3-3.1.11", "description": "No notes for control-id 3.3.1.11.", "props": [ @@ -10454,7 +10478,7 @@ ] }, { - "uuid": "b41a1259-eb45-4d11-a5f4-5a35f58bacc8", + "uuid": "708b1d5c-0757-4b5f-9a8f-91a1d8027c97", "control-id": "cis_rhel10_3-3.1.12", "description": "No notes for control-id 3.3.1.12.", "props": [ @@ -10471,7 +10495,7 @@ ] }, { - "uuid": "133b0a3c-d1f0-482f-a6ff-7a649269da23", + "uuid": "0242260b-c682-4b67-8e30-9ee4c893e7ef", "control-id": "cis_rhel10_3-3.1.13", "description": "No notes for control-id 3.3.1.13.", "props": [ @@ -10488,7 +10512,7 @@ ] }, { - "uuid": "dfe64292-e0a4-45cc-b8bc-baad7afd4843", + "uuid": "5130700e-3159-41cb-9775-251c6280d5b0", "control-id": "cis_rhel10_3-3.1.14", "description": "No notes for control-id 3.3.1.14.", "props": [ @@ -10505,7 +10529,7 @@ ] }, { - "uuid": "af9fd1c6-19cb-4881-b145-43bf3654852f", + "uuid": "9692fec2-2c92-4ff9-868c-62b658f73b19", "control-id": "cis_rhel10_3-3.1.15", "description": "No notes for control-id 3.3.1.15.", "props": [ @@ -10522,7 +10546,7 @@ ] }, { - "uuid": "515a3c51-b630-4458-9567-dd0d4baa61e8", + "uuid": "1b6507e4-c0f0-456c-a7d2-f576f91562b7", "control-id": "cis_rhel10_3-3.1.16", "description": "No notes for control-id 3.3.1.16.", "props": [ @@ -10539,7 +10563,7 @@ ] }, { - "uuid": "2453f1af-a278-464a-8457-c8b227aa2316", + "uuid": "179763f2-67dc-46b8-acfe-65cf652eedf3", "control-id": "cis_rhel10_3-3.1.17", "description": "No notes for control-id 3.3.1.17.", "props": [ @@ -10556,7 +10580,7 @@ ] }, { - "uuid": "d3aff5fc-2dee-468e-9b01-af26503fc73f", + "uuid": "97b2c265-75ed-449c-94d7-697db88bfff9", "control-id": "cis_rhel10_3-3.1.18", "description": "No notes for control-id 3.3.1.18.", "props": [ @@ -10573,7 +10597,7 @@ ] }, { - "uuid": "2d700697-a408-4c18-a7cc-b94528219ab5", + "uuid": "9cf456e5-9ec0-43f6-8ef4-fec9d6183142", "control-id": "cis_rhel10_3-3.2.1", "description": "No notes for control-id 3.3.2.1.", "props": [ @@ -10590,7 +10614,7 @@ ] }, { - "uuid": "73c9c5f5-8b6a-4763-9ee9-f8909aef5ad3", + "uuid": "a15e0d4d-ce6e-426e-88b1-b0e3e3166cb9", "control-id": "cis_rhel10_3-3.2.2", "description": "No notes for control-id 3.3.2.2.", "props": [ @@ -10607,7 +10631,7 @@ ] }, { - "uuid": "eef4c8b3-53a0-429a-8ebf-e773aef07c2e", + "uuid": "336759b9-8b93-4e5d-a19d-a038db3fa044", "control-id": "cis_rhel10_3-3.2.3", "description": "No notes for control-id 3.3.2.3.", "props": [ @@ -10624,7 +10648,7 @@ ] }, { - "uuid": "d9c30c3b-f975-41d4-a784-d6b0145d4b72", + "uuid": "2f44909a-5e49-4e25-901d-e6ade2fffafc", "control-id": "cis_rhel10_3-3.2.4", "description": "No notes for control-id 3.3.2.4.", "props": [ @@ -10641,7 +10665,7 @@ ] }, { - "uuid": "e1354663-8090-4ab4-8b8e-7e872ee09bed", + "uuid": "b3c1d0bb-ec09-434d-9e51-b87abc97b147", "control-id": "cis_rhel10_3-3.2.5", "description": "No notes for control-id 3.3.2.5.", "props": [ @@ -10658,7 +10682,7 @@ ] }, { - "uuid": "6dfdfb24-ca2c-42aa-8b1e-b5de358724f5", + "uuid": "37438013-6422-4d96-886f-2240b95cc51b", "control-id": "cis_rhel10_3-3.2.6", "description": "No notes for control-id 3.3.2.6.", "props": [ @@ -10675,7 +10699,7 @@ ] }, { - "uuid": "4db9e95c-60f6-4b5c-a917-f32d88a8e8e5", + "uuid": "c876f688-edd7-4ddd-968b-5743e2b35e09", "control-id": "cis_rhel10_3-3.2.7", "description": "No notes for control-id 3.3.2.7.", "props": [ @@ -10692,7 +10716,7 @@ ] }, { - "uuid": "f594abc3-6336-43c2-a62a-4b9df01f2920", + "uuid": "c4791d8a-82b3-4445-acc4-bab0264ebbee", "control-id": "cis_rhel10_3-3.2.8", "description": "No notes for control-id 3.3.2.8.", "props": [ @@ -10709,7 +10733,7 @@ ] }, { - "uuid": "4f999a20-a066-4100-b37a-e41966777bce", + "uuid": "23202adc-bb43-4261-a21a-80f781635ee5", "control-id": "cis_rhel10_4-1.1", "description": "No notes for control-id 4.1.1.", "props": [ @@ -10726,7 +10750,7 @@ ] }, { - "uuid": "117d982a-c5ff-4a97-a7bf-c6a5ed2e5e85", + "uuid": "32b77277-b597-4943-88ea-46740575b31f", "control-id": "cis_rhel10_4-1.2", "description": "No notes for control-id 4.1.2.", "props": [ @@ -10743,7 +10767,7 @@ ] }, { - "uuid": "ae1c1dc9-d49d-4e8d-9dab-a58d24ab03a1", + "uuid": "1dc3bf05-8ad2-4c1f-958d-887eeba2f26e", "control-id": "cis_rhel10_4-1.3", "description": "No notes for control-id 4.1.3.", "props": [ @@ -10760,7 +10784,7 @@ ] }, { - "uuid": "58cf32df-0546-4eee-a8ea-2c844117639d", + "uuid": "6e46f7db-b79e-4ac2-b74f-6b477fd74f8d", "control-id": "cis_rhel10_4-1.4", "description": "The description for control-id cis_rhel10_4-1.4.", "props": [ @@ -10773,7 +10797,7 @@ ] }, { - "uuid": "c88d6203-578f-41f3-bcf8-ff433508791a", + "uuid": "fca67e8f-95f4-4c04-b1bb-80f0e0b1a3ec", "control-id": "cis_rhel10_4-1.5", "description": "Firewalld in Red Hat Enterprise Linux 10 accepts loopback traffic by default.", "props": [ @@ -10790,7 +10814,7 @@ ] }, { - "uuid": "3c7f7b86-baf8-460c-be9a-1a02981ea731", + "uuid": "81c87f60-32c3-4fbc-8e3b-6e34ac4f9df2", "control-id": "cis_rhel10_4-1.6", "description": "The description for control-id cis_rhel10_4-1.6.", "props": [ @@ -10803,7 +10827,7 @@ ] }, { - "uuid": "2fab3c3b-df55-4537-8703-0e75d13f5cae", + "uuid": "8d78181c-7513-49f8-85ba-e048fefa3304", "control-id": "cis_rhel10_4-1.7", "description": "The description for control-id cis_rhel10_4-1.7.", "props": [ @@ -10816,7 +10840,7 @@ ] }, { - "uuid": "bd2a5e34-526c-4920-af59-98a92bebd155", + "uuid": "676dd659-d6da-43f1-a151-55c047da83da", "control-id": "cis_rhel10_5-1.1", "description": "No notes for control-id 5.1.1.", "props": [ @@ -10873,7 +10897,7 @@ ] }, { - "uuid": "512e586b-6398-415f-9179-7efa3c92878e", + "uuid": "8fa88004-c2e0-400f-8dd4-bcc53135bb6c", "control-id": "cis_rhel10_5-1.2", "description": "No notes for control-id 5.1.2.", "props": [ @@ -10900,7 +10924,7 @@ ] }, { - "uuid": "71d95675-1736-4146-9592-74c91f7a4d2e", + "uuid": "710bc375-263a-4671-9f57-271ea4d0a934", "control-id": "cis_rhel10_5-1.3", "description": "No notes for control-id 5.1.3.", "props": [ @@ -10927,7 +10951,7 @@ ] }, { - "uuid": "f8d64641-fcda-44b2-ad1d-6666e54ee8c9", + "uuid": "bc2fa6fa-2eec-42fb-aba7-db5d42c10a73", "control-id": "cis_rhel10_5-1.4", "description": "No notes for control-id 5.1.4.", "props": [ @@ -10944,7 +10968,7 @@ ] }, { - "uuid": "7f1bc58f-9348-4779-b5eb-3a0e2694c669", + "uuid": "5dc359fd-94d0-4777-9ec5-3fc51d806141", "control-id": "cis_rhel10_5-1.5", "description": "No notes for control-id 5.1.5.", "props": [ @@ -10961,7 +10985,7 @@ ] }, { - "uuid": "3d78e879-601b-4b2c-ba95-8b10c07d17b3", + "uuid": "407ba38a-499f-4dca-a67e-bd720b22cda9", "control-id": "cis_rhel10_5-1.6", "description": "No notes for control-id 5.1.6.", "props": [ @@ -10978,7 +11002,7 @@ ] }, { - "uuid": "dc4c1e22-8287-4e27-ba07-084f7008ddbc", + "uuid": "0bdb7cf0-c6de-4fd8-a1d1-b4b63c0c191c", "control-id": "cis_rhel10_5-1.7", "description": "The requirement gives an example of 45 seconds, but is flexible about the values. It is only\nnecessary to ensure there is a timeout configured in alignment to the site policy.", "props": [ @@ -11000,7 +11024,7 @@ ] }, { - "uuid": "8ac7b569-e789-4053-af68-9604f0cf220c", + "uuid": "6accdd42-a7a8-4a37-8856-ffec0dba1f73", "control-id": "cis_rhel10_5-1.8", "description": "No notes for control-id 5.1.8.", "props": [ @@ -11017,7 +11041,7 @@ ] }, { - "uuid": "2ac693b9-af2e-4ee7-83bd-37f00b0d2e12", + "uuid": "e68a51c6-4c20-44da-9257-8861daf9197a", "control-id": "cis_rhel10_5-1.9", "description": "No notes for control-id 5.1.9.", "props": [ @@ -11034,7 +11058,7 @@ ] }, { - "uuid": "04cf2947-7628-4ec9-861a-a451fdf78713", + "uuid": "89c7b67c-9ccf-45ff-8ba6-0418cdcd87a0", "control-id": "cis_rhel10_5-1.10", "description": "No notes for control-id 5.1.10.", "props": [ @@ -11051,7 +11075,7 @@ ] }, { - "uuid": "cd0bdf0e-9160-4907-a136-b2c1c3993ac3", + "uuid": "8fc800b0-b388-44fa-a486-1d468b0099b1", "control-id": "cis_rhel10_5-1.11", "description": "No notes for control-id 5.1.11.", "props": [ @@ -11068,7 +11092,7 @@ ] }, { - "uuid": "76b5c37c-b8c2-489c-a6b4-da96f0a99780", + "uuid": "a5a9a75f-ece4-4a9a-a4da-1a76ae5f799c", "control-id": "cis_rhel10_5-1.12", "description": "The description for control-id cis_rhel10_5-1.12.", "props": [ @@ -11086,7 +11110,7 @@ ] }, { - "uuid": "c221da82-f486-4c1d-a0e4-91813f23212b", + "uuid": "17aca0c5-a71d-41d2-8b36-41bf75a309e8", "control-id": "cis_rhel10_5-1.13", "description": "No notes for control-id 5.1.13.", "props": [ @@ -11103,7 +11127,7 @@ ] }, { - "uuid": "72dda7f3-84c2-4707-a085-c3c0e05e8d77", + "uuid": "74db6a80-229e-4d61-91c6-c71410c8d098", "control-id": "cis_rhel10_5-1.14", "description": "The CIS benchmark is not opinionated about which loglevel is selected here. Here, this\nprofile uses VERBOSE by default, as it allows for the capture of login and logout activity\nas well as key fingerprints.", "props": [ @@ -11120,7 +11144,7 @@ ] }, { - "uuid": "6ee55494-9c7a-4a56-ba10-679f162f5f82", + "uuid": "c20b4553-e7f9-4285-8d13-15f9d565455d", "control-id": "cis_rhel10_5-1.15", "description": "No notes for control-id 5.1.15.", "props": [ @@ -11137,7 +11161,7 @@ ] }, { - "uuid": "9b68414f-2df4-4868-b135-04c94fb28d0e", + "uuid": "891d54be-8caa-44c1-bf59-e3d69a655a10", "control-id": "cis_rhel10_5-1.16", "description": "No notes for control-id 5.1.16.", "props": [ @@ -11154,7 +11178,7 @@ ] }, { - "uuid": "5f157c24-9b1d-4921-82b2-0bbb135b591b", + "uuid": "2cce5e3f-cd29-4527-9310-71eaede0fb9b", "control-id": "cis_rhel10_5-1.17", "description": "No notes for control-id 5.1.17.", "props": [ @@ -11171,7 +11195,7 @@ ] }, { - "uuid": "15e68d7e-146a-4423-8820-85a731d49dbc", + "uuid": "b87b78f2-0255-4b55-9372-50a4b02a6dd9", "control-id": "cis_rhel10_5-1.18", "description": "No notes for control-id 5.1.18.", "props": [ @@ -11188,7 +11212,7 @@ ] }, { - "uuid": "72c14300-b321-4540-9ceb-32b437002f62", + "uuid": "21112800-6ec1-4cde-a478-296b390bd922", "control-id": "cis_rhel10_5-1.19", "description": "No notes for control-id 5.1.19.", "props": [ @@ -11205,7 +11229,7 @@ ] }, { - "uuid": "42f63fbc-17b9-45e2-be17-e139f42c4944", + "uuid": "beef1843-2eea-4665-9bab-eeca1ff1c25f", "control-id": "cis_rhel10_5-1.20", "description": "No notes for control-id 5.1.20.", "props": [ @@ -11222,7 +11246,7 @@ ] }, { - "uuid": "7ee9ff15-e237-46b0-b555-04b64901fc74", + "uuid": "e4d6fa8f-b796-4520-848f-b5495b88e478", "control-id": "cis_rhel10_5-1.21", "description": "No notes for control-id 5.1.21.", "props": [ @@ -11239,7 +11263,7 @@ ] }, { - "uuid": "107da5db-c481-4555-9426-6546222728c4", + "uuid": "2c711eb8-7608-4f44-a91c-be44076ca6c1", "control-id": "cis_rhel10_5-1.22", "description": "No notes for control-id 5.1.22.", "props": [ @@ -11256,7 +11280,7 @@ ] }, { - "uuid": "6406b6c7-c010-4483-967d-f74f7c0afdb4", + "uuid": "d598ab2d-c91a-497d-8236-c37e65783f54", "control-id": "cis_rhel10_5-2.1", "description": "No notes for control-id 5.2.1.", "props": [ @@ -11273,7 +11297,7 @@ ] }, { - "uuid": "bef6ec56-6af2-48af-8cb7-06e2adfb461f", + "uuid": "57f80dc8-44a2-4512-9939-9aa4754fcaa3", "control-id": "cis_rhel10_5-2.2", "description": "No notes for control-id 5.2.2.", "props": [ @@ -11290,7 +11314,7 @@ ] }, { - "uuid": "554c6de8-82d0-4434-b630-9f47e80e5019", + "uuid": "ab9d02e9-787b-446e-bab3-c7a69f76eb7c", "control-id": "cis_rhel10_5-2.3", "description": "No notes for control-id 5.2.3.", "props": [ @@ -11307,7 +11331,7 @@ ] }, { - "uuid": "4f17b7e1-a242-4b29-89e2-9fdab6ef02b3", + "uuid": "f10b0066-1bb0-44af-85d1-717e2504f300", "control-id": "cis_rhel10_5-2.5", "description": "No notes for control-id 5.2.5.", "props": [ @@ -11324,7 +11348,7 @@ ] }, { - "uuid": "db0805e4-0374-4264-a739-1850d98a9dab", + "uuid": "2f18ae7b-0cd8-470a-a13c-d8d460331de6", "control-id": "cis_rhel10_5-2.6", "description": "No notes for control-id 5.2.6.", "props": [ @@ -11341,7 +11365,7 @@ ] }, { - "uuid": "9f74821a-e1d9-4f8a-8e47-1e2ff32fb320", + "uuid": "2ff9ce97-3a6a-4dc6-b9d8-e55a16576df9", "control-id": "cis_rhel10_5-2.7", "description": "Members of \"wheel\" or GID 0 groups are checked by default if the group option is not set for\npam_wheel.so module. The recommendation states the group should be empty to reinforce the\nuse of \"sudo\" for privileged access. Therefore, members of these groups should be manually\nchecked or a different group should be informed.", "props": [ @@ -11363,7 +11387,7 @@ ] }, { - "uuid": "ad5ff379-13b5-43c4-b57f-7203867faa74", + "uuid": "d8da5474-3701-4b2a-816f-cbbfed5719b3", "control-id": "cis_rhel10_5-3.1.1", "description": "This requirement is hard to be automated without any specific requirement. The policy even\nstates that provided commands are examples, other custom settings might be in place and the\nsettings might be different depending on site policies. The other rules will already make\nsure there is a correct autheselect profile regardless of the existing settings. It is\nnecessary to better discuss with CIS Community.", "props": [ @@ -11375,7 +11399,7 @@ ] }, { - "uuid": "22d036d8-6854-48f7-9281-689f16f80743", + "uuid": "65333b4f-5062-41bb-8316-5e41faee2927", "control-id": "cis_rhel10_5-3.1.2", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.1.", "props": [ @@ -11397,7 +11421,7 @@ ] }, { - "uuid": "44c5d9d9-6b71-48f2-83c9-92cf98fd136d", + "uuid": "d935b007-09fe-477a-b908-500957151834", "control-id": "cis_rhel10_5-3.1.3", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.2.", "props": [ @@ -11424,7 +11448,7 @@ ] }, { - "uuid": "40aa340d-cd74-47d2-b44e-20a71620a4cc", + "uuid": "80a88aa6-c672-4519-a3c7-79c753cd512a", "control-id": "cis_rhel10_5-3.1.4", "description": "The module is properly enabled by the rules mentioned in related_rules.\nRequirements in 5.3.2.3 use these rules.", "props": [ @@ -11436,7 +11460,7 @@ ] }, { - "uuid": "c1cb7606-91cb-4f5e-b2ec-55054a1faa3a", + "uuid": "117261fe-b111-4a6c-a114-96efec9d661e", "control-id": "cis_rhel10_5-3.1.5", "description": "No notes for control-id 5.3.1.5.", "props": [ @@ -11453,7 +11477,7 @@ ] }, { - "uuid": "5f52a1fa-602e-471d-8f4e-053ca69f06f2", + "uuid": "cb84ac51-0203-48ae-b821-4789587313fa", "control-id": "cis_rhel10_5-3.2.1.1", "description": "No notes for control-id 5.3.2.1.1.", "props": [ @@ -11470,7 +11494,7 @@ ] }, { - "uuid": "94a3cb65-75d5-4326-a714-0c1a54fc9d9d", + "uuid": "fee0e45d-3d07-411f-b2ce-c68494cb1d8d", "control-id": "cis_rhel10_5-3.2.1.2", "description": "The policy also accepts value 0, which means the locked accounts should be manually unlocked\nby an administrator. However, it also mentions that using value 0 can facilitate a DoS\nattack to legitimate users.", "props": [ @@ -11487,7 +11511,7 @@ ] }, { - "uuid": "8cb568cd-a8c6-4d95-bda1-f72414040506", + "uuid": "a45940e2-a2d9-4982-9bf2-1902ecb2bfad", "control-id": "cis_rhel10_5-3.2.2.1", "description": "No notes for control-id 5.3.2.2.1.", "props": [ @@ -11504,7 +11528,7 @@ ] }, { - "uuid": "7f17464b-4238-40c1-8c61-7ab258d345b4", + "uuid": "d2427bf6-e4e3-4e3f-b7df-2188bb6ab63f", "control-id": "cis_rhel10_5-3.2.2.2", "description": "No notes for control-id 5.3.2.2.2.", "props": [ @@ -11521,7 +11545,7 @@ ] }, { - "uuid": "90986c00-9b63-4f88-a8f7-5275a64b686e", + "uuid": "8a009ab4-b22e-4add-ab98-2ac6e4273073", "control-id": "cis_rhel10_5-3.2.2.3", "description": "This requirement is expected to be manual. However, in previous versions of the policy\nit was already automated the configuration of \"minclass\" option. This posture was kept for\nRHEL 10 in this new version. Rules related to other options are informed in related_rules.\nIn short, minclass=4 alone can achieve the same result achieved by the combination of the\nother 4 options mentioned in the policy.", "props": [ @@ -11538,7 +11562,7 @@ ] }, { - "uuid": "d3616723-3cd8-4169-9905-cefd57c6c067", + "uuid": "3f9407ac-1151-4cb9-a9f9-d988101010ca", "control-id": "cis_rhel10_5-3.2.2.4", "description": "No notes for control-id 5.3.2.2.4.", "props": [ @@ -11555,7 +11579,7 @@ ] }, { - "uuid": "2377d544-bcc8-488d-8d97-7b7af9e10310", + "uuid": "041bcc8e-5ec8-4f44-8ed4-f7d8dc0bc88c", "control-id": "cis_rhel10_5-3.2.2.5", "description": "No notes for control-id 5.3.2.2.5.", "props": [ @@ -11572,7 +11596,7 @@ ] }, { - "uuid": "ce72e40c-b4c1-4981-a558-564c825084dd", + "uuid": "5f400d21-1f95-4e58-bb89-80154c924d97", "control-id": "cis_rhel10_5-3.2.2.6", "description": "No notes for control-id 5.3.2.2.6.", "props": [ @@ -11589,7 +11613,7 @@ ] }, { - "uuid": "d39d20b1-9d57-460f-8053-a95eab110fe6", + "uuid": "b6fb188f-2735-492a-9ea9-1ad6ca15ddf7", "control-id": "cis_rhel10_5-3.2.2.7", "description": "No notes for control-id 5.3.2.2.7.", "props": [ @@ -11606,7 +11630,7 @@ ] }, { - "uuid": "c1908f0f-bbab-436b-927d-bceb7c19a19d", + "uuid": "62126886-b888-4787-836c-31b3aa386646", "control-id": "cis_rhel10_5-3.2.3.1", "description": "Although mentioned in the section 5.3.3.3, there is no explicit requirement to configure\nretry option of pam_pwhistory. If come in the future, the rule accounts_password_pam_retry\ncan be used.", "props": [ @@ -11628,7 +11652,7 @@ ] }, { - "uuid": "88cea1fc-e606-49d2-af9a-355c73eaa783", + "uuid": "793476f4-4378-4e2e-a27d-50cf503a9388", "control-id": "cis_rhel10_5-3.2.3.2", "description": "No notes for control-id 5.3.2.3.2.", "props": [ @@ -11645,7 +11669,7 @@ ] }, { - "uuid": "e62bd90c-eed7-4ea9-9b3b-7b5ec5b0b659", + "uuid": "a9a508f6-274d-4386-b529-8089a1f855d8", "control-id": "cis_rhel10_5-3.2.3.3", "description": "In RHEL 10 pam_pwhistory is enabled via authselect feature, as required in 5.3.1.4. The\nfeature automatically set \"use_authok\" option. In any case, we don't have a rule to check\nthis option specifically.", "props": [ @@ -11662,7 +11686,7 @@ ] }, { - "uuid": "9ad2b1d2-8e40-4f74-a93c-feddcc9f8269", + "uuid": "8ae1c34c-c85c-4e82-b587-85089a7e7075", "control-id": "cis_rhel10_5-3.2.4.1", "description": "The rule more specifically used in this requirement also satify the requirement 5.3.1.5.", "props": [ @@ -11679,7 +11703,7 @@ ] }, { - "uuid": "a2912a0b-772c-4a52-b73c-00875a30c5eb", + "uuid": "1a03f32a-dc46-4321-a351-8ba28eb1ac07", "control-id": "cis_rhel10_5-3.2.4.2", "description": "Usage of pam_unix.so module together with \"remember\" option is deprecated and is not\nrecommended by this policy. Instead, it should be used remember option of pam_pwhistory\nmodule, as required in 5.3.2.3.1. See here for more details about pam_unix.so:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1778929", "props": [ @@ -11696,7 +11720,7 @@ ] }, { - "uuid": "5afe2999-1ae4-4298-9f3a-6ad7f4338a46", + "uuid": "ba2cc29a-78da-4ecd-8f75-2669ee3ad80c", "control-id": "cis_rhel10_5-3.2.4.3", "description": "Changes in logindefs mentioned in this requirement are more specifically covered by 5.4.1.4", "props": [ @@ -11718,7 +11742,7 @@ ] }, { - "uuid": "f2e2b5ce-2fcf-4d6f-939e-f56757996595", + "uuid": "2c4e4309-ff5e-480f-8f79-a2e0861e1f56", "control-id": "cis_rhel10_5-3.2.4.4", "description": "In RHEL 10 pam_unix is enabled by default in all authselect profiles already with the\nuse_authtok option set. In any case, we don't have a rule to check this option specifically,\nlike in 5.3.2.3.3.", "props": [ @@ -11735,7 +11759,7 @@ ] }, { - "uuid": "0d38d646-32c3-4508-be3a-520a7b1a0947", + "uuid": "b78ff26c-f6eb-4142-a647-f5ed52acac09", "control-id": "cis_rhel10_5-4.1.1", "description": "No notes for control-id 5.4.1.1.", "props": [ @@ -11757,7 +11781,7 @@ ] }, { - "uuid": "15bb2ba9-e6c7-4a25-a259-a12961330923", + "uuid": "3d13da79-2271-4b9e-97e5-b3e43292a7c7", "control-id": "cis_rhel10_5-4.1.3", "description": "No notes for control-id 5.4.1.3.", "props": [ @@ -11779,7 +11803,7 @@ ] }, { - "uuid": "1daf5f73-b7dd-4077-b183-ef692e6c5d78", + "uuid": "09407091-4598-4d5c-9707-70f6bf3d3c43", "control-id": "cis_rhel10_5-4.1.4", "description": "There's a \"new\" set of options in /etc/login.defs file to define the number of iterations\nperformed during the hashing process.", "props": [ @@ -11801,7 +11825,7 @@ ] }, { - "uuid": "c543de2c-1ca3-4304-ac68-3794a72b3f69", + "uuid": "1e65de0f-5cd7-41f2-8536-9b0869bfaa3b", "control-id": "cis_rhel10_5-4.1.5", "description": "No notes for control-id 5.4.1.5.", "props": [ @@ -11823,7 +11847,7 @@ ] }, { - "uuid": "3be158ef-fbc2-4b36-b4ba-329f2229659f", + "uuid": "25327533-9fe3-4f25-992b-bab5b52b0322", "control-id": "cis_rhel10_5-4.1.6", "description": "No notes for control-id 5.4.1.6.", "props": [ @@ -11840,7 +11864,7 @@ ] }, { - "uuid": "53d3d2ce-57f4-4b81-b67b-8d593a154325", + "uuid": "622dd5be-f00f-4593-ac62-6ebc7ae63e95", "control-id": "cis_rhel10_5-4.2.1", "description": "No notes for control-id 5.4.2.1.", "props": [ @@ -11857,7 +11881,7 @@ ] }, { - "uuid": "f84101fb-be46-42e3-8322-d05169ddb882", + "uuid": "3c4b8a0d-d4ec-47d0-9f31-5490e2c6c85e", "control-id": "cis_rhel10_5-4.2.2", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -11874,7 +11898,7 @@ ] }, { - "uuid": "4b081b7b-4cfd-497c-b144-a6736bfdb2fd", + "uuid": "64796f30-edcd-41fd-b596-3723e2aa3b79", "control-id": "cis_rhel10_5-4.2.3", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -11891,7 +11915,7 @@ ] }, { - "uuid": "b0d053fe-3f63-46a2-be74-a71346f4c182", + "uuid": "2e6f25dd-f129-42be-b253-23f9826d2012", "control-id": "cis_rhel10_5-4.2.4", "description": "No notes for control-id 5.4.2.4.", "props": [ @@ -11908,7 +11932,7 @@ ] }, { - "uuid": "de5d1eb4-c0b0-47bd-b8cd-09334b221794", + "uuid": "defb2d92-afb4-4340-899d-ae947764b144", "control-id": "cis_rhel10_5-4.2.5", "description": "No notes for control-id 5.4.2.5.", "props": [ @@ -11930,7 +11954,7 @@ ] }, { - "uuid": "2ad275c9-3f3a-4eab-8945-617ecb1ddc76", + "uuid": "6c56edac-47fa-4a18-a6f0-e0aa6e631a66", "control-id": "cis_rhel10_5-4.2.6", "description": "No notes for control-id 5.4.2.6.", "props": [ @@ -11947,7 +11971,7 @@ ] }, { - "uuid": "f13193ac-683c-4ca1-b6d4-a7d05fd04360", + "uuid": "5a22d8a8-5902-4581-b3af-073cf3052a07", "control-id": "cis_rhel10_5-4.2.7", "description": "No notes for control-id 5.4.2.7.", "props": [ @@ -11969,19 +11993,24 @@ ] }, { - "uuid": "383e809e-b8db-41de-aaf9-a7a767858c32", + "uuid": "c896fa65-179a-4595-8501-b1d883768a91", "control-id": "cis_rhel10_5-4.2.8", - "description": "New rule is necessary.", + "description": "No notes for control-id 5.4.2.8.", "props": [ { "name": "implementation-status", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "implemented" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "no_invalid_shell_accounts_unlocked" } ] }, { - "uuid": "02698b7d-8f35-4e13-9567-71ef27580831", + "uuid": "f9521704-fd5f-465c-be71-41ebe43c2765", "control-id": "cis_rhel10_5-4.3.2", "description": "No notes for control-id 5.4.3.2.", "props": [ @@ -11998,7 +12027,7 @@ ] }, { - "uuid": "dc0ca21c-ce93-4a59-a148-727e80c75d37", + "uuid": "94a13233-2c60-430a-afe7-0131fde1316d", "control-id": "cis_rhel10_5-4.3.3", "description": "No notes for control-id 5.4.3.3.", "props": [ @@ -12025,7 +12054,7 @@ ] }, { - "uuid": "85f1b92e-56cc-4ce1-9a40-95caa96a7870", + "uuid": "67848280-1a79-41a8-9212-fab3cf97a33b", "control-id": "cis_rhel10_6-1.1", "description": "No notes for control-id 6.1.1.", "props": [ @@ -12047,7 +12076,7 @@ ] }, { - "uuid": "8622c603-0aa2-45cb-9723-4afc59ff9a90", + "uuid": "b315f782-49f2-48e8-98c6-3f824feb08f4", "control-id": "cis_rhel10_6-1.2", "description": "No notes for control-id 6.1.2.", "props": [ @@ -12064,7 +12093,7 @@ ] }, { - "uuid": "6d7bc32b-e1c6-43f1-b991-c6114d15a037", + "uuid": "4339fdc8-33df-47db-a7c9-a4aa529036b6", "control-id": "cis_rhel10_6-1.3", "description": "No notes for control-id 6.1.3.", "props": [ @@ -12081,7 +12110,7 @@ ] }, { - "uuid": "de73d13a-ab9c-438a-a0d0-b6fe8061a5bf", + "uuid": "7e277030-9ade-4408-ac60-9dcf6661993e", "control-id": "cis_rhel10_6-2.1.1", "description": "No notes for control-id 6.2.1.1.", "props": [ @@ -12098,7 +12127,7 @@ ] }, { - "uuid": "7b70888f-4356-4839-87db-27fe551c7ba7", + "uuid": "5378b3ea-5843-4337-8fbd-c741204a891c", "control-id": "cis_rhel10_6-2.1.2", "description": "The description for control-id cis_rhel10_6-2.1.2.", "props": [ @@ -12111,7 +12140,7 @@ ] }, { - "uuid": "ac7728de-3c92-4a0e-805b-62ae4d9a0bfc", + "uuid": "de183516-389e-4f12-a0f4-4c5f2dd19a39", "control-id": "cis_rhel10_6-2.1.3", "description": "The description for control-id cis_rhel10_6-2.1.3.", "props": [ @@ -12124,20 +12153,24 @@ ] }, { - "uuid": "df9e5713-98c0-4919-82f9-5ea992f75314", + "uuid": "77a47df1-64c4-4a63-8bfd-df34d6164c1f", "control-id": "cis_rhel10_6-2.1.4", - "description": "The description for control-id cis_rhel10_6-2.1.4.", + "description": "No notes for control-id 6.2.1.4.", "props": [ { "name": "implementation-status", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "alternative", - "remarks": "It is necessary to create a new rule to check the status of journald and rsyslog.\nIt would also be necessary a new rule to disable or remove rsyslog." + "value": "implemented" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "ensure_journald_and_rsyslog_not_active_together" } ] }, { - "uuid": "8395fafd-121e-4e0f-b3bf-deaddda1bea2", + "uuid": "1b0c1f57-be46-4bb2-aafe-0725c776b506", "control-id": "cis_rhel10_6-2.2.1.1", "description": "No notes for control-id 6.2.2.1.1.", "props": [ @@ -12154,7 +12187,7 @@ ] }, { - "uuid": "6b26d4a6-bf39-4a17-8977-2f1fdaffbc62", + "uuid": "e4f1e6c2-f314-44f5-8572-f15b08576cc9", "control-id": "cis_rhel10_6-2.2.1.2", "description": "The description for control-id cis_rhel10_6-2.2.1.2.", "props": [ @@ -12167,7 +12200,7 @@ ] }, { - "uuid": "1bc1d1af-483b-4860-9306-59a17710a878", + "uuid": "c47f18c4-e807-42d5-a71a-0d671e2c2b3e", "control-id": "cis_rhel10_6-2.2.1.3", "description": "No notes for control-id 6.2.2.1.3.", "props": [ @@ -12184,7 +12217,7 @@ ] }, { - "uuid": "8d72c803-ea86-4eed-8340-db512e80eb6e", + "uuid": "07bc6f8c-f6d8-4fd7-b307-635d9c3ea057", "control-id": "cis_rhel10_6-2.2.1.4", "description": "No notes for control-id 6.2.2.1.4.", "props": [ @@ -12201,7 +12234,7 @@ ] }, { - "uuid": "3b3cd8e8-b988-4efd-900a-288cd1160b16", + "uuid": "88acbebf-1b78-46e3-a738-6f4176a30856", "control-id": "cis_rhel10_6-2.2.2", "description": "No notes for control-id 6.2.2.2.", "props": [ @@ -12218,7 +12251,7 @@ ] }, { - "uuid": "46ea7071-3b0b-4772-aad0-b784504dd47b", + "uuid": "98c12949-6787-41d6-b784-e51f32e7cc06", "control-id": "cis_rhel10_6-2.2.3", "description": "No notes for control-id 6.2.2.3.", "props": [ @@ -12235,7 +12268,7 @@ ] }, { - "uuid": "710f38a9-4b96-4cf9-b537-980662abf213", + "uuid": "a06ed04f-7552-4b4d-aee5-07a4616d21c9", "control-id": "cis_rhel10_6-2.2.4", "description": "No notes for control-id 6.2.2.4.", "props": [ @@ -12252,7 +12285,7 @@ ] }, { - "uuid": "04de016f-6adc-4853-9fea-3b328515c91d", + "uuid": "9d8a3d05-55e5-4f01-98e9-8015272d4953", "control-id": "cis_rhel10_6-2.3.1", "description": "No notes for control-id 6.2.3.1.", "props": [ @@ -12264,7 +12297,7 @@ ] }, { - "uuid": "ba8f6ef2-50d6-4891-a249-7b89a61e09f3", + "uuid": "103f4384-f5de-41bb-8fd5-c9f0a0e0392e", "control-id": "cis_rhel10_6-2.3.2", "description": "No notes for control-id 6.2.3.2.", "props": [ @@ -12276,7 +12309,7 @@ ] }, { - "uuid": "f2d88409-4b6d-4d44-b21c-394922950fff", + "uuid": "36473f69-99dc-491e-ba79-3652fb6ece6c", "control-id": "cis_rhel10_6-2.3.3", "description": "No notes for control-id 6.2.3.3.", "props": [ @@ -12288,7 +12321,7 @@ ] }, { - "uuid": "ed567dd5-0c56-4756-aaa6-a76ddd8aa0f7", + "uuid": "63c22f00-4ae9-4909-b280-d0c7b3a82e13", "control-id": "cis_rhel10_6-2.3.4", "description": "No notes for control-id 6.2.3.4.", "props": [ @@ -12300,7 +12333,7 @@ ] }, { - "uuid": "02db44a4-ee8f-44af-b429-3b0f94056460", + "uuid": "cdcb8fc0-7b8e-4b4b-b270-446457f07bfd", "control-id": "cis_rhel10_6-2.3.5", "description": "The description for control-id cis_rhel10_6-2.3.5.", "props": [ @@ -12313,7 +12346,7 @@ ] }, { - "uuid": "0c4b1503-a38b-4fc4-b2ae-05ff22c78042", + "uuid": "56f0f689-5b86-4d74-ab10-e4610a27c220", "control-id": "cis_rhel10_6-2.3.6", "description": "The description for control-id cis_rhel10_6-2.3.6.", "props": [ @@ -12326,7 +12359,7 @@ ] }, { - "uuid": "07564b83-c970-4b17-b9b0-55067964f082", + "uuid": "4a6387b9-519f-4e6c-a393-f7cbe24a9532", "control-id": "cis_rhel10_6-2.3.7", "description": "No notes for control-id 6.2.3.7.", "props": [ @@ -12338,7 +12371,7 @@ ] }, { - "uuid": "cb983ecd-753a-476c-9344-94397f9b0335", + "uuid": "c37d367e-3218-47cf-8603-f849a30ad02b", "control-id": "cis_rhel10_6-2.3.8", "description": "The description for control-id cis_rhel10_6-2.3.8.", "props": [ @@ -12351,7 +12384,7 @@ ] }, { - "uuid": "3eaea838-d220-40f9-8117-0e0c970004b0", + "uuid": "f813e389-0671-4883-9d93-4857c304234c", "control-id": "cis_rhel10_6-2.4.1", "description": "It is not harmful to run these rules even if rsyslog is not installed or active.", "props": [ @@ -12378,7 +12411,7 @@ ] }, { - "uuid": "34874c95-ef15-4d39-9df0-3a41419040cc", + "uuid": "a136e99d-2800-4a62-87ab-1aadb8ab021e", "control-id": "cis_rhel10_7-1.1", "description": "No notes for control-id 7.1.1.", "props": [ @@ -12405,7 +12438,7 @@ ] }, { - "uuid": "855bd722-7ad2-408d-af27-be8183b2933f", + "uuid": "8abcc26f-4423-4f0f-b796-5c02b43d4b9d", "control-id": "cis_rhel10_7-1.2", "description": "No notes for control-id 7.1.2.", "props": [ @@ -12432,7 +12465,7 @@ ] }, { - "uuid": "4f8ab161-9b93-449a-bfb0-e0623d964320", + "uuid": "e3cf33f5-6722-40da-aeba-cdf60d2c2d4a", "control-id": "cis_rhel10_7-1.3", "description": "No notes for control-id 7.1.3.", "props": [ @@ -12459,7 +12492,7 @@ ] }, { - "uuid": "1f81009d-b067-4ca3-aa15-3079382e2d20", + "uuid": "3eebd407-58a9-470d-982f-74a8e6880c74", "control-id": "cis_rhel10_7-1.4", "description": "No notes for control-id 7.1.4.", "props": [ @@ -12486,7 +12519,7 @@ ] }, { - "uuid": "212025ec-f898-43b8-8a0a-38c41446a71f", + "uuid": "879fac11-47c7-4944-8b28-bbb3234ee874", "control-id": "cis_rhel10_7-1.5", "description": "No notes for control-id 7.1.5.", "props": [ @@ -12513,7 +12546,7 @@ ] }, { - "uuid": "f7bae9f3-b036-4073-a21d-ac079f3040c2", + "uuid": "f0ff9c83-cafd-4868-835d-ae95031acf95", "control-id": "cis_rhel10_7-1.6", "description": "No notes for control-id 7.1.6.", "props": [ @@ -12540,7 +12573,7 @@ ] }, { - "uuid": "9305a7b2-e208-4bab-8c1a-8758ed29aecf", + "uuid": "ae304732-1cbb-4dbe-bc57-f8f2efccb29f", "control-id": "cis_rhel10_7-1.7", "description": "No notes for control-id 7.1.7.", "props": [ @@ -12567,7 +12600,7 @@ ] }, { - "uuid": "cd3b1efd-72b6-4d9f-83c9-97b956b77147", + "uuid": "48e0dbee-351d-431b-9561-11a1b9b524f1", "control-id": "cis_rhel10_7-1.8", "description": "No notes for control-id 7.1.8.", "props": [ @@ -12594,7 +12627,7 @@ ] }, { - "uuid": "2df89c80-3882-4934-816c-016b8803c107", + "uuid": "d5b11c34-bae4-47a0-899e-892bb39ff0d5", "control-id": "cis_rhel10_7-1.9", "description": "No notes for control-id 7.1.9.", "props": [ @@ -12621,7 +12654,7 @@ ] }, { - "uuid": "de60a5aa-90ca-4309-ac02-69d74e82d9e9", + "uuid": "bd71b350-9a3a-4dae-a4a8-d3eea35201d0", "control-id": "cis_rhel10_7-1.10", "description": "No notes for control-id 7.1.10.", "props": [ @@ -12663,7 +12696,7 @@ ] }, { - "uuid": "0fb7f7a3-9e77-45b8-ada3-66d6de9d57f6", + "uuid": "85e8deb8-ff28-4ea1-8dd0-57696d5489e7", "control-id": "cis_rhel10_7-1.11", "description": "No notes for control-id 7.1.11.", "props": [ @@ -12685,7 +12718,7 @@ ] }, { - "uuid": "f5931569-9ad7-42e1-9d7d-68f66122f3c8", + "uuid": "e2e74905-baa2-4793-8686-5e428bcd456a", "control-id": "cis_rhel10_7-1.12", "description": "No notes for control-id 7.1.12.", "props": [ @@ -12707,7 +12740,7 @@ ] }, { - "uuid": "796308ca-e7d4-43c4-a89b-f2cd38254004", + "uuid": "fe86c14f-5729-44eb-a7b0-86dfe2cbcb82", "control-id": "cis_rhel10_7-1.13", "description": "The description for control-id cis_rhel10_7-1.13.", "props": [ @@ -12720,7 +12753,7 @@ ] }, { - "uuid": "a44cc3f9-0b53-486c-9f20-b99451d57e1f", + "uuid": "98d33782-46bb-419b-a2ab-7d62022ff4c1", "control-id": "cis_rhel10_7-2.1", "description": "No notes for control-id 7.2.1.", "props": [ @@ -12737,7 +12770,7 @@ ] }, { - "uuid": "50def3d7-b096-4d80-8f2b-8a4d10825267", + "uuid": "d4367f1b-3da1-453f-982c-fa583071e9c7", "control-id": "cis_rhel10_7-2.2", "description": "No notes for control-id 7.2.2.", "props": [ @@ -12754,7 +12787,7 @@ ] }, { - "uuid": "2f121ba9-b364-4e42-a31c-342e48bc8216", + "uuid": "38550404-5ac7-42a8-a48f-851f98df59bd", "control-id": "cis_rhel10_7-2.3", "description": "No notes for control-id 7.2.3.", "props": [ @@ -12771,7 +12804,7 @@ ] }, { - "uuid": "30f00d09-8c7c-4d46-88c7-906b8868d92f", + "uuid": "f183b126-3466-4492-b0e1-ca73f96eec13", "control-id": "cis_rhel10_7-2.4", "description": "No notes for control-id 7.2.4.", "props": [ @@ -12788,7 +12821,7 @@ ] }, { - "uuid": "2642fd5b-fb07-4ee7-8920-2d783bfb0b52", + "uuid": "a6631a52-9e1d-4c75-ab1a-25f2c088af1c", "control-id": "cis_rhel10_7-2.5", "description": "No notes for control-id 7.2.5.", "props": [ @@ -12805,7 +12838,7 @@ ] }, { - "uuid": "8c772520-dd79-422b-9e08-c37ae72aff78", + "uuid": "4ad7a4af-986d-4946-97e0-8041e2bbbd11", "control-id": "cis_rhel10_7-2.6", "description": "No notes for control-id 7.2.6.", "props": [ @@ -12822,7 +12855,7 @@ ] }, { - "uuid": "b5bf9ed3-69b1-4d83-a2c7-d93e54bc4c7f", + "uuid": "a757e135-1f48-47e2-881e-184fc4e6fb2a", "control-id": "cis_rhel10_7-2.7", "description": "No notes for control-id 7.2.7.", "props": [ @@ -12839,7 +12872,7 @@ ] }, { - "uuid": "9d2ec5b8-474d-44b1-9ab0-9917c4abc89f", + "uuid": "a9aa9afd-3c97-4905-ad4d-b6b35b6ba4b2", "control-id": "cis_rhel10_7-2.8", "description": "No notes for control-id 7.2.8.", "props": [ @@ -12866,7 +12899,7 @@ ] }, { - "uuid": "10bbd0dd-787d-4f7a-82ca-adbe34a09f71", + "uuid": "bc5ee524-8a45-4edf-b67a-cec9af299af0", "control-id": "cis_rhel10_7-2.9", "description": "No notes for control-id 7.2.9.", "props": [ @@ -19992,4519 +20025,4567 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_tmout", + "value": "no_invalid_shell_accounts_unlocked", "remarks": "rule_set_244" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Interactive Session Timeout", + "value": "Verify Non-Interactive Accounts Are Locked", "remarks": "rule_set_244" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_tmout", + "value": "no_invalid_shell_accounts_unlocked", "remarks": "rule_set_244" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Interactive Session Timeout", + "value": "Verify Non-Interactive Accounts Are Locked", "remarks": "rule_set_244" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_bashrc", + "value": "accounts_tmout", "remarks": "rule_set_245" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Bash Umask is Set Correctly", + "value": "Set Interactive Session Timeout", "remarks": "rule_set_245" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_bashrc", + "value": "accounts_tmout", "remarks": "rule_set_245" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Bash Umask is Set Correctly", + "value": "Set Interactive Session Timeout", "remarks": "rule_set_245" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_login_defs", + "value": "accounts_umask_etc_bashrc", "remarks": "rule_set_246" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Umask is Set Correctly in login.defs", + "value": "Ensure the Default Bash Umask is Set Correctly", "remarks": "rule_set_246" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_login_defs", + "value": "accounts_umask_etc_bashrc", "remarks": "rule_set_246" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Umask is Set Correctly in login.defs", + "value": "Ensure the Default Bash Umask is Set Correctly", "remarks": "rule_set_246" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_profile", + "value": "accounts_umask_etc_login_defs", "remarks": "rule_set_247" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Umask is Set Correctly in /etc/profile", + "value": "Ensure the Default Umask is Set Correctly in login.defs", "remarks": "rule_set_247" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_profile", + "value": "accounts_umask_etc_login_defs", "remarks": "rule_set_247" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Umask is Set Correctly in /etc/profile", + "value": "Ensure the Default Umask is Set Correctly in login.defs", "remarks": "rule_set_247" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_aide_installed", + "value": "accounts_umask_etc_profile", "remarks": "rule_set_248" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install AIDE", + "value": "Ensure the Default Umask is Set Correctly in /etc/profile", "remarks": "rule_set_248" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_aide_installed", + "value": "accounts_umask_etc_profile", "remarks": "rule_set_248" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install AIDE", + "value": "Ensure the Default Umask is Set Correctly in /etc/profile", "remarks": "rule_set_248" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_build_database", + "value": "package_aide_installed", "remarks": "rule_set_249" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Build and Test AIDE Database", + "value": "Install AIDE", "remarks": "rule_set_249" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_build_database", + "value": "package_aide_installed", "remarks": "rule_set_249" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Build and Test AIDE Database", + "value": "Install AIDE", "remarks": "rule_set_249" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_periodic_cron_checking", + "value": "aide_build_database", "remarks": "rule_set_250" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Periodic Execution of AIDE", + "value": "Build and Test AIDE Database", "remarks": "rule_set_250" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_periodic_cron_checking", + "value": "aide_build_database", "remarks": "rule_set_250" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Periodic Execution of AIDE", + "value": "Build and Test AIDE Database", "remarks": "rule_set_250" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_check_audit_tools", + "value": "aide_periodic_cron_checking", "remarks": "rule_set_251" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure AIDE to Verify the Audit Tools", + "value": "Configure Periodic Execution of AIDE", "remarks": "rule_set_251" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_check_audit_tools", + "value": "aide_periodic_cron_checking", "remarks": "rule_set_251" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure AIDE to Verify the Audit Tools", + "value": "Configure Periodic Execution of AIDE", "remarks": "rule_set_251" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_systemd-journald_enabled", + "value": "aide_check_audit_tools", "remarks": "rule_set_252" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable systemd-journald Service", + "value": "Configure AIDE to Verify the Audit Tools", "remarks": "rule_set_252" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_systemd-journald_enabled", + "value": "aide_check_audit_tools", "remarks": "rule_set_252" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable systemd-journald Service", + "value": "Configure AIDE to Verify the Audit Tools", "remarks": "rule_set_252" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_systemd-journal-remote_installed", + "value": "service_systemd-journald_enabled", "remarks": "rule_set_253" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install systemd-journal-remote Package", + "value": "Enable systemd-journald Service", "remarks": "rule_set_253" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_systemd-journal-remote_installed", + "value": "service_systemd-journald_enabled", "remarks": "rule_set_253" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install systemd-journal-remote Package", + "value": "Enable systemd-journald Service", "remarks": "rule_set_253" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_systemd-journal-upload_enabled", + "value": "ensure_journald_and_rsyslog_not_active_together", "remarks": "rule_set_254" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable systemd-journal-upload Service", + "value": "Ensure journald and rsyslog Are Not Active Together", "remarks": "rule_set_254" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_systemd-journal-upload_enabled", + "value": "ensure_journald_and_rsyslog_not_active_together", "remarks": "rule_set_254" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable systemd-journal-upload Service", + "value": "Ensure journald and rsyslog Are Not Active Together", "remarks": "rule_set_254" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "socket_systemd-journal-remote_disabled", + "value": "package_systemd-journal-remote_installed", "remarks": "rule_set_255" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable systemd-journal-remote Socket", + "value": "Install systemd-journal-remote Package", "remarks": "rule_set_255" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "socket_systemd-journal-remote_disabled", + "value": "package_systemd-journal-remote_installed", "remarks": "rule_set_255" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable systemd-journal-remote Socket", + "value": "Install systemd-journal-remote Package", "remarks": "rule_set_255" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_disable_forward_to_syslog", + "value": "service_systemd-journal-upload_enabled", "remarks": "rule_set_256" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald ForwardToSyslog is disabled", + "value": "Enable systemd-journal-upload Service", "remarks": "rule_set_256" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_disable_forward_to_syslog", + "value": "service_systemd-journal-upload_enabled", "remarks": "rule_set_256" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald ForwardToSyslog is disabled", + "value": "Enable systemd-journal-upload Service", "remarks": "rule_set_256" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_compress", + "value": "socket_systemd-journal-remote_disabled", "remarks": "rule_set_257" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald is configured to compress large log files", + "value": "Disable systemd-journal-remote Socket", "remarks": "rule_set_257" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_compress", + "value": "socket_systemd-journal-remote_disabled", "remarks": "rule_set_257" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald is configured to compress large log files", + "value": "Disable systemd-journal-remote Socket", "remarks": "rule_set_257" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_storage", + "value": "journald_disable_forward_to_syslog", "remarks": "rule_set_258" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald is configured to write log files to persistent disk", + "value": "Ensure journald ForwardToSyslog is disabled", "remarks": "rule_set_258" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_storage", + "value": "journald_disable_forward_to_syslog", "remarks": "rule_set_258" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald is configured to write log files to persistent disk", + "value": "Ensure journald ForwardToSyslog is disabled", "remarks": "rule_set_258" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_groupownership", + "value": "journald_compress", "remarks": "rule_set_259" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Log Files Are Owned By Appropriate Group", + "value": "Ensure journald is configured to compress large log files", "remarks": "rule_set_259" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_groupownership", + "value": "journald_compress", "remarks": "rule_set_259" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Log Files Are Owned By Appropriate Group", + "value": "Ensure journald is configured to compress large log files", "remarks": "rule_set_259" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_ownership", + "value": "journald_storage", "remarks": "rule_set_260" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Log Files Are Owned By Appropriate User", + "value": "Ensure journald is configured to write log files to persistent disk", "remarks": "rule_set_260" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_ownership", + "value": "journald_storage", "remarks": "rule_set_260" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Log Files Are Owned By Appropriate User", + "value": "Ensure journald is configured to write log files to persistent disk", "remarks": "rule_set_260" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_permissions", + "value": "rsyslog_files_groupownership", "remarks": "rule_set_261" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure System Log Files Have Correct Permissions", + "value": "Ensure Log Files Are Owned By Appropriate Group", "remarks": "rule_set_261" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_permissions", + "value": "rsyslog_files_groupownership", "remarks": "rule_set_261" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure System Log Files Have Correct Permissions", + "value": "Ensure Log Files Are Owned By Appropriate Group", "remarks": "rule_set_261" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_passwd", + "value": "rsyslog_files_ownership", "remarks": "rule_set_262" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns passwd File", + "value": "Ensure Log Files Are Owned By Appropriate User", "remarks": "rule_set_262" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_passwd", + "value": "rsyslog_files_ownership", "remarks": "rule_set_262" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns passwd File", + "value": "Ensure Log Files Are Owned By Appropriate User", "remarks": "rule_set_262" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_passwd", + "value": "rsyslog_files_permissions", "remarks": "rule_set_263" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns passwd File", + "value": "Ensure System Log Files Have Correct Permissions", "remarks": "rule_set_263" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_passwd", + "value": "rsyslog_files_permissions", "remarks": "rule_set_263" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns passwd File", + "value": "Ensure System Log Files Have Correct Permissions", "remarks": "rule_set_263" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_passwd", + "value": "file_groupowner_etc_passwd", "remarks": "rule_set_264" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on passwd File", + "value": "Verify Group Who Owns passwd File", "remarks": "rule_set_264" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_passwd", + "value": "file_groupowner_etc_passwd", "remarks": "rule_set_264" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on passwd File", + "value": "Verify Group Who Owns passwd File", "remarks": "rule_set_264" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_passwd", + "value": "file_owner_etc_passwd", "remarks": "rule_set_265" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup passwd File", + "value": "Verify User Who Owns passwd File", "remarks": "rule_set_265" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_passwd", + "value": "file_owner_etc_passwd", "remarks": "rule_set_265" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup passwd File", + "value": "Verify User Who Owns passwd File", "remarks": "rule_set_265" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_passwd", + "value": "file_permissions_etc_passwd", "remarks": "rule_set_266" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup passwd File", + "value": "Verify Permissions on passwd File", "remarks": "rule_set_266" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_passwd", + "value": "file_permissions_etc_passwd", "remarks": "rule_set_266" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup passwd File", + "value": "Verify Permissions on passwd File", "remarks": "rule_set_266" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_passwd", + "value": "file_groupowner_backup_etc_passwd", "remarks": "rule_set_267" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup passwd File", + "value": "Verify Group Who Owns Backup passwd File", "remarks": "rule_set_267" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_passwd", + "value": "file_groupowner_backup_etc_passwd", "remarks": "rule_set_267" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup passwd File", + "value": "Verify Group Who Owns Backup passwd File", "remarks": "rule_set_267" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_group", + "value": "file_owner_backup_etc_passwd", "remarks": "rule_set_268" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns group File", + "value": "Verify User Who Owns Backup passwd File", "remarks": "rule_set_268" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_group", + "value": "file_owner_backup_etc_passwd", "remarks": "rule_set_268" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns group File", + "value": "Verify User Who Owns Backup passwd File", "remarks": "rule_set_268" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_group", + "value": "file_permissions_backup_etc_passwd", "remarks": "rule_set_269" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns group File", + "value": "Verify Permissions on Backup passwd File", "remarks": "rule_set_269" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_group", + "value": "file_permissions_backup_etc_passwd", "remarks": "rule_set_269" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns group File", + "value": "Verify Permissions on Backup passwd File", "remarks": "rule_set_269" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_group", + "value": "file_groupowner_etc_group", "remarks": "rule_set_270" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on group File", + "value": "Verify Group Who Owns group File", "remarks": "rule_set_270" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_group", + "value": "file_groupowner_etc_group", "remarks": "rule_set_270" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on group File", + "value": "Verify Group Who Owns group File", "remarks": "rule_set_270" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_group", + "value": "file_owner_etc_group", "remarks": "rule_set_271" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup group File", + "value": "Verify User Who Owns group File", "remarks": "rule_set_271" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_group", + "value": "file_owner_etc_group", "remarks": "rule_set_271" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup group File", + "value": "Verify User Who Owns group File", "remarks": "rule_set_271" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_group", + "value": "file_permissions_etc_group", + "remarks": "rule_set_272" + }, + { + "name": "Rule_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Verify Permissions on group File", "remarks": "rule_set_272" }, + { + "name": "Check_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "file_permissions_etc_group", + "remarks": "rule_set_272" + }, + { + "name": "Check_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Verify Permissions on group File", + "remarks": "rule_set_272" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "file_groupowner_backup_etc_group", + "remarks": "rule_set_273" + }, + { + "name": "Rule_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Verify Group Who Owns Backup group File", + "remarks": "rule_set_273" + }, + { + "name": "Check_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "file_groupowner_backup_etc_group", + "remarks": "rule_set_273" + }, + { + "name": "Check_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Verify Group Who Owns Backup group File", + "remarks": "rule_set_273" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "file_owner_backup_etc_group", + "remarks": "rule_set_274" + }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup group File", - "remarks": "rule_set_272" + "remarks": "rule_set_274" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_group", - "remarks": "rule_set_272" + "remarks": "rule_set_274" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup group File", - "remarks": "rule_set_272" + "remarks": "rule_set_274" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_group", - "remarks": "rule_set_273" + "remarks": "rule_set_275" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup group File", - "remarks": "rule_set_273" + "remarks": "rule_set_275" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_group", - "remarks": "rule_set_273" + "remarks": "rule_set_275" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup group File", - "remarks": "rule_set_273" + "remarks": "rule_set_275" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shadow", - "remarks": "rule_set_274" + "remarks": "rule_set_276" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns shadow File", - "remarks": "rule_set_274" + "remarks": "rule_set_276" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shadow", - "remarks": "rule_set_274" + "remarks": "rule_set_276" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns shadow File", - "remarks": "rule_set_274" + "remarks": "rule_set_276" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shadow", - "remarks": "rule_set_275" + "remarks": "rule_set_277" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns shadow File", - "remarks": "rule_set_275" + "remarks": "rule_set_277" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shadow", - "remarks": "rule_set_275" + "remarks": "rule_set_277" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns shadow File", - "remarks": "rule_set_275" + "remarks": "rule_set_277" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shadow", - "remarks": "rule_set_276" + "remarks": "rule_set_278" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on shadow File", - "remarks": "rule_set_276" + "remarks": "rule_set_278" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shadow", - "remarks": "rule_set_276" + "remarks": "rule_set_278" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on shadow File", - "remarks": "rule_set_276" + "remarks": "rule_set_278" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_shadow", - "remarks": "rule_set_277" + "remarks": "rule_set_279" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup shadow File", - "remarks": "rule_set_277" + "remarks": "rule_set_279" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_shadow", - "remarks": "rule_set_277" + "remarks": "rule_set_279" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup shadow File", - "remarks": "rule_set_277" + "remarks": "rule_set_279" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_shadow", - "remarks": "rule_set_278" + "remarks": "rule_set_280" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup shadow File", - "remarks": "rule_set_278" + "remarks": "rule_set_280" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_shadow", - "remarks": "rule_set_278" + "remarks": "rule_set_280" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup shadow File", - "remarks": "rule_set_278" + "remarks": "rule_set_280" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_shadow", - "remarks": "rule_set_279" + "remarks": "rule_set_281" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup shadow File", - "remarks": "rule_set_279" + "remarks": "rule_set_281" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_shadow", - "remarks": "rule_set_279" + "remarks": "rule_set_281" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup shadow File", - "remarks": "rule_set_279" + "remarks": "rule_set_281" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_gshadow", - "remarks": "rule_set_280" + "remarks": "rule_set_282" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns gshadow File", - "remarks": "rule_set_280" + "remarks": "rule_set_282" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_gshadow", - "remarks": "rule_set_280" + "remarks": "rule_set_282" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns gshadow File", - "remarks": "rule_set_280" + "remarks": "rule_set_282" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_gshadow", - "remarks": "rule_set_281" + "remarks": "rule_set_283" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns gshadow File", - "remarks": "rule_set_281" + "remarks": "rule_set_283" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_gshadow", - "remarks": "rule_set_281" + "remarks": "rule_set_283" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns gshadow File", - "remarks": "rule_set_281" + "remarks": "rule_set_283" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_gshadow", - "remarks": "rule_set_282" + "remarks": "rule_set_284" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on gshadow File", - "remarks": "rule_set_282" + "remarks": "rule_set_284" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_gshadow", - "remarks": "rule_set_282" + "remarks": "rule_set_284" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on gshadow File", - "remarks": "rule_set_282" + "remarks": "rule_set_284" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_gshadow", - "remarks": "rule_set_283" + "remarks": "rule_set_285" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup gshadow File", - "remarks": "rule_set_283" + "remarks": "rule_set_285" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_gshadow", - "remarks": "rule_set_283" + "remarks": "rule_set_285" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup gshadow File", - "remarks": "rule_set_283" + "remarks": "rule_set_285" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_gshadow", - "remarks": "rule_set_284" + "remarks": "rule_set_286" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup gshadow File", - "remarks": "rule_set_284" + "remarks": "rule_set_286" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_gshadow", - "remarks": "rule_set_284" + "remarks": "rule_set_286" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup gshadow File", - "remarks": "rule_set_284" + "remarks": "rule_set_286" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_gshadow", - "remarks": "rule_set_285" + "remarks": "rule_set_287" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup gshadow File", - "remarks": "rule_set_285" + "remarks": "rule_set_287" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_gshadow", - "remarks": "rule_set_285" + "remarks": "rule_set_287" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup gshadow File", - "remarks": "rule_set_285" + "remarks": "rule_set_287" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shells", - "remarks": "rule_set_286" + "remarks": "rule_set_288" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/shells File", - "remarks": "rule_set_286" + "remarks": "rule_set_288" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shells", - "remarks": "rule_set_286" + "remarks": "rule_set_288" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/shells File", - "remarks": "rule_set_286" + "remarks": "rule_set_288" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shells", - "remarks": "rule_set_287" + "remarks": "rule_set_289" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Who Owns /etc/shells File", - "remarks": "rule_set_287" + "remarks": "rule_set_289" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shells", - "remarks": "rule_set_287" + "remarks": "rule_set_289" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Who Owns /etc/shells File", - "remarks": "rule_set_287" + "remarks": "rule_set_289" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shells", - "remarks": "rule_set_288" + "remarks": "rule_set_290" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/shells File", - "remarks": "rule_set_288" + "remarks": "rule_set_290" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shells", - "remarks": "rule_set_288" + "remarks": "rule_set_290" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/shells File", - "remarks": "rule_set_288" + "remarks": "rule_set_290" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd", - "remarks": "rule_set_289" + "remarks": "rule_set_291" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd File", - "remarks": "rule_set_289" + "remarks": "rule_set_291" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd", - "remarks": "rule_set_289" + "remarks": "rule_set_291" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd File", - "remarks": "rule_set_289" + "remarks": "rule_set_291" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd", - "remarks": "rule_set_290" + "remarks": "rule_set_292" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd File", - "remarks": "rule_set_290" + "remarks": "rule_set_292" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd", - "remarks": "rule_set_290" + "remarks": "rule_set_292" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd File", - "remarks": "rule_set_290" + "remarks": "rule_set_292" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd", - "remarks": "rule_set_291" + "remarks": "rule_set_293" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd File", - "remarks": "rule_set_291" + "remarks": "rule_set_293" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd", - "remarks": "rule_set_291" + "remarks": "rule_set_293" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd File", - "remarks": "rule_set_291" + "remarks": "rule_set_293" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd_old", - "remarks": "rule_set_292" + "remarks": "rule_set_294" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_292" + "remarks": "rule_set_294" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd_old", - "remarks": "rule_set_292" + "remarks": "rule_set_294" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_292" + "remarks": "rule_set_294" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd_old", - "remarks": "rule_set_293" + "remarks": "rule_set_295" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_293" + "remarks": "rule_set_295" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd_old", - "remarks": "rule_set_293" + "remarks": "rule_set_295" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_293" + "remarks": "rule_set_295" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd_old", - "remarks": "rule_set_294" + "remarks": "rule_set_296" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd.old File", - "remarks": "rule_set_294" + "remarks": "rule_set_296" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd_old", - "remarks": "rule_set_294" + "remarks": "rule_set_296" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd.old File", - "remarks": "rule_set_294" + "remarks": "rule_set_296" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_295" + "remarks": "rule_set_297" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_295" + "remarks": "rule_set_297" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_295" + "remarks": "rule_set_297" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_295" + "remarks": "rule_set_297" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_296" + "remarks": "rule_set_298" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_296" + "remarks": "rule_set_298" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_296" + "remarks": "rule_set_298" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_296" + "remarks": "rule_set_298" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_unowned_by_user", - "remarks": "rule_set_297" + "remarks": "rule_set_299" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a User", - "remarks": "rule_set_297" + "remarks": "rule_set_299" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_unowned_by_user", - "remarks": "rule_set_297" + "remarks": "rule_set_299" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a User", - "remarks": "rule_set_297" + "remarks": "rule_set_299" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_ungroupowned", - "remarks": "rule_set_298" + "remarks": "rule_set_300" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a Group", - "remarks": "rule_set_298" + "remarks": "rule_set_300" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_ungroupowned", - "remarks": "rule_set_298" + "remarks": "rule_set_300" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a Group", - "remarks": "rule_set_298" + "remarks": "rule_set_300" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_all_shadowed", - "remarks": "rule_set_299" + "remarks": "rule_set_301" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify All Account Password Hashes are Shadowed", - "remarks": "rule_set_299" + "remarks": "rule_set_301" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_all_shadowed", - "remarks": "rule_set_299" + "remarks": "rule_set_301" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify All Account Password Hashes are Shadowed", - "remarks": "rule_set_299" + "remarks": "rule_set_301" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords_etc_shadow", - "remarks": "rule_set_300" + "remarks": "rule_set_302" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure There Are No Accounts With Blank or Null Passwords", - "remarks": "rule_set_300" + "remarks": "rule_set_302" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords_etc_shadow", - "remarks": "rule_set_300" + "remarks": "rule_set_302" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure There Are No Accounts With Blank or Null Passwords", - "remarks": "rule_set_300" + "remarks": "rule_set_302" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gid_passwd_group_same", - "remarks": "rule_set_301" + "remarks": "rule_set_303" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", - "remarks": "rule_set_301" + "remarks": "rule_set_303" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gid_passwd_group_same", - "remarks": "rule_set_301" + "remarks": "rule_set_303" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", - "remarks": "rule_set_301" + "remarks": "rule_set_303" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_id", - "remarks": "rule_set_302" + "remarks": "rule_set_304" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique User IDs", - "remarks": "rule_set_302" + "remarks": "rule_set_304" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_id", - "remarks": "rule_set_302" + "remarks": "rule_set_304" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique User IDs", - "remarks": "rule_set_302" + "remarks": "rule_set_304" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_id", - "remarks": "rule_set_303" + "remarks": "rule_set_305" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group ID", - "remarks": "rule_set_303" + "remarks": "rule_set_305" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_id", - "remarks": "rule_set_303" + "remarks": "rule_set_305" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group ID", - "remarks": "rule_set_303" + "remarks": "rule_set_305" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_name", - "remarks": "rule_set_304" + "remarks": "rule_set_306" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique Names", - "remarks": "rule_set_304" + "remarks": "rule_set_306" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_name", - "remarks": "rule_set_304" + "remarks": "rule_set_306" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique Names", - "remarks": "rule_set_304" + "remarks": "rule_set_306" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_name", - "remarks": "rule_set_305" + "remarks": "rule_set_307" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group Names", - "remarks": "rule_set_305" + "remarks": "rule_set_307" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_name", - "remarks": "rule_set_305" + "remarks": "rule_set_307" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group Names", - "remarks": "rule_set_305" + "remarks": "rule_set_307" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_interactive_home_directory_exists", - "remarks": "rule_set_306" + "remarks": "rule_set_308" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive Users Home Directories Must Exist", - "remarks": "rule_set_306" + "remarks": "rule_set_308" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_interactive_home_directory_exists", - "remarks": "rule_set_306" + "remarks": "rule_set_308" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive Users Home Directories Must Exist", - "remarks": "rule_set_306" + "remarks": "rule_set_308" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_home_directories", - "remarks": "rule_set_307" + "remarks": "rule_set_309" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Be Owned By The Primary User", - "remarks": "rule_set_307" + "remarks": "rule_set_309" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_home_directories", - "remarks": "rule_set_307" + "remarks": "rule_set_309" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Be Owned By The Primary User", - "remarks": "rule_set_307" + "remarks": "rule_set_309" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_home_directories", - "remarks": "rule_set_308" + "remarks": "rule_set_310" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", - "remarks": "rule_set_308" + "remarks": "rule_set_310" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_home_directories", - "remarks": "rule_set_308" + "remarks": "rule_set_310" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", - "remarks": "rule_set_308" + "remarks": "rule_set_310" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_309" + "remarks": "rule_set_311" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_309" + "remarks": "rule_set_311" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_309" + "remarks": "rule_set_311" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_309" + "remarks": "rule_set_311" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_310" + "remarks": "rule_set_312" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_310" + "remarks": "rule_set_312" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_310" + "remarks": "rule_set_312" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_310" + "remarks": "rule_set_312" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_no_world_writable_programs", - "remarks": "rule_set_311" + "remarks": "rule_set_313" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Not Run World-Writable Programs", - "remarks": "rule_set_311" + "remarks": "rule_set_313" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_no_world_writable_programs", - "remarks": "rule_set_311" + "remarks": "rule_set_313" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Not Run World-Writable Programs", - "remarks": "rule_set_311" + "remarks": "rule_set_313" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_312" + "remarks": "rule_set_314" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_312" + "remarks": "rule_set_314" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_312" + "remarks": "rule_set_314" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_312" + "remarks": "rule_set_314" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_forward_files", - "remarks": "rule_set_313" + "remarks": "rule_set_315" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .forward Files Exist", - "remarks": "rule_set_313" + "remarks": "rule_set_315" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_forward_files", - "remarks": "rule_set_313" + "remarks": "rule_set_315" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .forward Files Exist", - "remarks": "rule_set_313" + "remarks": "rule_set_315" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_netrc_files", - "remarks": "rule_set_314" + "remarks": "rule_set_316" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No netrc Files Exist", - "remarks": "rule_set_314" + "remarks": "rule_set_316" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_netrc_files", - "remarks": "rule_set_314" + "remarks": "rule_set_316" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No netrc Files Exist", - "remarks": "rule_set_314" + "remarks": "rule_set_316" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rhost_files", - "remarks": "rule_set_315" + "remarks": "rule_set_317" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .rhost Files Exist", - "remarks": "rule_set_315" + "remarks": "rule_set_317" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rhost_files", - "remarks": "rule_set_315" + "remarks": "rule_set_317" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .rhost Files Exist", - "remarks": "rule_set_315" + "remarks": "rule_set_317" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_bash_history", - "remarks": "rule_set_316" + "remarks": "rule_set_318" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure User Bash History File Has Correct Permissions", - "remarks": "rule_set_316" + "remarks": "rule_set_318" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_bash_history", - "remarks": "rule_set_316" + "remarks": "rule_set_318" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure User Bash History File Has Correct Permissions", - "remarks": "rule_set_316" + "remarks": "rule_set_318" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_overlayfs_disabled", - "remarks": "rule_set_317" + "remarks": "rule_set_319" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure overlayfs kernel module is not available", - "remarks": "rule_set_317" + "remarks": "rule_set_319" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_overlayfs_disabled", - "remarks": "rule_set_317" + "remarks": "rule_set_319" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure overlayfs kernel module is not available", - "remarks": "rule_set_317" + "remarks": "rule_set_319" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_squashfs_disabled", - "remarks": "rule_set_318" + "remarks": "rule_set_320" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Mounting of squashfs", - "remarks": "rule_set_318" + "remarks": "rule_set_320" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_squashfs_disabled", - "remarks": "rule_set_318" + "remarks": "rule_set_320" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Mounting of squashfs", - "remarks": "rule_set_318" + "remarks": "rule_set_320" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_udf_disabled", - "remarks": "rule_set_319" + "remarks": "rule_set_321" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Mounting of udf", - "remarks": "rule_set_319" + "remarks": "rule_set_321" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_udf_disabled", - "remarks": "rule_set_319" + "remarks": "rule_set_321" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Mounting of udf", - "remarks": "rule_set_319" + "remarks": "rule_set_321" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_firewire-core_disabled", - "remarks": "rule_set_320" + "remarks": "rule_set_322" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable IEEE 1394 (FireWire) Support", - "remarks": "rule_set_320" + "remarks": "rule_set_322" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_firewire-core_disabled", - "remarks": "rule_set_320" + "remarks": "rule_set_322" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable IEEE 1394 (FireWire) Support", - "remarks": "rule_set_320" + "remarks": "rule_set_322" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_usb-storage_disabled", - "remarks": "rule_set_321" + "remarks": "rule_set_323" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Modprobe Loading of USB Storage Driver", - "remarks": "rule_set_321" + "remarks": "rule_set_323" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_usb-storage_disabled", - "remarks": "rule_set_321" + "remarks": "rule_set_323" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Modprobe Loading of USB Storage Driver", - "remarks": "rule_set_321" + "remarks": "rule_set_323" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_home", - "remarks": "rule_set_322" + "remarks": "rule_set_324" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /home Located On Separate Partition", - "remarks": "rule_set_322" + "remarks": "rule_set_324" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_home", - "remarks": "rule_set_322" + "remarks": "rule_set_324" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /home Located On Separate Partition", - "remarks": "rule_set_322" + "remarks": "rule_set_324" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var", - "remarks": "rule_set_323" + "remarks": "rule_set_325" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var Located On Separate Partition", - "remarks": "rule_set_323" + "remarks": "rule_set_325" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var", - "remarks": "rule_set_323" + "remarks": "rule_set_325" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var Located On Separate Partition", - "remarks": "rule_set_323" + "remarks": "rule_set_325" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_tmp", - "remarks": "rule_set_324" + "remarks": "rule_set_326" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/tmp Located On Separate Partition", - "remarks": "rule_set_324" + "remarks": "rule_set_326" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_tmp", - "remarks": "rule_set_324" + "remarks": "rule_set_326" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/tmp Located On Separate Partition", - "remarks": "rule_set_324" + "remarks": "rule_set_326" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log", - "remarks": "rule_set_325" + "remarks": "rule_set_327" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log Located On Separate Partition", - "remarks": "rule_set_325" + "remarks": "rule_set_327" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log", - "remarks": "rule_set_325" + "remarks": "rule_set_327" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log Located On Separate Partition", - "remarks": "rule_set_325" + "remarks": "rule_set_327" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log_audit", - "remarks": "rule_set_326" + "remarks": "rule_set_328" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log/audit Located On Separate Partition", - "remarks": "rule_set_326" + "remarks": "rule_set_328" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log_audit", - "remarks": "rule_set_326" + "remarks": "rule_set_328" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log/audit Located On Separate Partition", - "remarks": "rule_set_326" + "remarks": "rule_set_328" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_weak_deps", - "remarks": "rule_set_327" + "remarks": "rule_set_329" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Installation of Weak Dependencies in DNF", - "remarks": "rule_set_327" + "remarks": "rule_set_329" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_weak_deps", - "remarks": "rule_set_327" + "remarks": "rule_set_329" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Installation of Weak Dependencies in DNF", - "remarks": "rule_set_327" + "remarks": "rule_set_329" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_state", - "remarks": "rule_set_328" + "remarks": "rule_set_330" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SELinux State is Enforcing", - "remarks": "rule_set_328" + "remarks": "rule_set_330" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_state", - "remarks": "rule_set_328" + "remarks": "rule_set_330" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SELinux State is Enforcing", - "remarks": "rule_set_328" + "remarks": "rule_set_330" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_symlinks", - "remarks": "rule_set_329" + "remarks": "rule_set_331" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", - "remarks": "rule_set_329" + "remarks": "rule_set_331" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_symlinks", - "remarks": "rule_set_329" + "remarks": "rule_set_331" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", - "remarks": "rule_set_329" + "remarks": "rule_set_331" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_automount", - "remarks": "rule_set_330" + "remarks": "rule_set_332" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automounting", - "remarks": "rule_set_330" + "remarks": "rule_set_332" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_automount", - "remarks": "rule_set_330" + "remarks": "rule_set_332" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automounting", - "remarks": "rule_set_330" + "remarks": "rule_set_332" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_automount_open", - "remarks": "rule_set_331" + "remarks": "rule_set_333" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automount Opening", - "remarks": "rule_set_331" + "remarks": "rule_set_333" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_automount_open", - "remarks": "rule_set_331" + "remarks": "rule_set_333" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automount Opening", - "remarks": "rule_set_331" + "remarks": "rule_set_333" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "xwayland_disabled", - "remarks": "rule_set_332" + "remarks": "rule_set_334" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable XWayland", - "remarks": "rule_set_332" + "remarks": "rule_set_334" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "xwayland_disabled", - "remarks": "rule_set_332" + "remarks": "rule_set_334" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable XWayland", - "remarks": "rule_set_332" + "remarks": "rule_set_334" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_autofs_disabled", - "remarks": "rule_set_333" + "remarks": "rule_set_335" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the Automounter", - "remarks": "rule_set_333" + "remarks": "rule_set_335" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_autofs_disabled", - "remarks": "rule_set_333" + "remarks": "rule_set_335" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the Automounter", - "remarks": "rule_set_333" + "remarks": "rule_set_335" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_avahi-daemon_disabled", - "remarks": "rule_set_334" + "remarks": "rule_set_336" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Avahi Server Software", - "remarks": "rule_set_334" + "remarks": "rule_set_336" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_avahi-daemon_disabled", - "remarks": "rule_set_334" + "remarks": "rule_set_336" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Avahi Server Software", - "remarks": "rule_set_334" + "remarks": "rule_set_336" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_cockpit_disabled", - "remarks": "rule_set_335" + "remarks": "rule_set_337" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Cockpit Management Server", - "remarks": "rule_set_335" + "remarks": "rule_set_337" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_cockpit_disabled", - "remarks": "rule_set_335" + "remarks": "rule_set_337" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Cockpit Management Server", - "remarks": "rule_set_335" + "remarks": "rule_set_337" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_openldap-clients_removed", - "remarks": "rule_set_336" + "remarks": "rule_set_338" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure LDAP client is not installed", - "remarks": "rule_set_336" + "remarks": "rule_set_338" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_openldap-clients_removed", - "remarks": "rule_set_336" + "remarks": "rule_set_338" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure LDAP client is not installed", - "remarks": "rule_set_336" + "remarks": "rule_set_338" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_bluetooth_disabled", - "remarks": "rule_set_337" + "remarks": "rule_set_339" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Bluetooth Service", - "remarks": "rule_set_337" + "remarks": "rule_set_339" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_bluetooth_disabled", - "remarks": "rule_set_337" + "remarks": "rule_set_339" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Bluetooth Service", - "remarks": "rule_set_337" + "remarks": "rule_set_339" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_nopasswd", - "remarks": "rule_set_338" + "remarks": "rule_set_340" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD", - "remarks": "rule_set_338" + "remarks": "rule_set_340" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_nopasswd", - "remarks": "rule_set_338" + "remarks": "rule_set_340" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD", - "remarks": "rule_set_338" + "remarks": "rule_set_340" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny_root", - "remarks": "rule_set_339" + "remarks": "rule_set_341" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the root Account for Failed Password Attempts", - "remarks": "rule_set_339" + "remarks": "rule_set_341" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny_root", - "remarks": "rule_set_339" + "remarks": "rule_set_341" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the root Account for Failed Password Attempts", - "remarks": "rule_set_339" + "remarks": "rule_set_341" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_minimum_age_login_defs", - "remarks": "rule_set_340" + "remarks": "rule_set_342" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Minimum Age", - "remarks": "rule_set_340" + "remarks": "rule_set_342" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_minimum_age_login_defs", - "remarks": "rule_set_340" + "remarks": "rule_set_342" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Minimum Age", - "remarks": "rule_set_340" + "remarks": "rule_set_342" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_min_life_existing", - "remarks": "rule_set_341" + "remarks": "rule_set_343" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Minimum Age", - "remarks": "rule_set_341" + "remarks": "rule_set_343" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_min_life_existing", - "remarks": "rule_set_341" + "remarks": "rule_set_343" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Minimum Age", - "remarks": "rule_set_341" + "remarks": "rule_set_343" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_nologin_in_shells", - "remarks": "rule_set_342" + "remarks": "rule_set_344" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure nologin Shell is Not Listed in /etc/shells", - "remarks": "rule_set_342" + "remarks": "rule_set_344" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_nologin_in_shells", - "remarks": "rule_set_342" + "remarks": "rule_set_344" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure nologin Shell is Not Listed in /etc/shells", - "remarks": "rule_set_342" + "remarks": "rule_set_344" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit_installed", - "remarks": "rule_set_343" + "remarks": "rule_set_345" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit Subsystem is Installed", - "remarks": "rule_set_343" + "remarks": "rule_set_345" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit_installed", - "remarks": "rule_set_343" + "remarks": "rule_set_345" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit Subsystem is Installed", - "remarks": "rule_set_343" + "remarks": "rule_set_345" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit-libs_installed", - "remarks": "rule_set_344" + "remarks": "rule_set_346" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit-libs package as a part of audit Subsystem is Installed", - "remarks": "rule_set_344" + "remarks": "rule_set_346" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit-libs_installed", - "remarks": "rule_set_344" + "remarks": "rule_set_346" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit-libs package as a part of audit Subsystem is Installed", - "remarks": "rule_set_344" + "remarks": "rule_set_346" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_argument", - "remarks": "rule_set_345" + "remarks": "rule_set_347" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Auditing for Processes Which Start Prior to the Audit Daemon", - "remarks": "rule_set_345" + "remarks": "rule_set_347" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_argument", - "remarks": "rule_set_345" + "remarks": "rule_set_347" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Auditing for Processes Which Start Prior to the Audit Daemon", - "remarks": "rule_set_345" + "remarks": "rule_set_347" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_backlog_limit_argument", - "remarks": "rule_set_346" + "remarks": "rule_set_348" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Extend Audit Backlog Limit for the Audit Daemon", - "remarks": "rule_set_346" + "remarks": "rule_set_348" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_backlog_limit_argument", - "remarks": "rule_set_346" + "remarks": "rule_set_348" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Extend Audit Backlog Limit for the Audit Daemon", - "remarks": "rule_set_346" + "remarks": "rule_set_348" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_auditd_enabled", - "remarks": "rule_set_347" + "remarks": "rule_set_349" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable auditd Service", - "remarks": "rule_set_347" + "remarks": "rule_set_349" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_auditd_enabled", - "remarks": "rule_set_347" + "remarks": "rule_set_349" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable auditd Service", - "remarks": "rule_set_347" + "remarks": "rule_set_349" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_max_log_file", - "remarks": "rule_set_348" + "remarks": "rule_set_350" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Max Log File Size", - "remarks": "rule_set_348" + "remarks": "rule_set_350" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_max_log_file", - "remarks": "rule_set_348" + "remarks": "rule_set_350" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Max Log File Size", - "remarks": "rule_set_348" + "remarks": "rule_set_350" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_max_log_file_action", - "remarks": "rule_set_349" + "remarks": "rule_set_351" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd max_log_file_action Upon Reaching Maximum Log Size", - "remarks": "rule_set_349" + "remarks": "rule_set_351" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_max_log_file_action", - "remarks": "rule_set_349" + "remarks": "rule_set_351" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd max_log_file_action Upon Reaching Maximum Log Size", - "remarks": "rule_set_349" + "remarks": "rule_set_351" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_disk_error_action", - "remarks": "rule_set_350" + "remarks": "rule_set_352" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Disk Error Action on Disk Error", - "remarks": "rule_set_350" + "remarks": "rule_set_352" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_disk_error_action", - "remarks": "rule_set_350" + "remarks": "rule_set_352" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Disk Error Action on Disk Error", - "remarks": "rule_set_350" + "remarks": "rule_set_352" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_disk_full_action", - "remarks": "rule_set_351" + "remarks": "rule_set_353" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Disk Full Action when Disk Space Is Full", - "remarks": "rule_set_351" + "remarks": "rule_set_353" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_disk_full_action", - "remarks": "rule_set_351" + "remarks": "rule_set_353" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Disk Full Action when Disk Space Is Full", - "remarks": "rule_set_351" + "remarks": "rule_set_353" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_admin_space_left_action", - "remarks": "rule_set_352" + "remarks": "rule_set_354" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd admin_space_left Action on Low Disk Space", - "remarks": "rule_set_352" + "remarks": "rule_set_354" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_admin_space_left_action", - "remarks": "rule_set_352" + "remarks": "rule_set_354" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd admin_space_left Action on Low Disk Space", - "remarks": "rule_set_352" + "remarks": "rule_set_354" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_space_left_action", - "remarks": "rule_set_353" + "remarks": "rule_set_355" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd space_left Action on Low Disk Space", - "remarks": "rule_set_353" + "remarks": "rule_set_355" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_space_left_action", - "remarks": "rule_set_353" + "remarks": "rule_set_355" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd space_left Action on Low Disk Space", - "remarks": "rule_set_353" + "remarks": "rule_set_355" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_sysadmin_actions", - "remarks": "rule_set_354" + "remarks": "rule_set_356" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects System Administrator Actions", - "remarks": "rule_set_354" + "remarks": "rule_set_356" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_sysadmin_actions", - "remarks": "rule_set_354" + "remarks": "rule_set_356" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects System Administrator Actions", - "remarks": "rule_set_354" + "remarks": "rule_set_356" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_suid_auid_privilege_function", - "remarks": "rule_set_355" + "remarks": "rule_set_357" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events When Executables Are Run As Another User", - "remarks": "rule_set_355" + "remarks": "rule_set_357" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_suid_auid_privilege_function", - "remarks": "rule_set_355" + "remarks": "rule_set_357" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events When Executables Are Run As Another User", - "remarks": "rule_set_355" + "remarks": "rule_set_357" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_sudo_log_events", - "remarks": "rule_set_356" + "remarks": "rule_set_358" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to perform maintenance activities", - "remarks": "rule_set_356" + "remarks": "rule_set_358" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_sudo_log_events", - "remarks": "rule_set_356" + "remarks": "rule_set_358" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to perform maintenance activities", - "remarks": "rule_set_356" + "remarks": "rule_set_358" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_adjtimex", - "remarks": "rule_set_357" + "remarks": "rule_set_359" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through adjtimex", - "remarks": "rule_set_357" + "remarks": "rule_set_359" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_adjtimex", - "remarks": "rule_set_357" + "remarks": "rule_set_359" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through adjtimex", - "remarks": "rule_set_357" + "remarks": "rule_set_359" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_settimeofday", - "remarks": "rule_set_358" + "remarks": "rule_set_360" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through settimeofday", - "remarks": "rule_set_358" + "remarks": "rule_set_360" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_settimeofday", - "remarks": "rule_set_358" + "remarks": "rule_set_360" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through settimeofday", - "remarks": "rule_set_358" + "remarks": "rule_set_360" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_clock_settime", - "remarks": "rule_set_359" + "remarks": "rule_set_361" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through clock_settime", - "remarks": "rule_set_359" + "remarks": "rule_set_361" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_clock_settime", - "remarks": "rule_set_359" + "remarks": "rule_set_361" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through clock_settime", - "remarks": "rule_set_359" + "remarks": "rule_set_361" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_watch_localtime", - "remarks": "rule_set_360" + "remarks": "rule_set_362" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter the localtime File", - "remarks": "rule_set_360" + "remarks": "rule_set_362" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_watch_localtime", - "remarks": "rule_set_360" + "remarks": "rule_set_362" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter the localtime File", - "remarks": "rule_set_360" + "remarks": "rule_set_362" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_setdomainname", - "remarks": "rule_set_361" + "remarks": "rule_set_363" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - setdomainname", - "remarks": "rule_set_361" + "remarks": "rule_set_363" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_setdomainname", - "remarks": "rule_set_361" + "remarks": "rule_set_363" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - setdomainname", - "remarks": "rule_set_361" + "remarks": "rule_set_363" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_sethostname", - "remarks": "rule_set_362" + "remarks": "rule_set_364" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - sethostname", - "remarks": "rule_set_362" + "remarks": "rule_set_364" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_sethostname", - "remarks": "rule_set_362" + "remarks": "rule_set_364" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - sethostname", - "remarks": "rule_set_362" + "remarks": "rule_set_364" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_issue", - "remarks": "rule_set_363" + "remarks": "rule_set_365" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/issue", - "remarks": "rule_set_363" + "remarks": "rule_set_365" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_issue", - "remarks": "rule_set_363" + "remarks": "rule_set_365" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/issue", - "remarks": "rule_set_363" + "remarks": "rule_set_365" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_issue_net", - "remarks": "rule_set_364" + "remarks": "rule_set_366" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/issue.net", - "remarks": "rule_set_364" + "remarks": "rule_set_366" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_issue_net", - "remarks": "rule_set_364" + "remarks": "rule_set_366" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/issue.net", - "remarks": "rule_set_364" + "remarks": "rule_set_366" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_hosts", - "remarks": "rule_set_365" + "remarks": "rule_set_367" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/hosts", - "remarks": "rule_set_365" + "remarks": "rule_set_367" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_hosts", - "remarks": "rule_set_365" + "remarks": "rule_set_367" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/hosts", - "remarks": "rule_set_365" + "remarks": "rule_set_367" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_hostname_file", - "remarks": "rule_set_366" + "remarks": "rule_set_368" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/hostname", - "remarks": "rule_set_366" + "remarks": "rule_set_368" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_hostname_file", - "remarks": "rule_set_366" + "remarks": "rule_set_368" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/hostname", - "remarks": "rule_set_366" + "remarks": "rule_set_368" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_sysconfig_network", - "remarks": "rule_set_367" + "remarks": "rule_set_369" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/sysconfig/network", - "remarks": "rule_set_367" + "remarks": "rule_set_369" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_sysconfig_network", - "remarks": "rule_set_367" + "remarks": "rule_set_369" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/sysconfig/network", - "remarks": "rule_set_367" + "remarks": "rule_set_369" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_networkmanager_system_connections", - "remarks": "rule_set_368" + "remarks": "rule_set_370" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/system-connections/", - "remarks": "rule_set_368" + "remarks": "rule_set_370" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_networkmanager_system_connections", - "remarks": "rule_set_368" + "remarks": "rule_set_370" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/system-connections/", - "remarks": "rule_set_368" + "remarks": "rule_set_370" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_networkmanager", - "remarks": "rule_set_369" + "remarks": "rule_set_371" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/", - "remarks": "rule_set_369" + "remarks": "rule_set_371" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_networkmanager", - "remarks": "rule_set_369" + "remarks": "rule_set_371" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/", - "remarks": "rule_set_369" + "remarks": "rule_set_371" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands", - "remarks": "rule_set_370" + "remarks": "rule_set_372" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands", - "remarks": "rule_set_370" + "remarks": "rule_set_372" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands", - "remarks": "rule_set_370" + "remarks": "rule_set_372" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands", - "remarks": "rule_set_370" + "remarks": "rule_set_372" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_creat", - "remarks": "rule_set_371" + "remarks": "rule_set_373" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - creat", - "remarks": "rule_set_371" + "remarks": "rule_set_373" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_creat", - "remarks": "rule_set_371" + "remarks": "rule_set_373" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - creat", - "remarks": "rule_set_371" + "remarks": "rule_set_373" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_ftruncate", - "remarks": "rule_set_372" + "remarks": "rule_set_374" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - ftruncate", - "remarks": "rule_set_372" + "remarks": "rule_set_374" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_ftruncate", - "remarks": "rule_set_372" + "remarks": "rule_set_374" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - ftruncate", - "remarks": "rule_set_372" + "remarks": "rule_set_374" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_open", - "remarks": "rule_set_373" + "remarks": "rule_set_375" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - open", - "remarks": "rule_set_373" + "remarks": "rule_set_375" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_open", - "remarks": "rule_set_373" + "remarks": "rule_set_375" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - open", - "remarks": "rule_set_373" + "remarks": "rule_set_375" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_openat", - "remarks": "rule_set_374" + "remarks": "rule_set_376" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - openat", - "remarks": "rule_set_374" + "remarks": "rule_set_376" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_openat", - "remarks": "rule_set_374" + "remarks": "rule_set_376" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - openat", - "remarks": "rule_set_374" + "remarks": "rule_set_376" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_truncate", - "remarks": "rule_set_375" + "remarks": "rule_set_377" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - truncate", - "remarks": "rule_set_375" + "remarks": "rule_set_377" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_truncate", - "remarks": "rule_set_375" + "remarks": "rule_set_377" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - truncate", - "remarks": "rule_set_375" + "remarks": "rule_set_377" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_group", - "remarks": "rule_set_376" + "remarks": "rule_set_378" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/group", - "remarks": "rule_set_376" + "remarks": "rule_set_378" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_group", - "remarks": "rule_set_376" + "remarks": "rule_set_378" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/group", - "remarks": "rule_set_376" + "remarks": "rule_set_378" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_passwd", - "remarks": "rule_set_377" + "remarks": "rule_set_379" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/passwd", - "remarks": "rule_set_377" + "remarks": "rule_set_379" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_passwd", - "remarks": "rule_set_377" + "remarks": "rule_set_379" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/passwd", - "remarks": "rule_set_377" + "remarks": "rule_set_379" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_gshadow", - "remarks": "rule_set_378" + "remarks": "rule_set_380" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/gshadow", - "remarks": "rule_set_378" + "remarks": "rule_set_380" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_gshadow", - "remarks": "rule_set_378" + "remarks": "rule_set_380" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/gshadow", - "remarks": "rule_set_378" + "remarks": "rule_set_380" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_shadow", - "remarks": "rule_set_379" + "remarks": "rule_set_381" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/shadow", - "remarks": "rule_set_379" + "remarks": "rule_set_381" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_shadow", - "remarks": "rule_set_379" + "remarks": "rule_set_381" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/shadow", - "remarks": "rule_set_379" + "remarks": "rule_set_381" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_opasswd", - "remarks": "rule_set_380" + "remarks": "rule_set_382" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", - "remarks": "rule_set_380" + "remarks": "rule_set_382" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_opasswd", - "remarks": "rule_set_380" + "remarks": "rule_set_382" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", - "remarks": "rule_set_380" + "remarks": "rule_set_382" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_nsswitch_conf", - "remarks": "rule_set_381" + "remarks": "rule_set_383" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/nsswitch.conf", - "remarks": "rule_set_381" + "remarks": "rule_set_383" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_nsswitch_conf", - "remarks": "rule_set_381" + "remarks": "rule_set_383" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/nsswitch.conf", - "remarks": "rule_set_381" + "remarks": "rule_set_383" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_pam_conf", - "remarks": "rule_set_382" + "remarks": "rule_set_384" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/pam.conf", - "remarks": "rule_set_382" + "remarks": "rule_set_384" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_pam_conf", - "remarks": "rule_set_382" + "remarks": "rule_set_384" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/pam.conf", - "remarks": "rule_set_382" + "remarks": "rule_set_384" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_pamd", - "remarks": "rule_set_383" + "remarks": "rule_set_385" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/pam.d/", - "remarks": "rule_set_383" + "remarks": "rule_set_385" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_pamd", - "remarks": "rule_set_383" + "remarks": "rule_set_385" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/pam.d/", - "remarks": "rule_set_383" + "remarks": "rule_set_385" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chmod", - "remarks": "rule_set_384" + "remarks": "rule_set_386" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", - "remarks": "rule_set_384" + "remarks": "rule_set_386" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chmod", - "remarks": "rule_set_384" + "remarks": "rule_set_386" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", - "remarks": "rule_set_384" + "remarks": "rule_set_386" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmod", - "remarks": "rule_set_385" + "remarks": "rule_set_387" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmod", - "remarks": "rule_set_385" + "remarks": "rule_set_387" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmod", - "remarks": "rule_set_385" + "remarks": "rule_set_387" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmod", - "remarks": "rule_set_385" + "remarks": "rule_set_387" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat", - "remarks": "rule_set_386" + "remarks": "rule_set_388" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat", - "remarks": "rule_set_386" + "remarks": "rule_set_388" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat", - "remarks": "rule_set_386" + "remarks": "rule_set_388" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat", - "remarks": "rule_set_386" + "remarks": "rule_set_388" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat2", - "remarks": "rule_set_387" + "remarks": "rule_set_389" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat2", - "remarks": "rule_set_387" + "remarks": "rule_set_389" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat2", - "remarks": "rule_set_387" + "remarks": "rule_set_389" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat2", - "remarks": "rule_set_387" + "remarks": "rule_set_389" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chown", - "remarks": "rule_set_388" + "remarks": "rule_set_390" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chown", - "remarks": "rule_set_388" + "remarks": "rule_set_390" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chown", - "remarks": "rule_set_388" + "remarks": "rule_set_390" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chown", - "remarks": "rule_set_388" + "remarks": "rule_set_390" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchown", - "remarks": "rule_set_389" + "remarks": "rule_set_391" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchown", - "remarks": "rule_set_389" + "remarks": "rule_set_391" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchown", - "remarks": "rule_set_389" + "remarks": "rule_set_391" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchown", - "remarks": "rule_set_389" + "remarks": "rule_set_391" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchownat", - "remarks": "rule_set_390" + "remarks": "rule_set_392" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchownat", - "remarks": "rule_set_390" + "remarks": "rule_set_392" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchownat", - "remarks": "rule_set_390" + "remarks": "rule_set_392" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchownat", - "remarks": "rule_set_390" + "remarks": "rule_set_392" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lchown", - "remarks": "rule_set_391" + "remarks": "rule_set_393" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lchown", - "remarks": "rule_set_391" + "remarks": "rule_set_393" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lchown", - "remarks": "rule_set_391" + "remarks": "rule_set_393" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lchown", - "remarks": "rule_set_391" + "remarks": "rule_set_393" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fremovexattr", - "remarks": "rule_set_392" + "remarks": "rule_set_394" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fremovexattr", - "remarks": "rule_set_392" + "remarks": "rule_set_394" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fremovexattr", - "remarks": "rule_set_392" + "remarks": "rule_set_394" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fremovexattr", - "remarks": "rule_set_392" + "remarks": "rule_set_394" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fsetxattr", - "remarks": "rule_set_393" + "remarks": "rule_set_395" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fsetxattr", - "remarks": "rule_set_393" + "remarks": "rule_set_395" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fsetxattr", - "remarks": "rule_set_393" + "remarks": "rule_set_395" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fsetxattr", - "remarks": "rule_set_393" + "remarks": "rule_set_395" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lremovexattr", - "remarks": "rule_set_394" + "remarks": "rule_set_396" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lremovexattr", - "remarks": "rule_set_394" + "remarks": "rule_set_396" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lremovexattr", - "remarks": "rule_set_394" + "remarks": "rule_set_396" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lremovexattr", - "remarks": "rule_set_394" + "remarks": "rule_set_396" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lsetxattr", - "remarks": "rule_set_395" + "remarks": "rule_set_397" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lsetxattr", - "remarks": "rule_set_395" + "remarks": "rule_set_397" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lsetxattr", - "remarks": "rule_set_395" + "remarks": "rule_set_397" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lsetxattr", - "remarks": "rule_set_395" + "remarks": "rule_set_397" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_removexattr", - "remarks": "rule_set_396" + "remarks": "rule_set_398" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - removexattr", - "remarks": "rule_set_396" + "remarks": "rule_set_398" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_removexattr", - "remarks": "rule_set_396" + "remarks": "rule_set_398" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - removexattr", - "remarks": "rule_set_396" + "remarks": "rule_set_398" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_setxattr", - "remarks": "rule_set_397" + "remarks": "rule_set_399" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - setxattr", - "remarks": "rule_set_397" + "remarks": "rule_set_399" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_setxattr", - "remarks": "rule_set_397" + "remarks": "rule_set_399" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - setxattr", - "remarks": "rule_set_397" + "remarks": "rule_set_399" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_media_export", - "remarks": "rule_set_398" + "remarks": "rule_set_400" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Exporting to Media (successful)", - "remarks": "rule_set_398" + "remarks": "rule_set_400" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_media_export", - "remarks": "rule_set_398" + "remarks": "rule_set_400" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Exporting to Media (successful)", - "remarks": "rule_set_398" + "remarks": "rule_set_400" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_utmp", - "remarks": "rule_set_399" + "remarks": "rule_set_401" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information utmp", - "remarks": "rule_set_399" + "remarks": "rule_set_401" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_utmp", - "remarks": "rule_set_399" + "remarks": "rule_set_401" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information utmp", - "remarks": "rule_set_399" + "remarks": "rule_set_401" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_btmp", - "remarks": "rule_set_400" + "remarks": "rule_set_402" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information btmp", - "remarks": "rule_set_400" + "remarks": "rule_set_402" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_btmp", - "remarks": "rule_set_400" + "remarks": "rule_set_402" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information btmp", - "remarks": "rule_set_400" + "remarks": "rule_set_402" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_wtmp", - "remarks": "rule_set_401" + "remarks": "rule_set_403" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", - "remarks": "rule_set_401" + "remarks": "rule_set_403" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_wtmp", - "remarks": "rule_set_401" + "remarks": "rule_set_403" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", - "remarks": "rule_set_401" + "remarks": "rule_set_403" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_faillock", - "remarks": "rule_set_402" + "remarks": "rule_set_404" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - faillock", - "remarks": "rule_set_402" + "remarks": "rule_set_404" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_faillock", - "remarks": "rule_set_402" + "remarks": "rule_set_404" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - faillock", - "remarks": "rule_set_402" + "remarks": "rule_set_404" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_lastlog", - "remarks": "rule_set_403" + "remarks": "rule_set_405" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - lastlog", - "remarks": "rule_set_403" + "remarks": "rule_set_405" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_lastlog", - "remarks": "rule_set_403" + "remarks": "rule_set_405" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - lastlog", - "remarks": "rule_set_403" + "remarks": "rule_set_405" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlink", - "remarks": "rule_set_404" + "remarks": "rule_set_406" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlink", - "remarks": "rule_set_404" + "remarks": "rule_set_406" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlink", - "remarks": "rule_set_404" + "remarks": "rule_set_406" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlink", - "remarks": "rule_set_404" + "remarks": "rule_set_406" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlinkat", - "remarks": "rule_set_405" + "remarks": "rule_set_407" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlinkat", - "remarks": "rule_set_405" + "remarks": "rule_set_407" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlinkat", - "remarks": "rule_set_405" + "remarks": "rule_set_407" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlinkat", - "remarks": "rule_set_405" + "remarks": "rule_set_407" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rename", - "remarks": "rule_set_406" + "remarks": "rule_set_408" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rename", - "remarks": "rule_set_406" + "remarks": "rule_set_408" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rename", - "remarks": "rule_set_406" + "remarks": "rule_set_408" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rename", - "remarks": "rule_set_406" + "remarks": "rule_set_408" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat", - "remarks": "rule_set_407" + "remarks": "rule_set_409" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat", - "remarks": "rule_set_407" + "remarks": "rule_set_409" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat", - "remarks": "rule_set_407" + "remarks": "rule_set_409" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat", - "remarks": "rule_set_407" + "remarks": "rule_set_409" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat2", - "remarks": "rule_set_408" + "remarks": "rule_set_410" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat2", - "remarks": "rule_set_408" + "remarks": "rule_set_410" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat2", - "remarks": "rule_set_408" + "remarks": "rule_set_410" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat2", - "remarks": "rule_set_408" + "remarks": "rule_set_410" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_etc_selinux", - "remarks": "rule_set_409" + "remarks": "rule_set_411" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls (/etc/selinux)", - "remarks": "rule_set_409" + "remarks": "rule_set_411" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_etc_selinux", - "remarks": "rule_set_409" + "remarks": "rule_set_411" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls (/etc/selinux)", - "remarks": "rule_set_409" + "remarks": "rule_set_411" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_usr_share", - "remarks": "rule_set_410" + "remarks": "rule_set_412" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls in usr/share", - "remarks": "rule_set_410" + "remarks": "rule_set_412" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_usr_share", - "remarks": "rule_set_410" + "remarks": "rule_set_412" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls in usr/share", - "remarks": "rule_set_410" + "remarks": "rule_set_412" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chcon", - "remarks": "rule_set_411" + "remarks": "rule_set_413" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chcon", - "remarks": "rule_set_411" + "remarks": "rule_set_413" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chcon", - "remarks": "rule_set_411" + "remarks": "rule_set_413" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chcon", - "remarks": "rule_set_411" + "remarks": "rule_set_413" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_setfacl", - "remarks": "rule_set_412" + "remarks": "rule_set_414" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run setfacl", - "remarks": "rule_set_412" + "remarks": "rule_set_414" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_setfacl", - "remarks": "rule_set_412" + "remarks": "rule_set_414" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run setfacl", - "remarks": "rule_set_412" + "remarks": "rule_set_414" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chacl", - "remarks": "rule_set_413" + "remarks": "rule_set_415" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chacl", - "remarks": "rule_set_413" + "remarks": "rule_set_415" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chacl", - "remarks": "rule_set_413" + "remarks": "rule_set_415" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chacl", - "remarks": "rule_set_413" + "remarks": "rule_set_415" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_usermod", - "remarks": "rule_set_414" + "remarks": "rule_set_416" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - usermod", - "remarks": "rule_set_414" + "remarks": "rule_set_416" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_usermod", - "remarks": "rule_set_414" + "remarks": "rule_set_416" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - usermod", - "remarks": "rule_set_414" + "remarks": "rule_set_416" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_kmod", - "remarks": "rule_set_415" + "remarks": "rule_set_417" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - kmod", - "remarks": "rule_set_415" + "remarks": "rule_set_417" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_kmod", - "remarks": "rule_set_415" + "remarks": "rule_set_417" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - kmod", - "remarks": "rule_set_415" + "remarks": "rule_set_417" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_init", - "remarks": "rule_set_416" + "remarks": "rule_set_418" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading - init_module", - "remarks": "rule_set_416" + "remarks": "rule_set_418" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_init", - "remarks": "rule_set_416" + "remarks": "rule_set_418" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading - init_module", - "remarks": "rule_set_416" + "remarks": "rule_set_418" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_finit", - "remarks": "rule_set_417" + "remarks": "rule_set_419" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - finit_module", - "remarks": "rule_set_417" + "remarks": "rule_set_419" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_finit", - "remarks": "rule_set_417" + "remarks": "rule_set_419" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - finit_module", - "remarks": "rule_set_417" + "remarks": "rule_set_419" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_delete", - "remarks": "rule_set_418" + "remarks": "rule_set_420" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Unloading - delete_module", - "remarks": "rule_set_418" + "remarks": "rule_set_420" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_delete", - "remarks": "rule_set_418" + "remarks": "rule_set_420" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Unloading - delete_module", - "remarks": "rule_set_418" + "remarks": "rule_set_420" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_query", - "remarks": "rule_set_419" + "remarks": "rule_set_421" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - query_module", - "remarks": "rule_set_419" + "remarks": "rule_set_421" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_query", - "remarks": "rule_set_419" + "remarks": "rule_set_421" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - query_module", - "remarks": "rule_set_419" + "remarks": "rule_set_421" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_continue_loading", - "remarks": "rule_set_420" + "remarks": "rule_set_422" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Audit Configuration is Loaded Regardless of Errors", - "remarks": "rule_set_420" + "remarks": "rule_set_422" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_continue_loading", - "remarks": "rule_set_420" + "remarks": "rule_set_422" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Audit Configuration is Loaded Regardless of Errors", - "remarks": "rule_set_420" + "remarks": "rule_set_422" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_immutable", - "remarks": "rule_set_421" + "remarks": "rule_set_423" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Make the auditd Configuration Immutable", - "remarks": "rule_set_421" + "remarks": "rule_set_423" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_immutable", - "remarks": "rule_set_421" + "remarks": "rule_set_423" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Make the auditd Configuration Immutable", - "remarks": "rule_set_421" + "remarks": "rule_set_423" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_var_log_audit", - "remarks": "rule_set_422" + "remarks": "rule_set_424" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0750 or Less Permissive", - "remarks": "rule_set_422" + "remarks": "rule_set_424" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_var_log_audit", - "remarks": "rule_set_422" + "remarks": "rule_set_424" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0750 or Less Permissive", - "remarks": "rule_set_422" + "remarks": "rule_set_424" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_var_log_audit", - "remarks": "rule_set_423" + "remarks": "rule_set_425" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0640 or Less Permissive", - "remarks": "rule_set_423" + "remarks": "rule_set_425" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_var_log_audit", - "remarks": "rule_set_423" + "remarks": "rule_set_425" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0640 or Less Permissive", - "remarks": "rule_set_423" + "remarks": "rule_set_425" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_var_log_audit_stig", - "remarks": "rule_set_424" + "remarks": "rule_set_426" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Owned By Root", - "remarks": "rule_set_424" + "remarks": "rule_set_426" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_var_log_audit_stig", - "remarks": "rule_set_424" + "remarks": "rule_set_426" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Owned By Root", - "remarks": "rule_set_424" + "remarks": "rule_set_426" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_group_ownership_var_log_audit", - "remarks": "rule_set_425" + "remarks": "rule_set_427" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Group Owned By Root", - "remarks": "rule_set_425" + "remarks": "rule_set_427" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_group_ownership_var_log_audit", - "remarks": "rule_set_425" + "remarks": "rule_set_427" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Group Owned By Root", - "remarks": "rule_set_425" + "remarks": "rule_set_427" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_audit_configuration", - "remarks": "rule_set_426" + "remarks": "rule_set_428" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Permissions are 640 or More Restrictive", - "remarks": "rule_set_426" + "remarks": "rule_set_428" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_audit_configuration", - "remarks": "rule_set_426" + "remarks": "rule_set_428" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Permissions are 640 or More Restrictive", - "remarks": "rule_set_426" + "remarks": "rule_set_428" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_audit_configuration", - "remarks": "rule_set_427" + "remarks": "rule_set_429" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Must Be Owned By Root", - "remarks": "rule_set_427" + "remarks": "rule_set_429" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_audit_configuration", - "remarks": "rule_set_427" + "remarks": "rule_set_429" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Must Be Owned By Root", - "remarks": "rule_set_427" + "remarks": "rule_set_429" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_audit_configuration", - "remarks": "rule_set_428" + "remarks": "rule_set_430" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Must Be Owned By Group root", - "remarks": "rule_set_428" + "remarks": "rule_set_430" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_audit_configuration", - "remarks": "rule_set_428" + "remarks": "rule_set_430" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Must Be Owned By Group root", - "remarks": "rule_set_428" + "remarks": "rule_set_430" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_audit_binaries", - "remarks": "rule_set_429" + "remarks": "rule_set_431" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools Have Mode 0755 or less", - "remarks": "rule_set_429" + "remarks": "rule_set_431" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_audit_binaries", - "remarks": "rule_set_429" + "remarks": "rule_set_431" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools Have Mode 0755 or less", - "remarks": "rule_set_429" + "remarks": "rule_set_431" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_audit_binaries", - "remarks": "rule_set_430" + "remarks": "rule_set_432" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools are owned by root", - "remarks": "rule_set_430" + "remarks": "rule_set_432" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_audit_binaries", - "remarks": "rule_set_430" + "remarks": "rule_set_432" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools are owned by root", - "remarks": "rule_set_430" + "remarks": "rule_set_432" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_audit_binaries", - "remarks": "rule_set_431" + "remarks": "rule_set_433" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools are owned by group root", - "remarks": "rule_set_431" + "remarks": "rule_set_433" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_audit_binaries", - "remarks": "rule_set_431" + "remarks": "rule_set_433" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools are owned by group root", - "remarks": "rule_set_431" + "remarks": "rule_set_433" } ], "control-implementations": [ { - "uuid": "e076c461-de0d-44bc-8936-0522e79ade63", + "uuid": "a4602f16-ecab-4b67-b063-f816a429ddf0", "source": "trestle://profiles/rhel10-cis_rhel10-l2_workstation/profile.json", "description": "Control implementation for cis_workstation_l2", "props": [ @@ -24920,7 +25001,7 @@ ], "implemented-requirements": [ { - "uuid": "35f0f40d-5f04-487c-85ef-70ccc0dc38f1", + "uuid": "e4f80499-a95e-4d98-8365-2e790e23bc5a", "control-id": "cis_rhel10_1-1.1.6", "description": "No notes for control-id 1.1.1.6.", "props": [ @@ -24937,7 +25018,7 @@ ] }, { - "uuid": "1872e5df-43e2-42e4-b73a-bd041e4e22ed", + "uuid": "c9470cc2-f721-444e-888a-ed69b4e774e3", "control-id": "cis_rhel10_1-1.1.7", "description": "No notes for control-id 1.1.1.7.", "props": [ @@ -24954,7 +25035,7 @@ ] }, { - "uuid": "92fdf60f-f92b-47dc-a246-d80bb9baed5f", + "uuid": "49047d60-7cd7-48dd-93f1-17baed5a272c", "control-id": "cis_rhel10_1-1.1.8", "description": "No notes for control-id 1.1.1.8.", "props": [ @@ -24971,7 +25052,7 @@ ] }, { - "uuid": "0bcd3133-6edb-45cb-8362-58d937f75afd", + "uuid": "0fb4a557-fd2c-4ea2-8416-20c2e0b95c46", "control-id": "cis_rhel10_1-1.1.9", "description": "No notes for control-id 1.1.1.9.", "props": [ @@ -24988,7 +25069,7 @@ ] }, { - "uuid": "ae920990-dec2-439e-a94e-577f1771ec78", + "uuid": "da5e9d55-ec94-4981-aff2-401fcdccb9b4", "control-id": "cis_rhel10_1-1.1.10", "description": "No notes for control-id 1.1.1.10.", "props": [ @@ -25005,7 +25086,7 @@ ] }, { - "uuid": "174ba3d1-1413-465c-81b2-cb0416e51b46", + "uuid": "a24fe861-efc7-4526-b5e3-66e887997140", "control-id": "cis_rhel10_1-1.2.3.1", "description": "No notes for control-id 1.1.2.3.1.", "props": [ @@ -25022,7 +25103,7 @@ ] }, { - "uuid": "d4ef2e8f-7187-45cc-978f-521434bee845", + "uuid": "82170942-fadd-481f-9beb-ec0aa9f48259", "control-id": "cis_rhel10_1-1.2.4.1", "description": "No notes for control-id 1.1.2.4.1.", "props": [ @@ -25039,7 +25120,7 @@ ] }, { - "uuid": "3cb1ba69-ea79-431e-acf8-5b0918464905", + "uuid": "e2b3049e-974f-475f-9324-b16469db5867", "control-id": "cis_rhel10_1-1.2.5.1", "description": "No notes for control-id 1.1.2.5.1.", "props": [ @@ -25056,7 +25137,7 @@ ] }, { - "uuid": "ed671bd8-2c3c-4bf0-bce1-d8b1ede831e9", + "uuid": "bac5c77e-f4f0-46c7-ab00-0592e7694520", "control-id": "cis_rhel10_1-1.2.6.1", "description": "No notes for control-id 1.1.2.6.1.", "props": [ @@ -25073,7 +25154,7 @@ ] }, { - "uuid": "cea2438b-d2cb-404f-a38d-8eef2c582f4d", + "uuid": "7cf67e15-7e77-4659-b0b6-6ed669f5c445", "control-id": "cis_rhel10_1-1.2.7.1", "description": "No notes for control-id 1.1.2.7.1.", "props": [ @@ -25090,7 +25171,7 @@ ] }, { - "uuid": "04598ab4-86f4-4c51-b88b-ee86c4bf1918", + "uuid": "6a5747aa-2e76-4e3d-9a68-784443159793", "control-id": "cis_rhel10_1-2.1.3", "description": "The description for control-id cis_rhel10_1-2.1.3.", "props": [ @@ -25103,7 +25184,7 @@ ] }, { - "uuid": "aa5b7443-32b5-4a39-8f71-80a6f1ce33d9", + "uuid": "cbb71c30-fb46-4d64-985a-4472c4e8c24c", "control-id": "cis_rhel10_1-2.1.5", "description": "No notes for control-id 1.2.1.5.", "props": [ @@ -25120,7 +25201,7 @@ ] }, { - "uuid": "f1acd8f1-f5da-447f-b1fd-59127774e72e", + "uuid": "4f21559a-60db-44c3-a762-0e56a94b4499", "control-id": "cis_rhel10_1-3.1.5", "description": "No notes for control-id 1.3.1.5.", "props": [ @@ -25137,7 +25218,7 @@ ] }, { - "uuid": "f66ed475-b21e-44b1-b72a-b10a0dd65bff", + "uuid": "5ba225bd-59c2-462a-9215-f712f9872f0d", "control-id": "cis_rhel10_1-3.1.6", "description": "The description for control-id cis_rhel10_1-3.1.6.", "props": [ @@ -25150,7 +25231,7 @@ ] }, { - "uuid": "5e7534a7-a234-479e-9ab7-d80d1a231c5b", + "uuid": "555e700b-39a3-4d73-a073-f15111d55628", "control-id": "cis_rhel10_1-5.3", "description": "No notes for control-id 1.5.3.", "props": [ @@ -25167,7 +25248,7 @@ ] }, { - "uuid": "c4b92096-1ebe-44c5-91f7-b1039418feca", + "uuid": "a510b047-50b6-470c-9fa4-6644bdd88efa", "control-id": "cis_rhel10_1-8.4", "description": "No notes for control-id 1.8.4.", "props": [ @@ -25189,7 +25270,7 @@ ] }, { - "uuid": "9098f8fb-e04e-46e3-b4ee-ab424cd48c09", + "uuid": "30b48f7c-a213-4cc8-8018-f8f73c2e40e4", "control-id": "cis_rhel10_1-8.6", "description": "No notes for control-id 1.8.6.", "props": [ @@ -25206,7 +25287,7 @@ ] }, { - "uuid": "b0b1d814-803f-4eb2-8a60-c81daf6dbead", + "uuid": "db41fa10-ddcd-4348-8385-6c37b1cbceee", "control-id": "cis_rhel10_2-1.1", "description": "No notes for control-id 2.1.1.", "props": [ @@ -25223,7 +25304,7 @@ ] }, { - "uuid": "133a834d-ccd3-4ce6-9613-ffb344cc9d08", + "uuid": "aa0b52c3-92e1-4d31-befc-7dc53f346917", "control-id": "cis_rhel10_2-1.2", "description": "No notes for control-id 2.1.2.", "props": [ @@ -25240,7 +25321,7 @@ ] }, { - "uuid": "97a4fc05-8d5d-43ac-b0fc-69b4be45a74a", + "uuid": "5e024517-28be-41cf-9a44-9e45d0c27550", "control-id": "cis_rhel10_2-1.3", "description": "No notes for control-id 2.1.3.", "props": [ @@ -25257,7 +25338,7 @@ ] }, { - "uuid": "f14c6475-ad47-47d4-b367-1efb391c56f5", + "uuid": "2f36aed2-cdca-4d05-8fc0-ca834d936607", "control-id": "cis_rhel10_2-2.2", "description": "No notes for control-id 2.2.2.", "props": [ @@ -25274,7 +25355,7 @@ ] }, { - "uuid": "b6579509-8195-4c18-80d8-0d8f1f34d9e5", + "uuid": "22266e66-8399-415a-9976-deea84192677", "control-id": "cis_rhel10_3-1.3", "description": "No notes for control-id 3.1.3.", "props": [ @@ -25291,7 +25372,7 @@ ] }, { - "uuid": "e2f7e3a9-415a-4c40-b304-38352bd56f75", + "uuid": "5ec29aa6-8c11-4910-9294-7b62b6fdf1f5", "control-id": "cis_rhel10_5-2.4", "description": "No notes for control-id 5.2.4.", "props": [ @@ -25308,7 +25389,7 @@ ] }, { - "uuid": "1879e297-d583-42bc-a83b-d2d676bd0b62", + "uuid": "43db7671-9c03-47d2-8db3-84e44ea6ccd6", "control-id": "cis_rhel10_5-3.2.1.3", "description": "No notes for control-id 5.3.2.1.3.", "props": [ @@ -25325,7 +25406,7 @@ ] }, { - "uuid": "dc9e2c11-4a2d-488d-8d01-da2c03cb17fa", + "uuid": "506a0779-4544-42ba-8310-26092354c12a", "control-id": "cis_rhel10_5-4.1.2", "description": "No notes for control-id 5.4.1.2.", "props": [ @@ -25347,7 +25428,7 @@ ] }, { - "uuid": "da005c2e-4bdd-4d27-ba26-01ae689e2290", + "uuid": "021095b8-e3f3-47c5-8a79-720be652ae90", "control-id": "cis_rhel10_5-4.3.1", "description": "No notes for control-id 5.4.3.1.", "props": [ @@ -25364,7 +25445,7 @@ ] }, { - "uuid": "1b1759c8-023f-4fbc-87e9-c097ca2e145c", + "uuid": "45048120-0309-446e-9215-d6056756d1c7", "control-id": "cis_rhel10_6-3.1.1", "description": "No notes for control-id 6.3.1.1.", "props": [ @@ -25386,7 +25467,7 @@ ] }, { - "uuid": "8f98a959-8cfe-448e-b165-b116b1494b15", + "uuid": "3d0e2e77-0de8-4194-9d00-6f5945e469e8", "control-id": "cis_rhel10_6-3.1.2", "description": "No notes for control-id 6.3.1.2.", "props": [ @@ -25403,7 +25484,7 @@ ] }, { - "uuid": "973f9e25-306a-4413-be40-ca652263937e", + "uuid": "5eebd6ca-2f2c-4f87-a7bd-e50d38470ecb", "control-id": "cis_rhel10_6-3.1.3", "description": "No notes for control-id 6.3.1.3.", "props": [ @@ -25420,7 +25501,7 @@ ] }, { - "uuid": "01092c2a-1554-4449-8afd-3ed167d069f9", + "uuid": "06b0243b-6874-41be-94d1-a8e3427bb574", "control-id": "cis_rhel10_6-3.1.4", "description": "No notes for control-id 6.3.1.4.", "props": [ @@ -25437,7 +25518,7 @@ ] }, { - "uuid": "5542ed57-91a5-400e-a697-d8e81b42ee40", + "uuid": "062e7986-983b-4291-bc38-a4ac71243590", "control-id": "cis_rhel10_6-3.2.1", "description": "No notes for control-id 6.3.2.1.", "props": [ @@ -25454,7 +25535,7 @@ ] }, { - "uuid": "405962ea-9456-450f-b3ee-01746390d851", + "uuid": "c17962b4-2a9e-447d-86a0-cf0a25794964", "control-id": "cis_rhel10_6-3.2.2", "description": "No notes for control-id 6.3.2.2.", "props": [ @@ -25471,7 +25552,7 @@ ] }, { - "uuid": "5d8b07bd-5d73-412a-b07e-2b7157d24fe3", + "uuid": "b26ff364-4042-418f-9f43-c33dcb98855a", "control-id": "cis_rhel10_6-3.2.3", "description": "No notes for control-id 6.3.2.3.", "props": [ @@ -25493,7 +25574,7 @@ ] }, { - "uuid": "f06777b4-97cc-4c54-9fa7-724e48549046", + "uuid": "c8d78435-0167-4c6e-ac51-302284d8142b", "control-id": "cis_rhel10_6-3.2.4", "description": "No notes for control-id 6.3.2.4.", "props": [ @@ -25515,7 +25596,7 @@ ] }, { - "uuid": "5c6aca49-06b0-4832-82ba-febc2228e906", + "uuid": "c448bbd9-4d7a-4330-a64d-c81115119972", "control-id": "cis_rhel10_6-3.3.1", "description": "No notes for control-id 6.3.3.1.", "props": [ @@ -25532,7 +25613,7 @@ ] }, { - "uuid": "813d55f0-b81f-4358-b191-036154996ab2", + "uuid": "f3427d97-5637-4b82-a590-dfd8342bf734", "control-id": "cis_rhel10_6-3.3.2", "description": "No notes for control-id 6.3.3.2.", "props": [ @@ -25549,7 +25630,7 @@ ] }, { - "uuid": "415d8e0c-3e2f-40cf-8ebe-a683ce7224d8", + "uuid": "e2b63233-52c6-4451-897b-8fdb0fe57d05", "control-id": "cis_rhel10_6-3.3.3", "description": "No notes for control-id 6.3.3.3.", "props": [ @@ -25566,7 +25647,7 @@ ] }, { - "uuid": "b25453d4-ed9e-40f8-9133-cd92e19718c3", + "uuid": "6c26be23-3de8-4908-affe-a12ca8282aee", "control-id": "cis_rhel10_6-3.3.4", "description": "No notes for control-id 6.3.3.4.", "props": [ @@ -25598,7 +25679,7 @@ ] }, { - "uuid": "03644593-2954-4d61-8717-863ec9b6897e", + "uuid": "81bd7f69-78e3-40e9-8c30-ed47b52e35ad", "control-id": "cis_rhel10_6-3.3.5", "description": "No notes for control-id 6.3.3.5.", "props": [ @@ -25620,7 +25701,7 @@ ] }, { - "uuid": "580f6168-cf8d-4390-869e-57c749516ed7", + "uuid": "496936a6-b7a5-4342-9822-0e73e76e3eb9", "control-id": "cis_rhel10_6-3.3.6", "description": "No notes for control-id 6.3.3.6.", "props": [ @@ -25642,7 +25723,7 @@ ] }, { - "uuid": "807d440a-c32f-43d3-96b1-e3f660f19699", + "uuid": "8d45ef5a-7e05-431b-984c-e1a9d009ebd0", "control-id": "cis_rhel10_6-3.3.7", "description": "No notes for control-id 6.3.3.7.", "props": [ @@ -25664,7 +25745,7 @@ ] }, { - "uuid": "b62df933-2d33-4768-9643-eccb545d1918", + "uuid": "f4a21544-6674-4280-8b62-30241d500d87", "control-id": "cis_rhel10_6-3.3.8", "description": "No notes for control-id 6.3.3.8.", "props": [ @@ -25686,7 +25767,7 @@ ] }, { - "uuid": "81d48084-6ec7-49d1-b176-706913081848", + "uuid": "99094d71-ecaa-400e-8659-14e3fc6faa17", "control-id": "cis_rhel10_6-3.3.9", "description": "No notes for control-id 6.3.3.9.", "props": [ @@ -25703,7 +25784,7 @@ ] }, { - "uuid": "5ac93dc8-1196-4a05-aeef-26adf8792f72", + "uuid": "f862cb93-f85e-46c0-a4f0-b7fe806fadd8", "control-id": "cis_rhel10_6-3.3.10", "description": "No notes for control-id 6.3.3.10.", "props": [ @@ -25720,7 +25801,7 @@ ] }, { - "uuid": "4d4185cb-43c4-45d7-a397-b4ef4d9077a7", + "uuid": "ad029bec-226b-4545-9269-d6fe9e15b8d3", "control-id": "cis_rhel10_6-3.3.11", "description": "No notes for control-id 6.3.3.11.", "props": [ @@ -25757,7 +25838,7 @@ ] }, { - "uuid": "7ca12354-089d-4d01-882b-a6efd2b62830", + "uuid": "6e87826f-e85e-42ed-84c3-5152546660ab", "control-id": "cis_rhel10_6-3.3.12", "description": "No notes for control-id 6.3.3.12.", "props": [ @@ -25774,7 +25855,7 @@ ] }, { - "uuid": "b9212f4e-4a7f-4063-87df-f356f8053ded", + "uuid": "03b69f2f-a3ed-47bb-9794-e06d08022b0e", "control-id": "cis_rhel10_6-3.3.13", "description": "No notes for control-id 6.3.3.13.", "props": [ @@ -25791,7 +25872,7 @@ ] }, { - "uuid": "b41db379-be46-4d3a-b6f7-4e6875b036b4", + "uuid": "15771ff8-5778-40dc-8e80-58db9c97eb1c", "control-id": "cis_rhel10_6-3.3.14", "description": "No notes for control-id 6.3.3.14.", "props": [ @@ -25813,7 +25894,7 @@ ] }, { - "uuid": "f8c2b415-11ab-45f7-9d26-312d749844d6", + "uuid": "a6c49192-d978-4738-906b-1e0cbcbac352", "control-id": "cis_rhel10_6-3.3.15", "description": "No notes for control-id 6.3.3.15.", "props": [ @@ -25830,7 +25911,7 @@ ] }, { - "uuid": "2a9cf972-ee73-4fdc-b1fe-d75dbfcc3d92", + "uuid": "0701ffe1-6d94-4fe3-b4a2-293215013d54", "control-id": "cis_rhel10_6-3.3.16", "description": "No notes for control-id 6.3.3.16.", "props": [ @@ -25847,7 +25928,7 @@ ] }, { - "uuid": "7190804d-d743-440e-9f40-1aba5840116a", + "uuid": "52f66fff-0798-4758-9761-9c410b38e2a8", "control-id": "cis_rhel10_6-3.3.17", "description": "No notes for control-id 6.3.3.17.", "props": [ @@ -25869,7 +25950,7 @@ ] }, { - "uuid": "06f228d8-2a76-4bd8-9382-343b7b697f9a", + "uuid": "e6d0acc1-6f7b-43eb-873f-bcd76cfcb9ba", "control-id": "cis_rhel10_6-3.3.18", "description": "No notes for control-id 6.3.3.18.", "props": [ @@ -25901,7 +25982,7 @@ ] }, { - "uuid": "9ef4d9eb-8813-43a1-9506-dca4f8128a6f", + "uuid": "dbfd317b-36ce-4b3a-aad9-cb3118e2782f", "control-id": "cis_rhel10_6-3.3.19", "description": "No notes for control-id 6.3.3.19.", "props": [ @@ -25933,7 +26014,7 @@ ] }, { - "uuid": "f31b3f96-1bec-41ef-968c-263ce949b100", + "uuid": "9efe5f6b-3364-421a-8e89-d0df6e77fcb7", "control-id": "cis_rhel10_6-3.3.20", "description": "No notes for control-id 6.3.3.20.", "props": [ @@ -25975,7 +26056,7 @@ ] }, { - "uuid": "8c73031a-3a17-41a7-ad08-4967ee2c6427", + "uuid": "b4dc7cff-7974-45e4-94b9-57500142b092", "control-id": "cis_rhel10_6-3.3.21", "description": "No notes for control-id 6.3.3.21.", "props": [ @@ -25992,7 +26073,7 @@ ] }, { - "uuid": "63e30bf9-4164-4fbf-b176-6143232bd7c3", + "uuid": "48567539-f194-4a6b-97d4-9e79b3c29aa5", "control-id": "cis_rhel10_6-3.3.22", "description": "No notes for control-id 6.3.3.22.", "props": [ @@ -26019,7 +26100,7 @@ ] }, { - "uuid": "80cebbe5-8fff-45dd-96d5-67bfd6b596cd", + "uuid": "834db63d-db05-452b-ade6-63ffc8e91ea3", "control-id": "cis_rhel10_6-3.3.23", "description": "No notes for control-id 6.3.3.23.", "props": [ @@ -26041,7 +26122,7 @@ ] }, { - "uuid": "928915c7-bd39-4235-bc7a-3fabd7e350b5", + "uuid": "464d1cc3-ef9e-4814-b530-ba6d34e89c96", "control-id": "cis_rhel10_6-3.3.24", "description": "No notes for control-id 6.3.3.24.", "props": [ @@ -26063,7 +26144,7 @@ ] }, { - "uuid": "2b424a67-8d7b-4e70-a5cc-6ff68909c065", + "uuid": "1f906692-7c85-4a2f-a681-f283c8096244", "control-id": "cis_rhel10_6-3.3.25", "description": "No notes for control-id 6.3.3.25.", "props": [ @@ -26090,7 +26171,7 @@ ] }, { - "uuid": "f49b212c-3e11-497b-9535-f8c9c3832268", + "uuid": "c6d08ebd-aa01-47f5-abae-1beb0c682c59", "control-id": "cis_rhel10_6-3.3.26", "description": "No notes for control-id 6.3.3.26.", "props": [ @@ -26112,7 +26193,7 @@ ] }, { - "uuid": "248c2323-af34-4a5e-9634-d75433d6ae8a", + "uuid": "5f484424-b49b-4f4c-b2ef-87d2251d1d85", "control-id": "cis_rhel10_6-3.3.27", "description": "No notes for control-id 6.3.3.27.", "props": [ @@ -26129,7 +26210,7 @@ ] }, { - "uuid": "2fffd850-5e7c-41f0-8752-44af34da18eb", + "uuid": "d4e0a0e8-a911-49ed-9c03-08512ee331e2", "control-id": "cis_rhel10_6-3.3.28", "description": "No notes for control-id 6.3.3.28.", "props": [ @@ -26146,7 +26227,7 @@ ] }, { - "uuid": "7ab6bce7-119c-4f0f-a78f-b3189e905ec3", + "uuid": "6de424f6-3e86-46a1-9e62-6122b084f35c", "control-id": "cis_rhel10_6-3.3.29", "description": "No notes for control-id 6.3.3.29.", "props": [ @@ -26163,7 +26244,7 @@ ] }, { - "uuid": "91767e06-cd81-4733-8a6b-197cc5c34f09", + "uuid": "7ab879e3-a818-4f41-820b-bb7e4c9561f9", "control-id": "cis_rhel10_6-3.3.30", "description": "No notes for control-id 6.3.3.30.", "props": [ @@ -26180,7 +26261,7 @@ ] }, { - "uuid": "38d0c46c-d533-475b-b116-365125457287", + "uuid": "bdc71c80-cddb-4049-b482-d705c65930f9", "control-id": "cis_rhel10_6-3.3.31", "description": "No notes for control-id 6.3.3.31.", "props": [ @@ -26197,7 +26278,7 @@ ] }, { - "uuid": "4357fe3d-ef72-4c19-b5dc-380c7d8409f5", + "uuid": "375f2687-2497-4bd9-bf32-3967e174e713", "control-id": "cis_rhel10_6-3.3.32", "description": "No notes for control-id 6.3.3.32.", "props": [ @@ -26219,7 +26300,7 @@ ] }, { - "uuid": "97d69e3c-c63c-4abf-a948-1923bc6cacb6", + "uuid": "949e4df7-e628-416a-9a94-d8b8a2a4770c", "control-id": "cis_rhel10_6-3.3.33", "description": "No notes for control-id 6.3.3.33.", "props": [ @@ -26236,7 +26317,7 @@ ] }, { - "uuid": "30b578ee-b357-4fa1-aa89-a4d6f2db3269", + "uuid": "519f5723-cff6-4286-b81a-fdd5c222fc8e", "control-id": "cis_rhel10_6-3.3.34", "description": "No notes for control-id 6.3.3.34.", "props": [ @@ -26253,7 +26334,7 @@ ] }, { - "uuid": "668157a8-cf1f-4c48-859c-1e26b703856b", + "uuid": "95b06cb2-552b-49c0-a0fc-fbfb20389ce8", "control-id": "cis_rhel10_6-3.3.35", "description": "No notes for control-id 6.3.3.35.", "props": [ @@ -26270,7 +26351,7 @@ ] }, { - "uuid": "2c47b1b0-fc81-4478-b808-cf72968c4547", + "uuid": "ab075133-9b12-45c4-8e00-8f74377e5859", "control-id": "cis_rhel10_6-3.3.36", "description": "No notes for control-id 6.3.3.36.", "props": [ @@ -26287,7 +26368,7 @@ ] }, { - "uuid": "a829936f-7f7e-4170-8c43-1ff891ab919d", + "uuid": "5c8d9cee-8339-4d32-835e-f100165c7b43", "control-id": "cis_rhel10_6-3.3.37", "description": "The description for control-id cis_rhel10_6-3.3.37.", "props": [ @@ -26300,7 +26381,7 @@ ] }, { - "uuid": "3020bd1c-baa1-4905-a44f-6d312ab32d59", + "uuid": "d382de2d-e074-4a98-b978-5edd8a50f5af", "control-id": "cis_rhel10_6-3.4.1", "description": "No notes for control-id 6.3.4.1.", "props": [ @@ -26317,7 +26398,7 @@ ] }, { - "uuid": "acbfe0de-5686-448f-9025-cd737f132e12", + "uuid": "224e6bf0-6ad7-46fd-be2b-ddbca025f42f", "control-id": "cis_rhel10_6-3.4.2", "description": "No notes for control-id 6.3.4.2.", "props": [ @@ -26334,7 +26415,7 @@ ] }, { - "uuid": "c8580f00-9693-4b46-9710-c01dc96d15fa", + "uuid": "6fe1137a-1b43-45cf-9eef-5f1d13433299", "control-id": "cis_rhel10_6-3.4.3", "description": "No notes for control-id 6.3.4.3.", "props": [ @@ -26351,7 +26432,7 @@ ] }, { - "uuid": "438604ff-888c-4918-a35d-11494d70c75f", + "uuid": "b9833bea-a9a5-4ff5-9084-e64cb5edd6e5", "control-id": "cis_rhel10_6-3.4.4", "description": "No notes for control-id 6.3.4.4.", "props": [ @@ -26368,7 +26449,7 @@ ] }, { - "uuid": "3df8c522-3f01-41d6-8177-8caa9f0ab9b3", + "uuid": "d4baec87-3d1e-4914-a1c9-fa9d829c7a9c", "control-id": "cis_rhel10_6-3.4.5", "description": "No notes for control-id 6.3.4.5.", "props": [ @@ -26385,7 +26466,7 @@ ] }, { - "uuid": "0281fd35-7b5c-46d6-bb4a-79551975a7a7", + "uuid": "70ac4eb5-835c-4a87-9c73-a70fe8926ee3", "control-id": "cis_rhel10_6-3.4.6", "description": "No notes for control-id 6.3.4.6.", "props": [ @@ -26402,7 +26483,7 @@ ] }, { - "uuid": "bb700e5a-01df-4e09-81b3-93168e9ce06e", + "uuid": "260bed97-c9a3-4113-8a7f-3c0311de0759", "control-id": "cis_rhel10_6-3.4.7", "description": "No notes for control-id 6.3.4.7.", "props": [ @@ -26419,7 +26500,7 @@ ] }, { - "uuid": "11cbaa13-1cbc-4d0d-9e4d-57f7ab1f173d", + "uuid": "20c92318-cee0-4d5d-ae37-d2d7b150d3bb", "control-id": "cis_rhel10_6-3.4.8", "description": "No notes for control-id 6.3.4.8.", "props": [ @@ -26436,7 +26517,7 @@ ] }, { - "uuid": "e37d453a-ebac-4033-a66c-9d5da42a4101", + "uuid": "6afa3ae6-ddf4-4656-8811-5748197a0781", "control-id": "cis_rhel10_6-3.4.9", "description": "No notes for control-id 6.3.4.9.", "props": [ @@ -26453,7 +26534,7 @@ ] }, { - "uuid": "f31ac817-3114-40f6-86b1-30a6baf650a3", + "uuid": "67beebd3-ab7b-4937-b2e0-21682775d967", "control-id": "cis_rhel10_6-3.4.10", "description": "No notes for control-id 6.3.4.10.", "props": [ @@ -26470,7 +26551,7 @@ ] }, { - "uuid": "bb645269-bee1-40b0-a187-15d9c9e04ae2", + "uuid": "e619279a-8b82-462a-a9fc-f066b02eabc7", "control-id": "reload_dconf_db", "description": "This is a helper rule to reload Dconf database correctly.", "props": [ @@ -26487,7 +26568,7 @@ ] }, { - "uuid": "5246fa22-01aa-482a-9840-427d8af2feaf", + "uuid": "d578b535-a55f-48b2-b6f7-bdfcfbca6aae", "control-id": "cis_rhel10_1-1.1.1", "description": "No notes for control-id 1.1.1.1.", "props": [ @@ -26504,7 +26585,7 @@ ] }, { - "uuid": "71b40742-a571-4f6e-ab2a-2439eb841303", + "uuid": "56143f5d-c76a-4c5c-b008-4b1d47d1cd2d", "control-id": "cis_rhel10_1-1.1.2", "description": "No notes for control-id 1.1.1.2.", "props": [ @@ -26521,7 +26602,7 @@ ] }, { - "uuid": "b90a849b-0b65-4935-9824-644501a9da5e", + "uuid": "fefe1821-b04c-4c94-82ed-7f4dd59b1e84", "control-id": "cis_rhel10_1-1.1.3", "description": "No notes for control-id 1.1.1.3.", "props": [ @@ -26538,7 +26619,7 @@ ] }, { - "uuid": "21074d7f-9c44-4a9c-ab7c-66dcd91b4f8f", + "uuid": "32b55505-e86f-4ae9-b608-e731ce17cee6", "control-id": "cis_rhel10_1-1.1.4", "description": "No notes for control-id 1.1.1.4.", "props": [ @@ -26555,7 +26636,7 @@ ] }, { - "uuid": "5fcc5e52-ca1e-4892-827b-8c2b474b8e63", + "uuid": "1f346d0e-6b2f-426a-8478-27a8518e07c8", "control-id": "cis_rhel10_1-1.1.5", "description": "No notes for control-id 1.1.1.5.", "props": [ @@ -26572,7 +26653,7 @@ ] }, { - "uuid": "8f287413-fb91-4a54-a557-1b079dac8726", + "uuid": "1325ec9f-e5ec-4b9c-acde-a411390cd151", "control-id": "cis_rhel10_1-1.1.11", "description": "The description for control-id cis_rhel10_1-1.1.11.", "props": [ @@ -26585,7 +26666,7 @@ ] }, { - "uuid": "1c795a00-0c3c-4216-9b2e-63d01feb7ce6", + "uuid": "a6f71657-97b9-4582-91fb-5fed9029802e", "control-id": "cis_rhel10_1-1.2.1.1", "description": "No notes for control-id 1.1.2.1.1.", "props": [ @@ -26602,7 +26683,7 @@ ] }, { - "uuid": "33eb4017-9098-487c-8f19-738080a10aff", + "uuid": "7489fa4e-775b-4458-b0b1-04b9dd1f8fbf", "control-id": "cis_rhel10_1-1.2.1.2", "description": "No notes for control-id 1.1.2.1.2.", "props": [ @@ -26619,7 +26700,7 @@ ] }, { - "uuid": "b3c27b2d-1af5-4728-8c74-dde28ebe9e1c", + "uuid": "449b1560-e9d4-46c0-9116-565a5c2df0aa", "control-id": "cis_rhel10_1-1.2.1.3", "description": "No notes for control-id 1.1.2.1.3.", "props": [ @@ -26636,7 +26717,7 @@ ] }, { - "uuid": "2314332b-c660-4158-9675-9ed812d62e84", + "uuid": "9cc2b2a6-ee7b-40a4-9a7d-f69b71358cda", "control-id": "cis_rhel10_1-1.2.1.4", "description": "No notes for control-id 1.1.2.1.4.", "props": [ @@ -26653,7 +26734,7 @@ ] }, { - "uuid": "d95240c1-afb0-427f-9285-e75e5a0ba6f6", + "uuid": "c2c10a67-b642-4922-89ee-4c96a0134bdd", "control-id": "cis_rhel10_1-1.2.2.1", "description": "No notes for control-id 1.1.2.2.1.", "props": [ @@ -26670,7 +26751,7 @@ ] }, { - "uuid": "27a5e2b4-c429-4efa-b4fc-cc849726a1db", + "uuid": "3038208d-b066-4bed-afd6-43f8f049676a", "control-id": "cis_rhel10_1-1.2.2.2", "description": "No notes for control-id 1.1.2.2.2.", "props": [ @@ -26687,7 +26768,7 @@ ] }, { - "uuid": "95e82297-77f1-488b-8096-5529d8f95761", + "uuid": "b3e7d39a-6fa0-49a2-89d2-e5a80f29e640", "control-id": "cis_rhel10_1-1.2.2.3", "description": "No notes for control-id 1.1.2.2.3.", "props": [ @@ -26704,7 +26785,7 @@ ] }, { - "uuid": "65e34b7f-b7c0-4a12-8c7c-8171da06fbf2", + "uuid": "e4c1703d-7ed9-42ab-a94e-13040e758be9", "control-id": "cis_rhel10_1-1.2.2.4", "description": "No notes for control-id 1.1.2.2.4.", "props": [ @@ -26721,7 +26802,7 @@ ] }, { - "uuid": "0859be9f-3e69-46c0-86c1-3049a6d1cfb0", + "uuid": "9bb5aeb3-8254-4c8c-bab2-3c397e86e6b1", "control-id": "cis_rhel10_1-1.2.3.2", "description": "No notes for control-id 1.1.2.3.2.", "props": [ @@ -26738,7 +26819,7 @@ ] }, { - "uuid": "ccb2ded8-c36a-451d-97a0-a06c1cb1180c", + "uuid": "48bd21f7-c54c-462c-89d3-23a1952f2976", "control-id": "cis_rhel10_1-1.2.3.3", "description": "No notes for control-id 1.1.2.3.3.", "props": [ @@ -26755,7 +26836,7 @@ ] }, { - "uuid": "7c27911c-df3c-458b-bb74-d8db6460599f", + "uuid": "b0ca96d3-647b-46dd-8d7e-be46af58096d", "control-id": "cis_rhel10_1-1.2.4.2", "description": "No notes for control-id 1.1.2.4.2.", "props": [ @@ -26772,7 +26853,7 @@ ] }, { - "uuid": "6ddec5f9-431b-4e23-991b-4938e3a18187", + "uuid": "f393d415-2286-4c93-a786-da643be6629a", "control-id": "cis_rhel10_1-1.2.4.3", "description": "No notes for control-id 1.1.2.4.3.", "props": [ @@ -26789,7 +26870,7 @@ ] }, { - "uuid": "f0735151-9d23-496d-b6f2-22b1b633112f", + "uuid": "35132d65-2cb0-4fff-befc-de951b2daec2", "control-id": "cis_rhel10_1-1.2.5.2", "description": "No notes for control-id 1.1.2.5.2.", "props": [ @@ -26806,7 +26887,7 @@ ] }, { - "uuid": "53733f7b-8c8b-42fe-bef9-3ad6b852d508", + "uuid": "a67e677e-c509-43fb-ab77-38586ce02f93", "control-id": "cis_rhel10_1-1.2.5.3", "description": "No notes for control-id 1.1.2.5.3.", "props": [ @@ -26823,7 +26904,7 @@ ] }, { - "uuid": "d9c460e7-e13a-48ac-a520-7c9603804687", + "uuid": "db57fa10-59eb-4233-96b1-702ce0cd5332", "control-id": "cis_rhel10_1-1.2.5.4", "description": "No notes for control-id 1.1.2.5.4.", "props": [ @@ -26840,7 +26921,7 @@ ] }, { - "uuid": "14191d73-0b83-4b0a-a0a9-df6bd252122f", + "uuid": "ab020cf7-8f05-4f78-8091-c5b35862a669", "control-id": "cis_rhel10_1-1.2.6.2", "description": "No notes for control-id 1.1.2.6.2.", "props": [ @@ -26857,7 +26938,7 @@ ] }, { - "uuid": "61ba32bf-4907-4e43-9d5b-ec5999714fb3", + "uuid": "dee38499-20c9-42a8-8c15-621f4ef1d284", "control-id": "cis_rhel10_1-1.2.6.3", "description": "No notes for control-id 1.1.2.6.3.", "props": [ @@ -26874,7 +26955,7 @@ ] }, { - "uuid": "fe264ece-e572-45d5-8c0a-1b9d30f44b05", + "uuid": "a5e03954-c7ef-45c5-bff9-d248d07e30dc", "control-id": "cis_rhel10_1-1.2.6.4", "description": "No notes for control-id 1.1.2.6.4.", "props": [ @@ -26891,7 +26972,7 @@ ] }, { - "uuid": "eaacb15c-8f29-499a-9d74-703306e3aa72", + "uuid": "5966ea59-6b89-4b21-9e90-9816f0c5b2b3", "control-id": "cis_rhel10_1-1.2.7.2", "description": "No notes for control-id 1.1.2.7.2.", "props": [ @@ -26908,7 +26989,7 @@ ] }, { - "uuid": "dddce8b2-77a8-456b-9d90-9806b6dd7710", + "uuid": "19cb1562-cba1-42c0-91e4-402ef05ac09a", "control-id": "cis_rhel10_1-1.2.7.3", "description": "No notes for control-id 1.1.2.7.3.", "props": [ @@ -26925,7 +27006,7 @@ ] }, { - "uuid": "eac5283c-1af9-43b0-9141-0a5f92986bc0", + "uuid": "8f99affd-3ae1-4b27-8f62-55dd01288546", "control-id": "cis_rhel10_1-1.2.7.4", "description": "No notes for control-id 1.1.2.7.4.", "props": [ @@ -26942,7 +27023,7 @@ ] }, { - "uuid": "2530512d-96ac-40c8-aa12-ecb3e37817ac", + "uuid": "5c91408a-657f-4fac-a40e-c38a9e0ee777", "control-id": "cis_rhel10_1-2.1.1", "description": "The description for control-id cis_rhel10_1-2.1.1.", "props": [ @@ -26955,7 +27036,7 @@ ] }, { - "uuid": "fecdd619-4624-4206-b0e4-7827ca118176", + "uuid": "23180616-0737-472b-ab4d-26ccc8155aad", "control-id": "cis_rhel10_1-2.1.2", "description": "No notes for control-id 1.2.1.2.", "props": [ @@ -26972,7 +27053,7 @@ ] }, { - "uuid": "4739b9d5-33f5-41d4-aa18-344fb7ba5a9e", + "uuid": "52b445b3-b424-41bf-8e54-072bbcf04dc7", "control-id": "cis_rhel10_1-2.1.4", "description": "The description for control-id cis_rhel10_1-2.1.4.", "props": [ @@ -26985,7 +27066,7 @@ ] }, { - "uuid": "5b4f322a-9b0f-40df-b75e-5d64a7d69587", + "uuid": "8968a844-97f7-40bc-8f13-adc40f0929a9", "control-id": "cis_rhel10_1-2.2.1", "description": "The description for control-id cis_rhel10_1-2.2.1.", "props": [ @@ -26998,7 +27079,7 @@ ] }, { - "uuid": "041b343d-f9d5-4ca8-bfd8-6608cd705768", + "uuid": "f1b80087-1568-4d6e-8371-e9bfcd695910", "control-id": "cis_rhel10_1-3.1.1", "description": "No notes for control-id 1.3.1.1.", "props": [ @@ -27015,7 +27096,7 @@ ] }, { - "uuid": "6707bbf6-5cd4-4da9-b9f9-7879d573a396", + "uuid": "c2e40b5c-800b-4734-aeb1-3a04be038109", "control-id": "cis_rhel10_1-3.1.2", "description": "No notes for control-id 1.3.1.2.", "props": [ @@ -27032,7 +27113,7 @@ ] }, { - "uuid": "fee59fca-37bb-4fb0-a36a-02e1fb314bca", + "uuid": "db69c5bc-6791-4e9c-a7fc-878b186f3071", "control-id": "cis_rhel10_1-3.1.3", "description": "No notes for control-id 1.3.1.3.", "props": [ @@ -27049,7 +27130,7 @@ ] }, { - "uuid": "b38dd510-df26-4c23-afd9-d1798d53fe5b", + "uuid": "df01f9f9-66a5-462b-a066-3d0c947be7c8", "control-id": "cis_rhel10_1-3.1.4", "description": "No notes for control-id 1.3.1.4.", "props": [ @@ -27066,7 +27147,7 @@ ] }, { - "uuid": "aa401452-45d7-4420-8c71-9516ab643f54", + "uuid": "a2f224db-8105-4fb7-a94a-c2b14439e509", "control-id": "cis_rhel10_1-3.1.7", "description": "No notes for control-id 1.3.1.7.", "props": [ @@ -27083,7 +27164,7 @@ ] }, { - "uuid": "b35aed28-187d-4dc0-954a-269c2ee81f4e", + "uuid": "8df4588d-7870-4f7a-b55d-a015959078bf", "control-id": "cis_rhel10_1-4.1", "description": "There is no automated remediation for this rule and this is intentional.\nMore details in the rule description.", "props": [ @@ -27100,7 +27181,7 @@ ] }, { - "uuid": "76b7aef7-45ac-4363-b20d-d0e371aa74d6", + "uuid": "f18b947d-31c5-4ed5-b188-37c07ede6f28", "control-id": "cis_rhel10_1-4.2", "description": "The description for control-id cis_rhel10_1-4.2.", "props": [ @@ -27143,7 +27224,7 @@ ] }, { - "uuid": "e67c1f18-591e-42d6-9f14-ed9ed4093acc", + "uuid": "c02e23c1-a07c-4dbf-8686-b0093a059900", "control-id": "cis_rhel10_1-5.1", "description": "No notes for control-id 1.5.1.", "props": [ @@ -27160,7 +27241,7 @@ ] }, { - "uuid": "28574cf3-acea-41da-82ff-01287de0b7a6", + "uuid": "3ae3ef0b-75f2-4f7b-b3ae-d5ed614887a7", "control-id": "cis_rhel10_1-5.2", "description": "No notes for control-id 1.5.2.", "props": [ @@ -27177,7 +27258,7 @@ ] }, { - "uuid": "2d235b5b-088f-4805-915e-216577574e72", + "uuid": "e77c180d-be05-4587-8054-fa527b7bbd7b", "control-id": "cis_rhel10_1-5.4", "description": "No notes for control-id 1.5.4.", "props": [ @@ -27194,7 +27275,7 @@ ] }, { - "uuid": "4031efae-6830-4839-93d2-a82c001d86c1", + "uuid": "876c85f5-fa11-43e4-a885-db9dd6a58901", "control-id": "cis_rhel10_1-5.5", "description": "No notes for control-id 1.5.5.", "props": [ @@ -27211,7 +27292,7 @@ ] }, { - "uuid": "f3d4a313-b46b-4ff5-bb74-30c3bade35ff", + "uuid": "ee8b56ed-3d1c-466c-bf93-fa17a76f82ea", "control-id": "cis_rhel10_1-5.6", "description": "No notes for control-id 1.5.6.", "props": [ @@ -27228,7 +27309,7 @@ ] }, { - "uuid": "75fe7d88-73fe-4b45-81a4-e668c8144d31", + "uuid": "cdff5438-b07d-4fdd-b779-56b64b93a61a", "control-id": "cis_rhel10_1-5.7", "description": "No notes for control-id 1.5.7.", "props": [ @@ -27245,7 +27326,7 @@ ] }, { - "uuid": "98bd9467-44da-435e-9d14-693ea5ad578d", + "uuid": "0df89489-41d5-4ae3-b8fa-24ef96aa7384", "control-id": "cis_rhel10_1-5.8", "description": "Address Space Layout Randomization (ASLR)", "props": [ @@ -27262,7 +27343,7 @@ ] }, { - "uuid": "e7e5f8fe-d79f-4864-b1c2-d987a5db6fc9", + "uuid": "1e77770f-6399-4b17-be22-737fe6cb1e84", "control-id": "cis_rhel10_1-5.9", "description": "No notes for control-id 1.5.9.", "props": [ @@ -27279,7 +27360,7 @@ ] }, { - "uuid": "6fdc181f-5aff-4ce9-b376-78e9288357d3", + "uuid": "eccacc6d-b775-428b-8468-49b0777c3b0a", "control-id": "cis_rhel10_1-5.10", "description": "No notes for control-id 1.5.10.", "props": [ @@ -27296,7 +27377,7 @@ ] }, { - "uuid": "38037a9e-cc13-4794-97a3-3620be4e6d63", + "uuid": "a1fdc236-aef8-421a-b44e-1dfca1d29d29", "control-id": "cis_rhel10_1-6.1", "description": "No notes for control-id 1.6.1.", "props": [ @@ -27313,7 +27394,7 @@ ] }, { - "uuid": "edb31e03-fc8b-4a51-8f57-d8cce6016fe4", + "uuid": "b65d8bf6-3ab2-4d06-9bb8-57fdc02c8d46", "control-id": "cis_rhel10_1-6.2", "description": "No notes for control-id 1.6.2.", "props": [ @@ -27330,7 +27411,7 @@ ] }, { - "uuid": "c4027fb2-1a58-4f3a-8df3-c122e61ed421", + "uuid": "6e78a439-4524-41a0-8ad1-30658c351f78", "control-id": "cis_rhel10_1-6.3", "description": "No notes for control-id 1.6.3.", "props": [ @@ -27347,7 +27428,7 @@ ] }, { - "uuid": "120dc2a5-8773-4bf3-aeeb-d61e597c2b7c", + "uuid": "f7aad69c-f82c-4cf0-98e3-c8e98d2c21fd", "control-id": "cis_rhel10_1-6.4", "description": "No notes for control-id 1.6.4.", "props": [ @@ -27364,7 +27445,7 @@ ] }, { - "uuid": "04685d7a-0880-4ec5-a832-aff96f8571a7", + "uuid": "f433c8af-96a9-4d37-8a68-6d462627feb3", "control-id": "cis_rhel10_1-7.1", "description": "No notes for control-id 1.7.1.", "props": [ @@ -27381,7 +27462,7 @@ ] }, { - "uuid": "6e65316e-7271-4c61-b20b-920cf7f339a0", + "uuid": "cd3cb7e2-4e6d-4d3d-9acf-8e86c81b117d", "control-id": "cis_rhel10_1-7.2", "description": "No notes for control-id 1.7.2.", "props": [ @@ -27398,7 +27479,7 @@ ] }, { - "uuid": "4ea7162e-098e-43ed-9fba-0347efb2cb0d", + "uuid": "c17cdf1c-9cd0-49b5-9195-33b969b8a938", "control-id": "cis_rhel10_1-7.3", "description": "No notes for control-id 1.7.3.", "props": [ @@ -27415,7 +27496,7 @@ ] }, { - "uuid": "35a907f1-6b54-48ae-a68e-e10bbad91c07", + "uuid": "e56ca2ac-aed6-417e-aedb-85aa5afed96b", "control-id": "cis_rhel10_1-7.4", "description": "No notes for control-id 1.7.4.", "props": [ @@ -27442,7 +27523,7 @@ ] }, { - "uuid": "183aef49-9035-4bad-abdb-e0da96269b97", + "uuid": "70eda709-af65-4497-a914-6ce9a0fa01e5", "control-id": "cis_rhel10_1-7.5", "description": "No notes for control-id 1.7.5.", "props": [ @@ -27469,7 +27550,7 @@ ] }, { - "uuid": "a9e1a888-f68e-45e5-8e3f-80812556d3b7", + "uuid": "63de36e0-7dc9-4ffb-aad6-b46a1de665b6", "control-id": "cis_rhel10_1-7.6", "description": "No notes for control-id 1.7.6.", "props": [ @@ -27496,7 +27577,7 @@ ] }, { - "uuid": "be694cfd-f13f-484c-80dc-0b17996cbc63", + "uuid": "13054499-8a32-4f97-b557-cea3512d6346", "control-id": "cis_rhel10_1-8.1", "description": "No notes for control-id 1.8.1.", "props": [ @@ -27518,7 +27599,7 @@ ] }, { - "uuid": "e691ea18-3e4b-4b9b-847d-a362708f5c73", + "uuid": "3000c66c-e3ec-46c5-9682-c5a6da5b02ab", "control-id": "cis_rhel10_1-8.2", "description": "No notes for control-id 1.8.2.", "props": [ @@ -27535,7 +27616,7 @@ ] }, { - "uuid": "fe457554-dc56-44ae-86ee-c6f84c9b0731", + "uuid": "c78bbe4f-9c4c-4679-bb67-00075f476fd1", "control-id": "cis_rhel10_1-8.3", "description": "No notes for control-id 1.8.3.", "props": [ @@ -27567,7 +27648,7 @@ ] }, { - "uuid": "3aa51e03-e4b4-4dfd-be7e-4f5021e80a29", + "uuid": "4023271d-5365-4834-95c3-ffe87fae236f", "control-id": "cis_rhel10_1-8.5", "description": "No notes for control-id 1.8.5.", "props": [ @@ -27584,7 +27665,7 @@ ] }, { - "uuid": "a8cc070c-0147-4fc9-aa74-b20f7f989f7b", + "uuid": "2b7fb50f-3dd2-42b7-90c4-b2c9a28cf94e", "control-id": "cis_rhel10_2-1.4", "description": "No notes for control-id 2.1.4.", "props": [ @@ -27601,7 +27682,7 @@ ] }, { - "uuid": "b84b544d-993f-4aa2-83bd-d49d44de76ca", + "uuid": "6fbef111-85fd-4e80-a75e-5e82e90de8c1", "control-id": "cis_rhel10_2-1.5", "description": "No notes for control-id 2.1.5.", "props": [ @@ -27618,7 +27699,7 @@ ] }, { - "uuid": "61979c9a-5ba2-4c95-9479-f2d7b5ae4fe1", + "uuid": "50ce5c10-8f7e-4655-b0fe-3de9af6ecde7", "control-id": "cis_rhel10_2-1.6", "description": "No notes for control-id 2.1.6.", "props": [ @@ -27635,7 +27716,7 @@ ] }, { - "uuid": "2ec4cd2e-4c3a-4bec-b45d-651257b8612c", + "uuid": "56a633c7-f3a9-4763-9ada-b181734fe58c", "control-id": "cis_rhel10_2-1.7", "description": "No notes for control-id 2.1.7.", "props": [ @@ -27652,7 +27733,7 @@ ] }, { - "uuid": "cabb6418-338f-4587-9bb2-d09410ae70e5", + "uuid": "d4a45e18-9dee-4d9f-bfa2-1779d3f2dad1", "control-id": "cis_rhel10_2-1.8", "description": "No notes for control-id 2.1.8.", "props": [ @@ -27674,7 +27755,7 @@ ] }, { - "uuid": "fc8bb6d6-160b-453c-ab51-f4b6db8893eb", + "uuid": "ef5c2172-8772-48b4-8bb9-c8a66670a15f", "control-id": "cis_rhel10_2-1.9", "description": "Many of the libvirt packages used by Enterprise Linux virtualization are dependent on the\nnfs-utils package.", "props": [ @@ -27691,7 +27772,7 @@ ] }, { - "uuid": "878b5cd8-d362-4f78-8836-b69a57b9b88d", + "uuid": "a064096a-7727-4a1a-b78f-49b16b825e1c", "control-id": "cis_rhel10_2-1.11", "description": "Many of the libvirt packages used by Enterprise Linux virtualization, and the nfs-utils\npackage used for The Network File System (NFS), are dependent on the rpcbind package.", "props": [ @@ -27708,7 +27789,7 @@ ] }, { - "uuid": "e305dd60-f514-45e6-98eb-dc02140e2cf9", + "uuid": "91fe766f-7568-4769-859e-a23a8e69210c", "control-id": "cis_rhel10_2-1.12", "description": "No notes for control-id 2.1.12.", "props": [ @@ -27725,7 +27806,7 @@ ] }, { - "uuid": "9cc9b44d-08e7-4407-865d-0037e0923e4f", + "uuid": "1f85a3b6-9753-4579-ae70-d2f47810993e", "control-id": "cis_rhel10_2-1.13", "description": "No notes for control-id 2.1.13.", "props": [ @@ -27742,7 +27823,7 @@ ] }, { - "uuid": "75295430-1e77-4252-b9d0-02ca70922ab9", + "uuid": "1aa6181f-d7d6-4876-b839-e90528d2e7ed", "control-id": "cis_rhel10_2-1.14", "description": "No notes for control-id 2.1.14.", "props": [ @@ -27759,7 +27840,7 @@ ] }, { - "uuid": "32a24d2f-6d45-4e23-933a-e88d8dee1f23", + "uuid": "afbc3849-df6e-4be9-b2d8-0b2858a84d17", "control-id": "cis_rhel10_2-1.15", "description": "No notes for control-id 2.1.15.", "props": [ @@ -27776,7 +27857,7 @@ ] }, { - "uuid": "99b1c308-3d7f-477e-8630-1859a3e7f31d", + "uuid": "e28a238f-0f10-4381-a427-2db5a59796a3", "control-id": "cis_rhel10_2-1.16", "description": "No notes for control-id 2.1.16.", "props": [ @@ -27793,7 +27874,7 @@ ] }, { - "uuid": "14079db6-83ee-4c65-ae6e-1adbee9e9f10", + "uuid": "d9d67cea-2af3-4381-8808-3de1306ec96d", "control-id": "cis_rhel10_2-1.17", "description": "No notes for control-id 2.1.17.", "props": [ @@ -27810,7 +27891,7 @@ ] }, { - "uuid": "9ee2305d-9598-49af-8bbe-609960ed9857", + "uuid": "0e3e2815-02c3-43cb-8115-1999ec69c172", "control-id": "cis_rhel10_2-1.18", "description": "No notes for control-id 2.1.18.", "props": [ @@ -27832,7 +27913,7 @@ ] }, { - "uuid": "571fbdeb-7f7e-410c-ae23-65f312b1b330", + "uuid": "b835b4f1-8969-420c-a3e2-188189c7c706", "control-id": "cis_rhel10_2-1.21", "description": "No notes for control-id 2.1.21.", "props": [ @@ -27854,7 +27935,7 @@ ] }, { - "uuid": "51ccad4a-dac9-4c49-8785-c149761e21df", + "uuid": "be3d7651-5010-4975-a791-c6db7f3ea5bc", "control-id": "cis_rhel10_2-1.22", "description": "The description for control-id cis_rhel10_2-1.22.", "props": [ @@ -27867,7 +27948,7 @@ ] }, { - "uuid": "7adba0e9-2249-4fe3-9c77-58774236d88f", + "uuid": "febbcb51-033b-4cde-8300-f4e8453bd037", "control-id": "cis_rhel10_2-2.1", "description": "No notes for control-id 2.2.1.", "props": [ @@ -27884,7 +27965,7 @@ ] }, { - "uuid": "a9372aa7-1c17-4ff8-b3dd-f3dc6709ed0f", + "uuid": "39601738-f7b8-4a16-a3c9-f1b79b8f6941", "control-id": "cis_rhel10_2-2.3", "description": "No notes for control-id 2.2.3.", "props": [ @@ -27901,7 +27982,7 @@ ] }, { - "uuid": "cb3652df-36f4-4549-9fc7-88c1aaa4b369", + "uuid": "91e960ac-44c0-4e73-b39b-c9481af34c8b", "control-id": "cis_rhel10_2-2.4", "description": "No notes for control-id 2.2.4.", "props": [ @@ -27918,7 +27999,7 @@ ] }, { - "uuid": "b990c279-2a3e-4efe-b8e9-465fd4beceb4", + "uuid": "773862e6-0e1e-4c6c-ba22-7842bd072844", "control-id": "cis_rhel10_2-3.1", "description": "No notes for control-id 2.3.1.", "props": [ @@ -27930,7 +28011,7 @@ ] }, { - "uuid": "cf00e20c-b57c-46bb-906e-0efb914ef3b9", + "uuid": "8f39cf80-da6e-4448-ac80-9d6fdb21613b", "control-id": "cis_rhel10_2-3.2", "description": "No notes for control-id 2.3.2.", "props": [ @@ -27947,7 +28028,7 @@ ] }, { - "uuid": "61050cfc-1f1b-4fda-87b7-12037767669e", + "uuid": "d671e71a-301b-4a66-8ff5-cdfad003877f", "control-id": "cis_rhel10_2-3.3", "description": "No notes for control-id 2.3.3.", "props": [ @@ -27964,7 +28045,7 @@ ] }, { - "uuid": "6f41bb5c-13c7-42d8-858a-61d365778882", + "uuid": "c6d522b7-4eba-4c04-bc04-af482b260a93", "control-id": "cis_rhel10_2-4.1.1", "description": "No notes for control-id 2.4.1.1.", "props": [ @@ -27986,7 +28067,7 @@ ] }, { - "uuid": "abb74cc7-4971-4a63-8e13-0a390b67f9b6", + "uuid": "5903942b-3116-4fca-bfe8-83de52e5a10d", "control-id": "cis_rhel10_2-4.1.2", "description": "No notes for control-id 2.4.1.2.", "props": [ @@ -28013,7 +28094,7 @@ ] }, { - "uuid": "b0a97770-2959-4c80-bd14-fe98446bfc97", + "uuid": "788ec50d-3eb8-43b8-a180-243898b12ba8", "control-id": "cis_rhel10_2-4.1.3", "description": "No notes for control-id 2.4.1.3.", "props": [ @@ -28040,7 +28121,7 @@ ] }, { - "uuid": "f116e9a1-b4d9-42fe-96ef-f09e4b0e83a3", + "uuid": "861b3c20-0cf0-40c7-92c1-46530002fe76", "control-id": "cis_rhel10_2-4.1.4", "description": "No notes for control-id 2.4.1.4.", "props": [ @@ -28067,7 +28148,7 @@ ] }, { - "uuid": "8945aa69-3b87-4406-aedd-54befc3f270c", + "uuid": "62ee4166-256a-4b92-abda-5c82fd9ae706", "control-id": "cis_rhel10_2-4.1.5", "description": "No notes for control-id 2.4.1.5.", "props": [ @@ -28094,7 +28175,7 @@ ] }, { - "uuid": "b1b7a9f1-0db4-42cf-b9a1-9d7667dd092e", + "uuid": "5f69852d-9592-4ea5-a162-af056a5d8da7", "control-id": "cis_rhel10_2-4.1.6", "description": "No notes for control-id 2.4.1.6.", "props": [ @@ -28121,7 +28202,7 @@ ] }, { - "uuid": "de3eed10-e00c-416d-87e4-54bd1d86d1ad", + "uuid": "a96f7be7-4866-4fa4-96ef-29e9757b5300", "control-id": "cis_rhel10_2-4.1.7", "description": "No notes for control-id 2.4.1.7.", "props": [ @@ -28148,7 +28229,7 @@ ] }, { - "uuid": "5e6bd0fa-d91b-4301-8427-52c5dd2a2844", + "uuid": "f30a244b-4269-4bad-9e73-5104b5ca784e", "control-id": "cis_rhel10_2-4.1.8", "description": "No notes for control-id 2.4.1.8.", "props": [ @@ -28175,7 +28256,7 @@ ] }, { - "uuid": "906df6f5-9efe-4f6b-a4a7-1781a9344745", + "uuid": "f18398f2-39a4-45d1-b01e-77b3d4c8d704", "control-id": "cis_rhel10_2-4.1.9", "description": "No notes for control-id 2.4.1.9.", "props": [ @@ -28212,7 +28293,7 @@ ] }, { - "uuid": "8ba2e72d-ffed-423b-b5c8-41767ca1277f", + "uuid": "a6694be6-1bae-4304-a1d6-04c97b69584d", "control-id": "cis_rhel10_2-4.2.1", "description": "No notes for control-id 2.4.2.1.", "props": [ @@ -28249,7 +28330,7 @@ ] }, { - "uuid": "15f5b1cb-8eef-4c6a-9669-672ad355d220", + "uuid": "00611ea7-1471-4ea9-a86c-49fda125b286", "control-id": "cis_rhel10_3-1.1", "description": "The description for control-id cis_rhel10_3-1.1.", "props": [ @@ -28262,7 +28343,7 @@ ] }, { - "uuid": "0e3b4012-d681-4915-89bd-80008ce5f61e", + "uuid": "78c8a2bd-8898-4dbd-8558-d53f07b7b8b3", "control-id": "cis_rhel10_3-2.1", "description": "No notes for control-id 3.2.1.", "props": [ @@ -28279,7 +28360,7 @@ ] }, { - "uuid": "a780996e-ab31-4ecd-8d56-2f2eda3bc5ca", + "uuid": "e3f54e55-41e1-4036-bee1-9552e05c04aa", "control-id": "cis_rhel10_3-2.2", "description": "No notes for control-id 3.2.2.", "props": [ @@ -28296,7 +28377,7 @@ ] }, { - "uuid": "243a0f63-40e2-4acc-b469-18a58718f1ad", + "uuid": "b0b464ae-5a1a-4bb6-9a0d-98e4fc2cd1ee", "control-id": "cis_rhel10_3-2.3", "description": "No notes for control-id 3.2.3.", "props": [ @@ -28313,7 +28394,7 @@ ] }, { - "uuid": "c2207004-8417-4a49-a0d2-ac1cb65b2a86", + "uuid": "6eb3db07-baee-46bd-a948-086fbeae29cb", "control-id": "cis_rhel10_3-2.4", "description": "No notes for control-id 3.2.4.", "props": [ @@ -28330,7 +28411,7 @@ ] }, { - "uuid": "46feded6-89b5-4609-b5e0-533680123530", + "uuid": "e1d04823-bbcf-4e0d-a299-346bdb29432c", "control-id": "cis_rhel10_3-2.5", "description": "No notes for control-id 3.2.5.", "props": [ @@ -28347,7 +28428,7 @@ ] }, { - "uuid": "b2363188-7095-4682-b630-7a3c69029798", + "uuid": "7ca71025-b50e-47ff-8d20-520954c25f8a", "control-id": "cis_rhel10_3-2.6", "description": "No notes for control-id 3.2.6.", "props": [ @@ -28364,7 +28445,7 @@ ] }, { - "uuid": "3221e6b0-0550-4aba-9eb3-47a8d2b8bec7", + "uuid": "32b7ae60-71e5-4cd9-b1e1-17eafd8f53a7", "control-id": "cis_rhel10_3-3.1.1", "description": "No notes for control-id 3.3.1.1.", "props": [ @@ -28381,7 +28462,7 @@ ] }, { - "uuid": "30c425a3-a5cf-4187-bcbc-610787aa481f", + "uuid": "e2524015-3c51-47c6-81f1-868af3ed91fe", "control-id": "cis_rhel10_3-3.1.2", "description": "No notes for control-id 3.3.1.2.", "props": [ @@ -28398,7 +28479,7 @@ ] }, { - "uuid": "60075386-d41a-4a1e-bbf1-5c711906a3e8", + "uuid": "bd06864b-66ff-460d-b534-d74c52a23f22", "control-id": "cis_rhel10_3-3.1.3", "description": "No notes for control-id 3.3.1.3.", "props": [ @@ -28415,7 +28496,7 @@ ] }, { - "uuid": "524888d9-8933-42f2-a43e-ea87c8b55954", + "uuid": "cdf72708-67a1-4a54-8b45-cb2f4fb54e8c", "control-id": "cis_rhel10_3-3.1.4", "description": "No notes for control-id 3.3.1.4.", "props": [ @@ -28432,7 +28513,7 @@ ] }, { - "uuid": "cedf817f-1045-40f6-a992-b2ac9671715f", + "uuid": "5567f60c-fbde-4c9d-b041-25e650448b01", "control-id": "cis_rhel10_3-3.1.5", "description": "No notes for control-id 3.3.1.5.", "props": [ @@ -28449,7 +28530,7 @@ ] }, { - "uuid": "fdc5b2d8-9556-4781-b616-aba560a7c9a8", + "uuid": "ee09bbf7-9f19-4bca-b7fe-97e33444a5f2", "control-id": "cis_rhel10_3-3.1.6", "description": "No notes for control-id 3.3.1.6.", "props": [ @@ -28466,7 +28547,7 @@ ] }, { - "uuid": "a00e7d7d-741e-443d-81fb-4372e7938f82", + "uuid": "34b186d6-6055-47f2-9bb1-62239286974e", "control-id": "cis_rhel10_3-3.1.7", "description": "No notes for control-id 3.3.1.7.", "props": [ @@ -28483,7 +28564,7 @@ ] }, { - "uuid": "ed842360-4e0b-4813-bdc2-111d6a3b6389", + "uuid": "2b696d4e-dc62-4383-8d54-84dece2151f9", "control-id": "cis_rhel10_3-3.1.8", "description": "No notes for control-id 3.3.1.8.", "props": [ @@ -28500,7 +28581,7 @@ ] }, { - "uuid": "8b6eb7fd-34f3-48c3-b840-c32f4550fd78", + "uuid": "f7918535-b9fb-45cd-b37c-0ff0a270c6d0", "control-id": "cis_rhel10_3-3.1.9", "description": "No notes for control-id 3.3.1.9.", "props": [ @@ -28517,7 +28598,7 @@ ] }, { - "uuid": "60b6e982-42be-4bcb-92a1-45d89ac5ba8d", + "uuid": "8a6a38e0-0978-40b7-a334-9de7557a6f22", "control-id": "cis_rhel10_3-3.1.10", "description": "No notes for control-id 3.3.1.10.", "props": [ @@ -28534,7 +28615,7 @@ ] }, { - "uuid": "3c62d4ea-f8f5-4942-9d82-db5d09b6b9c4", + "uuid": "cf89e686-6b0f-45f1-ac05-7378bca76dbb", "control-id": "cis_rhel10_3-3.1.11", "description": "No notes for control-id 3.3.1.11.", "props": [ @@ -28551,7 +28632,7 @@ ] }, { - "uuid": "c9243102-f965-4860-b2ec-af6aa33d8637", + "uuid": "4d6aadcf-5737-4431-8dea-f559fc9887b1", "control-id": "cis_rhel10_3-3.1.12", "description": "No notes for control-id 3.3.1.12.", "props": [ @@ -28568,7 +28649,7 @@ ] }, { - "uuid": "d320dc26-cc6a-4cda-9278-971cf080da76", + "uuid": "294e8d2d-43fc-4924-a815-0cfadf1162c6", "control-id": "cis_rhel10_3-3.1.13", "description": "No notes for control-id 3.3.1.13.", "props": [ @@ -28585,7 +28666,7 @@ ] }, { - "uuid": "dd67eea0-ece8-423b-87cb-43427c74e6a6", + "uuid": "a2bf5427-944c-4e55-806f-d7cd3f25a784", "control-id": "cis_rhel10_3-3.1.14", "description": "No notes for control-id 3.3.1.14.", "props": [ @@ -28602,7 +28683,7 @@ ] }, { - "uuid": "73ce2ce7-600d-4af8-a5c8-45a951ae9a72", + "uuid": "66c924d8-c70c-4665-ba9b-2df7fa53862e", "control-id": "cis_rhel10_3-3.1.15", "description": "No notes for control-id 3.3.1.15.", "props": [ @@ -28619,7 +28700,7 @@ ] }, { - "uuid": "93310c25-917d-4c3e-9099-095e16223c8e", + "uuid": "02c33ba6-2cbb-4513-94ef-9fcd8a8ce14e", "control-id": "cis_rhel10_3-3.1.16", "description": "No notes for control-id 3.3.1.16.", "props": [ @@ -28636,7 +28717,7 @@ ] }, { - "uuid": "5c4068d8-7b81-49d0-8cce-f1c9390dfe42", + "uuid": "801a11aa-2f84-45af-aba3-43e051bccccd", "control-id": "cis_rhel10_3-3.1.17", "description": "No notes for control-id 3.3.1.17.", "props": [ @@ -28653,7 +28734,7 @@ ] }, { - "uuid": "a15b8dfa-cb17-436f-b7ab-f55c7a3f8cf3", + "uuid": "7bffb410-98b0-44bb-969d-62b3d89682f5", "control-id": "cis_rhel10_3-3.1.18", "description": "No notes for control-id 3.3.1.18.", "props": [ @@ -28670,7 +28751,7 @@ ] }, { - "uuid": "75911a60-648a-4726-900d-a9063c7e991a", + "uuid": "d92a3fc1-afb2-4668-9a69-0f0b449c5c9a", "control-id": "cis_rhel10_3-3.2.1", "description": "No notes for control-id 3.3.2.1.", "props": [ @@ -28687,7 +28768,7 @@ ] }, { - "uuid": "7f07ecb5-26e8-4001-87fd-805d3e2102b8", + "uuid": "2998399a-44d0-42de-a25c-2fba1015749e", "control-id": "cis_rhel10_3-3.2.2", "description": "No notes for control-id 3.3.2.2.", "props": [ @@ -28704,7 +28785,7 @@ ] }, { - "uuid": "ba77c7a6-b7ac-47b0-b2f9-74cea8dd12a1", + "uuid": "17829e7b-d193-4c8c-ac92-7b0b3ffce696", "control-id": "cis_rhel10_3-3.2.3", "description": "No notes for control-id 3.3.2.3.", "props": [ @@ -28721,7 +28802,7 @@ ] }, { - "uuid": "4a892963-47de-4ba8-8434-2a2bbd67c297", + "uuid": "c5c6997b-818b-4a6d-aa6d-bad2772528cf", "control-id": "cis_rhel10_3-3.2.4", "description": "No notes for control-id 3.3.2.4.", "props": [ @@ -28738,7 +28819,7 @@ ] }, { - "uuid": "c6e06eba-5d58-4de9-ba06-d6a07ddfb1f3", + "uuid": "4362d2b3-c37a-4927-949d-ad9148af8e4f", "control-id": "cis_rhel10_3-3.2.5", "description": "No notes for control-id 3.3.2.5.", "props": [ @@ -28755,7 +28836,7 @@ ] }, { - "uuid": "1a089f50-bcfc-4b2d-a5c9-088c3a2fb75d", + "uuid": "9c3a7a38-0be8-45e7-8cce-284405fff6d9", "control-id": "cis_rhel10_3-3.2.6", "description": "No notes for control-id 3.3.2.6.", "props": [ @@ -28772,7 +28853,7 @@ ] }, { - "uuid": "d9630e18-3ec2-40c3-8cbb-52d547d94364", + "uuid": "092ef4a5-09aa-4428-b8e5-9740f737552a", "control-id": "cis_rhel10_3-3.2.7", "description": "No notes for control-id 3.3.2.7.", "props": [ @@ -28789,7 +28870,7 @@ ] }, { - "uuid": "e5d5faef-be85-4b0b-9e3f-2c27d996ff5b", + "uuid": "010dfc26-bbfd-41c4-80b1-8cf1f0a8c84a", "control-id": "cis_rhel10_3-3.2.8", "description": "No notes for control-id 3.3.2.8.", "props": [ @@ -28806,7 +28887,7 @@ ] }, { - "uuid": "d6253a98-1a38-4c3c-ae36-eca628e6eb81", + "uuid": "8344b692-358f-4d4a-b374-3d5f8923be0a", "control-id": "cis_rhel10_4-1.1", "description": "No notes for control-id 4.1.1.", "props": [ @@ -28823,7 +28904,7 @@ ] }, { - "uuid": "51501b30-69dd-400b-9d24-0f5887b32065", + "uuid": "01dde9ce-8c74-4529-8236-d3101a29d0a8", "control-id": "cis_rhel10_4-1.2", "description": "No notes for control-id 4.1.2.", "props": [ @@ -28840,7 +28921,7 @@ ] }, { - "uuid": "af7f6ea4-7943-4296-944f-5d02076c8bf4", + "uuid": "55b383a7-5e22-49e1-9a2e-59071b92bc39", "control-id": "cis_rhel10_4-1.3", "description": "No notes for control-id 4.1.3.", "props": [ @@ -28857,7 +28938,7 @@ ] }, { - "uuid": "a6767c9d-49a9-4776-97f9-0883353cf626", + "uuid": "bf8602e7-0288-477e-906c-e1a43134b9f7", "control-id": "cis_rhel10_4-1.4", "description": "The description for control-id cis_rhel10_4-1.4.", "props": [ @@ -28870,7 +28951,7 @@ ] }, { - "uuid": "bf7eb40a-e913-4d53-ac4e-25346ffea3e2", + "uuid": "564cf034-caf2-490b-aaab-42a728e10b7f", "control-id": "cis_rhel10_4-1.5", "description": "Firewalld in Red Hat Enterprise Linux 10 accepts loopback traffic by default.", "props": [ @@ -28887,7 +28968,7 @@ ] }, { - "uuid": "e660d6c8-4257-4e01-8291-c1575d101f52", + "uuid": "556c6468-1fd1-4ad8-880c-be8fdcb9dca8", "control-id": "cis_rhel10_4-1.6", "description": "The description for control-id cis_rhel10_4-1.6.", "props": [ @@ -28900,7 +28981,7 @@ ] }, { - "uuid": "831db3d8-15b5-4e63-bd85-6879889830ad", + "uuid": "b7e0958b-b616-4ac1-aaa4-90998e6b4779", "control-id": "cis_rhel10_4-1.7", "description": "The description for control-id cis_rhel10_4-1.7.", "props": [ @@ -28913,7 +28994,7 @@ ] }, { - "uuid": "83542764-8eca-479a-822b-1ba1d56db9c9", + "uuid": "c5dc073d-4f77-41b7-92ad-ac7a8d20a236", "control-id": "cis_rhel10_5-1.1", "description": "No notes for control-id 5.1.1.", "props": [ @@ -28970,7 +29051,7 @@ ] }, { - "uuid": "4ade1fc5-eb2a-4fa6-a6d0-024a8470f772", + "uuid": "bcac9f22-3be5-41d0-834a-faf0a1f63936", "control-id": "cis_rhel10_5-1.2", "description": "No notes for control-id 5.1.2.", "props": [ @@ -28997,7 +29078,7 @@ ] }, { - "uuid": "360d04dd-6e6a-4b4f-96b8-6eabac1a1026", + "uuid": "896ed5ee-37da-4146-98db-7d6d70b1a6ef", "control-id": "cis_rhel10_5-1.3", "description": "No notes for control-id 5.1.3.", "props": [ @@ -29024,7 +29105,7 @@ ] }, { - "uuid": "863d6d74-da80-48ff-a471-33232d547f9d", + "uuid": "3f0e0f45-d404-44e5-93b8-cdf7ab10ed0e", "control-id": "cis_rhel10_5-1.4", "description": "No notes for control-id 5.1.4.", "props": [ @@ -29041,7 +29122,7 @@ ] }, { - "uuid": "de768758-4134-48c1-a9f7-4512d7716bb6", + "uuid": "9b015121-23b4-4db6-8403-a934fca0d60e", "control-id": "cis_rhel10_5-1.5", "description": "No notes for control-id 5.1.5.", "props": [ @@ -29058,7 +29139,7 @@ ] }, { - "uuid": "d09a829f-dab7-4c1e-93ed-591790a048e9", + "uuid": "08a8c797-42d0-4564-b8b0-56b118281490", "control-id": "cis_rhel10_5-1.6", "description": "No notes for control-id 5.1.6.", "props": [ @@ -29075,7 +29156,7 @@ ] }, { - "uuid": "65ba57ee-e398-43d7-a4aa-09fc175a2f7d", + "uuid": "a74bbc88-7fef-417e-a78c-1d6af2a2a698", "control-id": "cis_rhel10_5-1.7", "description": "The requirement gives an example of 45 seconds, but is flexible about the values. It is only\nnecessary to ensure there is a timeout configured in alignment to the site policy.", "props": [ @@ -29097,7 +29178,7 @@ ] }, { - "uuid": "67a17d06-9d04-4968-bc1b-092068e2f61a", + "uuid": "9771abf7-43cc-4189-9f13-a1d9c622d5a5", "control-id": "cis_rhel10_5-1.8", "description": "No notes for control-id 5.1.8.", "props": [ @@ -29114,7 +29195,7 @@ ] }, { - "uuid": "ad1b789b-2562-4db7-9d12-ba813e49d429", + "uuid": "8e5535a7-96a4-4e3c-9efb-62a1dfd71e1d", "control-id": "cis_rhel10_5-1.9", "description": "No notes for control-id 5.1.9.", "props": [ @@ -29131,7 +29212,7 @@ ] }, { - "uuid": "55832963-6dd5-4945-bd1c-b17766f1190c", + "uuid": "48f4b734-6967-41f1-ba80-5487ddf8b673", "control-id": "cis_rhel10_5-1.10", "description": "No notes for control-id 5.1.10.", "props": [ @@ -29148,7 +29229,7 @@ ] }, { - "uuid": "088866da-af41-4eff-b401-44f5cfe1fca2", + "uuid": "6d9b8b33-df93-4d97-aeb8-cfa2cc3133f7", "control-id": "cis_rhel10_5-1.11", "description": "No notes for control-id 5.1.11.", "props": [ @@ -29165,7 +29246,7 @@ ] }, { - "uuid": "2937ac1b-d92f-4cc5-9756-dce119ea8e38", + "uuid": "7786a4a1-137a-4fcc-956e-215e9fbdfdf5", "control-id": "cis_rhel10_5-1.12", "description": "The description for control-id cis_rhel10_5-1.12.", "props": [ @@ -29183,7 +29264,7 @@ ] }, { - "uuid": "b3cc308e-b15b-4cd4-81ce-45947bade829", + "uuid": "0345b159-9bc9-4035-b8e6-8e5543c7cbca", "control-id": "cis_rhel10_5-1.13", "description": "No notes for control-id 5.1.13.", "props": [ @@ -29200,7 +29281,7 @@ ] }, { - "uuid": "f34d6f69-3c09-4b85-9889-4fd316b32453", + "uuid": "818c736c-533c-47ad-b7d7-656d39d518c8", "control-id": "cis_rhel10_5-1.14", "description": "The CIS benchmark is not opinionated about which loglevel is selected here. Here, this\nprofile uses VERBOSE by default, as it allows for the capture of login and logout activity\nas well as key fingerprints.", "props": [ @@ -29217,7 +29298,7 @@ ] }, { - "uuid": "338c7752-cd9f-46dd-b308-0759c45ce7a1", + "uuid": "faca41cd-15e1-475e-8bf8-c441d3604336", "control-id": "cis_rhel10_5-1.15", "description": "No notes for control-id 5.1.15.", "props": [ @@ -29234,7 +29315,7 @@ ] }, { - "uuid": "b467840e-b2e5-47a3-9c1e-87f9978f9c61", + "uuid": "418939ae-1041-48e9-b39f-9718e9822b22", "control-id": "cis_rhel10_5-1.16", "description": "No notes for control-id 5.1.16.", "props": [ @@ -29251,7 +29332,7 @@ ] }, { - "uuid": "50e7925b-0d5a-4ee6-ad70-261502230476", + "uuid": "b62f7159-06c9-4474-901d-51c4ca841906", "control-id": "cis_rhel10_5-1.17", "description": "No notes for control-id 5.1.17.", "props": [ @@ -29268,7 +29349,7 @@ ] }, { - "uuid": "86ff8f31-fcba-4864-b139-b13985f9f08e", + "uuid": "a28c9119-3537-417e-9737-76436afcaabc", "control-id": "cis_rhel10_5-1.18", "description": "No notes for control-id 5.1.18.", "props": [ @@ -29285,7 +29366,7 @@ ] }, { - "uuid": "e853c35c-d5a4-42f8-8f15-9ffcb0717ba2", + "uuid": "3275b084-0ae3-454b-be1d-f55a7e9892dd", "control-id": "cis_rhel10_5-1.19", "description": "No notes for control-id 5.1.19.", "props": [ @@ -29302,7 +29383,7 @@ ] }, { - "uuid": "73c90a78-f5dd-48b4-a663-4a93369f1bca", + "uuid": "5f07a563-6b3c-4afa-a632-7174b8c87148", "control-id": "cis_rhel10_5-1.20", "description": "No notes for control-id 5.1.20.", "props": [ @@ -29319,7 +29400,7 @@ ] }, { - "uuid": "2104ee99-7bc6-451b-aa80-2f6393e800b7", + "uuid": "09de3f6f-0d98-4d3b-bb91-986be2e4ecd0", "control-id": "cis_rhel10_5-1.21", "description": "No notes for control-id 5.1.21.", "props": [ @@ -29336,7 +29417,7 @@ ] }, { - "uuid": "6b8514f2-d40b-459e-9844-64b797f50793", + "uuid": "1f9202ab-b60f-4456-9264-a876f9561b94", "control-id": "cis_rhel10_5-1.22", "description": "No notes for control-id 5.1.22.", "props": [ @@ -29353,7 +29434,7 @@ ] }, { - "uuid": "6008dfe6-ad6d-4575-8d4f-51c2bf54b1a8", + "uuid": "cc656ce5-3e92-42b5-b529-c53ca0537f47", "control-id": "cis_rhel10_5-2.1", "description": "No notes for control-id 5.2.1.", "props": [ @@ -29370,7 +29451,7 @@ ] }, { - "uuid": "40f1e7a7-3cf9-4272-93aa-04fa633d2d88", + "uuid": "6dfd89c0-8c0c-4cff-b087-4b5f9cb3232c", "control-id": "cis_rhel10_5-2.2", "description": "No notes for control-id 5.2.2.", "props": [ @@ -29387,7 +29468,7 @@ ] }, { - "uuid": "4be30c9d-a879-4289-aa99-327e2bbe5e77", + "uuid": "609a8491-2f4e-4b84-b467-65563e0a7f43", "control-id": "cis_rhel10_5-2.3", "description": "No notes for control-id 5.2.3.", "props": [ @@ -29404,7 +29485,7 @@ ] }, { - "uuid": "e69babe3-e8d2-4207-8075-8ac762a82bcd", + "uuid": "09d2ddab-b3d9-4530-8ac2-f1ca4b4cc174", "control-id": "cis_rhel10_5-2.5", "description": "No notes for control-id 5.2.5.", "props": [ @@ -29421,7 +29502,7 @@ ] }, { - "uuid": "f52aa92d-6d67-47de-bccf-aed635b62676", + "uuid": "719fea07-f06e-4460-8b1d-c097db2abcf5", "control-id": "cis_rhel10_5-2.6", "description": "No notes for control-id 5.2.6.", "props": [ @@ -29438,7 +29519,7 @@ ] }, { - "uuid": "1a2682e8-6672-432f-a571-504bd808ce1a", + "uuid": "b50eee7f-4432-40b7-bf90-ad0715196b49", "control-id": "cis_rhel10_5-2.7", "description": "Members of \"wheel\" or GID 0 groups are checked by default if the group option is not set for\npam_wheel.so module. The recommendation states the group should be empty to reinforce the\nuse of \"sudo\" for privileged access. Therefore, members of these groups should be manually\nchecked or a different group should be informed.", "props": [ @@ -29460,7 +29541,7 @@ ] }, { - "uuid": "99dc8ecb-435b-42aa-9cbe-6c871edc2152", + "uuid": "53cd9993-36ae-4feb-892a-1aebad96d9b2", "control-id": "cis_rhel10_5-3.1.1", "description": "This requirement is hard to be automated without any specific requirement. The policy even\nstates that provided commands are examples, other custom settings might be in place and the\nsettings might be different depending on site policies. The other rules will already make\nsure there is a correct autheselect profile regardless of the existing settings. It is\nnecessary to better discuss with CIS Community.", "props": [ @@ -29472,7 +29553,7 @@ ] }, { - "uuid": "7f49684b-b825-44a2-8a47-69f471584c8f", + "uuid": "ea5cae8f-f530-4017-b0ed-32aceb198acd", "control-id": "cis_rhel10_5-3.1.2", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.1.", "props": [ @@ -29494,7 +29575,7 @@ ] }, { - "uuid": "13756588-bbfd-4ae1-9b7e-37c208a127ff", + "uuid": "eba589e7-7248-472e-a453-12b5117f59e8", "control-id": "cis_rhel10_5-3.1.3", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.2.", "props": [ @@ -29521,7 +29602,7 @@ ] }, { - "uuid": "99fc125b-4b19-4200-a686-448d14b804eb", + "uuid": "976aa39a-c64e-4e51-a30e-832262dc9b65", "control-id": "cis_rhel10_5-3.1.4", "description": "The module is properly enabled by the rules mentioned in related_rules.\nRequirements in 5.3.2.3 use these rules.", "props": [ @@ -29533,7 +29614,7 @@ ] }, { - "uuid": "6d099985-a922-450e-9e8c-5905165fcd1a", + "uuid": "c04d6a03-dc34-4b6d-9d25-4c7e84ef04ad", "control-id": "cis_rhel10_5-3.1.5", "description": "No notes for control-id 5.3.1.5.", "props": [ @@ -29550,7 +29631,7 @@ ] }, { - "uuid": "a385a27e-855d-4d20-9d32-0879fec3b64b", + "uuid": "7f6df422-f36a-4e70-a975-30ec52f7f9db", "control-id": "cis_rhel10_5-3.2.1.1", "description": "No notes for control-id 5.3.2.1.1.", "props": [ @@ -29567,7 +29648,7 @@ ] }, { - "uuid": "edf4217e-3617-4b77-a631-6e0b3334ba7e", + "uuid": "938da631-5f2a-47f0-a423-accc22ff288d", "control-id": "cis_rhel10_5-3.2.1.2", "description": "The policy also accepts value 0, which means the locked accounts should be manually unlocked\nby an administrator. However, it also mentions that using value 0 can facilitate a DoS\nattack to legitimate users.", "props": [ @@ -29584,7 +29665,7 @@ ] }, { - "uuid": "3f1a235f-7f39-4069-b023-5df19bdc1e1a", + "uuid": "5e688bf1-e783-41c2-8846-bdf86f8a4f3d", "control-id": "cis_rhel10_5-3.2.2.1", "description": "No notes for control-id 5.3.2.2.1.", "props": [ @@ -29601,7 +29682,7 @@ ] }, { - "uuid": "e5a0ea94-be4e-4cb9-90df-170a389f49a6", + "uuid": "0ea718e4-9813-4e19-b574-e1b0d06d7ef9", "control-id": "cis_rhel10_5-3.2.2.2", "description": "No notes for control-id 5.3.2.2.2.", "props": [ @@ -29618,7 +29699,7 @@ ] }, { - "uuid": "b9f9805c-d4cc-4233-8796-2e40308c125c", + "uuid": "ea6c1262-daa3-4b23-84a9-8a33ecc322f7", "control-id": "cis_rhel10_5-3.2.2.3", "description": "This requirement is expected to be manual. However, in previous versions of the policy\nit was already automated the configuration of \"minclass\" option. This posture was kept for\nRHEL 10 in this new version. Rules related to other options are informed in related_rules.\nIn short, minclass=4 alone can achieve the same result achieved by the combination of the\nother 4 options mentioned in the policy.", "props": [ @@ -29635,7 +29716,7 @@ ] }, { - "uuid": "aa00eb8d-6b77-493a-ae54-3b7ec6ed52b1", + "uuid": "b9f36f9e-0f8f-4119-a31d-44a9ef224d12", "control-id": "cis_rhel10_5-3.2.2.4", "description": "No notes for control-id 5.3.2.2.4.", "props": [ @@ -29652,7 +29733,7 @@ ] }, { - "uuid": "68039ae4-22fe-488d-9c2a-b2e09cd23c0b", + "uuid": "d91fbfd9-eedb-406b-8598-91c6ff153972", "control-id": "cis_rhel10_5-3.2.2.5", "description": "No notes for control-id 5.3.2.2.5.", "props": [ @@ -29669,7 +29750,7 @@ ] }, { - "uuid": "1cbbb25d-8c44-4b7e-84a6-743c3cebf33f", + "uuid": "51f45d7a-ca4f-4456-af83-953527184180", "control-id": "cis_rhel10_5-3.2.2.6", "description": "No notes for control-id 5.3.2.2.6.", "props": [ @@ -29686,7 +29767,7 @@ ] }, { - "uuid": "bddfc550-8c35-42c7-9ec9-cb441bd2fefe", + "uuid": "7a8606fd-7ced-497a-b693-0ae2e6491351", "control-id": "cis_rhel10_5-3.2.2.7", "description": "No notes for control-id 5.3.2.2.7.", "props": [ @@ -29703,7 +29784,7 @@ ] }, { - "uuid": "1a7383eb-0673-45fb-a7cb-9b07231c255a", + "uuid": "b53e8caa-55f4-4f46-9168-cf56a3568340", "control-id": "cis_rhel10_5-3.2.3.1", "description": "Although mentioned in the section 5.3.3.3, there is no explicit requirement to configure\nretry option of pam_pwhistory. If come in the future, the rule accounts_password_pam_retry\ncan be used.", "props": [ @@ -29725,7 +29806,7 @@ ] }, { - "uuid": "4589e953-67ab-4806-9f87-1165c9704208", + "uuid": "4e21b88f-42a4-4301-a324-1a7e576daf34", "control-id": "cis_rhel10_5-3.2.3.2", "description": "No notes for control-id 5.3.2.3.2.", "props": [ @@ -29742,7 +29823,7 @@ ] }, { - "uuid": "0813df07-2a85-48ff-8a36-c3db7f3f1c15", + "uuid": "74ae5f99-ed10-4d9b-a85a-c9c7975171fb", "control-id": "cis_rhel10_5-3.2.3.3", "description": "In RHEL 10 pam_pwhistory is enabled via authselect feature, as required in 5.3.1.4. The\nfeature automatically set \"use_authok\" option. In any case, we don't have a rule to check\nthis option specifically.", "props": [ @@ -29759,7 +29840,7 @@ ] }, { - "uuid": "e9035ed4-3b76-4083-b3c1-175859553398", + "uuid": "4fd525f8-4d9b-4cec-ad17-5a2923d9bfc0", "control-id": "cis_rhel10_5-3.2.4.1", "description": "The rule more specifically used in this requirement also satify the requirement 5.3.1.5.", "props": [ @@ -29776,7 +29857,7 @@ ] }, { - "uuid": "2083a8f0-ef9a-4b45-a344-0c06cbb6670b", + "uuid": "28f7f2df-97e3-4632-af88-4c8cd75ac269", "control-id": "cis_rhel10_5-3.2.4.2", "description": "Usage of pam_unix.so module together with \"remember\" option is deprecated and is not\nrecommended by this policy. Instead, it should be used remember option of pam_pwhistory\nmodule, as required in 5.3.2.3.1. See here for more details about pam_unix.so:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1778929", "props": [ @@ -29793,7 +29874,7 @@ ] }, { - "uuid": "59bae74f-3a76-49dc-84b0-21939a690d09", + "uuid": "69d64109-a1a6-4535-9b59-3160a376d27b", "control-id": "cis_rhel10_5-3.2.4.3", "description": "Changes in logindefs mentioned in this requirement are more specifically covered by 5.4.1.4", "props": [ @@ -29815,7 +29896,7 @@ ] }, { - "uuid": "576331f7-9852-4f6b-9f01-40b84e33c84f", + "uuid": "95319ad7-e143-4ef8-902e-ad03da798760", "control-id": "cis_rhel10_5-3.2.4.4", "description": "In RHEL 10 pam_unix is enabled by default in all authselect profiles already with the\nuse_authtok option set. In any case, we don't have a rule to check this option specifically,\nlike in 5.3.2.3.3.", "props": [ @@ -29832,7 +29913,7 @@ ] }, { - "uuid": "aa33d5af-e3a6-4173-8c26-fb1c217338f7", + "uuid": "681a24c5-6e8b-4507-b9dc-2089d765183b", "control-id": "cis_rhel10_5-4.1.1", "description": "No notes for control-id 5.4.1.1.", "props": [ @@ -29854,7 +29935,7 @@ ] }, { - "uuid": "5790778e-57a4-4534-b830-9a93e0d4cda8", + "uuid": "355b7ae6-cd4a-4c81-ac5e-836237e94be1", "control-id": "cis_rhel10_5-4.1.3", "description": "No notes for control-id 5.4.1.3.", "props": [ @@ -29876,7 +29957,7 @@ ] }, { - "uuid": "713f58a7-17a0-447c-ac61-0e7a4780131f", + "uuid": "f10a0f6a-4e68-497a-b1c6-6b6b07a2671c", "control-id": "cis_rhel10_5-4.1.4", "description": "There's a \"new\" set of options in /etc/login.defs file to define the number of iterations\nperformed during the hashing process.", "props": [ @@ -29898,7 +29979,7 @@ ] }, { - "uuid": "a3cc9261-bcc1-4495-bdb7-1df5157b6332", + "uuid": "3ee389d1-f3bb-49f4-8a59-427bd77b4c16", "control-id": "cis_rhel10_5-4.1.5", "description": "No notes for control-id 5.4.1.5.", "props": [ @@ -29920,7 +30001,7 @@ ] }, { - "uuid": "9c5e7fcb-270c-4d24-aad5-ede491f2e90d", + "uuid": "b4172eba-94fa-496b-bb83-cc588de469bc", "control-id": "cis_rhel10_5-4.1.6", "description": "No notes for control-id 5.4.1.6.", "props": [ @@ -29937,7 +30018,7 @@ ] }, { - "uuid": "34db4c16-2310-4e1d-9c21-71c2b6f7df57", + "uuid": "560723ce-6250-4630-ad88-f4e7bf184451", "control-id": "cis_rhel10_5-4.2.1", "description": "No notes for control-id 5.4.2.1.", "props": [ @@ -29954,7 +30035,7 @@ ] }, { - "uuid": "278a42ad-8b20-4ba5-9425-e23b170f4e84", + "uuid": "808fe174-f7fe-4325-ae9f-e545871bee2a", "control-id": "cis_rhel10_5-4.2.2", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -29971,7 +30052,7 @@ ] }, { - "uuid": "604e6602-ff77-45f5-86fb-f6d5c0a7b0b4", + "uuid": "c5d54357-80c0-49a1-a07e-2a786522715c", "control-id": "cis_rhel10_5-4.2.3", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -29988,7 +30069,7 @@ ] }, { - "uuid": "87ba9979-6658-49ad-b8f8-3f64a8b80da4", + "uuid": "22387d4b-d9bb-4957-bcdd-45ce22a6c2a3", "control-id": "cis_rhel10_5-4.2.4", "description": "No notes for control-id 5.4.2.4.", "props": [ @@ -30005,7 +30086,7 @@ ] }, { - "uuid": "adac0a35-bca8-4266-8db1-bbafb7bad107", + "uuid": "d8ac4680-0eea-4136-a9bf-05e657820cb0", "control-id": "cis_rhel10_5-4.2.5", "description": "No notes for control-id 5.4.2.5.", "props": [ @@ -30027,7 +30108,7 @@ ] }, { - "uuid": "980871ae-7ca2-4c2e-9bcb-16a93417edb2", + "uuid": "9f8d396f-769e-4017-bedb-03d9a5a7622a", "control-id": "cis_rhel10_5-4.2.6", "description": "No notes for control-id 5.4.2.6.", "props": [ @@ -30044,7 +30125,7 @@ ] }, { - "uuid": "a40e06d5-f038-4555-9b8b-a215ca91c9fc", + "uuid": "41b2633a-8740-4e69-8281-e412901c910e", "control-id": "cis_rhel10_5-4.2.7", "description": "No notes for control-id 5.4.2.7.", "props": [ @@ -30066,19 +30147,24 @@ ] }, { - "uuid": "f29c7a5f-f862-40ba-96b1-410746fc2731", + "uuid": "73383f79-58a0-485e-a236-17aae23e6a07", "control-id": "cis_rhel10_5-4.2.8", - "description": "New rule is necessary.", + "description": "No notes for control-id 5.4.2.8.", "props": [ { "name": "implementation-status", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "implemented" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "no_invalid_shell_accounts_unlocked" } ] }, { - "uuid": "82bdd8bd-5157-45b4-8a54-8bf52b4a92d1", + "uuid": "04fd9396-db32-446c-a643-cea273e288ed", "control-id": "cis_rhel10_5-4.3.2", "description": "No notes for control-id 5.4.3.2.", "props": [ @@ -30095,7 +30181,7 @@ ] }, { - "uuid": "f213207e-b6c6-43fc-96b7-3eecf7fdeb76", + "uuid": "39fa24cb-e0c0-41dc-b165-84277321c868", "control-id": "cis_rhel10_5-4.3.3", "description": "No notes for control-id 5.4.3.3.", "props": [ @@ -30122,7 +30208,7 @@ ] }, { - "uuid": "6e7b8b08-e3e1-44ac-af97-2ba95a3d7ac7", + "uuid": "2f7cb420-1cc1-4af3-96cb-859cacdaf6b8", "control-id": "cis_rhel10_6-1.1", "description": "No notes for control-id 6.1.1.", "props": [ @@ -30144,7 +30230,7 @@ ] }, { - "uuid": "60f032d8-5e29-4216-bf8c-a21d7cd9dd3f", + "uuid": "f19c95cd-4fd8-4352-8f93-6f92e67dab88", "control-id": "cis_rhel10_6-1.2", "description": "No notes for control-id 6.1.2.", "props": [ @@ -30161,7 +30247,7 @@ ] }, { - "uuid": "ed3fc307-777a-4d20-96bf-1902fba9dc99", + "uuid": "3133599d-eb5b-4ec0-9e75-48034f67037f", "control-id": "cis_rhel10_6-1.3", "description": "No notes for control-id 6.1.3.", "props": [ @@ -30178,7 +30264,7 @@ ] }, { - "uuid": "cde208f1-2038-43e2-8b23-18844d26eb4b", + "uuid": "b8bf6469-bbe4-47a1-bed8-dc8bd7ed938d", "control-id": "cis_rhel10_6-2.1.1", "description": "No notes for control-id 6.2.1.1.", "props": [ @@ -30195,7 +30281,7 @@ ] }, { - "uuid": "04d1fa7d-c751-474a-8aaf-84cf743bf6a7", + "uuid": "2b4f4c2f-ca9f-4577-b3eb-3ceab4234cce", "control-id": "cis_rhel10_6-2.1.2", "description": "The description for control-id cis_rhel10_6-2.1.2.", "props": [ @@ -30208,7 +30294,7 @@ ] }, { - "uuid": "16f730ff-8ad0-446e-a7bb-682bebb61087", + "uuid": "8881dfac-d2ef-4208-97af-a8a90e796efd", "control-id": "cis_rhel10_6-2.1.3", "description": "The description for control-id cis_rhel10_6-2.1.3.", "props": [ @@ -30221,20 +30307,24 @@ ] }, { - "uuid": "c61ddb3c-dfc5-4e2c-934c-a25e4b0a2c6e", + "uuid": "b46901d8-bd1c-4f74-98e5-e4a76a0ed2e3", "control-id": "cis_rhel10_6-2.1.4", - "description": "The description for control-id cis_rhel10_6-2.1.4.", + "description": "No notes for control-id 6.2.1.4.", "props": [ { "name": "implementation-status", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "alternative", - "remarks": "It is necessary to create a new rule to check the status of journald and rsyslog.\nIt would also be necessary a new rule to disable or remove rsyslog." + "value": "implemented" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "ensure_journald_and_rsyslog_not_active_together" } ] }, { - "uuid": "bd462907-8c18-4562-9a15-89b8be975ff3", + "uuid": "fc1bd4a4-e2a6-45ef-b50d-329b0eb0f25f", "control-id": "cis_rhel10_6-2.2.1.1", "description": "No notes for control-id 6.2.2.1.1.", "props": [ @@ -30251,7 +30341,7 @@ ] }, { - "uuid": "ee980646-7d43-4ba7-accb-ea95e0dd4aeb", + "uuid": "1abe7547-a912-4db1-9b5b-2ba9590d0a81", "control-id": "cis_rhel10_6-2.2.1.2", "description": "The description for control-id cis_rhel10_6-2.2.1.2.", "props": [ @@ -30264,7 +30354,7 @@ ] }, { - "uuid": "dd760ec9-06c0-4267-92bb-962fa037d7a1", + "uuid": "77e3904f-1cf0-4dc1-bc2c-466c650691cd", "control-id": "cis_rhel10_6-2.2.1.3", "description": "No notes for control-id 6.2.2.1.3.", "props": [ @@ -30281,7 +30371,7 @@ ] }, { - "uuid": "f5e624ba-ffb4-4efb-90ca-3d3963dba9dd", + "uuid": "b3e15f81-f80f-4e23-98b9-3f9493c50851", "control-id": "cis_rhel10_6-2.2.1.4", "description": "No notes for control-id 6.2.2.1.4.", "props": [ @@ -30298,7 +30388,7 @@ ] }, { - "uuid": "e47bb3f2-ddf2-4ed7-9ee6-5a9a2ac99605", + "uuid": "df491a36-e5b3-4ea0-bea9-2fc61b9528da", "control-id": "cis_rhel10_6-2.2.2", "description": "No notes for control-id 6.2.2.2.", "props": [ @@ -30315,7 +30405,7 @@ ] }, { - "uuid": "65e9e97d-eae3-4274-a047-f7563913b788", + "uuid": "7fdc6ef4-c229-4127-89d0-9b12406a3fdb", "control-id": "cis_rhel10_6-2.2.3", "description": "No notes for control-id 6.2.2.3.", "props": [ @@ -30332,7 +30422,7 @@ ] }, { - "uuid": "2a778eab-272d-4615-a53e-813633f46e12", + "uuid": "f2a5e5ae-8ad1-4040-9da3-66b48e4499ba", "control-id": "cis_rhel10_6-2.2.4", "description": "No notes for control-id 6.2.2.4.", "props": [ @@ -30349,7 +30439,7 @@ ] }, { - "uuid": "691e5065-28a8-4a1d-9468-58ead6695fb6", + "uuid": "9dc688d3-87bc-47f2-8fb8-6af21954aa54", "control-id": "cis_rhel10_6-2.3.1", "description": "No notes for control-id 6.2.3.1.", "props": [ @@ -30361,7 +30451,7 @@ ] }, { - "uuid": "50abc1c3-4039-490f-9f8c-b1344bb54708", + "uuid": "3163c1d1-0bb1-480e-ba34-15bf09c812ed", "control-id": "cis_rhel10_6-2.3.2", "description": "No notes for control-id 6.2.3.2.", "props": [ @@ -30373,7 +30463,7 @@ ] }, { - "uuid": "94ce0ba8-83d3-4adf-8c65-635ca9796f54", + "uuid": "d707c7ba-deb5-4cda-8417-522b820cd1fb", "control-id": "cis_rhel10_6-2.3.3", "description": "No notes for control-id 6.2.3.3.", "props": [ @@ -30385,7 +30475,7 @@ ] }, { - "uuid": "20be5972-1a94-4d09-82fe-4d1a6903ea8e", + "uuid": "38178095-4cda-4109-93e8-d92178296b37", "control-id": "cis_rhel10_6-2.3.4", "description": "No notes for control-id 6.2.3.4.", "props": [ @@ -30397,7 +30487,7 @@ ] }, { - "uuid": "b4cda12d-aed3-4b87-8689-0dc3ff404ad9", + "uuid": "ca896a4e-808b-4489-9877-abb6bc650d42", "control-id": "cis_rhel10_6-2.3.5", "description": "The description for control-id cis_rhel10_6-2.3.5.", "props": [ @@ -30410,7 +30500,7 @@ ] }, { - "uuid": "f5a5a656-2182-4441-abcd-227b98afc3ce", + "uuid": "d8a8ef01-b45c-4d33-b977-3cd6af09728a", "control-id": "cis_rhel10_6-2.3.6", "description": "The description for control-id cis_rhel10_6-2.3.6.", "props": [ @@ -30423,7 +30513,7 @@ ] }, { - "uuid": "4fbca94a-f2f5-4ade-82e2-4d7837d0c2f5", + "uuid": "1de49351-a50a-4c0a-9a43-a5a8fbebc95e", "control-id": "cis_rhel10_6-2.3.7", "description": "No notes for control-id 6.2.3.7.", "props": [ @@ -30435,7 +30525,7 @@ ] }, { - "uuid": "2a88826c-fd3d-49a2-94e5-c6a52b201f9d", + "uuid": "2a1597a6-ee19-40fe-98c4-7d8ae89d6bd3", "control-id": "cis_rhel10_6-2.3.8", "description": "The description for control-id cis_rhel10_6-2.3.8.", "props": [ @@ -30448,7 +30538,7 @@ ] }, { - "uuid": "b426afac-c239-4d2c-8043-b8a8d502310c", + "uuid": "562a5415-2eaf-42dd-be63-6406e7f3e229", "control-id": "cis_rhel10_6-2.4.1", "description": "It is not harmful to run these rules even if rsyslog is not installed or active.", "props": [ @@ -30475,7 +30565,7 @@ ] }, { - "uuid": "03530e40-30fd-4c71-b1dd-85443f2c7e84", + "uuid": "8dc2b797-b7ab-4d3d-8710-4e306ea02800", "control-id": "cis_rhel10_7-1.1", "description": "No notes for control-id 7.1.1.", "props": [ @@ -30502,7 +30592,7 @@ ] }, { - "uuid": "eba6e24d-2d19-4013-bc55-057ca5337279", + "uuid": "476a4226-6f97-4ebe-b0eb-19328c192115", "control-id": "cis_rhel10_7-1.2", "description": "No notes for control-id 7.1.2.", "props": [ @@ -30529,7 +30619,7 @@ ] }, { - "uuid": "6e3f4ffc-97d3-455b-bb19-7867567df953", + "uuid": "4e1a49fb-7fe1-4772-9a9f-68ced777cafe", "control-id": "cis_rhel10_7-1.3", "description": "No notes for control-id 7.1.3.", "props": [ @@ -30556,7 +30646,7 @@ ] }, { - "uuid": "1558834f-d57a-4a80-8627-59c058f80ba7", + "uuid": "4e13afd5-6d15-41c0-ab6d-1777820bfe07", "control-id": "cis_rhel10_7-1.4", "description": "No notes for control-id 7.1.4.", "props": [ @@ -30583,7 +30673,7 @@ ] }, { - "uuid": "a9ea6a21-3a52-4661-b22d-fb90e01dbfbd", + "uuid": "0ca783b1-45f8-416d-aef8-27e7a3fef294", "control-id": "cis_rhel10_7-1.5", "description": "No notes for control-id 7.1.5.", "props": [ @@ -30610,7 +30700,7 @@ ] }, { - "uuid": "0f10d9ba-944f-4697-9561-5b35089852bf", + "uuid": "d11acd7b-548b-4660-a857-d6a9b63f06e3", "control-id": "cis_rhel10_7-1.6", "description": "No notes for control-id 7.1.6.", "props": [ @@ -30637,7 +30727,7 @@ ] }, { - "uuid": "ae6d10dc-faa3-4146-ac48-5e4062d96288", + "uuid": "384277fe-97f0-4598-8dfb-ca4ee40b9095", "control-id": "cis_rhel10_7-1.7", "description": "No notes for control-id 7.1.7.", "props": [ @@ -30664,7 +30754,7 @@ ] }, { - "uuid": "2d478ebc-27c3-4a08-b946-24637bd917a9", + "uuid": "43e8b15f-b383-499b-9330-3e7f38c0308f", "control-id": "cis_rhel10_7-1.8", "description": "No notes for control-id 7.1.8.", "props": [ @@ -30691,7 +30781,7 @@ ] }, { - "uuid": "fe32075d-4ef1-4e55-b717-fa3cab9a9413", + "uuid": "96f8146b-1703-4f2c-beef-06f9d438d76c", "control-id": "cis_rhel10_7-1.9", "description": "No notes for control-id 7.1.9.", "props": [ @@ -30718,7 +30808,7 @@ ] }, { - "uuid": "78e42f6b-050a-44c7-ab92-e27804de77c7", + "uuid": "21edcfff-26e8-4603-97fc-e3fcffe01319", "control-id": "cis_rhel10_7-1.10", "description": "No notes for control-id 7.1.10.", "props": [ @@ -30760,7 +30850,7 @@ ] }, { - "uuid": "e00285bb-2991-4434-b380-7ba2ab98e6b1", + "uuid": "d315f019-0dcd-4ada-af85-364cae524085", "control-id": "cis_rhel10_7-1.11", "description": "No notes for control-id 7.1.11.", "props": [ @@ -30782,7 +30872,7 @@ ] }, { - "uuid": "6ffc93b4-907e-4475-9ed7-11a04dfdee0d", + "uuid": "bcfb9b7e-775e-4887-a61b-7f31dba0a964", "control-id": "cis_rhel10_7-1.12", "description": "No notes for control-id 7.1.12.", "props": [ @@ -30804,7 +30894,7 @@ ] }, { - "uuid": "a3a99455-1d58-4e4f-8b1f-38043a75e3bd", + "uuid": "4b2a1990-a520-40ba-bd86-19e58c261c89", "control-id": "cis_rhel10_7-1.13", "description": "The description for control-id cis_rhel10_7-1.13.", "props": [ @@ -30817,7 +30907,7 @@ ] }, { - "uuid": "538e1bf8-73fd-4ec5-b96f-7663c72bfef6", + "uuid": "c74b01c7-955e-488f-aaea-ef21ecdb1142", "control-id": "cis_rhel10_7-2.1", "description": "No notes for control-id 7.2.1.", "props": [ @@ -30834,7 +30924,7 @@ ] }, { - "uuid": "56a14e9c-5cd5-4569-a5f0-f0252ad2f28d", + "uuid": "bc529ac4-ee31-4a81-b7f1-64d44612f097", "control-id": "cis_rhel10_7-2.2", "description": "No notes for control-id 7.2.2.", "props": [ @@ -30851,7 +30941,7 @@ ] }, { - "uuid": "02e34873-1833-45e2-80ff-eb26f23195f3", + "uuid": "6c2d829a-6af5-4af7-b032-0879b4931001", "control-id": "cis_rhel10_7-2.3", "description": "No notes for control-id 7.2.3.", "props": [ @@ -30868,7 +30958,7 @@ ] }, { - "uuid": "61644e4f-443b-492d-ab7a-6740678930f2", + "uuid": "4222bc40-594b-4d98-9798-c50beef0d6a4", "control-id": "cis_rhel10_7-2.4", "description": "No notes for control-id 7.2.4.", "props": [ @@ -30885,7 +30975,7 @@ ] }, { - "uuid": "68374e29-ea38-4822-93e1-c7d5a46dceae", + "uuid": "fdbc8df3-ed20-49c1-8813-96187b2f893a", "control-id": "cis_rhel10_7-2.5", "description": "No notes for control-id 7.2.5.", "props": [ @@ -30902,7 +30992,7 @@ ] }, { - "uuid": "da4df607-7571-4162-b5ad-7399cb5bd45d", + "uuid": "85dff96f-f915-4ca0-98d6-78bfc6dddb50", "control-id": "cis_rhel10_7-2.6", "description": "No notes for control-id 7.2.6.", "props": [ @@ -30919,7 +31009,7 @@ ] }, { - "uuid": "6fadf33b-23da-45ad-8bb5-ee249a27cb4a", + "uuid": "7ee00f90-a340-4a6c-bcdb-6d2ce2893d89", "control-id": "cis_rhel10_7-2.7", "description": "No notes for control-id 7.2.7.", "props": [ @@ -30936,7 +31026,7 @@ ] }, { - "uuid": "30ddfefe-ebfc-4c64-9d5d-583ca144002a", + "uuid": "f2aa243d-0389-4825-9831-106377d7e415", "control-id": "cis_rhel10_7-2.8", "description": "No notes for control-id 7.2.8.", "props": [ @@ -30963,7 +31053,7 @@ ] }, { - "uuid": "fc2f95d1-6919-428d-988c-c9999f32ec32", + "uuid": "a6416d0e-deac-4a92-aa03-bda7671f61d2", "control-id": "cis_rhel10_7-2.9", "description": "No notes for control-id 7.2.9.", "props": [ From f92748fae87313979793b4c972351808bc83827e Mon Sep 17 00:00:00 2001 From: runner Date: Tue, 16 Dec 2025 14:22:16 +0000 Subject: [PATCH 2/4] Automatic updates from complyscribe --- .../component-definition.json | 4596 ++++++------ .../component-definition.json | 4540 ++++++------ .../component-definition.json | 6272 ++++++++--------- .../component-definition.json | 6228 ++++++++-------- 4 files changed, 10538 insertions(+), 11098 deletions(-) diff --git a/component-definitions/rhel10/rhel10-cis_rhel10-l1_server/component-definition.json b/component-definitions/rhel10/rhel10-cis_rhel10-l1_server/component-definition.json index a3897c4e..2b2225c6 100644 --- a/component-definitions/rhel10/rhel10-cis_rhel10-l1_server/component-definition.json +++ b/component-definitions/rhel10/rhel10-cis_rhel10-l1_server/component-definition.json @@ -3,8 +3,8 @@ "uuid": "c4be1cdf-5566-4add-81ec-694b72fc0910", "metadata": { "title": "Component definition for rhel10", - "last-modified": "2025-12-15T16:31:39.782834+00:00", - "version": "3.3", + "last-modified": "2025-12-16T14:23:42.279477+00:00", + "version": "3.4", "oscal-version": "1.1.3" }, "components": [ @@ -1487,3475 +1487,3439 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_grub2_cfg", + "value": "file_permissions_boot_grub2", "remarks": "rule_set_037" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/grub.cfg Group Ownership", + "value": "All GRUB configuration files must have mode 0600 or more restrictive", "remarks": "rule_set_037" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_grub2_cfg", + "value": "file_owner_boot_grub2", "remarks": "rule_set_038" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/grub.cfg User Ownership", + "value": "All GRUB configuration files must be owned by root", "remarks": "rule_set_038" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_grub2_cfg", + "value": "file_groupowner_boot_grub2", "remarks": "rule_set_039" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/grub.cfg Permissions", + "value": "All GRUB configuration files must be group-owned by root", "remarks": "rule_set_039" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_user_cfg", + "value": "disable_users_coredumps", "remarks": "rule_set_040" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/user.cfg Group Ownership", + "value": "Disable Core Dumps for All Users", "remarks": "rule_set_040" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_user_cfg", + "value": "sysctl_fs_protected_hardlinks", "remarks": "rule_set_041" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/user.cfg User Ownership", + "value": "Enable Kernel Parameter to Enforce DAC on Hardlinks", "remarks": "rule_set_041" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_user_cfg", + "value": "sysctl_fs_suid_dumpable", "remarks": "rule_set_042" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/user.cfg Permissions", + "value": "Disable Core Dumps for SUID programs", "remarks": "rule_set_042" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "disable_users_coredumps", + "value": "sysctl_kernel_dmesg_restrict", "remarks": "rule_set_043" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Core Dumps for All Users", + "value": "Restrict Access to Kernel Message Buffer", "remarks": "rule_set_043" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_protected_hardlinks", + "value": "sysctl_kernel_kptr_restrict", "remarks": "rule_set_044" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Enforce DAC on Hardlinks", + "value": "Restrict Exposed Kernel Pointer Addresses Access", "remarks": "rule_set_044" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_suid_dumpable", + "value": "sysctl_kernel_yama_ptrace_scope", "remarks": "rule_set_045" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Core Dumps for SUID programs", + "value": "Restrict usage of ptrace to descendant processes", "remarks": "rule_set_045" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_dmesg_restrict", + "value": "sysctl_kernel_randomize_va_space", "remarks": "rule_set_046" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict Access to Kernel Message Buffer", + "value": "Enable Randomized Layout of Virtual Address Space", "remarks": "rule_set_046" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_kptr_restrict", + "value": "coredump_disable_backtraces", "remarks": "rule_set_047" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict Exposed Kernel Pointer Addresses Access", + "value": "Disable core dump backtraces", "remarks": "rule_set_047" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_yama_ptrace_scope", + "value": "coredump_disable_storage", "remarks": "rule_set_048" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict usage of ptrace to descendant processes", + "value": "Disable storing core dump", "remarks": "rule_set_048" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_randomize_va_space", + "value": "configure_custom_crypto_policy_cis", "remarks": "rule_set_049" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Randomized Layout of Virtual Address Space", + "value": "Implement Custom Crypto Policy Modules for CIS Benchmark", "remarks": "rule_set_049" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "coredump_disable_backtraces", + "value": "banner_etc_motd_cis", "remarks": "rule_set_050" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable core dump backtraces", + "value": "Ensure Message Of The Day Is Configured Properly", "remarks": "rule_set_050" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "coredump_disable_storage", + "value": "banner_etc_issue_cis", "remarks": "rule_set_051" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable storing core dump", + "value": "Ensure Local Login Warning Banner Is Configured Properly", "remarks": "rule_set_051" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_custom_crypto_policy_cis", + "value": "banner_etc_issue_net_cis", "remarks": "rule_set_052" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Implement Custom Crypto Policy Modules for CIS Benchmark", + "value": "Ensure Remote Login Warning Banner Is Configured Properly", "remarks": "rule_set_052" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "banner_etc_motd_cis", + "value": "file_groupowner_etc_motd", "remarks": "rule_set_053" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Message Of The Day Is Configured Properly", + "value": "Verify Group Ownership of Message of the Day Banner", "remarks": "rule_set_053" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "banner_etc_issue_cis", + "value": "file_owner_etc_motd", "remarks": "rule_set_054" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Local Login Warning Banner Is Configured Properly", + "value": "Verify ownership of Message of the Day Banner", "remarks": "rule_set_054" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "banner_etc_issue_net_cis", + "value": "file_permissions_etc_motd", "remarks": "rule_set_055" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Remote Login Warning Banner Is Configured Properly", + "value": "Verify permissions on Message of the Day Banner", "remarks": "rule_set_055" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_motd", + "value": "file_groupowner_etc_issue", "remarks": "rule_set_056" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Ownership of Message of the Day Banner", + "value": "Verify Group Ownership of System Login Banner", "remarks": "rule_set_056" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_motd", + "value": "file_owner_etc_issue", "remarks": "rule_set_057" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify ownership of Message of the Day Banner", + "value": "Verify ownership of System Login Banner", "remarks": "rule_set_057" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_motd", + "value": "file_permissions_etc_issue", "remarks": "rule_set_058" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify permissions on Message of the Day Banner", + "value": "Verify permissions on System Login Banner", "remarks": "rule_set_058" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_issue", + "value": "file_groupowner_etc_issue_net", "remarks": "rule_set_059" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Ownership of System Login Banner", + "value": "Verify Group Ownership of System Login Banner for Remote Connections", "remarks": "rule_set_059" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_issue", + "value": "file_owner_etc_issue_net", "remarks": "rule_set_060" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify ownership of System Login Banner", + "value": "Verify ownership of System Login Banner for Remote Connections", "remarks": "rule_set_060" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_issue", + "value": "file_permissions_etc_issue_net", "remarks": "rule_set_061" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify permissions on System Login Banner", + "value": "Verify permissions on System Login Banner for Remote Connections", "remarks": "rule_set_061" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_issue_net", + "value": "dconf_gnome_banner_enabled", "remarks": "rule_set_062" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Ownership of System Login Banner for Remote Connections", + "value": "Enable GNOME3 Login Warning Banner", "remarks": "rule_set_062" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_issue_net", + "value": "dconf_gnome_login_banner_text", "remarks": "rule_set_063" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify ownership of System Login Banner for Remote Connections", + "value": "Set the GNOME3 Login Warning Banner Text", "remarks": "rule_set_063" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_issue_net", + "value": "dconf_gnome_disable_user_list", "remarks": "rule_set_064" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify permissions on System Login Banner for Remote Connections", + "value": "Disable the GNOME3 Login User List", "remarks": "rule_set_064" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_banner_enabled", + "value": "dconf_gnome_screensaver_idle_delay", "remarks": "rule_set_065" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable GNOME3 Login Warning Banner", + "value": "Set GNOME3 Screensaver Inactivity Timeout", "remarks": "rule_set_065" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_login_banner_text", + "value": "dconf_gnome_screensaver_lock_delay", "remarks": "rule_set_066" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set the GNOME3 Login Warning Banner Text", + "value": "Set GNOME3 Screensaver Lock Delay After Activation Period", "remarks": "rule_set_066" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_disable_user_list", + "value": "dconf_gnome_session_idle_user_locks", "remarks": "rule_set_067" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable the GNOME3 Login User List", + "value": "Ensure Users Cannot Change GNOME3 Session Idle Settings", "remarks": "rule_set_067" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_idle_delay", + "value": "dconf_gnome_screensaver_user_locks", "remarks": "rule_set_068" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set GNOME3 Screensaver Inactivity Timeout", + "value": "Ensure Users Cannot Change GNOME3 Screensaver Settings", "remarks": "rule_set_068" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_lock_delay", + "value": "dconf_gnome_disable_automount", "remarks": "rule_set_069" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set GNOME3 Screensaver Lock Delay After Activation Period", + "value": "Disable GNOME3 Automounting", "remarks": "rule_set_069" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_session_idle_user_locks", + "value": "dconf_gnome_disable_automount_open", "remarks": "rule_set_070" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Users Cannot Change GNOME3 Session Idle Settings", + "value": "Disable GNOME3 Automount Opening", "remarks": "rule_set_070" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_user_locks", + "value": "dconf_gnome_disable_autorun", "remarks": "rule_set_071" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Users Cannot Change GNOME3 Screensaver Settings", + "value": "Disable GNOME3 Automount running", "remarks": "rule_set_071" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_disable_automount", + "value": "service_autofs_disabled", "remarks": "rule_set_072" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable GNOME3 Automounting", + "value": "Disable the Automounter", "remarks": "rule_set_072" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_disable_automount_open", + "value": "service_avahi-daemon_disabled", "remarks": "rule_set_073" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable GNOME3 Automount Opening", + "value": "Disable Avahi Server Software", "remarks": "rule_set_073" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_disable_autorun", + "value": "package_kea_removed", "remarks": "rule_set_074" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable GNOME3 Automount running", + "value": "Uninstall kea Package", "remarks": "rule_set_074" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_autofs_disabled", + "value": "package_bind_removed", "remarks": "rule_set_075" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable the Automounter", + "value": "Uninstall bind Package", "remarks": "rule_set_075" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_avahi-daemon_disabled", + "value": "package_dnsmasq_removed", "remarks": "rule_set_076" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Avahi Server Software", + "value": "Uninstall dnsmasq Package", "remarks": "rule_set_076" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_kea_removed", + "value": "package_vsftpd_removed", "remarks": "rule_set_077" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall kea Package", + "value": "Uninstall vsftpd Package", "remarks": "rule_set_077" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_bind_removed", + "value": "package_dovecot_removed", "remarks": "rule_set_078" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall bind Package", + "value": "Uninstall dovecot Package", "remarks": "rule_set_078" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_dnsmasq_removed", + "value": "package_cyrus-imapd_removed", "remarks": "rule_set_079" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall dnsmasq Package", + "value": "Uninstall cyrus-imapd Package", "remarks": "rule_set_079" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_vsftpd_removed", + "value": "service_nfs_disabled", "remarks": "rule_set_080" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall vsftpd Package", + "value": "Disable Network File System (nfs)", "remarks": "rule_set_080" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_dovecot_removed", + "value": "service_cups_disabled", "remarks": "rule_set_081" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall dovecot Package", + "value": "Disable the CUPS Service", "remarks": "rule_set_081" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_cyrus-imapd_removed", + "value": "service_rpcbind_disabled", "remarks": "rule_set_082" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall cyrus-imapd Package", + "value": "Disable rpcbind Service", "remarks": "rule_set_082" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_nfs_disabled", + "value": "package_rsync_removed", "remarks": "rule_set_083" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Network File System (nfs)", + "value": "Uninstall rsync Package", "remarks": "rule_set_083" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_cups_disabled", + "value": "package_samba_removed", "remarks": "rule_set_084" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable the CUPS Service", + "value": "Uninstall Samba Package", "remarks": "rule_set_084" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_rpcbind_disabled", + "value": "package_net-snmp_removed", "remarks": "rule_set_085" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable rpcbind Service", + "value": "Uninstall net-snmp Package", "remarks": "rule_set_085" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_rsync_removed", + "value": "package_telnet-server_removed", "remarks": "rule_set_086" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall rsync Package", + "value": "Uninstall telnet-server Package", "remarks": "rule_set_086" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_samba_removed", + "value": "package_tftp-server_removed", "remarks": "rule_set_087" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall Samba Package", + "value": "Uninstall tftp-server Package", "remarks": "rule_set_087" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_net-snmp_removed", + "value": "package_squid_removed", "remarks": "rule_set_088" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall net-snmp Package", + "value": "Uninstall squid Package", "remarks": "rule_set_088" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet-server_removed", + "value": "package_httpd_removed", "remarks": "rule_set_089" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall telnet-server Package", + "value": "Uninstall httpd Package", "remarks": "rule_set_089" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_tftp-server_removed", + "value": "package_nginx_removed", "remarks": "rule_set_090" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall tftp-server Package", + "value": "Uninstall nginx Package", "remarks": "rule_set_090" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_squid_removed", + "value": "postfix_network_listening_disabled", "remarks": "rule_set_091" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall squid Package", + "value": "Disable Postfix Network Listening", "remarks": "rule_set_091" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_httpd_removed", + "value": "has_nonlocal_mta", "remarks": "rule_set_092" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall httpd Package", + "value": "Ensure Mail Transfer Agent is not Listening on any non-loopback Address", "remarks": "rule_set_092" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_nginx_removed", + "value": "package_ftp_removed", "remarks": "rule_set_093" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall nginx Package", + "value": "Remove ftp Package", "remarks": "rule_set_093" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "postfix_network_listening_disabled", + "value": "package_telnet_removed", "remarks": "rule_set_094" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Postfix Network Listening", + "value": "Remove telnet Clients", "remarks": "rule_set_094" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "has_nonlocal_mta", + "value": "package_tftp_removed", "remarks": "rule_set_095" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Mail Transfer Agent is not Listening on any non-loopback Address", + "value": "Remove tftp Daemon", "remarks": "rule_set_095" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_ftp_removed", + "value": "chronyd_specify_remote_server", "remarks": "rule_set_096" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove ftp Package", + "value": "A remote time server for Chrony is configured", "remarks": "rule_set_096" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet_removed", + "value": "chronyd_run_as_chrony_user", "remarks": "rule_set_097" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove telnet Clients", + "value": "Ensure that chronyd is running under chrony user account", "remarks": "rule_set_097" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_tftp_removed", + "value": "package_cron_installed", "remarks": "rule_set_098" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove tftp Daemon", + "value": "Install the cron service", "remarks": "rule_set_098" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "chronyd_specify_remote_server", + "value": "service_crond_enabled", "remarks": "rule_set_099" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "A remote time server for Chrony is configured", + "value": "Enable cron Service", "remarks": "rule_set_099" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "chronyd_run_as_chrony_user", + "value": "file_groupowner_crontab", "remarks": "rule_set_100" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that chronyd is running under chrony user account", + "value": "Verify Group Who Owns Crontab", "remarks": "rule_set_100" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_cron_installed", + "value": "file_owner_crontab", "remarks": "rule_set_101" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install the cron service", + "value": "Verify Owner on crontab", "remarks": "rule_set_101" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_crond_enabled", + "value": "file_permissions_crontab", "remarks": "rule_set_102" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable cron Service", + "value": "Verify Permissions on crontab", "remarks": "rule_set_102" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_crontab", + "value": "file_groupowner_cron_hourly", "remarks": "rule_set_103" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Crontab", + "value": "Verify Group Who Owns cron.hourly", "remarks": "rule_set_103" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_crontab", + "value": "file_owner_cron_hourly", "remarks": "rule_set_104" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on crontab", + "value": "Verify Owner on cron.hourly", "remarks": "rule_set_104" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_crontab", + "value": "file_permissions_cron_hourly", "remarks": "rule_set_105" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on crontab", + "value": "Verify Permissions on cron.hourly", "remarks": "rule_set_105" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_cron_hourly", + "value": "file_groupowner_cron_daily", "remarks": "rule_set_106" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns cron.hourly", + "value": "Verify Group Who Owns cron.daily", "remarks": "rule_set_106" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_cron_hourly", + "value": "file_owner_cron_daily", "remarks": "rule_set_107" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on cron.hourly", + "value": "Verify Owner on cron.daily", "remarks": "rule_set_107" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_cron_hourly", + "value": "file_permissions_cron_daily", "remarks": "rule_set_108" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on cron.hourly", + "value": "Verify Permissions on cron.daily", "remarks": "rule_set_108" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_cron_daily", + "value": "file_groupowner_cron_weekly", "remarks": "rule_set_109" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns cron.daily", + "value": "Verify Group Who Owns cron.weekly", "remarks": "rule_set_109" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_cron_daily", + "value": "file_owner_cron_weekly", "remarks": "rule_set_110" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on cron.daily", + "value": "Verify Owner on cron.weekly", "remarks": "rule_set_110" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_cron_daily", + "value": "file_permissions_cron_weekly", "remarks": "rule_set_111" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on cron.daily", + "value": "Verify Permissions on cron.weekly", "remarks": "rule_set_111" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_cron_weekly", + "value": "file_groupowner_cron_monthly", "remarks": "rule_set_112" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns cron.weekly", + "value": "Verify Group Who Owns cron.monthly", "remarks": "rule_set_112" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_cron_weekly", + "value": "file_owner_cron_monthly", "remarks": "rule_set_113" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on cron.weekly", + "value": "Verify Owner on cron.monthly", "remarks": "rule_set_113" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_cron_weekly", + "value": "file_permissions_cron_monthly", "remarks": "rule_set_114" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on cron.weekly", + "value": "Verify Permissions on cron.monthly", "remarks": "rule_set_114" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_cron_monthly", + "value": "file_groupowner_cron_yearly", "remarks": "rule_set_115" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns cron.monthly", + "value": "Verify Group Who Owns cron.yearly", "remarks": "rule_set_115" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_cron_monthly", + "value": "file_owner_cron_yearly", "remarks": "rule_set_116" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on cron.monthly", + "value": "Verify Owner on cron.yearly", "remarks": "rule_set_116" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_cron_monthly", + "value": "file_permissions_cron_yearly", "remarks": "rule_set_117" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on cron.monthly", + "value": "Verify Permissions on cron.yearly", "remarks": "rule_set_117" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_cron_yearly", + "value": "file_groupowner_cron_d", "remarks": "rule_set_118" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns cron.yearly", + "value": "Verify Group Who Owns cron.d", "remarks": "rule_set_118" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_cron_yearly", + "value": "file_owner_cron_d", "remarks": "rule_set_119" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on cron.yearly", + "value": "Verify Owner on cron.d", "remarks": "rule_set_119" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_cron_yearly", + "value": "file_permissions_cron_d", "remarks": "rule_set_120" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on cron.yearly", + "value": "Verify Permissions on cron.d", "remarks": "rule_set_120" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_cron_d", + "value": "file_cron_deny_not_exist", "remarks": "rule_set_121" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns cron.d", + "value": "Ensure that /etc/cron.deny does not exist", "remarks": "rule_set_121" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_cron_d", + "value": "file_cron_allow_exists", "remarks": "rule_set_122" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on cron.d", + "value": "Ensure that /etc/cron.allow exists", "remarks": "rule_set_122" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_cron_d", + "value": "file_groupowner_cron_allow", "remarks": "rule_set_123" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on cron.d", + "value": "Verify Group Who Owns /etc/cron.allow file", "remarks": "rule_set_123" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_cron_deny_not_exist", + "value": "file_owner_cron_allow", "remarks": "rule_set_124" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that /etc/cron.deny does not exist", + "value": "Verify User Who Owns /etc/cron.allow file", "remarks": "rule_set_124" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_cron_allow_exists", + "value": "file_permissions_cron_allow", "remarks": "rule_set_125" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that /etc/cron.allow exists", + "value": "Verify Permissions on /etc/cron.allow file", "remarks": "rule_set_125" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_cron_allow", + "value": "file_at_deny_not_exist", "remarks": "rule_set_126" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns /etc/cron.allow file", + "value": "Ensure that /etc/at.deny does not exist", "remarks": "rule_set_126" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_cron_allow", + "value": "file_at_allow_exists", "remarks": "rule_set_127" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns /etc/cron.allow file", + "value": "Ensure that /etc/at.allow exists", "remarks": "rule_set_127" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_cron_allow", + "value": "file_groupowner_at_allow", "remarks": "rule_set_128" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on /etc/cron.allow file", + "value": "Verify Group Who Owns /etc/at.allow file", "remarks": "rule_set_128" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_at_deny_not_exist", + "value": "file_owner_at_allow", "remarks": "rule_set_129" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that /etc/at.deny does not exist", + "value": "Verify User Who Owns /etc/at.allow file", "remarks": "rule_set_129" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_at_allow_exists", + "value": "file_permissions_at_allow", "remarks": "rule_set_130" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that /etc/at.allow exists", + "value": "Verify Permissions on /etc/at.allow file", "remarks": "rule_set_130" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_at_allow", + "value": "wireless_disable_interfaces", "remarks": "rule_set_131" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns /etc/at.allow file", + "value": "Deactivate Wireless Network Interfaces", "remarks": "rule_set_131" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_at_allow", + "value": "service_bluetooth_disabled", "remarks": "rule_set_132" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns /etc/at.allow file", + "value": "Disable Bluetooth Service", "remarks": "rule_set_132" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_at_allow", + "value": "kernel_module_atm_disabled", "remarks": "rule_set_133" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on /etc/at.allow file", + "value": "Disable ATM Support", "remarks": "rule_set_133" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "wireless_disable_interfaces", + "value": "kernel_module_can_disabled", "remarks": "rule_set_134" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Deactivate Wireless Network Interfaces", + "value": "Disable CAN Support", "remarks": "rule_set_134" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_bluetooth_disabled", + "value": "kernel_module_dccp_disabled", "remarks": "rule_set_135" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Bluetooth Service", + "value": "Disable DCCP Support", "remarks": "rule_set_135" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "kernel_module_atm_disabled", + "value": "kernel_module_tipc_disabled", "remarks": "rule_set_136" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable ATM Support", + "value": "Disable TIPC Support", "remarks": "rule_set_136" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "kernel_module_can_disabled", + "value": "kernel_module_rds_disabled", "remarks": "rule_set_137" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable CAN Support", + "value": "Disable RDS Support", "remarks": "rule_set_137" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "kernel_module_dccp_disabled", + "value": "kernel_module_sctp_disabled", "remarks": "rule_set_138" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable DCCP Support", + "value": "Disable SCTP Support", "remarks": "rule_set_138" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "kernel_module_tipc_disabled", + "value": "sysctl_net_ipv4_conf_all_forwarding", "remarks": "rule_set_139" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable TIPC Support", + "value": "Disable Kernel Parameter for IPv4 Forwarding on all IPv4 Interfaces", "remarks": "rule_set_139" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "kernel_module_rds_disabled", + "value": "sysctl_net_ipv4_conf_default_forwarding", "remarks": "rule_set_140" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable RDS Support", + "value": "Disable Kernel Parameter for IPv4 Forwarding By Default", "remarks": "rule_set_140" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "kernel_module_sctp_disabled", + "value": "sysctl_net_ipv4_conf_all_send_redirects", "remarks": "rule_set_141" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SCTP Support", + "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces", "remarks": "rule_set_141" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_forwarding", + "value": "sysctl_net_ipv4_conf_default_send_redirects", "remarks": "rule_set_142" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for IPv4 Forwarding on all IPv4 Interfaces", + "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces by Default", "remarks": "rule_set_142" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_forwarding", + "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses", "remarks": "rule_set_143" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for IPv4 Forwarding By Default", + "value": "Enable Kernel Parameter to Ignore Bogus ICMP Error Responses on IPv4 Interfaces", "remarks": "rule_set_143" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_send_redirects", + "value": "sysctl_net_ipv4_icmp_echo_ignore_broadcasts", "remarks": "rule_set_144" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces", + "value": "Enable Kernel Parameter to Ignore ICMP Broadcast Echo Requests on IPv4 Interfaces", "remarks": "rule_set_144" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_send_redirects", + "value": "sysctl_net_ipv4_conf_all_accept_redirects", "remarks": "rule_set_145" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces by Default", + "value": "Disable Accepting ICMP Redirects for All IPv4 Interfaces", "remarks": "rule_set_145" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses", + "value": "sysctl_net_ipv4_conf_default_accept_redirects", "remarks": "rule_set_146" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Ignore Bogus ICMP Error Responses on IPv4 Interfaces", + "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv4 Interfaces", "remarks": "rule_set_146" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_icmp_echo_ignore_broadcasts", + "value": "sysctl_net_ipv4_conf_all_secure_redirects", "remarks": "rule_set_147" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Ignore ICMP Broadcast Echo Requests on IPv4 Interfaces", + "value": "Disable Kernel Parameter for Accepting Secure ICMP Redirects on all IPv4 Interfaces", "remarks": "rule_set_147" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_accept_redirects", + "value": "sysctl_net_ipv4_conf_default_secure_redirects", "remarks": "rule_set_148" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Accepting ICMP Redirects for All IPv4 Interfaces", + "value": "Configure Kernel Parameter for Accepting Secure Redirects By Default", "remarks": "rule_set_148" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_accept_redirects", + "value": "sysctl_net_ipv4_conf_all_rp_filter", "remarks": "rule_set_149" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv4 Interfaces", + "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces", "remarks": "rule_set_149" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_secure_redirects", + "value": "sysctl_net_ipv4_conf_default_rp_filter", "remarks": "rule_set_150" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Accepting Secure ICMP Redirects on all IPv4 Interfaces", + "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces by Default", "remarks": "rule_set_150" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_secure_redirects", + "value": "sysctl_net_ipv4_conf_all_accept_source_route", "remarks": "rule_set_151" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Kernel Parameter for Accepting Secure Redirects By Default", + "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces", "remarks": "rule_set_151" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_rp_filter", + "value": "sysctl_net_ipv4_conf_default_accept_source_route", "remarks": "rule_set_152" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces", + "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv4 Interfaces by Default", "remarks": "rule_set_152" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_rp_filter", + "value": "sysctl_net_ipv4_conf_all_log_martians", "remarks": "rule_set_153" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces by Default", + "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces", "remarks": "rule_set_153" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_accept_source_route", + "value": "sysctl_net_ipv4_conf_default_log_martians", "remarks": "rule_set_154" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces", + "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces by Default", "remarks": "rule_set_154" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_accept_source_route", + "value": "sysctl_net_ipv4_tcp_syncookies", "remarks": "rule_set_155" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv4 Interfaces by Default", + "value": "Enable Kernel Parameter to Use TCP Syncookies on Network Interfaces", "remarks": "rule_set_155" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_log_martians", + "value": "sysctl_net_ipv6_conf_all_forwarding", "remarks": "rule_set_156" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces", + "value": "Disable Kernel Parameter for IPv6 Forwarding", "remarks": "rule_set_156" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_log_martians", + "value": "sysctl_net_ipv6_conf_default_forwarding", "remarks": "rule_set_157" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces by Default", + "value": "Disable Kernel Parameter for IPv6 Forwarding by default", "remarks": "rule_set_157" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_tcp_syncookies", + "value": "sysctl_net_ipv6_conf_all_accept_redirects", "remarks": "rule_set_158" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Use TCP Syncookies on Network Interfaces", + "value": "Disable Accepting ICMP Redirects for All IPv6 Interfaces", "remarks": "rule_set_158" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_forwarding", + "value": "sysctl_net_ipv6_conf_default_accept_redirects", "remarks": "rule_set_159" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for IPv6 Forwarding", + "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv6 Interfaces", "remarks": "rule_set_159" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_forwarding", + "value": "sysctl_net_ipv6_conf_all_accept_source_route", "remarks": "rule_set_160" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for IPv6 Forwarding by default", + "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv6 Interfaces", "remarks": "rule_set_160" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_accept_redirects", + "value": "sysctl_net_ipv6_conf_default_accept_source_route", "remarks": "rule_set_161" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Accepting ICMP Redirects for All IPv6 Interfaces", + "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv6 Interfaces by Default", "remarks": "rule_set_161" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_accept_redirects", + "value": "sysctl_net_ipv6_conf_all_accept_ra", "remarks": "rule_set_162" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv6 Interfaces", + "value": "Configure Accepting Router Advertisements on All IPv6 Interfaces", "remarks": "rule_set_162" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_accept_source_route", + "value": "sysctl_net_ipv6_conf_default_accept_ra", "remarks": "rule_set_163" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv6 Interfaces", + "value": "Disable Accepting Router Advertisements on all IPv6 Interfaces by Default", "remarks": "rule_set_163" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_accept_source_route", + "value": "package_firewalld_installed", "remarks": "rule_set_164" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv6 Interfaces by Default", + "value": "Install firewalld Package", "remarks": "rule_set_164" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_accept_ra", + "value": "firewalld-backend", "remarks": "rule_set_165" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Accepting Router Advertisements on All IPv6 Interfaces", + "value": "Configure Firewalld to Use the Nftables Backend", "remarks": "rule_set_165" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_accept_ra", + "value": "service_firewalld_enabled", "remarks": "rule_set_166" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Accepting Router Advertisements on all IPv6 Interfaces by Default", + "value": "Verify firewalld Enabled", "remarks": "rule_set_166" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_firewalld_installed", + "value": "firewalld_loopback_traffic_trusted", "remarks": "rule_set_167" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install firewalld Package", + "value": "Configure Firewalld to Trust Loopback Traffic", "remarks": "rule_set_167" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "firewalld-backend", + "value": "file_groupowner_sshd_config", "remarks": "rule_set_168" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Firewalld to Use the Nftables Backend", + "value": "Verify Group Who Owns SSH Server config file", "remarks": "rule_set_168" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_firewalld_enabled", + "value": "file_owner_sshd_config", "remarks": "rule_set_169" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify firewalld Enabled", + "value": "Verify Owner on SSH Server config file", "remarks": "rule_set_169" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "firewalld_loopback_traffic_trusted", + "value": "file_permissions_sshd_config", "remarks": "rule_set_170" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Firewalld to Trust Loopback Traffic", + "value": "Verify Permissions on SSH Server config file", "remarks": "rule_set_170" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_sshd_config", + "value": "directory_permissions_sshd_config_d", "remarks": "rule_set_171" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns SSH Server config file", + "value": "Verify Permissions on SSH Server Config File", "remarks": "rule_set_171" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_sshd_config", + "value": "file_permissions_sshd_drop_in_config", "remarks": "rule_set_172" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on SSH Server config file", + "value": "Verify Permissions on SSH Server Config File", "remarks": "rule_set_172" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_sshd_config", + "value": "directory_groupowner_sshd_config_d", "remarks": "rule_set_173" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on SSH Server config file", + "value": "Verify Group Who Owns SSH Server Configuration Files", "remarks": "rule_set_173" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "directory_permissions_sshd_config_d", + "value": "directory_owner_sshd_config_d", "remarks": "rule_set_174" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on SSH Server Config File", + "value": "Verify Owner on SSH Server Configuration Files", "remarks": "rule_set_174" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_sshd_drop_in_config", + "value": "file_groupowner_sshd_drop_in_config", "remarks": "rule_set_175" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on SSH Server Config File", + "value": "Verify Group Who Owns SSH Server Configuration Files", "remarks": "rule_set_175" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "directory_groupowner_sshd_config_d", + "value": "file_owner_sshd_drop_in_config", "remarks": "rule_set_176" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns SSH Server Configuration Files", + "value": "Verify Owner on SSH Server Configuration Files", "remarks": "rule_set_176" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "directory_owner_sshd_config_d", + "value": "file_groupownership_sshd_private_key", "remarks": "rule_set_177" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on SSH Server Configuration Files", + "value": "Verify Group Ownership on SSH Server Private *_key Key Files", "remarks": "rule_set_177" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_sshd_drop_in_config", + "value": "file_ownership_sshd_private_key", "remarks": "rule_set_178" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns SSH Server Configuration Files", + "value": "Verify Ownership on SSH Server Private *_key Key Files", "remarks": "rule_set_178" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_sshd_drop_in_config", + "value": "file_permissions_sshd_private_key", "remarks": "rule_set_179" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on SSH Server Configuration Files", + "value": "Verify Permissions on SSH Server Private *_key Key Files", "remarks": "rule_set_179" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupownership_sshd_private_key", + "value": "file_groupownership_sshd_pub_key", "remarks": "rule_set_180" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Ownership on SSH Server Private *_key Key Files", + "value": "Verify Group Ownership on SSH Server Public *.pub Key Files", "remarks": "rule_set_180" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_ownership_sshd_private_key", + "value": "file_ownership_sshd_pub_key", "remarks": "rule_set_181" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Ownership on SSH Server Private *_key Key Files", + "value": "Verify Ownership on SSH Server Public *.pub Key Files", "remarks": "rule_set_181" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_sshd_private_key", + "value": "file_permissions_sshd_pub_key", "remarks": "rule_set_182" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on SSH Server Private *_key Key Files", + "value": "Verify Permissions on SSH Server Public *.pub Key Files", "remarks": "rule_set_182" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupownership_sshd_pub_key", + "value": "sshd_limit_user_access", "remarks": "rule_set_183" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Ownership on SSH Server Public *.pub Key Files", + "value": "Limit Users' SSH Access", "remarks": "rule_set_183" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_ownership_sshd_pub_key", + "value": "sshd_enable_warning_banner_net", "remarks": "rule_set_184" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Ownership on SSH Server Public *.pub Key Files", + "value": "Enable SSH Warning Banner", "remarks": "rule_set_184" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_sshd_pub_key", + "value": "sshd_set_idle_timeout", "remarks": "rule_set_185" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on SSH Server Public *.pub Key Files", + "value": "Set SSH Client Alive Interval", "remarks": "rule_set_185" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_limit_user_access", + "value": "sshd_set_keepalive", "remarks": "rule_set_186" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Limit Users' SSH Access", + "value": "Set SSH Client Alive Count Max", "remarks": "rule_set_186" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_enable_warning_banner_net", + "value": "disable_host_auth", "remarks": "rule_set_187" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable SSH Warning Banner", + "value": "Disable Host-Based Authentication", "remarks": "rule_set_187" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_set_idle_timeout", + "value": "sshd_disable_rhosts", "remarks": "rule_set_188" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set SSH Client Alive Interval", + "value": "Disable SSH Support for .rhosts Files", "remarks": "rule_set_188" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_set_keepalive", + "value": "sshd_use_strong_kex", "remarks": "rule_set_189" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set SSH Client Alive Count Max", + "value": "Use Only Strong Key Exchange algorithms", "remarks": "rule_set_189" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "disable_host_auth", + "value": "sshd_set_login_grace_time", "remarks": "rule_set_190" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Host-Based Authentication", + "value": "Ensure SSH LoginGraceTime is configured", "remarks": "rule_set_190" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_rhosts", + "value": "sshd_set_loglevel_verbose", "remarks": "rule_set_191" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Support for .rhosts Files", + "value": "Set SSH Daemon LogLevel to VERBOSE", "remarks": "rule_set_191" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_use_strong_kex", + "value": "sshd_set_max_auth_tries", "remarks": "rule_set_192" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Use Only Strong Key Exchange algorithms", + "value": "Set SSH authentication attempt limit", "remarks": "rule_set_192" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_set_login_grace_time", + "value": "sshd_set_maxstartups", "remarks": "rule_set_193" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure SSH LoginGraceTime is configured", + "value": "Ensure SSH MaxStartups is configured", "remarks": "rule_set_193" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_set_loglevel_verbose", + "value": "sshd_set_max_sessions", "remarks": "rule_set_194" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set SSH Daemon LogLevel to VERBOSE", + "value": "Set SSH MaxSessions limit", "remarks": "rule_set_194" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_set_max_auth_tries", + "value": "sshd_disable_empty_passwords", "remarks": "rule_set_195" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set SSH authentication attempt limit", + "value": "Disable SSH Access via Empty Passwords", "remarks": "rule_set_195" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_set_maxstartups", + "value": "sshd_disable_root_login", "remarks": "rule_set_196" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure SSH MaxStartups is configured", + "value": "Disable SSH Root Login", "remarks": "rule_set_196" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_set_max_sessions", + "value": "sshd_do_not_permit_user_env", "remarks": "rule_set_197" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set SSH MaxSessions limit", + "value": "Do Not Allow SSH Environment Options", "remarks": "rule_set_197" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_empty_passwords", + "value": "sshd_enable_pam", "remarks": "rule_set_198" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Access via Empty Passwords", + "value": "Enable PAM", "remarks": "rule_set_198" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_root_login", + "value": "package_sudo_installed", "remarks": "rule_set_199" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Root Login", + "value": "Install sudo Package", "remarks": "rule_set_199" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_do_not_permit_user_env", + "value": "sudo_add_use_pty", "remarks": "rule_set_200" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Do Not Allow SSH Environment Options", + "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo use_pty", "remarks": "rule_set_200" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_enable_pam", + "value": "sudo_custom_logfile", "remarks": "rule_set_201" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable PAM", + "value": "Ensure Sudo Logfile Exists - sudo logfile", "remarks": "rule_set_201" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_sudo_installed", + "value": "sudo_remove_no_authenticate", "remarks": "rule_set_202" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install sudo Package", + "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo !authenticate", "remarks": "rule_set_202" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sudo_add_use_pty", + "value": "sudo_require_reauthentication", "remarks": "rule_set_203" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo use_pty", + "value": "Require Re-Authentication When Using the sudo Command", "remarks": "rule_set_203" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sudo_custom_logfile", + "value": "use_pam_wheel_group_for_su", "remarks": "rule_set_204" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Sudo Logfile Exists - sudo logfile", + "value": "Enforce Usage of pam_wheel with Group Parameter for su Authentication", "remarks": "rule_set_204" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sudo_remove_no_authenticate", + "value": "ensure_pam_wheel_group_empty", "remarks": "rule_set_205" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo !authenticate", + "value": "Ensure the Group Used by pam_wheel.so Module Exists on System and is Empty", "remarks": "rule_set_205" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sudo_require_reauthentication", + "value": "account_password_pam_faillock_password_auth", "remarks": "rule_set_206" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Require Re-Authentication When Using the sudo Command", + "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/password-auth File.", "remarks": "rule_set_206" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "use_pam_wheel_group_for_su", + "value": "account_password_pam_faillock_system_auth", "remarks": "rule_set_207" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enforce Usage of pam_wheel with Group Parameter for su Authentication", + "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/system-auth File.", "remarks": "rule_set_207" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_pam_wheel_group_empty", + "value": "package_pam_pwquality_installed", "remarks": "rule_set_208" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Group Used by pam_wheel.so Module Exists on System and is Empty", + "value": "Install pam_pwquality Package", "remarks": "rule_set_208" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "account_password_pam_faillock_password_auth", + "value": "accounts_password_pam_pwquality_password_auth", "remarks": "rule_set_209" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/password-auth File.", + "value": "Ensure PAM password complexity module is enabled in password-auth", "remarks": "rule_set_209" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "account_password_pam_faillock_system_auth", + "value": "accounts_password_pam_pwquality_system_auth", "remarks": "rule_set_210" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/system-auth File.", + "value": "Ensure PAM password complexity module is enabled in system-auth", "remarks": "rule_set_210" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_pam_pwquality_installed", + "value": "accounts_password_pam_unix_enabled", "remarks": "rule_set_211" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install pam_pwquality Package", + "value": "Verify pam_unix module is activated", "remarks": "rule_set_211" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_pwquality_password_auth", + "value": "accounts_passwords_pam_faillock_deny", "remarks": "rule_set_212" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure PAM password complexity module is enabled in password-auth", + "value": "Lock Accounts After Failed Password Attempts", "remarks": "rule_set_212" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_pwquality_system_auth", + "value": "accounts_passwords_pam_faillock_unlock_time_with_zero", "remarks": "rule_set_213" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure PAM password complexity module is enabled in system-auth", + "value": "Set Lockout Time for Failed Password Attempts", "remarks": "rule_set_213" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_unix_enabled", + "value": "accounts_password_pam_difok", "remarks": "rule_set_214" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify pam_unix module is activated", + "value": "Ensure PAM Enforces Password Requirements - Minimum Different Characters", "remarks": "rule_set_214" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_passwords_pam_faillock_deny", + "value": "accounts_password_pam_minlen", "remarks": "rule_set_215" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Lock Accounts After Failed Password Attempts", + "value": "Ensure PAM Enforces Password Requirements - Minimum Length", "remarks": "rule_set_215" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_passwords_pam_faillock_unlock_time_with_zero", + "value": "accounts_password_pam_minclass", "remarks": "rule_set_216" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Lockout Time for Failed Password Attempts", + "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", "remarks": "rule_set_216" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_difok", + "value": "accounts_password_pam_maxrepeat", "remarks": "rule_set_217" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure PAM Enforces Password Requirements - Minimum Different Characters", + "value": "Set Password Maximum Consecutive Repeating Characters", "remarks": "rule_set_217" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_minlen", + "value": "accounts_password_pam_maxsequence", "remarks": "rule_set_218" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure PAM Enforces Password Requirements - Minimum Length", + "value": "Limit the maximum number of sequential characters in passwords", "remarks": "rule_set_218" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_minclass", + "value": "accounts_password_pam_dictcheck", "remarks": "rule_set_219" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", + "value": "Ensure PAM Enforces Password Requirements - Prevent the Use of Dictionary Words", "remarks": "rule_set_219" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_maxrepeat", + "value": "accounts_password_pam_enforce_root", "remarks": "rule_set_220" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Maximum Consecutive Repeating Characters", + "value": "Ensure PAM Enforces Password Requirements - Enforce for root User", "remarks": "rule_set_220" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_maxsequence", + "value": "accounts_password_pam_pwhistory_remember_password_auth", "remarks": "rule_set_221" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Limit the maximum number of sequential characters in passwords", + "value": "Limit Password Reuse: password-auth", "remarks": "rule_set_221" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_dictcheck", + "value": "accounts_password_pam_pwhistory_remember_system_auth", "remarks": "rule_set_222" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure PAM Enforces Password Requirements - Prevent the Use of Dictionary Words", + "value": "Limit Password Reuse: system-auth", "remarks": "rule_set_222" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_enforce_root", + "value": "accounts_password_pam_pwhistory_enforce_for_root", "remarks": "rule_set_223" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure PAM Enforces Password Requirements - Enforce for root User", + "value": "Ensure Password History Is Enforced for the Root User", "remarks": "rule_set_223" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_pwhistory_remember_password_auth", + "value": "accounts_password_pam_pwhistory_use_authtok", "remarks": "rule_set_224" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Limit Password Reuse: password-auth", + "value": "Enforce Password History with use_authtok", "remarks": "rule_set_224" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_pwhistory_remember_system_auth", + "value": "no_empty_passwords", "remarks": "rule_set_225" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Limit Password Reuse: system-auth", + "value": "Prevent Login to Accounts With Empty Password", "remarks": "rule_set_225" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_pwhistory_enforce_for_root", + "value": "accounts_password_pam_unix_no_remember", "remarks": "rule_set_226" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Password History Is Enforced for the Root User", + "value": "Avoid using remember in pam_unix module", "remarks": "rule_set_226" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_pwhistory_use_authtok", + "value": "set_password_hashing_algorithm_systemauth", "remarks": "rule_set_227" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enforce Password History with use_authtok", + "value": "Set PAM Password Hashing Algorithm - system-auth", "remarks": "rule_set_227" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_empty_passwords", + "value": "set_password_hashing_algorithm_passwordauth", "remarks": "rule_set_228" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Prevent Login to Accounts With Empty Password", + "value": "Set PAM Password Hashing Algorithm - password-auth", "remarks": "rule_set_228" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_unix_no_remember", + "value": "accounts_password_pam_unix_authtok", "remarks": "rule_set_229" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Avoid using remember in pam_unix module", + "value": "Require use_authtok for pam_unix.so", "remarks": "rule_set_229" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_systemauth", + "value": "accounts_maximum_age_login_defs", "remarks": "rule_set_230" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set PAM Password Hashing Algorithm - system-auth", + "value": "Set Password Maximum Age", "remarks": "rule_set_230" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_passwordauth", + "value": "accounts_password_set_max_life_existing", "remarks": "rule_set_231" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set PAM Password Hashing Algorithm - password-auth", + "value": "Set Existing Passwords Maximum Age", "remarks": "rule_set_231" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_unix_authtok", + "value": "accounts_password_warn_age_login_defs", "remarks": "rule_set_232" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Require use_authtok for pam_unix.so", + "value": "Set Password Warning Age", "remarks": "rule_set_232" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_maximum_age_login_defs", + "value": "accounts_password_set_warn_age_existing", "remarks": "rule_set_233" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Maximum Age", + "value": "Set Existing Passwords Warning Age", "remarks": "rule_set_233" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_set_max_life_existing", + "value": "set_password_hashing_algorithm_libuserconf", "remarks": "rule_set_234" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Existing Passwords Maximum Age", + "value": "Set Password Hashing Algorithm in /etc/libuser.conf", "remarks": "rule_set_234" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_warn_age_login_defs", + "value": "set_password_hashing_algorithm_logindefs", "remarks": "rule_set_235" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Warning Age", + "value": "Set Password Hashing Algorithm in /etc/login.defs", "remarks": "rule_set_235" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_set_warn_age_existing", + "value": "account_disable_post_pw_expiration", "remarks": "rule_set_236" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Existing Passwords Warning Age", + "value": "Set Account Expiration Following Inactivity", "remarks": "rule_set_236" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_libuserconf", + "value": "accounts_set_post_pw_existing", "remarks": "rule_set_237" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Hashing Algorithm in /etc/libuser.conf", + "value": "Set existing passwords a period of inactivity before they been locked", "remarks": "rule_set_237" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_logindefs", + "value": "accounts_password_last_change_is_in_past", "remarks": "rule_set_238" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Hashing Algorithm in /etc/login.defs", + "value": "Ensure all users last password change date is in the past", "remarks": "rule_set_238" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "account_disable_post_pw_expiration", + "value": "accounts_no_uid_except_zero", "remarks": "rule_set_239" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Account Expiration Following Inactivity", + "value": "Verify Only Root Has UID 0", "remarks": "rule_set_239" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_set_post_pw_existing", + "value": "accounts_root_gid_zero", "remarks": "rule_set_240" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set existing passwords a period of inactivity before they been locked", + "value": "Verify Root Has A Primary GID 0", "remarks": "rule_set_240" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_last_change_is_in_past", + "value": "groups_no_zero_gid_except_root", "remarks": "rule_set_241" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure all users last password change date is in the past", + "value": "Verify Only Group Root Has GID 0", "remarks": "rule_set_241" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_no_uid_except_zero", + "value": "ensure_root_password_configured", "remarks": "rule_set_242" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Only Root Has UID 0", + "value": "Ensure Authentication Required for Single User Mode", "remarks": "rule_set_242" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_root_gid_zero", + "value": "accounts_root_path_dirs_no_write", "remarks": "rule_set_243" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Root Has A Primary GID 0", + "value": "Ensure that Root's Path Does Not Include World or Group-Writable Directories", "remarks": "rule_set_243" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "groups_no_zero_gid_except_root", + "value": "root_path_no_dot", "remarks": "rule_set_244" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Only Group Root Has GID 0", + "value": "Ensure that Root's Path Does Not Include Relative Paths or Null Directories", "remarks": "rule_set_244" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_root_password_configured", + "value": "accounts_umask_root", "remarks": "rule_set_245" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Authentication Required for Single User Mode", + "value": "Ensure the Root Bash Umask is Set Correctly", "remarks": "rule_set_245" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_root_path_dirs_no_write", + "value": "no_password_auth_for_systemaccounts", "remarks": "rule_set_246" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that Root's Path Does Not Include World or Group-Writable Directories", + "value": "Ensure that System Accounts Are Locked", "remarks": "rule_set_246" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "root_path_no_dot", + "value": "no_shelllogin_for_systemaccounts", "remarks": "rule_set_247" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that Root's Path Does Not Include Relative Paths or Null Directories", + "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", "remarks": "rule_set_247" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_root", + "value": "no_invalid_shell_accounts_unlocked", "remarks": "rule_set_248" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Root Bash Umask is Set Correctly", + "value": "Verify Non-Interactive Accounts Are Locked", "remarks": "rule_set_248" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_password_auth_for_systemaccounts", + "value": "accounts_tmout", "remarks": "rule_set_249" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that System Accounts Are Locked", + "value": "Set Interactive Session Timeout", "remarks": "rule_set_249" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_shelllogin_for_systemaccounts", + "value": "accounts_umask_etc_bashrc", "remarks": "rule_set_250" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", + "value": "Ensure the Default Bash Umask is Set Correctly", "remarks": "rule_set_250" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_invalid_shell_accounts_unlocked", + "value": "accounts_umask_etc_login_defs", "remarks": "rule_set_251" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Non-Interactive Accounts Are Locked", + "value": "Ensure the Default Umask is Set Correctly in login.defs", "remarks": "rule_set_251" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_tmout", + "value": "accounts_umask_etc_profile", "remarks": "rule_set_252" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Interactive Session Timeout", + "value": "Ensure the Default Umask is Set Correctly in /etc/profile", "remarks": "rule_set_252" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_bashrc", + "value": "package_aide_installed", "remarks": "rule_set_253" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Bash Umask is Set Correctly", + "value": "Install AIDE", "remarks": "rule_set_253" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_login_defs", + "value": "aide_build_database", "remarks": "rule_set_254" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Umask is Set Correctly in login.defs", + "value": "Build and Test AIDE Database", "remarks": "rule_set_254" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_profile", + "value": "aide_periodic_cron_checking", "remarks": "rule_set_255" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Umask is Set Correctly in /etc/profile", + "value": "Configure Periodic Execution of AIDE", "remarks": "rule_set_255" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_aide_installed", + "value": "aide_check_audit_tools", "remarks": "rule_set_256" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install AIDE", + "value": "Configure AIDE to Verify the Audit Tools", "remarks": "rule_set_256" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_build_database", + "value": "service_systemd-journald_enabled", "remarks": "rule_set_257" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Build and Test AIDE Database", + "value": "Enable systemd-journald Service", "remarks": "rule_set_257" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_periodic_cron_checking", + "value": "ensure_journald_and_rsyslog_not_active_together", "remarks": "rule_set_258" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Periodic Execution of AIDE", + "value": "Ensure journald and rsyslog Are Not Active Together", "remarks": "rule_set_258" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_check_audit_tools", + "value": "package_systemd-journal-remote_installed", "remarks": "rule_set_259" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure AIDE to Verify the Audit Tools", + "value": "Install systemd-journal-remote Package", "remarks": "rule_set_259" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_systemd-journald_enabled", + "value": "service_systemd-journal-upload_enabled", "remarks": "rule_set_260" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable systemd-journald Service", + "value": "Enable systemd-journal-upload Service", "remarks": "rule_set_260" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_journald_and_rsyslog_not_active_together", + "value": "socket_systemd-journal-remote_disabled", "remarks": "rule_set_261" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald and rsyslog Are Not Active Together", + "value": "Disable systemd-journal-remote Socket", "remarks": "rule_set_261" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_systemd-journal-remote_installed", + "value": "journald_disable_forward_to_syslog", "remarks": "rule_set_262" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install systemd-journal-remote Package", + "value": "Ensure journald ForwardToSyslog is disabled", "remarks": "rule_set_262" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_systemd-journal-upload_enabled", + "value": "journald_compress", "remarks": "rule_set_263" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable systemd-journal-upload Service", + "value": "Ensure journald is configured to compress large log files", "remarks": "rule_set_263" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "socket_systemd-journal-remote_disabled", + "value": "journald_storage", "remarks": "rule_set_264" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable systemd-journal-remote Socket", + "value": "Ensure journald is configured to write log files to persistent disk", "remarks": "rule_set_264" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_disable_forward_to_syslog", + "value": "rsyslog_files_groupownership", "remarks": "rule_set_265" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald ForwardToSyslog is disabled", + "value": "Ensure Log Files Are Owned By Appropriate Group", "remarks": "rule_set_265" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_compress", + "value": "rsyslog_files_ownership", "remarks": "rule_set_266" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald is configured to compress large log files", + "value": "Ensure Log Files Are Owned By Appropriate User", "remarks": "rule_set_266" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_storage", + "value": "rsyslog_files_permissions", "remarks": "rule_set_267" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald is configured to write log files to persistent disk", + "value": "Ensure System Log Files Have Correct Permissions", "remarks": "rule_set_267" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_groupownership", + "value": "file_groupowner_etc_passwd", "remarks": "rule_set_268" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Log Files Are Owned By Appropriate Group", + "value": "Verify Group Who Owns passwd File", "remarks": "rule_set_268" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_ownership", + "value": "file_owner_etc_passwd", "remarks": "rule_set_269" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Log Files Are Owned By Appropriate User", + "value": "Verify User Who Owns passwd File", "remarks": "rule_set_269" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_permissions", + "value": "file_permissions_etc_passwd", "remarks": "rule_set_270" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure System Log Files Have Correct Permissions", + "value": "Verify Permissions on passwd File", "remarks": "rule_set_270" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_passwd", + "value": "file_groupowner_backup_etc_passwd", "remarks": "rule_set_271" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns passwd File", + "value": "Verify Group Who Owns Backup passwd File", "remarks": "rule_set_271" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_passwd", + "value": "file_owner_backup_etc_passwd", "remarks": "rule_set_272" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns passwd File", + "value": "Verify User Who Owns Backup passwd File", "remarks": "rule_set_272" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_passwd", + "value": "file_permissions_backup_etc_passwd", "remarks": "rule_set_273" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on passwd File", + "value": "Verify Permissions on Backup passwd File", "remarks": "rule_set_273" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_passwd", + "value": "file_groupowner_etc_group", "remarks": "rule_set_274" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup passwd File", + "value": "Verify Group Who Owns group File", "remarks": "rule_set_274" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_passwd", + "value": "file_owner_etc_group", "remarks": "rule_set_275" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup passwd File", + "value": "Verify User Who Owns group File", "remarks": "rule_set_275" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_passwd", + "value": "file_permissions_etc_group", "remarks": "rule_set_276" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup passwd File", + "value": "Verify Permissions on group File", "remarks": "rule_set_276" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_group", + "value": "file_groupowner_backup_etc_group", "remarks": "rule_set_277" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns group File", + "value": "Verify Group Who Owns Backup group File", "remarks": "rule_set_277" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_group", + "value": "file_owner_backup_etc_group", "remarks": "rule_set_278" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns group File", + "value": "Verify User Who Owns Backup group File", "remarks": "rule_set_278" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_group", + "value": "file_permissions_backup_etc_group", "remarks": "rule_set_279" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on group File", + "value": "Verify Permissions on Backup group File", "remarks": "rule_set_279" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_group", + "value": "file_owner_etc_shadow", "remarks": "rule_set_280" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup group File", + "value": "Verify User Who Owns shadow File", "remarks": "rule_set_280" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_group", + "value": "file_groupowner_etc_shadow", "remarks": "rule_set_281" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup group File", + "value": "Verify Group Who Owns shadow File", "remarks": "rule_set_281" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_group", + "value": "file_permissions_etc_shadow", "remarks": "rule_set_282" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup group File", + "value": "Verify Permissions on shadow File", "remarks": "rule_set_282" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_shadow", + "value": "file_groupowner_backup_etc_shadow", "remarks": "rule_set_283" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns shadow File", + "value": "Verify User Who Owns Backup shadow File", "remarks": "rule_set_283" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_shadow", + "value": "file_owner_backup_etc_shadow", "remarks": "rule_set_284" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns shadow File", + "value": "Verify Group Who Owns Backup shadow File", "remarks": "rule_set_284" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_shadow", + "value": "file_permissions_backup_etc_shadow", "remarks": "rule_set_285" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on shadow File", + "value": "Verify Permissions on Backup shadow File", "remarks": "rule_set_285" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_shadow", + "value": "file_groupowner_etc_gshadow", "remarks": "rule_set_286" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup shadow File", + "value": "Verify Group Who Owns gshadow File", "remarks": "rule_set_286" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_shadow", + "value": "file_owner_etc_gshadow", "remarks": "rule_set_287" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup shadow File", + "value": "Verify User Who Owns gshadow File", "remarks": "rule_set_287" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_shadow", + "value": "file_permissions_etc_gshadow", "remarks": "rule_set_288" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup shadow File", + "value": "Verify Permissions on gshadow File", "remarks": "rule_set_288" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_gshadow", + "value": "file_groupowner_backup_etc_gshadow", "remarks": "rule_set_289" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns gshadow File", + "value": "Verify Group Who Owns Backup gshadow File", "remarks": "rule_set_289" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_gshadow", + "value": "file_owner_backup_etc_gshadow", "remarks": "rule_set_290" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns gshadow File", + "value": "Verify User Who Owns Backup gshadow File", "remarks": "rule_set_290" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_gshadow", + "value": "file_permissions_backup_etc_gshadow", "remarks": "rule_set_291" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on gshadow File", + "value": "Verify Permissions on Backup gshadow File", "remarks": "rule_set_291" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_gshadow", + "value": "file_groupowner_etc_shells", "remarks": "rule_set_292" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup gshadow File", + "value": "Verify Group Who Owns /etc/shells File", "remarks": "rule_set_292" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_gshadow", + "value": "file_owner_etc_shells", "remarks": "rule_set_293" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup gshadow File", + "value": "Verify Who Owns /etc/shells File", "remarks": "rule_set_293" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_gshadow", + "value": "file_permissions_etc_shells", "remarks": "rule_set_294" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup gshadow File", + "value": "Verify Permissions on /etc/shells File", "remarks": "rule_set_294" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_shells", + "value": "file_groupowner_etc_security_opasswd", "remarks": "rule_set_295" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns /etc/shells File", + "value": "Verify Group Who Owns /etc/security/opasswd File", "remarks": "rule_set_295" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_shells", + "value": "file_owner_etc_security_opasswd", "remarks": "rule_set_296" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Who Owns /etc/shells File", + "value": "Verify User Who Owns /etc/security/opasswd File", "remarks": "rule_set_296" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_shells", + "value": "file_permissions_etc_security_opasswd", "remarks": "rule_set_297" }, - { - "name": "Rule_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on /etc/shells File", - "remarks": "rule_set_297" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_security_opasswd", - "remarks": "rule_set_298" - }, - { - "name": "Rule_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns /etc/security/opasswd File", - "remarks": "rule_set_298" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_security_opasswd", - "remarks": "rule_set_299" - }, - { - "name": "Rule_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns /etc/security/opasswd File", - "remarks": "rule_set_299" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_security_opasswd", - "remarks": "rule_set_300" - }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd File", - "remarks": "rule_set_300" + "remarks": "rule_set_297" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd_old", - "remarks": "rule_set_301" + "remarks": "rule_set_298" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_301" + "remarks": "rule_set_298" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd_old", - "remarks": "rule_set_302" + "remarks": "rule_set_299" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_302" + "remarks": "rule_set_299" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd_old", - "remarks": "rule_set_303" + "remarks": "rule_set_300" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd.old File", - "remarks": "rule_set_303" + "remarks": "rule_set_300" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_304" + "remarks": "rule_set_301" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_304" + "remarks": "rule_set_301" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_305" + "remarks": "rule_set_302" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_305" + "remarks": "rule_set_302" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_unowned_by_user", - "remarks": "rule_set_306" + "remarks": "rule_set_303" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a User", - "remarks": "rule_set_306" + "remarks": "rule_set_303" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_ungroupowned", - "remarks": "rule_set_307" + "remarks": "rule_set_304" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a Group", - "remarks": "rule_set_307" + "remarks": "rule_set_304" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_all_shadowed", - "remarks": "rule_set_308" + "remarks": "rule_set_305" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify All Account Password Hashes are Shadowed", - "remarks": "rule_set_308" + "remarks": "rule_set_305" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords_etc_shadow", - "remarks": "rule_set_309" + "remarks": "rule_set_306" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure There Are No Accounts With Blank or Null Passwords", - "remarks": "rule_set_309" + "remarks": "rule_set_306" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gid_passwd_group_same", - "remarks": "rule_set_310" + "remarks": "rule_set_307" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", - "remarks": "rule_set_310" + "remarks": "rule_set_307" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_id", - "remarks": "rule_set_311" + "remarks": "rule_set_308" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique User IDs", - "remarks": "rule_set_311" + "remarks": "rule_set_308" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_id", - "remarks": "rule_set_312" + "remarks": "rule_set_309" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group ID", - "remarks": "rule_set_312" + "remarks": "rule_set_309" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_name", - "remarks": "rule_set_313" + "remarks": "rule_set_310" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique Names", - "remarks": "rule_set_313" + "remarks": "rule_set_310" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_name", - "remarks": "rule_set_314" + "remarks": "rule_set_311" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group Names", - "remarks": "rule_set_314" + "remarks": "rule_set_311" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_interactive_home_directory_exists", - "remarks": "rule_set_315" + "remarks": "rule_set_312" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive Users Home Directories Must Exist", - "remarks": "rule_set_315" + "remarks": "rule_set_312" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_home_directories", - "remarks": "rule_set_316" + "remarks": "rule_set_313" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Be Owned By The Primary User", - "remarks": "rule_set_316" + "remarks": "rule_set_313" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_home_directories", - "remarks": "rule_set_317" + "remarks": "rule_set_314" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", - "remarks": "rule_set_317" + "remarks": "rule_set_314" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_318" + "remarks": "rule_set_315" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_318" + "remarks": "rule_set_315" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_319" + "remarks": "rule_set_316" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_319" + "remarks": "rule_set_316" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_no_world_writable_programs", - "remarks": "rule_set_320" + "remarks": "rule_set_317" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Not Run World-Writable Programs", - "remarks": "rule_set_320" + "remarks": "rule_set_317" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_321" + "remarks": "rule_set_318" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_321" + "remarks": "rule_set_318" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_forward_files", - "remarks": "rule_set_322" + "remarks": "rule_set_319" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .forward Files Exist", - "remarks": "rule_set_322" + "remarks": "rule_set_319" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_netrc_files", - "remarks": "rule_set_323" + "remarks": "rule_set_320" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No netrc Files Exist", - "remarks": "rule_set_323" + "remarks": "rule_set_320" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rhost_files", - "remarks": "rule_set_324" + "remarks": "rule_set_321" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .rhost Files Exist", - "remarks": "rule_set_324" + "remarks": "rule_set_321" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_bash_history", - "remarks": "rule_set_325" + "remarks": "rule_set_322" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure User Bash History File Has Correct Permissions", - "remarks": "rule_set_325" + "remarks": "rule_set_322" } ], "control-implementations": [ { - "uuid": "04e970cf-1d25-48df-8c58-d13c6676885e", + "uuid": "356260a3-c428-4a67-9676-2622578bebc6", "source": "trestle://profiles/rhel10-cis_rhel10-l1_server/profile.json", "description": "Control implementation for cis_server_l1", "props": [ @@ -5311,7 +5275,7 @@ ], "implemented-requirements": [ { - "uuid": "f7a95cb1-2821-4642-be9c-36b743c64653", + "uuid": "388544ee-a187-4052-92a0-400980a75d8b", "control-id": "reload_dconf_db", "description": "This is a helper rule to reload Dconf database correctly.", "props": [ @@ -5328,7 +5292,7 @@ ] }, { - "uuid": "f7265b30-2e8e-43c1-9521-3cc684b42296", + "uuid": "e8e63d26-5b85-43c4-a1a9-9993694ca094", "control-id": "cis_rhel10_1-1.1.1", "description": "No notes for control-id 1.1.1.1.", "props": [ @@ -5345,7 +5309,7 @@ ] }, { - "uuid": "e931d14b-3953-459e-899e-ec388a2a292b", + "uuid": "67fdf00b-b506-4c91-8dd6-8086ba777cbd", "control-id": "cis_rhel10_1-1.1.2", "description": "No notes for control-id 1.1.1.2.", "props": [ @@ -5362,7 +5326,7 @@ ] }, { - "uuid": "3d9dd117-f650-43fd-b3ec-8453a9e6d7a9", + "uuid": "c3839665-a13b-48bf-9270-4878bfcceeae", "control-id": "cis_rhel10_1-1.1.3", "description": "No notes for control-id 1.1.1.3.", "props": [ @@ -5379,7 +5343,7 @@ ] }, { - "uuid": "5d824f5d-0c23-4aec-9e01-6ef07691b45b", + "uuid": "910389f0-855f-418b-9efa-b4575358d7c7", "control-id": "cis_rhel10_1-1.1.4", "description": "No notes for control-id 1.1.1.4.", "props": [ @@ -5396,7 +5360,7 @@ ] }, { - "uuid": "95f17a8c-17b3-4405-adc6-2d6e1d80e1e4", + "uuid": "33726d00-2782-4633-8bbf-a22ab0cba600", "control-id": "cis_rhel10_1-1.1.5", "description": "No notes for control-id 1.1.1.5.", "props": [ @@ -5413,7 +5377,7 @@ ] }, { - "uuid": "257ad5e5-0e5d-46a4-afdf-39b51d5e2167", + "uuid": "6b414ec2-a3cf-40ba-8dab-3c344688bf13", "control-id": "cis_rhel10_1-1.1.9", "description": "No notes for control-id 1.1.1.9.", "props": [ @@ -5430,7 +5394,7 @@ ] }, { - "uuid": "a2696cc8-fee2-4120-b18e-12832e359fe7", + "uuid": "bda9532f-26de-466a-9c94-cb9786151030", "control-id": "cis_rhel10_1-1.1.10", "description": "No notes for control-id 1.1.1.10.", "props": [ @@ -5447,7 +5411,7 @@ ] }, { - "uuid": "76f1fee7-05aa-47df-9a03-f52a2f385543", + "uuid": "93e9f95c-c0d2-4095-a94f-a1d96ddfb0ba", "control-id": "cis_rhel10_1-1.1.11", "description": "The description for control-id cis_rhel10_1-1.1.11.", "props": [ @@ -5460,7 +5424,7 @@ ] }, { - "uuid": "4d1b1da6-db37-4191-aa6c-247f125a18d7", + "uuid": "a7816c53-09cf-45e5-96e2-a3f61137b198", "control-id": "cis_rhel10_1-1.2.1.1", "description": "No notes for control-id 1.1.2.1.1.", "props": [ @@ -5477,7 +5441,7 @@ ] }, { - "uuid": "f61f40ed-adc7-4eff-ab41-63f3c0be9f33", + "uuid": "24ce37f2-372f-45c7-b801-398b04b50c39", "control-id": "cis_rhel10_1-1.2.1.2", "description": "No notes for control-id 1.1.2.1.2.", "props": [ @@ -5494,7 +5458,7 @@ ] }, { - "uuid": "6efc6a5f-e7fe-48e3-a3d3-961b3fda02db", + "uuid": "a7c6603e-c6b1-4014-96f6-ba92303cef78", "control-id": "cis_rhel10_1-1.2.1.3", "description": "No notes for control-id 1.1.2.1.3.", "props": [ @@ -5511,7 +5475,7 @@ ] }, { - "uuid": "094b3b50-4228-43a3-b18e-75cd3056f925", + "uuid": "35b2e32c-18c3-48c3-81e8-3dec7372db1f", "control-id": "cis_rhel10_1-1.2.1.4", "description": "No notes for control-id 1.1.2.1.4.", "props": [ @@ -5528,7 +5492,7 @@ ] }, { - "uuid": "daec4674-01f3-4a6e-ab01-a6a80644d521", + "uuid": "6b857466-7c68-4b1c-a333-ac1bf0879fef", "control-id": "cis_rhel10_1-1.2.2.1", "description": "No notes for control-id 1.1.2.2.1.", "props": [ @@ -5545,7 +5509,7 @@ ] }, { - "uuid": "839d903a-c1dc-4b6e-9dac-a3e7bb5bf1b6", + "uuid": "c3176d7c-52d9-43a6-98b2-e46f7715b7af", "control-id": "cis_rhel10_1-1.2.2.2", "description": "No notes for control-id 1.1.2.2.2.", "props": [ @@ -5562,7 +5526,7 @@ ] }, { - "uuid": "1108c228-a41f-4433-a782-627c8f726806", + "uuid": "cc97f7e3-ec12-4603-ac1b-633a3f575707", "control-id": "cis_rhel10_1-1.2.2.3", "description": "No notes for control-id 1.1.2.2.3.", "props": [ @@ -5579,7 +5543,7 @@ ] }, { - "uuid": "5f9db1a0-08a0-4cd3-8736-23604dc30910", + "uuid": "4ae79b72-5815-4d10-90f3-610c80c4b757", "control-id": "cis_rhel10_1-1.2.2.4", "description": "No notes for control-id 1.1.2.2.4.", "props": [ @@ -5596,7 +5560,7 @@ ] }, { - "uuid": "2a2d2c2d-29fe-4946-8121-b1258b881e61", + "uuid": "00a8ae9e-cc7e-473b-83b0-6bc2f7b2ec18", "control-id": "cis_rhel10_1-1.2.3.2", "description": "No notes for control-id 1.1.2.3.2.", "props": [ @@ -5613,7 +5577,7 @@ ] }, { - "uuid": "7a2c0760-a31e-451d-a630-15c4e0446a2a", + "uuid": "bbd29c2e-d539-424b-95d3-bde65f2417cb", "control-id": "cis_rhel10_1-1.2.3.3", "description": "No notes for control-id 1.1.2.3.3.", "props": [ @@ -5630,7 +5594,7 @@ ] }, { - "uuid": "a6cf335b-6072-4ba7-8615-4622ac2d3fda", + "uuid": "c02108f3-55c0-40ea-b5d2-a45dbba02adc", "control-id": "cis_rhel10_1-1.2.4.2", "description": "No notes for control-id 1.1.2.4.2.", "props": [ @@ -5647,7 +5611,7 @@ ] }, { - "uuid": "f7595f82-5f96-42e7-bd97-0299356821e4", + "uuid": "860a55a5-1785-420b-a6d8-3137232412a4", "control-id": "cis_rhel10_1-1.2.4.3", "description": "No notes for control-id 1.1.2.4.3.", "props": [ @@ -5664,7 +5628,7 @@ ] }, { - "uuid": "5cb3e6ce-c0a4-47c2-8e93-658a66449d84", + "uuid": "812df0e3-f8bf-42d1-8beb-aaf3e6005f68", "control-id": "cis_rhel10_1-1.2.5.2", "description": "No notes for control-id 1.1.2.5.2.", "props": [ @@ -5681,7 +5645,7 @@ ] }, { - "uuid": "7f5a1e6c-9ae9-492f-bfe0-7a40e6128138", + "uuid": "4c283db6-b12b-4cc5-ab06-2bdcd73e71d1", "control-id": "cis_rhel10_1-1.2.5.3", "description": "No notes for control-id 1.1.2.5.3.", "props": [ @@ -5698,7 +5662,7 @@ ] }, { - "uuid": "0f855059-27cf-43dd-b80f-b8e06ccd01ee", + "uuid": "f26b489d-2b52-42fd-871d-b4dcfb9ce162", "control-id": "cis_rhel10_1-1.2.5.4", "description": "No notes for control-id 1.1.2.5.4.", "props": [ @@ -5715,7 +5679,7 @@ ] }, { - "uuid": "f8989f80-92da-413d-9461-1ebcca435b71", + "uuid": "5dacc330-385c-48a9-85d5-4d7255d07c83", "control-id": "cis_rhel10_1-1.2.6.2", "description": "No notes for control-id 1.1.2.6.2.", "props": [ @@ -5732,7 +5696,7 @@ ] }, { - "uuid": "b3404b4c-2cab-475c-8b7b-6413ba7cd657", + "uuid": "ba62493f-fe0d-4f26-a517-be13845fec7b", "control-id": "cis_rhel10_1-1.2.6.3", "description": "No notes for control-id 1.1.2.6.3.", "props": [ @@ -5749,7 +5713,7 @@ ] }, { - "uuid": "4397eed8-9cde-4f46-bf1d-d18388682cd8", + "uuid": "0cc92c43-8a93-4cdf-b14b-73fb17ec8bf6", "control-id": "cis_rhel10_1-1.2.6.4", "description": "No notes for control-id 1.1.2.6.4.", "props": [ @@ -5766,7 +5730,7 @@ ] }, { - "uuid": "e1ec2059-0de1-4d97-8c8b-8ac862388904", + "uuid": "ac499f4e-c5e6-4e9b-bb59-7cefb9c8e67a", "control-id": "cis_rhel10_1-1.2.7.2", "description": "No notes for control-id 1.1.2.7.2.", "props": [ @@ -5783,7 +5747,7 @@ ] }, { - "uuid": "1b3749b4-25c0-4976-9071-9c669802db03", + "uuid": "41d02b9f-4e7c-45c5-b8ce-55b843a2eb5d", "control-id": "cis_rhel10_1-1.2.7.3", "description": "No notes for control-id 1.1.2.7.3.", "props": [ @@ -5800,7 +5764,7 @@ ] }, { - "uuid": "25bb48bc-87b7-4e87-b590-99eb8f678332", + "uuid": "7bbfbab2-b74d-4c41-993d-4f3ef54617ab", "control-id": "cis_rhel10_1-1.2.7.4", "description": "No notes for control-id 1.1.2.7.4.", "props": [ @@ -5817,7 +5781,7 @@ ] }, { - "uuid": "4764e1cf-301a-4a0e-a01e-dc13d70111a8", + "uuid": "82d1d7fb-bace-4287-b37d-15fceeb3af6d", "control-id": "cis_rhel10_1-2.1.1", "description": "The description for control-id cis_rhel10_1-2.1.1.", "props": [ @@ -5830,7 +5794,7 @@ ] }, { - "uuid": "4520d2b9-1f6d-43d7-b13b-786343350972", + "uuid": "ddd5adcd-f3e6-4ac5-b3bb-798d17332a7d", "control-id": "cis_rhel10_1-2.1.2", "description": "No notes for control-id 1.2.1.2.", "props": [ @@ -5847,7 +5811,7 @@ ] }, { - "uuid": "d568115b-cef8-4707-be82-e498cfa6a84b", + "uuid": "b3370d8e-947d-4aea-98e0-d9a90eec738c", "control-id": "cis_rhel10_1-2.1.4", "description": "The description for control-id cis_rhel10_1-2.1.4.", "props": [ @@ -5860,7 +5824,7 @@ ] }, { - "uuid": "dc7619fb-64f5-41e8-a785-72803fcd106a", + "uuid": "398c1cff-cb5c-49d7-a279-1b8af7b4292f", "control-id": "cis_rhel10_1-2.2.1", "description": "The description for control-id cis_rhel10_1-2.2.1.", "props": [ @@ -5873,7 +5837,7 @@ ] }, { - "uuid": "98dad05b-a3b8-4626-8a23-d9142a92af81", + "uuid": "4171352a-f253-4867-ab35-6e0ff45b4687", "control-id": "cis_rhel10_1-3.1.1", "description": "No notes for control-id 1.3.1.1.", "props": [ @@ -5890,7 +5854,7 @@ ] }, { - "uuid": "36ce91a5-ed25-40f6-b034-75755d2b46fd", + "uuid": "72a1ed15-caf9-464e-9c44-25579b1e7c37", "control-id": "cis_rhel10_1-3.1.2", "description": "No notes for control-id 1.3.1.2.", "props": [ @@ -5907,7 +5871,7 @@ ] }, { - "uuid": "286db676-0ab1-4d88-81c8-34baee75020d", + "uuid": "c095ed70-9a9d-4b98-b8ce-fd88f4460f2c", "control-id": "cis_rhel10_1-3.1.3", "description": "No notes for control-id 1.3.1.3.", "props": [ @@ -5924,7 +5888,7 @@ ] }, { - "uuid": "eb0fbc14-7207-4fe6-b9fe-2538690ec9a6", + "uuid": "e54ba40c-e04e-4ae0-9191-b3fdff01639c", "control-id": "cis_rhel10_1-3.1.4", "description": "No notes for control-id 1.3.1.4.", "props": [ @@ -5941,7 +5905,7 @@ ] }, { - "uuid": "616e7f3f-670f-4f64-a270-2671b23682a5", + "uuid": "d839dfc7-98c8-4397-9386-7148d27bccfa", "control-id": "cis_rhel10_1-3.1.7", "description": "No notes for control-id 1.3.1.7.", "props": [ @@ -5958,7 +5922,7 @@ ] }, { - "uuid": "9e3e3270-e094-4a80-9071-cc1f74c7a833", + "uuid": "4c079c59-b0a1-427c-916a-89d7a07c81a0", "control-id": "cis_rhel10_1-3.1.8", "description": "No notes for control-id 1.3.1.8.", "props": [ @@ -5975,7 +5939,7 @@ ] }, { - "uuid": "2a24d402-bae8-488f-be03-dde6948a95bb", + "uuid": "b9d35fcd-bb7b-462e-a2d8-305f0f4843fa", "control-id": "cis_rhel10_1-4.1", "description": "There is no automated remediation for this rule and this is intentional.\nMore details in the rule description.", "props": [ @@ -5992,50 +5956,34 @@ ] }, { - "uuid": "66d8fc18-2e27-4e54-bcc2-1090c742ba30", + "uuid": "bfe10ab9-8d9b-4b16-a663-30ef4f39dec4", "control-id": "cis_rhel10_1-4.2", - "description": "The description for control-id cis_rhel10_1-4.2.", + "description": "This requirement demands a deeper review of the rules.", "props": [ { "name": "implementation-status", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "alternative", - "remarks": "This requirement demands a deeper review of the rules." - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_grub2_cfg" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_grub2_cfg" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_grub2_cfg" + "value": "implemented" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_user_cfg" + "value": "file_permissions_boot_grub2" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_user_cfg" + "value": "file_owner_boot_grub2" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_user_cfg" + "value": "file_groupowner_boot_grub2" } ] }, { - "uuid": "0157a93e-0985-4690-93fc-fe2bfbf298b3", + "uuid": "0c348e0c-2613-4f3a-a258-6299b4f3a1ad", "control-id": "cis_rhel10_1-5.1", "description": "No notes for control-id 1.5.1.", "props": [ @@ -6052,7 +6000,7 @@ ] }, { - "uuid": "6d347044-2b97-4eca-a658-21ec287796fc", + "uuid": "3e1f8226-5781-4b77-8c66-924d7520aedc", "control-id": "cis_rhel10_1-5.2", "description": "No notes for control-id 1.5.2.", "props": [ @@ -6069,7 +6017,7 @@ ] }, { - "uuid": "7bc65eb3-908c-4844-97ed-c9d46333140d", + "uuid": "457cc563-d28d-4aca-adba-a375880d1160", "control-id": "cis_rhel10_1-5.4", "description": "No notes for control-id 1.5.4.", "props": [ @@ -6086,7 +6034,7 @@ ] }, { - "uuid": "eecb63d2-0220-42d1-a80a-20c2f3ec27f0", + "uuid": "40e4a5ac-e0a8-4098-a049-aaa2d8338b0d", "control-id": "cis_rhel10_1-5.5", "description": "No notes for control-id 1.5.5.", "props": [ @@ -6103,7 +6051,7 @@ ] }, { - "uuid": "30b68347-4615-4ece-8d3b-8a2ab58ec8c3", + "uuid": "0073de50-41f2-4c14-afb5-97d4e0b28986", "control-id": "cis_rhel10_1-5.6", "description": "No notes for control-id 1.5.6.", "props": [ @@ -6120,7 +6068,7 @@ ] }, { - "uuid": "79dd7c7c-6f55-4568-a1e3-4dec09d89c03", + "uuid": "f4661a67-55f0-46e8-8103-5344f783c52b", "control-id": "cis_rhel10_1-5.7", "description": "No notes for control-id 1.5.7.", "props": [ @@ -6137,7 +6085,7 @@ ] }, { - "uuid": "b7d76dad-9467-4d86-814a-8a159ada07a3", + "uuid": "faae7515-df28-4910-b6ef-76725ebd1c71", "control-id": "cis_rhel10_1-5.8", "description": "Address Space Layout Randomization (ASLR)", "props": [ @@ -6154,7 +6102,7 @@ ] }, { - "uuid": "6b44e3de-9293-4003-bab9-4c62daef0d82", + "uuid": "e5ba7832-f057-4e99-845d-e59f443eb87a", "control-id": "cis_rhel10_1-5.9", "description": "No notes for control-id 1.5.9.", "props": [ @@ -6171,7 +6119,7 @@ ] }, { - "uuid": "5c679195-eba3-4fa5-adde-963ed4d00ee0", + "uuid": "fd017745-5c66-4f3f-80d2-8004a986e81a", "control-id": "cis_rhel10_1-5.10", "description": "No notes for control-id 1.5.10.", "props": [ @@ -6188,7 +6136,7 @@ ] }, { - "uuid": "3799d6cb-b675-4d75-a856-29587d2c67ca", + "uuid": "2253b9c6-b6f8-45b2-8d99-b9382be99cb5", "control-id": "cis_rhel10_1-6.1", "description": "No notes for control-id 1.6.1.", "props": [ @@ -6205,7 +6153,7 @@ ] }, { - "uuid": "0db4f15e-b735-4b23-88e6-9315163abd7e", + "uuid": "15f2de88-3559-4469-ae5e-62472f757246", "control-id": "cis_rhel10_1-6.2", "description": "No notes for control-id 1.6.2.", "props": [ @@ -6222,7 +6170,7 @@ ] }, { - "uuid": "f5422df2-1b8b-47ac-9409-4cc1d032bb28", + "uuid": "1e3a9bcf-e8ff-4fd5-bd0e-bd22e93b1f1c", "control-id": "cis_rhel10_1-6.3", "description": "No notes for control-id 1.6.3.", "props": [ @@ -6239,7 +6187,7 @@ ] }, { - "uuid": "c4f4066a-54e8-46e2-ad2b-f807fcf98d56", + "uuid": "dbc9042d-43d3-40b3-baad-e637f11be495", "control-id": "cis_rhel10_1-6.4", "description": "No notes for control-id 1.6.4.", "props": [ @@ -6256,7 +6204,7 @@ ] }, { - "uuid": "e45ff2ca-45b5-434f-b43d-41208d660c26", + "uuid": "888bada3-35cd-43de-bb60-7a0b6b0b6a4a", "control-id": "cis_rhel10_1-7.1", "description": "No notes for control-id 1.7.1.", "props": [ @@ -6273,7 +6221,7 @@ ] }, { - "uuid": "96b5ec8a-2ccf-44e0-910c-452752bc9e55", + "uuid": "71ef93e6-f387-4ade-bb17-af730058dd23", "control-id": "cis_rhel10_1-7.2", "description": "No notes for control-id 1.7.2.", "props": [ @@ -6290,7 +6238,7 @@ ] }, { - "uuid": "678e8f16-4bfa-4a07-8595-a816bd1d4c67", + "uuid": "d7e06c71-4889-458d-aa1f-7af078bfacd0", "control-id": "cis_rhel10_1-7.3", "description": "No notes for control-id 1.7.3.", "props": [ @@ -6307,7 +6255,7 @@ ] }, { - "uuid": "63ca73b7-9f3b-48fd-bb6f-93f3c7890969", + "uuid": "db1f061c-e4aa-4733-a4b5-739a69dde8d7", "control-id": "cis_rhel10_1-7.4", "description": "No notes for control-id 1.7.4.", "props": [ @@ -6334,7 +6282,7 @@ ] }, { - "uuid": "e804f418-c835-436f-ba56-cce1e375fef8", + "uuid": "d9b3e81b-b3db-4f46-93f1-ea58416de345", "control-id": "cis_rhel10_1-7.5", "description": "No notes for control-id 1.7.5.", "props": [ @@ -6361,7 +6309,7 @@ ] }, { - "uuid": "96c389dc-87d6-4271-afaf-1abe595f4d11", + "uuid": "fad3fee5-f0ba-4c12-86bc-8ffd7b475c6b", "control-id": "cis_rhel10_1-7.6", "description": "No notes for control-id 1.7.6.", "props": [ @@ -6388,7 +6336,7 @@ ] }, { - "uuid": "03a9134b-333d-4ab0-895a-573c98bdd64c", + "uuid": "b07a586f-a730-463a-8c8b-3152a4a1e8f0", "control-id": "cis_rhel10_1-8.1", "description": "No notes for control-id 1.8.1.", "props": [ @@ -6410,7 +6358,7 @@ ] }, { - "uuid": "818e05b4-8985-4cca-9771-9fc6faae9c84", + "uuid": "fb5ad880-2de7-4ae8-ad4c-9e33c1febb51", "control-id": "cis_rhel10_1-8.2", "description": "No notes for control-id 1.8.2.", "props": [ @@ -6427,7 +6375,7 @@ ] }, { - "uuid": "0bdf45c2-9e6a-4d0e-b447-ce0df34eda38", + "uuid": "a1c88411-caf7-41d5-8f57-90cbc1ea621a", "control-id": "cis_rhel10_1-8.3", "description": "No notes for control-id 1.8.3.", "props": [ @@ -6459,7 +6407,7 @@ ] }, { - "uuid": "920e4a76-1578-41ab-bf9c-92480f3d3cfe", + "uuid": "dc9d0e50-17fd-4bc7-8b3d-5bf1c9c13422", "control-id": "cis_rhel10_1-8.4", "description": "No notes for control-id 1.8.4.", "props": [ @@ -6481,7 +6429,7 @@ ] }, { - "uuid": "1b37b57d-bf70-4482-99bb-31800531c6c9", + "uuid": "34389a20-1a5e-41c7-9471-c9462c802419", "control-id": "cis_rhel10_1-8.5", "description": "No notes for control-id 1.8.5.", "props": [ @@ -6498,7 +6446,7 @@ ] }, { - "uuid": "0ea3ca0e-240e-4a70-bb3e-16a61f7ff970", + "uuid": "66fe0573-eb44-4263-b86d-0a1c92e5e5f5", "control-id": "cis_rhel10_2-1.1", "description": "No notes for control-id 2.1.1.", "props": [ @@ -6515,7 +6463,7 @@ ] }, { - "uuid": "6b367c41-7062-45a0-8306-9a3e943fe44e", + "uuid": "04d06d52-e8d0-4665-8470-d1ef4b86bcc3", "control-id": "cis_rhel10_2-1.2", "description": "No notes for control-id 2.1.2.", "props": [ @@ -6532,7 +6480,7 @@ ] }, { - "uuid": "6d10d82f-108a-462d-8d32-06a1742947c5", + "uuid": "f0d16a8e-c581-4e9f-9c2c-0252c08703fd", "control-id": "cis_rhel10_2-1.4", "description": "No notes for control-id 2.1.4.", "props": [ @@ -6549,7 +6497,7 @@ ] }, { - "uuid": "40f48fd4-946e-4e1d-addf-d92ddc3c2d21", + "uuid": "47cb7e23-8253-48b6-bda4-63b4ea3993c2", "control-id": "cis_rhel10_2-1.5", "description": "No notes for control-id 2.1.5.", "props": [ @@ -6566,7 +6514,7 @@ ] }, { - "uuid": "7fd39d8e-7c8d-4625-aede-2376c242f722", + "uuid": "c9e6f8f8-3671-40c2-a486-040c7b6d6a75", "control-id": "cis_rhel10_2-1.6", "description": "No notes for control-id 2.1.6.", "props": [ @@ -6583,7 +6531,7 @@ ] }, { - "uuid": "29e6edeb-01ce-43ee-b535-9a1c3a33ddb0", + "uuid": "90f47501-346f-4301-baa1-7a61215dff9d", "control-id": "cis_rhel10_2-1.7", "description": "No notes for control-id 2.1.7.", "props": [ @@ -6600,7 +6548,7 @@ ] }, { - "uuid": "b42b31e0-0d02-4210-88b3-d06d95b7f8a4", + "uuid": "40d213d7-adbb-4709-99b0-e5723f5a7041", "control-id": "cis_rhel10_2-1.8", "description": "No notes for control-id 2.1.8.", "props": [ @@ -6622,7 +6570,7 @@ ] }, { - "uuid": "2c896785-e64b-4471-989b-55b17cddf81a", + "uuid": "99d13344-941f-415f-92e3-012e16dd9f6f", "control-id": "cis_rhel10_2-1.9", "description": "Many of the libvirt packages used by Enterprise Linux virtualization are dependent on the\nnfs-utils package.", "props": [ @@ -6639,7 +6587,7 @@ ] }, { - "uuid": "a2f99185-beda-4178-a76c-2335110bdd44", + "uuid": "f622a392-069b-4fc9-9e53-0b5e5d6db8c7", "control-id": "cis_rhel10_2-1.10", "description": "No notes for control-id 2.1.10.", "props": [ @@ -6656,7 +6604,7 @@ ] }, { - "uuid": "466327b6-069f-4aa1-b09f-00bf2a048ec4", + "uuid": "e7aa8076-e509-44f0-acd0-89ac0c29d9c8", "control-id": "cis_rhel10_2-1.11", "description": "Many of the libvirt packages used by Enterprise Linux virtualization, and the nfs-utils\npackage used for The Network File System (NFS), are dependent on the rpcbind package.", "props": [ @@ -6673,7 +6621,7 @@ ] }, { - "uuid": "c77c67dc-0bc6-4815-81e6-c4fc3ae58900", + "uuid": "9fe9ffc7-630e-4c07-abff-6c8129cc640a", "control-id": "cis_rhel10_2-1.12", "description": "No notes for control-id 2.1.12.", "props": [ @@ -6690,7 +6638,7 @@ ] }, { - "uuid": "cb133449-b7e7-446a-b234-1d9af717da31", + "uuid": "8b116f9b-e59f-4a5f-811c-4b20ae94ef13", "control-id": "cis_rhel10_2-1.13", "description": "No notes for control-id 2.1.13.", "props": [ @@ -6707,7 +6655,7 @@ ] }, { - "uuid": "f1819637-8d58-4b00-8d65-9de8325c2443", + "uuid": "7db8183a-4013-4dab-9b5d-bc27a09e7736", "control-id": "cis_rhel10_2-1.14", "description": "No notes for control-id 2.1.14.", "props": [ @@ -6724,7 +6672,7 @@ ] }, { - "uuid": "9ad4eef6-9f2b-4dc7-a02c-64bd6759051c", + "uuid": "461d5878-714b-4299-914b-1108e60ba441", "control-id": "cis_rhel10_2-1.15", "description": "No notes for control-id 2.1.15.", "props": [ @@ -6741,7 +6689,7 @@ ] }, { - "uuid": "5631384b-90fc-4038-8d0d-3106f3ac0b36", + "uuid": "2f04b0e6-47c6-44cc-960a-0231a997e3a0", "control-id": "cis_rhel10_2-1.16", "description": "No notes for control-id 2.1.16.", "props": [ @@ -6758,7 +6706,7 @@ ] }, { - "uuid": "3c70214d-2511-457c-976c-ae5634f8a6b9", + "uuid": "69226607-c32d-46c3-b0de-4d7c4e845c8e", "control-id": "cis_rhel10_2-1.17", "description": "No notes for control-id 2.1.17.", "props": [ @@ -6775,7 +6723,7 @@ ] }, { - "uuid": "b689c65d-5396-4967-ab2c-e0b4580b60e8", + "uuid": "4f8d48d5-0db4-4d98-99cd-f48188e04cdf", "control-id": "cis_rhel10_2-1.18", "description": "No notes for control-id 2.1.18.", "props": [ @@ -6797,7 +6745,7 @@ ] }, { - "uuid": "a2d2e541-a8a7-4581-80a5-2ffc3a74d3a9", + "uuid": "77a7b77e-114c-412b-b2d5-eb3ced37688f", "control-id": "cis_rhel10_2-1.21", "description": "No notes for control-id 2.1.21.", "props": [ @@ -6819,7 +6767,7 @@ ] }, { - "uuid": "ada7dfaf-d918-4bda-a8f3-79675beb7575", + "uuid": "03795316-fd5d-4b63-951e-a88b3dd30b18", "control-id": "cis_rhel10_2-1.22", "description": "The description for control-id cis_rhel10_2-1.22.", "props": [ @@ -6832,7 +6780,7 @@ ] }, { - "uuid": "6667dd31-912b-4ae1-874a-4705068f9ad9", + "uuid": "e86b5037-9615-4ce4-b3bd-5fbdc8fc8a68", "control-id": "cis_rhel10_2-2.1", "description": "No notes for control-id 2.2.1.", "props": [ @@ -6849,7 +6797,7 @@ ] }, { - "uuid": "55d2034e-530e-4739-9b3c-23c073a8207b", + "uuid": "a9d8fbf0-f157-43a4-a941-da3b353f8e90", "control-id": "cis_rhel10_2-2.3", "description": "No notes for control-id 2.2.3.", "props": [ @@ -6866,7 +6814,7 @@ ] }, { - "uuid": "21c5b5bf-bcdb-4469-9d45-4a68b7af1542", + "uuid": "feb9989e-2623-4c1a-b7b1-84268d37f83e", "control-id": "cis_rhel10_2-2.4", "description": "No notes for control-id 2.2.4.", "props": [ @@ -6883,7 +6831,7 @@ ] }, { - "uuid": "6c739b3f-3a05-41bc-99c3-80f920b2a64c", + "uuid": "f6787671-f828-4162-806e-7a7611e8a462", "control-id": "cis_rhel10_2-3.1", "description": "No notes for control-id 2.3.1.", "props": [ @@ -6895,7 +6843,7 @@ ] }, { - "uuid": "f72131d6-0922-409f-8766-301d244d2a2d", + "uuid": "134f8fbe-1521-4d88-b21b-26b1d31cd021", "control-id": "cis_rhel10_2-3.2", "description": "No notes for control-id 2.3.2.", "props": [ @@ -6912,7 +6860,7 @@ ] }, { - "uuid": "d9393fc8-74ca-4ee5-a7ab-590831927b0d", + "uuid": "f2b8b983-5145-4f82-8b5a-def2a0acc5a8", "control-id": "cis_rhel10_2-3.3", "description": "No notes for control-id 2.3.3.", "props": [ @@ -6929,7 +6877,7 @@ ] }, { - "uuid": "2abe967c-c997-4094-88fe-ebc6b9fa01ad", + "uuid": "aa3f428b-0f89-416c-88e2-b6e9c2adbaa1", "control-id": "cis_rhel10_2-4.1.1", "description": "No notes for control-id 2.4.1.1.", "props": [ @@ -6951,7 +6899,7 @@ ] }, { - "uuid": "33adb154-12a9-4b28-8954-fd0b9a6b8dc8", + "uuid": "7f137844-c2e4-4c02-9bad-04e71bfb531b", "control-id": "cis_rhel10_2-4.1.2", "description": "No notes for control-id 2.4.1.2.", "props": [ @@ -6978,7 +6926,7 @@ ] }, { - "uuid": "06ae33f8-111e-4901-95ff-7f5b6ff570b1", + "uuid": "7ae9da68-69ed-48d7-9d93-b14ebc6bcaf1", "control-id": "cis_rhel10_2-4.1.3", "description": "No notes for control-id 2.4.1.3.", "props": [ @@ -7005,7 +6953,7 @@ ] }, { - "uuid": "470429bc-7b08-4d6e-ab09-130d3fb607c4", + "uuid": "bd59ddd1-27b0-41cc-89a7-499e1f0426d3", "control-id": "cis_rhel10_2-4.1.4", "description": "No notes for control-id 2.4.1.4.", "props": [ @@ -7032,7 +6980,7 @@ ] }, { - "uuid": "80ac2ec7-cbd6-45db-b213-fd5893edacfc", + "uuid": "2f8886d3-3186-4347-b95f-08329f4e1866", "control-id": "cis_rhel10_2-4.1.5", "description": "No notes for control-id 2.4.1.5.", "props": [ @@ -7059,7 +7007,7 @@ ] }, { - "uuid": "ce975b64-ac1d-47c6-918d-17b5d4a75946", + "uuid": "2a430a9d-a9b1-4224-9984-7746bb7a509b", "control-id": "cis_rhel10_2-4.1.6", "description": "No notes for control-id 2.4.1.6.", "props": [ @@ -7086,7 +7034,7 @@ ] }, { - "uuid": "aa87f981-cff2-493e-be07-bd249285dc7c", + "uuid": "297b27a9-9c71-46ca-ba04-9f34f3fcf261", "control-id": "cis_rhel10_2-4.1.7", "description": "No notes for control-id 2.4.1.7.", "props": [ @@ -7113,7 +7061,7 @@ ] }, { - "uuid": "b0c27dea-10f8-45da-9799-285c598bb462", + "uuid": "4e1f2433-1e04-42eb-848b-8e653f9b80fc", "control-id": "cis_rhel10_2-4.1.8", "description": "No notes for control-id 2.4.1.8.", "props": [ @@ -7140,7 +7088,7 @@ ] }, { - "uuid": "ba370ce3-fac1-4ef7-8502-102b024d4fd9", + "uuid": "44c886cf-09de-4a68-8e9b-e8d4e1de75e8", "control-id": "cis_rhel10_2-4.1.9", "description": "No notes for control-id 2.4.1.9.", "props": [ @@ -7177,7 +7125,7 @@ ] }, { - "uuid": "aa7ecbac-3304-45e9-9d01-6815956ce3e9", + "uuid": "17e4fc1d-8a15-4525-87e4-5630982d3e5d", "control-id": "cis_rhel10_2-4.2.1", "description": "No notes for control-id 2.4.2.1.", "props": [ @@ -7214,7 +7162,7 @@ ] }, { - "uuid": "f8df0695-14f7-49e9-a6bf-0a22b8f5e08f", + "uuid": "afccf092-cc74-4a0c-856e-0f3b445c7fb8", "control-id": "cis_rhel10_3-1.1", "description": "The description for control-id cis_rhel10_3-1.1.", "props": [ @@ -7227,7 +7175,7 @@ ] }, { - "uuid": "b9ddc8f2-8b3f-4693-b575-05b6f02831e4", + "uuid": "0abc0275-5d7d-4bf7-9b71-7d6039494fb8", "control-id": "cis_rhel10_3-1.2", "description": "No notes for control-id 3.1.2.", "props": [ @@ -7244,7 +7192,7 @@ ] }, { - "uuid": "981820f7-27d4-4b72-979f-e2e89830cb14", + "uuid": "ed619ce7-f9ca-4b5d-8804-022c1d70da48", "control-id": "cis_rhel10_3-1.3", "description": "No notes for control-id 3.1.3.", "props": [ @@ -7261,7 +7209,7 @@ ] }, { - "uuid": "de8ebf21-0c8b-4ae2-8796-fee7eb83422b", + "uuid": "da61d0d6-2603-4a80-b8b7-9f4bc4acc44d", "control-id": "cis_rhel10_3-2.1", "description": "No notes for control-id 3.2.1.", "props": [ @@ -7278,7 +7226,7 @@ ] }, { - "uuid": "877b9026-5fc4-4edd-b405-4811c7e38724", + "uuid": "4285049d-e74a-487c-a5e1-05fed3d99cf5", "control-id": "cis_rhel10_3-2.2", "description": "No notes for control-id 3.2.2.", "props": [ @@ -7295,7 +7243,7 @@ ] }, { - "uuid": "1eebcc40-3ddb-41d7-a82f-1b6eaeee8b26", + "uuid": "ac12d307-6a92-4f36-a49f-81de2759f1ab", "control-id": "cis_rhel10_3-2.3", "description": "No notes for control-id 3.2.3.", "props": [ @@ -7312,7 +7260,7 @@ ] }, { - "uuid": "1da4dc3a-4b7d-4f23-aa10-11cb921192c2", + "uuid": "8aa8b503-06f0-4379-b392-e89926a9b53d", "control-id": "cis_rhel10_3-2.4", "description": "No notes for control-id 3.2.4.", "props": [ @@ -7329,7 +7277,7 @@ ] }, { - "uuid": "063454e7-6a45-4dc4-978f-943890d27c7a", + "uuid": "f3ca3dab-85b5-4dcd-a790-f1ff0e1351da", "control-id": "cis_rhel10_3-2.5", "description": "No notes for control-id 3.2.5.", "props": [ @@ -7346,7 +7294,7 @@ ] }, { - "uuid": "3de18f89-8f10-4ee0-bffe-8313be01f721", + "uuid": "12dfd300-9869-4f12-bfc7-b545210554a5", "control-id": "cis_rhel10_3-2.6", "description": "No notes for control-id 3.2.6.", "props": [ @@ -7363,7 +7311,7 @@ ] }, { - "uuid": "9fee174f-a041-4689-b88d-874650030106", + "uuid": "5e77413e-fde0-46b7-9fe9-a62b4acc2a51", "control-id": "cis_rhel10_3-3.1.2", "description": "No notes for control-id 3.3.1.2.", "props": [ @@ -7380,7 +7328,7 @@ ] }, { - "uuid": "c6773df1-119c-4dfc-9ff6-ef878294579f", + "uuid": "7fc1646d-b798-46e2-91d0-37f12dfd1640", "control-id": "cis_rhel10_3-3.1.3", "description": "No notes for control-id 3.3.1.3.", "props": [ @@ -7397,7 +7345,7 @@ ] }, { - "uuid": "8089fac0-9ed8-4604-8a45-bd038b7c3a32", + "uuid": "e176b280-ad36-4a23-9c01-905357781347", "control-id": "cis_rhel10_3-3.1.4", "description": "No notes for control-id 3.3.1.4.", "props": [ @@ -7414,7 +7362,7 @@ ] }, { - "uuid": "c6111cfb-7c55-4424-8711-3964a140f707", + "uuid": "23814b96-7cbe-40dd-a3ed-fb1646d1af11", "control-id": "cis_rhel10_3-3.1.5", "description": "No notes for control-id 3.3.1.5.", "props": [ @@ -7431,7 +7379,7 @@ ] }, { - "uuid": "60f77688-28ce-4879-aa6d-2795faf32f17", + "uuid": "527011d5-cc18-4fef-ac93-cca4a142e9aa", "control-id": "cis_rhel10_3-3.1.6", "description": "No notes for control-id 3.3.1.6.", "props": [ @@ -7448,7 +7396,7 @@ ] }, { - "uuid": "aac11a68-64b4-4de3-814b-1333b8a119be", + "uuid": "b56b175b-30bc-4e74-bd23-cd6c2ef3cd50", "control-id": "cis_rhel10_3-3.1.7", "description": "No notes for control-id 3.3.1.7.", "props": [ @@ -7465,7 +7413,7 @@ ] }, { - "uuid": "8a14a4ef-43f7-4483-a620-93c51e049cc5", + "uuid": "126353f1-ab10-4bf6-9ec6-9d9eabf752ca", "control-id": "cis_rhel10_3-3.1.8", "description": "No notes for control-id 3.3.1.8.", "props": [ @@ -7482,7 +7430,7 @@ ] }, { - "uuid": "1547492f-6150-40b8-ba02-dae0870cca81", + "uuid": "f7f47aed-b7f0-467a-b6a5-9107b4f59510", "control-id": "cis_rhel10_3-3.1.9", "description": "No notes for control-id 3.3.1.9.", "props": [ @@ -7499,7 +7447,7 @@ ] }, { - "uuid": "aa50c009-4485-45c1-9d2a-007e837367cd", + "uuid": "0c5cb778-3a2f-4720-a9d2-8e4f3fff29a8", "control-id": "cis_rhel10_3-3.1.10", "description": "No notes for control-id 3.3.1.10.", "props": [ @@ -7516,7 +7464,7 @@ ] }, { - "uuid": "a86fb2aa-a474-46b6-a975-381dbbb9b0ef", + "uuid": "74eae240-8a69-4bf5-98d7-714b3f0f1bdc", "control-id": "cis_rhel10_3-3.1.11", "description": "No notes for control-id 3.3.1.11.", "props": [ @@ -7533,7 +7481,7 @@ ] }, { - "uuid": "bdfc2c6e-8741-4bf5-aae4-1a5c19664fe8", + "uuid": "30b05051-8951-4f04-ae08-f0a75da1ad24", "control-id": "cis_rhel10_3-3.1.12", "description": "No notes for control-id 3.3.1.12.", "props": [ @@ -7550,7 +7498,7 @@ ] }, { - "uuid": "43e2d2b6-d4d1-42ef-9687-ae610d0be608", + "uuid": "2628373d-1abf-4367-a3e0-ff3cb581a609", "control-id": "cis_rhel10_3-3.1.13", "description": "No notes for control-id 3.3.1.13.", "props": [ @@ -7567,7 +7515,7 @@ ] }, { - "uuid": "1ea507bb-f8d7-4124-8c9d-abb30cf646f5", + "uuid": "ba70026c-7e9d-4fcc-8bfa-5f597b15efa3", "control-id": "cis_rhel10_3-3.1.14", "description": "No notes for control-id 3.3.1.14.", "props": [ @@ -7584,7 +7532,7 @@ ] }, { - "uuid": "fe8f9505-e641-4cc6-94c3-d2935ad308b8", + "uuid": "a8e3557f-f420-4dde-8c7b-ec954d32f36b", "control-id": "cis_rhel10_3-3.1.15", "description": "No notes for control-id 3.3.1.15.", "props": [ @@ -7601,7 +7549,7 @@ ] }, { - "uuid": "91978c10-ba06-486a-8a93-0108d10cd7d5", + "uuid": "8236ff4f-dae2-4995-83c3-87789c3abecc", "control-id": "cis_rhel10_3-3.1.16", "description": "No notes for control-id 3.3.1.16.", "props": [ @@ -7618,7 +7566,7 @@ ] }, { - "uuid": "a7e99bda-0144-4527-9f8b-1737d6a699cb", + "uuid": "156b21c0-86cc-4689-82ad-dd3bef8c224a", "control-id": "cis_rhel10_3-3.1.17", "description": "No notes for control-id 3.3.1.17.", "props": [ @@ -7635,7 +7583,7 @@ ] }, { - "uuid": "a3555e83-3dd8-440e-be29-387a46a6d3a3", + "uuid": "35b5fcb5-e662-439c-a260-0df2c01578f6", "control-id": "cis_rhel10_3-3.1.18", "description": "No notes for control-id 3.3.1.18.", "props": [ @@ -7652,7 +7600,7 @@ ] }, { - "uuid": "2236d81e-5164-4e14-96f0-33be7bde3aa7", + "uuid": "e0fdb702-b6f4-44c7-8994-3dfaa4ec989e", "control-id": "cis_rhel10_3-3.2.1", "description": "No notes for control-id 3.3.2.1.", "props": [ @@ -7669,7 +7617,7 @@ ] }, { - "uuid": "d0d91997-b1e5-430b-9373-4accb6d9aecd", + "uuid": "6467da9a-8ea4-4109-b523-ad1f22efe524", "control-id": "cis_rhel10_3-3.2.2", "description": "No notes for control-id 3.3.2.2.", "props": [ @@ -7686,7 +7634,7 @@ ] }, { - "uuid": "6300262a-fd41-4d52-939b-67ec289c7085", + "uuid": "a2a7f2bf-c627-43d5-9cfb-4b9ea5e161e1", "control-id": "cis_rhel10_3-3.2.3", "description": "No notes for control-id 3.3.2.3.", "props": [ @@ -7703,7 +7651,7 @@ ] }, { - "uuid": "27ad1313-99c6-43d2-99fe-5bb66bbe70c4", + "uuid": "982f760b-846f-4852-aacb-c6bae29357bc", "control-id": "cis_rhel10_3-3.2.4", "description": "No notes for control-id 3.3.2.4.", "props": [ @@ -7720,7 +7668,7 @@ ] }, { - "uuid": "99017441-edda-48ed-b786-e1bcbee8fe9f", + "uuid": "f83ef81e-21b6-4245-a887-2ed1cfef4f35", "control-id": "cis_rhel10_3-3.2.5", "description": "No notes for control-id 3.3.2.5.", "props": [ @@ -7737,7 +7685,7 @@ ] }, { - "uuid": "f6910bbf-88cb-4128-8e71-8fb402a59c0b", + "uuid": "d61de53d-ad4c-48cc-b297-2aa473f8ae26", "control-id": "cis_rhel10_3-3.2.6", "description": "No notes for control-id 3.3.2.6.", "props": [ @@ -7754,7 +7702,7 @@ ] }, { - "uuid": "7446471b-4dd9-4e7b-bd6a-a84939920aa0", + "uuid": "65c78fbf-9e0b-459e-b0ac-6e207b623e57", "control-id": "cis_rhel10_3-3.2.7", "description": "No notes for control-id 3.3.2.7.", "props": [ @@ -7771,7 +7719,7 @@ ] }, { - "uuid": "078eca7e-27c2-4e8b-8446-f21c69b552be", + "uuid": "bf4bff06-14e0-4163-98dd-8ce6fc53f276", "control-id": "cis_rhel10_3-3.2.8", "description": "No notes for control-id 3.3.2.8.", "props": [ @@ -7788,7 +7736,7 @@ ] }, { - "uuid": "265e1c96-2ac1-48d6-a268-67e7e4116028", + "uuid": "b6347250-781c-42b3-898e-2103ff2b1935", "control-id": "cis_rhel10_4-1.1", "description": "No notes for control-id 4.1.1.", "props": [ @@ -7805,7 +7753,7 @@ ] }, { - "uuid": "bd3e34a0-46f5-4ec2-bd56-d3ff1595bfcf", + "uuid": "69f49501-6416-4d9d-95f0-6a3027541563", "control-id": "cis_rhel10_4-1.2", "description": "No notes for control-id 4.1.2.", "props": [ @@ -7822,7 +7770,7 @@ ] }, { - "uuid": "80942b34-3751-4a91-913b-bc489b6f8969", + "uuid": "8b2ad0dd-f2ae-423b-a66e-9ec09b1f0cf1", "control-id": "cis_rhel10_4-1.3", "description": "No notes for control-id 4.1.3.", "props": [ @@ -7839,7 +7787,7 @@ ] }, { - "uuid": "feeef00a-c020-4016-9e10-01f073537995", + "uuid": "62a35717-dcbc-415c-95cb-c4ae9d1df6a0", "control-id": "cis_rhel10_4-1.4", "description": "The description for control-id cis_rhel10_4-1.4.", "props": [ @@ -7852,7 +7800,7 @@ ] }, { - "uuid": "8525438a-c141-4eed-b9e9-3e5d30468d05", + "uuid": "9d25b960-8152-476e-9a4d-eea59d8a680d", "control-id": "cis_rhel10_4-1.5", "description": "Firewalld in Red Hat Enterprise Linux 10 accepts loopback traffic by default.", "props": [ @@ -7869,7 +7817,7 @@ ] }, { - "uuid": "9803aeff-9696-45d2-8ab7-955b2bfdbdaa", + "uuid": "9728a489-9585-441d-a2b6-8e915927cec8", "control-id": "cis_rhel10_4-1.6", "description": "The description for control-id cis_rhel10_4-1.6.", "props": [ @@ -7882,7 +7830,7 @@ ] }, { - "uuid": "21628817-9e17-4751-a420-4220bdb50a9c", + "uuid": "116d114c-7162-4f43-aa60-7cb945ad2341", "control-id": "cis_rhel10_4-1.7", "description": "The description for control-id cis_rhel10_4-1.7.", "props": [ @@ -7895,7 +7843,7 @@ ] }, { - "uuid": "42366c06-05d6-4100-a408-32a1bcab020a", + "uuid": "15333ba2-de76-4d07-891e-5a258c9f03b7", "control-id": "cis_rhel10_5-1.1", "description": "No notes for control-id 5.1.1.", "props": [ @@ -7952,7 +7900,7 @@ ] }, { - "uuid": "a0f7c9b8-f051-413f-9ac2-592f93f0d217", + "uuid": "6e7888ea-41dd-44fc-a7f5-e940918f7208", "control-id": "cis_rhel10_5-1.2", "description": "No notes for control-id 5.1.2.", "props": [ @@ -7979,7 +7927,7 @@ ] }, { - "uuid": "61658fbb-fe67-491e-a06e-502de7bf060f", + "uuid": "9f36d5d0-c7ad-4619-aeb2-ce1f7b4e855e", "control-id": "cis_rhel10_5-1.3", "description": "No notes for control-id 5.1.3.", "props": [ @@ -8006,7 +7954,7 @@ ] }, { - "uuid": "24dd2ff3-f9c6-431d-9dd4-cf5f7e395596", + "uuid": "f3e6eab9-aaea-47ef-a4ab-8f29c87678f8", "control-id": "cis_rhel10_5-1.4", "description": "No notes for control-id 5.1.4.", "props": [ @@ -8023,7 +7971,7 @@ ] }, { - "uuid": "9637d4d4-8ff3-4550-8914-ccc974723089", + "uuid": "4a3b48b7-1f08-4e3d-8e86-146ccda330d5", "control-id": "cis_rhel10_5-1.5", "description": "No notes for control-id 5.1.5.", "props": [ @@ -8040,7 +7988,7 @@ ] }, { - "uuid": "7325d7ef-f21f-4a80-b400-6ba14ffdb287", + "uuid": "408000e9-8641-4f66-a567-17512e189cfe", "control-id": "cis_rhel10_5-1.6", "description": "No notes for control-id 5.1.6.", "props": [ @@ -8057,7 +8005,7 @@ ] }, { - "uuid": "9e21c43a-2484-4c22-be00-75b968396fe1", + "uuid": "c3c92841-1f90-41c9-b5bc-50682360af10", "control-id": "cis_rhel10_5-1.7", "description": "The requirement gives an example of 45 seconds, but is flexible about the values. It is only\nnecessary to ensure there is a timeout configured in alignment to the site policy.", "props": [ @@ -8079,7 +8027,7 @@ ] }, { - "uuid": "05e60438-462b-46cf-97e9-a1140aa56567", + "uuid": "7dba8344-db53-4557-9236-251d0edf9475", "control-id": "cis_rhel10_5-1.10", "description": "No notes for control-id 5.1.10.", "props": [ @@ -8096,7 +8044,7 @@ ] }, { - "uuid": "4b883127-d812-4558-bc09-b9ece7618c8d", + "uuid": "9d42da60-fc87-4cb4-bc98-ba205e88c0e5", "control-id": "cis_rhel10_5-1.11", "description": "No notes for control-id 5.1.11.", "props": [ @@ -8113,7 +8061,7 @@ ] }, { - "uuid": "ac00cade-916d-4940-a25f-ab8cda55f8eb", + "uuid": "f202a44c-8caa-4c58-a9ce-0c793eabf9fd", "control-id": "cis_rhel10_5-1.12", "description": "The description for control-id cis_rhel10_5-1.12.", "props": [ @@ -8131,7 +8079,7 @@ ] }, { - "uuid": "dcc03301-e572-4b4f-8e67-f9ae3baa2586", + "uuid": "f58e61a0-cbb8-4e90-a853-75395a71dcfb", "control-id": "cis_rhel10_5-1.13", "description": "No notes for control-id 5.1.13.", "props": [ @@ -8148,7 +8096,7 @@ ] }, { - "uuid": "8c6b2a6e-9e97-4180-99e6-8a43a92094db", + "uuid": "8ce7005f-0387-4d22-ab5f-2c92aa478348", "control-id": "cis_rhel10_5-1.14", "description": "The CIS benchmark is not opinionated about which loglevel is selected here. Here, this\nprofile uses VERBOSE by default, as it allows for the capture of login and logout activity\nas well as key fingerprints.", "props": [ @@ -8165,7 +8113,7 @@ ] }, { - "uuid": "82cdbb4c-92b2-4ab6-aea5-2ef4ac1e47ca", + "uuid": "aa370f52-ff80-487e-a8d9-3c82ea17cb33", "control-id": "cis_rhel10_5-1.15", "description": "No notes for control-id 5.1.15.", "props": [ @@ -8182,7 +8130,7 @@ ] }, { - "uuid": "1afc1b0b-59bc-4ecb-a58a-6850b9d83c31", + "uuid": "295f7477-34f7-4942-8c6a-bd14619b9b7b", "control-id": "cis_rhel10_5-1.16", "description": "No notes for control-id 5.1.16.", "props": [ @@ -8199,7 +8147,7 @@ ] }, { - "uuid": "97669b2e-6395-4ef3-a773-8b852571c218", + "uuid": "ee97000b-80c0-4a5d-b240-3cdb44ca1035", "control-id": "cis_rhel10_5-1.17", "description": "No notes for control-id 5.1.17.", "props": [ @@ -8216,7 +8164,7 @@ ] }, { - "uuid": "b2487912-f3d9-43b5-aa2d-18702aad8e7c", + "uuid": "6ddad821-9df8-4255-93ce-393d5baac4a2", "control-id": "cis_rhel10_5-1.18", "description": "No notes for control-id 5.1.18.", "props": [ @@ -8233,7 +8181,7 @@ ] }, { - "uuid": "9f00bbea-2d5d-42e3-a3e6-b0205afd9ba2", + "uuid": "32e2847e-2ae2-4533-a4df-3fa222661eb0", "control-id": "cis_rhel10_5-1.19", "description": "No notes for control-id 5.1.19.", "props": [ @@ -8250,7 +8198,7 @@ ] }, { - "uuid": "e827cbc6-5f7f-4330-a0b2-782c8bd8ee60", + "uuid": "55788b77-2062-4a3d-88a6-efe268872207", "control-id": "cis_rhel10_5-1.20", "description": "No notes for control-id 5.1.20.", "props": [ @@ -8267,7 +8215,7 @@ ] }, { - "uuid": "2daad31a-9a62-4546-8caa-0381895af40d", + "uuid": "b0b867d4-e060-4b38-8d0e-4ff2c98a8832", "control-id": "cis_rhel10_5-1.21", "description": "No notes for control-id 5.1.21.", "props": [ @@ -8284,7 +8232,7 @@ ] }, { - "uuid": "6f764250-2a0f-4a5c-854c-2a42da89562a", + "uuid": "e65b4ef3-c3b2-456c-b914-0eb7355aa2d4", "control-id": "cis_rhel10_5-1.22", "description": "No notes for control-id 5.1.22.", "props": [ @@ -8301,7 +8249,7 @@ ] }, { - "uuid": "98b60319-e6cc-4056-adfc-596a852aa01b", + "uuid": "18764f97-774a-48b1-b544-a5ea1eaef837", "control-id": "cis_rhel10_5-2.1", "description": "No notes for control-id 5.2.1.", "props": [ @@ -8318,7 +8266,7 @@ ] }, { - "uuid": "5da5cfc2-dba2-4b26-b446-f37f64c96029", + "uuid": "fcd0e9de-1467-4f52-8534-efea174735d6", "control-id": "cis_rhel10_5-2.2", "description": "No notes for control-id 5.2.2.", "props": [ @@ -8335,7 +8283,7 @@ ] }, { - "uuid": "bafbdb89-5e03-4a1d-bc77-30c19910ba60", + "uuid": "e8ee7485-47d9-4934-9320-ff3bd673e683", "control-id": "cis_rhel10_5-2.3", "description": "No notes for control-id 5.2.3.", "props": [ @@ -8352,7 +8300,7 @@ ] }, { - "uuid": "b0b59b08-debc-454b-9d03-8c0f5bf05c34", + "uuid": "16cb26d8-da6a-4331-b018-2416c143d689", "control-id": "cis_rhel10_5-2.5", "description": "No notes for control-id 5.2.5.", "props": [ @@ -8369,7 +8317,7 @@ ] }, { - "uuid": "1d99131d-730c-4d4e-bb0b-8fb69f795b68", + "uuid": "9566af2a-5c2b-4b09-9b1a-6a9a89e696de", "control-id": "cis_rhel10_5-2.6", "description": "No notes for control-id 5.2.6.", "props": [ @@ -8386,7 +8334,7 @@ ] }, { - "uuid": "b4f27219-0e21-4dfd-8f9b-8f4bcb29e764", + "uuid": "18e62a2a-0b49-4474-a7b2-a115b8cf3476", "control-id": "cis_rhel10_5-2.7", "description": "Members of \"wheel\" or GID 0 groups are checked by default if the group option is not set for\npam_wheel.so module. The recommendation states the group should be empty to reinforce the\nuse of \"sudo\" for privileged access. Therefore, members of these groups should be manually\nchecked or a different group should be informed.", "props": [ @@ -8408,7 +8356,7 @@ ] }, { - "uuid": "15523cc1-45cc-42ae-a937-848d233d0257", + "uuid": "8522dac7-020e-42f1-94f1-912afd7d1503", "control-id": "cis_rhel10_5-3.1.1", "description": "This requirement is hard to be automated without any specific requirement. The policy even\nstates that provided commands are examples, other custom settings might be in place and the\nsettings might be different depending on site policies. The other rules will already make\nsure there is a correct autheselect profile regardless of the existing settings. It is\nnecessary to better discuss with CIS Community.", "props": [ @@ -8420,7 +8368,7 @@ ] }, { - "uuid": "558e5c83-61ae-4434-a9a7-cc3f1f4931ee", + "uuid": "594b8552-d6e6-4ee0-959d-93543f5fe0e0", "control-id": "cis_rhel10_5-3.1.2", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.1.", "props": [ @@ -8442,7 +8390,7 @@ ] }, { - "uuid": "a7cc9e4e-4ba9-4b7a-ba12-4255a437a066", + "uuid": "c882d2fb-59f4-49c1-bf1f-eb55a7f11957", "control-id": "cis_rhel10_5-3.1.3", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.2.", "props": [ @@ -8469,7 +8417,7 @@ ] }, { - "uuid": "35897e1d-1a42-46b0-bcb9-590a250a89f9", + "uuid": "eb602132-2902-46bd-ae09-b25917f36e34", "control-id": "cis_rhel10_5-3.1.4", "description": "The module is properly enabled by the rules mentioned in related_rules.\nRequirements in 5.3.2.3 use these rules.", "props": [ @@ -8481,7 +8429,7 @@ ] }, { - "uuid": "e53b0663-bdbe-4c79-ac77-196e0452dbec", + "uuid": "9316892c-8008-4b0a-9b59-1bc07a708543", "control-id": "cis_rhel10_5-3.1.5", "description": "No notes for control-id 5.3.1.5.", "props": [ @@ -8498,7 +8446,7 @@ ] }, { - "uuid": "70b10ccd-30a8-4707-8285-4804a7fa2f63", + "uuid": "fe1a633f-1705-4549-981f-6fdfa68f4cde", "control-id": "cis_rhel10_5-3.2.1.1", "description": "No notes for control-id 5.3.2.1.1.", "props": [ @@ -8515,7 +8463,7 @@ ] }, { - "uuid": "b545e794-7d45-4b12-ac3b-b1c5a39e06e0", + "uuid": "402e6f1c-ef76-4a63-937f-66a5c6a57a3c", "control-id": "cis_rhel10_5-3.2.1.2", "description": "The policy also accepts value 0, which means the locked accounts should be manually unlocked\nby an administrator. However, it also mentions that using value 0 can facilitate a DoS\nattack to legitimate users.", "props": [ @@ -8532,7 +8480,7 @@ ] }, { - "uuid": "bc9c4e24-4b07-4ea1-9a3f-f5a35317e8a6", + "uuid": "d99b3c0e-0074-4eb1-b985-7ed78fbb2f7b", "control-id": "cis_rhel10_5-3.2.2.1", "description": "No notes for control-id 5.3.2.2.1.", "props": [ @@ -8549,7 +8497,7 @@ ] }, { - "uuid": "a2f58af5-6d30-4e29-bc39-c1c970888154", + "uuid": "499be254-f2d5-4c53-b03e-8446fc297acd", "control-id": "cis_rhel10_5-3.2.2.2", "description": "No notes for control-id 5.3.2.2.2.", "props": [ @@ -8566,7 +8514,7 @@ ] }, { - "uuid": "315f773e-4208-44ef-ae6e-40f5fc1c56bc", + "uuid": "bd875a20-96c6-4ea1-b338-2b6d800c89ed", "control-id": "cis_rhel10_5-3.2.2.3", "description": "This requirement is expected to be manual. However, in previous versions of the policy\nit was already automated the configuration of \"minclass\" option. This posture was kept for\nRHEL 10 in this new version. Rules related to other options are informed in related_rules.\nIn short, minclass=4 alone can achieve the same result achieved by the combination of the\nother 4 options mentioned in the policy.", "props": [ @@ -8583,7 +8531,7 @@ ] }, { - "uuid": "246fd59e-88c9-4e53-91c7-ac81e07d00df", + "uuid": "512c76b9-b1b8-4033-9d59-2cb077c76f4a", "control-id": "cis_rhel10_5-3.2.2.4", "description": "No notes for control-id 5.3.2.2.4.", "props": [ @@ -8600,7 +8548,7 @@ ] }, { - "uuid": "7a53ed14-d6f3-4752-a877-2920266662a7", + "uuid": "46231670-2f6f-4345-82d2-45132d42c457", "control-id": "cis_rhel10_5-3.2.2.5", "description": "No notes for control-id 5.3.2.2.5.", "props": [ @@ -8617,7 +8565,7 @@ ] }, { - "uuid": "1b4e9fe8-a0bd-4d64-848e-524c8f720e8d", + "uuid": "18d7d5fb-af93-4c38-9c64-4636b21a5b2b", "control-id": "cis_rhel10_5-3.2.2.6", "description": "No notes for control-id 5.3.2.2.6.", "props": [ @@ -8634,7 +8582,7 @@ ] }, { - "uuid": "1b02af4b-1d05-4bd1-9831-b9dd60b48307", + "uuid": "c3f7c35a-a858-449c-ae0f-3683ad3babae", "control-id": "cis_rhel10_5-3.2.2.7", "description": "No notes for control-id 5.3.2.2.7.", "props": [ @@ -8651,7 +8599,7 @@ ] }, { - "uuid": "bef97d84-1772-4ae2-90ee-d72a61e2a911", + "uuid": "162d6558-e318-45e4-887a-4c161a8adee4", "control-id": "cis_rhel10_5-3.2.3.1", "description": "Although mentioned in the section 5.3.3.3, there is no explicit requirement to configure\nretry option of pam_pwhistory. If come in the future, the rule accounts_password_pam_retry\ncan be used.", "props": [ @@ -8673,7 +8621,7 @@ ] }, { - "uuid": "a6ad7248-c513-41ff-9e00-b3ba1633cf5f", + "uuid": "baa3cce9-a808-4fcb-8c34-e3e0ec61b5f7", "control-id": "cis_rhel10_5-3.2.3.2", "description": "No notes for control-id 5.3.2.3.2.", "props": [ @@ -8690,7 +8638,7 @@ ] }, { - "uuid": "2f1dc7d5-445e-4bcf-836a-57986da4984b", + "uuid": "ac92e725-b8f1-4f7c-a5e3-8f2821308488", "control-id": "cis_rhel10_5-3.2.3.3", "description": "In RHEL 10 pam_pwhistory is enabled via authselect feature, as required in 5.3.1.4. The\nfeature automatically set \"use_authok\" option. In any case, we don't have a rule to check\nthis option specifically.", "props": [ @@ -8707,7 +8655,7 @@ ] }, { - "uuid": "87a867a9-2401-4d36-9e38-60e6b8b85a54", + "uuid": "842cba91-e640-421a-b72b-cd2d4d3ffb50", "control-id": "cis_rhel10_5-3.2.4.1", "description": "The rule more specifically used in this requirement also satify the requirement 5.3.1.5.", "props": [ @@ -8724,7 +8672,7 @@ ] }, { - "uuid": "069b6872-0095-4a0f-90c3-e5cc0bbda253", + "uuid": "876abec7-37d5-438e-9ebc-6ad51fbc5ffe", "control-id": "cis_rhel10_5-3.2.4.2", "description": "Usage of pam_unix.so module together with \"remember\" option is deprecated and is not\nrecommended by this policy. Instead, it should be used remember option of pam_pwhistory\nmodule, as required in 5.3.2.3.1. See here for more details about pam_unix.so:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1778929", "props": [ @@ -8741,7 +8689,7 @@ ] }, { - "uuid": "cfdb1bcd-919d-41fa-a9f6-1a6e4efa47a8", + "uuid": "7d226e7d-bd9e-425f-941e-31d7d2596219", "control-id": "cis_rhel10_5-3.2.4.3", "description": "Changes in logindefs mentioned in this requirement are more specifically covered by 5.4.1.4", "props": [ @@ -8763,7 +8711,7 @@ ] }, { - "uuid": "208589d1-3f83-4d5e-91dc-3b95d1421a55", + "uuid": "94c2f725-22e8-4eda-91c5-cb1826ee23ba", "control-id": "cis_rhel10_5-3.2.4.4", "description": "In RHEL 10 pam_unix is enabled by default in all authselect profiles already with the\nuse_authtok option set. In any case, we don't have a rule to check this option specifically,\nlike in 5.3.2.3.3.", "props": [ @@ -8780,7 +8728,7 @@ ] }, { - "uuid": "cfe690c2-6038-42bf-94e7-50b2901a4f34", + "uuid": "81f7fba7-bc52-4127-b539-4fea4c93a10a", "control-id": "cis_rhel10_5-4.1.1", "description": "No notes for control-id 5.4.1.1.", "props": [ @@ -8802,7 +8750,7 @@ ] }, { - "uuid": "5ad5b298-bca3-4726-a12c-1faaf0891249", + "uuid": "5bcbe00f-8ef0-4f2f-9df4-01ffbf466a10", "control-id": "cis_rhel10_5-4.1.3", "description": "No notes for control-id 5.4.1.3.", "props": [ @@ -8824,7 +8772,7 @@ ] }, { - "uuid": "5f6e2533-b054-4dc0-bee5-b0f650dde822", + "uuid": "4d003681-2067-42f5-9341-430c7631c0c7", "control-id": "cis_rhel10_5-4.1.4", "description": "There's a \"new\" set of options in /etc/login.defs file to define the number of iterations\nperformed during the hashing process.", "props": [ @@ -8846,7 +8794,7 @@ ] }, { - "uuid": "eb30bc0e-8da8-4fdb-a878-ced860014fda", + "uuid": "8ac52c1a-ba58-4028-97a3-e081837b4fd6", "control-id": "cis_rhel10_5-4.1.5", "description": "No notes for control-id 5.4.1.5.", "props": [ @@ -8868,7 +8816,7 @@ ] }, { - "uuid": "03046173-d4fb-4d4a-adad-45b5bd207313", + "uuid": "dbdc7b03-2c3e-4222-86ec-7448651cebcc", "control-id": "cis_rhel10_5-4.1.6", "description": "No notes for control-id 5.4.1.6.", "props": [ @@ -8885,7 +8833,7 @@ ] }, { - "uuid": "d64f6d7f-b24a-488d-a924-317b750059c5", + "uuid": "0db09bb4-c09c-416b-af67-1777585558a5", "control-id": "cis_rhel10_5-4.2.1", "description": "No notes for control-id 5.4.2.1.", "props": [ @@ -8902,7 +8850,7 @@ ] }, { - "uuid": "b312c975-e8a7-4576-85ef-9aa2c5bf8ec0", + "uuid": "8d7f71c0-9dc1-468d-83b2-be3ebda12da3", "control-id": "cis_rhel10_5-4.2.2", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -8919,7 +8867,7 @@ ] }, { - "uuid": "7854142b-1d18-4646-b312-354a9519d04c", + "uuid": "c99054c7-e391-48b9-89f5-22f1192f56c8", "control-id": "cis_rhel10_5-4.2.3", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -8936,7 +8884,7 @@ ] }, { - "uuid": "39455f62-ece9-4d8c-b526-945067ea0a57", + "uuid": "6b2a8cf8-fc0a-435b-b1de-45f1132cd578", "control-id": "cis_rhel10_5-4.2.4", "description": "No notes for control-id 5.4.2.4.", "props": [ @@ -8953,7 +8901,7 @@ ] }, { - "uuid": "f5555e23-6fd5-4a95-8e39-02a48a8b5c38", + "uuid": "5391ca5e-99ba-4f64-b76e-03ad0dbe9d67", "control-id": "cis_rhel10_5-4.2.5", "description": "No notes for control-id 5.4.2.5.", "props": [ @@ -8975,7 +8923,7 @@ ] }, { - "uuid": "39207b49-7f18-48bd-aa78-d9c5579e7ee4", + "uuid": "1df12c24-1c37-48d8-ba7c-7e1fcdaf0e9e", "control-id": "cis_rhel10_5-4.2.6", "description": "No notes for control-id 5.4.2.6.", "props": [ @@ -8992,7 +8940,7 @@ ] }, { - "uuid": "4983273a-baca-4d77-ac17-df1f3c80ef52", + "uuid": "7bb95116-ce9d-4789-83d7-6897f954e735", "control-id": "cis_rhel10_5-4.2.7", "description": "No notes for control-id 5.4.2.7.", "props": [ @@ -9014,7 +8962,7 @@ ] }, { - "uuid": "a44cb135-32a4-48fe-aaae-d59557c41a29", + "uuid": "abd4c6f0-5967-47c9-b1f8-b53725d4494a", "control-id": "cis_rhel10_5-4.2.8", "description": "No notes for control-id 5.4.2.8.", "props": [ @@ -9031,7 +8979,7 @@ ] }, { - "uuid": "8e08f11c-432c-4e07-a0d3-622d0847e22f", + "uuid": "e2f21bd4-c31f-4596-8a6c-58bf4c95eaab", "control-id": "cis_rhel10_5-4.3.2", "description": "No notes for control-id 5.4.3.2.", "props": [ @@ -9048,7 +8996,7 @@ ] }, { - "uuid": "6bc53da1-cda3-4cd2-a98b-77c0b295bbf3", + "uuid": "0591708d-d73c-4ef2-bc61-18d59c869357", "control-id": "cis_rhel10_5-4.3.3", "description": "No notes for control-id 5.4.3.3.", "props": [ @@ -9075,7 +9023,7 @@ ] }, { - "uuid": "0977c702-8493-45fe-b3eb-a65679f23fa7", + "uuid": "c3a1d6f9-f2af-473a-b8e5-c649f86271e7", "control-id": "cis_rhel10_6-1.1", "description": "No notes for control-id 6.1.1.", "props": [ @@ -9097,7 +9045,7 @@ ] }, { - "uuid": "b554e3a9-9040-40ee-b8a9-5dd0b420da5e", + "uuid": "55d844e3-3a4f-4066-a509-ea1e8eacecfd", "control-id": "cis_rhel10_6-1.2", "description": "No notes for control-id 6.1.2.", "props": [ @@ -9114,7 +9062,7 @@ ] }, { - "uuid": "b5e22e0b-7915-4027-86c1-ef2e720b8d1a", + "uuid": "6c871e03-0194-47cd-8366-ee02e2673ea5", "control-id": "cis_rhel10_6-1.3", "description": "No notes for control-id 6.1.3.", "props": [ @@ -9131,7 +9079,7 @@ ] }, { - "uuid": "93817462-607f-4ad9-aff8-1f4c364b4cc7", + "uuid": "b86e9a65-00c5-4f56-9c18-c9c5a6c7cf3b", "control-id": "cis_rhel10_6-2.1.1", "description": "No notes for control-id 6.2.1.1.", "props": [ @@ -9148,7 +9096,7 @@ ] }, { - "uuid": "69b59864-271e-45a7-82e0-d125dfea92c7", + "uuid": "9e860c32-5428-4b58-aeac-7c2d5f774183", "control-id": "cis_rhel10_6-2.1.2", "description": "The description for control-id cis_rhel10_6-2.1.2.", "props": [ @@ -9161,7 +9109,7 @@ ] }, { - "uuid": "6a9c77a0-90c6-4652-9bb4-d19e21743394", + "uuid": "824cebdc-b090-4099-b0f3-e3ec122e0b45", "control-id": "cis_rhel10_6-2.1.3", "description": "The description for control-id cis_rhel10_6-2.1.3.", "props": [ @@ -9174,7 +9122,7 @@ ] }, { - "uuid": "7a1682c0-a334-4860-a6b5-5c2f1c0b269f", + "uuid": "d6d10397-80b2-422d-b738-9011d2e8c9f1", "control-id": "cis_rhel10_6-2.1.4", "description": "No notes for control-id 6.2.1.4.", "props": [ @@ -9191,7 +9139,7 @@ ] }, { - "uuid": "61fdb391-0da7-456d-ae59-412337adc0ae", + "uuid": "60a38ef9-6b0f-4896-89b9-d7b42dfa4bb3", "control-id": "cis_rhel10_6-2.2.1.1", "description": "No notes for control-id 6.2.2.1.1.", "props": [ @@ -9208,7 +9156,7 @@ ] }, { - "uuid": "31e1e580-258e-4519-9190-9b1f245f7dfc", + "uuid": "aa602fab-c2fd-4cbd-b058-6f2a4841c768", "control-id": "cis_rhel10_6-2.2.1.2", "description": "The description for control-id cis_rhel10_6-2.2.1.2.", "props": [ @@ -9221,7 +9169,7 @@ ] }, { - "uuid": "60ebc08b-a670-4b88-9261-fa29e0c3f151", + "uuid": "7ba4a96c-900d-48ed-bbac-e9fc35ce29df", "control-id": "cis_rhel10_6-2.2.1.3", "description": "No notes for control-id 6.2.2.1.3.", "props": [ @@ -9238,7 +9186,7 @@ ] }, { - "uuid": "9b4f5819-85c1-4693-95d1-3864c49167de", + "uuid": "18c6b7d2-0141-418e-8bd7-b5aeabe14e25", "control-id": "cis_rhel10_6-2.2.1.4", "description": "No notes for control-id 6.2.2.1.4.", "props": [ @@ -9255,7 +9203,7 @@ ] }, { - "uuid": "9c460d79-eadd-4ab9-b38c-c90e4faf069e", + "uuid": "94812067-5b21-4ee8-a989-7619a2b49a52", "control-id": "cis_rhel10_6-2.2.2", "description": "No notes for control-id 6.2.2.2.", "props": [ @@ -9272,7 +9220,7 @@ ] }, { - "uuid": "10141626-838a-4642-87bc-3aae39034bba", + "uuid": "9b9b9452-af59-4499-a857-853bf65d3ccb", "control-id": "cis_rhel10_6-2.2.3", "description": "No notes for control-id 6.2.2.3.", "props": [ @@ -9289,7 +9237,7 @@ ] }, { - "uuid": "ba964c9c-4d38-4751-93f1-6d8cc216202d", + "uuid": "4d287fc9-0680-4b3b-bd9e-e32e51ad407a", "control-id": "cis_rhel10_6-2.2.4", "description": "No notes for control-id 6.2.2.4.", "props": [ @@ -9306,7 +9254,7 @@ ] }, { - "uuid": "fd7543dc-5dd0-4045-88b7-59853a0e098a", + "uuid": "421db28b-4750-4809-a893-2427e2204403", "control-id": "cis_rhel10_6-2.3.1", "description": "No notes for control-id 6.2.3.1.", "props": [ @@ -9318,7 +9266,7 @@ ] }, { - "uuid": "e67a18b7-ae94-4864-96bc-f67fef7e2a7f", + "uuid": "16fc6f2d-3502-4c15-ba9f-a0dedabc1628", "control-id": "cis_rhel10_6-2.3.2", "description": "No notes for control-id 6.2.3.2.", "props": [ @@ -9330,7 +9278,7 @@ ] }, { - "uuid": "5c67bf11-bd9e-4cfd-a58a-a371ff01b14c", + "uuid": "08dc8521-c2e9-43b7-8a0d-7385b158d23a", "control-id": "cis_rhel10_6-2.3.3", "description": "No notes for control-id 6.2.3.3.", "props": [ @@ -9342,7 +9290,7 @@ ] }, { - "uuid": "fd090f73-d0b9-4fb0-afe0-bd18103a467a", + "uuid": "57fc34ea-47aa-4d60-97b8-543e556b57c7", "control-id": "cis_rhel10_6-2.3.4", "description": "No notes for control-id 6.2.3.4.", "props": [ @@ -9354,7 +9302,7 @@ ] }, { - "uuid": "7f757d14-66be-4da6-a559-d08639b54d85", + "uuid": "2005e298-a23c-4654-9dbe-f96c80f74adc", "control-id": "cis_rhel10_6-2.3.5", "description": "The description for control-id cis_rhel10_6-2.3.5.", "props": [ @@ -9367,7 +9315,7 @@ ] }, { - "uuid": "3c4a6e2e-6594-489b-8332-aae38f66806a", + "uuid": "12c6b463-49e8-4a92-a60f-1b5cdae2012c", "control-id": "cis_rhel10_6-2.3.6", "description": "The description for control-id cis_rhel10_6-2.3.6.", "props": [ @@ -9380,7 +9328,7 @@ ] }, { - "uuid": "1942b9ee-2bc5-4d4c-925d-cb3be41609b3", + "uuid": "4075908b-58bb-4c9e-b341-6134e3973b23", "control-id": "cis_rhel10_6-2.3.7", "description": "No notes for control-id 6.2.3.7.", "props": [ @@ -9392,7 +9340,7 @@ ] }, { - "uuid": "cdb42469-ee3d-43c5-bc3c-c9bd7399a71e", + "uuid": "d6151adf-4a13-4660-b1c0-f9b9f554f2bf", "control-id": "cis_rhel10_6-2.3.8", "description": "The description for control-id cis_rhel10_6-2.3.8.", "props": [ @@ -9405,7 +9353,7 @@ ] }, { - "uuid": "6d4edc76-8bc8-41b0-9047-9a1446210b78", + "uuid": "0852b040-02f7-4933-b43f-b2777dd46102", "control-id": "cis_rhel10_6-2.4.1", "description": "It is not harmful to run these rules even if rsyslog is not installed or active.", "props": [ @@ -9432,7 +9380,7 @@ ] }, { - "uuid": "49947062-dc9e-4cf7-8b17-cf946d9b95f9", + "uuid": "41c12088-091d-499c-9a28-b5beec2223f3", "control-id": "cis_rhel10_7-1.1", "description": "No notes for control-id 7.1.1.", "props": [ @@ -9459,7 +9407,7 @@ ] }, { - "uuid": "a4d6030c-28e0-4d06-9c30-9c0bb2eb185b", + "uuid": "26375bc5-331b-4d78-8223-b83ff86fe861", "control-id": "cis_rhel10_7-1.2", "description": "No notes for control-id 7.1.2.", "props": [ @@ -9486,7 +9434,7 @@ ] }, { - "uuid": "12bb4156-2a49-4e8d-a25f-8876069f330d", + "uuid": "0e8ab58c-415f-4aa9-802e-6ed4239dcbfe", "control-id": "cis_rhel10_7-1.3", "description": "No notes for control-id 7.1.3.", "props": [ @@ -9513,7 +9461,7 @@ ] }, { - "uuid": "711a3c98-15ea-4b02-ac3a-d18fe4305b6f", + "uuid": "501f618e-1ea6-49fe-be86-48aabe95d7eb", "control-id": "cis_rhel10_7-1.4", "description": "No notes for control-id 7.1.4.", "props": [ @@ -9540,7 +9488,7 @@ ] }, { - "uuid": "61585d6f-7533-4719-9be4-c6efc094730a", + "uuid": "65a15dac-37c6-4f8c-a47f-37ed3adff2c9", "control-id": "cis_rhel10_7-1.5", "description": "No notes for control-id 7.1.5.", "props": [ @@ -9567,7 +9515,7 @@ ] }, { - "uuid": "b5c2f699-d043-4e1f-9d08-f09bd3560138", + "uuid": "d169c510-c4ab-4314-96c0-e08be2046821", "control-id": "cis_rhel10_7-1.6", "description": "No notes for control-id 7.1.6.", "props": [ @@ -9594,7 +9542,7 @@ ] }, { - "uuid": "9e759d85-90ed-4401-aee0-fdb47b6ee271", + "uuid": "ebf4ba50-6c2f-4884-b501-b73a241e9e87", "control-id": "cis_rhel10_7-1.7", "description": "No notes for control-id 7.1.7.", "props": [ @@ -9621,7 +9569,7 @@ ] }, { - "uuid": "2d6f8848-584d-4216-b10a-66450e4a030a", + "uuid": "b85377e6-5da0-4b1c-b593-d2c5a5f65bd2", "control-id": "cis_rhel10_7-1.8", "description": "No notes for control-id 7.1.8.", "props": [ @@ -9648,7 +9596,7 @@ ] }, { - "uuid": "90a93c83-4d9d-46ae-bede-b6b810884cd2", + "uuid": "c658559d-3f10-4903-86da-7b18c81c1a1f", "control-id": "cis_rhel10_7-1.9", "description": "No notes for control-id 7.1.9.", "props": [ @@ -9675,7 +9623,7 @@ ] }, { - "uuid": "de2e189e-d4b0-4951-8807-d3c00eb85cc7", + "uuid": "f8653c62-5f01-40a9-bca9-a6420dfdc0c3", "control-id": "cis_rhel10_7-1.10", "description": "No notes for control-id 7.1.10.", "props": [ @@ -9717,7 +9665,7 @@ ] }, { - "uuid": "f23f3fe9-d529-4c0a-b764-19c65cf162b1", + "uuid": "cd142a01-4567-4ec3-92e8-18805fcd5777", "control-id": "cis_rhel10_7-1.11", "description": "No notes for control-id 7.1.11.", "props": [ @@ -9739,7 +9687,7 @@ ] }, { - "uuid": "4fd68b1d-3f6f-4198-a95e-5b467bc12707", + "uuid": "3e70bce2-a756-427d-a015-2cf980e92eeb", "control-id": "cis_rhel10_7-1.12", "description": "No notes for control-id 7.1.12.", "props": [ @@ -9761,7 +9709,7 @@ ] }, { - "uuid": "c8a9af85-e69b-40ac-b1f5-3742ba4d0cbc", + "uuid": "156223ca-8515-4859-90d6-b3c083b5f64c", "control-id": "cis_rhel10_7-1.13", "description": "The description for control-id cis_rhel10_7-1.13.", "props": [ @@ -9774,7 +9722,7 @@ ] }, { - "uuid": "f16529ef-88fa-4e80-a858-e27344b22355", + "uuid": "44c302aa-4377-4952-97c7-f87bf9818872", "control-id": "cis_rhel10_7-2.1", "description": "No notes for control-id 7.2.1.", "props": [ @@ -9791,7 +9739,7 @@ ] }, { - "uuid": "a9ac8aef-45dc-429b-8ab1-b2d0bc36b42b", + "uuid": "e863356d-4cef-4859-989b-f91f25cc6041", "control-id": "cis_rhel10_7-2.2", "description": "No notes for control-id 7.2.2.", "props": [ @@ -9808,7 +9756,7 @@ ] }, { - "uuid": "8107cc52-5e91-4051-baed-3b9ee471bd71", + "uuid": "2472174c-04c6-4bba-a27a-32fcf71939a2", "control-id": "cis_rhel10_7-2.3", "description": "No notes for control-id 7.2.3.", "props": [ @@ -9825,7 +9773,7 @@ ] }, { - "uuid": "48d76205-7fc9-430f-ae63-96cbb81c7338", + "uuid": "bdb37d2b-42a4-441f-97ff-51f0d92315b8", "control-id": "cis_rhel10_7-2.4", "description": "No notes for control-id 7.2.4.", "props": [ @@ -9842,7 +9790,7 @@ ] }, { - "uuid": "fdd9c754-ff7c-434c-9d40-b9f3f60646a3", + "uuid": "efba5d5c-8cde-4b91-a162-c7d6620d513d", "control-id": "cis_rhel10_7-2.5", "description": "No notes for control-id 7.2.5.", "props": [ @@ -9859,7 +9807,7 @@ ] }, { - "uuid": "923f8125-df49-45a4-8c0e-2088717222c2", + "uuid": "53f5213d-bad2-40e8-8567-db3874798a94", "control-id": "cis_rhel10_7-2.6", "description": "No notes for control-id 7.2.6.", "props": [ @@ -9876,7 +9824,7 @@ ] }, { - "uuid": "2601088c-8029-4bf3-856b-13f002be320a", + "uuid": "e28058da-90ec-4d05-b0e7-9dbbc850708f", "control-id": "cis_rhel10_7-2.7", "description": "No notes for control-id 7.2.7.", "props": [ @@ -9893,7 +9841,7 @@ ] }, { - "uuid": "1c30f43a-ec3a-4df6-9a40-4643faf319dc", + "uuid": "1b609c56-51bf-4e6b-b089-bbee2a84c9b7", "control-id": "cis_rhel10_7-2.8", "description": "No notes for control-id 7.2.8.", "props": [ @@ -9920,7 +9868,7 @@ ] }, { - "uuid": "61bf641d-10bd-4cf7-bffa-fb94be523cf4", + "uuid": "1f3cb636-413d-4fb5-b85f-c4cae1a0f028", "control-id": "cis_rhel10_7-2.9", "description": "No notes for control-id 7.2.9.", "props": [ @@ -11898,6943 +11846,6871 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_grub2_cfg", + "value": "file_permissions_boot_grub2", "remarks": "rule_set_037" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/grub.cfg Group Ownership", + "value": "All GRUB configuration files must have mode 0600 or more restrictive", "remarks": "rule_set_037" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_grub2_cfg", + "value": "file_permissions_boot_grub2", "remarks": "rule_set_037" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/grub.cfg Group Ownership", + "value": "All GRUB configuration files must have mode 0600 or more restrictive", "remarks": "rule_set_037" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_grub2_cfg", + "value": "file_owner_boot_grub2", "remarks": "rule_set_038" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/grub.cfg User Ownership", + "value": "All GRUB configuration files must be owned by root", "remarks": "rule_set_038" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_grub2_cfg", + "value": "file_owner_boot_grub2", "remarks": "rule_set_038" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/grub.cfg User Ownership", + "value": "All GRUB configuration files must be owned by root", "remarks": "rule_set_038" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_grub2_cfg", + "value": "file_groupowner_boot_grub2", "remarks": "rule_set_039" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/grub.cfg Permissions", + "value": "All GRUB configuration files must be group-owned by root", "remarks": "rule_set_039" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_grub2_cfg", + "value": "file_groupowner_boot_grub2", "remarks": "rule_set_039" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/grub.cfg Permissions", + "value": "All GRUB configuration files must be group-owned by root", "remarks": "rule_set_039" }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_user_cfg", - "remarks": "rule_set_040" - }, - { - "name": "Rule_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/user.cfg Group Ownership", - "remarks": "rule_set_040" - }, - { - "name": "Check_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_user_cfg", - "remarks": "rule_set_040" - }, - { - "name": "Check_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/user.cfg Group Ownership", - "remarks": "rule_set_040" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_user_cfg", - "remarks": "rule_set_041" - }, - { - "name": "Rule_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/user.cfg User Ownership", - "remarks": "rule_set_041" - }, - { - "name": "Check_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_user_cfg", - "remarks": "rule_set_041" - }, - { - "name": "Check_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/user.cfg User Ownership", - "remarks": "rule_set_041" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_user_cfg", - "remarks": "rule_set_042" - }, - { - "name": "Rule_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/user.cfg Permissions", - "remarks": "rule_set_042" - }, - { - "name": "Check_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_user_cfg", - "remarks": "rule_set_042" - }, - { - "name": "Check_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/user.cfg Permissions", - "remarks": "rule_set_042" - }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_users_coredumps", - "remarks": "rule_set_043" + "remarks": "rule_set_040" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Core Dumps for All Users", - "remarks": "rule_set_043" + "remarks": "rule_set_040" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_users_coredumps", - "remarks": "rule_set_043" + "remarks": "rule_set_040" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Core Dumps for All Users", - "remarks": "rule_set_043" + "remarks": "rule_set_040" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_hardlinks", - "remarks": "rule_set_044" + "remarks": "rule_set_041" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Hardlinks", - "remarks": "rule_set_044" + "remarks": "rule_set_041" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_hardlinks", - "remarks": "rule_set_044" + "remarks": "rule_set_041" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Hardlinks", - "remarks": "rule_set_044" + "remarks": "rule_set_041" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_suid_dumpable", - "remarks": "rule_set_045" + "remarks": "rule_set_042" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Core Dumps for SUID programs", - "remarks": "rule_set_045" + "remarks": "rule_set_042" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_suid_dumpable", - "remarks": "rule_set_045" + "remarks": "rule_set_042" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Core Dumps for SUID programs", - "remarks": "rule_set_045" + "remarks": "rule_set_042" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_dmesg_restrict", - "remarks": "rule_set_046" + "remarks": "rule_set_043" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Access to Kernel Message Buffer", - "remarks": "rule_set_046" + "remarks": "rule_set_043" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_dmesg_restrict", - "remarks": "rule_set_046" + "remarks": "rule_set_043" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Access to Kernel Message Buffer", - "remarks": "rule_set_046" + "remarks": "rule_set_043" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_kptr_restrict", - "remarks": "rule_set_047" + "remarks": "rule_set_044" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Exposed Kernel Pointer Addresses Access", - "remarks": "rule_set_047" + "remarks": "rule_set_044" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_kptr_restrict", - "remarks": "rule_set_047" + "remarks": "rule_set_044" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Exposed Kernel Pointer Addresses Access", - "remarks": "rule_set_047" + "remarks": "rule_set_044" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_yama_ptrace_scope", - "remarks": "rule_set_048" + "remarks": "rule_set_045" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict usage of ptrace to descendant processes", - "remarks": "rule_set_048" + "remarks": "rule_set_045" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_yama_ptrace_scope", - "remarks": "rule_set_048" + "remarks": "rule_set_045" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict usage of ptrace to descendant processes", - "remarks": "rule_set_048" + "remarks": "rule_set_045" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_randomize_va_space", - "remarks": "rule_set_049" + "remarks": "rule_set_046" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Randomized Layout of Virtual Address Space", - "remarks": "rule_set_049" + "remarks": "rule_set_046" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_randomize_va_space", - "remarks": "rule_set_049" + "remarks": "rule_set_046" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Randomized Layout of Virtual Address Space", - "remarks": "rule_set_049" + "remarks": "rule_set_046" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "coredump_disable_backtraces", - "remarks": "rule_set_050" + "remarks": "rule_set_047" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable core dump backtraces", - "remarks": "rule_set_050" + "remarks": "rule_set_047" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "coredump_disable_backtraces", - "remarks": "rule_set_050" + "remarks": "rule_set_047" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable core dump backtraces", - "remarks": "rule_set_050" + "remarks": "rule_set_047" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "coredump_disable_storage", - "remarks": "rule_set_051" + "remarks": "rule_set_048" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable storing core dump", - "remarks": "rule_set_051" + "remarks": "rule_set_048" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "coredump_disable_storage", - "remarks": "rule_set_051" + "remarks": "rule_set_048" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable storing core dump", - "remarks": "rule_set_051" + "remarks": "rule_set_048" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_custom_crypto_policy_cis", - "remarks": "rule_set_052" + "remarks": "rule_set_049" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Implement Custom Crypto Policy Modules for CIS Benchmark", - "remarks": "rule_set_052" + "remarks": "rule_set_049" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_custom_crypto_policy_cis", - "remarks": "rule_set_052" + "remarks": "rule_set_049" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Implement Custom Crypto Policy Modules for CIS Benchmark", - "remarks": "rule_set_052" + "remarks": "rule_set_049" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "banner_etc_motd_cis", - "remarks": "rule_set_053" + "remarks": "rule_set_050" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Message Of The Day Is Configured Properly", - "remarks": "rule_set_053" + "remarks": "rule_set_050" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "banner_etc_motd_cis", - "remarks": "rule_set_053" + "remarks": "rule_set_050" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Message Of The Day Is Configured Properly", - "remarks": "rule_set_053" + "remarks": "rule_set_050" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "banner_etc_issue_cis", - "remarks": "rule_set_054" + "remarks": "rule_set_051" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Local Login Warning Banner Is Configured Properly", - "remarks": "rule_set_054" + "remarks": "rule_set_051" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "banner_etc_issue_cis", - "remarks": "rule_set_054" + "remarks": "rule_set_051" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Local Login Warning Banner Is Configured Properly", - "remarks": "rule_set_054" + "remarks": "rule_set_051" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "banner_etc_issue_net_cis", - "remarks": "rule_set_055" + "remarks": "rule_set_052" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Remote Login Warning Banner Is Configured Properly", - "remarks": "rule_set_055" + "remarks": "rule_set_052" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "banner_etc_issue_net_cis", - "remarks": "rule_set_055" + "remarks": "rule_set_052" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Remote Login Warning Banner Is Configured Properly", - "remarks": "rule_set_055" + "remarks": "rule_set_052" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_motd", - "remarks": "rule_set_056" + "remarks": "rule_set_053" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership of Message of the Day Banner", - "remarks": "rule_set_056" + "remarks": "rule_set_053" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_motd", - "remarks": "rule_set_056" + "remarks": "rule_set_053" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership of Message of the Day Banner", - "remarks": "rule_set_056" + "remarks": "rule_set_053" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_motd", - "remarks": "rule_set_057" + "remarks": "rule_set_054" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify ownership of Message of the Day Banner", - "remarks": "rule_set_057" + "remarks": "rule_set_054" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_motd", - "remarks": "rule_set_057" + "remarks": "rule_set_054" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify ownership of Message of the Day Banner", - "remarks": "rule_set_057" + "remarks": "rule_set_054" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_motd", - "remarks": "rule_set_058" + "remarks": "rule_set_055" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify permissions on Message of the Day Banner", - "remarks": "rule_set_058" + "remarks": "rule_set_055" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_motd", - "remarks": "rule_set_058" + "remarks": "rule_set_055" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify permissions on Message of the Day Banner", - "remarks": "rule_set_058" + "remarks": "rule_set_055" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_issue", - "remarks": "rule_set_059" + "remarks": "rule_set_056" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership of System Login Banner", - "remarks": "rule_set_059" + "remarks": "rule_set_056" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_issue", - "remarks": "rule_set_059" + "remarks": "rule_set_056" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership of System Login Banner", - "remarks": "rule_set_059" + "remarks": "rule_set_056" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_issue", - "remarks": "rule_set_060" + "remarks": "rule_set_057" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify ownership of System Login Banner", - "remarks": "rule_set_060" + "remarks": "rule_set_057" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_issue", - "remarks": "rule_set_060" + "remarks": "rule_set_057" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify ownership of System Login Banner", - "remarks": "rule_set_060" + "remarks": "rule_set_057" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_issue", - "remarks": "rule_set_061" + "remarks": "rule_set_058" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify permissions on System Login Banner", - "remarks": "rule_set_061" + "remarks": "rule_set_058" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_issue", - "remarks": "rule_set_061" + "remarks": "rule_set_058" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify permissions on System Login Banner", - "remarks": "rule_set_061" + "remarks": "rule_set_058" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_issue_net", - "remarks": "rule_set_062" + "remarks": "rule_set_059" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership of System Login Banner for Remote Connections", - "remarks": "rule_set_062" + "remarks": "rule_set_059" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_issue_net", - "remarks": "rule_set_062" + "remarks": "rule_set_059" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership of System Login Banner for Remote Connections", - "remarks": "rule_set_062" + "remarks": "rule_set_059" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_issue_net", - "remarks": "rule_set_063" + "remarks": "rule_set_060" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify ownership of System Login Banner for Remote Connections", - "remarks": "rule_set_063" + "remarks": "rule_set_060" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_issue_net", - "remarks": "rule_set_063" + "remarks": "rule_set_060" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify ownership of System Login Banner for Remote Connections", - "remarks": "rule_set_063" + "remarks": "rule_set_060" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_issue_net", - "remarks": "rule_set_064" + "remarks": "rule_set_061" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify permissions on System Login Banner for Remote Connections", - "remarks": "rule_set_064" + "remarks": "rule_set_061" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_issue_net", - "remarks": "rule_set_064" + "remarks": "rule_set_061" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify permissions on System Login Banner for Remote Connections", - "remarks": "rule_set_064" + "remarks": "rule_set_061" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_banner_enabled", - "remarks": "rule_set_065" + "remarks": "rule_set_062" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable GNOME3 Login Warning Banner", - "remarks": "rule_set_065" + "remarks": "rule_set_062" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_banner_enabled", - "remarks": "rule_set_065" + "remarks": "rule_set_062" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable GNOME3 Login Warning Banner", - "remarks": "rule_set_065" + "remarks": "rule_set_062" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_login_banner_text", - "remarks": "rule_set_066" + "remarks": "rule_set_063" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set the GNOME3 Login Warning Banner Text", - "remarks": "rule_set_066" + "remarks": "rule_set_063" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_login_banner_text", - "remarks": "rule_set_066" + "remarks": "rule_set_063" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set the GNOME3 Login Warning Banner Text", - "remarks": "rule_set_066" + "remarks": "rule_set_063" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_user_list", - "remarks": "rule_set_067" + "remarks": "rule_set_064" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the GNOME3 Login User List", - "remarks": "rule_set_067" + "remarks": "rule_set_064" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_user_list", - "remarks": "rule_set_067" + "remarks": "rule_set_064" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the GNOME3 Login User List", - "remarks": "rule_set_067" + "remarks": "rule_set_064" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_idle_delay", - "remarks": "rule_set_068" + "remarks": "rule_set_065" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set GNOME3 Screensaver Inactivity Timeout", - "remarks": "rule_set_068" + "remarks": "rule_set_065" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_idle_delay", - "remarks": "rule_set_068" + "remarks": "rule_set_065" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set GNOME3 Screensaver Inactivity Timeout", - "remarks": "rule_set_068" + "remarks": "rule_set_065" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_lock_delay", - "remarks": "rule_set_069" + "remarks": "rule_set_066" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set GNOME3 Screensaver Lock Delay After Activation Period", - "remarks": "rule_set_069" + "remarks": "rule_set_066" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_lock_delay", - "remarks": "rule_set_069" + "remarks": "rule_set_066" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set GNOME3 Screensaver Lock Delay After Activation Period", - "remarks": "rule_set_069" + "remarks": "rule_set_066" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_session_idle_user_locks", - "remarks": "rule_set_070" + "remarks": "rule_set_067" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Cannot Change GNOME3 Session Idle Settings", - "remarks": "rule_set_070" + "remarks": "rule_set_067" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_session_idle_user_locks", - "remarks": "rule_set_070" + "remarks": "rule_set_067" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Cannot Change GNOME3 Session Idle Settings", - "remarks": "rule_set_070" + "remarks": "rule_set_067" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_user_locks", - "remarks": "rule_set_071" + "remarks": "rule_set_068" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Cannot Change GNOME3 Screensaver Settings", - "remarks": "rule_set_071" + "remarks": "rule_set_068" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_user_locks", - "remarks": "rule_set_071" + "remarks": "rule_set_068" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Cannot Change GNOME3 Screensaver Settings", - "remarks": "rule_set_071" + "remarks": "rule_set_068" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_automount", - "remarks": "rule_set_072" + "remarks": "rule_set_069" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automounting", - "remarks": "rule_set_072" + "remarks": "rule_set_069" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_automount", - "remarks": "rule_set_072" + "remarks": "rule_set_069" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automounting", - "remarks": "rule_set_072" + "remarks": "rule_set_069" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_automount_open", - "remarks": "rule_set_073" + "remarks": "rule_set_070" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automount Opening", - "remarks": "rule_set_073" + "remarks": "rule_set_070" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_automount_open", - "remarks": "rule_set_073" + "remarks": "rule_set_070" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automount Opening", - "remarks": "rule_set_073" + "remarks": "rule_set_070" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_autorun", - "remarks": "rule_set_074" + "remarks": "rule_set_071" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automount running", - "remarks": "rule_set_074" + "remarks": "rule_set_071" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_autorun", - "remarks": "rule_set_074" + "remarks": "rule_set_071" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automount running", - "remarks": "rule_set_074" + "remarks": "rule_set_071" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_autofs_disabled", - "remarks": "rule_set_075" + "remarks": "rule_set_072" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the Automounter", - "remarks": "rule_set_075" + "remarks": "rule_set_072" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_autofs_disabled", - "remarks": "rule_set_075" + "remarks": "rule_set_072" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the Automounter", - "remarks": "rule_set_075" + "remarks": "rule_set_072" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_avahi-daemon_disabled", - "remarks": "rule_set_076" + "remarks": "rule_set_073" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Avahi Server Software", - "remarks": "rule_set_076" + "remarks": "rule_set_073" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_avahi-daemon_disabled", - "remarks": "rule_set_076" + "remarks": "rule_set_073" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Avahi Server Software", - "remarks": "rule_set_076" + "remarks": "rule_set_073" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_kea_removed", - "remarks": "rule_set_077" + "remarks": "rule_set_074" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall kea Package", - "remarks": "rule_set_077" + "remarks": "rule_set_074" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_kea_removed", - "remarks": "rule_set_077" + "remarks": "rule_set_074" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall kea Package", - "remarks": "rule_set_077" + "remarks": "rule_set_074" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_bind_removed", - "remarks": "rule_set_078" + "remarks": "rule_set_075" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall bind Package", - "remarks": "rule_set_078" + "remarks": "rule_set_075" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_bind_removed", - "remarks": "rule_set_078" + "remarks": "rule_set_075" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall bind Package", - "remarks": "rule_set_078" + "remarks": "rule_set_075" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_dnsmasq_removed", - "remarks": "rule_set_079" + "remarks": "rule_set_076" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall dnsmasq Package", - "remarks": "rule_set_079" + "remarks": "rule_set_076" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_dnsmasq_removed", - "remarks": "rule_set_079" + "remarks": "rule_set_076" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall dnsmasq Package", - "remarks": "rule_set_079" + "remarks": "rule_set_076" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_vsftpd_removed", - "remarks": "rule_set_080" + "remarks": "rule_set_077" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall vsftpd Package", - "remarks": "rule_set_080" + "remarks": "rule_set_077" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_vsftpd_removed", - "remarks": "rule_set_080" + "remarks": "rule_set_077" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall vsftpd Package", - "remarks": "rule_set_080" + "remarks": "rule_set_077" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_dovecot_removed", - "remarks": "rule_set_081" + "remarks": "rule_set_078" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall dovecot Package", - "remarks": "rule_set_081" + "remarks": "rule_set_078" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_dovecot_removed", - "remarks": "rule_set_081" + "remarks": "rule_set_078" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall dovecot Package", - "remarks": "rule_set_081" + "remarks": "rule_set_078" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_cyrus-imapd_removed", - "remarks": "rule_set_082" + "remarks": "rule_set_079" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall cyrus-imapd Package", - "remarks": "rule_set_082" + "remarks": "rule_set_079" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_cyrus-imapd_removed", - "remarks": "rule_set_082" + "remarks": "rule_set_079" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall cyrus-imapd Package", - "remarks": "rule_set_082" + "remarks": "rule_set_079" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_nfs_disabled", - "remarks": "rule_set_083" + "remarks": "rule_set_080" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Network File System (nfs)", - "remarks": "rule_set_083" + "remarks": "rule_set_080" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_nfs_disabled", - "remarks": "rule_set_083" + "remarks": "rule_set_080" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Network File System (nfs)", - "remarks": "rule_set_083" + "remarks": "rule_set_080" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_cups_disabled", - "remarks": "rule_set_084" + "remarks": "rule_set_081" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the CUPS Service", - "remarks": "rule_set_084" + "remarks": "rule_set_081" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_cups_disabled", - "remarks": "rule_set_084" + "remarks": "rule_set_081" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the CUPS Service", - "remarks": "rule_set_084" + "remarks": "rule_set_081" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_rpcbind_disabled", - "remarks": "rule_set_085" + "remarks": "rule_set_082" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable rpcbind Service", - "remarks": "rule_set_085" + "remarks": "rule_set_082" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_rpcbind_disabled", - "remarks": "rule_set_085" + "remarks": "rule_set_082" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable rpcbind Service", - "remarks": "rule_set_085" + "remarks": "rule_set_082" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_rsync_removed", - "remarks": "rule_set_086" + "remarks": "rule_set_083" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall rsync Package", - "remarks": "rule_set_086" + "remarks": "rule_set_083" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_rsync_removed", - "remarks": "rule_set_086" + "remarks": "rule_set_083" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall rsync Package", - "remarks": "rule_set_086" + "remarks": "rule_set_083" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_samba_removed", - "remarks": "rule_set_087" + "remarks": "rule_set_084" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall Samba Package", - "remarks": "rule_set_087" + "remarks": "rule_set_084" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_samba_removed", - "remarks": "rule_set_087" + "remarks": "rule_set_084" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall Samba Package", - "remarks": "rule_set_087" + "remarks": "rule_set_084" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_net-snmp_removed", - "remarks": "rule_set_088" + "remarks": "rule_set_085" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall net-snmp Package", - "remarks": "rule_set_088" + "remarks": "rule_set_085" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_net-snmp_removed", - "remarks": "rule_set_088" + "remarks": "rule_set_085" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall net-snmp Package", - "remarks": "rule_set_088" + "remarks": "rule_set_085" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_telnet-server_removed", - "remarks": "rule_set_089" + "remarks": "rule_set_086" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall telnet-server Package", - "remarks": "rule_set_089" + "remarks": "rule_set_086" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_telnet-server_removed", - "remarks": "rule_set_089" + "remarks": "rule_set_086" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall telnet-server Package", - "remarks": "rule_set_089" + "remarks": "rule_set_086" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_tftp-server_removed", - "remarks": "rule_set_090" + "remarks": "rule_set_087" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall tftp-server Package", - "remarks": "rule_set_090" + "remarks": "rule_set_087" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_tftp-server_removed", - "remarks": "rule_set_090" + "remarks": "rule_set_087" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall tftp-server Package", - "remarks": "rule_set_090" + "remarks": "rule_set_087" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_squid_removed", - "remarks": "rule_set_091" + "remarks": "rule_set_088" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall squid Package", - "remarks": "rule_set_091" + "remarks": "rule_set_088" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_squid_removed", - "remarks": "rule_set_091" + "remarks": "rule_set_088" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall squid Package", - "remarks": "rule_set_091" + "remarks": "rule_set_088" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_httpd_removed", - "remarks": "rule_set_092" + "remarks": "rule_set_089" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall httpd Package", - "remarks": "rule_set_092" + "remarks": "rule_set_089" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_httpd_removed", - "remarks": "rule_set_092" + "remarks": "rule_set_089" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall httpd Package", - "remarks": "rule_set_092" + "remarks": "rule_set_089" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_nginx_removed", - "remarks": "rule_set_093" + "remarks": "rule_set_090" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall nginx Package", - "remarks": "rule_set_093" + "remarks": "rule_set_090" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_nginx_removed", - "remarks": "rule_set_093" + "remarks": "rule_set_090" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall nginx Package", - "remarks": "rule_set_093" + "remarks": "rule_set_090" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "postfix_network_listening_disabled", - "remarks": "rule_set_094" + "remarks": "rule_set_091" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Postfix Network Listening", - "remarks": "rule_set_094" + "remarks": "rule_set_091" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "postfix_network_listening_disabled", - "remarks": "rule_set_094" + "remarks": "rule_set_091" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Postfix Network Listening", - "remarks": "rule_set_094" + "remarks": "rule_set_091" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "has_nonlocal_mta", - "remarks": "rule_set_095" + "remarks": "rule_set_092" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Mail Transfer Agent is not Listening on any non-loopback Address", - "remarks": "rule_set_095" + "remarks": "rule_set_092" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "has_nonlocal_mta", - "remarks": "rule_set_095" + "remarks": "rule_set_092" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Mail Transfer Agent is not Listening on any non-loopback Address", - "remarks": "rule_set_095" + "remarks": "rule_set_092" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_ftp_removed", - "remarks": "rule_set_096" + "remarks": "rule_set_093" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove ftp Package", - "remarks": "rule_set_096" + "remarks": "rule_set_093" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_ftp_removed", - "remarks": "rule_set_096" + "remarks": "rule_set_093" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove ftp Package", - "remarks": "rule_set_096" + "remarks": "rule_set_093" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_telnet_removed", - "remarks": "rule_set_097" + "remarks": "rule_set_094" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove telnet Clients", - "remarks": "rule_set_097" + "remarks": "rule_set_094" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_telnet_removed", - "remarks": "rule_set_097" + "remarks": "rule_set_094" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove telnet Clients", - "remarks": "rule_set_097" + "remarks": "rule_set_094" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_tftp_removed", - "remarks": "rule_set_098" + "remarks": "rule_set_095" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove tftp Daemon", - "remarks": "rule_set_098" + "remarks": "rule_set_095" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_tftp_removed", - "remarks": "rule_set_098" + "remarks": "rule_set_095" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove tftp Daemon", - "remarks": "rule_set_098" + "remarks": "rule_set_095" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_specify_remote_server", - "remarks": "rule_set_099" + "remarks": "rule_set_096" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "A remote time server for Chrony is configured", - "remarks": "rule_set_099" + "remarks": "rule_set_096" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_specify_remote_server", - "remarks": "rule_set_099" + "remarks": "rule_set_096" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "A remote time server for Chrony is configured", - "remarks": "rule_set_099" + "remarks": "rule_set_096" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_run_as_chrony_user", - "remarks": "rule_set_100" + "remarks": "rule_set_097" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that chronyd is running under chrony user account", - "remarks": "rule_set_100" + "remarks": "rule_set_097" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_run_as_chrony_user", - "remarks": "rule_set_100" + "remarks": "rule_set_097" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that chronyd is running under chrony user account", - "remarks": "rule_set_100" + "remarks": "rule_set_097" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_cron_installed", - "remarks": "rule_set_101" + "remarks": "rule_set_098" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install the cron service", - "remarks": "rule_set_101" + "remarks": "rule_set_098" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_cron_installed", - "remarks": "rule_set_101" + "remarks": "rule_set_098" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install the cron service", - "remarks": "rule_set_101" + "remarks": "rule_set_098" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_crond_enabled", - "remarks": "rule_set_102" + "remarks": "rule_set_099" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable cron Service", - "remarks": "rule_set_102" + "remarks": "rule_set_099" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_crond_enabled", - "remarks": "rule_set_102" + "remarks": "rule_set_099" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable cron Service", - "remarks": "rule_set_102" + "remarks": "rule_set_099" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_crontab", - "remarks": "rule_set_103" + "remarks": "rule_set_100" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Crontab", - "remarks": "rule_set_103" + "remarks": "rule_set_100" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_crontab", - "remarks": "rule_set_103" + "remarks": "rule_set_100" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Crontab", - "remarks": "rule_set_103" + "remarks": "rule_set_100" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_crontab", - "remarks": "rule_set_104" + "remarks": "rule_set_101" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on crontab", - "remarks": "rule_set_104" + "remarks": "rule_set_101" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_crontab", - "remarks": "rule_set_104" + "remarks": "rule_set_101" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on crontab", - "remarks": "rule_set_104" + "remarks": "rule_set_101" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_crontab", - "remarks": "rule_set_105" + "remarks": "rule_set_102" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on crontab", - "remarks": "rule_set_105" + "remarks": "rule_set_102" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_crontab", - "remarks": "rule_set_105" + "remarks": "rule_set_102" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on crontab", - "remarks": "rule_set_105" + "remarks": "rule_set_102" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_hourly", - "remarks": "rule_set_106" + "remarks": "rule_set_103" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.hourly", - "remarks": "rule_set_106" + "remarks": "rule_set_103" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_hourly", - "remarks": "rule_set_106" + "remarks": "rule_set_103" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.hourly", - "remarks": "rule_set_106" + "remarks": "rule_set_103" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_hourly", - "remarks": "rule_set_107" + "remarks": "rule_set_104" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.hourly", - "remarks": "rule_set_107" + "remarks": "rule_set_104" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_hourly", - "remarks": "rule_set_107" + "remarks": "rule_set_104" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.hourly", - "remarks": "rule_set_107" + "remarks": "rule_set_104" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_hourly", - "remarks": "rule_set_108" + "remarks": "rule_set_105" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.hourly", - "remarks": "rule_set_108" + "remarks": "rule_set_105" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_hourly", - "remarks": "rule_set_108" + "remarks": "rule_set_105" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.hourly", - "remarks": "rule_set_108" + "remarks": "rule_set_105" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_daily", - "remarks": "rule_set_109" + "remarks": "rule_set_106" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.daily", - "remarks": "rule_set_109" + "remarks": "rule_set_106" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_daily", - "remarks": "rule_set_109" + "remarks": "rule_set_106" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.daily", - "remarks": "rule_set_109" + "remarks": "rule_set_106" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_daily", - "remarks": "rule_set_110" + "remarks": "rule_set_107" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.daily", - "remarks": "rule_set_110" + "remarks": "rule_set_107" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_daily", - "remarks": "rule_set_110" + "remarks": "rule_set_107" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.daily", - "remarks": "rule_set_110" + "remarks": "rule_set_107" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_daily", - "remarks": "rule_set_111" + "remarks": "rule_set_108" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.daily", - "remarks": "rule_set_111" + "remarks": "rule_set_108" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_daily", - "remarks": "rule_set_111" + "remarks": "rule_set_108" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.daily", - "remarks": "rule_set_111" + "remarks": "rule_set_108" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_weekly", - "remarks": "rule_set_112" + "remarks": "rule_set_109" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.weekly", - "remarks": "rule_set_112" + "remarks": "rule_set_109" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_weekly", - "remarks": "rule_set_112" + "remarks": "rule_set_109" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.weekly", - "remarks": "rule_set_112" + "remarks": "rule_set_109" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_weekly", - "remarks": "rule_set_113" + "remarks": "rule_set_110" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.weekly", - "remarks": "rule_set_113" + "remarks": "rule_set_110" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_weekly", - "remarks": "rule_set_113" + "remarks": "rule_set_110" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.weekly", - "remarks": "rule_set_113" + "remarks": "rule_set_110" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_weekly", - "remarks": "rule_set_114" + "remarks": "rule_set_111" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.weekly", - "remarks": "rule_set_114" + "remarks": "rule_set_111" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_weekly", - "remarks": "rule_set_114" + "remarks": "rule_set_111" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.weekly", - "remarks": "rule_set_114" + "remarks": "rule_set_111" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_monthly", - "remarks": "rule_set_115" + "remarks": "rule_set_112" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.monthly", - "remarks": "rule_set_115" + "remarks": "rule_set_112" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_monthly", - "remarks": "rule_set_115" + "remarks": "rule_set_112" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.monthly", - "remarks": "rule_set_115" + "remarks": "rule_set_112" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_monthly", - "remarks": "rule_set_116" + "remarks": "rule_set_113" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.monthly", - "remarks": "rule_set_116" + "remarks": "rule_set_113" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_monthly", - "remarks": "rule_set_116" + "remarks": "rule_set_113" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.monthly", - "remarks": "rule_set_116" + "remarks": "rule_set_113" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_monthly", - "remarks": "rule_set_117" + "remarks": "rule_set_114" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.monthly", - "remarks": "rule_set_117" + "remarks": "rule_set_114" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_monthly", - "remarks": "rule_set_117" + "remarks": "rule_set_114" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.monthly", - "remarks": "rule_set_117" + "remarks": "rule_set_114" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_yearly", - "remarks": "rule_set_118" + "remarks": "rule_set_115" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.yearly", - "remarks": "rule_set_118" + "remarks": "rule_set_115" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_yearly", - "remarks": "rule_set_118" + "remarks": "rule_set_115" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.yearly", - "remarks": "rule_set_118" + "remarks": "rule_set_115" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_yearly", - "remarks": "rule_set_119" + "remarks": "rule_set_116" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.yearly", - "remarks": "rule_set_119" + "remarks": "rule_set_116" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_yearly", - "remarks": "rule_set_119" + "remarks": "rule_set_116" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.yearly", - "remarks": "rule_set_119" + "remarks": "rule_set_116" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_yearly", - "remarks": "rule_set_120" + "remarks": "rule_set_117" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.yearly", - "remarks": "rule_set_120" + "remarks": "rule_set_117" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_yearly", - "remarks": "rule_set_120" + "remarks": "rule_set_117" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.yearly", - "remarks": "rule_set_120" + "remarks": "rule_set_117" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_d", - "remarks": "rule_set_121" + "remarks": "rule_set_118" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.d", - "remarks": "rule_set_121" + "remarks": "rule_set_118" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_d", - "remarks": "rule_set_121" + "remarks": "rule_set_118" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.d", - "remarks": "rule_set_121" + "remarks": "rule_set_118" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_d", - "remarks": "rule_set_122" + "remarks": "rule_set_119" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.d", - "remarks": "rule_set_122" + "remarks": "rule_set_119" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_d", - "remarks": "rule_set_122" + "remarks": "rule_set_119" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.d", - "remarks": "rule_set_122" + "remarks": "rule_set_119" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_d", - "remarks": "rule_set_123" + "remarks": "rule_set_120" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.d", - "remarks": "rule_set_123" + "remarks": "rule_set_120" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_d", - "remarks": "rule_set_123" + "remarks": "rule_set_120" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.d", - "remarks": "rule_set_123" + "remarks": "rule_set_120" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_cron_deny_not_exist", - "remarks": "rule_set_124" + "remarks": "rule_set_121" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/cron.deny does not exist", - "remarks": "rule_set_124" + "remarks": "rule_set_121" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_cron_deny_not_exist", - "remarks": "rule_set_124" + "remarks": "rule_set_121" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/cron.deny does not exist", - "remarks": "rule_set_124" + "remarks": "rule_set_121" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_cron_allow_exists", - "remarks": "rule_set_125" + "remarks": "rule_set_122" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/cron.allow exists", - "remarks": "rule_set_125" + "remarks": "rule_set_122" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_cron_allow_exists", - "remarks": "rule_set_125" + "remarks": "rule_set_122" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/cron.allow exists", - "remarks": "rule_set_125" + "remarks": "rule_set_122" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_allow", - "remarks": "rule_set_126" + "remarks": "rule_set_123" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/cron.allow file", - "remarks": "rule_set_126" + "remarks": "rule_set_123" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_allow", - "remarks": "rule_set_126" + "remarks": "rule_set_123" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/cron.allow file", - "remarks": "rule_set_126" + "remarks": "rule_set_123" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_allow", - "remarks": "rule_set_127" + "remarks": "rule_set_124" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/cron.allow file", - "remarks": "rule_set_127" + "remarks": "rule_set_124" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_allow", - "remarks": "rule_set_127" + "remarks": "rule_set_124" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/cron.allow file", - "remarks": "rule_set_127" + "remarks": "rule_set_124" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_allow", - "remarks": "rule_set_128" + "remarks": "rule_set_125" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/cron.allow file", - "remarks": "rule_set_128" + "remarks": "rule_set_125" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_allow", - "remarks": "rule_set_128" + "remarks": "rule_set_125" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/cron.allow file", - "remarks": "rule_set_128" + "remarks": "rule_set_125" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_at_deny_not_exist", - "remarks": "rule_set_129" + "remarks": "rule_set_126" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/at.deny does not exist", - "remarks": "rule_set_129" + "remarks": "rule_set_126" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_at_deny_not_exist", - "remarks": "rule_set_129" + "remarks": "rule_set_126" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/at.deny does not exist", - "remarks": "rule_set_129" + "remarks": "rule_set_126" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_at_allow_exists", - "remarks": "rule_set_130" + "remarks": "rule_set_127" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/at.allow exists", - "remarks": "rule_set_130" + "remarks": "rule_set_127" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_at_allow_exists", - "remarks": "rule_set_130" + "remarks": "rule_set_127" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/at.allow exists", - "remarks": "rule_set_130" + "remarks": "rule_set_127" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_at_allow", - "remarks": "rule_set_131" + "remarks": "rule_set_128" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/at.allow file", - "remarks": "rule_set_131" + "remarks": "rule_set_128" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_at_allow", - "remarks": "rule_set_131" + "remarks": "rule_set_128" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/at.allow file", - "remarks": "rule_set_131" + "remarks": "rule_set_128" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_at_allow", - "remarks": "rule_set_132" + "remarks": "rule_set_129" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/at.allow file", - "remarks": "rule_set_132" + "remarks": "rule_set_129" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_at_allow", - "remarks": "rule_set_132" + "remarks": "rule_set_129" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/at.allow file", - "remarks": "rule_set_132" + "remarks": "rule_set_129" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_at_allow", - "remarks": "rule_set_133" + "remarks": "rule_set_130" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/at.allow file", - "remarks": "rule_set_133" + "remarks": "rule_set_130" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_at_allow", - "remarks": "rule_set_133" + "remarks": "rule_set_130" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/at.allow file", - "remarks": "rule_set_133" + "remarks": "rule_set_130" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "wireless_disable_interfaces", - "remarks": "rule_set_134" + "remarks": "rule_set_131" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Deactivate Wireless Network Interfaces", - "remarks": "rule_set_134" + "remarks": "rule_set_131" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "wireless_disable_interfaces", - "remarks": "rule_set_134" + "remarks": "rule_set_131" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Deactivate Wireless Network Interfaces", - "remarks": "rule_set_134" + "remarks": "rule_set_131" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_bluetooth_disabled", - "remarks": "rule_set_135" + "remarks": "rule_set_132" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Bluetooth Service", - "remarks": "rule_set_135" + "remarks": "rule_set_132" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_bluetooth_disabled", - "remarks": "rule_set_135" + "remarks": "rule_set_132" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Bluetooth Service", - "remarks": "rule_set_135" + "remarks": "rule_set_132" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_atm_disabled", - "remarks": "rule_set_136" + "remarks": "rule_set_133" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable ATM Support", - "remarks": "rule_set_136" + "remarks": "rule_set_133" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_atm_disabled", - "remarks": "rule_set_136" + "remarks": "rule_set_133" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable ATM Support", - "remarks": "rule_set_136" + "remarks": "rule_set_133" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_can_disabled", - "remarks": "rule_set_137" + "remarks": "rule_set_134" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable CAN Support", - "remarks": "rule_set_137" + "remarks": "rule_set_134" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_can_disabled", - "remarks": "rule_set_137" + "remarks": "rule_set_134" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable CAN Support", - "remarks": "rule_set_137" + "remarks": "rule_set_134" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_dccp_disabled", - "remarks": "rule_set_138" + "remarks": "rule_set_135" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable DCCP Support", - "remarks": "rule_set_138" + "remarks": "rule_set_135" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_dccp_disabled", - "remarks": "rule_set_138" + "remarks": "rule_set_135" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable DCCP Support", - "remarks": "rule_set_138" + "remarks": "rule_set_135" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_tipc_disabled", - "remarks": "rule_set_139" + "remarks": "rule_set_136" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable TIPC Support", - "remarks": "rule_set_139" + "remarks": "rule_set_136" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_tipc_disabled", - "remarks": "rule_set_139" + "remarks": "rule_set_136" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable TIPC Support", - "remarks": "rule_set_139" + "remarks": "rule_set_136" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_rds_disabled", - "remarks": "rule_set_140" + "remarks": "rule_set_137" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable RDS Support", - "remarks": "rule_set_140" + "remarks": "rule_set_137" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_rds_disabled", - "remarks": "rule_set_140" + "remarks": "rule_set_137" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable RDS Support", - "remarks": "rule_set_140" + "remarks": "rule_set_137" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_sctp_disabled", - "remarks": "rule_set_141" + "remarks": "rule_set_138" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SCTP Support", - "remarks": "rule_set_141" + "remarks": "rule_set_138" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_sctp_disabled", - "remarks": "rule_set_141" + "remarks": "rule_set_138" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SCTP Support", - "remarks": "rule_set_141" + "remarks": "rule_set_138" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_forwarding", - "remarks": "rule_set_142" + "remarks": "rule_set_139" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv4 Forwarding on all IPv4 Interfaces", - "remarks": "rule_set_142" + "remarks": "rule_set_139" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_forwarding", - "remarks": "rule_set_142" + "remarks": "rule_set_139" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv4 Forwarding on all IPv4 Interfaces", - "remarks": "rule_set_142" + "remarks": "rule_set_139" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_forwarding", - "remarks": "rule_set_143" + "remarks": "rule_set_140" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv4 Forwarding By Default", - "remarks": "rule_set_143" + "remarks": "rule_set_140" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_forwarding", - "remarks": "rule_set_143" + "remarks": "rule_set_140" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv4 Forwarding By Default", - "remarks": "rule_set_143" + "remarks": "rule_set_140" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_send_redirects", - "remarks": "rule_set_144" + "remarks": "rule_set_141" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_144" + "remarks": "rule_set_141" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_send_redirects", - "remarks": "rule_set_144" + "remarks": "rule_set_141" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_144" + "remarks": "rule_set_141" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_send_redirects", - "remarks": "rule_set_145" + "remarks": "rule_set_142" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces by Default", - "remarks": "rule_set_145" + "remarks": "rule_set_142" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_send_redirects", - "remarks": "rule_set_145" + "remarks": "rule_set_142" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces by Default", - "remarks": "rule_set_145" + "remarks": "rule_set_142" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses", - "remarks": "rule_set_146" + "remarks": "rule_set_143" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Ignore Bogus ICMP Error Responses on IPv4 Interfaces", - "remarks": "rule_set_146" + "remarks": "rule_set_143" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses", - "remarks": "rule_set_146" + "remarks": "rule_set_143" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Ignore Bogus ICMP Error Responses on IPv4 Interfaces", - "remarks": "rule_set_146" + "remarks": "rule_set_143" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_icmp_echo_ignore_broadcasts", - "remarks": "rule_set_147" + "remarks": "rule_set_144" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Ignore ICMP Broadcast Echo Requests on IPv4 Interfaces", - "remarks": "rule_set_147" + "remarks": "rule_set_144" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_icmp_echo_ignore_broadcasts", - "remarks": "rule_set_147" + "remarks": "rule_set_144" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Ignore ICMP Broadcast Echo Requests on IPv4 Interfaces", - "remarks": "rule_set_147" + "remarks": "rule_set_144" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_redirects", - "remarks": "rule_set_148" + "remarks": "rule_set_145" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv4 Interfaces", - "remarks": "rule_set_148" + "remarks": "rule_set_145" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_redirects", - "remarks": "rule_set_148" + "remarks": "rule_set_145" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv4 Interfaces", - "remarks": "rule_set_148" + "remarks": "rule_set_145" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_redirects", - "remarks": "rule_set_149" + "remarks": "rule_set_146" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv4 Interfaces", - "remarks": "rule_set_149" + "remarks": "rule_set_146" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_redirects", - "remarks": "rule_set_149" + "remarks": "rule_set_146" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv4 Interfaces", - "remarks": "rule_set_149" + "remarks": "rule_set_146" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_secure_redirects", - "remarks": "rule_set_150" + "remarks": "rule_set_147" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Secure ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_150" + "remarks": "rule_set_147" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_secure_redirects", - "remarks": "rule_set_150" + "remarks": "rule_set_147" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Secure ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_150" + "remarks": "rule_set_147" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_secure_redirects", - "remarks": "rule_set_151" + "remarks": "rule_set_148" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Kernel Parameter for Accepting Secure Redirects By Default", - "remarks": "rule_set_151" + "remarks": "rule_set_148" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_secure_redirects", - "remarks": "rule_set_151" + "remarks": "rule_set_148" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Kernel Parameter for Accepting Secure Redirects By Default", - "remarks": "rule_set_151" + "remarks": "rule_set_148" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_rp_filter", - "remarks": "rule_set_152" + "remarks": "rule_set_149" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces", - "remarks": "rule_set_152" + "remarks": "rule_set_149" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_rp_filter", - "remarks": "rule_set_152" + "remarks": "rule_set_149" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces", - "remarks": "rule_set_152" + "remarks": "rule_set_149" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_rp_filter", - "remarks": "rule_set_153" + "remarks": "rule_set_150" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces by Default", - "remarks": "rule_set_153" + "remarks": "rule_set_150" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_rp_filter", - "remarks": "rule_set_153" + "remarks": "rule_set_150" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces by Default", - "remarks": "rule_set_153" + "remarks": "rule_set_150" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_source_route", - "remarks": "rule_set_154" + "remarks": "rule_set_151" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces", - "remarks": "rule_set_154" + "remarks": "rule_set_151" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_source_route", - "remarks": "rule_set_154" + "remarks": "rule_set_151" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces", - "remarks": "rule_set_154" + "remarks": "rule_set_151" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_source_route", - "remarks": "rule_set_155" + "remarks": "rule_set_152" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv4 Interfaces by Default", - "remarks": "rule_set_155" + "remarks": "rule_set_152" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_source_route", - "remarks": "rule_set_155" + "remarks": "rule_set_152" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv4 Interfaces by Default", - "remarks": "rule_set_155" + "remarks": "rule_set_152" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_log_martians", - "remarks": "rule_set_156" + "remarks": "rule_set_153" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces", - "remarks": "rule_set_156" + "remarks": "rule_set_153" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_log_martians", - "remarks": "rule_set_156" + "remarks": "rule_set_153" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces", - "remarks": "rule_set_156" + "remarks": "rule_set_153" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_log_martians", - "remarks": "rule_set_157" + "remarks": "rule_set_154" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces by Default", - "remarks": "rule_set_157" + "remarks": "rule_set_154" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_log_martians", - "remarks": "rule_set_157" + "remarks": "rule_set_154" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces by Default", - "remarks": "rule_set_157" + "remarks": "rule_set_154" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_tcp_syncookies", - "remarks": "rule_set_158" + "remarks": "rule_set_155" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use TCP Syncookies on Network Interfaces", - "remarks": "rule_set_158" + "remarks": "rule_set_155" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_tcp_syncookies", - "remarks": "rule_set_158" + "remarks": "rule_set_155" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use TCP Syncookies on Network Interfaces", - "remarks": "rule_set_158" + "remarks": "rule_set_155" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_forwarding", - "remarks": "rule_set_159" + "remarks": "rule_set_156" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv6 Forwarding", - "remarks": "rule_set_159" + "remarks": "rule_set_156" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_forwarding", - "remarks": "rule_set_159" + "remarks": "rule_set_156" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv6 Forwarding", - "remarks": "rule_set_159" + "remarks": "rule_set_156" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_forwarding", - "remarks": "rule_set_160" + "remarks": "rule_set_157" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv6 Forwarding by default", - "remarks": "rule_set_160" + "remarks": "rule_set_157" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_forwarding", - "remarks": "rule_set_160" + "remarks": "rule_set_157" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv6 Forwarding by default", - "remarks": "rule_set_160" + "remarks": "rule_set_157" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_redirects", - "remarks": "rule_set_161" + "remarks": "rule_set_158" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv6 Interfaces", - "remarks": "rule_set_161" + "remarks": "rule_set_158" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_redirects", - "remarks": "rule_set_161" + "remarks": "rule_set_158" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv6 Interfaces", - "remarks": "rule_set_161" + "remarks": "rule_set_158" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_redirects", - "remarks": "rule_set_162" + "remarks": "rule_set_159" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv6 Interfaces", - "remarks": "rule_set_162" + "remarks": "rule_set_159" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_redirects", - "remarks": "rule_set_162" + "remarks": "rule_set_159" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv6 Interfaces", - "remarks": "rule_set_162" + "remarks": "rule_set_159" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_source_route", - "remarks": "rule_set_163" + "remarks": "rule_set_160" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv6 Interfaces", - "remarks": "rule_set_163" + "remarks": "rule_set_160" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_source_route", - "remarks": "rule_set_163" + "remarks": "rule_set_160" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv6 Interfaces", - "remarks": "rule_set_163" + "remarks": "rule_set_160" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_source_route", - "remarks": "rule_set_164" + "remarks": "rule_set_161" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv6 Interfaces by Default", - "remarks": "rule_set_164" + "remarks": "rule_set_161" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_source_route", - "remarks": "rule_set_164" + "remarks": "rule_set_161" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv6 Interfaces by Default", - "remarks": "rule_set_164" + "remarks": "rule_set_161" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_ra", - "remarks": "rule_set_165" + "remarks": "rule_set_162" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Router Advertisements on All IPv6 Interfaces", - "remarks": "rule_set_165" + "remarks": "rule_set_162" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_ra", - "remarks": "rule_set_165" + "remarks": "rule_set_162" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Router Advertisements on All IPv6 Interfaces", - "remarks": "rule_set_165" + "remarks": "rule_set_162" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_ra", - "remarks": "rule_set_166" + "remarks": "rule_set_163" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting Router Advertisements on all IPv6 Interfaces by Default", - "remarks": "rule_set_166" + "remarks": "rule_set_163" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_ra", - "remarks": "rule_set_166" + "remarks": "rule_set_163" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting Router Advertisements on all IPv6 Interfaces by Default", - "remarks": "rule_set_166" + "remarks": "rule_set_163" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_firewalld_installed", - "remarks": "rule_set_167" + "remarks": "rule_set_164" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install firewalld Package", - "remarks": "rule_set_167" + "remarks": "rule_set_164" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_firewalld_installed", - "remarks": "rule_set_167" + "remarks": "rule_set_164" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install firewalld Package", - "remarks": "rule_set_167" + "remarks": "rule_set_164" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "firewalld-backend", - "remarks": "rule_set_168" + "remarks": "rule_set_165" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Firewalld to Use the Nftables Backend", - "remarks": "rule_set_168" + "remarks": "rule_set_165" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "firewalld-backend", - "remarks": "rule_set_168" + "remarks": "rule_set_165" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Firewalld to Use the Nftables Backend", - "remarks": "rule_set_168" + "remarks": "rule_set_165" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_firewalld_enabled", - "remarks": "rule_set_169" + "remarks": "rule_set_166" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify firewalld Enabled", - "remarks": "rule_set_169" + "remarks": "rule_set_166" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_firewalld_enabled", - "remarks": "rule_set_169" + "remarks": "rule_set_166" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify firewalld Enabled", - "remarks": "rule_set_169" + "remarks": "rule_set_166" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "firewalld_loopback_traffic_trusted", - "remarks": "rule_set_170" + "remarks": "rule_set_167" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Firewalld to Trust Loopback Traffic", - "remarks": "rule_set_170" + "remarks": "rule_set_167" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "firewalld_loopback_traffic_trusted", - "remarks": "rule_set_170" + "remarks": "rule_set_167" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Firewalld to Trust Loopback Traffic", - "remarks": "rule_set_170" + "remarks": "rule_set_167" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_config", - "remarks": "rule_set_171" + "remarks": "rule_set_168" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server config file", - "remarks": "rule_set_171" + "remarks": "rule_set_168" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_config", - "remarks": "rule_set_171" + "remarks": "rule_set_168" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server config file", - "remarks": "rule_set_171" + "remarks": "rule_set_168" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_config", - "remarks": "rule_set_172" + "remarks": "rule_set_169" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server config file", - "remarks": "rule_set_172" + "remarks": "rule_set_169" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_config", - "remarks": "rule_set_172" + "remarks": "rule_set_169" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server config file", - "remarks": "rule_set_172" + "remarks": "rule_set_169" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_config", - "remarks": "rule_set_173" + "remarks": "rule_set_170" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server config file", - "remarks": "rule_set_173" + "remarks": "rule_set_170" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_config", - "remarks": "rule_set_173" + "remarks": "rule_set_170" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server config file", - "remarks": "rule_set_173" + "remarks": "rule_set_170" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_sshd_config_d", - "remarks": "rule_set_174" + "remarks": "rule_set_171" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Config File", - "remarks": "rule_set_174" + "remarks": "rule_set_171" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_sshd_config_d", - "remarks": "rule_set_174" + "remarks": "rule_set_171" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Config File", - "remarks": "rule_set_174" + "remarks": "rule_set_171" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_drop_in_config", - "remarks": "rule_set_175" + "remarks": "rule_set_172" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Config File", - "remarks": "rule_set_175" + "remarks": "rule_set_172" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_drop_in_config", - "remarks": "rule_set_175" + "remarks": "rule_set_172" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Config File", - "remarks": "rule_set_175" + "remarks": "rule_set_172" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_sshd_config_d", - "remarks": "rule_set_176" + "remarks": "rule_set_173" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server Configuration Files", - "remarks": "rule_set_176" + "remarks": "rule_set_173" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_sshd_config_d", - "remarks": "rule_set_176" + "remarks": "rule_set_173" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server Configuration Files", - "remarks": "rule_set_176" + "remarks": "rule_set_173" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_sshd_config_d", - "remarks": "rule_set_177" + "remarks": "rule_set_174" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server Configuration Files", - "remarks": "rule_set_177" + "remarks": "rule_set_174" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_sshd_config_d", - "remarks": "rule_set_177" + "remarks": "rule_set_174" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server Configuration Files", - "remarks": "rule_set_177" + "remarks": "rule_set_174" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_drop_in_config", - "remarks": "rule_set_178" + "remarks": "rule_set_175" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server Configuration Files", - "remarks": "rule_set_178" + "remarks": "rule_set_175" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_drop_in_config", - "remarks": "rule_set_178" + "remarks": "rule_set_175" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server Configuration Files", - "remarks": "rule_set_178" + "remarks": "rule_set_175" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_drop_in_config", - "remarks": "rule_set_179" + "remarks": "rule_set_176" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server Configuration Files", - "remarks": "rule_set_179" + "remarks": "rule_set_176" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_drop_in_config", - "remarks": "rule_set_179" + "remarks": "rule_set_176" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server Configuration Files", - "remarks": "rule_set_179" + "remarks": "rule_set_176" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_private_key", - "remarks": "rule_set_180" + "remarks": "rule_set_177" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_180" + "remarks": "rule_set_177" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_private_key", - "remarks": "rule_set_180" + "remarks": "rule_set_177" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_180" + "remarks": "rule_set_177" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_private_key", - "remarks": "rule_set_181" + "remarks": "rule_set_178" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_181" + "remarks": "rule_set_178" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_private_key", - "remarks": "rule_set_181" + "remarks": "rule_set_178" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_181" + "remarks": "rule_set_178" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_private_key", - "remarks": "rule_set_182" + "remarks": "rule_set_179" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Private *_key Key Files", - "remarks": "rule_set_182" + "remarks": "rule_set_179" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_private_key", - "remarks": "rule_set_182" + "remarks": "rule_set_179" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Private *_key Key Files", - "remarks": "rule_set_182" + "remarks": "rule_set_179" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_pub_key", - "remarks": "rule_set_183" + "remarks": "rule_set_180" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_183" + "remarks": "rule_set_180" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_pub_key", - "remarks": "rule_set_183" + "remarks": "rule_set_180" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_183" + "remarks": "rule_set_180" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_pub_key", - "remarks": "rule_set_184" + "remarks": "rule_set_181" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_184" + "remarks": "rule_set_181" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_pub_key", - "remarks": "rule_set_184" + "remarks": "rule_set_181" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_184" + "remarks": "rule_set_181" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_pub_key", - "remarks": "rule_set_185" + "remarks": "rule_set_182" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Public *.pub Key Files", - "remarks": "rule_set_185" + "remarks": "rule_set_182" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_pub_key", - "remarks": "rule_set_185" + "remarks": "rule_set_182" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Public *.pub Key Files", - "remarks": "rule_set_185" + "remarks": "rule_set_182" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_limit_user_access", - "remarks": "rule_set_186" + "remarks": "rule_set_183" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Users' SSH Access", - "remarks": "rule_set_186" + "remarks": "rule_set_183" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_limit_user_access", - "remarks": "rule_set_186" + "remarks": "rule_set_183" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Users' SSH Access", - "remarks": "rule_set_186" + "remarks": "rule_set_183" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_warning_banner_net", - "remarks": "rule_set_187" + "remarks": "rule_set_184" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable SSH Warning Banner", - "remarks": "rule_set_187" + "remarks": "rule_set_184" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_warning_banner_net", - "remarks": "rule_set_187" + "remarks": "rule_set_184" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable SSH Warning Banner", - "remarks": "rule_set_187" + "remarks": "rule_set_184" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_idle_timeout", - "remarks": "rule_set_188" + "remarks": "rule_set_185" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Interval", - "remarks": "rule_set_188" + "remarks": "rule_set_185" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_idle_timeout", - "remarks": "rule_set_188" + "remarks": "rule_set_185" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Interval", - "remarks": "rule_set_188" + "remarks": "rule_set_185" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_keepalive", - "remarks": "rule_set_189" + "remarks": "rule_set_186" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Count Max", - "remarks": "rule_set_189" + "remarks": "rule_set_186" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_keepalive", - "remarks": "rule_set_189" + "remarks": "rule_set_186" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Count Max", - "remarks": "rule_set_189" + "remarks": "rule_set_186" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_host_auth", - "remarks": "rule_set_190" + "remarks": "rule_set_187" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Host-Based Authentication", - "remarks": "rule_set_190" + "remarks": "rule_set_187" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_host_auth", - "remarks": "rule_set_190" + "remarks": "rule_set_187" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Host-Based Authentication", - "remarks": "rule_set_190" + "remarks": "rule_set_187" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_rhosts", - "remarks": "rule_set_191" + "remarks": "rule_set_188" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Support for .rhosts Files", - "remarks": "rule_set_191" + "remarks": "rule_set_188" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_rhosts", - "remarks": "rule_set_191" + "remarks": "rule_set_188" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Support for .rhosts Files", - "remarks": "rule_set_191" + "remarks": "rule_set_188" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_use_strong_kex", - "remarks": "rule_set_192" + "remarks": "rule_set_189" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Use Only Strong Key Exchange algorithms", - "remarks": "rule_set_192" + "remarks": "rule_set_189" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_use_strong_kex", - "remarks": "rule_set_192" + "remarks": "rule_set_189" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Use Only Strong Key Exchange algorithms", - "remarks": "rule_set_192" + "remarks": "rule_set_189" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_login_grace_time", - "remarks": "rule_set_193" + "remarks": "rule_set_190" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SSH LoginGraceTime is configured", - "remarks": "rule_set_193" + "remarks": "rule_set_190" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_login_grace_time", - "remarks": "rule_set_193" + "remarks": "rule_set_190" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SSH LoginGraceTime is configured", - "remarks": "rule_set_193" + "remarks": "rule_set_190" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_loglevel_verbose", - "remarks": "rule_set_194" + "remarks": "rule_set_191" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Daemon LogLevel to VERBOSE", - "remarks": "rule_set_194" + "remarks": "rule_set_191" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_loglevel_verbose", - "remarks": "rule_set_194" + "remarks": "rule_set_191" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Daemon LogLevel to VERBOSE", - "remarks": "rule_set_194" + "remarks": "rule_set_191" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_auth_tries", - "remarks": "rule_set_195" + "remarks": "rule_set_192" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH authentication attempt limit", - "remarks": "rule_set_195" + "remarks": "rule_set_192" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_auth_tries", - "remarks": "rule_set_195" + "remarks": "rule_set_192" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH authentication attempt limit", - "remarks": "rule_set_195" + "remarks": "rule_set_192" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_maxstartups", - "remarks": "rule_set_196" + "remarks": "rule_set_193" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SSH MaxStartups is configured", - "remarks": "rule_set_196" + "remarks": "rule_set_193" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_maxstartups", - "remarks": "rule_set_196" + "remarks": "rule_set_193" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SSH MaxStartups is configured", - "remarks": "rule_set_196" + "remarks": "rule_set_193" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_sessions", - "remarks": "rule_set_197" + "remarks": "rule_set_194" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH MaxSessions limit", - "remarks": "rule_set_197" + "remarks": "rule_set_194" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_sessions", - "remarks": "rule_set_197" + "remarks": "rule_set_194" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH MaxSessions limit", - "remarks": "rule_set_197" + "remarks": "rule_set_194" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_empty_passwords", - "remarks": "rule_set_198" + "remarks": "rule_set_195" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Access via Empty Passwords", - "remarks": "rule_set_198" + "remarks": "rule_set_195" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_empty_passwords", - "remarks": "rule_set_198" + "remarks": "rule_set_195" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Access via Empty Passwords", - "remarks": "rule_set_198" + "remarks": "rule_set_195" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_root_login", - "remarks": "rule_set_199" + "remarks": "rule_set_196" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Root Login", - "remarks": "rule_set_199" + "remarks": "rule_set_196" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_root_login", - "remarks": "rule_set_199" + "remarks": "rule_set_196" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Root Login", - "remarks": "rule_set_199" + "remarks": "rule_set_196" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_do_not_permit_user_env", - "remarks": "rule_set_200" + "remarks": "rule_set_197" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Do Not Allow SSH Environment Options", - "remarks": "rule_set_200" + "remarks": "rule_set_197" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_do_not_permit_user_env", - "remarks": "rule_set_200" + "remarks": "rule_set_197" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Do Not Allow SSH Environment Options", - "remarks": "rule_set_200" + "remarks": "rule_set_197" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_pam", - "remarks": "rule_set_201" + "remarks": "rule_set_198" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable PAM", - "remarks": "rule_set_201" + "remarks": "rule_set_198" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_pam", - "remarks": "rule_set_201" + "remarks": "rule_set_198" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable PAM", - "remarks": "rule_set_201" + "remarks": "rule_set_198" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_sudo_installed", - "remarks": "rule_set_202" + "remarks": "rule_set_199" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install sudo Package", - "remarks": "rule_set_202" + "remarks": "rule_set_199" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_sudo_installed", - "remarks": "rule_set_202" + "remarks": "rule_set_199" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install sudo Package", - "remarks": "rule_set_202" + "remarks": "rule_set_199" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_use_pty", - "remarks": "rule_set_203" + "remarks": "rule_set_200" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo use_pty", - "remarks": "rule_set_203" + "remarks": "rule_set_200" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_use_pty", - "remarks": "rule_set_203" + "remarks": "rule_set_200" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo use_pty", - "remarks": "rule_set_203" + "remarks": "rule_set_200" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_custom_logfile", - "remarks": "rule_set_204" + "remarks": "rule_set_201" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Sudo Logfile Exists - sudo logfile", - "remarks": "rule_set_204" + "remarks": "rule_set_201" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_custom_logfile", - "remarks": "rule_set_204" + "remarks": "rule_set_201" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Sudo Logfile Exists - sudo logfile", - "remarks": "rule_set_204" + "remarks": "rule_set_201" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_no_authenticate", - "remarks": "rule_set_205" + "remarks": "rule_set_202" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo !authenticate", - "remarks": "rule_set_205" + "remarks": "rule_set_202" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_no_authenticate", - "remarks": "rule_set_205" + "remarks": "rule_set_202" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo !authenticate", - "remarks": "rule_set_205" + "remarks": "rule_set_202" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_require_reauthentication", - "remarks": "rule_set_206" + "remarks": "rule_set_203" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require Re-Authentication When Using the sudo Command", - "remarks": "rule_set_206" + "remarks": "rule_set_203" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_require_reauthentication", - "remarks": "rule_set_206" + "remarks": "rule_set_203" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require Re-Authentication When Using the sudo Command", - "remarks": "rule_set_206" + "remarks": "rule_set_203" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "use_pam_wheel_group_for_su", - "remarks": "rule_set_207" + "remarks": "rule_set_204" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Usage of pam_wheel with Group Parameter for su Authentication", - "remarks": "rule_set_207" + "remarks": "rule_set_204" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "use_pam_wheel_group_for_su", - "remarks": "rule_set_207" + "remarks": "rule_set_204" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Usage of pam_wheel with Group Parameter for su Authentication", - "remarks": "rule_set_207" + "remarks": "rule_set_204" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_pam_wheel_group_empty", - "remarks": "rule_set_208" + "remarks": "rule_set_205" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Group Used by pam_wheel.so Module Exists on System and is Empty", - "remarks": "rule_set_208" + "remarks": "rule_set_205" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_pam_wheel_group_empty", - "remarks": "rule_set_208" + "remarks": "rule_set_205" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Group Used by pam_wheel.so Module Exists on System and is Empty", - "remarks": "rule_set_208" + "remarks": "rule_set_205" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_password_pam_faillock_password_auth", - "remarks": "rule_set_209" + "remarks": "rule_set_206" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/password-auth File.", - "remarks": "rule_set_209" + "remarks": "rule_set_206" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_password_pam_faillock_password_auth", - "remarks": "rule_set_209" + "remarks": "rule_set_206" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/password-auth File.", - "remarks": "rule_set_209" + "remarks": "rule_set_206" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_password_pam_faillock_system_auth", - "remarks": "rule_set_210" + "remarks": "rule_set_207" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/system-auth File.", - "remarks": "rule_set_210" + "remarks": "rule_set_207" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_password_pam_faillock_system_auth", - "remarks": "rule_set_210" + "remarks": "rule_set_207" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/system-auth File.", - "remarks": "rule_set_210" + "remarks": "rule_set_207" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_pam_pwquality_installed", - "remarks": "rule_set_211" + "remarks": "rule_set_208" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install pam_pwquality Package", - "remarks": "rule_set_211" + "remarks": "rule_set_208" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_pam_pwquality_installed", - "remarks": "rule_set_211" + "remarks": "rule_set_208" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install pam_pwquality Package", - "remarks": "rule_set_211" + "remarks": "rule_set_208" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwquality_password_auth", - "remarks": "rule_set_212" + "remarks": "rule_set_209" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM password complexity module is enabled in password-auth", - "remarks": "rule_set_212" + "remarks": "rule_set_209" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwquality_password_auth", - "remarks": "rule_set_212" + "remarks": "rule_set_209" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM password complexity module is enabled in password-auth", - "remarks": "rule_set_212" + "remarks": "rule_set_209" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwquality_system_auth", - "remarks": "rule_set_213" + "remarks": "rule_set_210" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM password complexity module is enabled in system-auth", - "remarks": "rule_set_213" + "remarks": "rule_set_210" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwquality_system_auth", - "remarks": "rule_set_213" + "remarks": "rule_set_210" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM password complexity module is enabled in system-auth", - "remarks": "rule_set_213" + "remarks": "rule_set_210" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_enabled", - "remarks": "rule_set_214" + "remarks": "rule_set_211" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify pam_unix module is activated", - "remarks": "rule_set_214" + "remarks": "rule_set_211" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_enabled", - "remarks": "rule_set_214" + "remarks": "rule_set_211" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify pam_unix module is activated", - "remarks": "rule_set_214" + "remarks": "rule_set_211" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny", - "remarks": "rule_set_215" + "remarks": "rule_set_212" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Lock Accounts After Failed Password Attempts", - "remarks": "rule_set_215" + "remarks": "rule_set_212" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny", - "remarks": "rule_set_215" + "remarks": "rule_set_212" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Lock Accounts After Failed Password Attempts", - "remarks": "rule_set_215" + "remarks": "rule_set_212" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_unlock_time_with_zero", - "remarks": "rule_set_216" + "remarks": "rule_set_213" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Lockout Time for Failed Password Attempts", - "remarks": "rule_set_216" + "remarks": "rule_set_213" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_unlock_time_with_zero", - "remarks": "rule_set_216" + "remarks": "rule_set_213" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Lockout Time for Failed Password Attempts", - "remarks": "rule_set_216" + "remarks": "rule_set_213" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_difok", - "remarks": "rule_set_217" + "remarks": "rule_set_214" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Characters", - "remarks": "rule_set_217" + "remarks": "rule_set_214" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_difok", - "remarks": "rule_set_217" + "remarks": "rule_set_214" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Characters", - "remarks": "rule_set_217" + "remarks": "rule_set_214" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minlen", - "remarks": "rule_set_218" + "remarks": "rule_set_215" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Length", - "remarks": "rule_set_218" + "remarks": "rule_set_215" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minlen", - "remarks": "rule_set_218" + "remarks": "rule_set_215" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Length", - "remarks": "rule_set_218" + "remarks": "rule_set_215" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minclass", - "remarks": "rule_set_219" + "remarks": "rule_set_216" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", - "remarks": "rule_set_219" + "remarks": "rule_set_216" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minclass", - "remarks": "rule_set_219" + "remarks": "rule_set_216" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", - "remarks": "rule_set_219" + "remarks": "rule_set_216" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_maxrepeat", - "remarks": "rule_set_220" + "remarks": "rule_set_217" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Consecutive Repeating Characters", - "remarks": "rule_set_220" + "remarks": "rule_set_217" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_maxrepeat", - "remarks": "rule_set_220" + "remarks": "rule_set_217" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Consecutive Repeating Characters", - "remarks": "rule_set_220" + "remarks": "rule_set_217" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_maxsequence", - "remarks": "rule_set_221" + "remarks": "rule_set_218" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit the maximum number of sequential characters in passwords", - "remarks": "rule_set_221" + "remarks": "rule_set_218" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_maxsequence", - "remarks": "rule_set_221" + "remarks": "rule_set_218" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit the maximum number of sequential characters in passwords", - "remarks": "rule_set_221" + "remarks": "rule_set_218" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_dictcheck", - "remarks": "rule_set_222" + "remarks": "rule_set_219" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Prevent the Use of Dictionary Words", - "remarks": "rule_set_222" + "remarks": "rule_set_219" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_dictcheck", - "remarks": "rule_set_222" + "remarks": "rule_set_219" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Prevent the Use of Dictionary Words", - "remarks": "rule_set_222" + "remarks": "rule_set_219" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_enforce_root", - "remarks": "rule_set_223" + "remarks": "rule_set_220" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Enforce for root User", - "remarks": "rule_set_223" + "remarks": "rule_set_220" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_enforce_root", - "remarks": "rule_set_223" + "remarks": "rule_set_220" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Enforce for root User", - "remarks": "rule_set_223" + "remarks": "rule_set_220" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_password_auth", - "remarks": "rule_set_224" + "remarks": "rule_set_221" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: password-auth", - "remarks": "rule_set_224" + "remarks": "rule_set_221" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_password_auth", - "remarks": "rule_set_224" + "remarks": "rule_set_221" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: password-auth", - "remarks": "rule_set_224" + "remarks": "rule_set_221" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_system_auth", - "remarks": "rule_set_225" + "remarks": "rule_set_222" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: system-auth", - "remarks": "rule_set_225" + "remarks": "rule_set_222" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_system_auth", - "remarks": "rule_set_225" + "remarks": "rule_set_222" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: system-auth", - "remarks": "rule_set_225" + "remarks": "rule_set_222" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_enforce_for_root", - "remarks": "rule_set_226" + "remarks": "rule_set_223" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Password History Is Enforced for the Root User", - "remarks": "rule_set_226" + "remarks": "rule_set_223" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_enforce_for_root", - "remarks": "rule_set_226" + "remarks": "rule_set_223" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Password History Is Enforced for the Root User", - "remarks": "rule_set_226" + "remarks": "rule_set_223" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_use_authtok", - "remarks": "rule_set_227" + "remarks": "rule_set_224" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Password History with use_authtok", - "remarks": "rule_set_227" + "remarks": "rule_set_224" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_use_authtok", - "remarks": "rule_set_227" + "remarks": "rule_set_224" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Password History with use_authtok", - "remarks": "rule_set_227" + "remarks": "rule_set_224" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords", - "remarks": "rule_set_228" + "remarks": "rule_set_225" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent Login to Accounts With Empty Password", - "remarks": "rule_set_228" + "remarks": "rule_set_225" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords", - "remarks": "rule_set_228" + "remarks": "rule_set_225" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent Login to Accounts With Empty Password", - "remarks": "rule_set_228" + "remarks": "rule_set_225" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_no_remember", - "remarks": "rule_set_229" + "remarks": "rule_set_226" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Avoid using remember in pam_unix module", - "remarks": "rule_set_229" + "remarks": "rule_set_226" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_no_remember", - "remarks": "rule_set_229" + "remarks": "rule_set_226" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Avoid using remember in pam_unix module", - "remarks": "rule_set_229" + "remarks": "rule_set_226" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_systemauth", - "remarks": "rule_set_230" + "remarks": "rule_set_227" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - system-auth", - "remarks": "rule_set_230" + "remarks": "rule_set_227" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_systemauth", - "remarks": "rule_set_230" + "remarks": "rule_set_227" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - system-auth", - "remarks": "rule_set_230" + "remarks": "rule_set_227" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_passwordauth", - "remarks": "rule_set_231" + "remarks": "rule_set_228" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - password-auth", - "remarks": "rule_set_231" + "remarks": "rule_set_228" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_passwordauth", - "remarks": "rule_set_231" + "remarks": "rule_set_228" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - password-auth", - "remarks": "rule_set_231" + "remarks": "rule_set_228" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_authtok", - "remarks": "rule_set_232" + "remarks": "rule_set_229" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require use_authtok for pam_unix.so", - "remarks": "rule_set_232" + "remarks": "rule_set_229" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_authtok", - "remarks": "rule_set_232" + "remarks": "rule_set_229" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require use_authtok for pam_unix.so", - "remarks": "rule_set_232" + "remarks": "rule_set_229" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_maximum_age_login_defs", - "remarks": "rule_set_233" + "remarks": "rule_set_230" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Age", - "remarks": "rule_set_233" + "remarks": "rule_set_230" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_maximum_age_login_defs", - "remarks": "rule_set_233" + "remarks": "rule_set_230" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Age", - "remarks": "rule_set_233" + "remarks": "rule_set_230" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_max_life_existing", - "remarks": "rule_set_234" + "remarks": "rule_set_231" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Maximum Age", - "remarks": "rule_set_234" + "remarks": "rule_set_231" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_max_life_existing", - "remarks": "rule_set_234" + "remarks": "rule_set_231" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Maximum Age", - "remarks": "rule_set_234" + "remarks": "rule_set_231" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_warn_age_login_defs", - "remarks": "rule_set_235" + "remarks": "rule_set_232" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Warning Age", - "remarks": "rule_set_235" + "remarks": "rule_set_232" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_warn_age_login_defs", - "remarks": "rule_set_235" + "remarks": "rule_set_232" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Warning Age", - "remarks": "rule_set_235" + "remarks": "rule_set_232" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_warn_age_existing", - "remarks": "rule_set_236" + "remarks": "rule_set_233" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Warning Age", - "remarks": "rule_set_236" + "remarks": "rule_set_233" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_warn_age_existing", - "remarks": "rule_set_236" + "remarks": "rule_set_233" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Warning Age", - "remarks": "rule_set_236" + "remarks": "rule_set_233" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_libuserconf", - "remarks": "rule_set_237" + "remarks": "rule_set_234" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/libuser.conf", - "remarks": "rule_set_237" + "remarks": "rule_set_234" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_libuserconf", - "remarks": "rule_set_237" + "remarks": "rule_set_234" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/libuser.conf", - "remarks": "rule_set_237" + "remarks": "rule_set_234" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_logindefs", - "remarks": "rule_set_238" + "remarks": "rule_set_235" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/login.defs", - "remarks": "rule_set_238" + "remarks": "rule_set_235" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_logindefs", - "remarks": "rule_set_238" + "remarks": "rule_set_235" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/login.defs", - "remarks": "rule_set_238" + "remarks": "rule_set_235" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_disable_post_pw_expiration", - "remarks": "rule_set_239" + "remarks": "rule_set_236" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Account Expiration Following Inactivity", - "remarks": "rule_set_239" + "remarks": "rule_set_236" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_disable_post_pw_expiration", - "remarks": "rule_set_239" + "remarks": "rule_set_236" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Account Expiration Following Inactivity", - "remarks": "rule_set_239" + "remarks": "rule_set_236" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_set_post_pw_existing", - "remarks": "rule_set_240" + "remarks": "rule_set_237" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set existing passwords a period of inactivity before they been locked", - "remarks": "rule_set_240" + "remarks": "rule_set_237" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_set_post_pw_existing", - "remarks": "rule_set_240" + "remarks": "rule_set_237" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set existing passwords a period of inactivity before they been locked", - "remarks": "rule_set_240" + "remarks": "rule_set_237" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_last_change_is_in_past", - "remarks": "rule_set_241" + "remarks": "rule_set_238" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure all users last password change date is in the past", - "remarks": "rule_set_241" + "remarks": "rule_set_238" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_last_change_is_in_past", - "remarks": "rule_set_241" + "remarks": "rule_set_238" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure all users last password change date is in the past", - "remarks": "rule_set_241" + "remarks": "rule_set_238" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_no_uid_except_zero", - "remarks": "rule_set_242" + "remarks": "rule_set_239" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Root Has UID 0", - "remarks": "rule_set_242" + "remarks": "rule_set_239" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_no_uid_except_zero", - "remarks": "rule_set_242" + "remarks": "rule_set_239" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Root Has UID 0", - "remarks": "rule_set_242" + "remarks": "rule_set_239" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_gid_zero", - "remarks": "rule_set_243" + "remarks": "rule_set_240" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Root Has A Primary GID 0", - "remarks": "rule_set_243" + "remarks": "rule_set_240" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_gid_zero", - "remarks": "rule_set_243" + "remarks": "rule_set_240" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Root Has A Primary GID 0", - "remarks": "rule_set_243" + "remarks": "rule_set_240" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "groups_no_zero_gid_except_root", - "remarks": "rule_set_244" + "remarks": "rule_set_241" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Group Root Has GID 0", - "remarks": "rule_set_244" + "remarks": "rule_set_241" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "groups_no_zero_gid_except_root", - "remarks": "rule_set_244" + "remarks": "rule_set_241" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Group Root Has GID 0", - "remarks": "rule_set_244" + "remarks": "rule_set_241" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_root_password_configured", - "remarks": "rule_set_245" + "remarks": "rule_set_242" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Authentication Required for Single User Mode", - "remarks": "rule_set_245" + "remarks": "rule_set_242" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_root_password_configured", - "remarks": "rule_set_245" + "remarks": "rule_set_242" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Authentication Required for Single User Mode", - "remarks": "rule_set_245" + "remarks": "rule_set_242" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_path_dirs_no_write", - "remarks": "rule_set_246" + "remarks": "rule_set_243" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include World or Group-Writable Directories", - "remarks": "rule_set_246" + "remarks": "rule_set_243" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_path_dirs_no_write", - "remarks": "rule_set_246" + "remarks": "rule_set_243" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include World or Group-Writable Directories", - "remarks": "rule_set_246" + "remarks": "rule_set_243" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "root_path_no_dot", - "remarks": "rule_set_247" + "remarks": "rule_set_244" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include Relative Paths or Null Directories", - "remarks": "rule_set_247" + "remarks": "rule_set_244" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "root_path_no_dot", - "remarks": "rule_set_247" + "remarks": "rule_set_244" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include Relative Paths or Null Directories", - "remarks": "rule_set_247" + "remarks": "rule_set_244" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_root", - "remarks": "rule_set_248" + "remarks": "rule_set_245" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Root Bash Umask is Set Correctly", - "remarks": "rule_set_248" + "remarks": "rule_set_245" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_root", - "remarks": "rule_set_248" + "remarks": "rule_set_245" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Root Bash Umask is Set Correctly", - "remarks": "rule_set_248" + "remarks": "rule_set_245" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_password_auth_for_systemaccounts", - "remarks": "rule_set_249" + "remarks": "rule_set_246" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Are Locked", - "remarks": "rule_set_249" + "remarks": "rule_set_246" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_password_auth_for_systemaccounts", - "remarks": "rule_set_249" + "remarks": "rule_set_246" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Are Locked", - "remarks": "rule_set_249" + "remarks": "rule_set_246" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_shelllogin_for_systemaccounts", - "remarks": "rule_set_250" + "remarks": "rule_set_247" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", - "remarks": "rule_set_250" + "remarks": "rule_set_247" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_shelllogin_for_systemaccounts", - "remarks": "rule_set_250" + "remarks": "rule_set_247" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", - "remarks": "rule_set_250" + "remarks": "rule_set_247" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_invalid_shell_accounts_unlocked", - "remarks": "rule_set_251" + "remarks": "rule_set_248" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Non-Interactive Accounts Are Locked", - "remarks": "rule_set_251" + "remarks": "rule_set_248" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_invalid_shell_accounts_unlocked", - "remarks": "rule_set_251" + "remarks": "rule_set_248" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Non-Interactive Accounts Are Locked", - "remarks": "rule_set_251" + "remarks": "rule_set_248" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_tmout", - "remarks": "rule_set_252" + "remarks": "rule_set_249" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Interactive Session Timeout", - "remarks": "rule_set_252" + "remarks": "rule_set_249" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_tmout", - "remarks": "rule_set_252" + "remarks": "rule_set_249" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Interactive Session Timeout", - "remarks": "rule_set_252" + "remarks": "rule_set_249" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_bashrc", - "remarks": "rule_set_253" + "remarks": "rule_set_250" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Bash Umask is Set Correctly", - "remarks": "rule_set_253" + "remarks": "rule_set_250" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_bashrc", - "remarks": "rule_set_253" + "remarks": "rule_set_250" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Bash Umask is Set Correctly", - "remarks": "rule_set_253" + "remarks": "rule_set_250" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_login_defs", - "remarks": "rule_set_254" + "remarks": "rule_set_251" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in login.defs", - "remarks": "rule_set_254" + "remarks": "rule_set_251" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_login_defs", - "remarks": "rule_set_254" + "remarks": "rule_set_251" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in login.defs", - "remarks": "rule_set_254" + "remarks": "rule_set_251" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_profile", - "remarks": "rule_set_255" + "remarks": "rule_set_252" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in /etc/profile", - "remarks": "rule_set_255" + "remarks": "rule_set_252" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_profile", - "remarks": "rule_set_255" + "remarks": "rule_set_252" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in /etc/profile", - "remarks": "rule_set_255" + "remarks": "rule_set_252" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_256" + "remarks": "rule_set_253" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_256" + "remarks": "rule_set_253" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_256" + "remarks": "rule_set_253" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_256" + "remarks": "rule_set_253" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_build_database", - "remarks": "rule_set_257" + "remarks": "rule_set_254" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Build and Test AIDE Database", - "remarks": "rule_set_257" + "remarks": "rule_set_254" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_build_database", - "remarks": "rule_set_257" + "remarks": "rule_set_254" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Build and Test AIDE Database", - "remarks": "rule_set_257" + "remarks": "rule_set_254" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_periodic_cron_checking", - "remarks": "rule_set_258" + "remarks": "rule_set_255" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Periodic Execution of AIDE", - "remarks": "rule_set_258" + "remarks": "rule_set_255" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_periodic_cron_checking", - "remarks": "rule_set_258" + "remarks": "rule_set_255" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Periodic Execution of AIDE", - "remarks": "rule_set_258" + "remarks": "rule_set_255" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_check_audit_tools", - "remarks": "rule_set_259" + "remarks": "rule_set_256" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure AIDE to Verify the Audit Tools", - "remarks": "rule_set_259" + "remarks": "rule_set_256" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_check_audit_tools", - "remarks": "rule_set_259" + "remarks": "rule_set_256" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure AIDE to Verify the Audit Tools", - "remarks": "rule_set_259" + "remarks": "rule_set_256" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journald_enabled", - "remarks": "rule_set_260" + "remarks": "rule_set_257" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journald Service", - "remarks": "rule_set_260" + "remarks": "rule_set_257" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journald_enabled", - "remarks": "rule_set_260" + "remarks": "rule_set_257" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journald Service", - "remarks": "rule_set_260" + "remarks": "rule_set_257" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_journald_and_rsyslog_not_active_together", - "remarks": "rule_set_261" + "remarks": "rule_set_258" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald and rsyslog Are Not Active Together", - "remarks": "rule_set_261" + "remarks": "rule_set_258" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_journald_and_rsyslog_not_active_together", - "remarks": "rule_set_261" + "remarks": "rule_set_258" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald and rsyslog Are Not Active Together", - "remarks": "rule_set_261" + "remarks": "rule_set_258" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_systemd-journal-remote_installed", - "remarks": "rule_set_262" + "remarks": "rule_set_259" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install systemd-journal-remote Package", - "remarks": "rule_set_262" + "remarks": "rule_set_259" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_systemd-journal-remote_installed", - "remarks": "rule_set_262" + "remarks": "rule_set_259" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install systemd-journal-remote Package", - "remarks": "rule_set_262" + "remarks": "rule_set_259" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journal-upload_enabled", - "remarks": "rule_set_263" + "remarks": "rule_set_260" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journal-upload Service", - "remarks": "rule_set_263" + "remarks": "rule_set_260" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journal-upload_enabled", - "remarks": "rule_set_263" + "remarks": "rule_set_260" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journal-upload Service", - "remarks": "rule_set_263" + "remarks": "rule_set_260" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "socket_systemd-journal-remote_disabled", - "remarks": "rule_set_264" + "remarks": "rule_set_261" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable systemd-journal-remote Socket", - "remarks": "rule_set_264" + "remarks": "rule_set_261" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "socket_systemd-journal-remote_disabled", - "remarks": "rule_set_264" + "remarks": "rule_set_261" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable systemd-journal-remote Socket", - "remarks": "rule_set_264" + "remarks": "rule_set_261" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_disable_forward_to_syslog", - "remarks": "rule_set_265" + "remarks": "rule_set_262" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald ForwardToSyslog is disabled", - "remarks": "rule_set_265" + "remarks": "rule_set_262" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_disable_forward_to_syslog", - "remarks": "rule_set_265" + "remarks": "rule_set_262" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald ForwardToSyslog is disabled", - "remarks": "rule_set_265" + "remarks": "rule_set_262" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_compress", - "remarks": "rule_set_266" + "remarks": "rule_set_263" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to compress large log files", - "remarks": "rule_set_266" + "remarks": "rule_set_263" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_compress", - "remarks": "rule_set_266" + "remarks": "rule_set_263" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to compress large log files", - "remarks": "rule_set_266" + "remarks": "rule_set_263" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_storage", - "remarks": "rule_set_267" + "remarks": "rule_set_264" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to write log files to persistent disk", - "remarks": "rule_set_267" + "remarks": "rule_set_264" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_storage", - "remarks": "rule_set_267" + "remarks": "rule_set_264" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to write log files to persistent disk", - "remarks": "rule_set_267" + "remarks": "rule_set_264" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_268" + "remarks": "rule_set_265" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_268" + "remarks": "rule_set_265" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_268" + "remarks": "rule_set_265" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_268" + "remarks": "rule_set_265" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_269" + "remarks": "rule_set_266" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_269" + "remarks": "rule_set_266" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_269" + "remarks": "rule_set_266" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_269" + "remarks": "rule_set_266" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_270" + "remarks": "rule_set_267" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_270" + "remarks": "rule_set_267" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_270" + "remarks": "rule_set_267" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_270" + "remarks": "rule_set_267" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_passwd", - "remarks": "rule_set_271" + "remarks": "rule_set_268" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns passwd File", - "remarks": "rule_set_271" + "remarks": "rule_set_268" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_passwd", - "remarks": "rule_set_271" + "remarks": "rule_set_268" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns passwd File", - "remarks": "rule_set_271" + "remarks": "rule_set_268" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_passwd", - "remarks": "rule_set_272" + "remarks": "rule_set_269" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns passwd File", - "remarks": "rule_set_272" + "remarks": "rule_set_269" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_passwd", - "remarks": "rule_set_272" + "remarks": "rule_set_269" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns passwd File", - "remarks": "rule_set_272" + "remarks": "rule_set_269" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_passwd", - "remarks": "rule_set_273" + "remarks": "rule_set_270" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on passwd File", - "remarks": "rule_set_273" + "remarks": "rule_set_270" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_passwd", - "remarks": "rule_set_273" + "remarks": "rule_set_270" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on passwd File", - "remarks": "rule_set_273" + "remarks": "rule_set_270" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_passwd", - "remarks": "rule_set_274" + "remarks": "rule_set_271" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup passwd File", - "remarks": "rule_set_274" + "remarks": "rule_set_271" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_passwd", - "remarks": "rule_set_274" + "remarks": "rule_set_271" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup passwd File", - "remarks": "rule_set_274" + "remarks": "rule_set_271" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_passwd", - "remarks": "rule_set_275" + "remarks": "rule_set_272" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup passwd File", - "remarks": "rule_set_275" + "remarks": "rule_set_272" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_passwd", - "remarks": "rule_set_275" + "remarks": "rule_set_272" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup passwd File", - "remarks": "rule_set_275" + "remarks": "rule_set_272" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_passwd", - "remarks": "rule_set_276" + "remarks": "rule_set_273" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup passwd File", - "remarks": "rule_set_276" + "remarks": "rule_set_273" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_passwd", - "remarks": "rule_set_276" + "remarks": "rule_set_273" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup passwd File", - "remarks": "rule_set_276" + "remarks": "rule_set_273" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_group", - "remarks": "rule_set_277" + "remarks": "rule_set_274" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns group File", - "remarks": "rule_set_277" + "remarks": "rule_set_274" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_group", - "remarks": "rule_set_277" + "remarks": "rule_set_274" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns group File", - "remarks": "rule_set_277" + "remarks": "rule_set_274" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_group", - "remarks": "rule_set_278" + "remarks": "rule_set_275" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns group File", - "remarks": "rule_set_278" + "remarks": "rule_set_275" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_group", - "remarks": "rule_set_278" + "remarks": "rule_set_275" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns group File", - "remarks": "rule_set_278" + "remarks": "rule_set_275" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_group", - "remarks": "rule_set_279" + "remarks": "rule_set_276" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on group File", - "remarks": "rule_set_279" + "remarks": "rule_set_276" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_group", - "remarks": "rule_set_279" + "remarks": "rule_set_276" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on group File", - "remarks": "rule_set_279" + "remarks": "rule_set_276" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_group", - "remarks": "rule_set_280" + "remarks": "rule_set_277" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup group File", - "remarks": "rule_set_280" + "remarks": "rule_set_277" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_group", - "remarks": "rule_set_280" + "remarks": "rule_set_277" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup group File", - "remarks": "rule_set_280" + "remarks": "rule_set_277" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_group", - "remarks": "rule_set_281" + "remarks": "rule_set_278" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup group File", - "remarks": "rule_set_281" + "remarks": "rule_set_278" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_group", - "remarks": "rule_set_281" + "remarks": "rule_set_278" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup group File", - "remarks": "rule_set_281" + "remarks": "rule_set_278" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_group", - "remarks": "rule_set_282" + "remarks": "rule_set_279" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup group File", - "remarks": "rule_set_282" + "remarks": "rule_set_279" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_group", - "remarks": "rule_set_282" + "remarks": "rule_set_279" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup group File", - "remarks": "rule_set_282" + "remarks": "rule_set_279" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shadow", - "remarks": "rule_set_283" + "remarks": "rule_set_280" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns shadow File", - "remarks": "rule_set_283" + "remarks": "rule_set_280" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shadow", - "remarks": "rule_set_283" + "remarks": "rule_set_280" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns shadow File", - "remarks": "rule_set_283" + "remarks": "rule_set_280" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shadow", - "remarks": "rule_set_284" + "remarks": "rule_set_281" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns shadow File", - "remarks": "rule_set_284" + "remarks": "rule_set_281" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shadow", - "remarks": "rule_set_284" + "remarks": "rule_set_281" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns shadow File", - "remarks": "rule_set_284" + "remarks": "rule_set_281" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shadow", - "remarks": "rule_set_285" + "remarks": "rule_set_282" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on shadow File", - "remarks": "rule_set_285" + "remarks": "rule_set_282" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shadow", - "remarks": "rule_set_285" + "remarks": "rule_set_282" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on shadow File", - "remarks": "rule_set_285" + "remarks": "rule_set_282" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_shadow", - "remarks": "rule_set_286" + "remarks": "rule_set_283" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup shadow File", - "remarks": "rule_set_286" + "remarks": "rule_set_283" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_shadow", - "remarks": "rule_set_286" + "remarks": "rule_set_283" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup shadow File", - "remarks": "rule_set_286" + "remarks": "rule_set_283" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_shadow", - "remarks": "rule_set_287" + "remarks": "rule_set_284" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup shadow File", - "remarks": "rule_set_287" + "remarks": "rule_set_284" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_shadow", - "remarks": "rule_set_287" + "remarks": "rule_set_284" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup shadow File", - "remarks": "rule_set_287" + "remarks": "rule_set_284" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_shadow", - "remarks": "rule_set_288" + "remarks": "rule_set_285" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup shadow File", - "remarks": "rule_set_288" + "remarks": "rule_set_285" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_shadow", - "remarks": "rule_set_288" + "remarks": "rule_set_285" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup shadow File", - "remarks": "rule_set_288" + "remarks": "rule_set_285" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_gshadow", - "remarks": "rule_set_289" + "remarks": "rule_set_286" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns gshadow File", - "remarks": "rule_set_289" + "remarks": "rule_set_286" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_gshadow", - "remarks": "rule_set_289" + "remarks": "rule_set_286" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns gshadow File", - "remarks": "rule_set_289" + "remarks": "rule_set_286" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_gshadow", - "remarks": "rule_set_290" + "remarks": "rule_set_287" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns gshadow File", - "remarks": "rule_set_290" + "remarks": "rule_set_287" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_gshadow", - "remarks": "rule_set_290" + "remarks": "rule_set_287" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns gshadow File", - "remarks": "rule_set_290" + "remarks": "rule_set_287" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_gshadow", - "remarks": "rule_set_291" + "remarks": "rule_set_288" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on gshadow File", - "remarks": "rule_set_291" + "remarks": "rule_set_288" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_gshadow", - "remarks": "rule_set_291" + "remarks": "rule_set_288" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on gshadow File", - "remarks": "rule_set_291" + "remarks": "rule_set_288" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_gshadow", - "remarks": "rule_set_292" + "remarks": "rule_set_289" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup gshadow File", - "remarks": "rule_set_292" + "remarks": "rule_set_289" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_gshadow", - "remarks": "rule_set_292" + "remarks": "rule_set_289" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup gshadow File", - "remarks": "rule_set_292" + "remarks": "rule_set_289" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_gshadow", - "remarks": "rule_set_293" + "remarks": "rule_set_290" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup gshadow File", - "remarks": "rule_set_293" + "remarks": "rule_set_290" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_gshadow", - "remarks": "rule_set_293" + "remarks": "rule_set_290" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup gshadow File", - "remarks": "rule_set_293" + "remarks": "rule_set_290" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_gshadow", - "remarks": "rule_set_294" + "remarks": "rule_set_291" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup gshadow File", - "remarks": "rule_set_294" + "remarks": "rule_set_291" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_gshadow", - "remarks": "rule_set_294" + "remarks": "rule_set_291" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup gshadow File", - "remarks": "rule_set_294" + "remarks": "rule_set_291" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shells", - "remarks": "rule_set_295" + "remarks": "rule_set_292" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/shells File", - "remarks": "rule_set_295" + "remarks": "rule_set_292" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shells", - "remarks": "rule_set_295" + "remarks": "rule_set_292" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/shells File", - "remarks": "rule_set_295" + "remarks": "rule_set_292" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shells", - "remarks": "rule_set_296" + "remarks": "rule_set_293" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Who Owns /etc/shells File", - "remarks": "rule_set_296" + "remarks": "rule_set_293" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shells", - "remarks": "rule_set_296" + "remarks": "rule_set_293" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Who Owns /etc/shells File", - "remarks": "rule_set_296" + "remarks": "rule_set_293" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shells", - "remarks": "rule_set_297" + "remarks": "rule_set_294" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/shells File", - "remarks": "rule_set_297" + "remarks": "rule_set_294" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shells", - "remarks": "rule_set_297" + "remarks": "rule_set_294" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/shells File", - "remarks": "rule_set_297" + "remarks": "rule_set_294" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd", - "remarks": "rule_set_298" + "remarks": "rule_set_295" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd File", - "remarks": "rule_set_298" + "remarks": "rule_set_295" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd", - "remarks": "rule_set_298" + "remarks": "rule_set_295" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd File", - "remarks": "rule_set_298" + "remarks": "rule_set_295" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd", - "remarks": "rule_set_299" + "remarks": "rule_set_296" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd File", - "remarks": "rule_set_299" + "remarks": "rule_set_296" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd", - "remarks": "rule_set_299" + "remarks": "rule_set_296" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd File", - "remarks": "rule_set_299" + "remarks": "rule_set_296" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd", - "remarks": "rule_set_300" + "remarks": "rule_set_297" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd File", - "remarks": "rule_set_300" + "remarks": "rule_set_297" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd", - "remarks": "rule_set_300" + "remarks": "rule_set_297" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd File", - "remarks": "rule_set_300" + "remarks": "rule_set_297" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd_old", - "remarks": "rule_set_301" + "remarks": "rule_set_298" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_301" + "remarks": "rule_set_298" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd_old", - "remarks": "rule_set_301" + "remarks": "rule_set_298" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_301" + "remarks": "rule_set_298" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd_old", - "remarks": "rule_set_302" + "remarks": "rule_set_299" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_302" + "remarks": "rule_set_299" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd_old", - "remarks": "rule_set_302" + "remarks": "rule_set_299" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_302" + "remarks": "rule_set_299" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd_old", - "remarks": "rule_set_303" + "remarks": "rule_set_300" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd.old File", - "remarks": "rule_set_303" + "remarks": "rule_set_300" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd_old", - "remarks": "rule_set_303" + "remarks": "rule_set_300" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd.old File", - "remarks": "rule_set_303" + "remarks": "rule_set_300" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_304" + "remarks": "rule_set_301" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_304" + "remarks": "rule_set_301" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_304" + "remarks": "rule_set_301" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_304" + "remarks": "rule_set_301" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_305" + "remarks": "rule_set_302" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_305" + "remarks": "rule_set_302" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_305" + "remarks": "rule_set_302" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_305" + "remarks": "rule_set_302" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_unowned_by_user", - "remarks": "rule_set_306" + "remarks": "rule_set_303" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a User", - "remarks": "rule_set_306" + "remarks": "rule_set_303" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_unowned_by_user", - "remarks": "rule_set_306" + "remarks": "rule_set_303" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a User", - "remarks": "rule_set_306" + "remarks": "rule_set_303" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_ungroupowned", - "remarks": "rule_set_307" + "remarks": "rule_set_304" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a Group", - "remarks": "rule_set_307" + "remarks": "rule_set_304" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_ungroupowned", - "remarks": "rule_set_307" + "remarks": "rule_set_304" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a Group", - "remarks": "rule_set_307" + "remarks": "rule_set_304" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_all_shadowed", - "remarks": "rule_set_308" + "remarks": "rule_set_305" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify All Account Password Hashes are Shadowed", - "remarks": "rule_set_308" + "remarks": "rule_set_305" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_all_shadowed", - "remarks": "rule_set_308" + "remarks": "rule_set_305" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify All Account Password Hashes are Shadowed", - "remarks": "rule_set_308" + "remarks": "rule_set_305" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords_etc_shadow", - "remarks": "rule_set_309" + "remarks": "rule_set_306" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure There Are No Accounts With Blank or Null Passwords", - "remarks": "rule_set_309" + "remarks": "rule_set_306" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords_etc_shadow", - "remarks": "rule_set_309" + "remarks": "rule_set_306" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure There Are No Accounts With Blank or Null Passwords", - "remarks": "rule_set_309" + "remarks": "rule_set_306" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gid_passwd_group_same", - "remarks": "rule_set_310" + "remarks": "rule_set_307" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", - "remarks": "rule_set_310" + "remarks": "rule_set_307" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gid_passwd_group_same", - "remarks": "rule_set_310" + "remarks": "rule_set_307" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", - "remarks": "rule_set_310" + "remarks": "rule_set_307" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_id", - "remarks": "rule_set_311" + "remarks": "rule_set_308" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique User IDs", - "remarks": "rule_set_311" + "remarks": "rule_set_308" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_id", - "remarks": "rule_set_311" + "remarks": "rule_set_308" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique User IDs", - "remarks": "rule_set_311" + "remarks": "rule_set_308" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_id", - "remarks": "rule_set_312" + "remarks": "rule_set_309" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group ID", - "remarks": "rule_set_312" + "remarks": "rule_set_309" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_id", - "remarks": "rule_set_312" + "remarks": "rule_set_309" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group ID", - "remarks": "rule_set_312" + "remarks": "rule_set_309" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_name", - "remarks": "rule_set_313" + "remarks": "rule_set_310" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique Names", - "remarks": "rule_set_313" + "remarks": "rule_set_310" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_name", - "remarks": "rule_set_313" + "remarks": "rule_set_310" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique Names", - "remarks": "rule_set_313" + "remarks": "rule_set_310" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_name", - "remarks": "rule_set_314" + "remarks": "rule_set_311" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group Names", - "remarks": "rule_set_314" + "remarks": "rule_set_311" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_name", - "remarks": "rule_set_314" + "remarks": "rule_set_311" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group Names", - "remarks": "rule_set_314" + "remarks": "rule_set_311" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_interactive_home_directory_exists", - "remarks": "rule_set_315" + "remarks": "rule_set_312" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive Users Home Directories Must Exist", - "remarks": "rule_set_315" + "remarks": "rule_set_312" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_interactive_home_directory_exists", - "remarks": "rule_set_315" + "remarks": "rule_set_312" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive Users Home Directories Must Exist", - "remarks": "rule_set_315" + "remarks": "rule_set_312" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_home_directories", - "remarks": "rule_set_316" + "remarks": "rule_set_313" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Be Owned By The Primary User", - "remarks": "rule_set_316" + "remarks": "rule_set_313" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_home_directories", - "remarks": "rule_set_316" + "remarks": "rule_set_313" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Be Owned By The Primary User", - "remarks": "rule_set_316" + "remarks": "rule_set_313" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_home_directories", - "remarks": "rule_set_317" + "remarks": "rule_set_314" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", - "remarks": "rule_set_317" + "remarks": "rule_set_314" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_home_directories", - "remarks": "rule_set_317" + "remarks": "rule_set_314" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", - "remarks": "rule_set_317" + "remarks": "rule_set_314" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_318" + "remarks": "rule_set_315" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_318" + "remarks": "rule_set_315" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_318" + "remarks": "rule_set_315" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_318" + "remarks": "rule_set_315" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_319" + "remarks": "rule_set_316" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_319" + "remarks": "rule_set_316" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_319" + "remarks": "rule_set_316" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_319" + "remarks": "rule_set_316" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_no_world_writable_programs", - "remarks": "rule_set_320" + "remarks": "rule_set_317" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Not Run World-Writable Programs", - "remarks": "rule_set_320" + "remarks": "rule_set_317" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_no_world_writable_programs", - "remarks": "rule_set_320" + "remarks": "rule_set_317" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Not Run World-Writable Programs", - "remarks": "rule_set_320" + "remarks": "rule_set_317" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_321" + "remarks": "rule_set_318" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_321" + "remarks": "rule_set_318" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_321" + "remarks": "rule_set_318" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_321" + "remarks": "rule_set_318" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_forward_files", - "remarks": "rule_set_322" + "remarks": "rule_set_319" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .forward Files Exist", - "remarks": "rule_set_322" + "remarks": "rule_set_319" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_forward_files", - "remarks": "rule_set_322" + "remarks": "rule_set_319" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .forward Files Exist", - "remarks": "rule_set_322" + "remarks": "rule_set_319" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_netrc_files", - "remarks": "rule_set_323" + "remarks": "rule_set_320" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No netrc Files Exist", - "remarks": "rule_set_323" + "remarks": "rule_set_320" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_netrc_files", - "remarks": "rule_set_323" + "remarks": "rule_set_320" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No netrc Files Exist", - "remarks": "rule_set_323" + "remarks": "rule_set_320" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rhost_files", - "remarks": "rule_set_324" + "remarks": "rule_set_321" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .rhost Files Exist", - "remarks": "rule_set_324" + "remarks": "rule_set_321" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rhost_files", - "remarks": "rule_set_324" + "remarks": "rule_set_321" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .rhost Files Exist", - "remarks": "rule_set_324" + "remarks": "rule_set_321" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_bash_history", - "remarks": "rule_set_325" + "remarks": "rule_set_322" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure User Bash History File Has Correct Permissions", - "remarks": "rule_set_325" + "remarks": "rule_set_322" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_bash_history", - "remarks": "rule_set_325" + "remarks": "rule_set_322" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure User Bash History File Has Correct Permissions", - "remarks": "rule_set_325" + "remarks": "rule_set_322" } ], "control-implementations": [ { - "uuid": "bef020e7-c35e-4152-a54f-73c4ea2a85e9", + "uuid": "de06d380-12b2-42bc-a6e3-3cd8d2fdc0a4", "source": "trestle://profiles/rhel10-cis_rhel10-l1_server/profile.json", "description": "Control implementation for cis_server_l1", "props": [ @@ -19190,7 +19066,7 @@ ], "implemented-requirements": [ { - "uuid": "b0c207b9-6cdd-42b7-acb8-bf93423a1d41", + "uuid": "e0644fd6-e756-496c-889f-8200600f2eb8", "control-id": "reload_dconf_db", "description": "This is a helper rule to reload Dconf database correctly.", "props": [ @@ -19207,7 +19083,7 @@ ] }, { - "uuid": "775f2178-9568-439d-8af8-a6def471f80c", + "uuid": "2d4691a4-2ebe-4570-8a85-b25afeedfcc4", "control-id": "cis_rhel10_1-1.1.1", "description": "No notes for control-id 1.1.1.1.", "props": [ @@ -19224,7 +19100,7 @@ ] }, { - "uuid": "3231fc9d-7d42-4481-8f87-9c6100c58d9f", + "uuid": "50d833e6-4593-42b2-b5ae-1d1bf5e0f34e", "control-id": "cis_rhel10_1-1.1.2", "description": "No notes for control-id 1.1.1.2.", "props": [ @@ -19241,7 +19117,7 @@ ] }, { - "uuid": "c493ef80-403c-4288-9d8e-a07340b5a434", + "uuid": "1475923f-1cda-4f2d-9f48-041874fb022b", "control-id": "cis_rhel10_1-1.1.3", "description": "No notes for control-id 1.1.1.3.", "props": [ @@ -19258,7 +19134,7 @@ ] }, { - "uuid": "c4faaabd-df16-469f-ab5e-b6ea23a2c059", + "uuid": "f32f0093-5cea-4f02-8cb7-fe6ef0dceff7", "control-id": "cis_rhel10_1-1.1.4", "description": "No notes for control-id 1.1.1.4.", "props": [ @@ -19275,7 +19151,7 @@ ] }, { - "uuid": "da9ae75a-650f-4952-8f80-5615efabbee9", + "uuid": "9b7f253c-02d8-4c56-80f5-add9ef59ca5e", "control-id": "cis_rhel10_1-1.1.5", "description": "No notes for control-id 1.1.1.5.", "props": [ @@ -19292,7 +19168,7 @@ ] }, { - "uuid": "95fd9914-30b6-4920-954a-337d2e6f1480", + "uuid": "dff677d5-40a3-4a96-bb76-da3a0eea29b7", "control-id": "cis_rhel10_1-1.1.9", "description": "No notes for control-id 1.1.1.9.", "props": [ @@ -19309,7 +19185,7 @@ ] }, { - "uuid": "9741e902-d036-4224-91a1-a014509d83c3", + "uuid": "7496ebd2-52fe-4176-990a-814f1c8f052a", "control-id": "cis_rhel10_1-1.1.10", "description": "No notes for control-id 1.1.1.10.", "props": [ @@ -19326,7 +19202,7 @@ ] }, { - "uuid": "20aa9f30-87a7-4ac9-9071-67e3b459813d", + "uuid": "1499f114-59ff-4e01-81fb-069e626a3a91", "control-id": "cis_rhel10_1-1.1.11", "description": "The description for control-id cis_rhel10_1-1.1.11.", "props": [ @@ -19339,7 +19215,7 @@ ] }, { - "uuid": "3382f383-d8b2-49a0-b581-284f24d495fb", + "uuid": "a9930806-b43b-4474-9e87-98fba2abef0d", "control-id": "cis_rhel10_1-1.2.1.1", "description": "No notes for control-id 1.1.2.1.1.", "props": [ @@ -19356,7 +19232,7 @@ ] }, { - "uuid": "9b0ed9fa-68a8-4389-b81f-15cf79dfb5aa", + "uuid": "1271a269-93b6-414c-89a4-b8a2a44d67a8", "control-id": "cis_rhel10_1-1.2.1.2", "description": "No notes for control-id 1.1.2.1.2.", "props": [ @@ -19373,7 +19249,7 @@ ] }, { - "uuid": "4d2b2247-e59b-4641-90bf-5f9d0c3518f1", + "uuid": "98b961c2-4f69-4bd0-bf2a-205dcdbf003a", "control-id": "cis_rhel10_1-1.2.1.3", "description": "No notes for control-id 1.1.2.1.3.", "props": [ @@ -19390,7 +19266,7 @@ ] }, { - "uuid": "0fb5b26d-2cc1-4a19-961b-da2e269d673c", + "uuid": "1225589b-4b12-426e-b60e-ef1c44311c13", "control-id": "cis_rhel10_1-1.2.1.4", "description": "No notes for control-id 1.1.2.1.4.", "props": [ @@ -19407,7 +19283,7 @@ ] }, { - "uuid": "4758c16f-a290-4ba9-b6a4-dc9be59080b2", + "uuid": "7170805e-cec4-4ba8-83de-9de8ace84986", "control-id": "cis_rhel10_1-1.2.2.1", "description": "No notes for control-id 1.1.2.2.1.", "props": [ @@ -19424,7 +19300,7 @@ ] }, { - "uuid": "0cdbc572-99a1-466a-8355-9597afc52d04", + "uuid": "d2e33c25-7f03-4ab6-876a-6dd618264665", "control-id": "cis_rhel10_1-1.2.2.2", "description": "No notes for control-id 1.1.2.2.2.", "props": [ @@ -19441,7 +19317,7 @@ ] }, { - "uuid": "9d17cf64-20a5-4a22-afdd-9d2d7367f0e5", + "uuid": "7b0cfeeb-d5d4-479f-9d42-ea10c0500b49", "control-id": "cis_rhel10_1-1.2.2.3", "description": "No notes for control-id 1.1.2.2.3.", "props": [ @@ -19458,7 +19334,7 @@ ] }, { - "uuid": "c31ff8c4-42a2-4483-b9df-be54b9ea730c", + "uuid": "2e17471a-1de3-4497-8b18-96e0101c2cef", "control-id": "cis_rhel10_1-1.2.2.4", "description": "No notes for control-id 1.1.2.2.4.", "props": [ @@ -19475,7 +19351,7 @@ ] }, { - "uuid": "c28f497f-78b1-47e7-b249-f632afdc54fc", + "uuid": "4e1dbcaf-9978-4007-9f5b-5fa1c6260ce7", "control-id": "cis_rhel10_1-1.2.3.2", "description": "No notes for control-id 1.1.2.3.2.", "props": [ @@ -19492,7 +19368,7 @@ ] }, { - "uuid": "b29bec9f-c4ff-4ab5-891d-5fbc9f5c0f7f", + "uuid": "27e0065e-f1a7-470a-8278-ee4f5d2065ee", "control-id": "cis_rhel10_1-1.2.3.3", "description": "No notes for control-id 1.1.2.3.3.", "props": [ @@ -19509,7 +19385,7 @@ ] }, { - "uuid": "89386419-18cf-4cd1-8396-a60202bd4e88", + "uuid": "c0fb0b3d-c1f5-4627-8d91-576a05d9be44", "control-id": "cis_rhel10_1-1.2.4.2", "description": "No notes for control-id 1.1.2.4.2.", "props": [ @@ -19526,7 +19402,7 @@ ] }, { - "uuid": "70274203-e7b9-4bc7-8f38-9e3873105699", + "uuid": "7a1632b0-912a-4179-883a-0a36c19946d9", "control-id": "cis_rhel10_1-1.2.4.3", "description": "No notes for control-id 1.1.2.4.3.", "props": [ @@ -19543,7 +19419,7 @@ ] }, { - "uuid": "1c46d1d5-ee01-40fd-b70e-9c8988c5a224", + "uuid": "92736eb6-fa81-42c0-a908-fc69069441f7", "control-id": "cis_rhel10_1-1.2.5.2", "description": "No notes for control-id 1.1.2.5.2.", "props": [ @@ -19560,7 +19436,7 @@ ] }, { - "uuid": "b295277b-1a3c-4402-9f8a-b9f5890a06f7", + "uuid": "69c765c7-db67-4f66-bbc6-42805181c26c", "control-id": "cis_rhel10_1-1.2.5.3", "description": "No notes for control-id 1.1.2.5.3.", "props": [ @@ -19577,7 +19453,7 @@ ] }, { - "uuid": "88a51b37-eed7-49af-9430-6b93e26e8ae6", + "uuid": "bdb380c6-01a7-415a-b517-89f794729ce1", "control-id": "cis_rhel10_1-1.2.5.4", "description": "No notes for control-id 1.1.2.5.4.", "props": [ @@ -19594,7 +19470,7 @@ ] }, { - "uuid": "b6882636-b20e-44b4-9f5c-09f87814661c", + "uuid": "7a15ad37-de6a-44ea-8042-10e506f7b1a3", "control-id": "cis_rhel10_1-1.2.6.2", "description": "No notes for control-id 1.1.2.6.2.", "props": [ @@ -19611,7 +19487,7 @@ ] }, { - "uuid": "c9d50719-b600-4076-a763-f429f505930b", + "uuid": "da6a2bc7-9f47-4da1-a824-8a9bb2c2d4e5", "control-id": "cis_rhel10_1-1.2.6.3", "description": "No notes for control-id 1.1.2.6.3.", "props": [ @@ -19628,7 +19504,7 @@ ] }, { - "uuid": "357fba8b-907a-4aa6-b7ba-524cc50c1298", + "uuid": "32c9fe90-4b1a-4dbe-916b-f2b75b2037f8", "control-id": "cis_rhel10_1-1.2.6.4", "description": "No notes for control-id 1.1.2.6.4.", "props": [ @@ -19645,7 +19521,7 @@ ] }, { - "uuid": "a713993c-853d-4c96-bb61-93605b4f6da1", + "uuid": "95b58745-dc06-4ac5-b41d-567e7114a7d7", "control-id": "cis_rhel10_1-1.2.7.2", "description": "No notes for control-id 1.1.2.7.2.", "props": [ @@ -19662,7 +19538,7 @@ ] }, { - "uuid": "bc64a377-7ba5-4639-accd-ef88cf1055ab", + "uuid": "b20633fe-8df3-44c1-83fd-0f6b27ab39c8", "control-id": "cis_rhel10_1-1.2.7.3", "description": "No notes for control-id 1.1.2.7.3.", "props": [ @@ -19679,7 +19555,7 @@ ] }, { - "uuid": "9ec773a9-0838-4081-938b-f3749462dbfa", + "uuid": "8ca53ddf-413b-45ad-b90b-2ef1de49b4c7", "control-id": "cis_rhel10_1-1.2.7.4", "description": "No notes for control-id 1.1.2.7.4.", "props": [ @@ -19696,7 +19572,7 @@ ] }, { - "uuid": "020295f5-19f6-451f-bd46-b17b9d9f7d24", + "uuid": "e7451821-5df1-4dba-8da6-5d7bbe4d7422", "control-id": "cis_rhel10_1-2.1.1", "description": "The description for control-id cis_rhel10_1-2.1.1.", "props": [ @@ -19709,7 +19585,7 @@ ] }, { - "uuid": "cbd80a12-7d51-4ccd-b638-1290168d4571", + "uuid": "bb7516a5-4bbe-44fd-bc95-ce245e0208d3", "control-id": "cis_rhel10_1-2.1.2", "description": "No notes for control-id 1.2.1.2.", "props": [ @@ -19726,7 +19602,7 @@ ] }, { - "uuid": "2fa7f88c-a858-4b4a-9208-193764055684", + "uuid": "7704c5f7-da9a-40b2-ba15-581068578cab", "control-id": "cis_rhel10_1-2.1.4", "description": "The description for control-id cis_rhel10_1-2.1.4.", "props": [ @@ -19739,7 +19615,7 @@ ] }, { - "uuid": "5a743e44-5a41-4825-bdee-f8c53f3c3fea", + "uuid": "be47ce2c-5aef-4389-96aa-3cccdbcedceb", "control-id": "cis_rhel10_1-2.2.1", "description": "The description for control-id cis_rhel10_1-2.2.1.", "props": [ @@ -19752,7 +19628,7 @@ ] }, { - "uuid": "b0e995fb-728d-45ba-8b80-6125162e3235", + "uuid": "339c2466-8590-4d1e-883b-4ec60a5b0c41", "control-id": "cis_rhel10_1-3.1.1", "description": "No notes for control-id 1.3.1.1.", "props": [ @@ -19769,7 +19645,7 @@ ] }, { - "uuid": "750b05d0-3b35-4361-9ec5-1766105cd87e", + "uuid": "7814718d-7488-4d2f-b3fc-58f7f97f4155", "control-id": "cis_rhel10_1-3.1.2", "description": "No notes for control-id 1.3.1.2.", "props": [ @@ -19786,7 +19662,7 @@ ] }, { - "uuid": "32ce57b3-b49d-4fa6-8b8d-c576ce598bc1", + "uuid": "cbf60465-b4cf-45b2-88b3-6070817e6c4b", "control-id": "cis_rhel10_1-3.1.3", "description": "No notes for control-id 1.3.1.3.", "props": [ @@ -19803,7 +19679,7 @@ ] }, { - "uuid": "d8506551-54c8-438b-8c1c-4d4cf851181b", + "uuid": "4a59f922-597e-429f-896f-adeefdabd384", "control-id": "cis_rhel10_1-3.1.4", "description": "No notes for control-id 1.3.1.4.", "props": [ @@ -19820,7 +19696,7 @@ ] }, { - "uuid": "6ac65844-1486-47ec-8153-83f94bd42e95", + "uuid": "2367e376-4471-4583-86e4-8d9c60a1fd74", "control-id": "cis_rhel10_1-3.1.7", "description": "No notes for control-id 1.3.1.7.", "props": [ @@ -19837,7 +19713,7 @@ ] }, { - "uuid": "6ba2c9c6-5e97-4837-b22e-b4e939c7abff", + "uuid": "607d6c90-e5ec-45af-a163-320dbe08afe8", "control-id": "cis_rhel10_1-3.1.8", "description": "No notes for control-id 1.3.1.8.", "props": [ @@ -19854,7 +19730,7 @@ ] }, { - "uuid": "81a22036-3591-4b16-9105-e4342eebca80", + "uuid": "a5c742a1-5bd9-4332-8184-d4b287838bd6", "control-id": "cis_rhel10_1-4.1", "description": "There is no automated remediation for this rule and this is intentional.\nMore details in the rule description.", "props": [ @@ -19871,50 +19747,34 @@ ] }, { - "uuid": "5ab935f1-4a70-4be0-adbc-0bc3f0de6f77", + "uuid": "9b6595f2-a662-4536-9d01-4d1a39ec69e0", "control-id": "cis_rhel10_1-4.2", - "description": "The description for control-id cis_rhel10_1-4.2.", + "description": "This requirement demands a deeper review of the rules.", "props": [ { "name": "implementation-status", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "alternative", - "remarks": "This requirement demands a deeper review of the rules." - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_grub2_cfg" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_grub2_cfg" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_grub2_cfg" + "value": "implemented" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_user_cfg" + "value": "file_permissions_boot_grub2" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_user_cfg" + "value": "file_owner_boot_grub2" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_user_cfg" + "value": "file_groupowner_boot_grub2" } ] }, { - "uuid": "f3463120-b000-4006-adcd-6860ad4f9660", + "uuid": "e5c122b9-debb-43e4-92bb-17e05d8e17ab", "control-id": "cis_rhel10_1-5.1", "description": "No notes for control-id 1.5.1.", "props": [ @@ -19931,7 +19791,7 @@ ] }, { - "uuid": "e852423d-4c7a-462c-aa69-fbb5adc13c51", + "uuid": "257de634-1bd7-41d0-84c1-89d3b26255db", "control-id": "cis_rhel10_1-5.2", "description": "No notes for control-id 1.5.2.", "props": [ @@ -19948,7 +19808,7 @@ ] }, { - "uuid": "ea53a6b7-46b1-4d59-96d3-6608cf3fcdba", + "uuid": "53929584-42b6-4085-b05a-0ca8519618e0", "control-id": "cis_rhel10_1-5.4", "description": "No notes for control-id 1.5.4.", "props": [ @@ -19965,7 +19825,7 @@ ] }, { - "uuid": "20fd71dd-3e10-45cd-ae50-cfd3c20aec92", + "uuid": "7dbf4cc2-3e8a-4da0-90e6-2fa1a807bae5", "control-id": "cis_rhel10_1-5.5", "description": "No notes for control-id 1.5.5.", "props": [ @@ -19982,7 +19842,7 @@ ] }, { - "uuid": "741e94e9-d774-42b2-9349-35c570ef6c36", + "uuid": "d4cee18b-de4b-45d0-8286-519ce0620545", "control-id": "cis_rhel10_1-5.6", "description": "No notes for control-id 1.5.6.", "props": [ @@ -19999,7 +19859,7 @@ ] }, { - "uuid": "e651768e-5bb3-42a8-b5e3-329323911c9c", + "uuid": "ee7c1089-4033-45f1-b1f6-5205a90adc31", "control-id": "cis_rhel10_1-5.7", "description": "No notes for control-id 1.5.7.", "props": [ @@ -20016,7 +19876,7 @@ ] }, { - "uuid": "56ed57f8-8e98-49df-9e59-8c168d83b1a6", + "uuid": "db6ce4f3-1cce-4893-a248-8069ad5e7520", "control-id": "cis_rhel10_1-5.8", "description": "Address Space Layout Randomization (ASLR)", "props": [ @@ -20033,7 +19893,7 @@ ] }, { - "uuid": "f1be250d-5db4-4182-af77-1204f589d498", + "uuid": "eab3df81-1416-4912-92a0-570baf59e742", "control-id": "cis_rhel10_1-5.9", "description": "No notes for control-id 1.5.9.", "props": [ @@ -20050,7 +19910,7 @@ ] }, { - "uuid": "3363e28e-70e3-485a-ae2e-1d51b8e7a426", + "uuid": "336341b3-0400-4ff2-b524-5cb32ed1a24d", "control-id": "cis_rhel10_1-5.10", "description": "No notes for control-id 1.5.10.", "props": [ @@ -20067,7 +19927,7 @@ ] }, { - "uuid": "013a9580-8f84-45b4-a95a-e7063960a138", + "uuid": "63be3c8d-7206-4cdf-9e18-9731a110459b", "control-id": "cis_rhel10_1-6.1", "description": "No notes for control-id 1.6.1.", "props": [ @@ -20084,7 +19944,7 @@ ] }, { - "uuid": "1d2e9ddb-7d73-4cb6-9839-123b9421cf0d", + "uuid": "1ed262c4-0a7b-497b-9858-ecbd827a5a23", "control-id": "cis_rhel10_1-6.2", "description": "No notes for control-id 1.6.2.", "props": [ @@ -20101,7 +19961,7 @@ ] }, { - "uuid": "73440a79-ab4c-4ff4-ad9a-8056652a572b", + "uuid": "4bf4209c-4bf6-4d21-affe-b975b7ac5a00", "control-id": "cis_rhel10_1-6.3", "description": "No notes for control-id 1.6.3.", "props": [ @@ -20118,7 +19978,7 @@ ] }, { - "uuid": "c3782387-14b5-4d54-b5db-1c1f95da9967", + "uuid": "61644c34-45a3-4283-80c7-0eca5e985502", "control-id": "cis_rhel10_1-6.4", "description": "No notes for control-id 1.6.4.", "props": [ @@ -20135,7 +19995,7 @@ ] }, { - "uuid": "4a436afb-45cf-4a7d-a51c-c66c9e91cf82", + "uuid": "0b125a57-ab43-4abf-855d-06e7d14d610a", "control-id": "cis_rhel10_1-7.1", "description": "No notes for control-id 1.7.1.", "props": [ @@ -20152,7 +20012,7 @@ ] }, { - "uuid": "9d31b693-f856-43ce-b80e-4b7ed848fcaa", + "uuid": "d6d637e1-9a41-4989-ad59-4593ea7fe088", "control-id": "cis_rhel10_1-7.2", "description": "No notes for control-id 1.7.2.", "props": [ @@ -20169,7 +20029,7 @@ ] }, { - "uuid": "c0312622-ea81-42b4-bdd7-92a04d7ca598", + "uuid": "546a3a08-58a3-487e-a48a-f5058acbbf45", "control-id": "cis_rhel10_1-7.3", "description": "No notes for control-id 1.7.3.", "props": [ @@ -20186,7 +20046,7 @@ ] }, { - "uuid": "0c685407-2324-410d-9105-d8d09a72386f", + "uuid": "bde63055-b481-4f4c-9dc0-153e000f6ccb", "control-id": "cis_rhel10_1-7.4", "description": "No notes for control-id 1.7.4.", "props": [ @@ -20213,7 +20073,7 @@ ] }, { - "uuid": "8b4d765c-2500-4ed6-9701-4aa19bdb8c4d", + "uuid": "d1a12ebd-c484-4869-9cf7-5593d6cb2ac8", "control-id": "cis_rhel10_1-7.5", "description": "No notes for control-id 1.7.5.", "props": [ @@ -20240,7 +20100,7 @@ ] }, { - "uuid": "7a358384-e8ed-46ba-b113-0ec6b801feb5", + "uuid": "6f1e396b-c04f-4e39-be4d-2e2d989674cc", "control-id": "cis_rhel10_1-7.6", "description": "No notes for control-id 1.7.6.", "props": [ @@ -20267,7 +20127,7 @@ ] }, { - "uuid": "8e73ceb8-2fb4-4f52-a6a2-613729159b43", + "uuid": "36e73ebc-0525-40c4-9164-ca39382e87d9", "control-id": "cis_rhel10_1-8.1", "description": "No notes for control-id 1.8.1.", "props": [ @@ -20289,7 +20149,7 @@ ] }, { - "uuid": "9f1c22e0-d32f-4d0a-87bb-a98be2c3baff", + "uuid": "bd2ffe24-d70c-44ef-b783-359804788d52", "control-id": "cis_rhel10_1-8.2", "description": "No notes for control-id 1.8.2.", "props": [ @@ -20306,7 +20166,7 @@ ] }, { - "uuid": "c6238610-48dd-42ac-9d30-f386039ffabc", + "uuid": "e6c715af-e53a-4c8f-ad57-6c1f15e52748", "control-id": "cis_rhel10_1-8.3", "description": "No notes for control-id 1.8.3.", "props": [ @@ -20338,7 +20198,7 @@ ] }, { - "uuid": "4a7b7189-4282-4fdc-bfdf-4e6036373d56", + "uuid": "6f6073b0-d154-4424-be2d-ddb4dfe78ff8", "control-id": "cis_rhel10_1-8.4", "description": "No notes for control-id 1.8.4.", "props": [ @@ -20360,7 +20220,7 @@ ] }, { - "uuid": "de261535-5172-44e2-9099-5739f78db65a", + "uuid": "c115fdfb-8606-4dd3-b190-409a244c970a", "control-id": "cis_rhel10_1-8.5", "description": "No notes for control-id 1.8.5.", "props": [ @@ -20377,7 +20237,7 @@ ] }, { - "uuid": "9247b373-56f9-4626-a083-0706cfe3ee16", + "uuid": "57362281-536b-466e-84e7-e6178694c0c2", "control-id": "cis_rhel10_2-1.1", "description": "No notes for control-id 2.1.1.", "props": [ @@ -20394,7 +20254,7 @@ ] }, { - "uuid": "734158db-6915-4277-9cc7-06f67c293e23", + "uuid": "475016e6-4eed-475a-a60a-6aad828fbca2", "control-id": "cis_rhel10_2-1.2", "description": "No notes for control-id 2.1.2.", "props": [ @@ -20411,7 +20271,7 @@ ] }, { - "uuid": "25cb2fe1-c2fe-4133-a230-fd6a2db0e0c1", + "uuid": "316f13ee-4ebd-4fc6-8ed4-4b0072c523c1", "control-id": "cis_rhel10_2-1.4", "description": "No notes for control-id 2.1.4.", "props": [ @@ -20428,7 +20288,7 @@ ] }, { - "uuid": "2bb2b18c-2924-4bbe-84ad-a4b93be6f078", + "uuid": "1bb74861-1e99-4838-b303-2c3aa6251864", "control-id": "cis_rhel10_2-1.5", "description": "No notes for control-id 2.1.5.", "props": [ @@ -20445,7 +20305,7 @@ ] }, { - "uuid": "697a7477-75de-4334-9f17-187addd320f6", + "uuid": "e57ab1c5-0a35-45b4-a183-518116723096", "control-id": "cis_rhel10_2-1.6", "description": "No notes for control-id 2.1.6.", "props": [ @@ -20462,7 +20322,7 @@ ] }, { - "uuid": "3ec313c9-a07a-424d-9480-53e01617c9ad", + "uuid": "a8bb4f24-660f-48d4-b9c6-ce4152256678", "control-id": "cis_rhel10_2-1.7", "description": "No notes for control-id 2.1.7.", "props": [ @@ -20479,7 +20339,7 @@ ] }, { - "uuid": "b7b6e986-1aaf-496b-a315-0644d0eaf17d", + "uuid": "6dc8c9d4-ab50-4425-9727-0c55a911bd00", "control-id": "cis_rhel10_2-1.8", "description": "No notes for control-id 2.1.8.", "props": [ @@ -20501,7 +20361,7 @@ ] }, { - "uuid": "c04a8b3b-bf7a-468d-bc01-3b347d091e53", + "uuid": "007bcd6f-d3fe-4575-bea6-b33ed5857e90", "control-id": "cis_rhel10_2-1.9", "description": "Many of the libvirt packages used by Enterprise Linux virtualization are dependent on the\nnfs-utils package.", "props": [ @@ -20518,7 +20378,7 @@ ] }, { - "uuid": "6ca0da44-c762-494e-a1bc-9d69aaf6f2d7", + "uuid": "bddc1aba-4149-4727-a065-a60ddf637878", "control-id": "cis_rhel10_2-1.10", "description": "No notes for control-id 2.1.10.", "props": [ @@ -20535,7 +20395,7 @@ ] }, { - "uuid": "6254547f-7c34-4f2d-98e8-359f885a583e", + "uuid": "9192a082-f5a9-41cc-95a0-181e8d5f1aa3", "control-id": "cis_rhel10_2-1.11", "description": "Many of the libvirt packages used by Enterprise Linux virtualization, and the nfs-utils\npackage used for The Network File System (NFS), are dependent on the rpcbind package.", "props": [ @@ -20552,7 +20412,7 @@ ] }, { - "uuid": "cc24ffd5-033c-4928-aa11-99a842153439", + "uuid": "93294cfd-437b-4c0c-9c4d-7c3e206a784b", "control-id": "cis_rhel10_2-1.12", "description": "No notes for control-id 2.1.12.", "props": [ @@ -20569,7 +20429,7 @@ ] }, { - "uuid": "6bfac3d6-7a0c-46e4-bd6b-32b38b945290", + "uuid": "aef734bf-d419-40de-9858-3a41635fda97", "control-id": "cis_rhel10_2-1.13", "description": "No notes for control-id 2.1.13.", "props": [ @@ -20586,7 +20446,7 @@ ] }, { - "uuid": "52004caf-b8e3-4e77-b6d5-c551fb2385ae", + "uuid": "57d1d1d1-25ef-450a-9e43-f24accdd902a", "control-id": "cis_rhel10_2-1.14", "description": "No notes for control-id 2.1.14.", "props": [ @@ -20603,7 +20463,7 @@ ] }, { - "uuid": "d75ea387-f4cf-48c5-bd53-9837fb3d9fae", + "uuid": "c1a30dd6-2a6f-46be-8f68-55b11c41d328", "control-id": "cis_rhel10_2-1.15", "description": "No notes for control-id 2.1.15.", "props": [ @@ -20620,7 +20480,7 @@ ] }, { - "uuid": "3c173687-fb00-4ef5-bbec-87cb39d86667", + "uuid": "1e70e1aa-07f5-4ffc-b028-1f32b6d79822", "control-id": "cis_rhel10_2-1.16", "description": "No notes for control-id 2.1.16.", "props": [ @@ -20637,7 +20497,7 @@ ] }, { - "uuid": "4c5b1a7a-1d1d-415c-9ab1-05d56cb19a93", + "uuid": "71930045-1f43-4125-940a-86901df15361", "control-id": "cis_rhel10_2-1.17", "description": "No notes for control-id 2.1.17.", "props": [ @@ -20654,7 +20514,7 @@ ] }, { - "uuid": "3cc6cb59-3b4f-4d49-9831-5749ead97ac9", + "uuid": "ce38e5b1-292f-4c92-9237-4856864603b1", "control-id": "cis_rhel10_2-1.18", "description": "No notes for control-id 2.1.18.", "props": [ @@ -20676,7 +20536,7 @@ ] }, { - "uuid": "8c81e0aa-d520-4c3a-a5c7-a3edbe853f09", + "uuid": "289872b2-8cb1-4030-8a7d-702be3db4a6e", "control-id": "cis_rhel10_2-1.21", "description": "No notes for control-id 2.1.21.", "props": [ @@ -20698,7 +20558,7 @@ ] }, { - "uuid": "e10c23f8-7811-4db6-8592-352136b4063f", + "uuid": "c8825ed7-63f7-4d9c-b7aa-af3aff8bf730", "control-id": "cis_rhel10_2-1.22", "description": "The description for control-id cis_rhel10_2-1.22.", "props": [ @@ -20711,7 +20571,7 @@ ] }, { - "uuid": "8e22e529-6ee0-45c4-b0df-9ba1eb6809f6", + "uuid": "5c60580b-a706-4694-b449-4f604066efb1", "control-id": "cis_rhel10_2-2.1", "description": "No notes for control-id 2.2.1.", "props": [ @@ -20728,7 +20588,7 @@ ] }, { - "uuid": "fa04e628-c32b-4190-8703-7b17b8aa4870", + "uuid": "b5d99a58-57a3-4fa7-8faf-9ae766c3c7ea", "control-id": "cis_rhel10_2-2.3", "description": "No notes for control-id 2.2.3.", "props": [ @@ -20745,7 +20605,7 @@ ] }, { - "uuid": "3e35a286-0375-413c-ac61-3b2ae212e340", + "uuid": "8885ded7-5802-491a-96db-2edcd3c43050", "control-id": "cis_rhel10_2-2.4", "description": "No notes for control-id 2.2.4.", "props": [ @@ -20762,7 +20622,7 @@ ] }, { - "uuid": "904ffc1d-fbf8-4039-af11-47181244a160", + "uuid": "b8da7847-cb9c-46fa-9e15-42b855bd3c73", "control-id": "cis_rhel10_2-3.1", "description": "No notes for control-id 2.3.1.", "props": [ @@ -20774,7 +20634,7 @@ ] }, { - "uuid": "8c36be3d-61f1-4590-af5d-25ddd5554cfc", + "uuid": "8b904c28-9588-4399-a591-de870723c35e", "control-id": "cis_rhel10_2-3.2", "description": "No notes for control-id 2.3.2.", "props": [ @@ -20791,7 +20651,7 @@ ] }, { - "uuid": "56ce8947-1c3d-4b2b-ba86-b130071b73fe", + "uuid": "d40e15ca-500b-42d3-8bd7-bdba1e2cb752", "control-id": "cis_rhel10_2-3.3", "description": "No notes for control-id 2.3.3.", "props": [ @@ -20808,7 +20668,7 @@ ] }, { - "uuid": "fd47cdc5-b3cf-42e7-9da7-d36e8bbc7425", + "uuid": "88b41aa3-6913-4647-97be-167487a92d74", "control-id": "cis_rhel10_2-4.1.1", "description": "No notes for control-id 2.4.1.1.", "props": [ @@ -20830,7 +20690,7 @@ ] }, { - "uuid": "c08d4199-05c1-4cf6-9159-9eb96a78aed4", + "uuid": "f51ff7c5-f66a-41e0-9409-9658075426c6", "control-id": "cis_rhel10_2-4.1.2", "description": "No notes for control-id 2.4.1.2.", "props": [ @@ -20857,7 +20717,7 @@ ] }, { - "uuid": "a3cb79bf-2f82-48a0-8afe-69c0eeac2b1e", + "uuid": "7f704e2f-7851-4702-8861-4ee2cd6c8e54", "control-id": "cis_rhel10_2-4.1.3", "description": "No notes for control-id 2.4.1.3.", "props": [ @@ -20884,7 +20744,7 @@ ] }, { - "uuid": "261aefb8-0e26-4d1c-8702-6c76895574bd", + "uuid": "f88345cc-a482-445a-9b9c-ea440de3ce59", "control-id": "cis_rhel10_2-4.1.4", "description": "No notes for control-id 2.4.1.4.", "props": [ @@ -20911,7 +20771,7 @@ ] }, { - "uuid": "e7ba8207-d2b8-4f4c-8f9f-0cb3a058d5a8", + "uuid": "60a5c797-0dd3-426d-aca0-7c4f57e7aa2c", "control-id": "cis_rhel10_2-4.1.5", "description": "No notes for control-id 2.4.1.5.", "props": [ @@ -20938,7 +20798,7 @@ ] }, { - "uuid": "f642a569-cf95-407c-9401-eeb2eda9a181", + "uuid": "eda75803-28dd-46fb-a9f1-ca96a75fa03b", "control-id": "cis_rhel10_2-4.1.6", "description": "No notes for control-id 2.4.1.6.", "props": [ @@ -20965,7 +20825,7 @@ ] }, { - "uuid": "bcafeebe-1b02-40ef-b22b-52bba78e090c", + "uuid": "61e40d95-697c-4445-8059-6b030f620597", "control-id": "cis_rhel10_2-4.1.7", "description": "No notes for control-id 2.4.1.7.", "props": [ @@ -20992,7 +20852,7 @@ ] }, { - "uuid": "29939032-3f88-4503-a340-c6edf93cebaa", + "uuid": "8e0fb71a-426f-4f2a-bfc0-fb08e1bbd25d", "control-id": "cis_rhel10_2-4.1.8", "description": "No notes for control-id 2.4.1.8.", "props": [ @@ -21019,7 +20879,7 @@ ] }, { - "uuid": "ab9073fd-899e-4234-bd66-36f92efca468", + "uuid": "fdf75499-ec90-4c8b-a998-8d849fc255ac", "control-id": "cis_rhel10_2-4.1.9", "description": "No notes for control-id 2.4.1.9.", "props": [ @@ -21056,7 +20916,7 @@ ] }, { - "uuid": "9fed46e6-2c0a-4c2c-b725-adb13b7c3cce", + "uuid": "7fa94ee3-0877-4c3e-afe0-42761f7f7ac2", "control-id": "cis_rhel10_2-4.2.1", "description": "No notes for control-id 2.4.2.1.", "props": [ @@ -21093,7 +20953,7 @@ ] }, { - "uuid": "7357f678-a14b-47fa-b337-06c4df2b4f91", + "uuid": "89f9763b-f781-439a-9000-e4f4f5ef4578", "control-id": "cis_rhel10_3-1.1", "description": "The description for control-id cis_rhel10_3-1.1.", "props": [ @@ -21106,7 +20966,7 @@ ] }, { - "uuid": "9e16d14a-d30d-4b5a-8b49-a27d9573671c", + "uuid": "92382c6b-a274-4f0e-9dc9-11e6b5e9f437", "control-id": "cis_rhel10_3-1.2", "description": "No notes for control-id 3.1.2.", "props": [ @@ -21123,7 +20983,7 @@ ] }, { - "uuid": "8da20200-7680-4000-95bb-78bd445a902b", + "uuid": "2a622125-6f78-432b-9223-2e48b2ddcff7", "control-id": "cis_rhel10_3-1.3", "description": "No notes for control-id 3.1.3.", "props": [ @@ -21140,7 +21000,7 @@ ] }, { - "uuid": "b684a35a-a9ca-4200-9329-01f66f53646e", + "uuid": "20e7fd9b-1b80-412d-a07f-1bc070ca4881", "control-id": "cis_rhel10_3-2.1", "description": "No notes for control-id 3.2.1.", "props": [ @@ -21157,7 +21017,7 @@ ] }, { - "uuid": "5f5c4535-7de3-4995-8a15-2a8b660de069", + "uuid": "7ad41751-9db4-4c8e-9d6e-4194b2d1783e", "control-id": "cis_rhel10_3-2.2", "description": "No notes for control-id 3.2.2.", "props": [ @@ -21174,7 +21034,7 @@ ] }, { - "uuid": "634838d3-3694-4910-bfc1-82ea74122601", + "uuid": "e2202c95-82b0-4038-9a71-f0b00701155c", "control-id": "cis_rhel10_3-2.3", "description": "No notes for control-id 3.2.3.", "props": [ @@ -21191,7 +21051,7 @@ ] }, { - "uuid": "1b042272-e542-48dc-8a43-b2ffc64d618c", + "uuid": "d6fdff2d-18cb-40c6-b3e2-9f3fcfd04396", "control-id": "cis_rhel10_3-2.4", "description": "No notes for control-id 3.2.4.", "props": [ @@ -21208,7 +21068,7 @@ ] }, { - "uuid": "0e908f6a-8280-450d-9b16-cdace719d264", + "uuid": "4d4991a7-36be-4bec-8b3e-d1061e930c45", "control-id": "cis_rhel10_3-2.5", "description": "No notes for control-id 3.2.5.", "props": [ @@ -21225,7 +21085,7 @@ ] }, { - "uuid": "17c89185-93cb-4f50-93a6-2e1fdfc3a76c", + "uuid": "c4fb1d15-2940-49d3-b2ec-35743953ebc7", "control-id": "cis_rhel10_3-2.6", "description": "No notes for control-id 3.2.6.", "props": [ @@ -21242,7 +21102,7 @@ ] }, { - "uuid": "a0c32423-7979-4004-b9d9-4f4798c4f041", + "uuid": "5c014dba-0756-423f-a92b-253895f96f37", "control-id": "cis_rhel10_3-3.1.2", "description": "No notes for control-id 3.3.1.2.", "props": [ @@ -21259,7 +21119,7 @@ ] }, { - "uuid": "9571e1cf-1fef-4861-b339-2cb04ff63109", + "uuid": "cbf16e66-a3b9-4c9c-b8a2-8a23320e59c1", "control-id": "cis_rhel10_3-3.1.3", "description": "No notes for control-id 3.3.1.3.", "props": [ @@ -21276,7 +21136,7 @@ ] }, { - "uuid": "f6a5f1d1-c9e4-43ab-8508-8ec595122df2", + "uuid": "24f9cd5e-c754-4385-ab4a-92bd09828577", "control-id": "cis_rhel10_3-3.1.4", "description": "No notes for control-id 3.3.1.4.", "props": [ @@ -21293,7 +21153,7 @@ ] }, { - "uuid": "5f747cae-7877-4a1a-951c-1ac7615ae45c", + "uuid": "5f3936fb-8cae-4251-a549-05779fd6f44e", "control-id": "cis_rhel10_3-3.1.5", "description": "No notes for control-id 3.3.1.5.", "props": [ @@ -21310,7 +21170,7 @@ ] }, { - "uuid": "aebe0af7-9ee5-4fbf-ae81-01f5862d6071", + "uuid": "d3444d43-9f18-4738-895a-22d8df61879c", "control-id": "cis_rhel10_3-3.1.6", "description": "No notes for control-id 3.3.1.6.", "props": [ @@ -21327,7 +21187,7 @@ ] }, { - "uuid": "39296134-4dd5-44fe-82f9-8e4d433c9f0e", + "uuid": "8da2a299-9446-487e-ba8e-0dc643cdbf0f", "control-id": "cis_rhel10_3-3.1.7", "description": "No notes for control-id 3.3.1.7.", "props": [ @@ -21344,7 +21204,7 @@ ] }, { - "uuid": "6b91149d-fa7a-4b17-9ed2-866f63b7df01", + "uuid": "f3ced6a7-bd61-4884-9fb8-66a0911df5f0", "control-id": "cis_rhel10_3-3.1.8", "description": "No notes for control-id 3.3.1.8.", "props": [ @@ -21361,7 +21221,7 @@ ] }, { - "uuid": "f300d084-09e2-4134-b183-7b1ce651bbc4", + "uuid": "27d9ff48-dfc4-4d51-b32c-89541a347504", "control-id": "cis_rhel10_3-3.1.9", "description": "No notes for control-id 3.3.1.9.", "props": [ @@ -21378,7 +21238,7 @@ ] }, { - "uuid": "defebabf-fa7e-4ab0-bfd2-cc68faa35e84", + "uuid": "c95e9b7e-10c8-47f5-99e2-915f6b678abe", "control-id": "cis_rhel10_3-3.1.10", "description": "No notes for control-id 3.3.1.10.", "props": [ @@ -21395,7 +21255,7 @@ ] }, { - "uuid": "bf13de96-cfd1-421b-a258-43e17dc9f3a6", + "uuid": "97c287a4-836b-41a7-b3ef-e9e47571b1c4", "control-id": "cis_rhel10_3-3.1.11", "description": "No notes for control-id 3.3.1.11.", "props": [ @@ -21412,7 +21272,7 @@ ] }, { - "uuid": "c55722f7-b1b5-4629-901d-3f3951d07a77", + "uuid": "11de9864-bace-49ae-95eb-0152c6f31604", "control-id": "cis_rhel10_3-3.1.12", "description": "No notes for control-id 3.3.1.12.", "props": [ @@ -21429,7 +21289,7 @@ ] }, { - "uuid": "53b86adb-8f08-4058-97b1-e74b0da8cc7b", + "uuid": "160d8716-4efa-4434-96a3-60df923b2893", "control-id": "cis_rhel10_3-3.1.13", "description": "No notes for control-id 3.3.1.13.", "props": [ @@ -21446,7 +21306,7 @@ ] }, { - "uuid": "93bdc799-b610-4c92-9bd1-3a3973cbc82f", + "uuid": "978fb66d-485c-4a00-bf0c-20849cd599c1", "control-id": "cis_rhel10_3-3.1.14", "description": "No notes for control-id 3.3.1.14.", "props": [ @@ -21463,7 +21323,7 @@ ] }, { - "uuid": "8d0f03e4-ae3b-41df-800f-c3f8061f6927", + "uuid": "14246fb0-488e-45ad-aa66-357f8b6876a7", "control-id": "cis_rhel10_3-3.1.15", "description": "No notes for control-id 3.3.1.15.", "props": [ @@ -21480,7 +21340,7 @@ ] }, { - "uuid": "96ebd71b-bff3-4b7f-be12-2e87f36a89a7", + "uuid": "0c0e4409-2c8c-4fc9-9de1-6453b6853156", "control-id": "cis_rhel10_3-3.1.16", "description": "No notes for control-id 3.3.1.16.", "props": [ @@ -21497,7 +21357,7 @@ ] }, { - "uuid": "6e730419-d961-41ca-b5c8-767e5f4ced93", + "uuid": "043a429c-53f2-4dcb-a274-d21578d2783f", "control-id": "cis_rhel10_3-3.1.17", "description": "No notes for control-id 3.3.1.17.", "props": [ @@ -21514,7 +21374,7 @@ ] }, { - "uuid": "b2bffc7b-0a56-46a5-a881-f4a113b6ab10", + "uuid": "9171eb19-8e72-47c3-94d3-ee95c25d9437", "control-id": "cis_rhel10_3-3.1.18", "description": "No notes for control-id 3.3.1.18.", "props": [ @@ -21531,7 +21391,7 @@ ] }, { - "uuid": "c26e414d-5581-4db3-a0ad-15a0ed2740b8", + "uuid": "ebf5f6d4-ba35-4357-91e2-3b7c1a5d4873", "control-id": "cis_rhel10_3-3.2.1", "description": "No notes for control-id 3.3.2.1.", "props": [ @@ -21548,7 +21408,7 @@ ] }, { - "uuid": "2ac1478b-a7e5-4728-ba59-ede60a11fbb9", + "uuid": "9f56f3ad-5fd2-47ab-8517-be705388b1ac", "control-id": "cis_rhel10_3-3.2.2", "description": "No notes for control-id 3.3.2.2.", "props": [ @@ -21565,7 +21425,7 @@ ] }, { - "uuid": "33b5e86a-c431-4a77-a087-b08d82113c7a", + "uuid": "cf72dc84-0541-4066-907e-08a85f5ca9a4", "control-id": "cis_rhel10_3-3.2.3", "description": "No notes for control-id 3.3.2.3.", "props": [ @@ -21582,7 +21442,7 @@ ] }, { - "uuid": "69bd9a34-9b68-49bd-9bd5-4276020ac4e1", + "uuid": "5bb5a7e4-589c-40a0-a17d-a70eaa22308b", "control-id": "cis_rhel10_3-3.2.4", "description": "No notes for control-id 3.3.2.4.", "props": [ @@ -21599,7 +21459,7 @@ ] }, { - "uuid": "e566e649-53dc-4fcd-8d2f-10c3620985d6", + "uuid": "90d752d1-eac0-4d8e-90c0-d150b830132e", "control-id": "cis_rhel10_3-3.2.5", "description": "No notes for control-id 3.3.2.5.", "props": [ @@ -21616,7 +21476,7 @@ ] }, { - "uuid": "4d381a10-527e-4f38-a504-f32fae8bb831", + "uuid": "3c20ebcd-cd10-442f-b8a3-9e4458f35a57", "control-id": "cis_rhel10_3-3.2.6", "description": "No notes for control-id 3.3.2.6.", "props": [ @@ -21633,7 +21493,7 @@ ] }, { - "uuid": "5e8ada51-8b38-42b3-899f-acceca20a2cf", + "uuid": "480eaa3d-70b5-4818-9545-5735a1289bd1", "control-id": "cis_rhel10_3-3.2.7", "description": "No notes for control-id 3.3.2.7.", "props": [ @@ -21650,7 +21510,7 @@ ] }, { - "uuid": "c308cabe-96fb-4be6-aa8e-c4d0b6569cbf", + "uuid": "11a4d271-0629-4d39-bbac-c36def284848", "control-id": "cis_rhel10_3-3.2.8", "description": "No notes for control-id 3.3.2.8.", "props": [ @@ -21667,7 +21527,7 @@ ] }, { - "uuid": "4f7cec16-e5ae-434b-b897-b4a797afe8e6", + "uuid": "b9f2a898-1621-4d1e-9ca1-a7f55ec60093", "control-id": "cis_rhel10_4-1.1", "description": "No notes for control-id 4.1.1.", "props": [ @@ -21684,7 +21544,7 @@ ] }, { - "uuid": "a92db22b-fe7a-4248-b3e0-33a02b81974c", + "uuid": "3deef625-f5f5-4323-bf5d-49f7d1cfac7f", "control-id": "cis_rhel10_4-1.2", "description": "No notes for control-id 4.1.2.", "props": [ @@ -21701,7 +21561,7 @@ ] }, { - "uuid": "8a1939ee-e87f-438a-b597-e84e22bc7ba6", + "uuid": "b0a1e312-49d4-4f88-bdbd-60975eacb13c", "control-id": "cis_rhel10_4-1.3", "description": "No notes for control-id 4.1.3.", "props": [ @@ -21718,7 +21578,7 @@ ] }, { - "uuid": "fbf4fccf-dfec-4036-80b8-453ff9247297", + "uuid": "3f25c8d4-293f-4ed8-99d8-0dca23556b0c", "control-id": "cis_rhel10_4-1.4", "description": "The description for control-id cis_rhel10_4-1.4.", "props": [ @@ -21731,7 +21591,7 @@ ] }, { - "uuid": "59192f6e-b8d9-4d8f-a604-4306c699f1f4", + "uuid": "9531cb25-1faa-4269-a3c1-c6f0b7b02637", "control-id": "cis_rhel10_4-1.5", "description": "Firewalld in Red Hat Enterprise Linux 10 accepts loopback traffic by default.", "props": [ @@ -21748,7 +21608,7 @@ ] }, { - "uuid": "62d5f69b-219a-4c4e-8cd1-d1f9ff691739", + "uuid": "407c1ca3-cdde-49b6-b779-b4224e0830ba", "control-id": "cis_rhel10_4-1.6", "description": "The description for control-id cis_rhel10_4-1.6.", "props": [ @@ -21761,7 +21621,7 @@ ] }, { - "uuid": "772c1854-6ddf-4b0c-abba-2c85769c747c", + "uuid": "a59ca4db-e700-4ffc-b0d7-83bc8268ad26", "control-id": "cis_rhel10_4-1.7", "description": "The description for control-id cis_rhel10_4-1.7.", "props": [ @@ -21774,7 +21634,7 @@ ] }, { - "uuid": "32736dfa-cdb0-4655-a370-b0b5b4b6e071", + "uuid": "0e80c25f-7ff8-4572-823e-3b293063475b", "control-id": "cis_rhel10_5-1.1", "description": "No notes for control-id 5.1.1.", "props": [ @@ -21831,7 +21691,7 @@ ] }, { - "uuid": "a90a14ec-5703-44cc-8c90-a4d82aff4c7d", + "uuid": "b93e5b61-99c2-434f-9b9e-b8c9aa09d9b7", "control-id": "cis_rhel10_5-1.2", "description": "No notes for control-id 5.1.2.", "props": [ @@ -21858,7 +21718,7 @@ ] }, { - "uuid": "767e158b-a856-48a7-a484-87d8ac0010f3", + "uuid": "bcf02df2-bd07-4740-8407-7ba9f4056752", "control-id": "cis_rhel10_5-1.3", "description": "No notes for control-id 5.1.3.", "props": [ @@ -21885,7 +21745,7 @@ ] }, { - "uuid": "be7859b7-13e0-43c9-b608-2b066365030e", + "uuid": "e4b030e0-620f-490b-a4dd-a3cc712c7e5c", "control-id": "cis_rhel10_5-1.4", "description": "No notes for control-id 5.1.4.", "props": [ @@ -21902,7 +21762,7 @@ ] }, { - "uuid": "ccce755b-36fd-4724-a359-09d02b10e75b", + "uuid": "20d283ca-d71e-4b5f-92ce-0599d9aeec19", "control-id": "cis_rhel10_5-1.5", "description": "No notes for control-id 5.1.5.", "props": [ @@ -21919,7 +21779,7 @@ ] }, { - "uuid": "b9ffe0c7-a543-4d43-83af-b3847ad09ec1", + "uuid": "c02bab24-ec34-4043-bb45-5a9e36d1bd9f", "control-id": "cis_rhel10_5-1.6", "description": "No notes for control-id 5.1.6.", "props": [ @@ -21936,7 +21796,7 @@ ] }, { - "uuid": "133e88cc-414a-4550-8753-e44165e46791", + "uuid": "cb8ed38f-7b23-4d29-8740-f9b7e44d36ba", "control-id": "cis_rhel10_5-1.7", "description": "The requirement gives an example of 45 seconds, but is flexible about the values. It is only\nnecessary to ensure there is a timeout configured in alignment to the site policy.", "props": [ @@ -21958,7 +21818,7 @@ ] }, { - "uuid": "35c2df3e-854e-485a-8693-dd496d4eac61", + "uuid": "55859729-c1a0-4812-bcac-c271e53c0777", "control-id": "cis_rhel10_5-1.10", "description": "No notes for control-id 5.1.10.", "props": [ @@ -21975,7 +21835,7 @@ ] }, { - "uuid": "1b6ed7ea-b38e-4a3b-a997-52dd38640299", + "uuid": "890714d4-23a7-4cac-9fc9-f1e114518f66", "control-id": "cis_rhel10_5-1.11", "description": "No notes for control-id 5.1.11.", "props": [ @@ -21992,7 +21852,7 @@ ] }, { - "uuid": "093f1d85-1c18-48a2-bdf0-a50e14fcb93a", + "uuid": "b371510c-be42-400f-82ec-2b713dcabaff", "control-id": "cis_rhel10_5-1.12", "description": "The description for control-id cis_rhel10_5-1.12.", "props": [ @@ -22010,7 +21870,7 @@ ] }, { - "uuid": "e8f00605-3bfc-471b-971d-7db45f109485", + "uuid": "6a98d847-f2de-41a5-b6b2-ebf6c22adf05", "control-id": "cis_rhel10_5-1.13", "description": "No notes for control-id 5.1.13.", "props": [ @@ -22027,7 +21887,7 @@ ] }, { - "uuid": "c406429f-2bbf-4010-ad24-0a172d7ce632", + "uuid": "30318c33-9e53-484e-bfea-7ffdc03a1b5e", "control-id": "cis_rhel10_5-1.14", "description": "The CIS benchmark is not opinionated about which loglevel is selected here. Here, this\nprofile uses VERBOSE by default, as it allows for the capture of login and logout activity\nas well as key fingerprints.", "props": [ @@ -22044,7 +21904,7 @@ ] }, { - "uuid": "e3bb20da-260e-4fa8-96f2-54bd93ab731b", + "uuid": "5f044176-3359-4379-a4a7-af538e353d1b", "control-id": "cis_rhel10_5-1.15", "description": "No notes for control-id 5.1.15.", "props": [ @@ -22061,7 +21921,7 @@ ] }, { - "uuid": "30a1bbc3-248c-4feb-ae36-15513d2a9e16", + "uuid": "d9d0b035-28a4-4f07-9190-8591cbdc67e2", "control-id": "cis_rhel10_5-1.16", "description": "No notes for control-id 5.1.16.", "props": [ @@ -22078,7 +21938,7 @@ ] }, { - "uuid": "216d7164-9c67-48bd-aea8-4155775c2a2a", + "uuid": "09871388-0b2b-45c4-9236-fd93245ac343", "control-id": "cis_rhel10_5-1.17", "description": "No notes for control-id 5.1.17.", "props": [ @@ -22095,7 +21955,7 @@ ] }, { - "uuid": "3e8c6698-db0d-47eb-ba80-0388339a362b", + "uuid": "dae45c70-1f37-4a0b-87af-a3f7ddcff3d8", "control-id": "cis_rhel10_5-1.18", "description": "No notes for control-id 5.1.18.", "props": [ @@ -22112,7 +21972,7 @@ ] }, { - "uuid": "758b7391-e894-40ec-8c1b-11f1b7967cd8", + "uuid": "7c6eb858-6948-4558-97cf-a1b17d4f84d4", "control-id": "cis_rhel10_5-1.19", "description": "No notes for control-id 5.1.19.", "props": [ @@ -22129,7 +21989,7 @@ ] }, { - "uuid": "204bfd42-3dd1-4a47-bdba-5e456f579e70", + "uuid": "5aa6acdb-5845-4d9d-b5e4-10a54efeb5ff", "control-id": "cis_rhel10_5-1.20", "description": "No notes for control-id 5.1.20.", "props": [ @@ -22146,7 +22006,7 @@ ] }, { - "uuid": "1127904a-22c2-4533-9f24-423684ebad43", + "uuid": "76b2a34c-b29d-4a10-bf94-402e153326e7", "control-id": "cis_rhel10_5-1.21", "description": "No notes for control-id 5.1.21.", "props": [ @@ -22163,7 +22023,7 @@ ] }, { - "uuid": "98ce5bca-702a-4e6f-b633-9d5e94440689", + "uuid": "f970b274-bf1d-443c-9af9-214c6c5767cc", "control-id": "cis_rhel10_5-1.22", "description": "No notes for control-id 5.1.22.", "props": [ @@ -22180,7 +22040,7 @@ ] }, { - "uuid": "130f16d1-fbda-438e-a913-fb54fab216d1", + "uuid": "6170f9e7-a166-4f69-b4fd-6af7de1be389", "control-id": "cis_rhel10_5-2.1", "description": "No notes for control-id 5.2.1.", "props": [ @@ -22197,7 +22057,7 @@ ] }, { - "uuid": "1f6adc59-2e82-4e65-8e98-3d36129fdaf4", + "uuid": "12893dc2-19a3-48b9-93f8-3ea0adbdfd22", "control-id": "cis_rhel10_5-2.2", "description": "No notes for control-id 5.2.2.", "props": [ @@ -22214,7 +22074,7 @@ ] }, { - "uuid": "ab978d0d-a1e9-4e50-91c3-f41b97548e2e", + "uuid": "6535f6f8-966b-4335-8926-f725c0fc8067", "control-id": "cis_rhel10_5-2.3", "description": "No notes for control-id 5.2.3.", "props": [ @@ -22231,7 +22091,7 @@ ] }, { - "uuid": "7f52dccf-5fb7-4a78-a1d3-ee42ab8e05e3", + "uuid": "cae55350-8046-43bf-bf70-6307e7d20a1c", "control-id": "cis_rhel10_5-2.5", "description": "No notes for control-id 5.2.5.", "props": [ @@ -22248,7 +22108,7 @@ ] }, { - "uuid": "cfa29213-c349-4cc6-a0fb-7c6e337441d4", + "uuid": "cf136e13-a607-4d50-b210-bf80407b4bd5", "control-id": "cis_rhel10_5-2.6", "description": "No notes for control-id 5.2.6.", "props": [ @@ -22265,7 +22125,7 @@ ] }, { - "uuid": "dbfd0a0c-ce86-4fd6-bbf1-ec0dc9366259", + "uuid": "952e3974-22cd-4d39-837e-43b5a9496ac8", "control-id": "cis_rhel10_5-2.7", "description": "Members of \"wheel\" or GID 0 groups are checked by default if the group option is not set for\npam_wheel.so module. The recommendation states the group should be empty to reinforce the\nuse of \"sudo\" for privileged access. Therefore, members of these groups should be manually\nchecked or a different group should be informed.", "props": [ @@ -22287,7 +22147,7 @@ ] }, { - "uuid": "dcca67bd-51f1-4dd8-b3f8-c0272b30b5fb", + "uuid": "b5447a4d-1bf6-4c67-87f4-c3ba61421d87", "control-id": "cis_rhel10_5-3.1.1", "description": "This requirement is hard to be automated without any specific requirement. The policy even\nstates that provided commands are examples, other custom settings might be in place and the\nsettings might be different depending on site policies. The other rules will already make\nsure there is a correct autheselect profile regardless of the existing settings. It is\nnecessary to better discuss with CIS Community.", "props": [ @@ -22299,7 +22159,7 @@ ] }, { - "uuid": "67f9daf7-c602-4433-8086-e1513b14f8ae", + "uuid": "56429137-1eef-4b1b-b74b-46533fa0643f", "control-id": "cis_rhel10_5-3.1.2", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.1.", "props": [ @@ -22321,7 +22181,7 @@ ] }, { - "uuid": "e950b251-77d5-4d71-ab8c-7670558293a3", + "uuid": "577246ca-e53c-4a75-9b80-5d1697811c00", "control-id": "cis_rhel10_5-3.1.3", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.2.", "props": [ @@ -22348,7 +22208,7 @@ ] }, { - "uuid": "20fc657f-9f87-4899-b6d0-05dea6366f33", + "uuid": "986a0b2a-6ce5-41bd-b0ba-cd8df0c9207b", "control-id": "cis_rhel10_5-3.1.4", "description": "The module is properly enabled by the rules mentioned in related_rules.\nRequirements in 5.3.2.3 use these rules.", "props": [ @@ -22360,7 +22220,7 @@ ] }, { - "uuid": "8f1aad66-0903-4a6e-81b2-1150b4ccccdf", + "uuid": "a01b6a27-1a2b-4599-93b1-c42df1da47a3", "control-id": "cis_rhel10_5-3.1.5", "description": "No notes for control-id 5.3.1.5.", "props": [ @@ -22377,7 +22237,7 @@ ] }, { - "uuid": "2c7d4002-1f66-4d99-a915-095bde46f614", + "uuid": "4b2a9d27-6e40-48d9-acd9-2e1379645938", "control-id": "cis_rhel10_5-3.2.1.1", "description": "No notes for control-id 5.3.2.1.1.", "props": [ @@ -22394,7 +22254,7 @@ ] }, { - "uuid": "c9c5d14a-d6cb-4990-aece-2d9637ddcc98", + "uuid": "22091387-6ac2-4981-b16e-70429468e84f", "control-id": "cis_rhel10_5-3.2.1.2", "description": "The policy also accepts value 0, which means the locked accounts should be manually unlocked\nby an administrator. However, it also mentions that using value 0 can facilitate a DoS\nattack to legitimate users.", "props": [ @@ -22411,7 +22271,7 @@ ] }, { - "uuid": "78373c7d-af29-4e4d-9062-4420b5a9deeb", + "uuid": "84c8f442-676d-484c-9ca3-01a16cf88a8f", "control-id": "cis_rhel10_5-3.2.2.1", "description": "No notes for control-id 5.3.2.2.1.", "props": [ @@ -22428,7 +22288,7 @@ ] }, { - "uuid": "185b2e87-35cb-49a2-aad4-020d0140c4a5", + "uuid": "0f68ba60-df1e-4da4-a850-ecb09692f8b7", "control-id": "cis_rhel10_5-3.2.2.2", "description": "No notes for control-id 5.3.2.2.2.", "props": [ @@ -22445,7 +22305,7 @@ ] }, { - "uuid": "85bfb0fd-dbd8-4703-9382-e1d8d673808a", + "uuid": "d9c567a6-460a-43fc-b5be-b744f09121b1", "control-id": "cis_rhel10_5-3.2.2.3", "description": "This requirement is expected to be manual. However, in previous versions of the policy\nit was already automated the configuration of \"minclass\" option. This posture was kept for\nRHEL 10 in this new version. Rules related to other options are informed in related_rules.\nIn short, minclass=4 alone can achieve the same result achieved by the combination of the\nother 4 options mentioned in the policy.", "props": [ @@ -22462,7 +22322,7 @@ ] }, { - "uuid": "ed417acf-d033-4886-971e-648bf2fae412", + "uuid": "cd4b28e5-427a-44b5-831d-e1d89e7321e4", "control-id": "cis_rhel10_5-3.2.2.4", "description": "No notes for control-id 5.3.2.2.4.", "props": [ @@ -22479,7 +22339,7 @@ ] }, { - "uuid": "e6112461-9999-4f0b-b7f4-fb3cc5a34b28", + "uuid": "12a36002-7e20-4ce5-806a-07de0d867416", "control-id": "cis_rhel10_5-3.2.2.5", "description": "No notes for control-id 5.3.2.2.5.", "props": [ @@ -22496,7 +22356,7 @@ ] }, { - "uuid": "e3ac5ac8-a375-406f-a1a6-d576618d8810", + "uuid": "2c60c98e-4245-4e8c-94e7-fc4343b315e8", "control-id": "cis_rhel10_5-3.2.2.6", "description": "No notes for control-id 5.3.2.2.6.", "props": [ @@ -22513,7 +22373,7 @@ ] }, { - "uuid": "38733b07-5f0e-40ac-b282-10d0f2638f70", + "uuid": "9328aacf-5e0c-4bb9-9b81-23732916b2bb", "control-id": "cis_rhel10_5-3.2.2.7", "description": "No notes for control-id 5.3.2.2.7.", "props": [ @@ -22530,7 +22390,7 @@ ] }, { - "uuid": "9f1f10e0-e124-46f9-b94f-180400575a50", + "uuid": "183dd778-4139-4413-9430-c7ba5aaa946e", "control-id": "cis_rhel10_5-3.2.3.1", "description": "Although mentioned in the section 5.3.3.3, there is no explicit requirement to configure\nretry option of pam_pwhistory. If come in the future, the rule accounts_password_pam_retry\ncan be used.", "props": [ @@ -22552,7 +22412,7 @@ ] }, { - "uuid": "83f54c6d-3edf-470d-8971-635fbb14cb6f", + "uuid": "0afd25a5-cc27-467c-87c5-e2491904074e", "control-id": "cis_rhel10_5-3.2.3.2", "description": "No notes for control-id 5.3.2.3.2.", "props": [ @@ -22569,7 +22429,7 @@ ] }, { - "uuid": "9b26ad3e-5dee-4245-8400-d29a210617b4", + "uuid": "604f486b-4977-4878-9f89-8272903904eb", "control-id": "cis_rhel10_5-3.2.3.3", "description": "In RHEL 10 pam_pwhistory is enabled via authselect feature, as required in 5.3.1.4. The\nfeature automatically set \"use_authok\" option. In any case, we don't have a rule to check\nthis option specifically.", "props": [ @@ -22586,7 +22446,7 @@ ] }, { - "uuid": "0bfec9cb-33b6-4a08-bee0-8aaf13954102", + "uuid": "d5816249-813c-41a9-841d-068a12e9346b", "control-id": "cis_rhel10_5-3.2.4.1", "description": "The rule more specifically used in this requirement also satify the requirement 5.3.1.5.", "props": [ @@ -22603,7 +22463,7 @@ ] }, { - "uuid": "bddd1087-441a-4c27-9fb6-fa3132450dd6", + "uuid": "4993d67d-d28b-4059-a939-95215498c3f5", "control-id": "cis_rhel10_5-3.2.4.2", "description": "Usage of pam_unix.so module together with \"remember\" option is deprecated and is not\nrecommended by this policy. Instead, it should be used remember option of pam_pwhistory\nmodule, as required in 5.3.2.3.1. See here for more details about pam_unix.so:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1778929", "props": [ @@ -22620,7 +22480,7 @@ ] }, { - "uuid": "32f4b93f-b0d7-4350-ac6f-21ba43b141ce", + "uuid": "e5c3f579-93c4-4dd5-8324-9637aa4ed321", "control-id": "cis_rhel10_5-3.2.4.3", "description": "Changes in logindefs mentioned in this requirement are more specifically covered by 5.4.1.4", "props": [ @@ -22642,7 +22502,7 @@ ] }, { - "uuid": "6baf82b9-0af9-4687-855d-33d1b02a05c6", + "uuid": "74275483-83cc-411c-bf6a-b2ddff329866", "control-id": "cis_rhel10_5-3.2.4.4", "description": "In RHEL 10 pam_unix is enabled by default in all authselect profiles already with the\nuse_authtok option set. In any case, we don't have a rule to check this option specifically,\nlike in 5.3.2.3.3.", "props": [ @@ -22659,7 +22519,7 @@ ] }, { - "uuid": "b9755166-0a78-495e-9e7f-5466336462c5", + "uuid": "d033fe64-bc56-4d3a-a33f-74e08e700c2d", "control-id": "cis_rhel10_5-4.1.1", "description": "No notes for control-id 5.4.1.1.", "props": [ @@ -22681,7 +22541,7 @@ ] }, { - "uuid": "e9751df0-73af-4c72-a093-3c2c9846bf1f", + "uuid": "72807adb-40ff-4be9-9f2a-a563147962d1", "control-id": "cis_rhel10_5-4.1.3", "description": "No notes for control-id 5.4.1.3.", "props": [ @@ -22703,7 +22563,7 @@ ] }, { - "uuid": "1cfc4606-3ba7-4fc5-a219-cc09c4afc2db", + "uuid": "ddd0e7dd-cfef-4722-b45b-decb6773ad74", "control-id": "cis_rhel10_5-4.1.4", "description": "There's a \"new\" set of options in /etc/login.defs file to define the number of iterations\nperformed during the hashing process.", "props": [ @@ -22725,7 +22585,7 @@ ] }, { - "uuid": "5c064dff-4d39-4cfd-a9a7-65cdb764b03d", + "uuid": "cd4f8b50-e158-4263-87c8-a5f4d04d7da1", "control-id": "cis_rhel10_5-4.1.5", "description": "No notes for control-id 5.4.1.5.", "props": [ @@ -22747,7 +22607,7 @@ ] }, { - "uuid": "5bfba4c1-4938-4b64-b97a-d0697ae834ed", + "uuid": "0d63f069-fe74-4132-a9fb-35ee4a4ae849", "control-id": "cis_rhel10_5-4.1.6", "description": "No notes for control-id 5.4.1.6.", "props": [ @@ -22764,7 +22624,7 @@ ] }, { - "uuid": "cf0d498e-14c7-484b-9d93-911155057f7e", + "uuid": "496ad51f-74d0-4140-a24d-f2c50632ac1c", "control-id": "cis_rhel10_5-4.2.1", "description": "No notes for control-id 5.4.2.1.", "props": [ @@ -22781,7 +22641,7 @@ ] }, { - "uuid": "e1fd25e5-9a2a-46d7-908a-d44fee5d04b4", + "uuid": "d469e102-656a-4f3f-be1c-b0c33d9529f9", "control-id": "cis_rhel10_5-4.2.2", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -22798,7 +22658,7 @@ ] }, { - "uuid": "e6319006-4c60-4fa8-a6a4-d3fcb76dd473", + "uuid": "c2c1f20b-33f1-4e9e-ae4c-5c54cf0971b2", "control-id": "cis_rhel10_5-4.2.3", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -22815,7 +22675,7 @@ ] }, { - "uuid": "f28ccb01-371f-49f6-8a9d-70345da0ccf7", + "uuid": "efedbb47-89c1-4b8a-92e2-2b737eb365c5", "control-id": "cis_rhel10_5-4.2.4", "description": "No notes for control-id 5.4.2.4.", "props": [ @@ -22832,7 +22692,7 @@ ] }, { - "uuid": "172a52d9-0aab-4348-b4ad-07de31c261cf", + "uuid": "60387fe4-b861-4ae1-a1f3-8db48981bb28", "control-id": "cis_rhel10_5-4.2.5", "description": "No notes for control-id 5.4.2.5.", "props": [ @@ -22854,7 +22714,7 @@ ] }, { - "uuid": "229150c5-9c32-44d0-8b37-7f4805b234c7", + "uuid": "2c721dad-1a9d-4192-90ad-b3c80dc22cb6", "control-id": "cis_rhel10_5-4.2.6", "description": "No notes for control-id 5.4.2.6.", "props": [ @@ -22871,7 +22731,7 @@ ] }, { - "uuid": "3cfaf28e-3ca8-412c-b0c8-35fa1ff906b8", + "uuid": "f3afb684-56d5-488c-a4be-23fb5eb53e8c", "control-id": "cis_rhel10_5-4.2.7", "description": "No notes for control-id 5.4.2.7.", "props": [ @@ -22893,7 +22753,7 @@ ] }, { - "uuid": "ea09db1e-c3d5-494c-872c-ca8b6a83415a", + "uuid": "84c58555-c8bf-4b11-b4d4-5a13df248e33", "control-id": "cis_rhel10_5-4.2.8", "description": "No notes for control-id 5.4.2.8.", "props": [ @@ -22910,7 +22770,7 @@ ] }, { - "uuid": "89de46ec-3df9-4fa5-8c27-705d18ad4d9f", + "uuid": "3cb8ee64-4598-4dae-95b6-05db99590392", "control-id": "cis_rhel10_5-4.3.2", "description": "No notes for control-id 5.4.3.2.", "props": [ @@ -22927,7 +22787,7 @@ ] }, { - "uuid": "d6db00df-35f8-45ec-be31-bb2e0cbadffa", + "uuid": "4b574dcf-127a-496b-8f52-53804bd6f6fd", "control-id": "cis_rhel10_5-4.3.3", "description": "No notes for control-id 5.4.3.3.", "props": [ @@ -22954,7 +22814,7 @@ ] }, { - "uuid": "713d4c10-7afb-414a-8b98-138b8428f40f", + "uuid": "e2477431-6d76-4113-9c80-8c091a647447", "control-id": "cis_rhel10_6-1.1", "description": "No notes for control-id 6.1.1.", "props": [ @@ -22976,7 +22836,7 @@ ] }, { - "uuid": "1d509467-25bb-490d-aa69-e19936eba5c6", + "uuid": "10dcbb3f-659a-45d4-8bed-6b4bed4a7b5f", "control-id": "cis_rhel10_6-1.2", "description": "No notes for control-id 6.1.2.", "props": [ @@ -22993,7 +22853,7 @@ ] }, { - "uuid": "5f9babd8-cc15-4b8d-b87f-ea4182bd2304", + "uuid": "f7c4df0f-bba6-4f19-afca-cb00dc245517", "control-id": "cis_rhel10_6-1.3", "description": "No notes for control-id 6.1.3.", "props": [ @@ -23010,7 +22870,7 @@ ] }, { - "uuid": "d7a062b5-9912-4c72-9e32-7abcf2e41c41", + "uuid": "ef4b4946-c342-4af4-b3b0-5d1cb3640338", "control-id": "cis_rhel10_6-2.1.1", "description": "No notes for control-id 6.2.1.1.", "props": [ @@ -23027,7 +22887,7 @@ ] }, { - "uuid": "a176fa8c-1b7d-4fa5-816b-1c7a90bfa60e", + "uuid": "20a9e70e-5b0f-4a66-b13f-add9aa341ca8", "control-id": "cis_rhel10_6-2.1.2", "description": "The description for control-id cis_rhel10_6-2.1.2.", "props": [ @@ -23040,7 +22900,7 @@ ] }, { - "uuid": "ff1c520d-110c-4071-943f-b21a0bf6ad7d", + "uuid": "1c92ff70-696e-4b17-a3c3-83190425a332", "control-id": "cis_rhel10_6-2.1.3", "description": "The description for control-id cis_rhel10_6-2.1.3.", "props": [ @@ -23053,7 +22913,7 @@ ] }, { - "uuid": "2a10b0ef-53b6-4435-9caf-df64d97e69e1", + "uuid": "3c448ead-7adc-4ee4-b22e-fa0545c4d0bd", "control-id": "cis_rhel10_6-2.1.4", "description": "No notes for control-id 6.2.1.4.", "props": [ @@ -23070,7 +22930,7 @@ ] }, { - "uuid": "6c1c6119-18a4-40c2-9095-96520796843b", + "uuid": "f8420f90-bef9-4282-9920-a2fef37a3cca", "control-id": "cis_rhel10_6-2.2.1.1", "description": "No notes for control-id 6.2.2.1.1.", "props": [ @@ -23087,7 +22947,7 @@ ] }, { - "uuid": "11bfad72-b8ad-496e-8ccf-9e9fb3fbe3fc", + "uuid": "daca446d-af89-4e54-8dc8-07994e1933b9", "control-id": "cis_rhel10_6-2.2.1.2", "description": "The description for control-id cis_rhel10_6-2.2.1.2.", "props": [ @@ -23100,7 +22960,7 @@ ] }, { - "uuid": "010dca8a-a596-4af8-9a0e-815f6005d1a6", + "uuid": "3d4b605f-3a02-463b-82c5-34796f1f111e", "control-id": "cis_rhel10_6-2.2.1.3", "description": "No notes for control-id 6.2.2.1.3.", "props": [ @@ -23117,7 +22977,7 @@ ] }, { - "uuid": "391e7831-a761-4f23-89a4-fec3145a0fca", + "uuid": "28f79b6d-e9c4-49de-a7be-9dcaaf0b2ac5", "control-id": "cis_rhel10_6-2.2.1.4", "description": "No notes for control-id 6.2.2.1.4.", "props": [ @@ -23134,7 +22994,7 @@ ] }, { - "uuid": "93f1e4d2-b005-4a29-8dfa-0e40b95621ca", + "uuid": "6dff8260-22fc-456c-8060-58d5bfa93c77", "control-id": "cis_rhel10_6-2.2.2", "description": "No notes for control-id 6.2.2.2.", "props": [ @@ -23151,7 +23011,7 @@ ] }, { - "uuid": "21109158-dca8-4c66-b083-1170b806b61d", + "uuid": "bac0f21f-ce40-4a12-8693-7d399be06fcf", "control-id": "cis_rhel10_6-2.2.3", "description": "No notes for control-id 6.2.2.3.", "props": [ @@ -23168,7 +23028,7 @@ ] }, { - "uuid": "a7e99c63-ce8d-4005-8ae6-87457f1e4747", + "uuid": "adf32cde-a079-4814-b25a-e69d2367cb5c", "control-id": "cis_rhel10_6-2.2.4", "description": "No notes for control-id 6.2.2.4.", "props": [ @@ -23185,7 +23045,7 @@ ] }, { - "uuid": "5ac353f6-1adc-480b-80cf-82a00bd651f7", + "uuid": "46e74858-5c09-4260-88e9-d2060c3e48db", "control-id": "cis_rhel10_6-2.3.1", "description": "No notes for control-id 6.2.3.1.", "props": [ @@ -23197,7 +23057,7 @@ ] }, { - "uuid": "8c9489c9-8ba2-4d64-9fd2-0ecad8a825ee", + "uuid": "6e9a5939-58c6-45fa-a3a1-86733c1e0fb9", "control-id": "cis_rhel10_6-2.3.2", "description": "No notes for control-id 6.2.3.2.", "props": [ @@ -23209,7 +23069,7 @@ ] }, { - "uuid": "08560bb7-86ee-45db-83f6-389ed5fbc8b3", + "uuid": "80cbb1e7-cf93-482d-9a9e-1e66958ec6b1", "control-id": "cis_rhel10_6-2.3.3", "description": "No notes for control-id 6.2.3.3.", "props": [ @@ -23221,7 +23081,7 @@ ] }, { - "uuid": "74ef5717-68a2-4883-b185-b2166a93fe1f", + "uuid": "213616c8-37ab-4281-8220-bb8a9415bd41", "control-id": "cis_rhel10_6-2.3.4", "description": "No notes for control-id 6.2.3.4.", "props": [ @@ -23233,7 +23093,7 @@ ] }, { - "uuid": "bfa02308-fe75-42e9-82a0-8f0d09379bdc", + "uuid": "71249c7b-2b2f-4ff7-81f1-86b1174d3aba", "control-id": "cis_rhel10_6-2.3.5", "description": "The description for control-id cis_rhel10_6-2.3.5.", "props": [ @@ -23246,7 +23106,7 @@ ] }, { - "uuid": "66b9a42c-69dc-492b-baa8-a90a6f1d9486", + "uuid": "9ceb9341-bbe9-4a2e-85ff-e3de9b331aed", "control-id": "cis_rhel10_6-2.3.6", "description": "The description for control-id cis_rhel10_6-2.3.6.", "props": [ @@ -23259,7 +23119,7 @@ ] }, { - "uuid": "78ebf3ba-87fe-4478-b3f3-3a48357d79e4", + "uuid": "55e3623b-ae9e-455e-a90d-abcb3f2a5e53", "control-id": "cis_rhel10_6-2.3.7", "description": "No notes for control-id 6.2.3.7.", "props": [ @@ -23271,7 +23131,7 @@ ] }, { - "uuid": "ff6e9e67-56d4-4a42-95c6-9283604ed0c7", + "uuid": "3b7dc316-aa0c-41cd-8411-c38625c15052", "control-id": "cis_rhel10_6-2.3.8", "description": "The description for control-id cis_rhel10_6-2.3.8.", "props": [ @@ -23284,7 +23144,7 @@ ] }, { - "uuid": "44676f57-c3a2-46ed-b5e8-cfc6cb2de379", + "uuid": "144d1985-4625-47e7-9f98-94cb2ae49632", "control-id": "cis_rhel10_6-2.4.1", "description": "It is not harmful to run these rules even if rsyslog is not installed or active.", "props": [ @@ -23311,7 +23171,7 @@ ] }, { - "uuid": "af6f2795-85bc-433a-9bf4-d42fbeb86689", + "uuid": "31b6f4c1-ba15-4e54-9275-655ef7535ca4", "control-id": "cis_rhel10_7-1.1", "description": "No notes for control-id 7.1.1.", "props": [ @@ -23338,7 +23198,7 @@ ] }, { - "uuid": "7e917560-b77a-4c44-9ea3-ee6c42c0518a", + "uuid": "584cc035-e958-4a6b-a959-d63a1accdcd1", "control-id": "cis_rhel10_7-1.2", "description": "No notes for control-id 7.1.2.", "props": [ @@ -23365,7 +23225,7 @@ ] }, { - "uuid": "a3efe93a-df07-4ca7-a171-49e027fb1026", + "uuid": "cbeda095-20bf-4a72-af9d-ccc1878ecf2a", "control-id": "cis_rhel10_7-1.3", "description": "No notes for control-id 7.1.3.", "props": [ @@ -23392,7 +23252,7 @@ ] }, { - "uuid": "d8767842-af11-47fb-9459-4d9c69c970f4", + "uuid": "3cf12a29-2646-4965-8107-b1701e9d890e", "control-id": "cis_rhel10_7-1.4", "description": "No notes for control-id 7.1.4.", "props": [ @@ -23419,7 +23279,7 @@ ] }, { - "uuid": "a4692d18-abae-4e2b-ac93-0b4a212cb1f9", + "uuid": "00c8757e-519b-4525-8ee6-75aab3351349", "control-id": "cis_rhel10_7-1.5", "description": "No notes for control-id 7.1.5.", "props": [ @@ -23446,7 +23306,7 @@ ] }, { - "uuid": "30f5c8ff-61a6-4078-8cdb-569caf14da80", + "uuid": "e0ed6315-50bf-4802-9723-e1c84ddaaf33", "control-id": "cis_rhel10_7-1.6", "description": "No notes for control-id 7.1.6.", "props": [ @@ -23473,7 +23333,7 @@ ] }, { - "uuid": "ba046808-18be-48a3-bcde-d5f91618b364", + "uuid": "e21d7527-fe46-421b-942e-9135d2a5f7ae", "control-id": "cis_rhel10_7-1.7", "description": "No notes for control-id 7.1.7.", "props": [ @@ -23500,7 +23360,7 @@ ] }, { - "uuid": "eed69d0d-6c69-432d-9d23-de51bc934fdf", + "uuid": "e3a2d15c-e9da-47f3-9728-286a6c518228", "control-id": "cis_rhel10_7-1.8", "description": "No notes for control-id 7.1.8.", "props": [ @@ -23527,7 +23387,7 @@ ] }, { - "uuid": "f8b64401-7a2e-4961-b5dd-a0b828b29b90", + "uuid": "628f5c98-753f-43d3-9cf8-84e4c5a47025", "control-id": "cis_rhel10_7-1.9", "description": "No notes for control-id 7.1.9.", "props": [ @@ -23554,7 +23414,7 @@ ] }, { - "uuid": "77300d1d-d60f-48f5-824f-66300d1af112", + "uuid": "5628edd7-c09b-4406-acdb-a9f8d96d995e", "control-id": "cis_rhel10_7-1.10", "description": "No notes for control-id 7.1.10.", "props": [ @@ -23596,7 +23456,7 @@ ] }, { - "uuid": "b02c8a97-60ef-4219-bbb3-96791101a9b1", + "uuid": "72c3a603-8827-4955-acbd-fe09f9ef57f6", "control-id": "cis_rhel10_7-1.11", "description": "No notes for control-id 7.1.11.", "props": [ @@ -23618,7 +23478,7 @@ ] }, { - "uuid": "821d3d8c-a91b-4ef9-9afb-ef32991e3d93", + "uuid": "4f7ff5fc-1af8-4fc0-8cea-380ec7289a36", "control-id": "cis_rhel10_7-1.12", "description": "No notes for control-id 7.1.12.", "props": [ @@ -23640,7 +23500,7 @@ ] }, { - "uuid": "3fddb3e7-6609-4a64-9329-cb1a92b32b5f", + "uuid": "04e510c8-dce2-4513-8697-00bbf6d16b57", "control-id": "cis_rhel10_7-1.13", "description": "The description for control-id cis_rhel10_7-1.13.", "props": [ @@ -23653,7 +23513,7 @@ ] }, { - "uuid": "77fc315a-a843-43ea-85d9-b5b5526f8878", + "uuid": "2e425146-190b-480f-a43c-df844caba328", "control-id": "cis_rhel10_7-2.1", "description": "No notes for control-id 7.2.1.", "props": [ @@ -23670,7 +23530,7 @@ ] }, { - "uuid": "c8d4854b-4f22-4fdc-85fa-f625495aa7da", + "uuid": "12195ac6-3262-415b-a717-582a77deb9d3", "control-id": "cis_rhel10_7-2.2", "description": "No notes for control-id 7.2.2.", "props": [ @@ -23687,7 +23547,7 @@ ] }, { - "uuid": "ef697c6a-8834-4190-8546-444c4eaef083", + "uuid": "81c6ef09-f41f-4027-8f7b-f50fe896159d", "control-id": "cis_rhel10_7-2.3", "description": "No notes for control-id 7.2.3.", "props": [ @@ -23704,7 +23564,7 @@ ] }, { - "uuid": "b1d529b9-109c-48aa-bb8f-f422ae9d7201", + "uuid": "d93ea99f-11f2-4fe8-a064-719fe1e99452", "control-id": "cis_rhel10_7-2.4", "description": "No notes for control-id 7.2.4.", "props": [ @@ -23721,7 +23581,7 @@ ] }, { - "uuid": "ca5a215b-2020-4507-8bf2-d61862673f6d", + "uuid": "0db1a388-835b-44cb-a70b-f0ccb7a329d2", "control-id": "cis_rhel10_7-2.5", "description": "No notes for control-id 7.2.5.", "props": [ @@ -23738,7 +23598,7 @@ ] }, { - "uuid": "d5167ca7-69d3-4e3d-b2b0-80b4194388ce", + "uuid": "621a77a0-25ff-4908-b6a9-86f996d301d3", "control-id": "cis_rhel10_7-2.6", "description": "No notes for control-id 7.2.6.", "props": [ @@ -23755,7 +23615,7 @@ ] }, { - "uuid": "e71af825-d8f3-4458-9a8a-a22016230fec", + "uuid": "678dac1a-fe57-496b-a963-86e6acf5b9dd", "control-id": "cis_rhel10_7-2.7", "description": "No notes for control-id 7.2.7.", "props": [ @@ -23772,7 +23632,7 @@ ] }, { - "uuid": "1f53c0bc-9100-453b-8ed9-cbf663f855f6", + "uuid": "191d32e8-6bc8-477d-9fa2-fdbfa939c4cf", "control-id": "cis_rhel10_7-2.8", "description": "No notes for control-id 7.2.8.", "props": [ @@ -23799,7 +23659,7 @@ ] }, { - "uuid": "d9245cfa-598c-4180-9556-1967b0352c7d", + "uuid": "73a88634-d5bb-4e3a-b92a-400a3fce94af", "control-id": "cis_rhel10_7-2.9", "description": "No notes for control-id 7.2.9.", "props": [ diff --git a/component-definitions/rhel10/rhel10-cis_rhel10-l1_workstation/component-definition.json b/component-definitions/rhel10/rhel10-cis_rhel10-l1_workstation/component-definition.json index 8bb4fbc4..18df1a97 100644 --- a/component-definitions/rhel10/rhel10-cis_rhel10-l1_workstation/component-definition.json +++ b/component-definitions/rhel10/rhel10-cis_rhel10-l1_workstation/component-definition.json @@ -3,8 +3,8 @@ "uuid": "f215e0d6-22bf-45fa-955c-4bc760e0ee55", "metadata": { "title": "Component definition for rhel10", - "last-modified": "2025-12-15T16:32:32.837323+00:00", - "version": "3.3", + "last-modified": "2025-12-16T14:24:37.340065+00:00", + "version": "3.4", "oscal-version": "1.1.3" }, "components": [ @@ -1451,3427 +1451,3391 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_grub2_cfg", + "value": "file_permissions_boot_grub2", "remarks": "rule_set_034" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/grub.cfg Group Ownership", + "value": "All GRUB configuration files must have mode 0600 or more restrictive", "remarks": "rule_set_034" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_grub2_cfg", + "value": "file_owner_boot_grub2", "remarks": "rule_set_035" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/grub.cfg User Ownership", + "value": "All GRUB configuration files must be owned by root", "remarks": "rule_set_035" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_grub2_cfg", + "value": "file_groupowner_boot_grub2", "remarks": "rule_set_036" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/grub.cfg Permissions", + "value": "All GRUB configuration files must be group-owned by root", "remarks": "rule_set_036" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_user_cfg", + "value": "disable_users_coredumps", "remarks": "rule_set_037" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/user.cfg Group Ownership", + "value": "Disable Core Dumps for All Users", "remarks": "rule_set_037" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_user_cfg", + "value": "sysctl_fs_protected_hardlinks", "remarks": "rule_set_038" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/user.cfg User Ownership", + "value": "Enable Kernel Parameter to Enforce DAC on Hardlinks", "remarks": "rule_set_038" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_user_cfg", + "value": "sysctl_fs_suid_dumpable", "remarks": "rule_set_039" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/user.cfg Permissions", + "value": "Disable Core Dumps for SUID programs", "remarks": "rule_set_039" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "disable_users_coredumps", + "value": "sysctl_kernel_dmesg_restrict", "remarks": "rule_set_040" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Core Dumps for All Users", + "value": "Restrict Access to Kernel Message Buffer", "remarks": "rule_set_040" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_protected_hardlinks", + "value": "sysctl_kernel_kptr_restrict", "remarks": "rule_set_041" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Enforce DAC on Hardlinks", + "value": "Restrict Exposed Kernel Pointer Addresses Access", "remarks": "rule_set_041" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_suid_dumpable", + "value": "sysctl_kernel_yama_ptrace_scope", "remarks": "rule_set_042" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Core Dumps for SUID programs", + "value": "Restrict usage of ptrace to descendant processes", "remarks": "rule_set_042" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_dmesg_restrict", + "value": "sysctl_kernel_randomize_va_space", "remarks": "rule_set_043" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict Access to Kernel Message Buffer", + "value": "Enable Randomized Layout of Virtual Address Space", "remarks": "rule_set_043" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_kptr_restrict", + "value": "coredump_disable_backtraces", "remarks": "rule_set_044" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict Exposed Kernel Pointer Addresses Access", + "value": "Disable core dump backtraces", "remarks": "rule_set_044" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_yama_ptrace_scope", + "value": "coredump_disable_storage", "remarks": "rule_set_045" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict usage of ptrace to descendant processes", + "value": "Disable storing core dump", "remarks": "rule_set_045" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_randomize_va_space", + "value": "configure_custom_crypto_policy_cis", "remarks": "rule_set_046" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Randomized Layout of Virtual Address Space", + "value": "Implement Custom Crypto Policy Modules for CIS Benchmark", "remarks": "rule_set_046" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "coredump_disable_backtraces", + "value": "banner_etc_motd_cis", "remarks": "rule_set_047" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable core dump backtraces", + "value": "Ensure Message Of The Day Is Configured Properly", "remarks": "rule_set_047" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "coredump_disable_storage", + "value": "banner_etc_issue_cis", "remarks": "rule_set_048" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable storing core dump", + "value": "Ensure Local Login Warning Banner Is Configured Properly", "remarks": "rule_set_048" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_custom_crypto_policy_cis", + "value": "banner_etc_issue_net_cis", "remarks": "rule_set_049" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Implement Custom Crypto Policy Modules for CIS Benchmark", + "value": "Ensure Remote Login Warning Banner Is Configured Properly", "remarks": "rule_set_049" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "banner_etc_motd_cis", + "value": "file_groupowner_etc_motd", "remarks": "rule_set_050" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Message Of The Day Is Configured Properly", + "value": "Verify Group Ownership of Message of the Day Banner", "remarks": "rule_set_050" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "banner_etc_issue_cis", + "value": "file_owner_etc_motd", "remarks": "rule_set_051" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Local Login Warning Banner Is Configured Properly", + "value": "Verify ownership of Message of the Day Banner", "remarks": "rule_set_051" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "banner_etc_issue_net_cis", + "value": "file_permissions_etc_motd", "remarks": "rule_set_052" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Remote Login Warning Banner Is Configured Properly", + "value": "Verify permissions on Message of the Day Banner", "remarks": "rule_set_052" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_motd", + "value": "file_groupowner_etc_issue", "remarks": "rule_set_053" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Ownership of Message of the Day Banner", + "value": "Verify Group Ownership of System Login Banner", "remarks": "rule_set_053" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_motd", + "value": "file_owner_etc_issue", "remarks": "rule_set_054" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify ownership of Message of the Day Banner", + "value": "Verify ownership of System Login Banner", "remarks": "rule_set_054" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_motd", + "value": "file_permissions_etc_issue", "remarks": "rule_set_055" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify permissions on Message of the Day Banner", + "value": "Verify permissions on System Login Banner", "remarks": "rule_set_055" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_issue", + "value": "file_groupowner_etc_issue_net", "remarks": "rule_set_056" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Ownership of System Login Banner", + "value": "Verify Group Ownership of System Login Banner for Remote Connections", "remarks": "rule_set_056" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_issue", + "value": "file_owner_etc_issue_net", "remarks": "rule_set_057" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify ownership of System Login Banner", + "value": "Verify ownership of System Login Banner for Remote Connections", "remarks": "rule_set_057" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_issue", + "value": "file_permissions_etc_issue_net", "remarks": "rule_set_058" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify permissions on System Login Banner", + "value": "Verify permissions on System Login Banner for Remote Connections", "remarks": "rule_set_058" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_issue_net", + "value": "dconf_gnome_banner_enabled", "remarks": "rule_set_059" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Ownership of System Login Banner for Remote Connections", + "value": "Enable GNOME3 Login Warning Banner", "remarks": "rule_set_059" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_issue_net", + "value": "dconf_gnome_login_banner_text", "remarks": "rule_set_060" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify ownership of System Login Banner for Remote Connections", + "value": "Set the GNOME3 Login Warning Banner Text", "remarks": "rule_set_060" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_issue_net", + "value": "dconf_gnome_disable_user_list", "remarks": "rule_set_061" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify permissions on System Login Banner for Remote Connections", + "value": "Disable the GNOME3 Login User List", "remarks": "rule_set_061" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_banner_enabled", + "value": "dconf_gnome_screensaver_idle_delay", "remarks": "rule_set_062" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable GNOME3 Login Warning Banner", + "value": "Set GNOME3 Screensaver Inactivity Timeout", "remarks": "rule_set_062" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_login_banner_text", + "value": "dconf_gnome_screensaver_lock_delay", "remarks": "rule_set_063" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set the GNOME3 Login Warning Banner Text", + "value": "Set GNOME3 Screensaver Lock Delay After Activation Period", "remarks": "rule_set_063" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_disable_user_list", + "value": "dconf_gnome_session_idle_user_locks", "remarks": "rule_set_064" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable the GNOME3 Login User List", + "value": "Ensure Users Cannot Change GNOME3 Session Idle Settings", "remarks": "rule_set_064" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_idle_delay", + "value": "dconf_gnome_screensaver_user_locks", "remarks": "rule_set_065" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set GNOME3 Screensaver Inactivity Timeout", + "value": "Ensure Users Cannot Change GNOME3 Screensaver Settings", "remarks": "rule_set_065" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_lock_delay", + "value": "dconf_gnome_disable_autorun", "remarks": "rule_set_066" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set GNOME3 Screensaver Lock Delay After Activation Period", + "value": "Disable GNOME3 Automount running", "remarks": "rule_set_066" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_session_idle_user_locks", + "value": "package_kea_removed", "remarks": "rule_set_067" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Users Cannot Change GNOME3 Session Idle Settings", + "value": "Uninstall kea Package", "remarks": "rule_set_067" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_user_locks", + "value": "package_bind_removed", "remarks": "rule_set_068" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Users Cannot Change GNOME3 Screensaver Settings", + "value": "Uninstall bind Package", "remarks": "rule_set_068" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_disable_autorun", + "value": "package_dnsmasq_removed", "remarks": "rule_set_069" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable GNOME3 Automount running", + "value": "Uninstall dnsmasq Package", "remarks": "rule_set_069" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_kea_removed", + "value": "package_vsftpd_removed", "remarks": "rule_set_070" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall kea Package", + "value": "Uninstall vsftpd Package", "remarks": "rule_set_070" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_bind_removed", + "value": "package_dovecot_removed", "remarks": "rule_set_071" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall bind Package", + "value": "Uninstall dovecot Package", "remarks": "rule_set_071" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_dnsmasq_removed", + "value": "package_cyrus-imapd_removed", "remarks": "rule_set_072" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall dnsmasq Package", + "value": "Uninstall cyrus-imapd Package", "remarks": "rule_set_072" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_vsftpd_removed", + "value": "service_nfs_disabled", "remarks": "rule_set_073" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall vsftpd Package", + "value": "Disable Network File System (nfs)", "remarks": "rule_set_073" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_dovecot_removed", + "value": "service_rpcbind_disabled", "remarks": "rule_set_074" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall dovecot Package", + "value": "Disable rpcbind Service", "remarks": "rule_set_074" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_cyrus-imapd_removed", + "value": "package_rsync_removed", "remarks": "rule_set_075" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall cyrus-imapd Package", + "value": "Uninstall rsync Package", "remarks": "rule_set_075" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_nfs_disabled", + "value": "package_samba_removed", "remarks": "rule_set_076" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Network File System (nfs)", + "value": "Uninstall Samba Package", "remarks": "rule_set_076" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_rpcbind_disabled", + "value": "package_net-snmp_removed", "remarks": "rule_set_077" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable rpcbind Service", + "value": "Uninstall net-snmp Package", "remarks": "rule_set_077" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_rsync_removed", + "value": "package_telnet-server_removed", "remarks": "rule_set_078" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall rsync Package", + "value": "Uninstall telnet-server Package", "remarks": "rule_set_078" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_samba_removed", + "value": "package_tftp-server_removed", "remarks": "rule_set_079" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall Samba Package", + "value": "Uninstall tftp-server Package", "remarks": "rule_set_079" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_net-snmp_removed", + "value": "package_squid_removed", "remarks": "rule_set_080" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall net-snmp Package", + "value": "Uninstall squid Package", "remarks": "rule_set_080" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet-server_removed", + "value": "package_httpd_removed", "remarks": "rule_set_081" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall telnet-server Package", + "value": "Uninstall httpd Package", "remarks": "rule_set_081" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_tftp-server_removed", + "value": "package_nginx_removed", "remarks": "rule_set_082" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall tftp-server Package", + "value": "Uninstall nginx Package", "remarks": "rule_set_082" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_squid_removed", + "value": "postfix_network_listening_disabled", "remarks": "rule_set_083" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall squid Package", + "value": "Disable Postfix Network Listening", "remarks": "rule_set_083" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_httpd_removed", + "value": "has_nonlocal_mta", "remarks": "rule_set_084" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall httpd Package", + "value": "Ensure Mail Transfer Agent is not Listening on any non-loopback Address", "remarks": "rule_set_084" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_nginx_removed", + "value": "package_ftp_removed", "remarks": "rule_set_085" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall nginx Package", + "value": "Remove ftp Package", "remarks": "rule_set_085" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "postfix_network_listening_disabled", + "value": "package_telnet_removed", "remarks": "rule_set_086" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Postfix Network Listening", + "value": "Remove telnet Clients", "remarks": "rule_set_086" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "has_nonlocal_mta", + "value": "package_tftp_removed", "remarks": "rule_set_087" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Mail Transfer Agent is not Listening on any non-loopback Address", + "value": "Remove tftp Daemon", "remarks": "rule_set_087" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_ftp_removed", + "value": "chronyd_specify_remote_server", "remarks": "rule_set_088" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove ftp Package", + "value": "A remote time server for Chrony is configured", "remarks": "rule_set_088" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet_removed", + "value": "chronyd_run_as_chrony_user", "remarks": "rule_set_089" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove telnet Clients", + "value": "Ensure that chronyd is running under chrony user account", "remarks": "rule_set_089" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_tftp_removed", + "value": "package_cron_installed", "remarks": "rule_set_090" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove tftp Daemon", + "value": "Install the cron service", "remarks": "rule_set_090" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "chronyd_specify_remote_server", + "value": "service_crond_enabled", "remarks": "rule_set_091" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "A remote time server for Chrony is configured", + "value": "Enable cron Service", "remarks": "rule_set_091" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "chronyd_run_as_chrony_user", + "value": "file_groupowner_crontab", "remarks": "rule_set_092" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that chronyd is running under chrony user account", + "value": "Verify Group Who Owns Crontab", "remarks": "rule_set_092" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_cron_installed", + "value": "file_owner_crontab", "remarks": "rule_set_093" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install the cron service", + "value": "Verify Owner on crontab", "remarks": "rule_set_093" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_crond_enabled", + "value": "file_permissions_crontab", "remarks": "rule_set_094" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable cron Service", + "value": "Verify Permissions on crontab", "remarks": "rule_set_094" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_crontab", + "value": "file_groupowner_cron_hourly", "remarks": "rule_set_095" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Crontab", + "value": "Verify Group Who Owns cron.hourly", "remarks": "rule_set_095" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_crontab", + "value": "file_owner_cron_hourly", "remarks": "rule_set_096" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on crontab", + "value": "Verify Owner on cron.hourly", "remarks": "rule_set_096" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_crontab", + "value": "file_permissions_cron_hourly", "remarks": "rule_set_097" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on crontab", + "value": "Verify Permissions on cron.hourly", "remarks": "rule_set_097" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_cron_hourly", + "value": "file_groupowner_cron_daily", "remarks": "rule_set_098" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns cron.hourly", + "value": "Verify Group Who Owns cron.daily", "remarks": "rule_set_098" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_cron_hourly", + "value": "file_owner_cron_daily", "remarks": "rule_set_099" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on cron.hourly", + "value": "Verify Owner on cron.daily", "remarks": "rule_set_099" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_cron_hourly", + "value": "file_permissions_cron_daily", "remarks": "rule_set_100" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on cron.hourly", + "value": "Verify Permissions on cron.daily", "remarks": "rule_set_100" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_cron_daily", + "value": "file_groupowner_cron_weekly", "remarks": "rule_set_101" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns cron.daily", + "value": "Verify Group Who Owns cron.weekly", "remarks": "rule_set_101" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_cron_daily", + "value": "file_owner_cron_weekly", "remarks": "rule_set_102" }, - { - "name": "Rule_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on cron.daily", - "remarks": "rule_set_102" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_cron_daily", - "remarks": "rule_set_103" - }, - { - "name": "Rule_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on cron.daily", - "remarks": "rule_set_103" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_cron_weekly", - "remarks": "rule_set_104" - }, - { - "name": "Rule_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns cron.weekly", - "remarks": "rule_set_104" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_cron_weekly", - "remarks": "rule_set_105" - }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.weekly", - "remarks": "rule_set_105" + "remarks": "rule_set_102" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_weekly", - "remarks": "rule_set_106" + "remarks": "rule_set_103" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.weekly", - "remarks": "rule_set_106" + "remarks": "rule_set_103" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_monthly", - "remarks": "rule_set_107" + "remarks": "rule_set_104" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.monthly", - "remarks": "rule_set_107" + "remarks": "rule_set_104" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_monthly", - "remarks": "rule_set_108" + "remarks": "rule_set_105" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.monthly", - "remarks": "rule_set_108" + "remarks": "rule_set_105" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_monthly", - "remarks": "rule_set_109" + "remarks": "rule_set_106" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.monthly", - "remarks": "rule_set_109" + "remarks": "rule_set_106" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_yearly", - "remarks": "rule_set_110" + "remarks": "rule_set_107" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.yearly", - "remarks": "rule_set_110" + "remarks": "rule_set_107" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_yearly", - "remarks": "rule_set_111" + "remarks": "rule_set_108" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.yearly", - "remarks": "rule_set_111" + "remarks": "rule_set_108" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_yearly", - "remarks": "rule_set_112" + "remarks": "rule_set_109" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.yearly", - "remarks": "rule_set_112" + "remarks": "rule_set_109" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_d", - "remarks": "rule_set_113" + "remarks": "rule_set_110" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.d", - "remarks": "rule_set_113" + "remarks": "rule_set_110" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_d", - "remarks": "rule_set_114" + "remarks": "rule_set_111" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.d", - "remarks": "rule_set_114" + "remarks": "rule_set_111" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_d", - "remarks": "rule_set_115" + "remarks": "rule_set_112" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.d", - "remarks": "rule_set_115" + "remarks": "rule_set_112" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_cron_deny_not_exist", - "remarks": "rule_set_116" + "remarks": "rule_set_113" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/cron.deny does not exist", - "remarks": "rule_set_116" + "remarks": "rule_set_113" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_cron_allow_exists", - "remarks": "rule_set_117" + "remarks": "rule_set_114" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/cron.allow exists", - "remarks": "rule_set_117" + "remarks": "rule_set_114" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_allow", - "remarks": "rule_set_118" + "remarks": "rule_set_115" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/cron.allow file", - "remarks": "rule_set_118" + "remarks": "rule_set_115" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_allow", - "remarks": "rule_set_119" + "remarks": "rule_set_116" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/cron.allow file", - "remarks": "rule_set_119" + "remarks": "rule_set_116" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_allow", - "remarks": "rule_set_120" + "remarks": "rule_set_117" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/cron.allow file", - "remarks": "rule_set_120" + "remarks": "rule_set_117" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_at_deny_not_exist", - "remarks": "rule_set_121" + "remarks": "rule_set_118" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/at.deny does not exist", - "remarks": "rule_set_121" + "remarks": "rule_set_118" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_at_allow_exists", - "remarks": "rule_set_122" + "remarks": "rule_set_119" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/at.allow exists", - "remarks": "rule_set_122" + "remarks": "rule_set_119" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_at_allow", - "remarks": "rule_set_123" + "remarks": "rule_set_120" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/at.allow file", - "remarks": "rule_set_123" + "remarks": "rule_set_120" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_at_allow", - "remarks": "rule_set_124" + "remarks": "rule_set_121" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/at.allow file", - "remarks": "rule_set_124" + "remarks": "rule_set_121" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_at_allow", - "remarks": "rule_set_125" + "remarks": "rule_set_122" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/at.allow file", - "remarks": "rule_set_125" + "remarks": "rule_set_122" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_atm_disabled", - "remarks": "rule_set_126" + "remarks": "rule_set_123" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable ATM Support", - "remarks": "rule_set_126" + "remarks": "rule_set_123" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_can_disabled", - "remarks": "rule_set_127" + "remarks": "rule_set_124" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable CAN Support", - "remarks": "rule_set_127" + "remarks": "rule_set_124" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_dccp_disabled", - "remarks": "rule_set_128" + "remarks": "rule_set_125" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable DCCP Support", - "remarks": "rule_set_128" + "remarks": "rule_set_125" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_tipc_disabled", - "remarks": "rule_set_129" + "remarks": "rule_set_126" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable TIPC Support", - "remarks": "rule_set_129" + "remarks": "rule_set_126" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_rds_disabled", - "remarks": "rule_set_130" + "remarks": "rule_set_127" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable RDS Support", - "remarks": "rule_set_130" + "remarks": "rule_set_127" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_sctp_disabled", - "remarks": "rule_set_131" + "remarks": "rule_set_128" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SCTP Support", - "remarks": "rule_set_131" + "remarks": "rule_set_128" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_ip_forward", - "remarks": "rule_set_132" + "remarks": "rule_set_129" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IP Forwarding on IPv4 Interfaces", - "remarks": "rule_set_132" + "remarks": "rule_set_129" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_forwarding", - "remarks": "rule_set_133" + "remarks": "rule_set_130" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv4 Forwarding on all IPv4 Interfaces", - "remarks": "rule_set_133" + "remarks": "rule_set_130" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_forwarding", - "remarks": "rule_set_134" + "remarks": "rule_set_131" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv4 Forwarding By Default", - "remarks": "rule_set_134" + "remarks": "rule_set_131" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_send_redirects", - "remarks": "rule_set_135" + "remarks": "rule_set_132" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_135" + "remarks": "rule_set_132" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_send_redirects", - "remarks": "rule_set_136" + "remarks": "rule_set_133" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces by Default", - "remarks": "rule_set_136" + "remarks": "rule_set_133" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses", - "remarks": "rule_set_137" + "remarks": "rule_set_134" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Ignore Bogus ICMP Error Responses on IPv4 Interfaces", - "remarks": "rule_set_137" + "remarks": "rule_set_134" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_icmp_echo_ignore_broadcasts", - "remarks": "rule_set_138" + "remarks": "rule_set_135" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Ignore ICMP Broadcast Echo Requests on IPv4 Interfaces", - "remarks": "rule_set_138" + "remarks": "rule_set_135" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_redirects", - "remarks": "rule_set_139" + "remarks": "rule_set_136" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv4 Interfaces", - "remarks": "rule_set_139" + "remarks": "rule_set_136" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_redirects", - "remarks": "rule_set_140" + "remarks": "rule_set_137" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv4 Interfaces", - "remarks": "rule_set_140" + "remarks": "rule_set_137" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_secure_redirects", - "remarks": "rule_set_141" + "remarks": "rule_set_138" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Secure ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_141" + "remarks": "rule_set_138" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_secure_redirects", - "remarks": "rule_set_142" + "remarks": "rule_set_139" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Kernel Parameter for Accepting Secure Redirects By Default", - "remarks": "rule_set_142" + "remarks": "rule_set_139" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_rp_filter", - "remarks": "rule_set_143" + "remarks": "rule_set_140" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces", - "remarks": "rule_set_143" + "remarks": "rule_set_140" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_rp_filter", - "remarks": "rule_set_144" + "remarks": "rule_set_141" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces by Default", - "remarks": "rule_set_144" + "remarks": "rule_set_141" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_source_route", - "remarks": "rule_set_145" + "remarks": "rule_set_142" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces", - "remarks": "rule_set_145" + "remarks": "rule_set_142" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_source_route", - "remarks": "rule_set_146" + "remarks": "rule_set_143" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv4 Interfaces by Default", - "remarks": "rule_set_146" + "remarks": "rule_set_143" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_log_martians", - "remarks": "rule_set_147" + "remarks": "rule_set_144" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces", - "remarks": "rule_set_147" + "remarks": "rule_set_144" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_log_martians", - "remarks": "rule_set_148" + "remarks": "rule_set_145" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces by Default", - "remarks": "rule_set_148" + "remarks": "rule_set_145" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_tcp_syncookies", - "remarks": "rule_set_149" + "remarks": "rule_set_146" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use TCP Syncookies on Network Interfaces", - "remarks": "rule_set_149" + "remarks": "rule_set_146" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_forwarding", - "remarks": "rule_set_150" + "remarks": "rule_set_147" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv6 Forwarding", - "remarks": "rule_set_150" + "remarks": "rule_set_147" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_forwarding", - "remarks": "rule_set_151" + "remarks": "rule_set_148" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv6 Forwarding by default", - "remarks": "rule_set_151" + "remarks": "rule_set_148" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_redirects", - "remarks": "rule_set_152" + "remarks": "rule_set_149" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv6 Interfaces", - "remarks": "rule_set_152" + "remarks": "rule_set_149" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_redirects", - "remarks": "rule_set_153" + "remarks": "rule_set_150" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv6 Interfaces", - "remarks": "rule_set_153" + "remarks": "rule_set_150" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_source_route", - "remarks": "rule_set_154" + "remarks": "rule_set_151" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv6 Interfaces", - "remarks": "rule_set_154" + "remarks": "rule_set_151" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_source_route", - "remarks": "rule_set_155" + "remarks": "rule_set_152" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv6 Interfaces by Default", - "remarks": "rule_set_155" + "remarks": "rule_set_152" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_ra", - "remarks": "rule_set_156" + "remarks": "rule_set_153" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Router Advertisements on All IPv6 Interfaces", - "remarks": "rule_set_156" + "remarks": "rule_set_153" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_ra", - "remarks": "rule_set_157" + "remarks": "rule_set_154" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting Router Advertisements on all IPv6 Interfaces by Default", - "remarks": "rule_set_157" + "remarks": "rule_set_154" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_firewalld_installed", - "remarks": "rule_set_158" + "remarks": "rule_set_155" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install firewalld Package", - "remarks": "rule_set_158" + "remarks": "rule_set_155" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "firewalld-backend", - "remarks": "rule_set_159" + "remarks": "rule_set_156" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Firewalld to Use the Nftables Backend", - "remarks": "rule_set_159" + "remarks": "rule_set_156" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_firewalld_enabled", - "remarks": "rule_set_160" + "remarks": "rule_set_157" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify firewalld Enabled", - "remarks": "rule_set_160" + "remarks": "rule_set_157" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "firewalld_loopback_traffic_trusted", - "remarks": "rule_set_161" + "remarks": "rule_set_158" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Firewalld to Trust Loopback Traffic", - "remarks": "rule_set_161" + "remarks": "rule_set_158" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_config", - "remarks": "rule_set_162" + "remarks": "rule_set_159" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server config file", - "remarks": "rule_set_162" + "remarks": "rule_set_159" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_config", - "remarks": "rule_set_163" + "remarks": "rule_set_160" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server config file", - "remarks": "rule_set_163" + "remarks": "rule_set_160" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_config", - "remarks": "rule_set_164" + "remarks": "rule_set_161" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server config file", - "remarks": "rule_set_164" + "remarks": "rule_set_161" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_sshd_config_d", - "remarks": "rule_set_165" + "remarks": "rule_set_162" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Config File", - "remarks": "rule_set_165" + "remarks": "rule_set_162" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_drop_in_config", - "remarks": "rule_set_166" + "remarks": "rule_set_163" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Config File", - "remarks": "rule_set_166" + "remarks": "rule_set_163" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_sshd_config_d", - "remarks": "rule_set_167" + "remarks": "rule_set_164" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server Configuration Files", - "remarks": "rule_set_167" + "remarks": "rule_set_164" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_sshd_config_d", - "remarks": "rule_set_168" + "remarks": "rule_set_165" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server Configuration Files", - "remarks": "rule_set_168" + "remarks": "rule_set_165" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_drop_in_config", - "remarks": "rule_set_169" + "remarks": "rule_set_166" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server Configuration Files", - "remarks": "rule_set_169" + "remarks": "rule_set_166" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_drop_in_config", - "remarks": "rule_set_170" + "remarks": "rule_set_167" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server Configuration Files", - "remarks": "rule_set_170" + "remarks": "rule_set_167" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_private_key", - "remarks": "rule_set_171" + "remarks": "rule_set_168" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_171" + "remarks": "rule_set_168" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_private_key", - "remarks": "rule_set_172" + "remarks": "rule_set_169" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_172" + "remarks": "rule_set_169" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_private_key", - "remarks": "rule_set_173" + "remarks": "rule_set_170" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Private *_key Key Files", - "remarks": "rule_set_173" + "remarks": "rule_set_170" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_pub_key", - "remarks": "rule_set_174" + "remarks": "rule_set_171" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_174" + "remarks": "rule_set_171" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_pub_key", - "remarks": "rule_set_175" + "remarks": "rule_set_172" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_175" + "remarks": "rule_set_172" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_pub_key", - "remarks": "rule_set_176" + "remarks": "rule_set_173" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Public *.pub Key Files", - "remarks": "rule_set_176" + "remarks": "rule_set_173" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_limit_user_access", - "remarks": "rule_set_177" + "remarks": "rule_set_174" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Users' SSH Access", - "remarks": "rule_set_177" + "remarks": "rule_set_174" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_warning_banner_net", - "remarks": "rule_set_178" + "remarks": "rule_set_175" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable SSH Warning Banner", - "remarks": "rule_set_178" + "remarks": "rule_set_175" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_idle_timeout", - "remarks": "rule_set_179" + "remarks": "rule_set_176" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Interval", - "remarks": "rule_set_179" + "remarks": "rule_set_176" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_keepalive", - "remarks": "rule_set_180" + "remarks": "rule_set_177" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Count Max", - "remarks": "rule_set_180" + "remarks": "rule_set_177" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_forwarding", - "remarks": "rule_set_181" + "remarks": "rule_set_178" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Forwarding", - "remarks": "rule_set_181" + "remarks": "rule_set_178" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_gssapi_auth", - "remarks": "rule_set_182" + "remarks": "rule_set_179" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GSSAPI Authentication", - "remarks": "rule_set_182" + "remarks": "rule_set_179" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_host_auth", - "remarks": "rule_set_183" + "remarks": "rule_set_180" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Host-Based Authentication", - "remarks": "rule_set_183" + "remarks": "rule_set_180" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_rhosts", - "remarks": "rule_set_184" + "remarks": "rule_set_181" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Support for .rhosts Files", - "remarks": "rule_set_184" + "remarks": "rule_set_181" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_use_strong_kex", - "remarks": "rule_set_185" + "remarks": "rule_set_182" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Use Only Strong Key Exchange algorithms", - "remarks": "rule_set_185" + "remarks": "rule_set_182" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_login_grace_time", - "remarks": "rule_set_186" + "remarks": "rule_set_183" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SSH LoginGraceTime is configured", - "remarks": "rule_set_186" + "remarks": "rule_set_183" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_loglevel_verbose", - "remarks": "rule_set_187" + "remarks": "rule_set_184" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Daemon LogLevel to VERBOSE", - "remarks": "rule_set_187" + "remarks": "rule_set_184" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_auth_tries", - "remarks": "rule_set_188" + "remarks": "rule_set_185" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH authentication attempt limit", - "remarks": "rule_set_188" + "remarks": "rule_set_185" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_maxstartups", - "remarks": "rule_set_189" + "remarks": "rule_set_186" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SSH MaxStartups is configured", - "remarks": "rule_set_189" + "remarks": "rule_set_186" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_sessions", - "remarks": "rule_set_190" + "remarks": "rule_set_187" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH MaxSessions limit", - "remarks": "rule_set_190" + "remarks": "rule_set_187" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_empty_passwords", - "remarks": "rule_set_191" + "remarks": "rule_set_188" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Access via Empty Passwords", - "remarks": "rule_set_191" + "remarks": "rule_set_188" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_root_login", - "remarks": "rule_set_192" + "remarks": "rule_set_189" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Root Login", - "remarks": "rule_set_192" + "remarks": "rule_set_189" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_do_not_permit_user_env", - "remarks": "rule_set_193" + "remarks": "rule_set_190" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Do Not Allow SSH Environment Options", - "remarks": "rule_set_193" + "remarks": "rule_set_190" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_pam", - "remarks": "rule_set_194" + "remarks": "rule_set_191" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable PAM", - "remarks": "rule_set_194" + "remarks": "rule_set_191" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_sudo_installed", - "remarks": "rule_set_195" + "remarks": "rule_set_192" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install sudo Package", - "remarks": "rule_set_195" + "remarks": "rule_set_192" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_use_pty", - "remarks": "rule_set_196" + "remarks": "rule_set_193" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo use_pty", - "remarks": "rule_set_196" + "remarks": "rule_set_193" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_custom_logfile", - "remarks": "rule_set_197" + "remarks": "rule_set_194" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Sudo Logfile Exists - sudo logfile", - "remarks": "rule_set_197" + "remarks": "rule_set_194" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_no_authenticate", - "remarks": "rule_set_198" + "remarks": "rule_set_195" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo !authenticate", - "remarks": "rule_set_198" + "remarks": "rule_set_195" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_require_reauthentication", - "remarks": "rule_set_199" + "remarks": "rule_set_196" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require Re-Authentication When Using the sudo Command", - "remarks": "rule_set_199" + "remarks": "rule_set_196" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "use_pam_wheel_group_for_su", - "remarks": "rule_set_200" + "remarks": "rule_set_197" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Usage of pam_wheel with Group Parameter for su Authentication", - "remarks": "rule_set_200" + "remarks": "rule_set_197" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_pam_wheel_group_empty", - "remarks": "rule_set_201" + "remarks": "rule_set_198" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Group Used by pam_wheel.so Module Exists on System and is Empty", - "remarks": "rule_set_201" + "remarks": "rule_set_198" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_password_pam_faillock_password_auth", - "remarks": "rule_set_202" + "remarks": "rule_set_199" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/password-auth File.", - "remarks": "rule_set_202" + "remarks": "rule_set_199" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_password_pam_faillock_system_auth", - "remarks": "rule_set_203" + "remarks": "rule_set_200" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/system-auth File.", - "remarks": "rule_set_203" + "remarks": "rule_set_200" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_pam_pwquality_installed", - "remarks": "rule_set_204" + "remarks": "rule_set_201" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install pam_pwquality Package", - "remarks": "rule_set_204" + "remarks": "rule_set_201" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwquality_password_auth", - "remarks": "rule_set_205" + "remarks": "rule_set_202" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM password complexity module is enabled in password-auth", - "remarks": "rule_set_205" + "remarks": "rule_set_202" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwquality_system_auth", - "remarks": "rule_set_206" + "remarks": "rule_set_203" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM password complexity module is enabled in system-auth", - "remarks": "rule_set_206" + "remarks": "rule_set_203" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_enabled", - "remarks": "rule_set_207" + "remarks": "rule_set_204" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify pam_unix module is activated", - "remarks": "rule_set_207" + "remarks": "rule_set_204" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny", - "remarks": "rule_set_208" + "remarks": "rule_set_205" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Lock Accounts After Failed Password Attempts", - "remarks": "rule_set_208" + "remarks": "rule_set_205" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_unlock_time_with_zero", - "remarks": "rule_set_209" + "remarks": "rule_set_206" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Lockout Time for Failed Password Attempts", - "remarks": "rule_set_209" + "remarks": "rule_set_206" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_difok", - "remarks": "rule_set_210" + "remarks": "rule_set_207" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Characters", - "remarks": "rule_set_210" + "remarks": "rule_set_207" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minlen", - "remarks": "rule_set_211" + "remarks": "rule_set_208" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Length", - "remarks": "rule_set_211" + "remarks": "rule_set_208" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minclass", - "remarks": "rule_set_212" + "remarks": "rule_set_209" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", - "remarks": "rule_set_212" + "remarks": "rule_set_209" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_maxrepeat", - "remarks": "rule_set_213" + "remarks": "rule_set_210" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Consecutive Repeating Characters", - "remarks": "rule_set_213" + "remarks": "rule_set_210" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_maxsequence", - "remarks": "rule_set_214" + "remarks": "rule_set_211" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit the maximum number of sequential characters in passwords", - "remarks": "rule_set_214" + "remarks": "rule_set_211" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_dictcheck", - "remarks": "rule_set_215" + "remarks": "rule_set_212" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Prevent the Use of Dictionary Words", - "remarks": "rule_set_215" + "remarks": "rule_set_212" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_enforce_root", - "remarks": "rule_set_216" + "remarks": "rule_set_213" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Enforce for root User", - "remarks": "rule_set_216" + "remarks": "rule_set_213" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_password_auth", - "remarks": "rule_set_217" + "remarks": "rule_set_214" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: password-auth", - "remarks": "rule_set_217" + "remarks": "rule_set_214" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_system_auth", - "remarks": "rule_set_218" + "remarks": "rule_set_215" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: system-auth", - "remarks": "rule_set_218" + "remarks": "rule_set_215" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_enforce_for_root", - "remarks": "rule_set_219" + "remarks": "rule_set_216" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Password History Is Enforced for the Root User", - "remarks": "rule_set_219" + "remarks": "rule_set_216" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_use_authtok", - "remarks": "rule_set_220" + "remarks": "rule_set_217" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Password History with use_authtok", - "remarks": "rule_set_220" + "remarks": "rule_set_217" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords", - "remarks": "rule_set_221" + "remarks": "rule_set_218" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent Login to Accounts With Empty Password", - "remarks": "rule_set_221" + "remarks": "rule_set_218" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_no_remember", - "remarks": "rule_set_222" + "remarks": "rule_set_219" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Avoid using remember in pam_unix module", - "remarks": "rule_set_222" + "remarks": "rule_set_219" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_systemauth", - "remarks": "rule_set_223" + "remarks": "rule_set_220" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - system-auth", - "remarks": "rule_set_223" + "remarks": "rule_set_220" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_passwordauth", - "remarks": "rule_set_224" + "remarks": "rule_set_221" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - password-auth", - "remarks": "rule_set_224" + "remarks": "rule_set_221" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_authtok", - "remarks": "rule_set_225" + "remarks": "rule_set_222" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require use_authtok for pam_unix.so", - "remarks": "rule_set_225" + "remarks": "rule_set_222" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_maximum_age_login_defs", - "remarks": "rule_set_226" + "remarks": "rule_set_223" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Age", - "remarks": "rule_set_226" + "remarks": "rule_set_223" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_max_life_existing", - "remarks": "rule_set_227" + "remarks": "rule_set_224" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Maximum Age", - "remarks": "rule_set_227" + "remarks": "rule_set_224" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_warn_age_login_defs", - "remarks": "rule_set_228" + "remarks": "rule_set_225" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Warning Age", - "remarks": "rule_set_228" + "remarks": "rule_set_225" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_warn_age_existing", - "remarks": "rule_set_229" + "remarks": "rule_set_226" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Warning Age", - "remarks": "rule_set_229" + "remarks": "rule_set_226" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_libuserconf", - "remarks": "rule_set_230" + "remarks": "rule_set_227" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/libuser.conf", - "remarks": "rule_set_230" + "remarks": "rule_set_227" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_logindefs", - "remarks": "rule_set_231" + "remarks": "rule_set_228" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/login.defs", - "remarks": "rule_set_231" + "remarks": "rule_set_228" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_disable_post_pw_expiration", - "remarks": "rule_set_232" + "remarks": "rule_set_229" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Account Expiration Following Inactivity", - "remarks": "rule_set_232" + "remarks": "rule_set_229" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_set_post_pw_existing", - "remarks": "rule_set_233" + "remarks": "rule_set_230" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set existing passwords a period of inactivity before they been locked", - "remarks": "rule_set_233" + "remarks": "rule_set_230" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_last_change_is_in_past", - "remarks": "rule_set_234" + "remarks": "rule_set_231" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure all users last password change date is in the past", - "remarks": "rule_set_234" + "remarks": "rule_set_231" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_no_uid_except_zero", - "remarks": "rule_set_235" + "remarks": "rule_set_232" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Root Has UID 0", - "remarks": "rule_set_235" + "remarks": "rule_set_232" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_gid_zero", - "remarks": "rule_set_236" + "remarks": "rule_set_233" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Root Has A Primary GID 0", - "remarks": "rule_set_236" + "remarks": "rule_set_233" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "groups_no_zero_gid_except_root", - "remarks": "rule_set_237" + "remarks": "rule_set_234" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Group Root Has GID 0", - "remarks": "rule_set_237" + "remarks": "rule_set_234" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_root_password_configured", - "remarks": "rule_set_238" + "remarks": "rule_set_235" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Authentication Required for Single User Mode", - "remarks": "rule_set_238" + "remarks": "rule_set_235" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_path_dirs_no_write", - "remarks": "rule_set_239" + "remarks": "rule_set_236" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include World or Group-Writable Directories", - "remarks": "rule_set_239" + "remarks": "rule_set_236" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "root_path_no_dot", - "remarks": "rule_set_240" + "remarks": "rule_set_237" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include Relative Paths or Null Directories", - "remarks": "rule_set_240" + "remarks": "rule_set_237" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_root", - "remarks": "rule_set_241" + "remarks": "rule_set_238" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Root Bash Umask is Set Correctly", - "remarks": "rule_set_241" + "remarks": "rule_set_238" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_password_auth_for_systemaccounts", - "remarks": "rule_set_242" + "remarks": "rule_set_239" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Are Locked", - "remarks": "rule_set_242" + "remarks": "rule_set_239" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_shelllogin_for_systemaccounts", - "remarks": "rule_set_243" + "remarks": "rule_set_240" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", - "remarks": "rule_set_243" + "remarks": "rule_set_240" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_invalid_shell_accounts_unlocked", - "remarks": "rule_set_244" + "remarks": "rule_set_241" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Non-Interactive Accounts Are Locked", - "remarks": "rule_set_244" + "remarks": "rule_set_241" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_tmout", - "remarks": "rule_set_245" + "remarks": "rule_set_242" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Interactive Session Timeout", - "remarks": "rule_set_245" + "remarks": "rule_set_242" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_bashrc", - "remarks": "rule_set_246" + "remarks": "rule_set_243" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Bash Umask is Set Correctly", - "remarks": "rule_set_246" + "remarks": "rule_set_243" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_login_defs", - "remarks": "rule_set_247" + "remarks": "rule_set_244" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in login.defs", - "remarks": "rule_set_247" + "remarks": "rule_set_244" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_profile", - "remarks": "rule_set_248" + "remarks": "rule_set_245" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in /etc/profile", - "remarks": "rule_set_248" + "remarks": "rule_set_245" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_249" + "remarks": "rule_set_246" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_249" + "remarks": "rule_set_246" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_build_database", - "remarks": "rule_set_250" + "remarks": "rule_set_247" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Build and Test AIDE Database", - "remarks": "rule_set_250" + "remarks": "rule_set_247" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_periodic_cron_checking", - "remarks": "rule_set_251" + "remarks": "rule_set_248" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Periodic Execution of AIDE", - "remarks": "rule_set_251" + "remarks": "rule_set_248" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_check_audit_tools", - "remarks": "rule_set_252" + "remarks": "rule_set_249" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure AIDE to Verify the Audit Tools", - "remarks": "rule_set_252" + "remarks": "rule_set_249" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journald_enabled", - "remarks": "rule_set_253" + "remarks": "rule_set_250" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journald Service", - "remarks": "rule_set_253" + "remarks": "rule_set_250" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_journald_and_rsyslog_not_active_together", - "remarks": "rule_set_254" + "remarks": "rule_set_251" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald and rsyslog Are Not Active Together", - "remarks": "rule_set_254" + "remarks": "rule_set_251" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_systemd-journal-remote_installed", - "remarks": "rule_set_255" + "remarks": "rule_set_252" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install systemd-journal-remote Package", - "remarks": "rule_set_255" + "remarks": "rule_set_252" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journal-upload_enabled", - "remarks": "rule_set_256" + "remarks": "rule_set_253" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journal-upload Service", - "remarks": "rule_set_256" + "remarks": "rule_set_253" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "socket_systemd-journal-remote_disabled", - "remarks": "rule_set_257" + "remarks": "rule_set_254" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable systemd-journal-remote Socket", - "remarks": "rule_set_257" + "remarks": "rule_set_254" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_disable_forward_to_syslog", - "remarks": "rule_set_258" + "remarks": "rule_set_255" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald ForwardToSyslog is disabled", - "remarks": "rule_set_258" + "remarks": "rule_set_255" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_compress", - "remarks": "rule_set_259" + "remarks": "rule_set_256" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to compress large log files", - "remarks": "rule_set_259" + "remarks": "rule_set_256" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_storage", - "remarks": "rule_set_260" + "remarks": "rule_set_257" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to write log files to persistent disk", - "remarks": "rule_set_260" + "remarks": "rule_set_257" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_261" + "remarks": "rule_set_258" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_261" + "remarks": "rule_set_258" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_262" + "remarks": "rule_set_259" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_262" + "remarks": "rule_set_259" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_263" + "remarks": "rule_set_260" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_263" + "remarks": "rule_set_260" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_passwd", - "remarks": "rule_set_264" + "remarks": "rule_set_261" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns passwd File", - "remarks": "rule_set_264" + "remarks": "rule_set_261" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_passwd", - "remarks": "rule_set_265" + "remarks": "rule_set_262" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns passwd File", - "remarks": "rule_set_265" + "remarks": "rule_set_262" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_passwd", - "remarks": "rule_set_266" + "remarks": "rule_set_263" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on passwd File", - "remarks": "rule_set_266" + "remarks": "rule_set_263" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_passwd", - "remarks": "rule_set_267" + "remarks": "rule_set_264" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup passwd File", - "remarks": "rule_set_267" + "remarks": "rule_set_264" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_passwd", - "remarks": "rule_set_268" + "remarks": "rule_set_265" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup passwd File", - "remarks": "rule_set_268" + "remarks": "rule_set_265" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_passwd", - "remarks": "rule_set_269" + "remarks": "rule_set_266" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup passwd File", - "remarks": "rule_set_269" + "remarks": "rule_set_266" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_group", - "remarks": "rule_set_270" + "remarks": "rule_set_267" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns group File", - "remarks": "rule_set_270" + "remarks": "rule_set_267" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_group", - "remarks": "rule_set_271" + "remarks": "rule_set_268" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns group File", - "remarks": "rule_set_271" + "remarks": "rule_set_268" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_group", - "remarks": "rule_set_272" + "remarks": "rule_set_269" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on group File", - "remarks": "rule_set_272" + "remarks": "rule_set_269" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_group", - "remarks": "rule_set_273" + "remarks": "rule_set_270" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup group File", - "remarks": "rule_set_273" + "remarks": "rule_set_270" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_group", - "remarks": "rule_set_274" + "remarks": "rule_set_271" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup group File", - "remarks": "rule_set_274" + "remarks": "rule_set_271" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_group", - "remarks": "rule_set_275" + "remarks": "rule_set_272" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup group File", - "remarks": "rule_set_275" + "remarks": "rule_set_272" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shadow", - "remarks": "rule_set_276" + "remarks": "rule_set_273" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns shadow File", - "remarks": "rule_set_276" + "remarks": "rule_set_273" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shadow", - "remarks": "rule_set_277" + "remarks": "rule_set_274" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns shadow File", - "remarks": "rule_set_277" + "remarks": "rule_set_274" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shadow", - "remarks": "rule_set_278" + "remarks": "rule_set_275" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on shadow File", - "remarks": "rule_set_278" + "remarks": "rule_set_275" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_shadow", - "remarks": "rule_set_279" + "remarks": "rule_set_276" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup shadow File", - "remarks": "rule_set_279" + "remarks": "rule_set_276" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_shadow", - "remarks": "rule_set_280" + "remarks": "rule_set_277" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup shadow File", - "remarks": "rule_set_280" + "remarks": "rule_set_277" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_shadow", - "remarks": "rule_set_281" + "remarks": "rule_set_278" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup shadow File", - "remarks": "rule_set_281" + "remarks": "rule_set_278" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_gshadow", - "remarks": "rule_set_282" + "remarks": "rule_set_279" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns gshadow File", - "remarks": "rule_set_282" + "remarks": "rule_set_279" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_gshadow", - "remarks": "rule_set_283" + "remarks": "rule_set_280" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns gshadow File", - "remarks": "rule_set_283" + "remarks": "rule_set_280" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_gshadow", - "remarks": "rule_set_284" + "remarks": "rule_set_281" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on gshadow File", - "remarks": "rule_set_284" + "remarks": "rule_set_281" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_gshadow", - "remarks": "rule_set_285" + "remarks": "rule_set_282" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup gshadow File", - "remarks": "rule_set_285" + "remarks": "rule_set_282" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_gshadow", - "remarks": "rule_set_286" + "remarks": "rule_set_283" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup gshadow File", - "remarks": "rule_set_286" + "remarks": "rule_set_283" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_gshadow", - "remarks": "rule_set_287" + "remarks": "rule_set_284" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup gshadow File", - "remarks": "rule_set_287" + "remarks": "rule_set_284" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shells", - "remarks": "rule_set_288" + "remarks": "rule_set_285" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/shells File", - "remarks": "rule_set_288" + "remarks": "rule_set_285" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shells", - "remarks": "rule_set_289" + "remarks": "rule_set_286" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Who Owns /etc/shells File", - "remarks": "rule_set_289" + "remarks": "rule_set_286" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shells", - "remarks": "rule_set_290" + "remarks": "rule_set_287" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/shells File", - "remarks": "rule_set_290" + "remarks": "rule_set_287" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd", - "remarks": "rule_set_291" + "remarks": "rule_set_288" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd File", - "remarks": "rule_set_291" + "remarks": "rule_set_288" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd", - "remarks": "rule_set_292" + "remarks": "rule_set_289" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd File", - "remarks": "rule_set_292" + "remarks": "rule_set_289" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd", - "remarks": "rule_set_293" + "remarks": "rule_set_290" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd File", - "remarks": "rule_set_293" + "remarks": "rule_set_290" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd_old", - "remarks": "rule_set_294" + "remarks": "rule_set_291" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_294" + "remarks": "rule_set_291" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd_old", - "remarks": "rule_set_295" + "remarks": "rule_set_292" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_295" + "remarks": "rule_set_292" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd_old", - "remarks": "rule_set_296" + "remarks": "rule_set_293" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd.old File", - "remarks": "rule_set_296" + "remarks": "rule_set_293" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_297" + "remarks": "rule_set_294" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_297" + "remarks": "rule_set_294" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_298" + "remarks": "rule_set_295" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_298" + "remarks": "rule_set_295" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_unowned_by_user", - "remarks": "rule_set_299" + "remarks": "rule_set_296" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a User", - "remarks": "rule_set_299" + "remarks": "rule_set_296" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_ungroupowned", - "remarks": "rule_set_300" + "remarks": "rule_set_297" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a Group", - "remarks": "rule_set_300" + "remarks": "rule_set_297" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_all_shadowed", - "remarks": "rule_set_301" + "remarks": "rule_set_298" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify All Account Password Hashes are Shadowed", - "remarks": "rule_set_301" + "remarks": "rule_set_298" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords_etc_shadow", - "remarks": "rule_set_302" + "remarks": "rule_set_299" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure There Are No Accounts With Blank or Null Passwords", - "remarks": "rule_set_302" + "remarks": "rule_set_299" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gid_passwd_group_same", - "remarks": "rule_set_303" + "remarks": "rule_set_300" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", - "remarks": "rule_set_303" + "remarks": "rule_set_300" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_id", - "remarks": "rule_set_304" + "remarks": "rule_set_301" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique User IDs", - "remarks": "rule_set_304" + "remarks": "rule_set_301" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_id", - "remarks": "rule_set_305" + "remarks": "rule_set_302" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group ID", - "remarks": "rule_set_305" + "remarks": "rule_set_302" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_name", - "remarks": "rule_set_306" + "remarks": "rule_set_303" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique Names", - "remarks": "rule_set_306" + "remarks": "rule_set_303" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_name", - "remarks": "rule_set_307" + "remarks": "rule_set_304" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group Names", - "remarks": "rule_set_307" + "remarks": "rule_set_304" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_interactive_home_directory_exists", - "remarks": "rule_set_308" + "remarks": "rule_set_305" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive Users Home Directories Must Exist", - "remarks": "rule_set_308" + "remarks": "rule_set_305" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_home_directories", - "remarks": "rule_set_309" + "remarks": "rule_set_306" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Be Owned By The Primary User", - "remarks": "rule_set_309" + "remarks": "rule_set_306" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_home_directories", - "remarks": "rule_set_310" + "remarks": "rule_set_307" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", - "remarks": "rule_set_310" + "remarks": "rule_set_307" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_311" + "remarks": "rule_set_308" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_311" + "remarks": "rule_set_308" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_312" + "remarks": "rule_set_309" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_312" + "remarks": "rule_set_309" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_no_world_writable_programs", - "remarks": "rule_set_313" + "remarks": "rule_set_310" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Not Run World-Writable Programs", - "remarks": "rule_set_313" + "remarks": "rule_set_310" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_314" + "remarks": "rule_set_311" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_314" + "remarks": "rule_set_311" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_forward_files", - "remarks": "rule_set_315" + "remarks": "rule_set_312" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .forward Files Exist", - "remarks": "rule_set_315" + "remarks": "rule_set_312" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_netrc_files", - "remarks": "rule_set_316" + "remarks": "rule_set_313" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No netrc Files Exist", - "remarks": "rule_set_316" + "remarks": "rule_set_313" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rhost_files", - "remarks": "rule_set_317" + "remarks": "rule_set_314" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .rhost Files Exist", - "remarks": "rule_set_317" + "remarks": "rule_set_314" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_bash_history", - "remarks": "rule_set_318" + "remarks": "rule_set_315" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure User Bash History File Has Correct Permissions", - "remarks": "rule_set_318" + "remarks": "rule_set_315" } ], "control-implementations": [ { - "uuid": "8a73e529-8e5f-4a3e-9c35-1d17d5f9d5c4", + "uuid": "5a765db4-82e7-4ddc-bb2e-d1d95d55886f", "source": "trestle://profiles/rhel10-cis_rhel10-l1_workstation/profile.json", "description": "Control implementation for cis_workstation_l1", "props": [ @@ -5227,7 +5191,7 @@ ], "implemented-requirements": [ { - "uuid": "d581c60c-8dd4-4935-afe6-f7893d38e7f1", + "uuid": "c760fec0-d681-4b6c-8d82-b207651c5fe8", "control-id": "reload_dconf_db", "description": "This is a helper rule to reload Dconf database correctly.", "props": [ @@ -5244,7 +5208,7 @@ ] }, { - "uuid": "90638108-e22d-4323-b363-3391b8556dde", + "uuid": "9ed6436f-b782-466b-bd9c-0be53df2bd54", "control-id": "cis_rhel10_1-1.1.1", "description": "No notes for control-id 1.1.1.1.", "props": [ @@ -5261,7 +5225,7 @@ ] }, { - "uuid": "78cc5eca-6fb6-4b31-98bd-c13192a2c16e", + "uuid": "2db5931f-fbd6-4228-b893-7e2c0c2ed35b", "control-id": "cis_rhel10_1-1.1.2", "description": "No notes for control-id 1.1.1.2.", "props": [ @@ -5278,7 +5242,7 @@ ] }, { - "uuid": "7531136d-0afd-40ba-acc4-a8900d069768", + "uuid": "89f2c746-0f33-44d6-a6fb-025c61595366", "control-id": "cis_rhel10_1-1.1.3", "description": "No notes for control-id 1.1.1.3.", "props": [ @@ -5295,7 +5259,7 @@ ] }, { - "uuid": "cdf240af-2b89-4606-a44f-b1a71bda4dd0", + "uuid": "5e20083f-34de-4a50-a9f6-c6d71a138547", "control-id": "cis_rhel10_1-1.1.4", "description": "No notes for control-id 1.1.1.4.", "props": [ @@ -5312,7 +5276,7 @@ ] }, { - "uuid": "406780c0-6977-457b-a93e-cffeed0b6df6", + "uuid": "5620132e-9d45-42ee-904b-78fc3a28a27c", "control-id": "cis_rhel10_1-1.1.5", "description": "No notes for control-id 1.1.1.5.", "props": [ @@ -5329,7 +5293,7 @@ ] }, { - "uuid": "693c6e6d-c4ea-4c91-bf74-faedcf14f3ee", + "uuid": "10cb795f-02d3-48e2-a66f-0fd141d90239", "control-id": "cis_rhel10_1-1.1.11", "description": "The description for control-id cis_rhel10_1-1.1.11.", "props": [ @@ -5342,7 +5306,7 @@ ] }, { - "uuid": "d64e85c0-9ffe-42b7-95ca-b2808ed875b1", + "uuid": "2bfb9afd-73cc-4eab-9fc3-9046d1cbd5e4", "control-id": "cis_rhel10_1-1.2.1.1", "description": "No notes for control-id 1.1.2.1.1.", "props": [ @@ -5359,7 +5323,7 @@ ] }, { - "uuid": "304fbd92-fabf-4f99-8b35-9014727b8621", + "uuid": "527fecab-7dee-44ab-931a-883c559ab09c", "control-id": "cis_rhel10_1-1.2.1.2", "description": "No notes for control-id 1.1.2.1.2.", "props": [ @@ -5376,7 +5340,7 @@ ] }, { - "uuid": "7a610424-83b2-4999-8e93-7b6c16dede90", + "uuid": "48ba7630-29aa-464d-b18d-a479dc51e303", "control-id": "cis_rhel10_1-1.2.1.3", "description": "No notes for control-id 1.1.2.1.3.", "props": [ @@ -5393,7 +5357,7 @@ ] }, { - "uuid": "269e88f4-957d-46e8-9d69-1f9102053217", + "uuid": "8aa5ba16-a36a-4906-a792-adcd9d3f9c37", "control-id": "cis_rhel10_1-1.2.1.4", "description": "No notes for control-id 1.1.2.1.4.", "props": [ @@ -5410,7 +5374,7 @@ ] }, { - "uuid": "1ab5f0af-9214-4d26-a642-41dd75f1c8af", + "uuid": "f5622b98-8c2d-4c7d-9aff-303564541cb9", "control-id": "cis_rhel10_1-1.2.2.1", "description": "No notes for control-id 1.1.2.2.1.", "props": [ @@ -5427,7 +5391,7 @@ ] }, { - "uuid": "67f87276-e182-4e93-8e5a-3e0df1727ae9", + "uuid": "0769d9ac-f214-4358-80bd-528ef425589d", "control-id": "cis_rhel10_1-1.2.2.2", "description": "No notes for control-id 1.1.2.2.2.", "props": [ @@ -5444,7 +5408,7 @@ ] }, { - "uuid": "dd73728c-83d6-4d23-88e7-5bfa208fb637", + "uuid": "cead1752-2070-458a-bb42-80cb1ebe2e04", "control-id": "cis_rhel10_1-1.2.2.3", "description": "No notes for control-id 1.1.2.2.3.", "props": [ @@ -5461,7 +5425,7 @@ ] }, { - "uuid": "27e0a313-06d7-4974-9e0b-95dde1abcb7b", + "uuid": "80489b89-ab26-4fbd-bf32-eebc9d1e9998", "control-id": "cis_rhel10_1-1.2.2.4", "description": "No notes for control-id 1.1.2.2.4.", "props": [ @@ -5478,7 +5442,7 @@ ] }, { - "uuid": "cb0ef65f-37f4-4d51-9971-6d892d74c8ec", + "uuid": "73e0ec4e-6a82-4496-9386-f74347bdaf96", "control-id": "cis_rhel10_1-1.2.3.2", "description": "No notes for control-id 1.1.2.3.2.", "props": [ @@ -5495,7 +5459,7 @@ ] }, { - "uuid": "25046abe-ac95-4ddd-9422-2e9a52427abd", + "uuid": "90cb9c1c-a3e5-4fea-8df7-713f81932322", "control-id": "cis_rhel10_1-1.2.3.3", "description": "No notes for control-id 1.1.2.3.3.", "props": [ @@ -5512,7 +5476,7 @@ ] }, { - "uuid": "04818636-51bf-40c5-a9ca-278d12f6cf95", + "uuid": "c10b0ff7-4d66-4cb9-b4a1-ef9451599966", "control-id": "cis_rhel10_1-1.2.4.2", "description": "No notes for control-id 1.1.2.4.2.", "props": [ @@ -5529,7 +5493,7 @@ ] }, { - "uuid": "8d04e229-25f8-44b9-b0d8-db1d88ccd4a4", + "uuid": "65d8c72e-3a36-4320-96dd-137d02f56937", "control-id": "cis_rhel10_1-1.2.4.3", "description": "No notes for control-id 1.1.2.4.3.", "props": [ @@ -5546,7 +5510,7 @@ ] }, { - "uuid": "f6f94be3-ece0-487a-827d-0bad0dfee281", + "uuid": "008e798c-c63d-490f-90f1-c1d51de3ca20", "control-id": "cis_rhel10_1-1.2.5.2", "description": "No notes for control-id 1.1.2.5.2.", "props": [ @@ -5563,7 +5527,7 @@ ] }, { - "uuid": "36c1c084-c576-43c3-a5ec-2a973baf689f", + "uuid": "f14563a3-45f1-4af7-947a-a85a885258d1", "control-id": "cis_rhel10_1-1.2.5.3", "description": "No notes for control-id 1.1.2.5.3.", "props": [ @@ -5580,7 +5544,7 @@ ] }, { - "uuid": "8c5e72bd-e426-4381-a1d3-85732c532439", + "uuid": "29da86f8-b2bc-4e6b-8929-b38bd7378028", "control-id": "cis_rhel10_1-1.2.5.4", "description": "No notes for control-id 1.1.2.5.4.", "props": [ @@ -5597,7 +5561,7 @@ ] }, { - "uuid": "75708904-e051-407f-a8e1-26940649dd95", + "uuid": "28c6ee1e-2cba-448c-bb99-f8ca552ea92e", "control-id": "cis_rhel10_1-1.2.6.2", "description": "No notes for control-id 1.1.2.6.2.", "props": [ @@ -5614,7 +5578,7 @@ ] }, { - "uuid": "45b1eaff-72c6-46b8-8e87-7514250c85a2", + "uuid": "79fb21aa-df8d-4cdf-821b-c9595b802b34", "control-id": "cis_rhel10_1-1.2.6.3", "description": "No notes for control-id 1.1.2.6.3.", "props": [ @@ -5631,7 +5595,7 @@ ] }, { - "uuid": "e00b3981-18d6-41e5-b478-f4d6167489f5", + "uuid": "894b0cae-843d-47e9-90b4-8cd94aeb273b", "control-id": "cis_rhel10_1-1.2.6.4", "description": "No notes for control-id 1.1.2.6.4.", "props": [ @@ -5648,7 +5612,7 @@ ] }, { - "uuid": "04831c9f-898a-495e-84d5-f0313068640f", + "uuid": "0ee82deb-e281-4b38-9917-66012ee7f1d2", "control-id": "cis_rhel10_1-1.2.7.2", "description": "No notes for control-id 1.1.2.7.2.", "props": [ @@ -5665,7 +5629,7 @@ ] }, { - "uuid": "efa5bec0-8c80-4c03-b28b-27009a9dfdfc", + "uuid": "58209cd7-060c-4ac4-82da-f3b7d8ab9e4e", "control-id": "cis_rhel10_1-1.2.7.3", "description": "No notes for control-id 1.1.2.7.3.", "props": [ @@ -5682,7 +5646,7 @@ ] }, { - "uuid": "f86a01e9-c0a9-4e65-8bc2-f086495b653e", + "uuid": "50ab3e4a-b0ab-4af3-bb40-2db93f23ea64", "control-id": "cis_rhel10_1-1.2.7.4", "description": "No notes for control-id 1.1.2.7.4.", "props": [ @@ -5699,7 +5663,7 @@ ] }, { - "uuid": "31991028-084d-42ee-9389-2f0b31d5125a", + "uuid": "d458c0ad-d385-4caf-95b9-337459eadd73", "control-id": "cis_rhel10_1-2.1.1", "description": "The description for control-id cis_rhel10_1-2.1.1.", "props": [ @@ -5712,7 +5676,7 @@ ] }, { - "uuid": "14fc8dcb-dcc9-4410-b4bd-f3d1204e035c", + "uuid": "c77d0645-dc33-4a9f-b7dc-f0e4a67d9bbf", "control-id": "cis_rhel10_1-2.1.2", "description": "No notes for control-id 1.2.1.2.", "props": [ @@ -5729,7 +5693,7 @@ ] }, { - "uuid": "9e57e201-3674-413d-a6dd-e68e97626149", + "uuid": "60f91bdd-df50-435b-8734-584eb1e35d98", "control-id": "cis_rhel10_1-2.1.4", "description": "The description for control-id cis_rhel10_1-2.1.4.", "props": [ @@ -5742,7 +5706,7 @@ ] }, { - "uuid": "c60a1394-1011-4726-8966-3fab0f8e2429", + "uuid": "8adfaec8-a077-4bfd-8e01-9d9653251235", "control-id": "cis_rhel10_1-2.2.1", "description": "The description for control-id cis_rhel10_1-2.2.1.", "props": [ @@ -5755,7 +5719,7 @@ ] }, { - "uuid": "93c1ae95-ddc3-4275-99ab-8b17e4c2af44", + "uuid": "09d996ae-51f4-4f1e-941c-a2a44cc67f94", "control-id": "cis_rhel10_1-3.1.1", "description": "No notes for control-id 1.3.1.1.", "props": [ @@ -5772,7 +5736,7 @@ ] }, { - "uuid": "52f672b3-5aed-430b-a5b7-39fc435eeb05", + "uuid": "ba7f0101-cbe3-4845-b404-921b86340e4c", "control-id": "cis_rhel10_1-3.1.2", "description": "No notes for control-id 1.3.1.2.", "props": [ @@ -5789,7 +5753,7 @@ ] }, { - "uuid": "5329f59d-e2d5-4d79-abc4-1f3b5f8cd448", + "uuid": "0c2e7294-8281-4751-9170-75d8b448a932", "control-id": "cis_rhel10_1-3.1.3", "description": "No notes for control-id 1.3.1.3.", "props": [ @@ -5806,7 +5770,7 @@ ] }, { - "uuid": "817f32b6-5aab-4cb1-b86c-5c8b768cc26e", + "uuid": "7eb36cef-af9e-4d03-afbe-0d5d39b36a91", "control-id": "cis_rhel10_1-3.1.4", "description": "No notes for control-id 1.3.1.4.", "props": [ @@ -5823,7 +5787,7 @@ ] }, { - "uuid": "4483dae8-b676-4bc3-bf48-801c8e36e920", + "uuid": "76a12724-62ed-4e64-b8d9-4b2d682ff420", "control-id": "cis_rhel10_1-3.1.7", "description": "No notes for control-id 1.3.1.7.", "props": [ @@ -5840,7 +5804,7 @@ ] }, { - "uuid": "d73b86f2-fb15-4a18-bed1-037f1385efbe", + "uuid": "5515b10b-0b7c-47ce-be3f-da36feb78775", "control-id": "cis_rhel10_1-4.1", "description": "There is no automated remediation for this rule and this is intentional.\nMore details in the rule description.", "props": [ @@ -5852,55 +5816,39 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_password" - } - ] - }, - { - "uuid": "34bb3127-4cc7-41f4-bece-7b99e2126a6d", - "control-id": "cis_rhel10_1-4.2", - "description": "The description for control-id cis_rhel10_1-4.2.", - "props": [ - { - "name": "implementation-status", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "alternative", - "remarks": "This requirement demands a deeper review of the rules." - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_grub2_cfg" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_grub2_cfg" - }, + "value": "grub2_password" + } + ] + }, + { + "uuid": "240cfd85-496a-476b-8e42-2f8ab377b0d1", + "control-id": "cis_rhel10_1-4.2", + "description": "This requirement demands a deeper review of the rules.", + "props": [ { - "name": "Rule_Id", + "name": "implementation-status", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_grub2_cfg" + "value": "implemented" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_user_cfg" + "value": "file_permissions_boot_grub2" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_user_cfg" + "value": "file_owner_boot_grub2" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_user_cfg" + "value": "file_groupowner_boot_grub2" } ] }, { - "uuid": "ffc0288a-5a3e-455f-844f-1c156f9f44b6", + "uuid": "335254d3-4a73-47ea-9cc5-2a8e37f2e555", "control-id": "cis_rhel10_1-5.1", "description": "No notes for control-id 1.5.1.", "props": [ @@ -5917,7 +5865,7 @@ ] }, { - "uuid": "e8fb93cf-e187-4d1f-bde1-588a4025c2d0", + "uuid": "56bc9b04-b1bc-4550-b2d7-bffacb9f1649", "control-id": "cis_rhel10_1-5.2", "description": "No notes for control-id 1.5.2.", "props": [ @@ -5934,7 +5882,7 @@ ] }, { - "uuid": "e19477d7-7edd-4c44-9a70-c85add65e491", + "uuid": "4ea10553-a1ed-4ac5-a931-81d350ce5921", "control-id": "cis_rhel10_1-5.4", "description": "No notes for control-id 1.5.4.", "props": [ @@ -5951,7 +5899,7 @@ ] }, { - "uuid": "206f34e9-c382-4254-be95-f939d5387a6a", + "uuid": "b25361f4-1707-445b-b07f-2806eecef6a4", "control-id": "cis_rhel10_1-5.5", "description": "No notes for control-id 1.5.5.", "props": [ @@ -5968,7 +5916,7 @@ ] }, { - "uuid": "8b0b0958-f003-4cd9-95c1-507cfb4cabdd", + "uuid": "8fd5a661-d150-4449-b2d0-4249771bfb54", "control-id": "cis_rhel10_1-5.6", "description": "No notes for control-id 1.5.6.", "props": [ @@ -5985,7 +5933,7 @@ ] }, { - "uuid": "c655c172-06fd-42bc-8609-cae109ce3be3", + "uuid": "a81d32e2-7317-49f9-bbc7-b1a50a3ae612", "control-id": "cis_rhel10_1-5.7", "description": "No notes for control-id 1.5.7.", "props": [ @@ -6002,7 +5950,7 @@ ] }, { - "uuid": "d6f7a7a5-5f45-4c93-8697-da03d18cc818", + "uuid": "39076e5c-b03c-409d-9cf2-0fa55320c59a", "control-id": "cis_rhel10_1-5.8", "description": "Address Space Layout Randomization (ASLR)", "props": [ @@ -6019,7 +5967,7 @@ ] }, { - "uuid": "c0df9ede-00ac-4d5a-bd87-8641258bc10c", + "uuid": "fa14e101-ed45-4a68-8136-d2c7e1e31344", "control-id": "cis_rhel10_1-5.9", "description": "No notes for control-id 1.5.9.", "props": [ @@ -6036,7 +5984,7 @@ ] }, { - "uuid": "12b13939-93d0-410a-a99d-5c75038cbaf4", + "uuid": "0fafdb4b-1692-4777-98e0-1a13574d8371", "control-id": "cis_rhel10_1-5.10", "description": "No notes for control-id 1.5.10.", "props": [ @@ -6053,7 +6001,7 @@ ] }, { - "uuid": "91c54113-0144-4c36-873b-75bcf51c8ff1", + "uuid": "c21b3244-092e-4914-bd43-1116937878e6", "control-id": "cis_rhel10_1-6.1", "description": "No notes for control-id 1.6.1.", "props": [ @@ -6070,7 +6018,7 @@ ] }, { - "uuid": "66ba9585-6564-4260-95c0-ecb78f245dc2", + "uuid": "20f2ece5-1984-496f-bbea-78412eab19ea", "control-id": "cis_rhel10_1-6.2", "description": "No notes for control-id 1.6.2.", "props": [ @@ -6087,7 +6035,7 @@ ] }, { - "uuid": "d708f36b-a628-4071-82cc-badd0292e8e7", + "uuid": "08a5f775-94fd-497b-9bda-4ff5e3415945", "control-id": "cis_rhel10_1-6.3", "description": "No notes for control-id 1.6.3.", "props": [ @@ -6104,7 +6052,7 @@ ] }, { - "uuid": "905775c0-fd6b-44ba-ac12-5ec055008031", + "uuid": "ff4dd3f2-b88a-4f76-8f24-2127f17b943e", "control-id": "cis_rhel10_1-6.4", "description": "No notes for control-id 1.6.4.", "props": [ @@ -6121,7 +6069,7 @@ ] }, { - "uuid": "9d108f3c-8564-4e65-b566-f5f81e916083", + "uuid": "a56c78c7-5492-4709-b43a-fcd6c57b8130", "control-id": "cis_rhel10_1-7.1", "description": "No notes for control-id 1.7.1.", "props": [ @@ -6138,7 +6086,7 @@ ] }, { - "uuid": "982614be-2fd1-4de2-9b97-6878498c5423", + "uuid": "e29afa07-ea3a-4ce9-b174-9ef1a98551fd", "control-id": "cis_rhel10_1-7.2", "description": "No notes for control-id 1.7.2.", "props": [ @@ -6155,7 +6103,7 @@ ] }, { - "uuid": "c3d8362d-886c-40b0-9c1d-d3daa6ea2f9b", + "uuid": "47f7165c-7ec1-46f3-8448-62d921da8635", "control-id": "cis_rhel10_1-7.3", "description": "No notes for control-id 1.7.3.", "props": [ @@ -6172,7 +6120,7 @@ ] }, { - "uuid": "dd4a78b7-f2e7-4e3d-9ba4-81c446ea67d1", + "uuid": "ec6094f3-5767-4f4f-8764-c41e8778e3ea", "control-id": "cis_rhel10_1-7.4", "description": "No notes for control-id 1.7.4.", "props": [ @@ -6199,7 +6147,7 @@ ] }, { - "uuid": "ef896d3c-424d-4f8e-b020-db160fd708eb", + "uuid": "eedf800a-c95b-4097-b825-c7cfd4eaba23", "control-id": "cis_rhel10_1-7.5", "description": "No notes for control-id 1.7.5.", "props": [ @@ -6226,7 +6174,7 @@ ] }, { - "uuid": "b6ee4c54-bc45-4a11-a691-8f1d7e1d7590", + "uuid": "db413a7a-9047-4a1e-a13b-5e01c9d281fe", "control-id": "cis_rhel10_1-7.6", "description": "No notes for control-id 1.7.6.", "props": [ @@ -6253,7 +6201,7 @@ ] }, { - "uuid": "14d446f7-ed22-4de8-a32f-775f21c267b1", + "uuid": "d48c64cc-64c4-46c7-8f0c-2140172fc8b3", "control-id": "cis_rhel10_1-8.1", "description": "No notes for control-id 1.8.1.", "props": [ @@ -6275,7 +6223,7 @@ ] }, { - "uuid": "5d2955f2-e01c-49c5-814c-bdad0814424f", + "uuid": "c0c2047a-ae7d-49e7-a795-62b62ebc9235", "control-id": "cis_rhel10_1-8.2", "description": "No notes for control-id 1.8.2.", "props": [ @@ -6292,7 +6240,7 @@ ] }, { - "uuid": "d5492aea-6159-4eac-8c22-05d6b0c1ea53", + "uuid": "9e6cde23-82f7-4ce7-a491-edefba210ee3", "control-id": "cis_rhel10_1-8.3", "description": "No notes for control-id 1.8.3.", "props": [ @@ -6324,7 +6272,7 @@ ] }, { - "uuid": "330ffc64-77e5-496a-bbba-8e9f81773d88", + "uuid": "60abe28f-0bf7-4e65-ad01-fb7115a44088", "control-id": "cis_rhel10_1-8.5", "description": "No notes for control-id 1.8.5.", "props": [ @@ -6341,7 +6289,7 @@ ] }, { - "uuid": "ea212318-7145-4f19-b6fc-9a18d9cba6e0", + "uuid": "7ee5f706-373d-40f9-94c1-e63db319e5de", "control-id": "cis_rhel10_2-1.4", "description": "No notes for control-id 2.1.4.", "props": [ @@ -6358,7 +6306,7 @@ ] }, { - "uuid": "1e9d9f1c-073c-4cc0-9ac3-42bfecd7c29f", + "uuid": "772b0fd2-fbfe-4d4c-a3cd-0ac8d0965952", "control-id": "cis_rhel10_2-1.5", "description": "No notes for control-id 2.1.5.", "props": [ @@ -6375,7 +6323,7 @@ ] }, { - "uuid": "5b81d3aa-8aba-4555-ba5f-0b4ed684e2a0", + "uuid": "d72ea8ff-e47e-4785-8fa1-87d8b1e2b076", "control-id": "cis_rhel10_2-1.6", "description": "No notes for control-id 2.1.6.", "props": [ @@ -6392,7 +6340,7 @@ ] }, { - "uuid": "3c681b39-e6db-46d0-94fc-ec66f6c47880", + "uuid": "45d2ba70-2b58-41f1-a910-d028cb6f7df8", "control-id": "cis_rhel10_2-1.7", "description": "No notes for control-id 2.1.7.", "props": [ @@ -6409,7 +6357,7 @@ ] }, { - "uuid": "151f936b-06dc-4320-a0c2-32bc1af8b792", + "uuid": "d81862b0-bc52-44a3-a488-2cdb31085b57", "control-id": "cis_rhel10_2-1.8", "description": "No notes for control-id 2.1.8.", "props": [ @@ -6431,7 +6379,7 @@ ] }, { - "uuid": "f3480bd5-79c1-4cc6-ae12-002c257b728b", + "uuid": "71a7a28b-5743-4a81-9f70-763daae26821", "control-id": "cis_rhel10_2-1.9", "description": "Many of the libvirt packages used by Enterprise Linux virtualization are dependent on the\nnfs-utils package.", "props": [ @@ -6448,7 +6396,7 @@ ] }, { - "uuid": "87b7f04b-2f0c-4e3b-8371-1c0d090bc5b2", + "uuid": "ad758ddc-52ce-4a79-8937-107ab6ae9f24", "control-id": "cis_rhel10_2-1.11", "description": "Many of the libvirt packages used by Enterprise Linux virtualization, and the nfs-utils\npackage used for The Network File System (NFS), are dependent on the rpcbind package.", "props": [ @@ -6465,7 +6413,7 @@ ] }, { - "uuid": "0ae3a4c9-98ba-40ae-8135-85f9c0d69eea", + "uuid": "1fb28f7d-55ed-4ae8-89fe-98a99688c02d", "control-id": "cis_rhel10_2-1.12", "description": "No notes for control-id 2.1.12.", "props": [ @@ -6482,7 +6430,7 @@ ] }, { - "uuid": "85055e68-910e-4662-b94e-4c56a7b4aaaf", + "uuid": "1e06fca1-788a-4600-af3f-bbc560347e55", "control-id": "cis_rhel10_2-1.13", "description": "No notes for control-id 2.1.13.", "props": [ @@ -6499,7 +6447,7 @@ ] }, { - "uuid": "774be665-0b2d-44fd-99a1-15823c875d5c", + "uuid": "bf02a792-cc9c-4046-ab96-fae0938b0697", "control-id": "cis_rhel10_2-1.14", "description": "No notes for control-id 2.1.14.", "props": [ @@ -6516,7 +6464,7 @@ ] }, { - "uuid": "467a8508-8adc-4666-9798-7625fee39345", + "uuid": "c5186875-5609-47a6-9278-a6975b999cc0", "control-id": "cis_rhel10_2-1.15", "description": "No notes for control-id 2.1.15.", "props": [ @@ -6533,7 +6481,7 @@ ] }, { - "uuid": "ed569bf3-41d2-43c5-866e-a1897d5a8db0", + "uuid": "0427f7fa-8105-4b46-9da7-cc758b8192d2", "control-id": "cis_rhel10_2-1.16", "description": "No notes for control-id 2.1.16.", "props": [ @@ -6550,7 +6498,7 @@ ] }, { - "uuid": "0cfbb778-a2fe-4bc1-9a09-89df8426a22f", + "uuid": "5ea25a22-8da4-4668-b765-b3de2ccf6388", "control-id": "cis_rhel10_2-1.17", "description": "No notes for control-id 2.1.17.", "props": [ @@ -6567,7 +6515,7 @@ ] }, { - "uuid": "073c57b2-ed3e-45b3-9141-8ef9653eae45", + "uuid": "cbe18da4-3b1f-4f62-af35-791a47c3be1a", "control-id": "cis_rhel10_2-1.18", "description": "No notes for control-id 2.1.18.", "props": [ @@ -6589,7 +6537,7 @@ ] }, { - "uuid": "7782c003-1205-457b-acdd-eb412c0e2a64", + "uuid": "d684fbf4-67f4-4ffe-aa05-c7979d2cc07f", "control-id": "cis_rhel10_2-1.21", "description": "No notes for control-id 2.1.21.", "props": [ @@ -6611,7 +6559,7 @@ ] }, { - "uuid": "e0fce95f-5b0b-4c48-ad02-1bb02f330013", + "uuid": "a66d40a1-4f58-4fc0-84f6-d0f3a69e2c8a", "control-id": "cis_rhel10_2-1.22", "description": "The description for control-id cis_rhel10_2-1.22.", "props": [ @@ -6624,7 +6572,7 @@ ] }, { - "uuid": "a99e84b2-fd39-40bb-bde2-00e30fa3b268", + "uuid": "b67dabdf-afa3-45e9-a469-3d546d3520e6", "control-id": "cis_rhel10_2-2.1", "description": "No notes for control-id 2.2.1.", "props": [ @@ -6641,7 +6589,7 @@ ] }, { - "uuid": "e923807b-2eb2-4f65-a990-7d0f345c2f15", + "uuid": "49e79094-7dd5-4353-85de-b76fc40f2b3b", "control-id": "cis_rhel10_2-2.3", "description": "No notes for control-id 2.2.3.", "props": [ @@ -6658,7 +6606,7 @@ ] }, { - "uuid": "94956244-90bd-453b-b565-5353f5a9673d", + "uuid": "7d4363e7-9e9f-4fdd-a2ac-e689c824bd4a", "control-id": "cis_rhel10_2-2.4", "description": "No notes for control-id 2.2.4.", "props": [ @@ -6675,7 +6623,7 @@ ] }, { - "uuid": "075408c0-c5f0-495b-8468-8dd60a97fd30", + "uuid": "0ab85355-1282-496b-b5cf-1ce7f7fae105", "control-id": "cis_rhel10_2-3.1", "description": "No notes for control-id 2.3.1.", "props": [ @@ -6687,7 +6635,7 @@ ] }, { - "uuid": "240be254-2fbc-4c9a-8311-a10c063b3561", + "uuid": "ea90c118-52f1-45b4-a29d-fd2e44492a40", "control-id": "cis_rhel10_2-3.2", "description": "No notes for control-id 2.3.2.", "props": [ @@ -6704,7 +6652,7 @@ ] }, { - "uuid": "80efd1d3-b186-4bd5-997f-6842de55f53d", + "uuid": "d9e41fdb-21f6-43f4-a065-0ac2a0ee216f", "control-id": "cis_rhel10_2-3.3", "description": "No notes for control-id 2.3.3.", "props": [ @@ -6721,7 +6669,7 @@ ] }, { - "uuid": "8c2c6039-4d9f-4a10-8577-1e9cbb37b69e", + "uuid": "53bdf171-6d53-4d53-9794-77f8180d07e5", "control-id": "cis_rhel10_2-4.1.1", "description": "No notes for control-id 2.4.1.1.", "props": [ @@ -6743,7 +6691,7 @@ ] }, { - "uuid": "c4b01876-e54c-401e-a196-c5690e703ba1", + "uuid": "b64c8d1e-d7e3-40b5-93f2-0ad3a536b840", "control-id": "cis_rhel10_2-4.1.2", "description": "No notes for control-id 2.4.1.2.", "props": [ @@ -6770,7 +6718,7 @@ ] }, { - "uuid": "5bc8d6b9-df63-4fb7-8475-49a01aaf7951", + "uuid": "3ccef414-b964-401a-b0df-f46ab41ca33b", "control-id": "cis_rhel10_2-4.1.3", "description": "No notes for control-id 2.4.1.3.", "props": [ @@ -6797,7 +6745,7 @@ ] }, { - "uuid": "4b7db673-68b0-4c13-9539-e679e477c664", + "uuid": "f4d78ba3-ca83-42bc-bf6d-6f0b6b863ba8", "control-id": "cis_rhel10_2-4.1.4", "description": "No notes for control-id 2.4.1.4.", "props": [ @@ -6824,7 +6772,7 @@ ] }, { - "uuid": "c89335e0-e957-4f06-9146-5062fe4854d4", + "uuid": "ae52b6ab-f532-4092-a043-72109ac6ab23", "control-id": "cis_rhel10_2-4.1.5", "description": "No notes for control-id 2.4.1.5.", "props": [ @@ -6851,7 +6799,7 @@ ] }, { - "uuid": "0555d406-1ffc-4762-97e8-950f7c3b083d", + "uuid": "55f0e4ae-7fde-45cb-b69c-e8ecf70b1467", "control-id": "cis_rhel10_2-4.1.6", "description": "No notes for control-id 2.4.1.6.", "props": [ @@ -6878,7 +6826,7 @@ ] }, { - "uuid": "aa8d532c-b832-4a24-bab8-a2776ec3300e", + "uuid": "a7735eb8-a39f-4f7f-a554-94a89c2e6cfa", "control-id": "cis_rhel10_2-4.1.7", "description": "No notes for control-id 2.4.1.7.", "props": [ @@ -6905,7 +6853,7 @@ ] }, { - "uuid": "8752ef4f-6891-4251-bfa5-60b623c8fca5", + "uuid": "be58af0a-8645-4fe0-a50b-40ac65a0d1a1", "control-id": "cis_rhel10_2-4.1.8", "description": "No notes for control-id 2.4.1.8.", "props": [ @@ -6932,7 +6880,7 @@ ] }, { - "uuid": "b58b4bd1-20d7-449c-8d1c-5efdec642162", + "uuid": "94b1ae73-0c57-435d-af60-44289b45d1d8", "control-id": "cis_rhel10_2-4.1.9", "description": "No notes for control-id 2.4.1.9.", "props": [ @@ -6969,7 +6917,7 @@ ] }, { - "uuid": "b0ad2365-a4ed-448c-aec2-62d1a276f972", + "uuid": "b58b995e-427f-4f74-ac43-61c3f5e1b12f", "control-id": "cis_rhel10_2-4.2.1", "description": "No notes for control-id 2.4.2.1.", "props": [ @@ -7006,7 +6954,7 @@ ] }, { - "uuid": "08b382d6-3854-4c9c-afac-ca6fe200c5e7", + "uuid": "64ac4d40-2aa0-44e5-be24-27a8cb230de1", "control-id": "cis_rhel10_3-1.1", "description": "The description for control-id cis_rhel10_3-1.1.", "props": [ @@ -7019,7 +6967,7 @@ ] }, { - "uuid": "40b77517-a632-4e94-89e1-0fbbdc6fe8a6", + "uuid": "089bbfd9-c08c-40c4-aaa0-9cfb4c53a581", "control-id": "cis_rhel10_3-2.1", "description": "No notes for control-id 3.2.1.", "props": [ @@ -7036,7 +6984,7 @@ ] }, { - "uuid": "4c8cb804-41d2-44ea-bac1-acab843032a5", + "uuid": "d4e519d0-af7d-4e18-a5f0-ed61107999c0", "control-id": "cis_rhel10_3-2.2", "description": "No notes for control-id 3.2.2.", "props": [ @@ -7053,7 +7001,7 @@ ] }, { - "uuid": "f9f11f45-b65c-4b22-a1d4-c221d62a516e", + "uuid": "969cabd7-4d32-4669-b739-88eb58ad0b1d", "control-id": "cis_rhel10_3-2.3", "description": "No notes for control-id 3.2.3.", "props": [ @@ -7070,7 +7018,7 @@ ] }, { - "uuid": "76739f9e-9d8f-4053-b85e-7e24d2abb995", + "uuid": "d0302680-dbdf-4700-b573-f9f728874215", "control-id": "cis_rhel10_3-2.4", "description": "No notes for control-id 3.2.4.", "props": [ @@ -7087,7 +7035,7 @@ ] }, { - "uuid": "546b9a4f-7b58-4deb-aa69-0bc58e888577", + "uuid": "29b7049c-ec6c-4f0a-8a44-dfaa28dd5657", "control-id": "cis_rhel10_3-2.5", "description": "No notes for control-id 3.2.5.", "props": [ @@ -7104,7 +7052,7 @@ ] }, { - "uuid": "c33d0890-c965-4fee-98a4-a682413d6a4b", + "uuid": "fa063f6b-e4f7-49a0-b1c3-76b1d56235a9", "control-id": "cis_rhel10_3-2.6", "description": "No notes for control-id 3.2.6.", "props": [ @@ -7121,7 +7069,7 @@ ] }, { - "uuid": "b34328ed-1b03-4f6f-aec6-381559f666ca", + "uuid": "0318ab80-9d85-4ec7-9be1-8da7de41181e", "control-id": "cis_rhel10_3-3.1.1", "description": "No notes for control-id 3.3.1.1.", "props": [ @@ -7138,7 +7086,7 @@ ] }, { - "uuid": "cbdac553-6473-4225-ba53-2528a76156d4", + "uuid": "4f5a1daf-5309-43f3-82dc-886eb7362fa6", "control-id": "cis_rhel10_3-3.1.2", "description": "No notes for control-id 3.3.1.2.", "props": [ @@ -7155,7 +7103,7 @@ ] }, { - "uuid": "9741e507-c0b4-4ab5-ae4c-1206b4a5ac3f", + "uuid": "a8993be7-a4f6-4182-971e-21db6dfc3fcd", "control-id": "cis_rhel10_3-3.1.3", "description": "No notes for control-id 3.3.1.3.", "props": [ @@ -7172,7 +7120,7 @@ ] }, { - "uuid": "0ec0bde7-9b6b-4cbf-89f3-de9540259037", + "uuid": "aafc92f4-0e58-48bd-bfd3-17ee597b47d0", "control-id": "cis_rhel10_3-3.1.4", "description": "No notes for control-id 3.3.1.4.", "props": [ @@ -7189,7 +7137,7 @@ ] }, { - "uuid": "a9eee3d7-3e57-4078-885f-1bae584dd955", + "uuid": "87fab19d-d4c1-4c49-8647-4d65a54f5dad", "control-id": "cis_rhel10_3-3.1.5", "description": "No notes for control-id 3.3.1.5.", "props": [ @@ -7206,7 +7154,7 @@ ] }, { - "uuid": "143db3c0-5dee-4b11-8864-129e706209c0", + "uuid": "ddc3a71f-3d02-4b89-8c40-1aae9e0a7c7e", "control-id": "cis_rhel10_3-3.1.6", "description": "No notes for control-id 3.3.1.6.", "props": [ @@ -7223,7 +7171,7 @@ ] }, { - "uuid": "719105be-8ad4-475d-b1e3-bba6a6abaaf4", + "uuid": "c0b775b2-bc7e-4448-a206-2c1e2891c819", "control-id": "cis_rhel10_3-3.1.7", "description": "No notes for control-id 3.3.1.7.", "props": [ @@ -7240,7 +7188,7 @@ ] }, { - "uuid": "1546752a-b5f6-42f4-a667-195bf6671bd6", + "uuid": "6e1700a6-3214-419d-82fa-c75247d508f9", "control-id": "cis_rhel10_3-3.1.8", "description": "No notes for control-id 3.3.1.8.", "props": [ @@ -7257,7 +7205,7 @@ ] }, { - "uuid": "fa693766-0237-4cb6-9d2a-e32f8d4421a5", + "uuid": "e3b8c8a3-7cd4-4390-9d72-b54e7fd21243", "control-id": "cis_rhel10_3-3.1.9", "description": "No notes for control-id 3.3.1.9.", "props": [ @@ -7274,7 +7222,7 @@ ] }, { - "uuid": "e3750e35-7eb9-474d-863a-439e3b1e04c3", + "uuid": "8002f4b8-9bcd-40ca-9bfb-7ac2fa23757f", "control-id": "cis_rhel10_3-3.1.10", "description": "No notes for control-id 3.3.1.10.", "props": [ @@ -7291,7 +7239,7 @@ ] }, { - "uuid": "37620b22-0a9e-4b5b-acba-e2a5fceb80a1", + "uuid": "28176ae2-76b8-45da-b4ac-04dfd212cb50", "control-id": "cis_rhel10_3-3.1.11", "description": "No notes for control-id 3.3.1.11.", "props": [ @@ -7308,7 +7256,7 @@ ] }, { - "uuid": "25b3f355-8b93-4f69-bbed-cc3b9b9fff70", + "uuid": "340912ee-0da2-4720-a354-1a58203e7f5d", "control-id": "cis_rhel10_3-3.1.12", "description": "No notes for control-id 3.3.1.12.", "props": [ @@ -7325,7 +7273,7 @@ ] }, { - "uuid": "67de8a92-33c9-4ae6-83f2-0d89b54d9837", + "uuid": "7a3de473-9883-4101-bbce-dfa3d496f843", "control-id": "cis_rhel10_3-3.1.13", "description": "No notes for control-id 3.3.1.13.", "props": [ @@ -7342,7 +7290,7 @@ ] }, { - "uuid": "bcb401c4-ac15-48f0-bdbe-350a36372edd", + "uuid": "2aa1fa53-5ff7-4593-8659-b5846f94f18b", "control-id": "cis_rhel10_3-3.1.14", "description": "No notes for control-id 3.3.1.14.", "props": [ @@ -7359,7 +7307,7 @@ ] }, { - "uuid": "fac4df82-6f56-41b8-9e1e-ff097a3a34b6", + "uuid": "405f87df-3c2b-4a36-978b-b04436d644a5", "control-id": "cis_rhel10_3-3.1.15", "description": "No notes for control-id 3.3.1.15.", "props": [ @@ -7376,7 +7324,7 @@ ] }, { - "uuid": "c6cbf4fd-3e52-4489-a1b4-5a24982917be", + "uuid": "a95ccd1f-8812-4209-8649-e5fbda304a2d", "control-id": "cis_rhel10_3-3.1.16", "description": "No notes for control-id 3.3.1.16.", "props": [ @@ -7393,7 +7341,7 @@ ] }, { - "uuid": "c7f72887-2078-4d9d-b15a-efac97cc6482", + "uuid": "84c929c1-7e4c-4662-8e69-c1cfbf45ae29", "control-id": "cis_rhel10_3-3.1.17", "description": "No notes for control-id 3.3.1.17.", "props": [ @@ -7410,7 +7358,7 @@ ] }, { - "uuid": "70efff0c-4e1e-4261-a7fb-80bb173b64c3", + "uuid": "d9d2db6a-7602-4d3c-8ab7-6ebb2a0bdce3", "control-id": "cis_rhel10_3-3.1.18", "description": "No notes for control-id 3.3.1.18.", "props": [ @@ -7427,7 +7375,7 @@ ] }, { - "uuid": "585ebd63-a871-4402-99d1-37fcc3a53a63", + "uuid": "99dad840-8958-4185-a138-45f8cb903430", "control-id": "cis_rhel10_3-3.2.1", "description": "No notes for control-id 3.3.2.1.", "props": [ @@ -7444,7 +7392,7 @@ ] }, { - "uuid": "ddaa596e-2c1e-48b0-9622-b36bc377bca5", + "uuid": "a81b9f38-3102-4aef-b7de-a9a2fc6a6438", "control-id": "cis_rhel10_3-3.2.2", "description": "No notes for control-id 3.3.2.2.", "props": [ @@ -7461,7 +7409,7 @@ ] }, { - "uuid": "8f2aad0c-503a-4c54-b505-ec80fdcaabd4", + "uuid": "43882fe5-874b-4bfc-b749-7c835c752a4a", "control-id": "cis_rhel10_3-3.2.3", "description": "No notes for control-id 3.3.2.3.", "props": [ @@ -7478,7 +7426,7 @@ ] }, { - "uuid": "03ca2a77-9b52-49f0-b93c-9ce2de623598", + "uuid": "4e41f7b7-bb6e-4b8e-b459-51d65ef16dab", "control-id": "cis_rhel10_3-3.2.4", "description": "No notes for control-id 3.3.2.4.", "props": [ @@ -7495,7 +7443,7 @@ ] }, { - "uuid": "175af1df-00fe-4928-ab9b-52d042774e7b", + "uuid": "d660b3c2-c139-407e-91e0-90531d4cc623", "control-id": "cis_rhel10_3-3.2.5", "description": "No notes for control-id 3.3.2.5.", "props": [ @@ -7512,7 +7460,7 @@ ] }, { - "uuid": "4f3dea1b-d881-4dd6-83a7-2b8774662387", + "uuid": "733c2500-a255-4c49-9a16-7e8f4f8167e7", "control-id": "cis_rhel10_3-3.2.6", "description": "No notes for control-id 3.3.2.6.", "props": [ @@ -7529,7 +7477,7 @@ ] }, { - "uuid": "4ce278bc-d831-4ddc-8f3e-85e471056adf", + "uuid": "3ab5bf1f-eb1b-44ce-8afe-ed6f80ad8ecf", "control-id": "cis_rhel10_3-3.2.7", "description": "No notes for control-id 3.3.2.7.", "props": [ @@ -7546,7 +7494,7 @@ ] }, { - "uuid": "42c63f51-cb96-4c16-926f-e39f6f947bf2", + "uuid": "65848952-b31f-4a10-a408-129d1f904f7a", "control-id": "cis_rhel10_3-3.2.8", "description": "No notes for control-id 3.3.2.8.", "props": [ @@ -7563,7 +7511,7 @@ ] }, { - "uuid": "ead75e16-3558-4626-9872-8ae2febfd5e9", + "uuid": "e960287e-c076-42d2-9c2d-846c4d9e488e", "control-id": "cis_rhel10_4-1.1", "description": "No notes for control-id 4.1.1.", "props": [ @@ -7580,7 +7528,7 @@ ] }, { - "uuid": "af2f9dd5-a107-4ec2-bd7a-979882e2170f", + "uuid": "8a27595c-d58a-46e3-98c2-c715b9a3143a", "control-id": "cis_rhel10_4-1.2", "description": "No notes for control-id 4.1.2.", "props": [ @@ -7597,7 +7545,7 @@ ] }, { - "uuid": "cdd30097-89d3-4ba7-be35-67552306feb2", + "uuid": "3720244a-20c4-4684-b198-13dc85fd862d", "control-id": "cis_rhel10_4-1.3", "description": "No notes for control-id 4.1.3.", "props": [ @@ -7614,7 +7562,7 @@ ] }, { - "uuid": "47fc9ac5-0cd1-4876-b7b8-ac92b2089724", + "uuid": "92688ae5-b5af-4ba5-af62-11f3e0173105", "control-id": "cis_rhel10_4-1.4", "description": "The description for control-id cis_rhel10_4-1.4.", "props": [ @@ -7627,7 +7575,7 @@ ] }, { - "uuid": "fa4dc62b-76d7-48c5-b854-809329b4662d", + "uuid": "1cc6be8b-0fa7-4c12-9e06-1d0f64cfa573", "control-id": "cis_rhel10_4-1.5", "description": "Firewalld in Red Hat Enterprise Linux 10 accepts loopback traffic by default.", "props": [ @@ -7644,7 +7592,7 @@ ] }, { - "uuid": "b0c10ef1-b7fa-416f-868f-61a6c3a2dd63", + "uuid": "27d9653a-106e-45d8-be77-b324fb3953ef", "control-id": "cis_rhel10_4-1.6", "description": "The description for control-id cis_rhel10_4-1.6.", "props": [ @@ -7657,7 +7605,7 @@ ] }, { - "uuid": "a7cff8b7-fe55-4555-aa88-79c930a6b72a", + "uuid": "6eac22c9-9885-44f9-b058-b29f91b0c62e", "control-id": "cis_rhel10_4-1.7", "description": "The description for control-id cis_rhel10_4-1.7.", "props": [ @@ -7670,7 +7618,7 @@ ] }, { - "uuid": "487b77ad-d75a-4c06-bcec-5d6942ddcf0d", + "uuid": "44800ea3-0121-496a-920c-ff505fbf1111", "control-id": "cis_rhel10_5-1.1", "description": "No notes for control-id 5.1.1.", "props": [ @@ -7727,7 +7675,7 @@ ] }, { - "uuid": "cd704aec-6f40-43dd-8203-518b0cd68e77", + "uuid": "5f4ae7a4-d19d-4b73-b19c-fb686ccd6dfe", "control-id": "cis_rhel10_5-1.2", "description": "No notes for control-id 5.1.2.", "props": [ @@ -7754,7 +7702,7 @@ ] }, { - "uuid": "df1f6d66-551a-4276-9c06-5a4336761363", + "uuid": "5a0bc3d9-3551-4370-9d6f-ad489a3b0726", "control-id": "cis_rhel10_5-1.3", "description": "No notes for control-id 5.1.3.", "props": [ @@ -7781,7 +7729,7 @@ ] }, { - "uuid": "f2054194-8dfe-4de7-9249-1dc75eaa7e0f", + "uuid": "96a4f4be-f1a9-426f-80fe-aa18a284a1be", "control-id": "cis_rhel10_5-1.4", "description": "No notes for control-id 5.1.4.", "props": [ @@ -7798,7 +7746,7 @@ ] }, { - "uuid": "c27f4fd0-ddc2-44c1-95f5-9299dbf432a2", + "uuid": "989b6a64-3fc4-46b4-a3db-e603ab1f0d57", "control-id": "cis_rhel10_5-1.5", "description": "No notes for control-id 5.1.5.", "props": [ @@ -7815,7 +7763,7 @@ ] }, { - "uuid": "e62f00c6-885c-4725-a40b-5af5d5752efa", + "uuid": "4aea6544-7fa7-4546-bd11-bf7a69ab6c8f", "control-id": "cis_rhel10_5-1.6", "description": "No notes for control-id 5.1.6.", "props": [ @@ -7832,7 +7780,7 @@ ] }, { - "uuid": "375dc08c-89f8-4b38-9510-5db06082a53e", + "uuid": "afaace13-bb66-4913-bbd8-efd2e59a8305", "control-id": "cis_rhel10_5-1.7", "description": "The requirement gives an example of 45 seconds, but is flexible about the values. It is only\nnecessary to ensure there is a timeout configured in alignment to the site policy.", "props": [ @@ -7854,7 +7802,7 @@ ] }, { - "uuid": "01fb932a-c3bc-4f7a-9b1f-9c0aa1239c5d", + "uuid": "9c64e1f3-3459-44e4-8865-9f5678511624", "control-id": "cis_rhel10_5-1.8", "description": "No notes for control-id 5.1.8.", "props": [ @@ -7871,7 +7819,7 @@ ] }, { - "uuid": "734f0e86-55ae-408d-9bd8-205b4bc9494a", + "uuid": "64f26303-ff2e-402c-ae19-5314a6e501d8", "control-id": "cis_rhel10_5-1.9", "description": "No notes for control-id 5.1.9.", "props": [ @@ -7888,7 +7836,7 @@ ] }, { - "uuid": "c9b24785-605e-47fa-8f54-908c66158b38", + "uuid": "46260662-90e3-4161-ba54-213a71c37144", "control-id": "cis_rhel10_5-1.10", "description": "No notes for control-id 5.1.10.", "props": [ @@ -7905,7 +7853,7 @@ ] }, { - "uuid": "ec0758a4-cb10-4719-adb0-31640dfd60f9", + "uuid": "53129f50-3cf8-4656-b767-bf25c05feddd", "control-id": "cis_rhel10_5-1.11", "description": "No notes for control-id 5.1.11.", "props": [ @@ -7922,7 +7870,7 @@ ] }, { - "uuid": "9ff4431b-04ae-4e91-b0aa-0be1e987e0ed", + "uuid": "63fdf47f-9fd7-4e2a-b4f0-adacbec7751d", "control-id": "cis_rhel10_5-1.12", "description": "The description for control-id cis_rhel10_5-1.12.", "props": [ @@ -7940,7 +7888,7 @@ ] }, { - "uuid": "0ce8ddb0-cc71-4e40-85f6-fe10c549b48c", + "uuid": "8b9d81bd-7c04-4c45-850e-4069a7d3c3fa", "control-id": "cis_rhel10_5-1.13", "description": "No notes for control-id 5.1.13.", "props": [ @@ -7957,7 +7905,7 @@ ] }, { - "uuid": "aa2a8c1b-d51e-458e-970a-f79d5a428a35", + "uuid": "c729ca9a-cbb6-4b3b-913e-f170951ce26b", "control-id": "cis_rhel10_5-1.14", "description": "The CIS benchmark is not opinionated about which loglevel is selected here. Here, this\nprofile uses VERBOSE by default, as it allows for the capture of login and logout activity\nas well as key fingerprints.", "props": [ @@ -7974,7 +7922,7 @@ ] }, { - "uuid": "e76271c6-2685-48e1-978c-01bc75db96a6", + "uuid": "372e2981-f10f-4c5e-bbd9-2c9b287b0fd0", "control-id": "cis_rhel10_5-1.15", "description": "No notes for control-id 5.1.15.", "props": [ @@ -7991,7 +7939,7 @@ ] }, { - "uuid": "33a67eae-a16e-4d60-95c8-06e48f0fb1a7", + "uuid": "6f8bdd3d-feec-41ea-8724-6c31465079f1", "control-id": "cis_rhel10_5-1.16", "description": "No notes for control-id 5.1.16.", "props": [ @@ -8008,7 +7956,7 @@ ] }, { - "uuid": "7e9251d7-b686-49de-aa88-631664ee9799", + "uuid": "993f9834-ea17-41a9-8593-61db7d75c0c3", "control-id": "cis_rhel10_5-1.17", "description": "No notes for control-id 5.1.17.", "props": [ @@ -8025,7 +7973,7 @@ ] }, { - "uuid": "6bb44f00-f764-41f6-8a53-b0c158083c60", + "uuid": "0709cc57-f2ed-4cbf-8888-b991490633d8", "control-id": "cis_rhel10_5-1.18", "description": "No notes for control-id 5.1.18.", "props": [ @@ -8042,7 +7990,7 @@ ] }, { - "uuid": "6e3b4284-5e81-41b8-ab54-254ef02f739f", + "uuid": "0e8b50c1-9b80-431d-bda6-c8a97c765c93", "control-id": "cis_rhel10_5-1.19", "description": "No notes for control-id 5.1.19.", "props": [ @@ -8059,7 +8007,7 @@ ] }, { - "uuid": "663d348d-cc55-410b-8956-45b702126c3c", + "uuid": "305f399a-5af1-44f5-a54a-01db4a7e8071", "control-id": "cis_rhel10_5-1.20", "description": "No notes for control-id 5.1.20.", "props": [ @@ -8076,7 +8024,7 @@ ] }, { - "uuid": "d39690ec-ad54-462c-a9b9-f82ffe7cb224", + "uuid": "4f467cc8-d014-4e7e-8240-a064ec98bc0e", "control-id": "cis_rhel10_5-1.21", "description": "No notes for control-id 5.1.21.", "props": [ @@ -8093,7 +8041,7 @@ ] }, { - "uuid": "08d4465b-ec69-4861-93b0-c705f6255ba6", + "uuid": "c188dc4a-a14f-44f6-ba94-7dde7bbabb3e", "control-id": "cis_rhel10_5-1.22", "description": "No notes for control-id 5.1.22.", "props": [ @@ -8110,7 +8058,7 @@ ] }, { - "uuid": "5019f10d-2d97-47cb-ad48-f05fe5f1d780", + "uuid": "60baff01-c438-40fd-a0c1-f1bd21567fb0", "control-id": "cis_rhel10_5-2.1", "description": "No notes for control-id 5.2.1.", "props": [ @@ -8127,7 +8075,7 @@ ] }, { - "uuid": "17c3bd8b-31b9-42a5-960f-1826eb11a580", + "uuid": "7c37a490-f922-4f91-b82c-175a1695a54c", "control-id": "cis_rhel10_5-2.2", "description": "No notes for control-id 5.2.2.", "props": [ @@ -8144,7 +8092,7 @@ ] }, { - "uuid": "648054ab-af68-4dad-b3ff-c0b864ffbe24", + "uuid": "3d6d601a-eb61-4452-8611-88304400a54a", "control-id": "cis_rhel10_5-2.3", "description": "No notes for control-id 5.2.3.", "props": [ @@ -8161,7 +8109,7 @@ ] }, { - "uuid": "155be212-23ba-4a86-b6ce-972e58ccae9b", + "uuid": "2ca04635-5ef8-46b1-917a-88fa71e75e03", "control-id": "cis_rhel10_5-2.5", "description": "No notes for control-id 5.2.5.", "props": [ @@ -8178,7 +8126,7 @@ ] }, { - "uuid": "96310233-2257-4734-8a4b-a8b393d73f25", + "uuid": "9e6e6167-ac1c-46f3-8647-93a9dabafcb0", "control-id": "cis_rhel10_5-2.6", "description": "No notes for control-id 5.2.6.", "props": [ @@ -8195,7 +8143,7 @@ ] }, { - "uuid": "0b557a43-5c64-4abc-a943-41f8ade81eb9", + "uuid": "f68f4e02-f915-4f27-a17b-c6b1aeb26f02", "control-id": "cis_rhel10_5-2.7", "description": "Members of \"wheel\" or GID 0 groups are checked by default if the group option is not set for\npam_wheel.so module. The recommendation states the group should be empty to reinforce the\nuse of \"sudo\" for privileged access. Therefore, members of these groups should be manually\nchecked or a different group should be informed.", "props": [ @@ -8217,7 +8165,7 @@ ] }, { - "uuid": "aacb809e-2cad-4a89-95ac-c1ec3f34149c", + "uuid": "1de9433e-d370-4d80-8828-aefbc59685e6", "control-id": "cis_rhel10_5-3.1.1", "description": "This requirement is hard to be automated without any specific requirement. The policy even\nstates that provided commands are examples, other custom settings might be in place and the\nsettings might be different depending on site policies. The other rules will already make\nsure there is a correct autheselect profile regardless of the existing settings. It is\nnecessary to better discuss with CIS Community.", "props": [ @@ -8229,7 +8177,7 @@ ] }, { - "uuid": "0203c5a5-296a-423d-92e7-12f1fe3c76b1", + "uuid": "d6186d40-5ece-46c1-a3b3-e6ee6581e22e", "control-id": "cis_rhel10_5-3.1.2", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.1.", "props": [ @@ -8251,7 +8199,7 @@ ] }, { - "uuid": "9033d368-6dc5-49b6-93d6-7c8d8c97bd70", + "uuid": "67ee8beb-d8dc-4c46-a1df-fd87629ce08e", "control-id": "cis_rhel10_5-3.1.3", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.2.", "props": [ @@ -8278,7 +8226,7 @@ ] }, { - "uuid": "f52c51ea-9301-4c82-940e-f28c01fed7cd", + "uuid": "ccb13884-e718-44fc-be58-9216d0dc47e3", "control-id": "cis_rhel10_5-3.1.4", "description": "The module is properly enabled by the rules mentioned in related_rules.\nRequirements in 5.3.2.3 use these rules.", "props": [ @@ -8290,7 +8238,7 @@ ] }, { - "uuid": "659bfd5d-4a78-4574-9330-e964f1219216", + "uuid": "1c8b02a0-7e09-4f55-ac1d-6da73de9ed09", "control-id": "cis_rhel10_5-3.1.5", "description": "No notes for control-id 5.3.1.5.", "props": [ @@ -8307,7 +8255,7 @@ ] }, { - "uuid": "d93a3662-71f3-4eea-88a5-786dfbfa089b", + "uuid": "c575b8ac-35ce-489f-8340-e64d45f2713d", "control-id": "cis_rhel10_5-3.2.1.1", "description": "No notes for control-id 5.3.2.1.1.", "props": [ @@ -8324,7 +8272,7 @@ ] }, { - "uuid": "c35f218f-b824-43de-97f1-dbc91d2f95f8", + "uuid": "b71b2654-61ad-4599-a98f-e6d916e5abc2", "control-id": "cis_rhel10_5-3.2.1.2", "description": "The policy also accepts value 0, which means the locked accounts should be manually unlocked\nby an administrator. However, it also mentions that using value 0 can facilitate a DoS\nattack to legitimate users.", "props": [ @@ -8341,7 +8289,7 @@ ] }, { - "uuid": "cf22677b-c242-48e9-8145-a13e45443b9d", + "uuid": "dd52272b-75cf-46ce-aa89-1a1925cdf8bb", "control-id": "cis_rhel10_5-3.2.2.1", "description": "No notes for control-id 5.3.2.2.1.", "props": [ @@ -8358,7 +8306,7 @@ ] }, { - "uuid": "df2763ba-171b-4d02-b8bc-837f1efbcddb", + "uuid": "9dfb8383-2d2f-4707-8d1d-bc66a54f8434", "control-id": "cis_rhel10_5-3.2.2.2", "description": "No notes for control-id 5.3.2.2.2.", "props": [ @@ -8375,7 +8323,7 @@ ] }, { - "uuid": "e63a89e0-a0d9-4293-a958-0245e0cadce7", + "uuid": "eb267708-0176-4027-ae73-d02758475011", "control-id": "cis_rhel10_5-3.2.2.3", "description": "This requirement is expected to be manual. However, in previous versions of the policy\nit was already automated the configuration of \"minclass\" option. This posture was kept for\nRHEL 10 in this new version. Rules related to other options are informed in related_rules.\nIn short, minclass=4 alone can achieve the same result achieved by the combination of the\nother 4 options mentioned in the policy.", "props": [ @@ -8392,7 +8340,7 @@ ] }, { - "uuid": "406ded21-9431-4be6-9270-852dcf891b8c", + "uuid": "c3d02e89-5240-4a00-8ab9-911e4d71a178", "control-id": "cis_rhel10_5-3.2.2.4", "description": "No notes for control-id 5.3.2.2.4.", "props": [ @@ -8409,7 +8357,7 @@ ] }, { - "uuid": "bd05ee02-5035-4628-b21b-935991f09431", + "uuid": "d648028d-d9a6-4bf1-9442-487ea98dfeec", "control-id": "cis_rhel10_5-3.2.2.5", "description": "No notes for control-id 5.3.2.2.5.", "props": [ @@ -8426,7 +8374,7 @@ ] }, { - "uuid": "3d6a65a9-e156-452a-8471-b8d3a30db9b5", + "uuid": "0b757feb-1102-491a-81d6-a931f872baf6", "control-id": "cis_rhel10_5-3.2.2.6", "description": "No notes for control-id 5.3.2.2.6.", "props": [ @@ -8443,7 +8391,7 @@ ] }, { - "uuid": "8417f693-8325-41b8-a9f8-03235654c169", + "uuid": "b5b540fb-0da7-4928-848a-c16ee84ac4e0", "control-id": "cis_rhel10_5-3.2.2.7", "description": "No notes for control-id 5.3.2.2.7.", "props": [ @@ -8460,7 +8408,7 @@ ] }, { - "uuid": "8f4ae10b-5ac1-429a-84ff-5bf9659c87b3", + "uuid": "51dbe97b-f05f-4740-b21a-253555f1ebdd", "control-id": "cis_rhel10_5-3.2.3.1", "description": "Although mentioned in the section 5.3.3.3, there is no explicit requirement to configure\nretry option of pam_pwhistory. If come in the future, the rule accounts_password_pam_retry\ncan be used.", "props": [ @@ -8482,7 +8430,7 @@ ] }, { - "uuid": "816ba935-df04-486e-9300-6ebc6822b924", + "uuid": "06747217-8a36-4069-b3b3-5adf9d6f6783", "control-id": "cis_rhel10_5-3.2.3.2", "description": "No notes for control-id 5.3.2.3.2.", "props": [ @@ -8499,7 +8447,7 @@ ] }, { - "uuid": "b5202612-07c4-45aa-9118-8cbfaff19f5c", + "uuid": "f8077494-3b19-4f88-910f-6fc8d59514fb", "control-id": "cis_rhel10_5-3.2.3.3", "description": "In RHEL 10 pam_pwhistory is enabled via authselect feature, as required in 5.3.1.4. The\nfeature automatically set \"use_authok\" option. In any case, we don't have a rule to check\nthis option specifically.", "props": [ @@ -8516,7 +8464,7 @@ ] }, { - "uuid": "5917490b-9176-4bc9-9c28-65062206937e", + "uuid": "c2f6d536-6fc3-46fb-9b5a-af79fb32571e", "control-id": "cis_rhel10_5-3.2.4.1", "description": "The rule more specifically used in this requirement also satify the requirement 5.3.1.5.", "props": [ @@ -8533,7 +8481,7 @@ ] }, { - "uuid": "218d0a36-436a-49ee-8018-6bc84be706ad", + "uuid": "71b8388b-73a0-49a7-9466-9d2eeaaa8a23", "control-id": "cis_rhel10_5-3.2.4.2", "description": "Usage of pam_unix.so module together with \"remember\" option is deprecated and is not\nrecommended by this policy. Instead, it should be used remember option of pam_pwhistory\nmodule, as required in 5.3.2.3.1. See here for more details about pam_unix.so:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1778929", "props": [ @@ -8550,7 +8498,7 @@ ] }, { - "uuid": "3062fb5a-e920-4277-bca3-fa66c963a9da", + "uuid": "b89a9a2b-e169-42cb-aeee-ed2707b39737", "control-id": "cis_rhel10_5-3.2.4.3", "description": "Changes in logindefs mentioned in this requirement are more specifically covered by 5.4.1.4", "props": [ @@ -8572,7 +8520,7 @@ ] }, { - "uuid": "db36ec0f-0ed9-4a0e-b2e9-4cb9d015fe50", + "uuid": "af8af702-c388-42ea-b861-8b77c75d0590", "control-id": "cis_rhel10_5-3.2.4.4", "description": "In RHEL 10 pam_unix is enabled by default in all authselect profiles already with the\nuse_authtok option set. In any case, we don't have a rule to check this option specifically,\nlike in 5.3.2.3.3.", "props": [ @@ -8589,7 +8537,7 @@ ] }, { - "uuid": "f23d9f4f-103b-4f0d-9954-75b8d9c48c3c", + "uuid": "5464d4f7-08e8-48bb-a19e-b1a5e3ea0ce5", "control-id": "cis_rhel10_5-4.1.1", "description": "No notes for control-id 5.4.1.1.", "props": [ @@ -8611,7 +8559,7 @@ ] }, { - "uuid": "dfef2560-03cf-4045-9bc6-3b07f9a957f5", + "uuid": "4a6eacd2-e9e0-48ee-94a2-5c646ce21622", "control-id": "cis_rhel10_5-4.1.3", "description": "No notes for control-id 5.4.1.3.", "props": [ @@ -8633,7 +8581,7 @@ ] }, { - "uuid": "ef510436-454a-426d-9088-aa546f08d034", + "uuid": "9d0fc62a-a610-4575-a3ac-f7ac54ee417d", "control-id": "cis_rhel10_5-4.1.4", "description": "There's a \"new\" set of options in /etc/login.defs file to define the number of iterations\nperformed during the hashing process.", "props": [ @@ -8655,7 +8603,7 @@ ] }, { - "uuid": "a18393fc-2a35-4e68-a9cf-cccfde15f138", + "uuid": "61fb2beb-04fa-4cb7-b893-45c0717b63bc", "control-id": "cis_rhel10_5-4.1.5", "description": "No notes for control-id 5.4.1.5.", "props": [ @@ -8677,7 +8625,7 @@ ] }, { - "uuid": "3055b407-9ebd-42f3-a98f-312fec63ff68", + "uuid": "862532d9-e236-40c8-b5af-0b77201632ea", "control-id": "cis_rhel10_5-4.1.6", "description": "No notes for control-id 5.4.1.6.", "props": [ @@ -8694,7 +8642,7 @@ ] }, { - "uuid": "376408ca-4e4b-4e2a-966f-c1f8f1c82b73", + "uuid": "daa5dfa5-389d-469a-9469-cb65d4e5accd", "control-id": "cis_rhel10_5-4.2.1", "description": "No notes for control-id 5.4.2.1.", "props": [ @@ -8711,7 +8659,7 @@ ] }, { - "uuid": "e6020300-4083-434e-ac86-fdb020812001", + "uuid": "16a96444-86e5-4414-ad1a-ccc57eedb745", "control-id": "cis_rhel10_5-4.2.2", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -8728,7 +8676,7 @@ ] }, { - "uuid": "30eb4f22-d15e-42ac-a0cc-a338d96b6366", + "uuid": "5f1ba698-1e6c-4723-a540-da3fd9392a32", "control-id": "cis_rhel10_5-4.2.3", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -8745,7 +8693,7 @@ ] }, { - "uuid": "b03bdc76-ca53-494c-9bc3-86edf30dd49d", + "uuid": "9fca5964-4ec0-413a-89f7-a3a416637400", "control-id": "cis_rhel10_5-4.2.4", "description": "No notes for control-id 5.4.2.4.", "props": [ @@ -8762,7 +8710,7 @@ ] }, { - "uuid": "4125403a-94fa-4d78-bd1c-dd115b1a5bd8", + "uuid": "b0b8b99c-d943-483c-a54b-1a60dedbaa81", "control-id": "cis_rhel10_5-4.2.5", "description": "No notes for control-id 5.4.2.5.", "props": [ @@ -8784,7 +8732,7 @@ ] }, { - "uuid": "864539ea-0f2f-434c-8426-1bdfc7d06b14", + "uuid": "7a9b012a-725b-435f-9573-8ef6df7b85a5", "control-id": "cis_rhel10_5-4.2.6", "description": "No notes for control-id 5.4.2.6.", "props": [ @@ -8801,7 +8749,7 @@ ] }, { - "uuid": "306ccde7-b7e4-4d17-b57c-e6cd38514257", + "uuid": "696143d4-4573-4b1b-9650-504585215c50", "control-id": "cis_rhel10_5-4.2.7", "description": "No notes for control-id 5.4.2.7.", "props": [ @@ -8823,7 +8771,7 @@ ] }, { - "uuid": "121ab8f4-2856-4c58-8bca-9b7b7b149f78", + "uuid": "a8b8ca8d-75ef-4df0-9a0a-3a0251572462", "control-id": "cis_rhel10_5-4.2.8", "description": "No notes for control-id 5.4.2.8.", "props": [ @@ -8840,7 +8788,7 @@ ] }, { - "uuid": "41b4b057-c021-4233-a1ae-7afc05b0b8b6", + "uuid": "e9225339-6069-433b-bd48-4d1dff035998", "control-id": "cis_rhel10_5-4.3.2", "description": "No notes for control-id 5.4.3.2.", "props": [ @@ -8857,7 +8805,7 @@ ] }, { - "uuid": "43960514-bcda-4055-98ee-d5d3298554cd", + "uuid": "384cca33-bc4f-4450-a8cd-1e020a892983", "control-id": "cis_rhel10_5-4.3.3", "description": "No notes for control-id 5.4.3.3.", "props": [ @@ -8884,7 +8832,7 @@ ] }, { - "uuid": "c87c30fb-dcb4-4e8c-b4be-e8f955ac7123", + "uuid": "d624cf65-aabb-4f9d-a92a-36fd3a7b8b4f", "control-id": "cis_rhel10_6-1.1", "description": "No notes for control-id 6.1.1.", "props": [ @@ -8906,7 +8854,7 @@ ] }, { - "uuid": "20e54043-1e1a-4af4-bd96-e34b049fc62f", + "uuid": "5ae67b38-1a62-4116-8586-15c974f5c6a4", "control-id": "cis_rhel10_6-1.2", "description": "No notes for control-id 6.1.2.", "props": [ @@ -8923,7 +8871,7 @@ ] }, { - "uuid": "62996004-1bf9-47a5-9fc8-e5f76f914515", + "uuid": "9774691a-0c52-425b-8b74-7f3130c343db", "control-id": "cis_rhel10_6-1.3", "description": "No notes for control-id 6.1.3.", "props": [ @@ -8940,7 +8888,7 @@ ] }, { - "uuid": "93684fc0-1cc2-4015-981c-3535bc87d6c1", + "uuid": "3c53ca89-607b-4ebb-88b1-7806b526ee33", "control-id": "cis_rhel10_6-2.1.1", "description": "No notes for control-id 6.2.1.1.", "props": [ @@ -8957,7 +8905,7 @@ ] }, { - "uuid": "e6e19614-5218-4cc5-88f9-8a96b49f5145", + "uuid": "599121ab-6d8d-4e14-b433-363d3551f6a9", "control-id": "cis_rhel10_6-2.1.2", "description": "The description for control-id cis_rhel10_6-2.1.2.", "props": [ @@ -8970,7 +8918,7 @@ ] }, { - "uuid": "545e3e6c-00c7-468c-8272-ea87fa106f0e", + "uuid": "34d89a31-5062-4279-99f6-d24212b1ed90", "control-id": "cis_rhel10_6-2.1.3", "description": "The description for control-id cis_rhel10_6-2.1.3.", "props": [ @@ -8983,7 +8931,7 @@ ] }, { - "uuid": "a379d0cf-bcab-4399-b60c-b0895167b3ef", + "uuid": "2a4f68f4-039b-43bb-9b5c-1d6927088101", "control-id": "cis_rhel10_6-2.1.4", "description": "No notes for control-id 6.2.1.4.", "props": [ @@ -9000,7 +8948,7 @@ ] }, { - "uuid": "d808ad0a-afa9-45c4-9941-4141724b5fc0", + "uuid": "646a77e7-45a0-4355-9539-863f8f098638", "control-id": "cis_rhel10_6-2.2.1.1", "description": "No notes for control-id 6.2.2.1.1.", "props": [ @@ -9017,7 +8965,7 @@ ] }, { - "uuid": "810d7e80-e123-4d92-b5d6-6f4dcb2f1a6f", + "uuid": "930e6cfb-be67-4120-9062-342a8fd37d80", "control-id": "cis_rhel10_6-2.2.1.2", "description": "The description for control-id cis_rhel10_6-2.2.1.2.", "props": [ @@ -9030,7 +8978,7 @@ ] }, { - "uuid": "c3978c22-66a6-4688-a30c-c03ed6655af5", + "uuid": "a9ad43f1-63a7-4651-89b2-75719525bb9d", "control-id": "cis_rhel10_6-2.2.1.3", "description": "No notes for control-id 6.2.2.1.3.", "props": [ @@ -9047,7 +8995,7 @@ ] }, { - "uuid": "aef28fe1-ae9f-481a-9594-9f875b367327", + "uuid": "ca7d2adf-34ea-4843-ac7f-cac992d3ce0c", "control-id": "cis_rhel10_6-2.2.1.4", "description": "No notes for control-id 6.2.2.1.4.", "props": [ @@ -9064,7 +9012,7 @@ ] }, { - "uuid": "50b77de1-3431-46a0-8415-9ca7376caa47", + "uuid": "8105de85-ff95-4c15-bda7-48e6ecf14816", "control-id": "cis_rhel10_6-2.2.2", "description": "No notes for control-id 6.2.2.2.", "props": [ @@ -9081,7 +9029,7 @@ ] }, { - "uuid": "4d2cacfe-505b-4753-bb23-1cb1bc87f87d", + "uuid": "37437526-cd83-484f-9fdb-93c791595643", "control-id": "cis_rhel10_6-2.2.3", "description": "No notes for control-id 6.2.2.3.", "props": [ @@ -9098,7 +9046,7 @@ ] }, { - "uuid": "78470d8f-60a0-449a-903f-392bc4dd3f6d", + "uuid": "d325f91f-3d9e-4de7-b8d4-8150d5e5e1fd", "control-id": "cis_rhel10_6-2.2.4", "description": "No notes for control-id 6.2.2.4.", "props": [ @@ -9115,7 +9063,7 @@ ] }, { - "uuid": "0ec0402f-a12f-4af0-b824-0aeacb71636a", + "uuid": "15a52b06-917c-454a-aa1a-710b3b8171cb", "control-id": "cis_rhel10_6-2.3.1", "description": "No notes for control-id 6.2.3.1.", "props": [ @@ -9127,7 +9075,7 @@ ] }, { - "uuid": "9fdf9a5d-ce18-4b71-97fe-f80f4d64d755", + "uuid": "3c2866f9-c51d-423e-9ee2-d643b97382ec", "control-id": "cis_rhel10_6-2.3.2", "description": "No notes for control-id 6.2.3.2.", "props": [ @@ -9139,7 +9087,7 @@ ] }, { - "uuid": "a13b88ca-e228-4e6e-8b9c-77f0f9facaec", + "uuid": "5e8f3e70-b8eb-42a2-9874-e7a4e4235b02", "control-id": "cis_rhel10_6-2.3.3", "description": "No notes for control-id 6.2.3.3.", "props": [ @@ -9151,7 +9099,7 @@ ] }, { - "uuid": "7a0785fe-3c73-44ff-b0ae-6edfac323ae5", + "uuid": "e27d0677-9fbf-4073-a182-4bddd3e6ee12", "control-id": "cis_rhel10_6-2.3.4", "description": "No notes for control-id 6.2.3.4.", "props": [ @@ -9163,7 +9111,7 @@ ] }, { - "uuid": "ccc02cde-bfe0-4d30-869b-1c625d72e27e", + "uuid": "3fd76439-4dcf-4674-b11e-50374789dcc2", "control-id": "cis_rhel10_6-2.3.5", "description": "The description for control-id cis_rhel10_6-2.3.5.", "props": [ @@ -9176,7 +9124,7 @@ ] }, { - "uuid": "2b5218ef-1c63-407c-b3ef-671283d85706", + "uuid": "30ae0e9c-8912-49d1-97d1-985f93e0258d", "control-id": "cis_rhel10_6-2.3.6", "description": "The description for control-id cis_rhel10_6-2.3.6.", "props": [ @@ -9189,7 +9137,7 @@ ] }, { - "uuid": "0a7bd6d7-45b9-4772-a169-d53def63a49c", + "uuid": "c16c2abd-bcb4-4a39-ae07-c05cf5080c94", "control-id": "cis_rhel10_6-2.3.7", "description": "No notes for control-id 6.2.3.7.", "props": [ @@ -9201,7 +9149,7 @@ ] }, { - "uuid": "cfa77e5f-36c3-4b52-a1b0-352aab2df50d", + "uuid": "c6cf33a4-7873-4ee2-abda-210679d9ebd9", "control-id": "cis_rhel10_6-2.3.8", "description": "The description for control-id cis_rhel10_6-2.3.8.", "props": [ @@ -9214,7 +9162,7 @@ ] }, { - "uuid": "25da556c-4fd9-4c26-9eea-867031aa861c", + "uuid": "c42caa3c-9074-4bfb-b3c9-dad18aeabd39", "control-id": "cis_rhel10_6-2.4.1", "description": "It is not harmful to run these rules even if rsyslog is not installed or active.", "props": [ @@ -9241,7 +9189,7 @@ ] }, { - "uuid": "33e41a07-9678-4eca-902a-bdb7fd162f7d", + "uuid": "c792f3de-9713-4853-ba43-c8711dc674d8", "control-id": "cis_rhel10_7-1.1", "description": "No notes for control-id 7.1.1.", "props": [ @@ -9268,7 +9216,7 @@ ] }, { - "uuid": "6b3f25fd-1b61-42c4-96b3-887a28d307d3", + "uuid": "79a7e5c6-c588-44c0-8f39-e1363ee85140", "control-id": "cis_rhel10_7-1.2", "description": "No notes for control-id 7.1.2.", "props": [ @@ -9295,7 +9243,7 @@ ] }, { - "uuid": "b79172d5-e1ba-4416-80d2-1effda6d77e7", + "uuid": "db530ad5-9fad-4bc4-8c75-453a3fdce73c", "control-id": "cis_rhel10_7-1.3", "description": "No notes for control-id 7.1.3.", "props": [ @@ -9322,7 +9270,7 @@ ] }, { - "uuid": "e4f0a145-8f94-40c4-a4cf-757a958d8f9a", + "uuid": "95f0f15d-e383-4e64-accc-c90ae7de3080", "control-id": "cis_rhel10_7-1.4", "description": "No notes for control-id 7.1.4.", "props": [ @@ -9349,7 +9297,7 @@ ] }, { - "uuid": "b0c4351a-b3d5-4f74-b4c0-53d5ecd79b01", + "uuid": "5f741792-f423-484f-9cfc-f12875a54a55", "control-id": "cis_rhel10_7-1.5", "description": "No notes for control-id 7.1.5.", "props": [ @@ -9376,7 +9324,7 @@ ] }, { - "uuid": "c8b98624-9bc9-4895-90c3-fd3ae886e25c", + "uuid": "3ec6d8f5-fbfa-462c-b3d5-90d7593a7404", "control-id": "cis_rhel10_7-1.6", "description": "No notes for control-id 7.1.6.", "props": [ @@ -9403,7 +9351,7 @@ ] }, { - "uuid": "9a8d19a4-8e2d-4a1a-9a5d-fcef0a33330e", + "uuid": "a8daa933-5765-47ee-a9c5-8dd8a3d0ce72", "control-id": "cis_rhel10_7-1.7", "description": "No notes for control-id 7.1.7.", "props": [ @@ -9430,7 +9378,7 @@ ] }, { - "uuid": "e9f08f97-c0eb-40cb-88c7-f917cd2ce0e9", + "uuid": "980d31c4-7a44-45c3-8f36-d51c13bad8fb", "control-id": "cis_rhel10_7-1.8", "description": "No notes for control-id 7.1.8.", "props": [ @@ -9457,7 +9405,7 @@ ] }, { - "uuid": "3b39e046-c552-4da6-9689-a0abfd0e94c0", + "uuid": "bfd4a6a6-d507-470e-8582-c8030d428e72", "control-id": "cis_rhel10_7-1.9", "description": "No notes for control-id 7.1.9.", "props": [ @@ -9484,7 +9432,7 @@ ] }, { - "uuid": "22c05cca-2447-49b7-8c76-3ed3282e6309", + "uuid": "407a4836-7155-421f-9a46-bc0fc0386585", "control-id": "cis_rhel10_7-1.10", "description": "No notes for control-id 7.1.10.", "props": [ @@ -9526,7 +9474,7 @@ ] }, { - "uuid": "b7041267-b64d-4962-af24-1c6d9be4b110", + "uuid": "eb4b8b1c-5139-4d36-b1cd-e7828d4cd0ce", "control-id": "cis_rhel10_7-1.11", "description": "No notes for control-id 7.1.11.", "props": [ @@ -9548,7 +9496,7 @@ ] }, { - "uuid": "eefbe65e-bd7b-4742-ac61-2cab5146f9a1", + "uuid": "9631301a-2a15-4565-bdd3-03ae51b5df1f", "control-id": "cis_rhel10_7-1.12", "description": "No notes for control-id 7.1.12.", "props": [ @@ -9570,7 +9518,7 @@ ] }, { - "uuid": "a55b1d4b-874c-4309-a26f-9247cbc207c7", + "uuid": "1d9128ed-5522-4f66-9b76-be593b14713b", "control-id": "cis_rhel10_7-1.13", "description": "The description for control-id cis_rhel10_7-1.13.", "props": [ @@ -9583,7 +9531,7 @@ ] }, { - "uuid": "3ffcca71-b144-40b1-b5ec-23ac5a32d735", + "uuid": "9e2fdb87-8506-4fa6-95bf-99a7899b3cea", "control-id": "cis_rhel10_7-2.1", "description": "No notes for control-id 7.2.1.", "props": [ @@ -9600,7 +9548,7 @@ ] }, { - "uuid": "6b31c4e0-ba9c-4c99-a586-598a526b3c10", + "uuid": "800ae2da-c3a0-4ce6-9fff-48ee9b46b8c6", "control-id": "cis_rhel10_7-2.2", "description": "No notes for control-id 7.2.2.", "props": [ @@ -9617,7 +9565,7 @@ ] }, { - "uuid": "ddb14fd1-3fb1-4892-93fa-412f2f6f3873", + "uuid": "e2575045-b1dc-4210-8a16-7ad18a253dbd", "control-id": "cis_rhel10_7-2.3", "description": "No notes for control-id 7.2.3.", "props": [ @@ -9634,7 +9582,7 @@ ] }, { - "uuid": "ef5b7c5d-d611-4ffd-8031-70abd2754247", + "uuid": "7ce737c5-b1f1-4ab8-b5b0-223d3e9ecdb6", "control-id": "cis_rhel10_7-2.4", "description": "No notes for control-id 7.2.4.", "props": [ @@ -9651,7 +9599,7 @@ ] }, { - "uuid": "0bcabb4e-4980-44b7-af8d-2b908d7d2031", + "uuid": "f0fe2d68-5d44-4f16-9ad8-8177b77add96", "control-id": "cis_rhel10_7-2.5", "description": "No notes for control-id 7.2.5.", "props": [ @@ -9668,7 +9616,7 @@ ] }, { - "uuid": "b1ec177c-4919-4d4c-acd3-9318f38ff066", + "uuid": "24758ee0-ee88-4967-9fb6-051494062ca4", "control-id": "cis_rhel10_7-2.6", "description": "No notes for control-id 7.2.6.", "props": [ @@ -9685,7 +9633,7 @@ ] }, { - "uuid": "b9643b66-088b-4376-80fe-a52373cf57ed", + "uuid": "6479df70-9508-48ff-a751-d4ff8921b778", "control-id": "cis_rhel10_7-2.7", "description": "No notes for control-id 7.2.7.", "props": [ @@ -9702,7 +9650,7 @@ ] }, { - "uuid": "d53339a3-34bd-4dfa-b8a9-d5765522acc2", + "uuid": "b4be79c9-e614-4890-91ca-4af9acff4c0f", "control-id": "cis_rhel10_7-2.8", "description": "No notes for control-id 7.2.8.", "props": [ @@ -9729,7 +9677,7 @@ ] }, { - "uuid": "a3ad7781-0424-4df5-afe2-f30b4375d056", + "uuid": "8fa671b1-3e1c-4a68-b52b-5ac1e07a01d1", "control-id": "cis_rhel10_7-2.9", "description": "No notes for control-id 7.2.9.", "props": [ @@ -11635,6847 +11583,6775 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_grub2_cfg", + "value": "file_permissions_boot_grub2", "remarks": "rule_set_034" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/grub.cfg Group Ownership", + "value": "All GRUB configuration files must have mode 0600 or more restrictive", "remarks": "rule_set_034" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_grub2_cfg", + "value": "file_permissions_boot_grub2", "remarks": "rule_set_034" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/grub.cfg Group Ownership", + "value": "All GRUB configuration files must have mode 0600 or more restrictive", "remarks": "rule_set_034" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_grub2_cfg", + "value": "file_owner_boot_grub2", "remarks": "rule_set_035" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/grub.cfg User Ownership", + "value": "All GRUB configuration files must be owned by root", "remarks": "rule_set_035" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_grub2_cfg", + "value": "file_owner_boot_grub2", "remarks": "rule_set_035" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/grub.cfg User Ownership", + "value": "All GRUB configuration files must be owned by root", "remarks": "rule_set_035" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_grub2_cfg", + "value": "file_groupowner_boot_grub2", "remarks": "rule_set_036" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/grub.cfg Permissions", + "value": "All GRUB configuration files must be group-owned by root", "remarks": "rule_set_036" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_grub2_cfg", + "value": "file_groupowner_boot_grub2", "remarks": "rule_set_036" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/grub.cfg Permissions", + "value": "All GRUB configuration files must be group-owned by root", "remarks": "rule_set_036" }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_user_cfg", - "remarks": "rule_set_037" - }, - { - "name": "Rule_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/user.cfg Group Ownership", - "remarks": "rule_set_037" - }, - { - "name": "Check_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_user_cfg", - "remarks": "rule_set_037" - }, - { - "name": "Check_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/user.cfg Group Ownership", - "remarks": "rule_set_037" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_user_cfg", - "remarks": "rule_set_038" - }, - { - "name": "Rule_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/user.cfg User Ownership", - "remarks": "rule_set_038" - }, - { - "name": "Check_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_user_cfg", - "remarks": "rule_set_038" - }, - { - "name": "Check_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/user.cfg User Ownership", - "remarks": "rule_set_038" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_user_cfg", - "remarks": "rule_set_039" - }, - { - "name": "Rule_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/user.cfg Permissions", - "remarks": "rule_set_039" - }, - { - "name": "Check_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_user_cfg", - "remarks": "rule_set_039" - }, - { - "name": "Check_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/user.cfg Permissions", - "remarks": "rule_set_039" - }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_users_coredumps", - "remarks": "rule_set_040" + "remarks": "rule_set_037" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Core Dumps for All Users", - "remarks": "rule_set_040" + "remarks": "rule_set_037" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_users_coredumps", - "remarks": "rule_set_040" + "remarks": "rule_set_037" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Core Dumps for All Users", - "remarks": "rule_set_040" + "remarks": "rule_set_037" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_hardlinks", - "remarks": "rule_set_041" + "remarks": "rule_set_038" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Hardlinks", - "remarks": "rule_set_041" + "remarks": "rule_set_038" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_hardlinks", - "remarks": "rule_set_041" + "remarks": "rule_set_038" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Hardlinks", - "remarks": "rule_set_041" + "remarks": "rule_set_038" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_suid_dumpable", - "remarks": "rule_set_042" + "remarks": "rule_set_039" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Core Dumps for SUID programs", - "remarks": "rule_set_042" + "remarks": "rule_set_039" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_suid_dumpable", - "remarks": "rule_set_042" + "remarks": "rule_set_039" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Core Dumps for SUID programs", - "remarks": "rule_set_042" + "remarks": "rule_set_039" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_dmesg_restrict", - "remarks": "rule_set_043" + "remarks": "rule_set_040" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Access to Kernel Message Buffer", - "remarks": "rule_set_043" + "remarks": "rule_set_040" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_dmesg_restrict", - "remarks": "rule_set_043" + "remarks": "rule_set_040" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Access to Kernel Message Buffer", - "remarks": "rule_set_043" + "remarks": "rule_set_040" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_kptr_restrict", - "remarks": "rule_set_044" + "remarks": "rule_set_041" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Exposed Kernel Pointer Addresses Access", - "remarks": "rule_set_044" + "remarks": "rule_set_041" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_kptr_restrict", - "remarks": "rule_set_044" + "remarks": "rule_set_041" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Exposed Kernel Pointer Addresses Access", - "remarks": "rule_set_044" + "remarks": "rule_set_041" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_yama_ptrace_scope", - "remarks": "rule_set_045" + "remarks": "rule_set_042" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict usage of ptrace to descendant processes", - "remarks": "rule_set_045" + "remarks": "rule_set_042" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_yama_ptrace_scope", - "remarks": "rule_set_045" + "remarks": "rule_set_042" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict usage of ptrace to descendant processes", - "remarks": "rule_set_045" + "remarks": "rule_set_042" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_randomize_va_space", - "remarks": "rule_set_046" + "remarks": "rule_set_043" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Randomized Layout of Virtual Address Space", - "remarks": "rule_set_046" + "remarks": "rule_set_043" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_randomize_va_space", - "remarks": "rule_set_046" + "remarks": "rule_set_043" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Randomized Layout of Virtual Address Space", - "remarks": "rule_set_046" + "remarks": "rule_set_043" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "coredump_disable_backtraces", - "remarks": "rule_set_047" + "remarks": "rule_set_044" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable core dump backtraces", - "remarks": "rule_set_047" + "remarks": "rule_set_044" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "coredump_disable_backtraces", - "remarks": "rule_set_047" + "remarks": "rule_set_044" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable core dump backtraces", - "remarks": "rule_set_047" + "remarks": "rule_set_044" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "coredump_disable_storage", - "remarks": "rule_set_048" + "remarks": "rule_set_045" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable storing core dump", - "remarks": "rule_set_048" + "remarks": "rule_set_045" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "coredump_disable_storage", - "remarks": "rule_set_048" + "remarks": "rule_set_045" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable storing core dump", - "remarks": "rule_set_048" + "remarks": "rule_set_045" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_custom_crypto_policy_cis", - "remarks": "rule_set_049" + "remarks": "rule_set_046" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Implement Custom Crypto Policy Modules for CIS Benchmark", - "remarks": "rule_set_049" + "remarks": "rule_set_046" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_custom_crypto_policy_cis", - "remarks": "rule_set_049" + "remarks": "rule_set_046" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Implement Custom Crypto Policy Modules for CIS Benchmark", - "remarks": "rule_set_049" + "remarks": "rule_set_046" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "banner_etc_motd_cis", - "remarks": "rule_set_050" + "remarks": "rule_set_047" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Message Of The Day Is Configured Properly", - "remarks": "rule_set_050" + "remarks": "rule_set_047" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "banner_etc_motd_cis", - "remarks": "rule_set_050" + "remarks": "rule_set_047" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Message Of The Day Is Configured Properly", - "remarks": "rule_set_050" + "remarks": "rule_set_047" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "banner_etc_issue_cis", - "remarks": "rule_set_051" + "remarks": "rule_set_048" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Local Login Warning Banner Is Configured Properly", - "remarks": "rule_set_051" + "remarks": "rule_set_048" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "banner_etc_issue_cis", - "remarks": "rule_set_051" + "remarks": "rule_set_048" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Local Login Warning Banner Is Configured Properly", - "remarks": "rule_set_051" + "remarks": "rule_set_048" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "banner_etc_issue_net_cis", - "remarks": "rule_set_052" + "remarks": "rule_set_049" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Remote Login Warning Banner Is Configured Properly", - "remarks": "rule_set_052" + "remarks": "rule_set_049" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "banner_etc_issue_net_cis", - "remarks": "rule_set_052" + "remarks": "rule_set_049" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Remote Login Warning Banner Is Configured Properly", - "remarks": "rule_set_052" + "remarks": "rule_set_049" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_motd", - "remarks": "rule_set_053" + "remarks": "rule_set_050" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership of Message of the Day Banner", - "remarks": "rule_set_053" + "remarks": "rule_set_050" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_motd", - "remarks": "rule_set_053" + "remarks": "rule_set_050" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership of Message of the Day Banner", - "remarks": "rule_set_053" + "remarks": "rule_set_050" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_motd", - "remarks": "rule_set_054" + "remarks": "rule_set_051" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify ownership of Message of the Day Banner", - "remarks": "rule_set_054" + "remarks": "rule_set_051" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_motd", - "remarks": "rule_set_054" + "remarks": "rule_set_051" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify ownership of Message of the Day Banner", - "remarks": "rule_set_054" + "remarks": "rule_set_051" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_motd", - "remarks": "rule_set_055" + "remarks": "rule_set_052" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify permissions on Message of the Day Banner", - "remarks": "rule_set_055" + "remarks": "rule_set_052" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_motd", - "remarks": "rule_set_055" + "remarks": "rule_set_052" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify permissions on Message of the Day Banner", - "remarks": "rule_set_055" + "remarks": "rule_set_052" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_issue", - "remarks": "rule_set_056" + "remarks": "rule_set_053" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership of System Login Banner", - "remarks": "rule_set_056" + "remarks": "rule_set_053" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_issue", - "remarks": "rule_set_056" + "remarks": "rule_set_053" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership of System Login Banner", - "remarks": "rule_set_056" + "remarks": "rule_set_053" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_issue", - "remarks": "rule_set_057" + "remarks": "rule_set_054" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify ownership of System Login Banner", - "remarks": "rule_set_057" + "remarks": "rule_set_054" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_issue", - "remarks": "rule_set_057" + "remarks": "rule_set_054" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify ownership of System Login Banner", - "remarks": "rule_set_057" + "remarks": "rule_set_054" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_issue", - "remarks": "rule_set_058" + "remarks": "rule_set_055" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify permissions on System Login Banner", - "remarks": "rule_set_058" + "remarks": "rule_set_055" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_issue", - "remarks": "rule_set_058" + "remarks": "rule_set_055" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify permissions on System Login Banner", - "remarks": "rule_set_058" + "remarks": "rule_set_055" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_issue_net", - "remarks": "rule_set_059" + "remarks": "rule_set_056" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership of System Login Banner for Remote Connections", - "remarks": "rule_set_059" + "remarks": "rule_set_056" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_issue_net", - "remarks": "rule_set_059" + "remarks": "rule_set_056" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership of System Login Banner for Remote Connections", - "remarks": "rule_set_059" + "remarks": "rule_set_056" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_issue_net", - "remarks": "rule_set_060" + "remarks": "rule_set_057" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify ownership of System Login Banner for Remote Connections", - "remarks": "rule_set_060" + "remarks": "rule_set_057" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_issue_net", - "remarks": "rule_set_060" + "remarks": "rule_set_057" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify ownership of System Login Banner for Remote Connections", - "remarks": "rule_set_060" + "remarks": "rule_set_057" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_issue_net", - "remarks": "rule_set_061" + "remarks": "rule_set_058" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify permissions on System Login Banner for Remote Connections", - "remarks": "rule_set_061" + "remarks": "rule_set_058" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_issue_net", - "remarks": "rule_set_061" + "remarks": "rule_set_058" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify permissions on System Login Banner for Remote Connections", - "remarks": "rule_set_061" + "remarks": "rule_set_058" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_banner_enabled", - "remarks": "rule_set_062" + "remarks": "rule_set_059" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable GNOME3 Login Warning Banner", - "remarks": "rule_set_062" + "remarks": "rule_set_059" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_banner_enabled", - "remarks": "rule_set_062" + "remarks": "rule_set_059" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable GNOME3 Login Warning Banner", - "remarks": "rule_set_062" + "remarks": "rule_set_059" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_login_banner_text", - "remarks": "rule_set_063" + "remarks": "rule_set_060" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set the GNOME3 Login Warning Banner Text", - "remarks": "rule_set_063" + "remarks": "rule_set_060" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_login_banner_text", - "remarks": "rule_set_063" + "remarks": "rule_set_060" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set the GNOME3 Login Warning Banner Text", - "remarks": "rule_set_063" + "remarks": "rule_set_060" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_user_list", - "remarks": "rule_set_064" + "remarks": "rule_set_061" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the GNOME3 Login User List", - "remarks": "rule_set_064" + "remarks": "rule_set_061" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_user_list", - "remarks": "rule_set_064" + "remarks": "rule_set_061" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the GNOME3 Login User List", - "remarks": "rule_set_064" + "remarks": "rule_set_061" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_idle_delay", - "remarks": "rule_set_065" + "remarks": "rule_set_062" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set GNOME3 Screensaver Inactivity Timeout", - "remarks": "rule_set_065" + "remarks": "rule_set_062" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_idle_delay", - "remarks": "rule_set_065" + "remarks": "rule_set_062" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set GNOME3 Screensaver Inactivity Timeout", - "remarks": "rule_set_065" + "remarks": "rule_set_062" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_lock_delay", - "remarks": "rule_set_066" + "remarks": "rule_set_063" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set GNOME3 Screensaver Lock Delay After Activation Period", - "remarks": "rule_set_066" + "remarks": "rule_set_063" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_lock_delay", - "remarks": "rule_set_066" + "remarks": "rule_set_063" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set GNOME3 Screensaver Lock Delay After Activation Period", - "remarks": "rule_set_066" + "remarks": "rule_set_063" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_session_idle_user_locks", - "remarks": "rule_set_067" + "remarks": "rule_set_064" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Cannot Change GNOME3 Session Idle Settings", - "remarks": "rule_set_067" + "remarks": "rule_set_064" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_session_idle_user_locks", - "remarks": "rule_set_067" + "remarks": "rule_set_064" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Cannot Change GNOME3 Session Idle Settings", - "remarks": "rule_set_067" + "remarks": "rule_set_064" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_user_locks", - "remarks": "rule_set_068" + "remarks": "rule_set_065" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Cannot Change GNOME3 Screensaver Settings", - "remarks": "rule_set_068" + "remarks": "rule_set_065" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_user_locks", - "remarks": "rule_set_068" + "remarks": "rule_set_065" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Cannot Change GNOME3 Screensaver Settings", - "remarks": "rule_set_068" + "remarks": "rule_set_065" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_autorun", - "remarks": "rule_set_069" + "remarks": "rule_set_066" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automount running", - "remarks": "rule_set_069" + "remarks": "rule_set_066" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_autorun", - "remarks": "rule_set_069" + "remarks": "rule_set_066" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automount running", - "remarks": "rule_set_069" + "remarks": "rule_set_066" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_kea_removed", - "remarks": "rule_set_070" + "remarks": "rule_set_067" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall kea Package", - "remarks": "rule_set_070" + "remarks": "rule_set_067" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_kea_removed", - "remarks": "rule_set_070" + "remarks": "rule_set_067" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall kea Package", - "remarks": "rule_set_070" + "remarks": "rule_set_067" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_bind_removed", - "remarks": "rule_set_071" + "remarks": "rule_set_068" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall bind Package", - "remarks": "rule_set_071" + "remarks": "rule_set_068" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_bind_removed", - "remarks": "rule_set_071" + "remarks": "rule_set_068" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall bind Package", - "remarks": "rule_set_071" + "remarks": "rule_set_068" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_dnsmasq_removed", - "remarks": "rule_set_072" + "remarks": "rule_set_069" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall dnsmasq Package", - "remarks": "rule_set_072" + "remarks": "rule_set_069" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_dnsmasq_removed", - "remarks": "rule_set_072" + "remarks": "rule_set_069" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall dnsmasq Package", - "remarks": "rule_set_072" + "remarks": "rule_set_069" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_vsftpd_removed", - "remarks": "rule_set_073" + "remarks": "rule_set_070" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall vsftpd Package", - "remarks": "rule_set_073" + "remarks": "rule_set_070" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_vsftpd_removed", - "remarks": "rule_set_073" + "remarks": "rule_set_070" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall vsftpd Package", - "remarks": "rule_set_073" + "remarks": "rule_set_070" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_dovecot_removed", - "remarks": "rule_set_074" + "remarks": "rule_set_071" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall dovecot Package", - "remarks": "rule_set_074" + "remarks": "rule_set_071" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_dovecot_removed", - "remarks": "rule_set_074" + "remarks": "rule_set_071" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall dovecot Package", - "remarks": "rule_set_074" + "remarks": "rule_set_071" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_cyrus-imapd_removed", - "remarks": "rule_set_075" + "remarks": "rule_set_072" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall cyrus-imapd Package", - "remarks": "rule_set_075" + "remarks": "rule_set_072" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_cyrus-imapd_removed", - "remarks": "rule_set_075" + "remarks": "rule_set_072" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall cyrus-imapd Package", - "remarks": "rule_set_075" + "remarks": "rule_set_072" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_nfs_disabled", - "remarks": "rule_set_076" + "remarks": "rule_set_073" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Network File System (nfs)", - "remarks": "rule_set_076" + "remarks": "rule_set_073" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_nfs_disabled", - "remarks": "rule_set_076" + "remarks": "rule_set_073" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Network File System (nfs)", - "remarks": "rule_set_076" + "remarks": "rule_set_073" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_rpcbind_disabled", - "remarks": "rule_set_077" + "remarks": "rule_set_074" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable rpcbind Service", - "remarks": "rule_set_077" + "remarks": "rule_set_074" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_rpcbind_disabled", - "remarks": "rule_set_077" + "remarks": "rule_set_074" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable rpcbind Service", - "remarks": "rule_set_077" + "remarks": "rule_set_074" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_rsync_removed", - "remarks": "rule_set_078" + "remarks": "rule_set_075" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall rsync Package", - "remarks": "rule_set_078" + "remarks": "rule_set_075" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_rsync_removed", - "remarks": "rule_set_078" + "remarks": "rule_set_075" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall rsync Package", - "remarks": "rule_set_078" + "remarks": "rule_set_075" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_samba_removed", - "remarks": "rule_set_079" + "remarks": "rule_set_076" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall Samba Package", - "remarks": "rule_set_079" + "remarks": "rule_set_076" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_samba_removed", - "remarks": "rule_set_079" + "remarks": "rule_set_076" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall Samba Package", - "remarks": "rule_set_079" + "remarks": "rule_set_076" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_net-snmp_removed", - "remarks": "rule_set_080" + "remarks": "rule_set_077" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall net-snmp Package", - "remarks": "rule_set_080" + "remarks": "rule_set_077" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_net-snmp_removed", - "remarks": "rule_set_080" + "remarks": "rule_set_077" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall net-snmp Package", - "remarks": "rule_set_080" + "remarks": "rule_set_077" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_telnet-server_removed", - "remarks": "rule_set_081" + "remarks": "rule_set_078" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall telnet-server Package", - "remarks": "rule_set_081" + "remarks": "rule_set_078" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_telnet-server_removed", - "remarks": "rule_set_081" + "remarks": "rule_set_078" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall telnet-server Package", - "remarks": "rule_set_081" + "remarks": "rule_set_078" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_tftp-server_removed", - "remarks": "rule_set_082" + "remarks": "rule_set_079" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall tftp-server Package", - "remarks": "rule_set_082" + "remarks": "rule_set_079" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_tftp-server_removed", - "remarks": "rule_set_082" + "remarks": "rule_set_079" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall tftp-server Package", - "remarks": "rule_set_082" + "remarks": "rule_set_079" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_squid_removed", - "remarks": "rule_set_083" + "remarks": "rule_set_080" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall squid Package", - "remarks": "rule_set_083" + "remarks": "rule_set_080" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_squid_removed", - "remarks": "rule_set_083" + "remarks": "rule_set_080" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall squid Package", - "remarks": "rule_set_083" + "remarks": "rule_set_080" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_httpd_removed", - "remarks": "rule_set_084" + "remarks": "rule_set_081" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall httpd Package", - "remarks": "rule_set_084" + "remarks": "rule_set_081" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_httpd_removed", - "remarks": "rule_set_084" + "remarks": "rule_set_081" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall httpd Package", - "remarks": "rule_set_084" + "remarks": "rule_set_081" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_nginx_removed", - "remarks": "rule_set_085" + "remarks": "rule_set_082" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall nginx Package", - "remarks": "rule_set_085" + "remarks": "rule_set_082" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_nginx_removed", - "remarks": "rule_set_085" + "remarks": "rule_set_082" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall nginx Package", - "remarks": "rule_set_085" + "remarks": "rule_set_082" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "postfix_network_listening_disabled", - "remarks": "rule_set_086" + "remarks": "rule_set_083" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Postfix Network Listening", - "remarks": "rule_set_086" + "remarks": "rule_set_083" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "postfix_network_listening_disabled", - "remarks": "rule_set_086" + "remarks": "rule_set_083" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Postfix Network Listening", - "remarks": "rule_set_086" + "remarks": "rule_set_083" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "has_nonlocal_mta", - "remarks": "rule_set_087" + "remarks": "rule_set_084" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Mail Transfer Agent is not Listening on any non-loopback Address", - "remarks": "rule_set_087" + "remarks": "rule_set_084" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "has_nonlocal_mta", - "remarks": "rule_set_087" + "remarks": "rule_set_084" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Mail Transfer Agent is not Listening on any non-loopback Address", - "remarks": "rule_set_087" + "remarks": "rule_set_084" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_ftp_removed", - "remarks": "rule_set_088" + "remarks": "rule_set_085" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove ftp Package", - "remarks": "rule_set_088" + "remarks": "rule_set_085" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_ftp_removed", - "remarks": "rule_set_088" + "remarks": "rule_set_085" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove ftp Package", - "remarks": "rule_set_088" + "remarks": "rule_set_085" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_telnet_removed", - "remarks": "rule_set_089" + "remarks": "rule_set_086" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove telnet Clients", - "remarks": "rule_set_089" + "remarks": "rule_set_086" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_telnet_removed", - "remarks": "rule_set_089" + "remarks": "rule_set_086" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove telnet Clients", - "remarks": "rule_set_089" + "remarks": "rule_set_086" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_tftp_removed", - "remarks": "rule_set_090" + "remarks": "rule_set_087" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove tftp Daemon", - "remarks": "rule_set_090" + "remarks": "rule_set_087" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_tftp_removed", - "remarks": "rule_set_090" + "remarks": "rule_set_087" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove tftp Daemon", - "remarks": "rule_set_090" + "remarks": "rule_set_087" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_specify_remote_server", - "remarks": "rule_set_091" + "remarks": "rule_set_088" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "A remote time server for Chrony is configured", - "remarks": "rule_set_091" + "remarks": "rule_set_088" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_specify_remote_server", - "remarks": "rule_set_091" + "remarks": "rule_set_088" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "A remote time server for Chrony is configured", - "remarks": "rule_set_091" + "remarks": "rule_set_088" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_run_as_chrony_user", - "remarks": "rule_set_092" + "remarks": "rule_set_089" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that chronyd is running under chrony user account", - "remarks": "rule_set_092" + "remarks": "rule_set_089" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_run_as_chrony_user", - "remarks": "rule_set_092" + "remarks": "rule_set_089" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that chronyd is running under chrony user account", - "remarks": "rule_set_092" + "remarks": "rule_set_089" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_cron_installed", - "remarks": "rule_set_093" + "remarks": "rule_set_090" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install the cron service", - "remarks": "rule_set_093" + "remarks": "rule_set_090" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_cron_installed", - "remarks": "rule_set_093" + "remarks": "rule_set_090" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install the cron service", - "remarks": "rule_set_093" + "remarks": "rule_set_090" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_crond_enabled", - "remarks": "rule_set_094" + "remarks": "rule_set_091" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable cron Service", - "remarks": "rule_set_094" + "remarks": "rule_set_091" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_crond_enabled", - "remarks": "rule_set_094" + "remarks": "rule_set_091" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable cron Service", - "remarks": "rule_set_094" + "remarks": "rule_set_091" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_crontab", - "remarks": "rule_set_095" + "remarks": "rule_set_092" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Crontab", - "remarks": "rule_set_095" + "remarks": "rule_set_092" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_crontab", - "remarks": "rule_set_095" + "remarks": "rule_set_092" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Crontab", - "remarks": "rule_set_095" + "remarks": "rule_set_092" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_crontab", - "remarks": "rule_set_096" + "remarks": "rule_set_093" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on crontab", - "remarks": "rule_set_096" + "remarks": "rule_set_093" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_crontab", - "remarks": "rule_set_096" + "remarks": "rule_set_093" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on crontab", - "remarks": "rule_set_096" + "remarks": "rule_set_093" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_crontab", - "remarks": "rule_set_097" + "remarks": "rule_set_094" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on crontab", - "remarks": "rule_set_097" + "remarks": "rule_set_094" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_crontab", - "remarks": "rule_set_097" + "remarks": "rule_set_094" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on crontab", - "remarks": "rule_set_097" + "remarks": "rule_set_094" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_hourly", - "remarks": "rule_set_098" + "remarks": "rule_set_095" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.hourly", - "remarks": "rule_set_098" + "remarks": "rule_set_095" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_hourly", - "remarks": "rule_set_098" + "remarks": "rule_set_095" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.hourly", - "remarks": "rule_set_098" + "remarks": "rule_set_095" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_hourly", - "remarks": "rule_set_099" + "remarks": "rule_set_096" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.hourly", - "remarks": "rule_set_099" + "remarks": "rule_set_096" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_hourly", - "remarks": "rule_set_099" + "remarks": "rule_set_096" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.hourly", - "remarks": "rule_set_099" + "remarks": "rule_set_096" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_hourly", - "remarks": "rule_set_100" + "remarks": "rule_set_097" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.hourly", - "remarks": "rule_set_100" + "remarks": "rule_set_097" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_hourly", - "remarks": "rule_set_100" + "remarks": "rule_set_097" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.hourly", - "remarks": "rule_set_100" + "remarks": "rule_set_097" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_daily", - "remarks": "rule_set_101" + "remarks": "rule_set_098" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.daily", - "remarks": "rule_set_101" + "remarks": "rule_set_098" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_daily", - "remarks": "rule_set_101" + "remarks": "rule_set_098" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.daily", - "remarks": "rule_set_101" + "remarks": "rule_set_098" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_daily", - "remarks": "rule_set_102" + "remarks": "rule_set_099" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.daily", - "remarks": "rule_set_102" + "remarks": "rule_set_099" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_daily", - "remarks": "rule_set_102" + "remarks": "rule_set_099" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.daily", - "remarks": "rule_set_102" + "remarks": "rule_set_099" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_daily", - "remarks": "rule_set_103" + "remarks": "rule_set_100" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.daily", - "remarks": "rule_set_103" + "remarks": "rule_set_100" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_daily", - "remarks": "rule_set_103" + "remarks": "rule_set_100" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.daily", - "remarks": "rule_set_103" + "remarks": "rule_set_100" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_weekly", - "remarks": "rule_set_104" + "remarks": "rule_set_101" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.weekly", - "remarks": "rule_set_104" + "remarks": "rule_set_101" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_weekly", - "remarks": "rule_set_104" + "remarks": "rule_set_101" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.weekly", - "remarks": "rule_set_104" + "remarks": "rule_set_101" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_weekly", - "remarks": "rule_set_105" + "remarks": "rule_set_102" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.weekly", - "remarks": "rule_set_105" + "remarks": "rule_set_102" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_weekly", - "remarks": "rule_set_105" + "remarks": "rule_set_102" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.weekly", - "remarks": "rule_set_105" + "remarks": "rule_set_102" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_weekly", - "remarks": "rule_set_106" + "remarks": "rule_set_103" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.weekly", - "remarks": "rule_set_106" + "remarks": "rule_set_103" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_weekly", - "remarks": "rule_set_106" + "remarks": "rule_set_103" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.weekly", - "remarks": "rule_set_106" + "remarks": "rule_set_103" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_monthly", - "remarks": "rule_set_107" + "remarks": "rule_set_104" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.monthly", - "remarks": "rule_set_107" + "remarks": "rule_set_104" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_monthly", - "remarks": "rule_set_107" + "remarks": "rule_set_104" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.monthly", - "remarks": "rule_set_107" + "remarks": "rule_set_104" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_monthly", - "remarks": "rule_set_108" + "remarks": "rule_set_105" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.monthly", - "remarks": "rule_set_108" + "remarks": "rule_set_105" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_monthly", - "remarks": "rule_set_108" + "remarks": "rule_set_105" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.monthly", - "remarks": "rule_set_108" + "remarks": "rule_set_105" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_monthly", - "remarks": "rule_set_109" + "remarks": "rule_set_106" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.monthly", - "remarks": "rule_set_109" + "remarks": "rule_set_106" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_monthly", - "remarks": "rule_set_109" + "remarks": "rule_set_106" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.monthly", - "remarks": "rule_set_109" + "remarks": "rule_set_106" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_yearly", - "remarks": "rule_set_110" + "remarks": "rule_set_107" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.yearly", - "remarks": "rule_set_110" + "remarks": "rule_set_107" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_yearly", - "remarks": "rule_set_110" + "remarks": "rule_set_107" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.yearly", - "remarks": "rule_set_110" + "remarks": "rule_set_107" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_yearly", - "remarks": "rule_set_111" + "remarks": "rule_set_108" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.yearly", - "remarks": "rule_set_111" + "remarks": "rule_set_108" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_yearly", - "remarks": "rule_set_111" + "remarks": "rule_set_108" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.yearly", - "remarks": "rule_set_111" + "remarks": "rule_set_108" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_yearly", - "remarks": "rule_set_112" + "remarks": "rule_set_109" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.yearly", - "remarks": "rule_set_112" + "remarks": "rule_set_109" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_yearly", - "remarks": "rule_set_112" + "remarks": "rule_set_109" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.yearly", - "remarks": "rule_set_112" + "remarks": "rule_set_109" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_d", - "remarks": "rule_set_113" + "remarks": "rule_set_110" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.d", - "remarks": "rule_set_113" + "remarks": "rule_set_110" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_d", - "remarks": "rule_set_113" + "remarks": "rule_set_110" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.d", - "remarks": "rule_set_113" + "remarks": "rule_set_110" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_d", - "remarks": "rule_set_114" + "remarks": "rule_set_111" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.d", - "remarks": "rule_set_114" + "remarks": "rule_set_111" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_d", - "remarks": "rule_set_114" + "remarks": "rule_set_111" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.d", - "remarks": "rule_set_114" + "remarks": "rule_set_111" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_d", - "remarks": "rule_set_115" + "remarks": "rule_set_112" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.d", - "remarks": "rule_set_115" + "remarks": "rule_set_112" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_d", - "remarks": "rule_set_115" + "remarks": "rule_set_112" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.d", - "remarks": "rule_set_115" + "remarks": "rule_set_112" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_cron_deny_not_exist", - "remarks": "rule_set_116" + "remarks": "rule_set_113" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/cron.deny does not exist", - "remarks": "rule_set_116" + "remarks": "rule_set_113" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_cron_deny_not_exist", - "remarks": "rule_set_116" + "remarks": "rule_set_113" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/cron.deny does not exist", - "remarks": "rule_set_116" + "remarks": "rule_set_113" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_cron_allow_exists", - "remarks": "rule_set_117" + "remarks": "rule_set_114" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/cron.allow exists", - "remarks": "rule_set_117" + "remarks": "rule_set_114" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_cron_allow_exists", - "remarks": "rule_set_117" + "remarks": "rule_set_114" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/cron.allow exists", - "remarks": "rule_set_117" + "remarks": "rule_set_114" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_allow", - "remarks": "rule_set_118" + "remarks": "rule_set_115" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/cron.allow file", - "remarks": "rule_set_118" + "remarks": "rule_set_115" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_allow", - "remarks": "rule_set_118" + "remarks": "rule_set_115" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/cron.allow file", - "remarks": "rule_set_118" + "remarks": "rule_set_115" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_allow", - "remarks": "rule_set_119" + "remarks": "rule_set_116" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/cron.allow file", - "remarks": "rule_set_119" + "remarks": "rule_set_116" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_allow", - "remarks": "rule_set_119" + "remarks": "rule_set_116" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/cron.allow file", - "remarks": "rule_set_119" + "remarks": "rule_set_116" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_allow", - "remarks": "rule_set_120" + "remarks": "rule_set_117" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/cron.allow file", - "remarks": "rule_set_120" + "remarks": "rule_set_117" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_allow", - "remarks": "rule_set_120" + "remarks": "rule_set_117" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/cron.allow file", - "remarks": "rule_set_120" + "remarks": "rule_set_117" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_at_deny_not_exist", - "remarks": "rule_set_121" + "remarks": "rule_set_118" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/at.deny does not exist", - "remarks": "rule_set_121" + "remarks": "rule_set_118" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_at_deny_not_exist", - "remarks": "rule_set_121" + "remarks": "rule_set_118" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/at.deny does not exist", - "remarks": "rule_set_121" + "remarks": "rule_set_118" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_at_allow_exists", - "remarks": "rule_set_122" + "remarks": "rule_set_119" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/at.allow exists", - "remarks": "rule_set_122" + "remarks": "rule_set_119" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_at_allow_exists", - "remarks": "rule_set_122" + "remarks": "rule_set_119" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/at.allow exists", - "remarks": "rule_set_122" + "remarks": "rule_set_119" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_at_allow", - "remarks": "rule_set_123" + "remarks": "rule_set_120" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/at.allow file", - "remarks": "rule_set_123" + "remarks": "rule_set_120" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_at_allow", - "remarks": "rule_set_123" + "remarks": "rule_set_120" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/at.allow file", - "remarks": "rule_set_123" + "remarks": "rule_set_120" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_at_allow", - "remarks": "rule_set_124" + "remarks": "rule_set_121" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/at.allow file", - "remarks": "rule_set_124" + "remarks": "rule_set_121" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_at_allow", - "remarks": "rule_set_124" + "remarks": "rule_set_121" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/at.allow file", - "remarks": "rule_set_124" + "remarks": "rule_set_121" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_at_allow", - "remarks": "rule_set_125" + "remarks": "rule_set_122" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/at.allow file", - "remarks": "rule_set_125" + "remarks": "rule_set_122" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_at_allow", - "remarks": "rule_set_125" + "remarks": "rule_set_122" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/at.allow file", - "remarks": "rule_set_125" + "remarks": "rule_set_122" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_atm_disabled", - "remarks": "rule_set_126" + "remarks": "rule_set_123" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable ATM Support", - "remarks": "rule_set_126" + "remarks": "rule_set_123" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_atm_disabled", - "remarks": "rule_set_126" + "remarks": "rule_set_123" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable ATM Support", - "remarks": "rule_set_126" + "remarks": "rule_set_123" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_can_disabled", - "remarks": "rule_set_127" + "remarks": "rule_set_124" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable CAN Support", - "remarks": "rule_set_127" + "remarks": "rule_set_124" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_can_disabled", - "remarks": "rule_set_127" + "remarks": "rule_set_124" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable CAN Support", - "remarks": "rule_set_127" + "remarks": "rule_set_124" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_dccp_disabled", - "remarks": "rule_set_128" + "remarks": "rule_set_125" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable DCCP Support", - "remarks": "rule_set_128" + "remarks": "rule_set_125" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_dccp_disabled", - "remarks": "rule_set_128" + "remarks": "rule_set_125" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable DCCP Support", - "remarks": "rule_set_128" + "remarks": "rule_set_125" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_tipc_disabled", - "remarks": "rule_set_129" + "remarks": "rule_set_126" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable TIPC Support", - "remarks": "rule_set_129" + "remarks": "rule_set_126" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_tipc_disabled", - "remarks": "rule_set_129" + "remarks": "rule_set_126" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable TIPC Support", - "remarks": "rule_set_129" + "remarks": "rule_set_126" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_rds_disabled", - "remarks": "rule_set_130" + "remarks": "rule_set_127" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable RDS Support", - "remarks": "rule_set_130" + "remarks": "rule_set_127" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_rds_disabled", - "remarks": "rule_set_130" + "remarks": "rule_set_127" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable RDS Support", - "remarks": "rule_set_130" + "remarks": "rule_set_127" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_sctp_disabled", - "remarks": "rule_set_131" + "remarks": "rule_set_128" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SCTP Support", - "remarks": "rule_set_131" + "remarks": "rule_set_128" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_sctp_disabled", - "remarks": "rule_set_131" + "remarks": "rule_set_128" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SCTP Support", - "remarks": "rule_set_131" + "remarks": "rule_set_128" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_ip_forward", - "remarks": "rule_set_132" + "remarks": "rule_set_129" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IP Forwarding on IPv4 Interfaces", - "remarks": "rule_set_132" + "remarks": "rule_set_129" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_ip_forward", - "remarks": "rule_set_132" + "remarks": "rule_set_129" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IP Forwarding on IPv4 Interfaces", - "remarks": "rule_set_132" + "remarks": "rule_set_129" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_forwarding", - "remarks": "rule_set_133" + "remarks": "rule_set_130" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv4 Forwarding on all IPv4 Interfaces", - "remarks": "rule_set_133" + "remarks": "rule_set_130" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_forwarding", - "remarks": "rule_set_133" + "remarks": "rule_set_130" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv4 Forwarding on all IPv4 Interfaces", - "remarks": "rule_set_133" + "remarks": "rule_set_130" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_forwarding", - "remarks": "rule_set_134" + "remarks": "rule_set_131" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv4 Forwarding By Default", - "remarks": "rule_set_134" + "remarks": "rule_set_131" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_forwarding", - "remarks": "rule_set_134" + "remarks": "rule_set_131" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv4 Forwarding By Default", - "remarks": "rule_set_134" + "remarks": "rule_set_131" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_send_redirects", - "remarks": "rule_set_135" + "remarks": "rule_set_132" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_135" + "remarks": "rule_set_132" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_send_redirects", - "remarks": "rule_set_135" + "remarks": "rule_set_132" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_135" + "remarks": "rule_set_132" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_send_redirects", - "remarks": "rule_set_136" + "remarks": "rule_set_133" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces by Default", - "remarks": "rule_set_136" + "remarks": "rule_set_133" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_send_redirects", - "remarks": "rule_set_136" + "remarks": "rule_set_133" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces by Default", - "remarks": "rule_set_136" + "remarks": "rule_set_133" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses", - "remarks": "rule_set_137" + "remarks": "rule_set_134" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Ignore Bogus ICMP Error Responses on IPv4 Interfaces", - "remarks": "rule_set_137" + "remarks": "rule_set_134" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses", - "remarks": "rule_set_137" + "remarks": "rule_set_134" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Ignore Bogus ICMP Error Responses on IPv4 Interfaces", - "remarks": "rule_set_137" + "remarks": "rule_set_134" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_icmp_echo_ignore_broadcasts", - "remarks": "rule_set_138" + "remarks": "rule_set_135" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Ignore ICMP Broadcast Echo Requests on IPv4 Interfaces", - "remarks": "rule_set_138" + "remarks": "rule_set_135" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_icmp_echo_ignore_broadcasts", - "remarks": "rule_set_138" + "remarks": "rule_set_135" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Ignore ICMP Broadcast Echo Requests on IPv4 Interfaces", - "remarks": "rule_set_138" + "remarks": "rule_set_135" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_redirects", - "remarks": "rule_set_139" + "remarks": "rule_set_136" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv4 Interfaces", - "remarks": "rule_set_139" + "remarks": "rule_set_136" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_redirects", - "remarks": "rule_set_139" + "remarks": "rule_set_136" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv4 Interfaces", - "remarks": "rule_set_139" + "remarks": "rule_set_136" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_redirects", - "remarks": "rule_set_140" + "remarks": "rule_set_137" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv4 Interfaces", - "remarks": "rule_set_140" + "remarks": "rule_set_137" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_redirects", - "remarks": "rule_set_140" + "remarks": "rule_set_137" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv4 Interfaces", - "remarks": "rule_set_140" + "remarks": "rule_set_137" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_secure_redirects", - "remarks": "rule_set_141" + "remarks": "rule_set_138" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Secure ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_141" + "remarks": "rule_set_138" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_secure_redirects", - "remarks": "rule_set_141" + "remarks": "rule_set_138" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Secure ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_141" + "remarks": "rule_set_138" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_secure_redirects", - "remarks": "rule_set_142" + "remarks": "rule_set_139" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Kernel Parameter for Accepting Secure Redirects By Default", - "remarks": "rule_set_142" + "remarks": "rule_set_139" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_secure_redirects", - "remarks": "rule_set_142" + "remarks": "rule_set_139" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Kernel Parameter for Accepting Secure Redirects By Default", - "remarks": "rule_set_142" + "remarks": "rule_set_139" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_rp_filter", - "remarks": "rule_set_143" + "remarks": "rule_set_140" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces", - "remarks": "rule_set_143" + "remarks": "rule_set_140" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_rp_filter", - "remarks": "rule_set_143" + "remarks": "rule_set_140" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces", - "remarks": "rule_set_143" + "remarks": "rule_set_140" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_rp_filter", - "remarks": "rule_set_144" + "remarks": "rule_set_141" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces by Default", - "remarks": "rule_set_144" + "remarks": "rule_set_141" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_rp_filter", - "remarks": "rule_set_144" + "remarks": "rule_set_141" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces by Default", - "remarks": "rule_set_144" + "remarks": "rule_set_141" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_source_route", - "remarks": "rule_set_145" + "remarks": "rule_set_142" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces", - "remarks": "rule_set_145" + "remarks": "rule_set_142" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_source_route", - "remarks": "rule_set_145" + "remarks": "rule_set_142" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces", - "remarks": "rule_set_145" + "remarks": "rule_set_142" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_source_route", - "remarks": "rule_set_146" + "remarks": "rule_set_143" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv4 Interfaces by Default", - "remarks": "rule_set_146" + "remarks": "rule_set_143" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_source_route", - "remarks": "rule_set_146" + "remarks": "rule_set_143" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv4 Interfaces by Default", - "remarks": "rule_set_146" + "remarks": "rule_set_143" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_log_martians", - "remarks": "rule_set_147" + "remarks": "rule_set_144" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces", - "remarks": "rule_set_147" + "remarks": "rule_set_144" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_log_martians", - "remarks": "rule_set_147" + "remarks": "rule_set_144" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces", - "remarks": "rule_set_147" + "remarks": "rule_set_144" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_log_martians", - "remarks": "rule_set_148" + "remarks": "rule_set_145" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces by Default", - "remarks": "rule_set_148" + "remarks": "rule_set_145" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_log_martians", - "remarks": "rule_set_148" + "remarks": "rule_set_145" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces by Default", - "remarks": "rule_set_148" + "remarks": "rule_set_145" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_tcp_syncookies", - "remarks": "rule_set_149" + "remarks": "rule_set_146" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use TCP Syncookies on Network Interfaces", - "remarks": "rule_set_149" + "remarks": "rule_set_146" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_tcp_syncookies", - "remarks": "rule_set_149" + "remarks": "rule_set_146" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use TCP Syncookies on Network Interfaces", - "remarks": "rule_set_149" + "remarks": "rule_set_146" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_forwarding", - "remarks": "rule_set_150" + "remarks": "rule_set_147" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv6 Forwarding", - "remarks": "rule_set_150" + "remarks": "rule_set_147" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_forwarding", - "remarks": "rule_set_150" + "remarks": "rule_set_147" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv6 Forwarding", - "remarks": "rule_set_150" + "remarks": "rule_set_147" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_forwarding", - "remarks": "rule_set_151" + "remarks": "rule_set_148" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv6 Forwarding by default", - "remarks": "rule_set_151" + "remarks": "rule_set_148" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_forwarding", - "remarks": "rule_set_151" + "remarks": "rule_set_148" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv6 Forwarding by default", - "remarks": "rule_set_151" + "remarks": "rule_set_148" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_redirects", - "remarks": "rule_set_152" + "remarks": "rule_set_149" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv6 Interfaces", - "remarks": "rule_set_152" + "remarks": "rule_set_149" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_redirects", - "remarks": "rule_set_152" + "remarks": "rule_set_149" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv6 Interfaces", - "remarks": "rule_set_152" + "remarks": "rule_set_149" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_redirects", - "remarks": "rule_set_153" + "remarks": "rule_set_150" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv6 Interfaces", - "remarks": "rule_set_153" + "remarks": "rule_set_150" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_redirects", - "remarks": "rule_set_153" + "remarks": "rule_set_150" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv6 Interfaces", - "remarks": "rule_set_153" + "remarks": "rule_set_150" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_source_route", - "remarks": "rule_set_154" + "remarks": "rule_set_151" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv6 Interfaces", - "remarks": "rule_set_154" + "remarks": "rule_set_151" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_source_route", - "remarks": "rule_set_154" + "remarks": "rule_set_151" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv6 Interfaces", - "remarks": "rule_set_154" + "remarks": "rule_set_151" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_source_route", - "remarks": "rule_set_155" + "remarks": "rule_set_152" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv6 Interfaces by Default", - "remarks": "rule_set_155" + "remarks": "rule_set_152" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_source_route", - "remarks": "rule_set_155" + "remarks": "rule_set_152" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv6 Interfaces by Default", - "remarks": "rule_set_155" + "remarks": "rule_set_152" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_ra", - "remarks": "rule_set_156" + "remarks": "rule_set_153" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Router Advertisements on All IPv6 Interfaces", - "remarks": "rule_set_156" + "remarks": "rule_set_153" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_ra", - "remarks": "rule_set_156" + "remarks": "rule_set_153" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Router Advertisements on All IPv6 Interfaces", - "remarks": "rule_set_156" + "remarks": "rule_set_153" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_ra", - "remarks": "rule_set_157" + "remarks": "rule_set_154" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting Router Advertisements on all IPv6 Interfaces by Default", - "remarks": "rule_set_157" + "remarks": "rule_set_154" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_ra", - "remarks": "rule_set_157" + "remarks": "rule_set_154" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting Router Advertisements on all IPv6 Interfaces by Default", - "remarks": "rule_set_157" + "remarks": "rule_set_154" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_firewalld_installed", - "remarks": "rule_set_158" + "remarks": "rule_set_155" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install firewalld Package", - "remarks": "rule_set_158" + "remarks": "rule_set_155" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_firewalld_installed", - "remarks": "rule_set_158" + "remarks": "rule_set_155" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install firewalld Package", - "remarks": "rule_set_158" + "remarks": "rule_set_155" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "firewalld-backend", - "remarks": "rule_set_159" + "remarks": "rule_set_156" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Firewalld to Use the Nftables Backend", - "remarks": "rule_set_159" + "remarks": "rule_set_156" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "firewalld-backend", - "remarks": "rule_set_159" + "remarks": "rule_set_156" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Firewalld to Use the Nftables Backend", - "remarks": "rule_set_159" + "remarks": "rule_set_156" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_firewalld_enabled", - "remarks": "rule_set_160" + "remarks": "rule_set_157" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify firewalld Enabled", - "remarks": "rule_set_160" + "remarks": "rule_set_157" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_firewalld_enabled", - "remarks": "rule_set_160" + "remarks": "rule_set_157" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify firewalld Enabled", - "remarks": "rule_set_160" + "remarks": "rule_set_157" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "firewalld_loopback_traffic_trusted", - "remarks": "rule_set_161" + "remarks": "rule_set_158" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Firewalld to Trust Loopback Traffic", - "remarks": "rule_set_161" + "remarks": "rule_set_158" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "firewalld_loopback_traffic_trusted", - "remarks": "rule_set_161" + "remarks": "rule_set_158" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Firewalld to Trust Loopback Traffic", - "remarks": "rule_set_161" + "remarks": "rule_set_158" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_config", - "remarks": "rule_set_162" + "remarks": "rule_set_159" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server config file", - "remarks": "rule_set_162" + "remarks": "rule_set_159" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_config", - "remarks": "rule_set_162" + "remarks": "rule_set_159" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server config file", - "remarks": "rule_set_162" + "remarks": "rule_set_159" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_config", - "remarks": "rule_set_163" + "remarks": "rule_set_160" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server config file", - "remarks": "rule_set_163" + "remarks": "rule_set_160" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_config", - "remarks": "rule_set_163" + "remarks": "rule_set_160" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server config file", - "remarks": "rule_set_163" + "remarks": "rule_set_160" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_config", - "remarks": "rule_set_164" + "remarks": "rule_set_161" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server config file", - "remarks": "rule_set_164" + "remarks": "rule_set_161" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_config", - "remarks": "rule_set_164" + "remarks": "rule_set_161" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server config file", - "remarks": "rule_set_164" + "remarks": "rule_set_161" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_sshd_config_d", - "remarks": "rule_set_165" + "remarks": "rule_set_162" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Config File", - "remarks": "rule_set_165" + "remarks": "rule_set_162" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_sshd_config_d", - "remarks": "rule_set_165" + "remarks": "rule_set_162" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Config File", - "remarks": "rule_set_165" + "remarks": "rule_set_162" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_drop_in_config", - "remarks": "rule_set_166" + "remarks": "rule_set_163" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Config File", - "remarks": "rule_set_166" + "remarks": "rule_set_163" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_drop_in_config", - "remarks": "rule_set_166" + "remarks": "rule_set_163" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Config File", - "remarks": "rule_set_166" + "remarks": "rule_set_163" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_sshd_config_d", - "remarks": "rule_set_167" + "remarks": "rule_set_164" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server Configuration Files", - "remarks": "rule_set_167" + "remarks": "rule_set_164" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_sshd_config_d", - "remarks": "rule_set_167" + "remarks": "rule_set_164" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server Configuration Files", - "remarks": "rule_set_167" + "remarks": "rule_set_164" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_sshd_config_d", - "remarks": "rule_set_168" + "remarks": "rule_set_165" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server Configuration Files", - "remarks": "rule_set_168" + "remarks": "rule_set_165" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_sshd_config_d", - "remarks": "rule_set_168" + "remarks": "rule_set_165" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server Configuration Files", - "remarks": "rule_set_168" + "remarks": "rule_set_165" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_drop_in_config", - "remarks": "rule_set_169" + "remarks": "rule_set_166" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server Configuration Files", - "remarks": "rule_set_169" + "remarks": "rule_set_166" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_drop_in_config", - "remarks": "rule_set_169" + "remarks": "rule_set_166" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server Configuration Files", - "remarks": "rule_set_169" + "remarks": "rule_set_166" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_drop_in_config", - "remarks": "rule_set_170" + "remarks": "rule_set_167" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server Configuration Files", - "remarks": "rule_set_170" + "remarks": "rule_set_167" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_drop_in_config", - "remarks": "rule_set_170" + "remarks": "rule_set_167" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server Configuration Files", - "remarks": "rule_set_170" + "remarks": "rule_set_167" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_private_key", - "remarks": "rule_set_171" + "remarks": "rule_set_168" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_171" + "remarks": "rule_set_168" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_private_key", - "remarks": "rule_set_171" + "remarks": "rule_set_168" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_171" + "remarks": "rule_set_168" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_private_key", - "remarks": "rule_set_172" + "remarks": "rule_set_169" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_172" + "remarks": "rule_set_169" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_private_key", - "remarks": "rule_set_172" + "remarks": "rule_set_169" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_172" + "remarks": "rule_set_169" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_private_key", - "remarks": "rule_set_173" + "remarks": "rule_set_170" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Private *_key Key Files", - "remarks": "rule_set_173" + "remarks": "rule_set_170" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_private_key", - "remarks": "rule_set_173" + "remarks": "rule_set_170" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Private *_key Key Files", - "remarks": "rule_set_173" + "remarks": "rule_set_170" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_pub_key", - "remarks": "rule_set_174" + "remarks": "rule_set_171" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_174" + "remarks": "rule_set_171" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_pub_key", - "remarks": "rule_set_174" + "remarks": "rule_set_171" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_174" + "remarks": "rule_set_171" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_pub_key", - "remarks": "rule_set_175" + "remarks": "rule_set_172" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_175" + "remarks": "rule_set_172" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_pub_key", - "remarks": "rule_set_175" + "remarks": "rule_set_172" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_175" + "remarks": "rule_set_172" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_pub_key", - "remarks": "rule_set_176" + "remarks": "rule_set_173" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Public *.pub Key Files", - "remarks": "rule_set_176" + "remarks": "rule_set_173" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_pub_key", - "remarks": "rule_set_176" + "remarks": "rule_set_173" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Public *.pub Key Files", - "remarks": "rule_set_176" + "remarks": "rule_set_173" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_limit_user_access", - "remarks": "rule_set_177" + "remarks": "rule_set_174" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Users' SSH Access", - "remarks": "rule_set_177" + "remarks": "rule_set_174" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_limit_user_access", - "remarks": "rule_set_177" + "remarks": "rule_set_174" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Users' SSH Access", - "remarks": "rule_set_177" + "remarks": "rule_set_174" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_warning_banner_net", - "remarks": "rule_set_178" + "remarks": "rule_set_175" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable SSH Warning Banner", - "remarks": "rule_set_178" + "remarks": "rule_set_175" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_warning_banner_net", - "remarks": "rule_set_178" + "remarks": "rule_set_175" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable SSH Warning Banner", - "remarks": "rule_set_178" + "remarks": "rule_set_175" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_idle_timeout", - "remarks": "rule_set_179" + "remarks": "rule_set_176" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Interval", - "remarks": "rule_set_179" + "remarks": "rule_set_176" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_idle_timeout", - "remarks": "rule_set_179" + "remarks": "rule_set_176" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Interval", - "remarks": "rule_set_179" + "remarks": "rule_set_176" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_keepalive", - "remarks": "rule_set_180" + "remarks": "rule_set_177" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Count Max", - "remarks": "rule_set_180" + "remarks": "rule_set_177" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_keepalive", - "remarks": "rule_set_180" + "remarks": "rule_set_177" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Count Max", - "remarks": "rule_set_180" + "remarks": "rule_set_177" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_forwarding", - "remarks": "rule_set_181" + "remarks": "rule_set_178" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Forwarding", - "remarks": "rule_set_181" + "remarks": "rule_set_178" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_forwarding", - "remarks": "rule_set_181" + "remarks": "rule_set_178" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Forwarding", - "remarks": "rule_set_181" + "remarks": "rule_set_178" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_gssapi_auth", - "remarks": "rule_set_182" + "remarks": "rule_set_179" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GSSAPI Authentication", - "remarks": "rule_set_182" + "remarks": "rule_set_179" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_gssapi_auth", - "remarks": "rule_set_182" + "remarks": "rule_set_179" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GSSAPI Authentication", - "remarks": "rule_set_182" + "remarks": "rule_set_179" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_host_auth", - "remarks": "rule_set_183" + "remarks": "rule_set_180" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Host-Based Authentication", - "remarks": "rule_set_183" + "remarks": "rule_set_180" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_host_auth", - "remarks": "rule_set_183" + "remarks": "rule_set_180" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Host-Based Authentication", - "remarks": "rule_set_183" + "remarks": "rule_set_180" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_rhosts", - "remarks": "rule_set_184" + "remarks": "rule_set_181" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Support for .rhosts Files", - "remarks": "rule_set_184" + "remarks": "rule_set_181" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_rhosts", - "remarks": "rule_set_184" + "remarks": "rule_set_181" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Support for .rhosts Files", - "remarks": "rule_set_184" + "remarks": "rule_set_181" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_use_strong_kex", - "remarks": "rule_set_185" + "remarks": "rule_set_182" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Use Only Strong Key Exchange algorithms", - "remarks": "rule_set_185" + "remarks": "rule_set_182" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_use_strong_kex", - "remarks": "rule_set_185" + "remarks": "rule_set_182" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Use Only Strong Key Exchange algorithms", - "remarks": "rule_set_185" + "remarks": "rule_set_182" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_login_grace_time", - "remarks": "rule_set_186" + "remarks": "rule_set_183" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SSH LoginGraceTime is configured", - "remarks": "rule_set_186" + "remarks": "rule_set_183" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_login_grace_time", - "remarks": "rule_set_186" + "remarks": "rule_set_183" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SSH LoginGraceTime is configured", - "remarks": "rule_set_186" + "remarks": "rule_set_183" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_loglevel_verbose", - "remarks": "rule_set_187" + "remarks": "rule_set_184" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Daemon LogLevel to VERBOSE", - "remarks": "rule_set_187" + "remarks": "rule_set_184" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_loglevel_verbose", - "remarks": "rule_set_187" + "remarks": "rule_set_184" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Daemon LogLevel to VERBOSE", - "remarks": "rule_set_187" + "remarks": "rule_set_184" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_auth_tries", - "remarks": "rule_set_188" + "remarks": "rule_set_185" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH authentication attempt limit", - "remarks": "rule_set_188" + "remarks": "rule_set_185" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_auth_tries", - "remarks": "rule_set_188" + "remarks": "rule_set_185" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH authentication attempt limit", - "remarks": "rule_set_188" + "remarks": "rule_set_185" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_maxstartups", - "remarks": "rule_set_189" + "remarks": "rule_set_186" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SSH MaxStartups is configured", - "remarks": "rule_set_189" + "remarks": "rule_set_186" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_maxstartups", - "remarks": "rule_set_189" + "remarks": "rule_set_186" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SSH MaxStartups is configured", - "remarks": "rule_set_189" + "remarks": "rule_set_186" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_sessions", - "remarks": "rule_set_190" + "remarks": "rule_set_187" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH MaxSessions limit", - "remarks": "rule_set_190" + "remarks": "rule_set_187" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_sessions", - "remarks": "rule_set_190" + "remarks": "rule_set_187" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH MaxSessions limit", - "remarks": "rule_set_190" + "remarks": "rule_set_187" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_empty_passwords", - "remarks": "rule_set_191" + "remarks": "rule_set_188" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Access via Empty Passwords", - "remarks": "rule_set_191" + "remarks": "rule_set_188" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_empty_passwords", - "remarks": "rule_set_191" + "remarks": "rule_set_188" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Access via Empty Passwords", - "remarks": "rule_set_191" + "remarks": "rule_set_188" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_root_login", - "remarks": "rule_set_192" + "remarks": "rule_set_189" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Root Login", - "remarks": "rule_set_192" + "remarks": "rule_set_189" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_root_login", - "remarks": "rule_set_192" + "remarks": "rule_set_189" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Root Login", - "remarks": "rule_set_192" + "remarks": "rule_set_189" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_do_not_permit_user_env", - "remarks": "rule_set_193" + "remarks": "rule_set_190" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Do Not Allow SSH Environment Options", - "remarks": "rule_set_193" + "remarks": "rule_set_190" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_do_not_permit_user_env", - "remarks": "rule_set_193" + "remarks": "rule_set_190" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Do Not Allow SSH Environment Options", - "remarks": "rule_set_193" + "remarks": "rule_set_190" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_pam", - "remarks": "rule_set_194" + "remarks": "rule_set_191" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable PAM", - "remarks": "rule_set_194" + "remarks": "rule_set_191" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_pam", - "remarks": "rule_set_194" + "remarks": "rule_set_191" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable PAM", - "remarks": "rule_set_194" + "remarks": "rule_set_191" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_sudo_installed", - "remarks": "rule_set_195" + "remarks": "rule_set_192" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install sudo Package", - "remarks": "rule_set_195" + "remarks": "rule_set_192" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_sudo_installed", - "remarks": "rule_set_195" + "remarks": "rule_set_192" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install sudo Package", - "remarks": "rule_set_195" + "remarks": "rule_set_192" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_use_pty", - "remarks": "rule_set_196" + "remarks": "rule_set_193" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo use_pty", - "remarks": "rule_set_196" + "remarks": "rule_set_193" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_use_pty", - "remarks": "rule_set_196" + "remarks": "rule_set_193" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo use_pty", - "remarks": "rule_set_196" + "remarks": "rule_set_193" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_custom_logfile", - "remarks": "rule_set_197" + "remarks": "rule_set_194" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Sudo Logfile Exists - sudo logfile", - "remarks": "rule_set_197" + "remarks": "rule_set_194" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_custom_logfile", - "remarks": "rule_set_197" + "remarks": "rule_set_194" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Sudo Logfile Exists - sudo logfile", - "remarks": "rule_set_197" + "remarks": "rule_set_194" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_no_authenticate", - "remarks": "rule_set_198" + "remarks": "rule_set_195" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo !authenticate", - "remarks": "rule_set_198" + "remarks": "rule_set_195" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_no_authenticate", - "remarks": "rule_set_198" + "remarks": "rule_set_195" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo !authenticate", - "remarks": "rule_set_198" + "remarks": "rule_set_195" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_require_reauthentication", - "remarks": "rule_set_199" + "remarks": "rule_set_196" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require Re-Authentication When Using the sudo Command", - "remarks": "rule_set_199" + "remarks": "rule_set_196" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_require_reauthentication", - "remarks": "rule_set_199" + "remarks": "rule_set_196" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require Re-Authentication When Using the sudo Command", - "remarks": "rule_set_199" + "remarks": "rule_set_196" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "use_pam_wheel_group_for_su", - "remarks": "rule_set_200" + "remarks": "rule_set_197" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Usage of pam_wheel with Group Parameter for su Authentication", - "remarks": "rule_set_200" + "remarks": "rule_set_197" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "use_pam_wheel_group_for_su", - "remarks": "rule_set_200" + "remarks": "rule_set_197" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Usage of pam_wheel with Group Parameter for su Authentication", - "remarks": "rule_set_200" + "remarks": "rule_set_197" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_pam_wheel_group_empty", - "remarks": "rule_set_201" + "remarks": "rule_set_198" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Group Used by pam_wheel.so Module Exists on System and is Empty", - "remarks": "rule_set_201" + "remarks": "rule_set_198" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_pam_wheel_group_empty", - "remarks": "rule_set_201" + "remarks": "rule_set_198" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Group Used by pam_wheel.so Module Exists on System and is Empty", - "remarks": "rule_set_201" + "remarks": "rule_set_198" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_password_pam_faillock_password_auth", - "remarks": "rule_set_202" + "remarks": "rule_set_199" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/password-auth File.", - "remarks": "rule_set_202" + "remarks": "rule_set_199" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_password_pam_faillock_password_auth", - "remarks": "rule_set_202" + "remarks": "rule_set_199" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/password-auth File.", - "remarks": "rule_set_202" + "remarks": "rule_set_199" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_password_pam_faillock_system_auth", - "remarks": "rule_set_203" + "remarks": "rule_set_200" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/system-auth File.", - "remarks": "rule_set_203" + "remarks": "rule_set_200" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_password_pam_faillock_system_auth", - "remarks": "rule_set_203" + "remarks": "rule_set_200" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/system-auth File.", - "remarks": "rule_set_203" + "remarks": "rule_set_200" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_pam_pwquality_installed", - "remarks": "rule_set_204" + "remarks": "rule_set_201" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install pam_pwquality Package", - "remarks": "rule_set_204" + "remarks": "rule_set_201" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_pam_pwquality_installed", - "remarks": "rule_set_204" + "remarks": "rule_set_201" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install pam_pwquality Package", - "remarks": "rule_set_204" + "remarks": "rule_set_201" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwquality_password_auth", - "remarks": "rule_set_205" + "remarks": "rule_set_202" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM password complexity module is enabled in password-auth", - "remarks": "rule_set_205" + "remarks": "rule_set_202" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwquality_password_auth", - "remarks": "rule_set_205" + "remarks": "rule_set_202" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM password complexity module is enabled in password-auth", - "remarks": "rule_set_205" + "remarks": "rule_set_202" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwquality_system_auth", - "remarks": "rule_set_206" + "remarks": "rule_set_203" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM password complexity module is enabled in system-auth", - "remarks": "rule_set_206" + "remarks": "rule_set_203" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwquality_system_auth", - "remarks": "rule_set_206" + "remarks": "rule_set_203" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM password complexity module is enabled in system-auth", - "remarks": "rule_set_206" + "remarks": "rule_set_203" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_enabled", - "remarks": "rule_set_207" + "remarks": "rule_set_204" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify pam_unix module is activated", - "remarks": "rule_set_207" + "remarks": "rule_set_204" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_enabled", - "remarks": "rule_set_207" + "remarks": "rule_set_204" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify pam_unix module is activated", - "remarks": "rule_set_207" + "remarks": "rule_set_204" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny", - "remarks": "rule_set_208" + "remarks": "rule_set_205" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Lock Accounts After Failed Password Attempts", - "remarks": "rule_set_208" + "remarks": "rule_set_205" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny", - "remarks": "rule_set_208" + "remarks": "rule_set_205" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Lock Accounts After Failed Password Attempts", - "remarks": "rule_set_208" + "remarks": "rule_set_205" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_unlock_time_with_zero", - "remarks": "rule_set_209" + "remarks": "rule_set_206" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Lockout Time for Failed Password Attempts", - "remarks": "rule_set_209" + "remarks": "rule_set_206" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_unlock_time_with_zero", - "remarks": "rule_set_209" + "remarks": "rule_set_206" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Lockout Time for Failed Password Attempts", - "remarks": "rule_set_209" + "remarks": "rule_set_206" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_difok", - "remarks": "rule_set_210" + "remarks": "rule_set_207" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Characters", - "remarks": "rule_set_210" + "remarks": "rule_set_207" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_difok", - "remarks": "rule_set_210" + "remarks": "rule_set_207" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Characters", - "remarks": "rule_set_210" + "remarks": "rule_set_207" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minlen", - "remarks": "rule_set_211" + "remarks": "rule_set_208" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Length", - "remarks": "rule_set_211" + "remarks": "rule_set_208" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minlen", - "remarks": "rule_set_211" + "remarks": "rule_set_208" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Length", - "remarks": "rule_set_211" + "remarks": "rule_set_208" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minclass", - "remarks": "rule_set_212" + "remarks": "rule_set_209" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", - "remarks": "rule_set_212" + "remarks": "rule_set_209" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minclass", - "remarks": "rule_set_212" + "remarks": "rule_set_209" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", - "remarks": "rule_set_212" + "remarks": "rule_set_209" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_maxrepeat", - "remarks": "rule_set_213" + "remarks": "rule_set_210" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Consecutive Repeating Characters", - "remarks": "rule_set_213" + "remarks": "rule_set_210" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_maxrepeat", - "remarks": "rule_set_213" + "remarks": "rule_set_210" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Consecutive Repeating Characters", - "remarks": "rule_set_213" + "remarks": "rule_set_210" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_maxsequence", - "remarks": "rule_set_214" + "remarks": "rule_set_211" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit the maximum number of sequential characters in passwords", - "remarks": "rule_set_214" + "remarks": "rule_set_211" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_maxsequence", - "remarks": "rule_set_214" + "remarks": "rule_set_211" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit the maximum number of sequential characters in passwords", - "remarks": "rule_set_214" + "remarks": "rule_set_211" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_dictcheck", - "remarks": "rule_set_215" + "remarks": "rule_set_212" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Prevent the Use of Dictionary Words", - "remarks": "rule_set_215" + "remarks": "rule_set_212" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_dictcheck", - "remarks": "rule_set_215" + "remarks": "rule_set_212" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Prevent the Use of Dictionary Words", - "remarks": "rule_set_215" + "remarks": "rule_set_212" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_enforce_root", - "remarks": "rule_set_216" + "remarks": "rule_set_213" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Enforce for root User", - "remarks": "rule_set_216" + "remarks": "rule_set_213" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_enforce_root", - "remarks": "rule_set_216" + "remarks": "rule_set_213" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Enforce for root User", - "remarks": "rule_set_216" + "remarks": "rule_set_213" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_password_auth", - "remarks": "rule_set_217" + "remarks": "rule_set_214" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: password-auth", - "remarks": "rule_set_217" + "remarks": "rule_set_214" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_password_auth", - "remarks": "rule_set_217" + "remarks": "rule_set_214" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: password-auth", - "remarks": "rule_set_217" + "remarks": "rule_set_214" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_system_auth", - "remarks": "rule_set_218" + "remarks": "rule_set_215" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: system-auth", - "remarks": "rule_set_218" + "remarks": "rule_set_215" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_system_auth", - "remarks": "rule_set_218" + "remarks": "rule_set_215" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: system-auth", - "remarks": "rule_set_218" + "remarks": "rule_set_215" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_enforce_for_root", - "remarks": "rule_set_219" + "remarks": "rule_set_216" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Password History Is Enforced for the Root User", - "remarks": "rule_set_219" + "remarks": "rule_set_216" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_enforce_for_root", - "remarks": "rule_set_219" + "remarks": "rule_set_216" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Password History Is Enforced for the Root User", - "remarks": "rule_set_219" + "remarks": "rule_set_216" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_use_authtok", - "remarks": "rule_set_220" + "remarks": "rule_set_217" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Password History with use_authtok", - "remarks": "rule_set_220" + "remarks": "rule_set_217" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_use_authtok", - "remarks": "rule_set_220" + "remarks": "rule_set_217" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Password History with use_authtok", - "remarks": "rule_set_220" + "remarks": "rule_set_217" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords", - "remarks": "rule_set_221" + "remarks": "rule_set_218" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent Login to Accounts With Empty Password", - "remarks": "rule_set_221" + "remarks": "rule_set_218" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords", - "remarks": "rule_set_221" + "remarks": "rule_set_218" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent Login to Accounts With Empty Password", - "remarks": "rule_set_221" + "remarks": "rule_set_218" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_no_remember", - "remarks": "rule_set_222" + "remarks": "rule_set_219" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Avoid using remember in pam_unix module", - "remarks": "rule_set_222" + "remarks": "rule_set_219" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_no_remember", - "remarks": "rule_set_222" + "remarks": "rule_set_219" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Avoid using remember in pam_unix module", - "remarks": "rule_set_222" + "remarks": "rule_set_219" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_systemauth", - "remarks": "rule_set_223" + "remarks": "rule_set_220" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - system-auth", - "remarks": "rule_set_223" + "remarks": "rule_set_220" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_systemauth", - "remarks": "rule_set_223" + "remarks": "rule_set_220" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - system-auth", - "remarks": "rule_set_223" + "remarks": "rule_set_220" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_passwordauth", - "remarks": "rule_set_224" + "remarks": "rule_set_221" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - password-auth", - "remarks": "rule_set_224" + "remarks": "rule_set_221" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_passwordauth", - "remarks": "rule_set_224" + "remarks": "rule_set_221" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - password-auth", - "remarks": "rule_set_224" + "remarks": "rule_set_221" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_authtok", - "remarks": "rule_set_225" + "remarks": "rule_set_222" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require use_authtok for pam_unix.so", - "remarks": "rule_set_225" + "remarks": "rule_set_222" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_authtok", - "remarks": "rule_set_225" + "remarks": "rule_set_222" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require use_authtok for pam_unix.so", - "remarks": "rule_set_225" + "remarks": "rule_set_222" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_maximum_age_login_defs", - "remarks": "rule_set_226" + "remarks": "rule_set_223" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Age", - "remarks": "rule_set_226" + "remarks": "rule_set_223" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_maximum_age_login_defs", - "remarks": "rule_set_226" + "remarks": "rule_set_223" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Age", - "remarks": "rule_set_226" + "remarks": "rule_set_223" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_max_life_existing", - "remarks": "rule_set_227" + "remarks": "rule_set_224" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Maximum Age", - "remarks": "rule_set_227" + "remarks": "rule_set_224" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_max_life_existing", - "remarks": "rule_set_227" + "remarks": "rule_set_224" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Maximum Age", - "remarks": "rule_set_227" + "remarks": "rule_set_224" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_warn_age_login_defs", - "remarks": "rule_set_228" + "remarks": "rule_set_225" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Warning Age", - "remarks": "rule_set_228" + "remarks": "rule_set_225" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_warn_age_login_defs", - "remarks": "rule_set_228" + "remarks": "rule_set_225" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Warning Age", - "remarks": "rule_set_228" + "remarks": "rule_set_225" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_warn_age_existing", - "remarks": "rule_set_229" + "remarks": "rule_set_226" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Warning Age", - "remarks": "rule_set_229" + "remarks": "rule_set_226" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_warn_age_existing", - "remarks": "rule_set_229" + "remarks": "rule_set_226" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Warning Age", - "remarks": "rule_set_229" + "remarks": "rule_set_226" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_libuserconf", - "remarks": "rule_set_230" + "remarks": "rule_set_227" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/libuser.conf", - "remarks": "rule_set_230" + "remarks": "rule_set_227" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_libuserconf", - "remarks": "rule_set_230" + "remarks": "rule_set_227" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/libuser.conf", - "remarks": "rule_set_230" + "remarks": "rule_set_227" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_logindefs", - "remarks": "rule_set_231" + "remarks": "rule_set_228" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/login.defs", - "remarks": "rule_set_231" + "remarks": "rule_set_228" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_logindefs", - "remarks": "rule_set_231" + "remarks": "rule_set_228" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/login.defs", - "remarks": "rule_set_231" + "remarks": "rule_set_228" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_disable_post_pw_expiration", - "remarks": "rule_set_232" + "remarks": "rule_set_229" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Account Expiration Following Inactivity", - "remarks": "rule_set_232" + "remarks": "rule_set_229" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_disable_post_pw_expiration", - "remarks": "rule_set_232" + "remarks": "rule_set_229" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Account Expiration Following Inactivity", - "remarks": "rule_set_232" + "remarks": "rule_set_229" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_set_post_pw_existing", - "remarks": "rule_set_233" + "remarks": "rule_set_230" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set existing passwords a period of inactivity before they been locked", - "remarks": "rule_set_233" + "remarks": "rule_set_230" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_set_post_pw_existing", - "remarks": "rule_set_233" + "remarks": "rule_set_230" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set existing passwords a period of inactivity before they been locked", - "remarks": "rule_set_233" + "remarks": "rule_set_230" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_last_change_is_in_past", - "remarks": "rule_set_234" + "remarks": "rule_set_231" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure all users last password change date is in the past", - "remarks": "rule_set_234" + "remarks": "rule_set_231" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_last_change_is_in_past", - "remarks": "rule_set_234" + "remarks": "rule_set_231" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure all users last password change date is in the past", - "remarks": "rule_set_234" + "remarks": "rule_set_231" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_no_uid_except_zero", - "remarks": "rule_set_235" + "remarks": "rule_set_232" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Root Has UID 0", - "remarks": "rule_set_235" + "remarks": "rule_set_232" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_no_uid_except_zero", - "remarks": "rule_set_235" + "remarks": "rule_set_232" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Root Has UID 0", - "remarks": "rule_set_235" + "remarks": "rule_set_232" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_gid_zero", - "remarks": "rule_set_236" + "remarks": "rule_set_233" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Root Has A Primary GID 0", - "remarks": "rule_set_236" + "remarks": "rule_set_233" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_gid_zero", - "remarks": "rule_set_236" + "remarks": "rule_set_233" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Root Has A Primary GID 0", - "remarks": "rule_set_236" + "remarks": "rule_set_233" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "groups_no_zero_gid_except_root", - "remarks": "rule_set_237" + "remarks": "rule_set_234" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Group Root Has GID 0", - "remarks": "rule_set_237" + "remarks": "rule_set_234" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "groups_no_zero_gid_except_root", - "remarks": "rule_set_237" + "remarks": "rule_set_234" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Group Root Has GID 0", - "remarks": "rule_set_237" + "remarks": "rule_set_234" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_root_password_configured", - "remarks": "rule_set_238" + "remarks": "rule_set_235" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Authentication Required for Single User Mode", - "remarks": "rule_set_238" + "remarks": "rule_set_235" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_root_password_configured", - "remarks": "rule_set_238" + "remarks": "rule_set_235" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Authentication Required for Single User Mode", - "remarks": "rule_set_238" + "remarks": "rule_set_235" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_path_dirs_no_write", - "remarks": "rule_set_239" + "remarks": "rule_set_236" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include World or Group-Writable Directories", - "remarks": "rule_set_239" + "remarks": "rule_set_236" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_path_dirs_no_write", - "remarks": "rule_set_239" + "remarks": "rule_set_236" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include World or Group-Writable Directories", - "remarks": "rule_set_239" + "remarks": "rule_set_236" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "root_path_no_dot", - "remarks": "rule_set_240" + "remarks": "rule_set_237" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include Relative Paths or Null Directories", - "remarks": "rule_set_240" + "remarks": "rule_set_237" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "root_path_no_dot", - "remarks": "rule_set_240" + "remarks": "rule_set_237" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include Relative Paths or Null Directories", - "remarks": "rule_set_240" + "remarks": "rule_set_237" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_root", - "remarks": "rule_set_241" + "remarks": "rule_set_238" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Root Bash Umask is Set Correctly", - "remarks": "rule_set_241" + "remarks": "rule_set_238" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_root", - "remarks": "rule_set_241" + "remarks": "rule_set_238" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Root Bash Umask is Set Correctly", - "remarks": "rule_set_241" + "remarks": "rule_set_238" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_password_auth_for_systemaccounts", - "remarks": "rule_set_242" + "remarks": "rule_set_239" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Are Locked", - "remarks": "rule_set_242" + "remarks": "rule_set_239" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_password_auth_for_systemaccounts", - "remarks": "rule_set_242" + "remarks": "rule_set_239" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Are Locked", - "remarks": "rule_set_242" + "remarks": "rule_set_239" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_shelllogin_for_systemaccounts", - "remarks": "rule_set_243" + "remarks": "rule_set_240" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", - "remarks": "rule_set_243" + "remarks": "rule_set_240" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_shelllogin_for_systemaccounts", - "remarks": "rule_set_243" + "remarks": "rule_set_240" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", - "remarks": "rule_set_243" + "remarks": "rule_set_240" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_invalid_shell_accounts_unlocked", - "remarks": "rule_set_244" + "remarks": "rule_set_241" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Non-Interactive Accounts Are Locked", - "remarks": "rule_set_244" + "remarks": "rule_set_241" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_invalid_shell_accounts_unlocked", - "remarks": "rule_set_244" + "remarks": "rule_set_241" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Non-Interactive Accounts Are Locked", - "remarks": "rule_set_244" + "remarks": "rule_set_241" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_tmout", - "remarks": "rule_set_245" + "remarks": "rule_set_242" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Interactive Session Timeout", - "remarks": "rule_set_245" + "remarks": "rule_set_242" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_tmout", - "remarks": "rule_set_245" + "remarks": "rule_set_242" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Interactive Session Timeout", - "remarks": "rule_set_245" + "remarks": "rule_set_242" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_bashrc", - "remarks": "rule_set_246" + "remarks": "rule_set_243" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Bash Umask is Set Correctly", - "remarks": "rule_set_246" + "remarks": "rule_set_243" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_bashrc", - "remarks": "rule_set_246" + "remarks": "rule_set_243" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Bash Umask is Set Correctly", - "remarks": "rule_set_246" + "remarks": "rule_set_243" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_login_defs", - "remarks": "rule_set_247" + "remarks": "rule_set_244" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in login.defs", - "remarks": "rule_set_247" + "remarks": "rule_set_244" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_login_defs", - "remarks": "rule_set_247" + "remarks": "rule_set_244" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in login.defs", - "remarks": "rule_set_247" + "remarks": "rule_set_244" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_profile", - "remarks": "rule_set_248" + "remarks": "rule_set_245" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in /etc/profile", - "remarks": "rule_set_248" + "remarks": "rule_set_245" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_profile", - "remarks": "rule_set_248" + "remarks": "rule_set_245" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in /etc/profile", - "remarks": "rule_set_248" + "remarks": "rule_set_245" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_249" + "remarks": "rule_set_246" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_249" + "remarks": "rule_set_246" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_249" + "remarks": "rule_set_246" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_249" + "remarks": "rule_set_246" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_build_database", - "remarks": "rule_set_250" + "remarks": "rule_set_247" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Build and Test AIDE Database", - "remarks": "rule_set_250" + "remarks": "rule_set_247" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_build_database", - "remarks": "rule_set_250" + "remarks": "rule_set_247" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Build and Test AIDE Database", - "remarks": "rule_set_250" + "remarks": "rule_set_247" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_periodic_cron_checking", - "remarks": "rule_set_251" + "remarks": "rule_set_248" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Periodic Execution of AIDE", - "remarks": "rule_set_251" + "remarks": "rule_set_248" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_periodic_cron_checking", - "remarks": "rule_set_251" + "remarks": "rule_set_248" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Periodic Execution of AIDE", - "remarks": "rule_set_251" + "remarks": "rule_set_248" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_check_audit_tools", - "remarks": "rule_set_252" + "remarks": "rule_set_249" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure AIDE to Verify the Audit Tools", - "remarks": "rule_set_252" + "remarks": "rule_set_249" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_check_audit_tools", - "remarks": "rule_set_252" + "remarks": "rule_set_249" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure AIDE to Verify the Audit Tools", - "remarks": "rule_set_252" + "remarks": "rule_set_249" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journald_enabled", - "remarks": "rule_set_253" + "remarks": "rule_set_250" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journald Service", - "remarks": "rule_set_253" + "remarks": "rule_set_250" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journald_enabled", - "remarks": "rule_set_253" + "remarks": "rule_set_250" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journald Service", - "remarks": "rule_set_253" + "remarks": "rule_set_250" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_journald_and_rsyslog_not_active_together", - "remarks": "rule_set_254" + "remarks": "rule_set_251" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald and rsyslog Are Not Active Together", - "remarks": "rule_set_254" + "remarks": "rule_set_251" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_journald_and_rsyslog_not_active_together", - "remarks": "rule_set_254" + "remarks": "rule_set_251" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald and rsyslog Are Not Active Together", - "remarks": "rule_set_254" + "remarks": "rule_set_251" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_systemd-journal-remote_installed", - "remarks": "rule_set_255" + "remarks": "rule_set_252" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install systemd-journal-remote Package", - "remarks": "rule_set_255" + "remarks": "rule_set_252" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_systemd-journal-remote_installed", - "remarks": "rule_set_255" + "remarks": "rule_set_252" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install systemd-journal-remote Package", - "remarks": "rule_set_255" + "remarks": "rule_set_252" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journal-upload_enabled", - "remarks": "rule_set_256" + "remarks": "rule_set_253" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journal-upload Service", - "remarks": "rule_set_256" + "remarks": "rule_set_253" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journal-upload_enabled", - "remarks": "rule_set_256" + "remarks": "rule_set_253" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journal-upload Service", - "remarks": "rule_set_256" + "remarks": "rule_set_253" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "socket_systemd-journal-remote_disabled", - "remarks": "rule_set_257" + "remarks": "rule_set_254" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable systemd-journal-remote Socket", - "remarks": "rule_set_257" + "remarks": "rule_set_254" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "socket_systemd-journal-remote_disabled", - "remarks": "rule_set_257" + "remarks": "rule_set_254" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable systemd-journal-remote Socket", - "remarks": "rule_set_257" + "remarks": "rule_set_254" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_disable_forward_to_syslog", - "remarks": "rule_set_258" + "remarks": "rule_set_255" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald ForwardToSyslog is disabled", - "remarks": "rule_set_258" + "remarks": "rule_set_255" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_disable_forward_to_syslog", - "remarks": "rule_set_258" + "remarks": "rule_set_255" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald ForwardToSyslog is disabled", - "remarks": "rule_set_258" + "remarks": "rule_set_255" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_compress", - "remarks": "rule_set_259" + "remarks": "rule_set_256" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to compress large log files", - "remarks": "rule_set_259" + "remarks": "rule_set_256" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_compress", - "remarks": "rule_set_259" + "remarks": "rule_set_256" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to compress large log files", - "remarks": "rule_set_259" + "remarks": "rule_set_256" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_storage", - "remarks": "rule_set_260" + "remarks": "rule_set_257" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to write log files to persistent disk", - "remarks": "rule_set_260" + "remarks": "rule_set_257" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_storage", - "remarks": "rule_set_260" + "remarks": "rule_set_257" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to write log files to persistent disk", - "remarks": "rule_set_260" + "remarks": "rule_set_257" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_261" + "remarks": "rule_set_258" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_261" + "remarks": "rule_set_258" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_261" + "remarks": "rule_set_258" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_261" + "remarks": "rule_set_258" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_262" + "remarks": "rule_set_259" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_262" + "remarks": "rule_set_259" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_262" + "remarks": "rule_set_259" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_262" + "remarks": "rule_set_259" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_263" + "remarks": "rule_set_260" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_263" + "remarks": "rule_set_260" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_263" + "remarks": "rule_set_260" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_263" + "remarks": "rule_set_260" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_passwd", - "remarks": "rule_set_264" + "remarks": "rule_set_261" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns passwd File", - "remarks": "rule_set_264" + "remarks": "rule_set_261" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_passwd", - "remarks": "rule_set_264" + "remarks": "rule_set_261" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns passwd File", - "remarks": "rule_set_264" + "remarks": "rule_set_261" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_passwd", - "remarks": "rule_set_265" + "remarks": "rule_set_262" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns passwd File", - "remarks": "rule_set_265" + "remarks": "rule_set_262" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_passwd", - "remarks": "rule_set_265" + "remarks": "rule_set_262" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns passwd File", - "remarks": "rule_set_265" + "remarks": "rule_set_262" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_passwd", - "remarks": "rule_set_266" + "remarks": "rule_set_263" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on passwd File", - "remarks": "rule_set_266" + "remarks": "rule_set_263" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_passwd", - "remarks": "rule_set_266" + "remarks": "rule_set_263" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on passwd File", - "remarks": "rule_set_266" + "remarks": "rule_set_263" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_passwd", - "remarks": "rule_set_267" + "remarks": "rule_set_264" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup passwd File", - "remarks": "rule_set_267" + "remarks": "rule_set_264" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_passwd", - "remarks": "rule_set_267" + "remarks": "rule_set_264" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup passwd File", - "remarks": "rule_set_267" + "remarks": "rule_set_264" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_passwd", - "remarks": "rule_set_268" + "remarks": "rule_set_265" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup passwd File", - "remarks": "rule_set_268" + "remarks": "rule_set_265" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_passwd", - "remarks": "rule_set_268" + "remarks": "rule_set_265" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup passwd File", - "remarks": "rule_set_268" + "remarks": "rule_set_265" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_passwd", - "remarks": "rule_set_269" + "remarks": "rule_set_266" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup passwd File", - "remarks": "rule_set_269" + "remarks": "rule_set_266" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_passwd", - "remarks": "rule_set_269" + "remarks": "rule_set_266" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup passwd File", - "remarks": "rule_set_269" + "remarks": "rule_set_266" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_group", - "remarks": "rule_set_270" + "remarks": "rule_set_267" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns group File", - "remarks": "rule_set_270" + "remarks": "rule_set_267" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_group", - "remarks": "rule_set_270" + "remarks": "rule_set_267" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns group File", - "remarks": "rule_set_270" + "remarks": "rule_set_267" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_group", - "remarks": "rule_set_271" + "remarks": "rule_set_268" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns group File", - "remarks": "rule_set_271" + "remarks": "rule_set_268" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_group", - "remarks": "rule_set_271" + "remarks": "rule_set_268" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns group File", - "remarks": "rule_set_271" + "remarks": "rule_set_268" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_group", - "remarks": "rule_set_272" + "remarks": "rule_set_269" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on group File", - "remarks": "rule_set_272" + "remarks": "rule_set_269" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_group", - "remarks": "rule_set_272" + "remarks": "rule_set_269" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on group File", - "remarks": "rule_set_272" + "remarks": "rule_set_269" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_group", - "remarks": "rule_set_273" + "remarks": "rule_set_270" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup group File", - "remarks": "rule_set_273" + "remarks": "rule_set_270" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_group", - "remarks": "rule_set_273" + "remarks": "rule_set_270" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup group File", - "remarks": "rule_set_273" + "remarks": "rule_set_270" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_group", - "remarks": "rule_set_274" + "remarks": "rule_set_271" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup group File", - "remarks": "rule_set_274" + "remarks": "rule_set_271" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_group", - "remarks": "rule_set_274" + "remarks": "rule_set_271" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup group File", - "remarks": "rule_set_274" + "remarks": "rule_set_271" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_group", - "remarks": "rule_set_275" + "remarks": "rule_set_272" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup group File", - "remarks": "rule_set_275" + "remarks": "rule_set_272" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_group", - "remarks": "rule_set_275" + "remarks": "rule_set_272" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup group File", - "remarks": "rule_set_275" + "remarks": "rule_set_272" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shadow", - "remarks": "rule_set_276" + "remarks": "rule_set_273" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns shadow File", - "remarks": "rule_set_276" + "remarks": "rule_set_273" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shadow", - "remarks": "rule_set_276" + "remarks": "rule_set_273" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns shadow File", - "remarks": "rule_set_276" + "remarks": "rule_set_273" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shadow", - "remarks": "rule_set_277" + "remarks": "rule_set_274" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns shadow File", - "remarks": "rule_set_277" + "remarks": "rule_set_274" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shadow", - "remarks": "rule_set_277" + "remarks": "rule_set_274" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns shadow File", - "remarks": "rule_set_277" + "remarks": "rule_set_274" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shadow", - "remarks": "rule_set_278" + "remarks": "rule_set_275" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on shadow File", - "remarks": "rule_set_278" + "remarks": "rule_set_275" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shadow", - "remarks": "rule_set_278" + "remarks": "rule_set_275" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on shadow File", - "remarks": "rule_set_278" + "remarks": "rule_set_275" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_shadow", - "remarks": "rule_set_279" + "remarks": "rule_set_276" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup shadow File", - "remarks": "rule_set_279" + "remarks": "rule_set_276" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_shadow", - "remarks": "rule_set_279" + "remarks": "rule_set_276" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup shadow File", - "remarks": "rule_set_279" + "remarks": "rule_set_276" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_shadow", - "remarks": "rule_set_280" + "remarks": "rule_set_277" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup shadow File", - "remarks": "rule_set_280" + "remarks": "rule_set_277" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_shadow", - "remarks": "rule_set_280" + "remarks": "rule_set_277" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup shadow File", - "remarks": "rule_set_280" + "remarks": "rule_set_277" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_shadow", - "remarks": "rule_set_281" + "remarks": "rule_set_278" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup shadow File", - "remarks": "rule_set_281" + "remarks": "rule_set_278" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_shadow", - "remarks": "rule_set_281" + "remarks": "rule_set_278" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup shadow File", - "remarks": "rule_set_281" + "remarks": "rule_set_278" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_gshadow", - "remarks": "rule_set_282" + "remarks": "rule_set_279" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns gshadow File", - "remarks": "rule_set_282" + "remarks": "rule_set_279" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_gshadow", - "remarks": "rule_set_282" + "remarks": "rule_set_279" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns gshadow File", - "remarks": "rule_set_282" + "remarks": "rule_set_279" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_gshadow", - "remarks": "rule_set_283" + "remarks": "rule_set_280" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns gshadow File", - "remarks": "rule_set_283" + "remarks": "rule_set_280" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_gshadow", - "remarks": "rule_set_283" + "remarks": "rule_set_280" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns gshadow File", - "remarks": "rule_set_283" + "remarks": "rule_set_280" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_gshadow", - "remarks": "rule_set_284" + "remarks": "rule_set_281" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on gshadow File", - "remarks": "rule_set_284" + "remarks": "rule_set_281" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_gshadow", - "remarks": "rule_set_284" + "remarks": "rule_set_281" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on gshadow File", - "remarks": "rule_set_284" + "remarks": "rule_set_281" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_gshadow", - "remarks": "rule_set_285" + "remarks": "rule_set_282" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup gshadow File", - "remarks": "rule_set_285" + "remarks": "rule_set_282" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_gshadow", - "remarks": "rule_set_285" + "remarks": "rule_set_282" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup gshadow File", - "remarks": "rule_set_285" + "remarks": "rule_set_282" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_gshadow", - "remarks": "rule_set_286" + "remarks": "rule_set_283" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup gshadow File", - "remarks": "rule_set_286" + "remarks": "rule_set_283" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_gshadow", - "remarks": "rule_set_286" + "remarks": "rule_set_283" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup gshadow File", - "remarks": "rule_set_286" + "remarks": "rule_set_283" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_gshadow", - "remarks": "rule_set_287" + "remarks": "rule_set_284" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup gshadow File", - "remarks": "rule_set_287" + "remarks": "rule_set_284" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_gshadow", - "remarks": "rule_set_287" + "remarks": "rule_set_284" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup gshadow File", - "remarks": "rule_set_287" + "remarks": "rule_set_284" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shells", - "remarks": "rule_set_288" + "remarks": "rule_set_285" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/shells File", - "remarks": "rule_set_288" + "remarks": "rule_set_285" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shells", - "remarks": "rule_set_288" + "remarks": "rule_set_285" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/shells File", - "remarks": "rule_set_288" + "remarks": "rule_set_285" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shells", - "remarks": "rule_set_289" + "remarks": "rule_set_286" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Who Owns /etc/shells File", - "remarks": "rule_set_289" + "remarks": "rule_set_286" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shells", - "remarks": "rule_set_289" + "remarks": "rule_set_286" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Who Owns /etc/shells File", - "remarks": "rule_set_289" + "remarks": "rule_set_286" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shells", - "remarks": "rule_set_290" + "remarks": "rule_set_287" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/shells File", - "remarks": "rule_set_290" + "remarks": "rule_set_287" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shells", - "remarks": "rule_set_290" + "remarks": "rule_set_287" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/shells File", - "remarks": "rule_set_290" + "remarks": "rule_set_287" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd", - "remarks": "rule_set_291" + "remarks": "rule_set_288" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd File", - "remarks": "rule_set_291" + "remarks": "rule_set_288" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd", - "remarks": "rule_set_291" + "remarks": "rule_set_288" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd File", - "remarks": "rule_set_291" + "remarks": "rule_set_288" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd", - "remarks": "rule_set_292" + "remarks": "rule_set_289" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd File", - "remarks": "rule_set_292" + "remarks": "rule_set_289" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd", - "remarks": "rule_set_292" + "remarks": "rule_set_289" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd File", - "remarks": "rule_set_292" + "remarks": "rule_set_289" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd", - "remarks": "rule_set_293" + "remarks": "rule_set_290" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd File", - "remarks": "rule_set_293" + "remarks": "rule_set_290" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd", - "remarks": "rule_set_293" + "remarks": "rule_set_290" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd File", - "remarks": "rule_set_293" + "remarks": "rule_set_290" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd_old", - "remarks": "rule_set_294" + "remarks": "rule_set_291" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_294" + "remarks": "rule_set_291" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd_old", - "remarks": "rule_set_294" + "remarks": "rule_set_291" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_294" + "remarks": "rule_set_291" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd_old", - "remarks": "rule_set_295" + "remarks": "rule_set_292" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_295" + "remarks": "rule_set_292" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd_old", - "remarks": "rule_set_295" + "remarks": "rule_set_292" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_295" + "remarks": "rule_set_292" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd_old", - "remarks": "rule_set_296" + "remarks": "rule_set_293" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd.old File", - "remarks": "rule_set_296" + "remarks": "rule_set_293" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd_old", - "remarks": "rule_set_296" + "remarks": "rule_set_293" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd.old File", - "remarks": "rule_set_296" + "remarks": "rule_set_293" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_297" + "remarks": "rule_set_294" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_297" + "remarks": "rule_set_294" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_297" + "remarks": "rule_set_294" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_297" + "remarks": "rule_set_294" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_298" + "remarks": "rule_set_295" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_298" + "remarks": "rule_set_295" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_298" + "remarks": "rule_set_295" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_298" + "remarks": "rule_set_295" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_unowned_by_user", - "remarks": "rule_set_299" + "remarks": "rule_set_296" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a User", - "remarks": "rule_set_299" + "remarks": "rule_set_296" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_unowned_by_user", - "remarks": "rule_set_299" + "remarks": "rule_set_296" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a User", - "remarks": "rule_set_299" + "remarks": "rule_set_296" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_ungroupowned", - "remarks": "rule_set_300" + "remarks": "rule_set_297" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a Group", - "remarks": "rule_set_300" + "remarks": "rule_set_297" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_ungroupowned", - "remarks": "rule_set_300" + "remarks": "rule_set_297" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a Group", - "remarks": "rule_set_300" + "remarks": "rule_set_297" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_all_shadowed", - "remarks": "rule_set_301" + "remarks": "rule_set_298" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify All Account Password Hashes are Shadowed", - "remarks": "rule_set_301" + "remarks": "rule_set_298" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_all_shadowed", - "remarks": "rule_set_301" + "remarks": "rule_set_298" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify All Account Password Hashes are Shadowed", - "remarks": "rule_set_301" + "remarks": "rule_set_298" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords_etc_shadow", - "remarks": "rule_set_302" + "remarks": "rule_set_299" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure There Are No Accounts With Blank or Null Passwords", - "remarks": "rule_set_302" + "remarks": "rule_set_299" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords_etc_shadow", - "remarks": "rule_set_302" + "remarks": "rule_set_299" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure There Are No Accounts With Blank or Null Passwords", - "remarks": "rule_set_302" + "remarks": "rule_set_299" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gid_passwd_group_same", - "remarks": "rule_set_303" + "remarks": "rule_set_300" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", - "remarks": "rule_set_303" + "remarks": "rule_set_300" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gid_passwd_group_same", - "remarks": "rule_set_303" + "remarks": "rule_set_300" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", - "remarks": "rule_set_303" + "remarks": "rule_set_300" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_id", - "remarks": "rule_set_304" + "remarks": "rule_set_301" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique User IDs", - "remarks": "rule_set_304" + "remarks": "rule_set_301" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_id", - "remarks": "rule_set_304" + "remarks": "rule_set_301" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique User IDs", - "remarks": "rule_set_304" + "remarks": "rule_set_301" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_id", - "remarks": "rule_set_305" + "remarks": "rule_set_302" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group ID", - "remarks": "rule_set_305" + "remarks": "rule_set_302" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_id", - "remarks": "rule_set_305" + "remarks": "rule_set_302" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group ID", - "remarks": "rule_set_305" + "remarks": "rule_set_302" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_name", - "remarks": "rule_set_306" + "remarks": "rule_set_303" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique Names", - "remarks": "rule_set_306" + "remarks": "rule_set_303" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_name", - "remarks": "rule_set_306" + "remarks": "rule_set_303" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique Names", - "remarks": "rule_set_306" + "remarks": "rule_set_303" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_name", - "remarks": "rule_set_307" + "remarks": "rule_set_304" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group Names", - "remarks": "rule_set_307" + "remarks": "rule_set_304" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_name", - "remarks": "rule_set_307" + "remarks": "rule_set_304" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group Names", - "remarks": "rule_set_307" + "remarks": "rule_set_304" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_interactive_home_directory_exists", - "remarks": "rule_set_308" + "remarks": "rule_set_305" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive Users Home Directories Must Exist", - "remarks": "rule_set_308" + "remarks": "rule_set_305" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_interactive_home_directory_exists", - "remarks": "rule_set_308" + "remarks": "rule_set_305" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive Users Home Directories Must Exist", - "remarks": "rule_set_308" + "remarks": "rule_set_305" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_home_directories", - "remarks": "rule_set_309" + "remarks": "rule_set_306" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Be Owned By The Primary User", - "remarks": "rule_set_309" + "remarks": "rule_set_306" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_home_directories", - "remarks": "rule_set_309" + "remarks": "rule_set_306" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Be Owned By The Primary User", - "remarks": "rule_set_309" + "remarks": "rule_set_306" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_home_directories", - "remarks": "rule_set_310" + "remarks": "rule_set_307" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", - "remarks": "rule_set_310" + "remarks": "rule_set_307" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_home_directories", - "remarks": "rule_set_310" + "remarks": "rule_set_307" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", - "remarks": "rule_set_310" + "remarks": "rule_set_307" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_311" + "remarks": "rule_set_308" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_311" + "remarks": "rule_set_308" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_311" + "remarks": "rule_set_308" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_311" + "remarks": "rule_set_308" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_312" + "remarks": "rule_set_309" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_312" + "remarks": "rule_set_309" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_312" + "remarks": "rule_set_309" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_312" + "remarks": "rule_set_309" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_no_world_writable_programs", - "remarks": "rule_set_313" + "remarks": "rule_set_310" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Not Run World-Writable Programs", - "remarks": "rule_set_313" + "remarks": "rule_set_310" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_no_world_writable_programs", - "remarks": "rule_set_313" + "remarks": "rule_set_310" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Not Run World-Writable Programs", - "remarks": "rule_set_313" + "remarks": "rule_set_310" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_314" + "remarks": "rule_set_311" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_314" + "remarks": "rule_set_311" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_314" + "remarks": "rule_set_311" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_314" + "remarks": "rule_set_311" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_forward_files", - "remarks": "rule_set_315" + "remarks": "rule_set_312" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .forward Files Exist", - "remarks": "rule_set_315" + "remarks": "rule_set_312" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_forward_files", - "remarks": "rule_set_315" + "remarks": "rule_set_312" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .forward Files Exist", - "remarks": "rule_set_315" + "remarks": "rule_set_312" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_netrc_files", - "remarks": "rule_set_316" + "remarks": "rule_set_313" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No netrc Files Exist", - "remarks": "rule_set_316" + "remarks": "rule_set_313" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_netrc_files", - "remarks": "rule_set_316" + "remarks": "rule_set_313" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No netrc Files Exist", - "remarks": "rule_set_316" + "remarks": "rule_set_313" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rhost_files", - "remarks": "rule_set_317" + "remarks": "rule_set_314" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .rhost Files Exist", - "remarks": "rule_set_317" + "remarks": "rule_set_314" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rhost_files", - "remarks": "rule_set_317" + "remarks": "rule_set_314" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .rhost Files Exist", - "remarks": "rule_set_317" + "remarks": "rule_set_314" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_bash_history", - "remarks": "rule_set_318" + "remarks": "rule_set_315" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure User Bash History File Has Correct Permissions", - "remarks": "rule_set_318" + "remarks": "rule_set_315" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_bash_history", - "remarks": "rule_set_318" + "remarks": "rule_set_315" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure User Bash History File Has Correct Permissions", - "remarks": "rule_set_318" + "remarks": "rule_set_315" } ], "control-implementations": [ { - "uuid": "b03e98ee-a479-4667-b1ac-edbf9a81c649", + "uuid": "3d5efc8f-c6cd-4073-ad5b-53f2e4219499", "source": "trestle://profiles/rhel10-cis_rhel10-l1_workstation/profile.json", "description": "Control implementation for cis_workstation_l1", "props": [ @@ -18831,7 +18707,7 @@ ], "implemented-requirements": [ { - "uuid": "ea6fb3b6-d892-4e71-856c-de6e1d43b239", + "uuid": "898c386e-3965-499d-a7e2-ff7c31eca3e4", "control-id": "reload_dconf_db", "description": "This is a helper rule to reload Dconf database correctly.", "props": [ @@ -18848,7 +18724,7 @@ ] }, { - "uuid": "86e42138-8483-46cb-8ecd-9930a701c00c", + "uuid": "c1d97a35-b498-4c50-bedd-d0ed09bb8e9a", "control-id": "cis_rhel10_1-1.1.1", "description": "No notes for control-id 1.1.1.1.", "props": [ @@ -18865,7 +18741,7 @@ ] }, { - "uuid": "ca821f60-c657-48d9-a87e-3e192e3f9224", + "uuid": "653f784e-7f7c-4c33-9b65-f201f0cfffc4", "control-id": "cis_rhel10_1-1.1.2", "description": "No notes for control-id 1.1.1.2.", "props": [ @@ -18882,7 +18758,7 @@ ] }, { - "uuid": "c03af5f6-86af-4763-b449-b8d55735a7bd", + "uuid": "7d844cc8-c218-4735-a234-06cdd9ab6afb", "control-id": "cis_rhel10_1-1.1.3", "description": "No notes for control-id 1.1.1.3.", "props": [ @@ -18899,7 +18775,7 @@ ] }, { - "uuid": "c642ccda-8f9c-4c8e-bc02-3f2545278939", + "uuid": "f7971d88-5335-4786-b195-6ad22ace81b0", "control-id": "cis_rhel10_1-1.1.4", "description": "No notes for control-id 1.1.1.4.", "props": [ @@ -18916,7 +18792,7 @@ ] }, { - "uuid": "7427d240-eea3-4ebc-9cd9-d3a83126f386", + "uuid": "413aef0e-16b3-4802-8659-90a658abb079", "control-id": "cis_rhel10_1-1.1.5", "description": "No notes for control-id 1.1.1.5.", "props": [ @@ -18933,7 +18809,7 @@ ] }, { - "uuid": "b91d389b-e29e-4c49-bbb6-d8c314ce5a22", + "uuid": "f995d1c1-4b97-47c7-bf54-27483f75df2c", "control-id": "cis_rhel10_1-1.1.11", "description": "The description for control-id cis_rhel10_1-1.1.11.", "props": [ @@ -18946,7 +18822,7 @@ ] }, { - "uuid": "de891798-d5f6-47d8-ab03-7f05e8960813", + "uuid": "e0f863b5-f434-4a6e-9218-1215e98c6767", "control-id": "cis_rhel10_1-1.2.1.1", "description": "No notes for control-id 1.1.2.1.1.", "props": [ @@ -18963,7 +18839,7 @@ ] }, { - "uuid": "33448b23-c1bc-4684-8be6-2dd5f80716bd", + "uuid": "cdf43cf3-2d0a-49cd-9875-30caf3993fde", "control-id": "cis_rhel10_1-1.2.1.2", "description": "No notes for control-id 1.1.2.1.2.", "props": [ @@ -18980,7 +18856,7 @@ ] }, { - "uuid": "766aafcc-4bfc-4c2c-a948-70368f773604", + "uuid": "d643c3ec-c3fd-4996-9c14-41c8d1ea76d9", "control-id": "cis_rhel10_1-1.2.1.3", "description": "No notes for control-id 1.1.2.1.3.", "props": [ @@ -18997,7 +18873,7 @@ ] }, { - "uuid": "cff20eec-0780-4c4f-b9fb-24bbcef5caaf", + "uuid": "e8de70d9-0579-4654-8100-133ef5bff7f9", "control-id": "cis_rhel10_1-1.2.1.4", "description": "No notes for control-id 1.1.2.1.4.", "props": [ @@ -19014,7 +18890,7 @@ ] }, { - "uuid": "f4e63efc-3722-4f51-95d5-4b6e3034e846", + "uuid": "1664395d-a6ed-4a15-9eb4-7fe5ac16b6a4", "control-id": "cis_rhel10_1-1.2.2.1", "description": "No notes for control-id 1.1.2.2.1.", "props": [ @@ -19031,7 +18907,7 @@ ] }, { - "uuid": "d3d3b76f-ea7b-4432-b740-c0a0609254f7", + "uuid": "05e43442-9bd3-48bb-b98f-db24b37ec711", "control-id": "cis_rhel10_1-1.2.2.2", "description": "No notes for control-id 1.1.2.2.2.", "props": [ @@ -19048,7 +18924,7 @@ ] }, { - "uuid": "8b92d906-3641-4c3e-ac6e-0743a5534e50", + "uuid": "675e847a-c64f-4976-b8d0-b06f0ca5e376", "control-id": "cis_rhel10_1-1.2.2.3", "description": "No notes for control-id 1.1.2.2.3.", "props": [ @@ -19065,7 +18941,7 @@ ] }, { - "uuid": "6fa53654-93be-46c7-b549-f7edb6ed2859", + "uuid": "815cbcdb-43d3-4f4e-af7d-8043b1a45a9d", "control-id": "cis_rhel10_1-1.2.2.4", "description": "No notes for control-id 1.1.2.2.4.", "props": [ @@ -19082,7 +18958,7 @@ ] }, { - "uuid": "6a57bb9c-ceae-47ec-a91c-796dfcd96b9e", + "uuid": "5263f9e3-32c0-4737-9b64-9dc04932c9ad", "control-id": "cis_rhel10_1-1.2.3.2", "description": "No notes for control-id 1.1.2.3.2.", "props": [ @@ -19099,7 +18975,7 @@ ] }, { - "uuid": "a64a80cd-a264-4b4b-9cd6-1a59f5f66bab", + "uuid": "ca647138-67d5-4cfa-89f6-8646f4cc17c4", "control-id": "cis_rhel10_1-1.2.3.3", "description": "No notes for control-id 1.1.2.3.3.", "props": [ @@ -19116,7 +18992,7 @@ ] }, { - "uuid": "e3824624-f6d4-4faf-9538-88a0a48a7f41", + "uuid": "22248678-a40d-40a8-b496-b9a4648556c5", "control-id": "cis_rhel10_1-1.2.4.2", "description": "No notes for control-id 1.1.2.4.2.", "props": [ @@ -19133,7 +19009,7 @@ ] }, { - "uuid": "47db601a-9da7-44fa-8c3d-6ecada7124c3", + "uuid": "e3fddaf6-c641-43ab-ba17-0ffbe0b5db32", "control-id": "cis_rhel10_1-1.2.4.3", "description": "No notes for control-id 1.1.2.4.3.", "props": [ @@ -19150,7 +19026,7 @@ ] }, { - "uuid": "17c0c1f0-be64-4526-8e3b-3ef04804f9d0", + "uuid": "8f2ade2b-cab4-4259-a76b-c3f4f81fb299", "control-id": "cis_rhel10_1-1.2.5.2", "description": "No notes for control-id 1.1.2.5.2.", "props": [ @@ -19167,7 +19043,7 @@ ] }, { - "uuid": "58ea6b92-5d5c-4ff3-b665-b7e75e8ed12d", + "uuid": "7e688149-ea8c-46e1-b5ef-c01c6f700af5", "control-id": "cis_rhel10_1-1.2.5.3", "description": "No notes for control-id 1.1.2.5.3.", "props": [ @@ -19184,7 +19060,7 @@ ] }, { - "uuid": "82a6d28b-18c3-4bf5-8611-d3de9b5cdd34", + "uuid": "41339b3f-8276-465e-9be6-748cdc1b617a", "control-id": "cis_rhel10_1-1.2.5.4", "description": "No notes for control-id 1.1.2.5.4.", "props": [ @@ -19201,7 +19077,7 @@ ] }, { - "uuid": "8b756b17-1aeb-4b8c-abac-55614ab3c0aa", + "uuid": "b34ce75b-d366-49ca-8397-e069e6790a74", "control-id": "cis_rhel10_1-1.2.6.2", "description": "No notes for control-id 1.1.2.6.2.", "props": [ @@ -19218,7 +19094,7 @@ ] }, { - "uuid": "337710bf-a2c6-428a-b053-16d385db4699", + "uuid": "6c3b7072-0fe0-40d7-85a9-c3655afa36c4", "control-id": "cis_rhel10_1-1.2.6.3", "description": "No notes for control-id 1.1.2.6.3.", "props": [ @@ -19235,7 +19111,7 @@ ] }, { - "uuid": "581a41d8-371a-48bf-af62-605e19e60659", + "uuid": "098fa54a-8501-4b95-bb8d-ec18ca207247", "control-id": "cis_rhel10_1-1.2.6.4", "description": "No notes for control-id 1.1.2.6.4.", "props": [ @@ -19252,7 +19128,7 @@ ] }, { - "uuid": "eb9c9f81-c6d9-4780-ba63-db3cff1b9496", + "uuid": "a74d7772-911b-4cf6-ac72-f280a060dae3", "control-id": "cis_rhel10_1-1.2.7.2", "description": "No notes for control-id 1.1.2.7.2.", "props": [ @@ -19269,7 +19145,7 @@ ] }, { - "uuid": "6fb71dc6-e619-44bb-8482-02e6903f0ae4", + "uuid": "379873b1-0de8-406c-9fd0-4082fec22cbd", "control-id": "cis_rhel10_1-1.2.7.3", "description": "No notes for control-id 1.1.2.7.3.", "props": [ @@ -19286,7 +19162,7 @@ ] }, { - "uuid": "77b0f072-14da-4d53-a3a3-06268249c239", + "uuid": "d68bd0df-6065-4e8d-85e0-640f7f2a8c01", "control-id": "cis_rhel10_1-1.2.7.4", "description": "No notes for control-id 1.1.2.7.4.", "props": [ @@ -19303,7 +19179,7 @@ ] }, { - "uuid": "0f893e66-c8a2-4d26-b113-3504b5cf36e0", + "uuid": "501630ba-2870-4d2d-9c17-db4542bd4a61", "control-id": "cis_rhel10_1-2.1.1", "description": "The description for control-id cis_rhel10_1-2.1.1.", "props": [ @@ -19316,7 +19192,7 @@ ] }, { - "uuid": "73f488cb-b537-4b5e-94b4-e36bdb0664f3", + "uuid": "81ddb19c-aaef-4b59-bacd-f0e120e97375", "control-id": "cis_rhel10_1-2.1.2", "description": "No notes for control-id 1.2.1.2.", "props": [ @@ -19333,7 +19209,7 @@ ] }, { - "uuid": "88e826f5-9d5c-48ab-9795-260e1d3df18b", + "uuid": "68ae7104-307b-46c3-8304-d992ef517f35", "control-id": "cis_rhel10_1-2.1.4", "description": "The description for control-id cis_rhel10_1-2.1.4.", "props": [ @@ -19346,7 +19222,7 @@ ] }, { - "uuid": "55f6449b-0306-45c8-a2aa-2d86e4db7506", + "uuid": "47a1d15a-b2c0-4e61-8870-daf9c32affa6", "control-id": "cis_rhel10_1-2.2.1", "description": "The description for control-id cis_rhel10_1-2.2.1.", "props": [ @@ -19359,7 +19235,7 @@ ] }, { - "uuid": "53bbdc31-086e-4cbb-9c13-fe4d85bc71ba", + "uuid": "b2fa7453-1d72-49ad-8511-4854bae17992", "control-id": "cis_rhel10_1-3.1.1", "description": "No notes for control-id 1.3.1.1.", "props": [ @@ -19376,7 +19252,7 @@ ] }, { - "uuid": "eb704324-02dc-48f8-84ea-1015b3fb7915", + "uuid": "5d520881-9553-46b3-9db9-966b5d0d5916", "control-id": "cis_rhel10_1-3.1.2", "description": "No notes for control-id 1.3.1.2.", "props": [ @@ -19393,7 +19269,7 @@ ] }, { - "uuid": "b3568751-1ab6-44b6-805d-59b4c3ca68eb", + "uuid": "375d627e-d90d-4290-82e6-b1936935511b", "control-id": "cis_rhel10_1-3.1.3", "description": "No notes for control-id 1.3.1.3.", "props": [ @@ -19410,7 +19286,7 @@ ] }, { - "uuid": "59552692-be70-4ba1-a186-0a8121bbdf98", + "uuid": "da4f09eb-5736-4c3a-b1d2-134ed0fddefc", "control-id": "cis_rhel10_1-3.1.4", "description": "No notes for control-id 1.3.1.4.", "props": [ @@ -19427,7 +19303,7 @@ ] }, { - "uuid": "80f78049-4daf-4c76-b0c2-7d1c665756b1", + "uuid": "9461a964-91a3-4b67-91af-f2e78da28e4e", "control-id": "cis_rhel10_1-3.1.7", "description": "No notes for control-id 1.3.1.7.", "props": [ @@ -19444,7 +19320,7 @@ ] }, { - "uuid": "7a7661a8-7cbc-45fe-9901-f01bbfe0ecba", + "uuid": "826d03ce-bb5c-428c-887f-33febafb0832", "control-id": "cis_rhel10_1-4.1", "description": "There is no automated remediation for this rule and this is intentional.\nMore details in the rule description.", "props": [ @@ -19461,50 +19337,34 @@ ] }, { - "uuid": "93e4b64e-b0de-4d2f-8411-9f5b911c1cee", + "uuid": "3c4355fd-e3bc-4076-8a8f-d11ce42e6757", "control-id": "cis_rhel10_1-4.2", - "description": "The description for control-id cis_rhel10_1-4.2.", + "description": "This requirement demands a deeper review of the rules.", "props": [ { "name": "implementation-status", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "alternative", - "remarks": "This requirement demands a deeper review of the rules." - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_grub2_cfg" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_grub2_cfg" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_grub2_cfg" + "value": "implemented" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_user_cfg" + "value": "file_permissions_boot_grub2" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_user_cfg" + "value": "file_owner_boot_grub2" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_user_cfg" + "value": "file_groupowner_boot_grub2" } ] }, { - "uuid": "2dfc5ee7-c2e0-4427-8d62-cd8015103d2e", + "uuid": "eada87f1-5872-44ca-b122-9c7534b39af0", "control-id": "cis_rhel10_1-5.1", "description": "No notes for control-id 1.5.1.", "props": [ @@ -19521,7 +19381,7 @@ ] }, { - "uuid": "9888f0d5-e19c-4e2e-adac-e40f9988dd2a", + "uuid": "f25cb726-ff61-4fb1-a812-7821ef35112c", "control-id": "cis_rhel10_1-5.2", "description": "No notes for control-id 1.5.2.", "props": [ @@ -19538,7 +19398,7 @@ ] }, { - "uuid": "9e063c7e-0d58-4550-8490-f4746df32060", + "uuid": "ee55162b-4db9-494d-8cf5-4970d25ed5a9", "control-id": "cis_rhel10_1-5.4", "description": "No notes for control-id 1.5.4.", "props": [ @@ -19555,7 +19415,7 @@ ] }, { - "uuid": "cdd1e4fb-ba28-41d6-92f0-3e11f23d71d3", + "uuid": "c5d21c73-83b6-44bf-b98d-e6fc49de2a7c", "control-id": "cis_rhel10_1-5.5", "description": "No notes for control-id 1.5.5.", "props": [ @@ -19572,7 +19432,7 @@ ] }, { - "uuid": "9c6017cc-30c0-4654-8cef-20824af84af0", + "uuid": "abf4062f-5dff-4100-ac1e-4cba11a1b882", "control-id": "cis_rhel10_1-5.6", "description": "No notes for control-id 1.5.6.", "props": [ @@ -19589,7 +19449,7 @@ ] }, { - "uuid": "98ea337e-9956-4aba-854c-21bdd495b6bc", + "uuid": "c6707d72-daf1-413d-9277-38ee92c134f7", "control-id": "cis_rhel10_1-5.7", "description": "No notes for control-id 1.5.7.", "props": [ @@ -19606,7 +19466,7 @@ ] }, { - "uuid": "de824afd-9958-4ac8-bb2e-6725a007c3c0", + "uuid": "f4029b0c-bbf5-4727-93e7-0ffe7b18e4f2", "control-id": "cis_rhel10_1-5.8", "description": "Address Space Layout Randomization (ASLR)", "props": [ @@ -19623,7 +19483,7 @@ ] }, { - "uuid": "c25228a6-65db-4e90-9d0d-d71bdc6d0888", + "uuid": "d657bf76-968d-4655-a2ab-9d9a46a9600a", "control-id": "cis_rhel10_1-5.9", "description": "No notes for control-id 1.5.9.", "props": [ @@ -19640,7 +19500,7 @@ ] }, { - "uuid": "0d6ca944-ee48-4040-86bf-15cd0bd615c7", + "uuid": "c8551fe9-de59-4d3c-a88a-1f231a69f15c", "control-id": "cis_rhel10_1-5.10", "description": "No notes for control-id 1.5.10.", "props": [ @@ -19657,7 +19517,7 @@ ] }, { - "uuid": "c15a7a88-bde1-4abf-afc2-b71473db1f6d", + "uuid": "d4eaee1c-8a79-48e6-b82b-fbdfac5a8907", "control-id": "cis_rhel10_1-6.1", "description": "No notes for control-id 1.6.1.", "props": [ @@ -19674,7 +19534,7 @@ ] }, { - "uuid": "4017d147-28cb-4ea0-ae08-ab217591db4f", + "uuid": "b78c8f80-5e5e-476d-923b-762cda5c37c6", "control-id": "cis_rhel10_1-6.2", "description": "No notes for control-id 1.6.2.", "props": [ @@ -19691,7 +19551,7 @@ ] }, { - "uuid": "f3396550-2c11-49cd-84c8-1d1ea2b387a0", + "uuid": "fc2b57bf-36a3-424d-bb8b-03a1457be843", "control-id": "cis_rhel10_1-6.3", "description": "No notes for control-id 1.6.3.", "props": [ @@ -19708,7 +19568,7 @@ ] }, { - "uuid": "5ccf10a4-272e-4416-98b6-6311515d9ed0", + "uuid": "8a6f9cd7-0255-4e2a-9982-81594fa8b26b", "control-id": "cis_rhel10_1-6.4", "description": "No notes for control-id 1.6.4.", "props": [ @@ -19725,7 +19585,7 @@ ] }, { - "uuid": "44d307b9-3631-4f8c-ae2e-9424d0a8d036", + "uuid": "b05a4108-b66a-4623-bcc3-a6a54c8ba92f", "control-id": "cis_rhel10_1-7.1", "description": "No notes for control-id 1.7.1.", "props": [ @@ -19742,7 +19602,7 @@ ] }, { - "uuid": "0856c725-ce97-4cae-a53b-989ea408733d", + "uuid": "6c0c6a48-40ea-4f66-96a1-a95d4599b483", "control-id": "cis_rhel10_1-7.2", "description": "No notes for control-id 1.7.2.", "props": [ @@ -19759,7 +19619,7 @@ ] }, { - "uuid": "0f7c5323-4c0f-4812-97fa-f1afbdae8fe0", + "uuid": "d5fadc64-05f0-471b-bbaa-57dbac30860c", "control-id": "cis_rhel10_1-7.3", "description": "No notes for control-id 1.7.3.", "props": [ @@ -19776,7 +19636,7 @@ ] }, { - "uuid": "40f33d5a-9250-48c7-b2bc-51b2c2cb267d", + "uuid": "701e4a7d-af37-46cb-a776-b98ddd5802d0", "control-id": "cis_rhel10_1-7.4", "description": "No notes for control-id 1.7.4.", "props": [ @@ -19803,7 +19663,7 @@ ] }, { - "uuid": "13fb808f-2c5d-4f44-a1f9-01f5920dbe29", + "uuid": "9d4cc1f9-79a2-427d-a95f-48ca74d0e24f", "control-id": "cis_rhel10_1-7.5", "description": "No notes for control-id 1.7.5.", "props": [ @@ -19830,7 +19690,7 @@ ] }, { - "uuid": "08fe234f-b913-4e15-a117-fbbdce3e02a4", + "uuid": "103e8b1d-50e5-484d-9c43-f347a85008e4", "control-id": "cis_rhel10_1-7.6", "description": "No notes for control-id 1.7.6.", "props": [ @@ -19857,7 +19717,7 @@ ] }, { - "uuid": "12eeada5-8195-48f6-bb2f-9ae0c2b4665e", + "uuid": "42faed53-9503-4ec9-aaaa-f789ae45d0a6", "control-id": "cis_rhel10_1-8.1", "description": "No notes for control-id 1.8.1.", "props": [ @@ -19879,7 +19739,7 @@ ] }, { - "uuid": "96aaa051-5945-4731-936c-a689fa7e2893", + "uuid": "069acf82-b902-4e97-9f73-0c8a2e2fad91", "control-id": "cis_rhel10_1-8.2", "description": "No notes for control-id 1.8.2.", "props": [ @@ -19896,7 +19756,7 @@ ] }, { - "uuid": "e09f710d-753a-4782-bd9e-21ed5ed25e2a", + "uuid": "66ebd94f-c852-4747-908a-0a40e6299bd3", "control-id": "cis_rhel10_1-8.3", "description": "No notes for control-id 1.8.3.", "props": [ @@ -19928,7 +19788,7 @@ ] }, { - "uuid": "9651eebe-7eaa-45b3-8c5b-2a02d507af49", + "uuid": "a7a3f93c-4b6e-434a-927e-20eed7d5387b", "control-id": "cis_rhel10_1-8.5", "description": "No notes for control-id 1.8.5.", "props": [ @@ -19945,7 +19805,7 @@ ] }, { - "uuid": "9c98f3cd-2568-4fd4-be00-9cb5865ad5cb", + "uuid": "a0ed5195-970b-42d2-ac8f-23e4389f4028", "control-id": "cis_rhel10_2-1.4", "description": "No notes for control-id 2.1.4.", "props": [ @@ -19962,7 +19822,7 @@ ] }, { - "uuid": "2fc7746b-e1b7-4169-9081-1e25dee90c38", + "uuid": "097e516f-e613-4b33-bbba-51f82e26e1ed", "control-id": "cis_rhel10_2-1.5", "description": "No notes for control-id 2.1.5.", "props": [ @@ -19979,7 +19839,7 @@ ] }, { - "uuid": "eb23add6-fa7b-404b-a8e4-edcdf0c28740", + "uuid": "059d3aca-84c6-4a36-b11b-5f8c57701026", "control-id": "cis_rhel10_2-1.6", "description": "No notes for control-id 2.1.6.", "props": [ @@ -19996,7 +19856,7 @@ ] }, { - "uuid": "2d7ba315-7f8a-49f2-a5dd-b8378d57a221", + "uuid": "ee5df02f-57f3-4ac2-94de-f4e0d6f20583", "control-id": "cis_rhel10_2-1.7", "description": "No notes for control-id 2.1.7.", "props": [ @@ -20013,7 +19873,7 @@ ] }, { - "uuid": "23374927-0534-4a39-8321-942058755caf", + "uuid": "1dd4b5e7-96e9-46aa-97f7-c46321ae036c", "control-id": "cis_rhel10_2-1.8", "description": "No notes for control-id 2.1.8.", "props": [ @@ -20035,7 +19895,7 @@ ] }, { - "uuid": "095c81cd-b0e1-491e-83a6-6d3e0be1d9f0", + "uuid": "defc7a81-689d-4db2-843d-89db6f58d0a1", "control-id": "cis_rhel10_2-1.9", "description": "Many of the libvirt packages used by Enterprise Linux virtualization are dependent on the\nnfs-utils package.", "props": [ @@ -20052,7 +19912,7 @@ ] }, { - "uuid": "26b0e9a3-4413-465f-bdc8-62630bd19f4c", + "uuid": "a842834a-c2c0-47a2-8a76-c20bb46b4337", "control-id": "cis_rhel10_2-1.11", "description": "Many of the libvirt packages used by Enterprise Linux virtualization, and the nfs-utils\npackage used for The Network File System (NFS), are dependent on the rpcbind package.", "props": [ @@ -20069,7 +19929,7 @@ ] }, { - "uuid": "54e122a1-740a-4f53-beec-df8a8b5ebc51", + "uuid": "130db960-f51c-4f90-8d4c-7b68464a8278", "control-id": "cis_rhel10_2-1.12", "description": "No notes for control-id 2.1.12.", "props": [ @@ -20086,7 +19946,7 @@ ] }, { - "uuid": "fe588d28-ae38-48ee-b2c0-9f4d7a71177d", + "uuid": "f6c06bee-c752-4ad6-ac4b-dcae71e93e64", "control-id": "cis_rhel10_2-1.13", "description": "No notes for control-id 2.1.13.", "props": [ @@ -20103,7 +19963,7 @@ ] }, { - "uuid": "1b564a6a-e081-48d2-91de-1240e92134a8", + "uuid": "c2889ce9-7997-4399-9fc3-afebf0c45fbf", "control-id": "cis_rhel10_2-1.14", "description": "No notes for control-id 2.1.14.", "props": [ @@ -20120,7 +19980,7 @@ ] }, { - "uuid": "9301a5a2-c8f3-4f68-aa4d-3b0fb0e2c2df", + "uuid": "fdec0ff9-67dd-4451-857c-7d94c4f90635", "control-id": "cis_rhel10_2-1.15", "description": "No notes for control-id 2.1.15.", "props": [ @@ -20137,7 +19997,7 @@ ] }, { - "uuid": "70c8f4d8-b075-41d4-abcd-72e973444dd0", + "uuid": "854ef393-ed32-4af1-bacd-1bd3efa31425", "control-id": "cis_rhel10_2-1.16", "description": "No notes for control-id 2.1.16.", "props": [ @@ -20154,7 +20014,7 @@ ] }, { - "uuid": "2c03dcfc-1392-4058-90ed-5193d3c7aae2", + "uuid": "ef336b1f-4a40-4a44-bc78-ed4379ce5b70", "control-id": "cis_rhel10_2-1.17", "description": "No notes for control-id 2.1.17.", "props": [ @@ -20171,7 +20031,7 @@ ] }, { - "uuid": "9315a16a-8477-4786-97ff-41fdc9f85712", + "uuid": "4368176c-f53f-4bc0-bfcc-5826ce5150c2", "control-id": "cis_rhel10_2-1.18", "description": "No notes for control-id 2.1.18.", "props": [ @@ -20193,7 +20053,7 @@ ] }, { - "uuid": "a4407fba-9ae8-4a2e-86f2-c64a4a629a8a", + "uuid": "6b2e8c11-2f12-4aaf-968b-7b753de0e14d", "control-id": "cis_rhel10_2-1.21", "description": "No notes for control-id 2.1.21.", "props": [ @@ -20215,7 +20075,7 @@ ] }, { - "uuid": "fe146252-1ae2-437c-97de-09a241825462", + "uuid": "411f33fd-1e50-4b30-bfc9-f55c681a5a1f", "control-id": "cis_rhel10_2-1.22", "description": "The description for control-id cis_rhel10_2-1.22.", "props": [ @@ -20228,7 +20088,7 @@ ] }, { - "uuid": "554955b2-e1c2-47b6-a0e1-78f37dbdcf75", + "uuid": "a3139ca4-f329-4a41-9232-1a520e9f7794", "control-id": "cis_rhel10_2-2.1", "description": "No notes for control-id 2.2.1.", "props": [ @@ -20245,7 +20105,7 @@ ] }, { - "uuid": "3a8e7308-53e0-45e7-b194-402882316966", + "uuid": "9a127e5d-96a4-4023-96a2-9f355dd924ab", "control-id": "cis_rhel10_2-2.3", "description": "No notes for control-id 2.2.3.", "props": [ @@ -20262,7 +20122,7 @@ ] }, { - "uuid": "795accd5-4273-4771-a30f-b6c9ad52c817", + "uuid": "0f283a48-da4b-4716-8dc6-173a31f0d251", "control-id": "cis_rhel10_2-2.4", "description": "No notes for control-id 2.2.4.", "props": [ @@ -20279,7 +20139,7 @@ ] }, { - "uuid": "e5e51a50-e7e0-4db7-9170-73ccc89ceaef", + "uuid": "e9a2ad33-ed23-472e-bcd0-84a9c13f1039", "control-id": "cis_rhel10_2-3.1", "description": "No notes for control-id 2.3.1.", "props": [ @@ -20291,7 +20151,7 @@ ] }, { - "uuid": "d832a366-7737-47e3-8fd9-688173fd5b04", + "uuid": "e74199aa-917b-400c-9c53-603971a0245c", "control-id": "cis_rhel10_2-3.2", "description": "No notes for control-id 2.3.2.", "props": [ @@ -20308,7 +20168,7 @@ ] }, { - "uuid": "b59493c5-bd64-4eab-b6c3-a92dd9b80a35", + "uuid": "e8ee41ef-1e12-4d45-b8b0-9df1c2422684", "control-id": "cis_rhel10_2-3.3", "description": "No notes for control-id 2.3.3.", "props": [ @@ -20325,7 +20185,7 @@ ] }, { - "uuid": "8a9f9c62-9277-4818-a425-7d2f073c8934", + "uuid": "9e6d5ebc-2014-4616-b2fd-6117b0d93688", "control-id": "cis_rhel10_2-4.1.1", "description": "No notes for control-id 2.4.1.1.", "props": [ @@ -20347,7 +20207,7 @@ ] }, { - "uuid": "98a3ef95-c64f-4327-98ca-a76428c3382e", + "uuid": "ac1d66b6-72ab-47f1-878c-6463b4af7b5b", "control-id": "cis_rhel10_2-4.1.2", "description": "No notes for control-id 2.4.1.2.", "props": [ @@ -20374,7 +20234,7 @@ ] }, { - "uuid": "77dc24d4-ab8a-44cf-9859-24879cd1e9df", + "uuid": "dcc340fe-4fa2-4c08-a0ee-649197b5a0a4", "control-id": "cis_rhel10_2-4.1.3", "description": "No notes for control-id 2.4.1.3.", "props": [ @@ -20401,7 +20261,7 @@ ] }, { - "uuid": "05c68920-5c9b-445d-a020-0891441c619b", + "uuid": "c64b7ee8-06ac-4c05-8e0a-c2528bf9763c", "control-id": "cis_rhel10_2-4.1.4", "description": "No notes for control-id 2.4.1.4.", "props": [ @@ -20428,7 +20288,7 @@ ] }, { - "uuid": "3ce81162-bf56-4a92-be15-046e77a1591e", + "uuid": "60dca3dc-3b39-456f-a255-f60f4a2f3f70", "control-id": "cis_rhel10_2-4.1.5", "description": "No notes for control-id 2.4.1.5.", "props": [ @@ -20455,7 +20315,7 @@ ] }, { - "uuid": "b04129b4-3166-49c4-90b5-2c12abeb8d3d", + "uuid": "c4829ff5-cbc6-4490-8291-5db6d94a709c", "control-id": "cis_rhel10_2-4.1.6", "description": "No notes for control-id 2.4.1.6.", "props": [ @@ -20482,7 +20342,7 @@ ] }, { - "uuid": "a7ff0c5b-8bee-4b41-aea2-4add314a7b55", + "uuid": "ff7e1cf3-dfb3-436e-bc01-7e90d485cba6", "control-id": "cis_rhel10_2-4.1.7", "description": "No notes for control-id 2.4.1.7.", "props": [ @@ -20509,7 +20369,7 @@ ] }, { - "uuid": "77a25256-3231-4154-9aa9-2107538542f9", + "uuid": "1be62c1a-a850-47c1-959a-a52c764cf767", "control-id": "cis_rhel10_2-4.1.8", "description": "No notes for control-id 2.4.1.8.", "props": [ @@ -20536,7 +20396,7 @@ ] }, { - "uuid": "a1f79bd1-d4fd-488f-98cf-ca185ad056f1", + "uuid": "25873000-6ee7-48bb-82ff-1ae55580b793", "control-id": "cis_rhel10_2-4.1.9", "description": "No notes for control-id 2.4.1.9.", "props": [ @@ -20573,7 +20433,7 @@ ] }, { - "uuid": "537cc8c0-31d7-4cc0-a1b2-fbc52259e2c6", + "uuid": "f2921c3f-0289-41d4-885d-a49f6cea59d8", "control-id": "cis_rhel10_2-4.2.1", "description": "No notes for control-id 2.4.2.1.", "props": [ @@ -20610,7 +20470,7 @@ ] }, { - "uuid": "e12a5fc5-7a5d-4b2c-bda1-6289390581b6", + "uuid": "b43023cc-fc1b-4bc9-aacc-9474c8ebd193", "control-id": "cis_rhel10_3-1.1", "description": "The description for control-id cis_rhel10_3-1.1.", "props": [ @@ -20623,7 +20483,7 @@ ] }, { - "uuid": "7b37d519-0703-4355-80a0-951a0e5bba5f", + "uuid": "04d42112-563a-42f7-80dc-f84c74faea85", "control-id": "cis_rhel10_3-2.1", "description": "No notes for control-id 3.2.1.", "props": [ @@ -20640,7 +20500,7 @@ ] }, { - "uuid": "9790f014-0f93-47e6-bd67-957e12182cb3", + "uuid": "8c324452-13b9-4f93-8609-cd3249a2dc12", "control-id": "cis_rhel10_3-2.2", "description": "No notes for control-id 3.2.2.", "props": [ @@ -20657,7 +20517,7 @@ ] }, { - "uuid": "c82b5344-c6d8-4e13-a02f-44102d942823", + "uuid": "67f6b7d8-1465-4cfa-90b3-b555f659bc66", "control-id": "cis_rhel10_3-2.3", "description": "No notes for control-id 3.2.3.", "props": [ @@ -20674,7 +20534,7 @@ ] }, { - "uuid": "c5620219-ac49-45d9-9d07-90a71a448957", + "uuid": "700c0291-90f2-4f67-8f69-09843641a7d9", "control-id": "cis_rhel10_3-2.4", "description": "No notes for control-id 3.2.4.", "props": [ @@ -20691,7 +20551,7 @@ ] }, { - "uuid": "29355baa-2106-43bb-90f4-8c0d6bc2baf5", + "uuid": "ef360d6e-3841-47cb-94aa-10fd5b4fc244", "control-id": "cis_rhel10_3-2.5", "description": "No notes for control-id 3.2.5.", "props": [ @@ -20708,7 +20568,7 @@ ] }, { - "uuid": "d6af398a-8094-4480-85ba-1d56f3dc1434", + "uuid": "e9ebae38-1aaa-4991-9272-d99a28a641c7", "control-id": "cis_rhel10_3-2.6", "description": "No notes for control-id 3.2.6.", "props": [ @@ -20725,7 +20585,7 @@ ] }, { - "uuid": "076265ad-2837-4ef8-8157-83afcea64c53", + "uuid": "8f155474-1e5c-480a-978a-7b6c7d4c1cb8", "control-id": "cis_rhel10_3-3.1.1", "description": "No notes for control-id 3.3.1.1.", "props": [ @@ -20742,7 +20602,7 @@ ] }, { - "uuid": "79ea4826-9b5d-41d1-914e-693c981a7058", + "uuid": "9df0c18f-0f5f-479e-bbcb-ca8287f4ed73", "control-id": "cis_rhel10_3-3.1.2", "description": "No notes for control-id 3.3.1.2.", "props": [ @@ -20759,7 +20619,7 @@ ] }, { - "uuid": "3df8ff0f-2616-413d-ad8e-9396e281fbf0", + "uuid": "f6675a54-4881-42bf-8082-78276bada2a1", "control-id": "cis_rhel10_3-3.1.3", "description": "No notes for control-id 3.3.1.3.", "props": [ @@ -20776,7 +20636,7 @@ ] }, { - "uuid": "3f111fcf-4207-4fc3-aae6-2ad9e420344c", + "uuid": "7d7d1cc3-f196-46aa-bdb3-42fb2af71228", "control-id": "cis_rhel10_3-3.1.4", "description": "No notes for control-id 3.3.1.4.", "props": [ @@ -20793,7 +20653,7 @@ ] }, { - "uuid": "494ee604-6451-48d1-8daa-8259911d4339", + "uuid": "34c3bf24-a823-421b-91ec-6e24dc237a28", "control-id": "cis_rhel10_3-3.1.5", "description": "No notes for control-id 3.3.1.5.", "props": [ @@ -20810,7 +20670,7 @@ ] }, { - "uuid": "67a6d1d3-0da1-4f6c-9c90-fd6c6dc01f73", + "uuid": "061c0b03-47e7-4e29-8cb2-4fbd7a98fb54", "control-id": "cis_rhel10_3-3.1.6", "description": "No notes for control-id 3.3.1.6.", "props": [ @@ -20827,7 +20687,7 @@ ] }, { - "uuid": "566ea7c7-6854-4616-97ec-0f770602dab7", + "uuid": "229105c4-d371-41f1-9816-5de748645bf6", "control-id": "cis_rhel10_3-3.1.7", "description": "No notes for control-id 3.3.1.7.", "props": [ @@ -20844,7 +20704,7 @@ ] }, { - "uuid": "f89d4bbd-a58c-4852-b902-43afc8b6a0c2", + "uuid": "c9734563-9611-43e3-b0fa-a65b1dc01df2", "control-id": "cis_rhel10_3-3.1.8", "description": "No notes for control-id 3.3.1.8.", "props": [ @@ -20861,7 +20721,7 @@ ] }, { - "uuid": "4b2ee9fa-6bdf-4428-b5b4-fb94d12e8654", + "uuid": "70c47c0c-5ba5-4473-80f9-f82264619695", "control-id": "cis_rhel10_3-3.1.9", "description": "No notes for control-id 3.3.1.9.", "props": [ @@ -20878,7 +20738,7 @@ ] }, { - "uuid": "e3c0ae17-9fc7-4e0d-bd8f-05768efcd9b6", + "uuid": "e080c966-a366-492e-8004-1473e7e3a2e8", "control-id": "cis_rhel10_3-3.1.10", "description": "No notes for control-id 3.3.1.10.", "props": [ @@ -20895,7 +20755,7 @@ ] }, { - "uuid": "449a28f5-523f-44ee-a122-bd179cf129d0", + "uuid": "04ec1903-0b8c-4cfa-9137-3a3881fa9ef4", "control-id": "cis_rhel10_3-3.1.11", "description": "No notes for control-id 3.3.1.11.", "props": [ @@ -20912,7 +20772,7 @@ ] }, { - "uuid": "f0dd90fe-3d70-4c2c-bc61-4f9ba3495934", + "uuid": "bee4f8ab-3e68-43c4-8321-5cb1e477d46b", "control-id": "cis_rhel10_3-3.1.12", "description": "No notes for control-id 3.3.1.12.", "props": [ @@ -20929,7 +20789,7 @@ ] }, { - "uuid": "5d3f55d2-f627-406b-a304-81fc09e3be0c", + "uuid": "de9f79d8-65c8-4d27-9e26-6aa1928384af", "control-id": "cis_rhel10_3-3.1.13", "description": "No notes for control-id 3.3.1.13.", "props": [ @@ -20946,7 +20806,7 @@ ] }, { - "uuid": "e0bd8355-9836-4e57-99b0-529b032e0446", + "uuid": "b8a18433-9fc8-4743-baa3-2668d488cf7c", "control-id": "cis_rhel10_3-3.1.14", "description": "No notes for control-id 3.3.1.14.", "props": [ @@ -20963,7 +20823,7 @@ ] }, { - "uuid": "9b449795-6b36-4693-847f-106ecfa204dd", + "uuid": "88dd0316-32ad-4030-91ba-105cb5cd2aad", "control-id": "cis_rhel10_3-3.1.15", "description": "No notes for control-id 3.3.1.15.", "props": [ @@ -20980,7 +20840,7 @@ ] }, { - "uuid": "fd36a91c-fa65-4a9e-b91a-57c2ddf9e57d", + "uuid": "10a5adff-f55a-44b1-95d8-db7c5bbe1b80", "control-id": "cis_rhel10_3-3.1.16", "description": "No notes for control-id 3.3.1.16.", "props": [ @@ -20997,7 +20857,7 @@ ] }, { - "uuid": "297518ea-36a4-49be-9711-554f6c62e52e", + "uuid": "41466824-7684-4c4d-9794-7a363a22c3c1", "control-id": "cis_rhel10_3-3.1.17", "description": "No notes for control-id 3.3.1.17.", "props": [ @@ -21014,7 +20874,7 @@ ] }, { - "uuid": "26551d96-1c70-4869-b7ec-61a5115da8b2", + "uuid": "ce4d650b-2b53-4bea-a399-4839b016a4ef", "control-id": "cis_rhel10_3-3.1.18", "description": "No notes for control-id 3.3.1.18.", "props": [ @@ -21031,7 +20891,7 @@ ] }, { - "uuid": "ab58aa16-e304-4a40-95d7-a1b65fb1c7ac", + "uuid": "85953144-46ad-4527-847f-706d53b7bd7c", "control-id": "cis_rhel10_3-3.2.1", "description": "No notes for control-id 3.3.2.1.", "props": [ @@ -21048,7 +20908,7 @@ ] }, { - "uuid": "f2cdb369-ad6f-4b5a-8107-b0c2d2541589", + "uuid": "ec5d1e0d-dc70-4121-a029-3850d4ed67b7", "control-id": "cis_rhel10_3-3.2.2", "description": "No notes for control-id 3.3.2.2.", "props": [ @@ -21065,7 +20925,7 @@ ] }, { - "uuid": "a142006d-e9b5-4353-9f51-c563c9e8a58d", + "uuid": "afa3a5b2-b34b-4b49-9086-369285aa32df", "control-id": "cis_rhel10_3-3.2.3", "description": "No notes for control-id 3.3.2.3.", "props": [ @@ -21082,7 +20942,7 @@ ] }, { - "uuid": "69dd000d-0ebb-47a7-8562-f12c07a5aa24", + "uuid": "997c5f5a-2558-43d9-a4cf-2918e6ae29e9", "control-id": "cis_rhel10_3-3.2.4", "description": "No notes for control-id 3.3.2.4.", "props": [ @@ -21099,7 +20959,7 @@ ] }, { - "uuid": "9776b864-f083-45eb-8294-106f52ceb800", + "uuid": "81ac8855-f02e-473d-afe7-8b665576102a", "control-id": "cis_rhel10_3-3.2.5", "description": "No notes for control-id 3.3.2.5.", "props": [ @@ -21116,7 +20976,7 @@ ] }, { - "uuid": "3b0ee3ca-b525-4876-b17b-9c181dc906cf", + "uuid": "1d93f0f7-8464-4768-a62f-5f7b3e22907c", "control-id": "cis_rhel10_3-3.2.6", "description": "No notes for control-id 3.3.2.6.", "props": [ @@ -21133,7 +20993,7 @@ ] }, { - "uuid": "5e6126a6-542f-4c1d-ad0c-f7f5a191a771", + "uuid": "212968f2-863b-4b59-a4d6-9ca34695b32b", "control-id": "cis_rhel10_3-3.2.7", "description": "No notes for control-id 3.3.2.7.", "props": [ @@ -21150,7 +21010,7 @@ ] }, { - "uuid": "7ae9cbc0-c021-4316-95b1-910caceede7c", + "uuid": "7c162364-0696-45fa-be88-096de9b5a0e9", "control-id": "cis_rhel10_3-3.2.8", "description": "No notes for control-id 3.3.2.8.", "props": [ @@ -21167,7 +21027,7 @@ ] }, { - "uuid": "5d2ab20b-c760-4465-ad68-fa669240f9ef", + "uuid": "31542171-b419-4089-b6c1-67cee6db2aaf", "control-id": "cis_rhel10_4-1.1", "description": "No notes for control-id 4.1.1.", "props": [ @@ -21184,7 +21044,7 @@ ] }, { - "uuid": "5242eb6c-bbbf-4c0a-ad32-8eb581796875", + "uuid": "4d7099ce-afaa-41a7-af7d-cf7238dbde23", "control-id": "cis_rhel10_4-1.2", "description": "No notes for control-id 4.1.2.", "props": [ @@ -21201,7 +21061,7 @@ ] }, { - "uuid": "fe3fa4ec-f0be-4f71-8e2e-128fc2ddb88d", + "uuid": "49ae3aac-7bf4-4326-b4d0-55ab885ba806", "control-id": "cis_rhel10_4-1.3", "description": "No notes for control-id 4.1.3.", "props": [ @@ -21218,7 +21078,7 @@ ] }, { - "uuid": "366b50b0-894f-45d7-86f4-11eb1ebb95d4", + "uuid": "2d4b54b5-7c2d-44e1-a4c7-48c45b6c4ab3", "control-id": "cis_rhel10_4-1.4", "description": "The description for control-id cis_rhel10_4-1.4.", "props": [ @@ -21231,7 +21091,7 @@ ] }, { - "uuid": "1bd59013-c33e-476b-949f-a8896504b0e0", + "uuid": "8c062afe-dfe9-4a85-8486-17b6d5ddb699", "control-id": "cis_rhel10_4-1.5", "description": "Firewalld in Red Hat Enterprise Linux 10 accepts loopback traffic by default.", "props": [ @@ -21248,7 +21108,7 @@ ] }, { - "uuid": "057112dc-5258-4161-bbb4-5e2aa32e3451", + "uuid": "178b083f-9b89-431d-be70-1efb67e851a9", "control-id": "cis_rhel10_4-1.6", "description": "The description for control-id cis_rhel10_4-1.6.", "props": [ @@ -21261,7 +21121,7 @@ ] }, { - "uuid": "8a805fab-9dc6-471c-b04c-594c4fb474a2", + "uuid": "94cce221-9329-442f-8386-b57eed88e70f", "control-id": "cis_rhel10_4-1.7", "description": "The description for control-id cis_rhel10_4-1.7.", "props": [ @@ -21274,7 +21134,7 @@ ] }, { - "uuid": "059c7196-f281-4e18-b352-635ed6d34483", + "uuid": "ddb9675a-a890-46a1-be2a-2ba89f142ae4", "control-id": "cis_rhel10_5-1.1", "description": "No notes for control-id 5.1.1.", "props": [ @@ -21331,7 +21191,7 @@ ] }, { - "uuid": "4d6c3ad7-6835-46d2-b1c8-7120a7fa7ccd", + "uuid": "4ee92508-9a67-46e6-ad96-dd1224f9430b", "control-id": "cis_rhel10_5-1.2", "description": "No notes for control-id 5.1.2.", "props": [ @@ -21358,7 +21218,7 @@ ] }, { - "uuid": "7061e44b-c914-47d4-97c9-737c42405dc5", + "uuid": "2801d089-2ec9-46ce-b6ea-ce550167f6e1", "control-id": "cis_rhel10_5-1.3", "description": "No notes for control-id 5.1.3.", "props": [ @@ -21385,7 +21245,7 @@ ] }, { - "uuid": "44f632f2-efe1-42d1-adc8-d4b7c09b107a", + "uuid": "c451d056-34a3-4426-9e34-32dc2b36f8e6", "control-id": "cis_rhel10_5-1.4", "description": "No notes for control-id 5.1.4.", "props": [ @@ -21402,7 +21262,7 @@ ] }, { - "uuid": "afa9ee67-bfd6-4a36-8871-dad98b165fe5", + "uuid": "e934ae07-560a-4df6-aa64-a3b13969a5b1", "control-id": "cis_rhel10_5-1.5", "description": "No notes for control-id 5.1.5.", "props": [ @@ -21419,7 +21279,7 @@ ] }, { - "uuid": "21450aed-896d-4f13-8bb7-afdc86b5703e", + "uuid": "576b49b6-7ce1-4ff3-a92d-d531a927bd53", "control-id": "cis_rhel10_5-1.6", "description": "No notes for control-id 5.1.6.", "props": [ @@ -21436,7 +21296,7 @@ ] }, { - "uuid": "bb05c3c0-dda4-4190-ad26-984fd3b49d59", + "uuid": "18748217-8ff1-42c1-bc4b-613ec6eddb87", "control-id": "cis_rhel10_5-1.7", "description": "The requirement gives an example of 45 seconds, but is flexible about the values. It is only\nnecessary to ensure there is a timeout configured in alignment to the site policy.", "props": [ @@ -21458,7 +21318,7 @@ ] }, { - "uuid": "44f5ee0a-97a9-433d-9410-4d2765675bd1", + "uuid": "ec808b05-1a2e-4a8b-a2b8-358292f4f59b", "control-id": "cis_rhel10_5-1.8", "description": "No notes for control-id 5.1.8.", "props": [ @@ -21475,7 +21335,7 @@ ] }, { - "uuid": "6600a0ef-ae5c-4408-839d-dfabf01edd7d", + "uuid": "bfecdbda-5bf7-41d4-9b90-e27dd6a3ac7a", "control-id": "cis_rhel10_5-1.9", "description": "No notes for control-id 5.1.9.", "props": [ @@ -21492,7 +21352,7 @@ ] }, { - "uuid": "6d3e7590-6a2c-4f36-a5c5-924a7a720d98", + "uuid": "3f1b79b7-efca-44a3-ad4a-4dcf493b5143", "control-id": "cis_rhel10_5-1.10", "description": "No notes for control-id 5.1.10.", "props": [ @@ -21509,7 +21369,7 @@ ] }, { - "uuid": "700313ea-10e7-419d-a6c1-17f897a7f38e", + "uuid": "4aa242e8-7e92-46ff-977f-87cc6e48db22", "control-id": "cis_rhel10_5-1.11", "description": "No notes for control-id 5.1.11.", "props": [ @@ -21526,7 +21386,7 @@ ] }, { - "uuid": "d1a1b20f-f0a1-49aa-b819-a1f5ee16d59f", + "uuid": "2c675924-c1cf-4358-8879-8828bd6c9740", "control-id": "cis_rhel10_5-1.12", "description": "The description for control-id cis_rhel10_5-1.12.", "props": [ @@ -21544,7 +21404,7 @@ ] }, { - "uuid": "5645e36d-d6b0-4e3f-8249-034b8e09e3a9", + "uuid": "2cf5cf3d-d417-4274-880c-f0e010097a92", "control-id": "cis_rhel10_5-1.13", "description": "No notes for control-id 5.1.13.", "props": [ @@ -21561,7 +21421,7 @@ ] }, { - "uuid": "09492bcb-412c-489b-ba2c-d817896673c3", + "uuid": "84f38a4a-7f70-41eb-affd-033a2b1825c2", "control-id": "cis_rhel10_5-1.14", "description": "The CIS benchmark is not opinionated about which loglevel is selected here. Here, this\nprofile uses VERBOSE by default, as it allows for the capture of login and logout activity\nas well as key fingerprints.", "props": [ @@ -21578,7 +21438,7 @@ ] }, { - "uuid": "5fbb3448-2502-4398-a79e-240c1f792fee", + "uuid": "fe9e3755-e872-4321-bd8e-ae1195ac0ff3", "control-id": "cis_rhel10_5-1.15", "description": "No notes for control-id 5.1.15.", "props": [ @@ -21595,7 +21455,7 @@ ] }, { - "uuid": "fa8f67f4-d4b9-4740-8de8-9027881f8d4e", + "uuid": "45ed5415-0a51-49f6-bdb2-2ba0fd543de9", "control-id": "cis_rhel10_5-1.16", "description": "No notes for control-id 5.1.16.", "props": [ @@ -21612,7 +21472,7 @@ ] }, { - "uuid": "f8e31e8d-0825-4875-b7dd-41acfe2b4957", + "uuid": "49fd91dc-4311-41f9-91ce-1be42243253c", "control-id": "cis_rhel10_5-1.17", "description": "No notes for control-id 5.1.17.", "props": [ @@ -21629,7 +21489,7 @@ ] }, { - "uuid": "d5e23df2-203c-4b77-afc9-fdcaaeff3a31", + "uuid": "fc437f66-3170-43b6-9a9c-5d1955f787ab", "control-id": "cis_rhel10_5-1.18", "description": "No notes for control-id 5.1.18.", "props": [ @@ -21646,7 +21506,7 @@ ] }, { - "uuid": "1d9fe40e-e8e8-4ef6-a16e-6edc39eb5d47", + "uuid": "d858f785-dbb8-4acd-b908-07249266b86b", "control-id": "cis_rhel10_5-1.19", "description": "No notes for control-id 5.1.19.", "props": [ @@ -21663,7 +21523,7 @@ ] }, { - "uuid": "dab3bdd1-6d0e-49f9-b559-ba011203aa1c", + "uuid": "af9c9f7f-4db0-46e8-8545-ba4ab4220c06", "control-id": "cis_rhel10_5-1.20", "description": "No notes for control-id 5.1.20.", "props": [ @@ -21680,7 +21540,7 @@ ] }, { - "uuid": "01e1a399-1be5-4607-bfdf-31fdd58d087a", + "uuid": "d6371655-55b5-4c1b-b36b-0066225ede20", "control-id": "cis_rhel10_5-1.21", "description": "No notes for control-id 5.1.21.", "props": [ @@ -21697,7 +21557,7 @@ ] }, { - "uuid": "ec663976-e361-4149-b477-b6203eaea006", + "uuid": "1773c6b9-b2ae-4662-afc9-fa6871f16ee6", "control-id": "cis_rhel10_5-1.22", "description": "No notes for control-id 5.1.22.", "props": [ @@ -21714,7 +21574,7 @@ ] }, { - "uuid": "6fd09694-3678-4d1e-a058-af5326fb64c0", + "uuid": "e12087dd-ee7c-4737-acfa-6715fef016fd", "control-id": "cis_rhel10_5-2.1", "description": "No notes for control-id 5.2.1.", "props": [ @@ -21731,7 +21591,7 @@ ] }, { - "uuid": "d3080060-db33-4656-af14-db890d21cae3", + "uuid": "b72136cb-239d-4834-b43e-5e27e8575abf", "control-id": "cis_rhel10_5-2.2", "description": "No notes for control-id 5.2.2.", "props": [ @@ -21748,7 +21608,7 @@ ] }, { - "uuid": "0965c664-e0ea-414c-be55-9eb90cee23d4", + "uuid": "b9b0c845-1bba-4281-a307-43932549b270", "control-id": "cis_rhel10_5-2.3", "description": "No notes for control-id 5.2.3.", "props": [ @@ -21765,7 +21625,7 @@ ] }, { - "uuid": "56594c1a-7e90-4a60-9b92-443249e0bc89", + "uuid": "77d76e88-a81b-4994-ac31-5428d8d8f084", "control-id": "cis_rhel10_5-2.5", "description": "No notes for control-id 5.2.5.", "props": [ @@ -21782,7 +21642,7 @@ ] }, { - "uuid": "dba32c85-6c8e-4877-9abd-c73f3594f0bf", + "uuid": "f9cdfeeb-5643-4b29-b475-5a33da0e0050", "control-id": "cis_rhel10_5-2.6", "description": "No notes for control-id 5.2.6.", "props": [ @@ -21799,7 +21659,7 @@ ] }, { - "uuid": "860ffe5b-9765-4712-bb7b-8d7ae86d94bf", + "uuid": "552a63b7-9208-4a03-a1d3-ae77bfb90979", "control-id": "cis_rhel10_5-2.7", "description": "Members of \"wheel\" or GID 0 groups are checked by default if the group option is not set for\npam_wheel.so module. The recommendation states the group should be empty to reinforce the\nuse of \"sudo\" for privileged access. Therefore, members of these groups should be manually\nchecked or a different group should be informed.", "props": [ @@ -21821,7 +21681,7 @@ ] }, { - "uuid": "365c74b2-fb81-4ad0-b44b-47540921cf55", + "uuid": "f80a088e-4039-4210-ad1a-86e8ee734329", "control-id": "cis_rhel10_5-3.1.1", "description": "This requirement is hard to be automated without any specific requirement. The policy even\nstates that provided commands are examples, other custom settings might be in place and the\nsettings might be different depending on site policies. The other rules will already make\nsure there is a correct autheselect profile regardless of the existing settings. It is\nnecessary to better discuss with CIS Community.", "props": [ @@ -21833,7 +21693,7 @@ ] }, { - "uuid": "a39fc55f-0a45-45c8-b5db-9b5c182412c2", + "uuid": "8fc2fb9d-8058-46fb-a494-c2f29ac31439", "control-id": "cis_rhel10_5-3.1.2", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.1.", "props": [ @@ -21855,7 +21715,7 @@ ] }, { - "uuid": "0cff3673-07aa-4adf-80af-46e1516dfeb2", + "uuid": "18f07ca1-056a-4f60-aa46-523acb30077c", "control-id": "cis_rhel10_5-3.1.3", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.2.", "props": [ @@ -21882,7 +21742,7 @@ ] }, { - "uuid": "5ac13780-c732-4c2f-8492-be6d3f638c67", + "uuid": "931bc09b-e8c3-42d2-9e91-42e0552a3a97", "control-id": "cis_rhel10_5-3.1.4", "description": "The module is properly enabled by the rules mentioned in related_rules.\nRequirements in 5.3.2.3 use these rules.", "props": [ @@ -21894,7 +21754,7 @@ ] }, { - "uuid": "a7109ab8-f7f5-4bfd-9b88-8f855b4edd35", + "uuid": "b93855a9-cc64-4ad3-84e1-2cc3e204a548", "control-id": "cis_rhel10_5-3.1.5", "description": "No notes for control-id 5.3.1.5.", "props": [ @@ -21911,7 +21771,7 @@ ] }, { - "uuid": "d4978b6c-9177-4079-a4b4-be06866d4553", + "uuid": "046395d6-8cc6-44bf-a55a-c09c701cba52", "control-id": "cis_rhel10_5-3.2.1.1", "description": "No notes for control-id 5.3.2.1.1.", "props": [ @@ -21928,7 +21788,7 @@ ] }, { - "uuid": "da876bb2-6565-4e20-89d1-5cf6ee4885bb", + "uuid": "7354f71e-d522-4f4c-8c3a-993edaa17734", "control-id": "cis_rhel10_5-3.2.1.2", "description": "The policy also accepts value 0, which means the locked accounts should be manually unlocked\nby an administrator. However, it also mentions that using value 0 can facilitate a DoS\nattack to legitimate users.", "props": [ @@ -21945,7 +21805,7 @@ ] }, { - "uuid": "89febe26-c24d-4958-96b6-0066004515f9", + "uuid": "949fd5c1-7a5d-401e-99d5-957522e81c55", "control-id": "cis_rhel10_5-3.2.2.1", "description": "No notes for control-id 5.3.2.2.1.", "props": [ @@ -21962,7 +21822,7 @@ ] }, { - "uuid": "ce139378-00bc-4c88-bad8-0fe5492c10a6", + "uuid": "f766dd68-0d4b-450c-a1e9-e6d498598cf9", "control-id": "cis_rhel10_5-3.2.2.2", "description": "No notes for control-id 5.3.2.2.2.", "props": [ @@ -21979,7 +21839,7 @@ ] }, { - "uuid": "f2a31460-0cf1-4517-950a-cac0277fe410", + "uuid": "651c4ae1-b241-4083-b627-363109593f82", "control-id": "cis_rhel10_5-3.2.2.3", "description": "This requirement is expected to be manual. However, in previous versions of the policy\nit was already automated the configuration of \"minclass\" option. This posture was kept for\nRHEL 10 in this new version. Rules related to other options are informed in related_rules.\nIn short, minclass=4 alone can achieve the same result achieved by the combination of the\nother 4 options mentioned in the policy.", "props": [ @@ -21996,7 +21856,7 @@ ] }, { - "uuid": "f05369cc-3e98-40bb-8009-1a0b6b361cfb", + "uuid": "9f4ecb30-1f93-4d78-976f-6e0d37014bb9", "control-id": "cis_rhel10_5-3.2.2.4", "description": "No notes for control-id 5.3.2.2.4.", "props": [ @@ -22013,7 +21873,7 @@ ] }, { - "uuid": "4b2edcff-f4dd-414a-9758-2d8a81e0f547", + "uuid": "7b89821c-ea37-4e27-9251-92eb95b492da", "control-id": "cis_rhel10_5-3.2.2.5", "description": "No notes for control-id 5.3.2.2.5.", "props": [ @@ -22030,7 +21890,7 @@ ] }, { - "uuid": "3df4ef5d-3972-4b1a-acad-4f6a69d91348", + "uuid": "35dcc171-93cb-4aa5-bcf6-d8eec20a8457", "control-id": "cis_rhel10_5-3.2.2.6", "description": "No notes for control-id 5.3.2.2.6.", "props": [ @@ -22047,7 +21907,7 @@ ] }, { - "uuid": "051bd556-acad-4303-abbb-aa8cc8c30027", + "uuid": "0352b7a5-8293-4d8b-8cc7-cb9579f57eab", "control-id": "cis_rhel10_5-3.2.2.7", "description": "No notes for control-id 5.3.2.2.7.", "props": [ @@ -22064,7 +21924,7 @@ ] }, { - "uuid": "27efb34a-5831-45eb-ad3b-6fbd5cc0d125", + "uuid": "893beb77-b0a7-478f-88b6-eea7cea3a5bd", "control-id": "cis_rhel10_5-3.2.3.1", "description": "Although mentioned in the section 5.3.3.3, there is no explicit requirement to configure\nretry option of pam_pwhistory. If come in the future, the rule accounts_password_pam_retry\ncan be used.", "props": [ @@ -22086,7 +21946,7 @@ ] }, { - "uuid": "433961a6-8501-408e-99fe-695d59e6fce6", + "uuid": "1b04bee0-31cf-4103-8d04-780d7eb78315", "control-id": "cis_rhel10_5-3.2.3.2", "description": "No notes for control-id 5.3.2.3.2.", "props": [ @@ -22103,7 +21963,7 @@ ] }, { - "uuid": "10c9ca15-9470-4cf2-9e2f-343e03c2a9ef", + "uuid": "b6b2ecf2-46c1-4710-8024-7e2a1a0b9c11", "control-id": "cis_rhel10_5-3.2.3.3", "description": "In RHEL 10 pam_pwhistory is enabled via authselect feature, as required in 5.3.1.4. The\nfeature automatically set \"use_authok\" option. In any case, we don't have a rule to check\nthis option specifically.", "props": [ @@ -22120,7 +21980,7 @@ ] }, { - "uuid": "4c07300b-8b7f-4212-8ce2-d6014eaff839", + "uuid": "50635af7-9bfa-44f4-aee7-6b7e4c5872e8", "control-id": "cis_rhel10_5-3.2.4.1", "description": "The rule more specifically used in this requirement also satify the requirement 5.3.1.5.", "props": [ @@ -22137,7 +21997,7 @@ ] }, { - "uuid": "1c4324c6-0b03-4e1d-9258-b67f4e6299bc", + "uuid": "9c034d3a-ed2b-4c25-b625-abdbc21d8cea", "control-id": "cis_rhel10_5-3.2.4.2", "description": "Usage of pam_unix.so module together with \"remember\" option is deprecated and is not\nrecommended by this policy. Instead, it should be used remember option of pam_pwhistory\nmodule, as required in 5.3.2.3.1. See here for more details about pam_unix.so:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1778929", "props": [ @@ -22154,7 +22014,7 @@ ] }, { - "uuid": "a9ffde6d-5939-43eb-8a5b-125a9bad4792", + "uuid": "c2c57974-90cd-47dd-b8fa-cb281d740205", "control-id": "cis_rhel10_5-3.2.4.3", "description": "Changes in logindefs mentioned in this requirement are more specifically covered by 5.4.1.4", "props": [ @@ -22176,7 +22036,7 @@ ] }, { - "uuid": "e683cf0a-f3ef-4c75-824c-f81c75f1002d", + "uuid": "0f2ff70f-ff56-49a3-bb23-2d306f140f73", "control-id": "cis_rhel10_5-3.2.4.4", "description": "In RHEL 10 pam_unix is enabled by default in all authselect profiles already with the\nuse_authtok option set. In any case, we don't have a rule to check this option specifically,\nlike in 5.3.2.3.3.", "props": [ @@ -22193,7 +22053,7 @@ ] }, { - "uuid": "675b34e5-f825-4d5c-87cd-366059c4f979", + "uuid": "78abe432-f147-465c-bc6f-e1b8c5336135", "control-id": "cis_rhel10_5-4.1.1", "description": "No notes for control-id 5.4.1.1.", "props": [ @@ -22215,7 +22075,7 @@ ] }, { - "uuid": "5b9fceda-2165-4553-8ca2-52e17160e345", + "uuid": "23aa4e09-e890-49bf-a8b6-ac3f3dcb2935", "control-id": "cis_rhel10_5-4.1.3", "description": "No notes for control-id 5.4.1.3.", "props": [ @@ -22237,7 +22097,7 @@ ] }, { - "uuid": "7437a7b4-b5c1-4809-a5c3-4e570bcf8307", + "uuid": "401cd63d-8bef-41c9-9d90-a5c33425a8a7", "control-id": "cis_rhel10_5-4.1.4", "description": "There's a \"new\" set of options in /etc/login.defs file to define the number of iterations\nperformed during the hashing process.", "props": [ @@ -22259,7 +22119,7 @@ ] }, { - "uuid": "37a2c0b9-1b1b-4ecc-8051-417c409751bf", + "uuid": "db046713-c701-4765-b173-7c50e1501c01", "control-id": "cis_rhel10_5-4.1.5", "description": "No notes for control-id 5.4.1.5.", "props": [ @@ -22281,7 +22141,7 @@ ] }, { - "uuid": "897837e3-15a4-4c97-a976-f901426f071c", + "uuid": "9df1589b-839e-4730-b3de-a6c0bb2967f2", "control-id": "cis_rhel10_5-4.1.6", "description": "No notes for control-id 5.4.1.6.", "props": [ @@ -22298,7 +22158,7 @@ ] }, { - "uuid": "cdb9b476-80a6-4d21-a931-4a1073b3ed79", + "uuid": "39b926c9-1d91-4b6e-a563-ddc685c48a0e", "control-id": "cis_rhel10_5-4.2.1", "description": "No notes for control-id 5.4.2.1.", "props": [ @@ -22315,7 +22175,7 @@ ] }, { - "uuid": "7abc7b84-c74d-4ca7-ac4e-796d99797eb6", + "uuid": "b2313a35-92a7-4d0b-82a0-da52aabebb48", "control-id": "cis_rhel10_5-4.2.2", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -22332,7 +22192,7 @@ ] }, { - "uuid": "0979c1dd-d234-48ab-9114-bfa8ca59d649", + "uuid": "35dd2df7-7e07-43c7-8892-30152649a23a", "control-id": "cis_rhel10_5-4.2.3", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -22349,7 +22209,7 @@ ] }, { - "uuid": "fa38cbb7-7588-44e8-bc0f-bf3bb1943e8c", + "uuid": "f5d26e70-3fee-411e-8b84-e0aa48ada1c9", "control-id": "cis_rhel10_5-4.2.4", "description": "No notes for control-id 5.4.2.4.", "props": [ @@ -22366,7 +22226,7 @@ ] }, { - "uuid": "7e368546-9683-4f82-afb0-3ef234124d5f", + "uuid": "0c830eb5-572f-4c06-80fb-b789f364d4be", "control-id": "cis_rhel10_5-4.2.5", "description": "No notes for control-id 5.4.2.5.", "props": [ @@ -22388,7 +22248,7 @@ ] }, { - "uuid": "107edae4-5062-47aa-8fcd-769123b8cd8b", + "uuid": "9e4b9223-da06-47a8-b394-4dd18e92c3c2", "control-id": "cis_rhel10_5-4.2.6", "description": "No notes for control-id 5.4.2.6.", "props": [ @@ -22405,7 +22265,7 @@ ] }, { - "uuid": "d3202878-4579-4956-a638-a28a31471bf9", + "uuid": "84ace3bd-93be-42eb-a306-bd732edee53d", "control-id": "cis_rhel10_5-4.2.7", "description": "No notes for control-id 5.4.2.7.", "props": [ @@ -22427,7 +22287,7 @@ ] }, { - "uuid": "70d0d979-2aeb-47fc-b90a-70ede655e436", + "uuid": "08404bb1-b9fb-491c-a715-337b2e2acc8e", "control-id": "cis_rhel10_5-4.2.8", "description": "No notes for control-id 5.4.2.8.", "props": [ @@ -22444,7 +22304,7 @@ ] }, { - "uuid": "15cacf28-b598-41c9-82ea-7c6b6bd31ad3", + "uuid": "cf82a37e-d44b-4b76-a5bf-dbf8f83ff4d4", "control-id": "cis_rhel10_5-4.3.2", "description": "No notes for control-id 5.4.3.2.", "props": [ @@ -22461,7 +22321,7 @@ ] }, { - "uuid": "f2d8f6d1-31c9-4d09-b33a-bf46030c2378", + "uuid": "1eec331d-48a0-45e8-b195-28f53ee19b59", "control-id": "cis_rhel10_5-4.3.3", "description": "No notes for control-id 5.4.3.3.", "props": [ @@ -22488,7 +22348,7 @@ ] }, { - "uuid": "88432148-603d-458a-9233-31f0cdb54130", + "uuid": "2e9fa417-014c-4099-8146-ffe209b702c3", "control-id": "cis_rhel10_6-1.1", "description": "No notes for control-id 6.1.1.", "props": [ @@ -22510,7 +22370,7 @@ ] }, { - "uuid": "70797d88-4860-4082-ae42-d05ab4c85992", + "uuid": "0c6ea3bd-c76a-40ad-9ad0-ff35be031a7b", "control-id": "cis_rhel10_6-1.2", "description": "No notes for control-id 6.1.2.", "props": [ @@ -22527,7 +22387,7 @@ ] }, { - "uuid": "ee49ee3f-669c-4335-92dd-a4bea29e83cd", + "uuid": "39cf5493-331f-4ba1-ab21-712c0254a19d", "control-id": "cis_rhel10_6-1.3", "description": "No notes for control-id 6.1.3.", "props": [ @@ -22544,7 +22404,7 @@ ] }, { - "uuid": "fbad3a23-2b78-4874-a0cd-e02c298b0970", + "uuid": "7cbed2fb-13c2-4c64-864a-04746285ef19", "control-id": "cis_rhel10_6-2.1.1", "description": "No notes for control-id 6.2.1.1.", "props": [ @@ -22561,7 +22421,7 @@ ] }, { - "uuid": "d4ebeaed-e275-43e3-aefe-1522ec747d76", + "uuid": "25796ecf-2cb8-4863-9c14-fcf66cca9f41", "control-id": "cis_rhel10_6-2.1.2", "description": "The description for control-id cis_rhel10_6-2.1.2.", "props": [ @@ -22574,7 +22434,7 @@ ] }, { - "uuid": "18d06440-e0eb-4720-b072-0116f2821517", + "uuid": "a28bc7eb-48f7-4343-b758-67678b41938e", "control-id": "cis_rhel10_6-2.1.3", "description": "The description for control-id cis_rhel10_6-2.1.3.", "props": [ @@ -22587,7 +22447,7 @@ ] }, { - "uuid": "d704e652-2340-46c3-af03-9dee3feeb3de", + "uuid": "cbe24133-b1c3-46c6-9b4c-91a0d02c0184", "control-id": "cis_rhel10_6-2.1.4", "description": "No notes for control-id 6.2.1.4.", "props": [ @@ -22604,7 +22464,7 @@ ] }, { - "uuid": "1bed8bf6-3b60-4917-b223-911caee23b48", + "uuid": "3e5b8b19-24c6-405f-b5d9-e1dcdd7c7114", "control-id": "cis_rhel10_6-2.2.1.1", "description": "No notes for control-id 6.2.2.1.1.", "props": [ @@ -22621,7 +22481,7 @@ ] }, { - "uuid": "89eb6dd4-1f6a-4a4f-a06d-501d0b37a3a1", + "uuid": "ee8d6286-1555-418d-a1db-fa02b345488c", "control-id": "cis_rhel10_6-2.2.1.2", "description": "The description for control-id cis_rhel10_6-2.2.1.2.", "props": [ @@ -22634,7 +22494,7 @@ ] }, { - "uuid": "65c78250-f51e-4879-b394-277b79a63b7b", + "uuid": "ba96b376-4a9b-438b-9bf7-97c8a5b0dbe0", "control-id": "cis_rhel10_6-2.2.1.3", "description": "No notes for control-id 6.2.2.1.3.", "props": [ @@ -22651,7 +22511,7 @@ ] }, { - "uuid": "dc030c30-66ec-4a0e-bb69-5601f79f5cd3", + "uuid": "fbd7c728-e45e-4aeb-b667-2c35abc3cb5b", "control-id": "cis_rhel10_6-2.2.1.4", "description": "No notes for control-id 6.2.2.1.4.", "props": [ @@ -22668,7 +22528,7 @@ ] }, { - "uuid": "564d10c3-d257-48b4-bbc1-ee7a7c895f18", + "uuid": "47543f1e-db1b-4006-bfd9-4f659810740c", "control-id": "cis_rhel10_6-2.2.2", "description": "No notes for control-id 6.2.2.2.", "props": [ @@ -22685,7 +22545,7 @@ ] }, { - "uuid": "e2d3de21-399d-4a34-92d8-90746c5564b2", + "uuid": "2c44c54c-489e-4b7c-baf6-8c4ad94a3228", "control-id": "cis_rhel10_6-2.2.3", "description": "No notes for control-id 6.2.2.3.", "props": [ @@ -22702,7 +22562,7 @@ ] }, { - "uuid": "fc29f35e-60da-401c-8992-b793a0a97337", + "uuid": "504b3d25-f670-4992-978a-ab4f34746033", "control-id": "cis_rhel10_6-2.2.4", "description": "No notes for control-id 6.2.2.4.", "props": [ @@ -22719,7 +22579,7 @@ ] }, { - "uuid": "991a7eba-9941-43f9-9295-fc2aa206f016", + "uuid": "e88f9437-82c1-4c55-be38-1d546e700dd5", "control-id": "cis_rhel10_6-2.3.1", "description": "No notes for control-id 6.2.3.1.", "props": [ @@ -22731,7 +22591,7 @@ ] }, { - "uuid": "1751235f-3c7b-4a1f-913e-583ab5b16e34", + "uuid": "11796fd6-0f4c-47b0-adf0-d9962df3efa2", "control-id": "cis_rhel10_6-2.3.2", "description": "No notes for control-id 6.2.3.2.", "props": [ @@ -22743,7 +22603,7 @@ ] }, { - "uuid": "dc18f654-e0fc-40c2-89b8-ad32070c1fab", + "uuid": "f20c149a-b571-4527-83b3-5fbc7032b48d", "control-id": "cis_rhel10_6-2.3.3", "description": "No notes for control-id 6.2.3.3.", "props": [ @@ -22755,7 +22615,7 @@ ] }, { - "uuid": "52c5df5e-8700-4b04-ba27-6f58054fc84c", + "uuid": "1be8a33b-cd4f-4221-a1db-ded158d631fc", "control-id": "cis_rhel10_6-2.3.4", "description": "No notes for control-id 6.2.3.4.", "props": [ @@ -22767,7 +22627,7 @@ ] }, { - "uuid": "16fd68b5-0cbd-4418-a306-210dd3c46a91", + "uuid": "991bdf10-7ede-405e-ad0e-4317ee1c1b34", "control-id": "cis_rhel10_6-2.3.5", "description": "The description for control-id cis_rhel10_6-2.3.5.", "props": [ @@ -22780,7 +22640,7 @@ ] }, { - "uuid": "077adc2e-bdc9-4913-99e2-6d75013fc2e7", + "uuid": "d4cf194e-ea5a-421c-84cb-a5a707c9c806", "control-id": "cis_rhel10_6-2.3.6", "description": "The description for control-id cis_rhel10_6-2.3.6.", "props": [ @@ -22793,7 +22653,7 @@ ] }, { - "uuid": "6dcac26c-8628-4305-9cde-86caee1a4494", + "uuid": "f7bc783e-c1a3-41c0-90f0-d41efe7dc6d5", "control-id": "cis_rhel10_6-2.3.7", "description": "No notes for control-id 6.2.3.7.", "props": [ @@ -22805,7 +22665,7 @@ ] }, { - "uuid": "4e35e39e-8ace-49f7-8932-2560be4012a7", + "uuid": "01520fed-f6da-4194-ba6e-c1b6a61646dd", "control-id": "cis_rhel10_6-2.3.8", "description": "The description for control-id cis_rhel10_6-2.3.8.", "props": [ @@ -22818,7 +22678,7 @@ ] }, { - "uuid": "f39f1789-43c9-4aa4-8c8b-51eb1e3be237", + "uuid": "4e6d8538-04f2-4c85-a94a-6a80c37cf562", "control-id": "cis_rhel10_6-2.4.1", "description": "It is not harmful to run these rules even if rsyslog is not installed or active.", "props": [ @@ -22845,7 +22705,7 @@ ] }, { - "uuid": "540205ca-1c1d-4013-9d3f-f3e58a89fea2", + "uuid": "b95a70df-647c-40f1-9ec0-66acefc4eb00", "control-id": "cis_rhel10_7-1.1", "description": "No notes for control-id 7.1.1.", "props": [ @@ -22872,7 +22732,7 @@ ] }, { - "uuid": "8478afe6-2927-4ce8-90e9-c87388727ce3", + "uuid": "fc085476-8ce9-4c1c-9bf5-96d8453c25b9", "control-id": "cis_rhel10_7-1.2", "description": "No notes for control-id 7.1.2.", "props": [ @@ -22899,7 +22759,7 @@ ] }, { - "uuid": "38c1e038-80eb-44dc-ac3e-e2bd7471ac52", + "uuid": "66058ad6-de29-4e2a-9e35-f4b85404f04f", "control-id": "cis_rhel10_7-1.3", "description": "No notes for control-id 7.1.3.", "props": [ @@ -22926,7 +22786,7 @@ ] }, { - "uuid": "e60d0b45-3179-4e00-9230-f6c662b201b8", + "uuid": "dd3227c6-b4ef-4c75-ac9b-d5215bc15aef", "control-id": "cis_rhel10_7-1.4", "description": "No notes for control-id 7.1.4.", "props": [ @@ -22953,7 +22813,7 @@ ] }, { - "uuid": "78fcd5a5-5f86-4a85-a16a-167dd65b4bf6", + "uuid": "e38d5f03-0cce-476f-a887-9640b2c6706c", "control-id": "cis_rhel10_7-1.5", "description": "No notes for control-id 7.1.5.", "props": [ @@ -22980,7 +22840,7 @@ ] }, { - "uuid": "d2b66ae8-3891-45d3-8958-9a91e6ddd7da", + "uuid": "f5aa120c-3271-4bfe-b99a-1c9135605744", "control-id": "cis_rhel10_7-1.6", "description": "No notes for control-id 7.1.6.", "props": [ @@ -23007,7 +22867,7 @@ ] }, { - "uuid": "f3d6d9a8-c810-4110-af4d-0dea41da040b", + "uuid": "b99e7640-8099-4567-bcbb-350d31273441", "control-id": "cis_rhel10_7-1.7", "description": "No notes for control-id 7.1.7.", "props": [ @@ -23034,7 +22894,7 @@ ] }, { - "uuid": "fb0e0c7c-c8a8-4c48-94ad-4e6e5f7a4102", + "uuid": "f63c0b11-757f-4fc0-91b8-42c3bf5c379c", "control-id": "cis_rhel10_7-1.8", "description": "No notes for control-id 7.1.8.", "props": [ @@ -23061,7 +22921,7 @@ ] }, { - "uuid": "7e4e6dae-798e-4c16-81d3-c2021657935e", + "uuid": "38010076-b140-4da2-8db8-fd4d5095a72e", "control-id": "cis_rhel10_7-1.9", "description": "No notes for control-id 7.1.9.", "props": [ @@ -23088,7 +22948,7 @@ ] }, { - "uuid": "c9dd94b0-97e0-4009-a735-b511a70bc29f", + "uuid": "9f077d96-e3df-46be-9a02-7d8ceafeff74", "control-id": "cis_rhel10_7-1.10", "description": "No notes for control-id 7.1.10.", "props": [ @@ -23130,7 +22990,7 @@ ] }, { - "uuid": "b9addea0-4093-4d94-a131-e011a6989561", + "uuid": "40b9c64e-e1d8-4394-b3a3-1264087dcfbb", "control-id": "cis_rhel10_7-1.11", "description": "No notes for control-id 7.1.11.", "props": [ @@ -23152,7 +23012,7 @@ ] }, { - "uuid": "962809bc-94af-42cb-85b9-fef44a93e42a", + "uuid": "9518b664-218c-4d67-83d4-fd688a9bd653", "control-id": "cis_rhel10_7-1.12", "description": "No notes for control-id 7.1.12.", "props": [ @@ -23174,7 +23034,7 @@ ] }, { - "uuid": "2ebb0503-dcb5-4e92-bb92-5db3e1e5b432", + "uuid": "90b7c3eb-d27f-4f01-8427-6427b66d3074", "control-id": "cis_rhel10_7-1.13", "description": "The description for control-id cis_rhel10_7-1.13.", "props": [ @@ -23187,7 +23047,7 @@ ] }, { - "uuid": "e1b9ebe1-d208-469d-b40f-7f3039821654", + "uuid": "d13b9893-fb1b-4daa-a837-ad21c88fe44d", "control-id": "cis_rhel10_7-2.1", "description": "No notes for control-id 7.2.1.", "props": [ @@ -23204,7 +23064,7 @@ ] }, { - "uuid": "619651e2-974c-4348-a4ad-ab138b837e8e", + "uuid": "2045b7dd-9ca0-497f-8783-843e6cb2b71b", "control-id": "cis_rhel10_7-2.2", "description": "No notes for control-id 7.2.2.", "props": [ @@ -23221,7 +23081,7 @@ ] }, { - "uuid": "3fa929d1-9762-4930-832b-d43486384427", + "uuid": "a45ab45d-19bc-4f04-a015-8e93800b7edb", "control-id": "cis_rhel10_7-2.3", "description": "No notes for control-id 7.2.3.", "props": [ @@ -23238,7 +23098,7 @@ ] }, { - "uuid": "20db0e1b-0484-4414-a1c1-f50e665a1589", + "uuid": "868ce46f-1ded-4099-adec-a372d78412a7", "control-id": "cis_rhel10_7-2.4", "description": "No notes for control-id 7.2.4.", "props": [ @@ -23255,7 +23115,7 @@ ] }, { - "uuid": "afe383bb-dee8-4f03-aa84-c02283abe405", + "uuid": "685727b9-a654-43e4-b4b2-1891a01c9c59", "control-id": "cis_rhel10_7-2.5", "description": "No notes for control-id 7.2.5.", "props": [ @@ -23272,7 +23132,7 @@ ] }, { - "uuid": "fb63f207-fd8f-4194-9f3f-9ad467a2a9ff", + "uuid": "a8385910-7bd8-4703-802e-6493db1fdebb", "control-id": "cis_rhel10_7-2.6", "description": "No notes for control-id 7.2.6.", "props": [ @@ -23289,7 +23149,7 @@ ] }, { - "uuid": "6b09dd32-64bd-4f16-895a-a13de0d4b5a6", + "uuid": "36a33440-0b43-4d01-8153-05e1866f3869", "control-id": "cis_rhel10_7-2.7", "description": "No notes for control-id 7.2.7.", "props": [ @@ -23306,7 +23166,7 @@ ] }, { - "uuid": "e8fa9507-459b-4d0b-a606-a0d1e5785c4f", + "uuid": "9e134818-f940-49fb-8cb0-9f881adbd818", "control-id": "cis_rhel10_7-2.8", "description": "No notes for control-id 7.2.8.", "props": [ @@ -23333,7 +23193,7 @@ ] }, { - "uuid": "50ba8791-7919-49c4-b1bb-1dcf5653bab5", + "uuid": "9fbab687-18ee-49f7-81b8-813fa4224825", "control-id": "cis_rhel10_7-2.9", "description": "No notes for control-id 7.2.9.", "props": [ diff --git a/component-definitions/rhel10/rhel10-cis_rhel10-l2_server/component-definition.json b/component-definitions/rhel10/rhel10-cis_rhel10-l2_server/component-definition.json index b7244625..a9629ec2 100644 --- a/component-definitions/rhel10/rhel10-cis_rhel10-l2_server/component-definition.json +++ b/component-definitions/rhel10/rhel10-cis_rhel10-l2_server/component-definition.json @@ -3,8 +3,8 @@ "uuid": "6531a0d9-efde-405d-ba52-aab8178414c4", "metadata": { "title": "Component definition for rhel10", - "last-modified": "2025-12-15T16:30:46.140460+00:00", - "version": "4.6", + "last-modified": "2025-12-16T14:22:47.573359+00:00", + "version": "4.7", "oscal-version": "1.1.3" }, "components": [ @@ -1667,4831 +1667,4795 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_grub2_cfg", + "value": "file_permissions_boot_grub2", "remarks": "rule_set_037" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/grub.cfg Group Ownership", + "value": "All GRUB configuration files must have mode 0600 or more restrictive", "remarks": "rule_set_037" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_grub2_cfg", + "value": "file_owner_boot_grub2", "remarks": "rule_set_038" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/grub.cfg User Ownership", + "value": "All GRUB configuration files must be owned by root", "remarks": "rule_set_038" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_grub2_cfg", + "value": "file_groupowner_boot_grub2", "remarks": "rule_set_039" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/grub.cfg Permissions", + "value": "All GRUB configuration files must be group-owned by root", "remarks": "rule_set_039" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_user_cfg", + "value": "disable_users_coredumps", "remarks": "rule_set_040" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/user.cfg Group Ownership", + "value": "Disable Core Dumps for All Users", "remarks": "rule_set_040" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_user_cfg", + "value": "sysctl_fs_protected_hardlinks", "remarks": "rule_set_041" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/user.cfg User Ownership", + "value": "Enable Kernel Parameter to Enforce DAC on Hardlinks", "remarks": "rule_set_041" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_user_cfg", + "value": "sysctl_fs_suid_dumpable", "remarks": "rule_set_042" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/user.cfg Permissions", + "value": "Disable Core Dumps for SUID programs", "remarks": "rule_set_042" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "disable_users_coredumps", + "value": "sysctl_kernel_dmesg_restrict", "remarks": "rule_set_043" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Core Dumps for All Users", + "value": "Restrict Access to Kernel Message Buffer", "remarks": "rule_set_043" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_protected_hardlinks", + "value": "sysctl_kernel_kptr_restrict", "remarks": "rule_set_044" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Enforce DAC on Hardlinks", + "value": "Restrict Exposed Kernel Pointer Addresses Access", "remarks": "rule_set_044" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_suid_dumpable", + "value": "sysctl_kernel_yama_ptrace_scope", "remarks": "rule_set_045" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Core Dumps for SUID programs", + "value": "Restrict usage of ptrace to descendant processes", "remarks": "rule_set_045" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_dmesg_restrict", + "value": "sysctl_kernel_randomize_va_space", "remarks": "rule_set_046" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict Access to Kernel Message Buffer", + "value": "Enable Randomized Layout of Virtual Address Space", "remarks": "rule_set_046" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_kptr_restrict", + "value": "coredump_disable_backtraces", "remarks": "rule_set_047" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict Exposed Kernel Pointer Addresses Access", + "value": "Disable core dump backtraces", "remarks": "rule_set_047" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_yama_ptrace_scope", + "value": "coredump_disable_storage", "remarks": "rule_set_048" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict usage of ptrace to descendant processes", + "value": "Disable storing core dump", "remarks": "rule_set_048" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_randomize_va_space", + "value": "configure_custom_crypto_policy_cis", "remarks": "rule_set_049" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Randomized Layout of Virtual Address Space", + "value": "Implement Custom Crypto Policy Modules for CIS Benchmark", "remarks": "rule_set_049" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "coredump_disable_backtraces", + "value": "banner_etc_motd_cis", "remarks": "rule_set_050" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable core dump backtraces", + "value": "Ensure Message Of The Day Is Configured Properly", "remarks": "rule_set_050" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "coredump_disable_storage", + "value": "banner_etc_issue_cis", "remarks": "rule_set_051" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable storing core dump", + "value": "Ensure Local Login Warning Banner Is Configured Properly", "remarks": "rule_set_051" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_custom_crypto_policy_cis", + "value": "banner_etc_issue_net_cis", "remarks": "rule_set_052" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Implement Custom Crypto Policy Modules for CIS Benchmark", + "value": "Ensure Remote Login Warning Banner Is Configured Properly", "remarks": "rule_set_052" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "banner_etc_motd_cis", + "value": "file_groupowner_etc_motd", "remarks": "rule_set_053" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Message Of The Day Is Configured Properly", + "value": "Verify Group Ownership of Message of the Day Banner", "remarks": "rule_set_053" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "banner_etc_issue_cis", + "value": "file_owner_etc_motd", "remarks": "rule_set_054" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Local Login Warning Banner Is Configured Properly", + "value": "Verify ownership of Message of the Day Banner", "remarks": "rule_set_054" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "banner_etc_issue_net_cis", + "value": "file_permissions_etc_motd", "remarks": "rule_set_055" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Remote Login Warning Banner Is Configured Properly", + "value": "Verify permissions on Message of the Day Banner", "remarks": "rule_set_055" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_motd", + "value": "file_groupowner_etc_issue", "remarks": "rule_set_056" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Ownership of Message of the Day Banner", + "value": "Verify Group Ownership of System Login Banner", "remarks": "rule_set_056" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_motd", + "value": "file_owner_etc_issue", "remarks": "rule_set_057" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify ownership of Message of the Day Banner", + "value": "Verify ownership of System Login Banner", "remarks": "rule_set_057" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_motd", + "value": "file_permissions_etc_issue", "remarks": "rule_set_058" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify permissions on Message of the Day Banner", + "value": "Verify permissions on System Login Banner", "remarks": "rule_set_058" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_issue", + "value": "file_groupowner_etc_issue_net", "remarks": "rule_set_059" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Ownership of System Login Banner", + "value": "Verify Group Ownership of System Login Banner for Remote Connections", "remarks": "rule_set_059" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_issue", + "value": "file_owner_etc_issue_net", "remarks": "rule_set_060" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify ownership of System Login Banner", + "value": "Verify ownership of System Login Banner for Remote Connections", "remarks": "rule_set_060" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_issue", + "value": "file_permissions_etc_issue_net", "remarks": "rule_set_061" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify permissions on System Login Banner", + "value": "Verify permissions on System Login Banner for Remote Connections", "remarks": "rule_set_061" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_issue_net", + "value": "dconf_gnome_banner_enabled", "remarks": "rule_set_062" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Ownership of System Login Banner for Remote Connections", + "value": "Enable GNOME3 Login Warning Banner", "remarks": "rule_set_062" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_issue_net", + "value": "dconf_gnome_login_banner_text", "remarks": "rule_set_063" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify ownership of System Login Banner for Remote Connections", + "value": "Set the GNOME3 Login Warning Banner Text", "remarks": "rule_set_063" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_issue_net", + "value": "dconf_gnome_disable_user_list", "remarks": "rule_set_064" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify permissions on System Login Banner for Remote Connections", + "value": "Disable the GNOME3 Login User List", "remarks": "rule_set_064" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_banner_enabled", + "value": "dconf_gnome_screensaver_idle_delay", "remarks": "rule_set_065" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable GNOME3 Login Warning Banner", + "value": "Set GNOME3 Screensaver Inactivity Timeout", "remarks": "rule_set_065" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_login_banner_text", + "value": "dconf_gnome_screensaver_lock_delay", "remarks": "rule_set_066" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set the GNOME3 Login Warning Banner Text", + "value": "Set GNOME3 Screensaver Lock Delay After Activation Period", "remarks": "rule_set_066" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_disable_user_list", + "value": "dconf_gnome_session_idle_user_locks", "remarks": "rule_set_067" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable the GNOME3 Login User List", + "value": "Ensure Users Cannot Change GNOME3 Session Idle Settings", "remarks": "rule_set_067" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_idle_delay", + "value": "dconf_gnome_screensaver_user_locks", "remarks": "rule_set_068" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set GNOME3 Screensaver Inactivity Timeout", + "value": "Ensure Users Cannot Change GNOME3 Screensaver Settings", "remarks": "rule_set_068" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_lock_delay", + "value": "dconf_gnome_disable_automount", "remarks": "rule_set_069" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set GNOME3 Screensaver Lock Delay After Activation Period", + "value": "Disable GNOME3 Automounting", "remarks": "rule_set_069" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_session_idle_user_locks", + "value": "dconf_gnome_disable_automount_open", "remarks": "rule_set_070" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Users Cannot Change GNOME3 Session Idle Settings", + "value": "Disable GNOME3 Automount Opening", "remarks": "rule_set_070" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_user_locks", + "value": "dconf_gnome_disable_autorun", "remarks": "rule_set_071" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Users Cannot Change GNOME3 Screensaver Settings", + "value": "Disable GNOME3 Automount running", "remarks": "rule_set_071" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_disable_automount", + "value": "service_autofs_disabled", "remarks": "rule_set_072" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable GNOME3 Automounting", + "value": "Disable the Automounter", "remarks": "rule_set_072" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_disable_automount_open", + "value": "service_avahi-daemon_disabled", "remarks": "rule_set_073" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable GNOME3 Automount Opening", + "value": "Disable Avahi Server Software", "remarks": "rule_set_073" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_disable_autorun", + "value": "package_kea_removed", "remarks": "rule_set_074" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable GNOME3 Automount running", + "value": "Uninstall kea Package", "remarks": "rule_set_074" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_autofs_disabled", + "value": "package_bind_removed", "remarks": "rule_set_075" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable the Automounter", + "value": "Uninstall bind Package", "remarks": "rule_set_075" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_avahi-daemon_disabled", + "value": "package_dnsmasq_removed", "remarks": "rule_set_076" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Avahi Server Software", + "value": "Uninstall dnsmasq Package", "remarks": "rule_set_076" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_kea_removed", + "value": "package_vsftpd_removed", "remarks": "rule_set_077" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall kea Package", + "value": "Uninstall vsftpd Package", "remarks": "rule_set_077" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_bind_removed", + "value": "package_dovecot_removed", "remarks": "rule_set_078" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall bind Package", + "value": "Uninstall dovecot Package", "remarks": "rule_set_078" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_dnsmasq_removed", + "value": "package_cyrus-imapd_removed", "remarks": "rule_set_079" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall dnsmasq Package", + "value": "Uninstall cyrus-imapd Package", "remarks": "rule_set_079" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_vsftpd_removed", + "value": "service_nfs_disabled", "remarks": "rule_set_080" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall vsftpd Package", + "value": "Disable Network File System (nfs)", "remarks": "rule_set_080" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_dovecot_removed", + "value": "service_cups_disabled", "remarks": "rule_set_081" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall dovecot Package", + "value": "Disable the CUPS Service", "remarks": "rule_set_081" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_cyrus-imapd_removed", + "value": "service_rpcbind_disabled", "remarks": "rule_set_082" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall cyrus-imapd Package", + "value": "Disable rpcbind Service", "remarks": "rule_set_082" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_nfs_disabled", + "value": "package_rsync_removed", "remarks": "rule_set_083" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Network File System (nfs)", + "value": "Uninstall rsync Package", "remarks": "rule_set_083" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_cups_disabled", + "value": "package_samba_removed", "remarks": "rule_set_084" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable the CUPS Service", + "value": "Uninstall Samba Package", "remarks": "rule_set_084" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_rpcbind_disabled", + "value": "package_net-snmp_removed", "remarks": "rule_set_085" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable rpcbind Service", + "value": "Uninstall net-snmp Package", "remarks": "rule_set_085" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_rsync_removed", + "value": "package_telnet-server_removed", "remarks": "rule_set_086" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall rsync Package", + "value": "Uninstall telnet-server Package", "remarks": "rule_set_086" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_samba_removed", + "value": "package_tftp-server_removed", "remarks": "rule_set_087" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall Samba Package", + "value": "Uninstall tftp-server Package", "remarks": "rule_set_087" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_net-snmp_removed", + "value": "package_squid_removed", "remarks": "rule_set_088" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall net-snmp Package", + "value": "Uninstall squid Package", "remarks": "rule_set_088" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet-server_removed", + "value": "package_httpd_removed", "remarks": "rule_set_089" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall telnet-server Package", + "value": "Uninstall httpd Package", "remarks": "rule_set_089" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_tftp-server_removed", + "value": "package_nginx_removed", "remarks": "rule_set_090" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall tftp-server Package", + "value": "Uninstall nginx Package", "remarks": "rule_set_090" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_squid_removed", + "value": "postfix_network_listening_disabled", "remarks": "rule_set_091" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall squid Package", + "value": "Disable Postfix Network Listening", "remarks": "rule_set_091" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_httpd_removed", + "value": "has_nonlocal_mta", "remarks": "rule_set_092" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall httpd Package", + "value": "Ensure Mail Transfer Agent is not Listening on any non-loopback Address", "remarks": "rule_set_092" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_nginx_removed", + "value": "package_ftp_removed", "remarks": "rule_set_093" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall nginx Package", + "value": "Remove ftp Package", "remarks": "rule_set_093" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "postfix_network_listening_disabled", + "value": "package_telnet_removed", "remarks": "rule_set_094" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Postfix Network Listening", + "value": "Remove telnet Clients", "remarks": "rule_set_094" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "has_nonlocal_mta", + "value": "package_tftp_removed", "remarks": "rule_set_095" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Mail Transfer Agent is not Listening on any non-loopback Address", + "value": "Remove tftp Daemon", "remarks": "rule_set_095" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_ftp_removed", + "value": "chronyd_specify_remote_server", "remarks": "rule_set_096" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove ftp Package", + "value": "A remote time server for Chrony is configured", "remarks": "rule_set_096" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet_removed", + "value": "chronyd_run_as_chrony_user", "remarks": "rule_set_097" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove telnet Clients", + "value": "Ensure that chronyd is running under chrony user account", "remarks": "rule_set_097" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_tftp_removed", + "value": "package_cron_installed", "remarks": "rule_set_098" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove tftp Daemon", + "value": "Install the cron service", "remarks": "rule_set_098" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "chronyd_specify_remote_server", + "value": "service_crond_enabled", "remarks": "rule_set_099" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "A remote time server for Chrony is configured", + "value": "Enable cron Service", "remarks": "rule_set_099" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "chronyd_run_as_chrony_user", + "value": "file_groupowner_crontab", "remarks": "rule_set_100" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that chronyd is running under chrony user account", + "value": "Verify Group Who Owns Crontab", "remarks": "rule_set_100" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_cron_installed", + "value": "file_owner_crontab", "remarks": "rule_set_101" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install the cron service", + "value": "Verify Owner on crontab", "remarks": "rule_set_101" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_crond_enabled", + "value": "file_permissions_crontab", "remarks": "rule_set_102" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable cron Service", + "value": "Verify Permissions on crontab", "remarks": "rule_set_102" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_crontab", + "value": "file_groupowner_cron_hourly", "remarks": "rule_set_103" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Crontab", + "value": "Verify Group Who Owns cron.hourly", "remarks": "rule_set_103" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_crontab", + "value": "file_owner_cron_hourly", "remarks": "rule_set_104" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on crontab", + "value": "Verify Owner on cron.hourly", "remarks": "rule_set_104" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_crontab", + "value": "file_permissions_cron_hourly", "remarks": "rule_set_105" }, - { - "name": "Rule_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on crontab", - "remarks": "rule_set_105" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_cron_hourly", - "remarks": "rule_set_106" - }, - { - "name": "Rule_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns cron.hourly", - "remarks": "rule_set_106" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_cron_hourly", - "remarks": "rule_set_107" - }, - { - "name": "Rule_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on cron.hourly", - "remarks": "rule_set_107" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_cron_hourly", - "remarks": "rule_set_108" - }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.hourly", - "remarks": "rule_set_108" + "remarks": "rule_set_105" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_daily", - "remarks": "rule_set_109" + "remarks": "rule_set_106" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.daily", - "remarks": "rule_set_109" + "remarks": "rule_set_106" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_daily", - "remarks": "rule_set_110" + "remarks": "rule_set_107" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.daily", - "remarks": "rule_set_110" + "remarks": "rule_set_107" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_daily", - "remarks": "rule_set_111" + "remarks": "rule_set_108" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.daily", - "remarks": "rule_set_111" + "remarks": "rule_set_108" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_weekly", - "remarks": "rule_set_112" + "remarks": "rule_set_109" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.weekly", - "remarks": "rule_set_112" + "remarks": "rule_set_109" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_weekly", - "remarks": "rule_set_113" + "remarks": "rule_set_110" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.weekly", - "remarks": "rule_set_113" + "remarks": "rule_set_110" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_weekly", - "remarks": "rule_set_114" + "remarks": "rule_set_111" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.weekly", - "remarks": "rule_set_114" + "remarks": "rule_set_111" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_monthly", - "remarks": "rule_set_115" + "remarks": "rule_set_112" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.monthly", - "remarks": "rule_set_115" + "remarks": "rule_set_112" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_monthly", - "remarks": "rule_set_116" + "remarks": "rule_set_113" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.monthly", - "remarks": "rule_set_116" + "remarks": "rule_set_113" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_monthly", - "remarks": "rule_set_117" + "remarks": "rule_set_114" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.monthly", - "remarks": "rule_set_117" + "remarks": "rule_set_114" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_yearly", - "remarks": "rule_set_118" + "remarks": "rule_set_115" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.yearly", - "remarks": "rule_set_118" + "remarks": "rule_set_115" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_yearly", - "remarks": "rule_set_119" + "remarks": "rule_set_116" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.yearly", - "remarks": "rule_set_119" + "remarks": "rule_set_116" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_yearly", - "remarks": "rule_set_120" + "remarks": "rule_set_117" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.yearly", - "remarks": "rule_set_120" + "remarks": "rule_set_117" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_d", - "remarks": "rule_set_121" + "remarks": "rule_set_118" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.d", - "remarks": "rule_set_121" + "remarks": "rule_set_118" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_d", - "remarks": "rule_set_122" + "remarks": "rule_set_119" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.d", - "remarks": "rule_set_122" + "remarks": "rule_set_119" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_d", - "remarks": "rule_set_123" + "remarks": "rule_set_120" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.d", - "remarks": "rule_set_123" + "remarks": "rule_set_120" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_cron_deny_not_exist", - "remarks": "rule_set_124" + "remarks": "rule_set_121" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/cron.deny does not exist", - "remarks": "rule_set_124" + "remarks": "rule_set_121" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_cron_allow_exists", - "remarks": "rule_set_125" + "remarks": "rule_set_122" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/cron.allow exists", - "remarks": "rule_set_125" + "remarks": "rule_set_122" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_allow", - "remarks": "rule_set_126" + "remarks": "rule_set_123" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/cron.allow file", - "remarks": "rule_set_126" + "remarks": "rule_set_123" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_allow", - "remarks": "rule_set_127" + "remarks": "rule_set_124" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/cron.allow file", - "remarks": "rule_set_127" + "remarks": "rule_set_124" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_allow", - "remarks": "rule_set_128" + "remarks": "rule_set_125" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/cron.allow file", - "remarks": "rule_set_128" + "remarks": "rule_set_125" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_at_deny_not_exist", - "remarks": "rule_set_129" + "remarks": "rule_set_126" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/at.deny does not exist", - "remarks": "rule_set_129" + "remarks": "rule_set_126" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_at_allow_exists", - "remarks": "rule_set_130" + "remarks": "rule_set_127" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/at.allow exists", - "remarks": "rule_set_130" + "remarks": "rule_set_127" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_at_allow", - "remarks": "rule_set_131" + "remarks": "rule_set_128" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/at.allow file", - "remarks": "rule_set_131" + "remarks": "rule_set_128" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_at_allow", - "remarks": "rule_set_132" + "remarks": "rule_set_129" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/at.allow file", - "remarks": "rule_set_132" + "remarks": "rule_set_129" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_at_allow", - "remarks": "rule_set_133" + "remarks": "rule_set_130" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/at.allow file", - "remarks": "rule_set_133" + "remarks": "rule_set_130" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "wireless_disable_interfaces", - "remarks": "rule_set_134" + "remarks": "rule_set_131" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Deactivate Wireless Network Interfaces", - "remarks": "rule_set_134" + "remarks": "rule_set_131" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_bluetooth_disabled", - "remarks": "rule_set_135" + "remarks": "rule_set_132" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Bluetooth Service", - "remarks": "rule_set_135" + "remarks": "rule_set_132" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_atm_disabled", - "remarks": "rule_set_136" + "remarks": "rule_set_133" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable ATM Support", - "remarks": "rule_set_136" + "remarks": "rule_set_133" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_can_disabled", - "remarks": "rule_set_137" + "remarks": "rule_set_134" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable CAN Support", - "remarks": "rule_set_137" + "remarks": "rule_set_134" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_dccp_disabled", - "remarks": "rule_set_138" + "remarks": "rule_set_135" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable DCCP Support", - "remarks": "rule_set_138" + "remarks": "rule_set_135" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_tipc_disabled", - "remarks": "rule_set_139" + "remarks": "rule_set_136" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable TIPC Support", - "remarks": "rule_set_139" + "remarks": "rule_set_136" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_rds_disabled", - "remarks": "rule_set_140" + "remarks": "rule_set_137" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable RDS Support", - "remarks": "rule_set_140" + "remarks": "rule_set_137" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_sctp_disabled", - "remarks": "rule_set_141" + "remarks": "rule_set_138" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SCTP Support", - "remarks": "rule_set_141" + "remarks": "rule_set_138" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_forwarding", - "remarks": "rule_set_142" + "remarks": "rule_set_139" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv4 Forwarding on all IPv4 Interfaces", - "remarks": "rule_set_142" + "remarks": "rule_set_139" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_forwarding", - "remarks": "rule_set_143" + "remarks": "rule_set_140" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv4 Forwarding By Default", - "remarks": "rule_set_143" + "remarks": "rule_set_140" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_send_redirects", - "remarks": "rule_set_144" + "remarks": "rule_set_141" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_144" + "remarks": "rule_set_141" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_send_redirects", - "remarks": "rule_set_145" + "remarks": "rule_set_142" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces by Default", - "remarks": "rule_set_145" + "remarks": "rule_set_142" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses", - "remarks": "rule_set_146" + "remarks": "rule_set_143" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Ignore Bogus ICMP Error Responses on IPv4 Interfaces", - "remarks": "rule_set_146" + "remarks": "rule_set_143" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_icmp_echo_ignore_broadcasts", - "remarks": "rule_set_147" + "remarks": "rule_set_144" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Ignore ICMP Broadcast Echo Requests on IPv4 Interfaces", - "remarks": "rule_set_147" + "remarks": "rule_set_144" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_redirects", - "remarks": "rule_set_148" + "remarks": "rule_set_145" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv4 Interfaces", - "remarks": "rule_set_148" + "remarks": "rule_set_145" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_redirects", - "remarks": "rule_set_149" + "remarks": "rule_set_146" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv4 Interfaces", - "remarks": "rule_set_149" + "remarks": "rule_set_146" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_secure_redirects", - "remarks": "rule_set_150" + "remarks": "rule_set_147" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Secure ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_150" + "remarks": "rule_set_147" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_secure_redirects", - "remarks": "rule_set_151" + "remarks": "rule_set_148" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Kernel Parameter for Accepting Secure Redirects By Default", - "remarks": "rule_set_151" + "remarks": "rule_set_148" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_rp_filter", - "remarks": "rule_set_152" + "remarks": "rule_set_149" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces", - "remarks": "rule_set_152" + "remarks": "rule_set_149" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_rp_filter", - "remarks": "rule_set_153" + "remarks": "rule_set_150" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces by Default", - "remarks": "rule_set_153" + "remarks": "rule_set_150" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_source_route", - "remarks": "rule_set_154" + "remarks": "rule_set_151" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces", - "remarks": "rule_set_154" + "remarks": "rule_set_151" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_source_route", - "remarks": "rule_set_155" + "remarks": "rule_set_152" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv4 Interfaces by Default", - "remarks": "rule_set_155" + "remarks": "rule_set_152" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_log_martians", - "remarks": "rule_set_156" + "remarks": "rule_set_153" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces", - "remarks": "rule_set_156" + "remarks": "rule_set_153" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_log_martians", - "remarks": "rule_set_157" + "remarks": "rule_set_154" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces by Default", - "remarks": "rule_set_157" + "remarks": "rule_set_154" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_tcp_syncookies", - "remarks": "rule_set_158" + "remarks": "rule_set_155" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use TCP Syncookies on Network Interfaces", - "remarks": "rule_set_158" + "remarks": "rule_set_155" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_forwarding", - "remarks": "rule_set_159" + "remarks": "rule_set_156" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv6 Forwarding", - "remarks": "rule_set_159" + "remarks": "rule_set_156" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_forwarding", - "remarks": "rule_set_160" + "remarks": "rule_set_157" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv6 Forwarding by default", - "remarks": "rule_set_160" + "remarks": "rule_set_157" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_redirects", - "remarks": "rule_set_161" + "remarks": "rule_set_158" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv6 Interfaces", - "remarks": "rule_set_161" + "remarks": "rule_set_158" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_redirects", - "remarks": "rule_set_162" + "remarks": "rule_set_159" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv6 Interfaces", - "remarks": "rule_set_162" + "remarks": "rule_set_159" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_source_route", - "remarks": "rule_set_163" + "remarks": "rule_set_160" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv6 Interfaces", - "remarks": "rule_set_163" + "remarks": "rule_set_160" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_source_route", - "remarks": "rule_set_164" + "remarks": "rule_set_161" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv6 Interfaces by Default", - "remarks": "rule_set_164" + "remarks": "rule_set_161" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_ra", - "remarks": "rule_set_165" + "remarks": "rule_set_162" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Router Advertisements on All IPv6 Interfaces", - "remarks": "rule_set_165" + "remarks": "rule_set_162" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_ra", - "remarks": "rule_set_166" + "remarks": "rule_set_163" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting Router Advertisements on all IPv6 Interfaces by Default", - "remarks": "rule_set_166" + "remarks": "rule_set_163" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_firewalld_installed", - "remarks": "rule_set_167" + "remarks": "rule_set_164" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install firewalld Package", - "remarks": "rule_set_167" + "remarks": "rule_set_164" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "firewalld-backend", - "remarks": "rule_set_168" + "remarks": "rule_set_165" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Firewalld to Use the Nftables Backend", - "remarks": "rule_set_168" + "remarks": "rule_set_165" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_firewalld_enabled", - "remarks": "rule_set_169" + "remarks": "rule_set_166" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify firewalld Enabled", - "remarks": "rule_set_169" + "remarks": "rule_set_166" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "firewalld_loopback_traffic_trusted", - "remarks": "rule_set_170" + "remarks": "rule_set_167" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Firewalld to Trust Loopback Traffic", - "remarks": "rule_set_170" + "remarks": "rule_set_167" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_config", - "remarks": "rule_set_171" + "remarks": "rule_set_168" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server config file", - "remarks": "rule_set_171" + "remarks": "rule_set_168" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_config", - "remarks": "rule_set_172" + "remarks": "rule_set_169" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server config file", - "remarks": "rule_set_172" + "remarks": "rule_set_169" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_config", - "remarks": "rule_set_173" + "remarks": "rule_set_170" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server config file", - "remarks": "rule_set_173" + "remarks": "rule_set_170" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_sshd_config_d", - "remarks": "rule_set_174" + "remarks": "rule_set_171" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Config File", - "remarks": "rule_set_174" + "remarks": "rule_set_171" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_drop_in_config", - "remarks": "rule_set_175" + "remarks": "rule_set_172" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Config File", - "remarks": "rule_set_175" + "remarks": "rule_set_172" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_sshd_config_d", - "remarks": "rule_set_176" + "remarks": "rule_set_173" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server Configuration Files", - "remarks": "rule_set_176" + "remarks": "rule_set_173" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_sshd_config_d", - "remarks": "rule_set_177" + "remarks": "rule_set_174" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server Configuration Files", - "remarks": "rule_set_177" + "remarks": "rule_set_174" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_drop_in_config", - "remarks": "rule_set_178" + "remarks": "rule_set_175" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server Configuration Files", - "remarks": "rule_set_178" + "remarks": "rule_set_175" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_drop_in_config", - "remarks": "rule_set_179" + "remarks": "rule_set_176" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server Configuration Files", - "remarks": "rule_set_179" + "remarks": "rule_set_176" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_private_key", - "remarks": "rule_set_180" + "remarks": "rule_set_177" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_180" + "remarks": "rule_set_177" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_private_key", - "remarks": "rule_set_181" + "remarks": "rule_set_178" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_181" + "remarks": "rule_set_178" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_private_key", - "remarks": "rule_set_182" + "remarks": "rule_set_179" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Private *_key Key Files", - "remarks": "rule_set_182" + "remarks": "rule_set_179" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_pub_key", - "remarks": "rule_set_183" + "remarks": "rule_set_180" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_183" + "remarks": "rule_set_180" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_pub_key", - "remarks": "rule_set_184" + "remarks": "rule_set_181" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_184" + "remarks": "rule_set_181" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_pub_key", - "remarks": "rule_set_185" + "remarks": "rule_set_182" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Public *.pub Key Files", - "remarks": "rule_set_185" + "remarks": "rule_set_182" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_limit_user_access", - "remarks": "rule_set_186" + "remarks": "rule_set_183" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Users' SSH Access", - "remarks": "rule_set_186" + "remarks": "rule_set_183" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_warning_banner_net", - "remarks": "rule_set_187" + "remarks": "rule_set_184" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable SSH Warning Banner", - "remarks": "rule_set_187" + "remarks": "rule_set_184" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_idle_timeout", - "remarks": "rule_set_188" + "remarks": "rule_set_185" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Interval", - "remarks": "rule_set_188" + "remarks": "rule_set_185" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_keepalive", - "remarks": "rule_set_189" + "remarks": "rule_set_186" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Count Max", - "remarks": "rule_set_189" + "remarks": "rule_set_186" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_host_auth", - "remarks": "rule_set_190" + "remarks": "rule_set_187" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Host-Based Authentication", - "remarks": "rule_set_190" + "remarks": "rule_set_187" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_rhosts", - "remarks": "rule_set_191" + "remarks": "rule_set_188" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Support for .rhosts Files", - "remarks": "rule_set_191" + "remarks": "rule_set_188" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_use_strong_kex", - "remarks": "rule_set_192" + "remarks": "rule_set_189" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Use Only Strong Key Exchange algorithms", - "remarks": "rule_set_192" + "remarks": "rule_set_189" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_login_grace_time", - "remarks": "rule_set_193" + "remarks": "rule_set_190" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SSH LoginGraceTime is configured", - "remarks": "rule_set_193" + "remarks": "rule_set_190" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_loglevel_verbose", - "remarks": "rule_set_194" + "remarks": "rule_set_191" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Daemon LogLevel to VERBOSE", - "remarks": "rule_set_194" + "remarks": "rule_set_191" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_auth_tries", - "remarks": "rule_set_195" + "remarks": "rule_set_192" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH authentication attempt limit", - "remarks": "rule_set_195" + "remarks": "rule_set_192" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_maxstartups", - "remarks": "rule_set_196" + "remarks": "rule_set_193" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SSH MaxStartups is configured", - "remarks": "rule_set_196" + "remarks": "rule_set_193" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_sessions", - "remarks": "rule_set_197" + "remarks": "rule_set_194" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH MaxSessions limit", - "remarks": "rule_set_197" + "remarks": "rule_set_194" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_empty_passwords", - "remarks": "rule_set_198" + "remarks": "rule_set_195" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Access via Empty Passwords", - "remarks": "rule_set_198" + "remarks": "rule_set_195" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_root_login", - "remarks": "rule_set_199" + "remarks": "rule_set_196" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Root Login", - "remarks": "rule_set_199" + "remarks": "rule_set_196" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_do_not_permit_user_env", - "remarks": "rule_set_200" + "remarks": "rule_set_197" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Do Not Allow SSH Environment Options", - "remarks": "rule_set_200" + "remarks": "rule_set_197" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_pam", - "remarks": "rule_set_201" + "remarks": "rule_set_198" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable PAM", - "remarks": "rule_set_201" + "remarks": "rule_set_198" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_sudo_installed", - "remarks": "rule_set_202" + "remarks": "rule_set_199" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install sudo Package", - "remarks": "rule_set_202" + "remarks": "rule_set_199" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_use_pty", - "remarks": "rule_set_203" + "remarks": "rule_set_200" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo use_pty", - "remarks": "rule_set_203" + "remarks": "rule_set_200" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_custom_logfile", - "remarks": "rule_set_204" + "remarks": "rule_set_201" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Sudo Logfile Exists - sudo logfile", - "remarks": "rule_set_204" + "remarks": "rule_set_201" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_no_authenticate", - "remarks": "rule_set_205" + "remarks": "rule_set_202" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo !authenticate", - "remarks": "rule_set_205" + "remarks": "rule_set_202" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_require_reauthentication", - "remarks": "rule_set_206" + "remarks": "rule_set_203" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require Re-Authentication When Using the sudo Command", - "remarks": "rule_set_206" + "remarks": "rule_set_203" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "use_pam_wheel_group_for_su", - "remarks": "rule_set_207" + "remarks": "rule_set_204" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Usage of pam_wheel with Group Parameter for su Authentication", - "remarks": "rule_set_207" + "remarks": "rule_set_204" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_pam_wheel_group_empty", - "remarks": "rule_set_208" + "remarks": "rule_set_205" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Group Used by pam_wheel.so Module Exists on System and is Empty", - "remarks": "rule_set_208" + "remarks": "rule_set_205" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_password_pam_faillock_password_auth", - "remarks": "rule_set_209" + "remarks": "rule_set_206" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/password-auth File.", - "remarks": "rule_set_209" + "remarks": "rule_set_206" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_password_pam_faillock_system_auth", - "remarks": "rule_set_210" + "remarks": "rule_set_207" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/system-auth File.", - "remarks": "rule_set_210" + "remarks": "rule_set_207" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_pam_pwquality_installed", - "remarks": "rule_set_211" + "remarks": "rule_set_208" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install pam_pwquality Package", - "remarks": "rule_set_211" + "remarks": "rule_set_208" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwquality_password_auth", - "remarks": "rule_set_212" + "remarks": "rule_set_209" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM password complexity module is enabled in password-auth", - "remarks": "rule_set_212" + "remarks": "rule_set_209" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwquality_system_auth", - "remarks": "rule_set_213" + "remarks": "rule_set_210" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM password complexity module is enabled in system-auth", - "remarks": "rule_set_213" + "remarks": "rule_set_210" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_enabled", - "remarks": "rule_set_214" + "remarks": "rule_set_211" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify pam_unix module is activated", - "remarks": "rule_set_214" + "remarks": "rule_set_211" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny", - "remarks": "rule_set_215" + "remarks": "rule_set_212" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Lock Accounts After Failed Password Attempts", - "remarks": "rule_set_215" + "remarks": "rule_set_212" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_unlock_time_with_zero", - "remarks": "rule_set_216" + "remarks": "rule_set_213" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Lockout Time for Failed Password Attempts", - "remarks": "rule_set_216" + "remarks": "rule_set_213" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_difok", - "remarks": "rule_set_217" + "remarks": "rule_set_214" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Characters", - "remarks": "rule_set_217" + "remarks": "rule_set_214" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minlen", - "remarks": "rule_set_218" + "remarks": "rule_set_215" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Length", - "remarks": "rule_set_218" + "remarks": "rule_set_215" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minclass", - "remarks": "rule_set_219" + "remarks": "rule_set_216" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", - "remarks": "rule_set_219" + "remarks": "rule_set_216" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_maxrepeat", - "remarks": "rule_set_220" + "remarks": "rule_set_217" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Consecutive Repeating Characters", - "remarks": "rule_set_220" + "remarks": "rule_set_217" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_maxsequence", - "remarks": "rule_set_221" + "remarks": "rule_set_218" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit the maximum number of sequential characters in passwords", - "remarks": "rule_set_221" + "remarks": "rule_set_218" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_dictcheck", - "remarks": "rule_set_222" + "remarks": "rule_set_219" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Prevent the Use of Dictionary Words", - "remarks": "rule_set_222" + "remarks": "rule_set_219" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_enforce_root", - "remarks": "rule_set_223" + "remarks": "rule_set_220" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Enforce for root User", - "remarks": "rule_set_223" + "remarks": "rule_set_220" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_password_auth", - "remarks": "rule_set_224" + "remarks": "rule_set_221" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: password-auth", - "remarks": "rule_set_224" + "remarks": "rule_set_221" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_system_auth", - "remarks": "rule_set_225" + "remarks": "rule_set_222" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: system-auth", - "remarks": "rule_set_225" + "remarks": "rule_set_222" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_enforce_for_root", - "remarks": "rule_set_226" + "remarks": "rule_set_223" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Password History Is Enforced for the Root User", - "remarks": "rule_set_226" + "remarks": "rule_set_223" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_use_authtok", - "remarks": "rule_set_227" + "remarks": "rule_set_224" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Password History with use_authtok", - "remarks": "rule_set_227" + "remarks": "rule_set_224" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords", - "remarks": "rule_set_228" + "remarks": "rule_set_225" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent Login to Accounts With Empty Password", - "remarks": "rule_set_228" + "remarks": "rule_set_225" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_no_remember", - "remarks": "rule_set_229" + "remarks": "rule_set_226" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Avoid using remember in pam_unix module", - "remarks": "rule_set_229" + "remarks": "rule_set_226" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_systemauth", - "remarks": "rule_set_230" + "remarks": "rule_set_227" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - system-auth", - "remarks": "rule_set_230" + "remarks": "rule_set_227" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_passwordauth", - "remarks": "rule_set_231" + "remarks": "rule_set_228" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - password-auth", - "remarks": "rule_set_231" + "remarks": "rule_set_228" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_authtok", - "remarks": "rule_set_232" + "remarks": "rule_set_229" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require use_authtok for pam_unix.so", - "remarks": "rule_set_232" + "remarks": "rule_set_229" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_maximum_age_login_defs", - "remarks": "rule_set_233" + "remarks": "rule_set_230" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Age", - "remarks": "rule_set_233" + "remarks": "rule_set_230" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_max_life_existing", - "remarks": "rule_set_234" + "remarks": "rule_set_231" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Maximum Age", - "remarks": "rule_set_234" + "remarks": "rule_set_231" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_warn_age_login_defs", - "remarks": "rule_set_235" + "remarks": "rule_set_232" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Warning Age", - "remarks": "rule_set_235" + "remarks": "rule_set_232" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_warn_age_existing", - "remarks": "rule_set_236" + "remarks": "rule_set_233" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Warning Age", - "remarks": "rule_set_236" + "remarks": "rule_set_233" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_libuserconf", - "remarks": "rule_set_237" + "remarks": "rule_set_234" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/libuser.conf", - "remarks": "rule_set_237" + "remarks": "rule_set_234" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_logindefs", - "remarks": "rule_set_238" + "remarks": "rule_set_235" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/login.defs", - "remarks": "rule_set_238" + "remarks": "rule_set_235" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_disable_post_pw_expiration", - "remarks": "rule_set_239" + "remarks": "rule_set_236" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Account Expiration Following Inactivity", - "remarks": "rule_set_239" + "remarks": "rule_set_236" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_set_post_pw_existing", - "remarks": "rule_set_240" + "remarks": "rule_set_237" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set existing passwords a period of inactivity before they been locked", - "remarks": "rule_set_240" + "remarks": "rule_set_237" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_last_change_is_in_past", - "remarks": "rule_set_241" + "remarks": "rule_set_238" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure all users last password change date is in the past", - "remarks": "rule_set_241" + "remarks": "rule_set_238" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_no_uid_except_zero", - "remarks": "rule_set_242" + "remarks": "rule_set_239" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Root Has UID 0", - "remarks": "rule_set_242" + "remarks": "rule_set_239" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_gid_zero", - "remarks": "rule_set_243" + "remarks": "rule_set_240" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Root Has A Primary GID 0", - "remarks": "rule_set_243" + "remarks": "rule_set_240" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "groups_no_zero_gid_except_root", - "remarks": "rule_set_244" + "remarks": "rule_set_241" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Group Root Has GID 0", - "remarks": "rule_set_244" + "remarks": "rule_set_241" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_root_password_configured", - "remarks": "rule_set_245" + "remarks": "rule_set_242" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Authentication Required for Single User Mode", - "remarks": "rule_set_245" + "remarks": "rule_set_242" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_path_dirs_no_write", - "remarks": "rule_set_246" + "remarks": "rule_set_243" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include World or Group-Writable Directories", - "remarks": "rule_set_246" + "remarks": "rule_set_243" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "root_path_no_dot", - "remarks": "rule_set_247" + "remarks": "rule_set_244" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include Relative Paths or Null Directories", - "remarks": "rule_set_247" + "remarks": "rule_set_244" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_root", - "remarks": "rule_set_248" + "remarks": "rule_set_245" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Root Bash Umask is Set Correctly", - "remarks": "rule_set_248" + "remarks": "rule_set_245" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_password_auth_for_systemaccounts", - "remarks": "rule_set_249" + "remarks": "rule_set_246" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Are Locked", - "remarks": "rule_set_249" + "remarks": "rule_set_246" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_shelllogin_for_systemaccounts", - "remarks": "rule_set_250" + "remarks": "rule_set_247" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", - "remarks": "rule_set_250" + "remarks": "rule_set_247" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_invalid_shell_accounts_unlocked", - "remarks": "rule_set_251" + "remarks": "rule_set_248" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Non-Interactive Accounts Are Locked", - "remarks": "rule_set_251" + "remarks": "rule_set_248" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_tmout", - "remarks": "rule_set_252" + "remarks": "rule_set_249" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Interactive Session Timeout", - "remarks": "rule_set_252" + "remarks": "rule_set_249" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_bashrc", - "remarks": "rule_set_253" + "remarks": "rule_set_250" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Bash Umask is Set Correctly", - "remarks": "rule_set_253" + "remarks": "rule_set_250" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_login_defs", - "remarks": "rule_set_254" + "remarks": "rule_set_251" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in login.defs", - "remarks": "rule_set_254" + "remarks": "rule_set_251" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_profile", - "remarks": "rule_set_255" + "remarks": "rule_set_252" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in /etc/profile", - "remarks": "rule_set_255" + "remarks": "rule_set_252" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_256" + "remarks": "rule_set_253" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_256" + "remarks": "rule_set_253" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_build_database", - "remarks": "rule_set_257" + "remarks": "rule_set_254" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Build and Test AIDE Database", - "remarks": "rule_set_257" + "remarks": "rule_set_254" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_periodic_cron_checking", - "remarks": "rule_set_258" + "remarks": "rule_set_255" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Periodic Execution of AIDE", - "remarks": "rule_set_258" + "remarks": "rule_set_255" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_check_audit_tools", - "remarks": "rule_set_259" + "remarks": "rule_set_256" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure AIDE to Verify the Audit Tools", - "remarks": "rule_set_259" + "remarks": "rule_set_256" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journald_enabled", - "remarks": "rule_set_260" + "remarks": "rule_set_257" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journald Service", - "remarks": "rule_set_260" + "remarks": "rule_set_257" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_journald_and_rsyslog_not_active_together", - "remarks": "rule_set_261" + "remarks": "rule_set_258" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald and rsyslog Are Not Active Together", - "remarks": "rule_set_261" + "remarks": "rule_set_258" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_systemd-journal-remote_installed", - "remarks": "rule_set_262" + "remarks": "rule_set_259" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install systemd-journal-remote Package", - "remarks": "rule_set_262" + "remarks": "rule_set_259" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journal-upload_enabled", - "remarks": "rule_set_263" + "remarks": "rule_set_260" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journal-upload Service", - "remarks": "rule_set_263" + "remarks": "rule_set_260" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "socket_systemd-journal-remote_disabled", - "remarks": "rule_set_264" + "remarks": "rule_set_261" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable systemd-journal-remote Socket", - "remarks": "rule_set_264" + "remarks": "rule_set_261" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_disable_forward_to_syslog", - "remarks": "rule_set_265" + "remarks": "rule_set_262" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald ForwardToSyslog is disabled", - "remarks": "rule_set_265" + "remarks": "rule_set_262" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_compress", - "remarks": "rule_set_266" + "remarks": "rule_set_263" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to compress large log files", - "remarks": "rule_set_266" + "remarks": "rule_set_263" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_storage", - "remarks": "rule_set_267" + "remarks": "rule_set_264" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to write log files to persistent disk", - "remarks": "rule_set_267" + "remarks": "rule_set_264" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_268" + "remarks": "rule_set_265" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_268" + "remarks": "rule_set_265" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_269" + "remarks": "rule_set_266" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_269" + "remarks": "rule_set_266" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_270" + "remarks": "rule_set_267" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_270" + "remarks": "rule_set_267" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_passwd", - "remarks": "rule_set_271" + "remarks": "rule_set_268" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns passwd File", - "remarks": "rule_set_271" + "remarks": "rule_set_268" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_passwd", - "remarks": "rule_set_272" + "remarks": "rule_set_269" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns passwd File", - "remarks": "rule_set_272" + "remarks": "rule_set_269" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_passwd", - "remarks": "rule_set_273" + "remarks": "rule_set_270" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on passwd File", - "remarks": "rule_set_273" + "remarks": "rule_set_270" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_passwd", - "remarks": "rule_set_274" + "remarks": "rule_set_271" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup passwd File", - "remarks": "rule_set_274" + "remarks": "rule_set_271" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_passwd", - "remarks": "rule_set_275" + "remarks": "rule_set_272" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup passwd File", - "remarks": "rule_set_275" + "remarks": "rule_set_272" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_passwd", - "remarks": "rule_set_276" + "remarks": "rule_set_273" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup passwd File", - "remarks": "rule_set_276" + "remarks": "rule_set_273" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_group", - "remarks": "rule_set_277" + "remarks": "rule_set_274" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns group File", - "remarks": "rule_set_277" + "remarks": "rule_set_274" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_group", - "remarks": "rule_set_278" + "remarks": "rule_set_275" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns group File", - "remarks": "rule_set_278" + "remarks": "rule_set_275" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_group", - "remarks": "rule_set_279" + "remarks": "rule_set_276" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on group File", - "remarks": "rule_set_279" + "remarks": "rule_set_276" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_group", - "remarks": "rule_set_280" + "remarks": "rule_set_277" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup group File", - "remarks": "rule_set_280" + "remarks": "rule_set_277" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_group", - "remarks": "rule_set_281" + "remarks": "rule_set_278" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup group File", - "remarks": "rule_set_281" + "remarks": "rule_set_278" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_group", - "remarks": "rule_set_282" + "remarks": "rule_set_279" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup group File", - "remarks": "rule_set_282" + "remarks": "rule_set_279" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shadow", - "remarks": "rule_set_283" + "remarks": "rule_set_280" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns shadow File", - "remarks": "rule_set_283" + "remarks": "rule_set_280" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shadow", - "remarks": "rule_set_284" + "remarks": "rule_set_281" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns shadow File", - "remarks": "rule_set_284" + "remarks": "rule_set_281" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shadow", - "remarks": "rule_set_285" + "remarks": "rule_set_282" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on shadow File", - "remarks": "rule_set_285" + "remarks": "rule_set_282" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_shadow", - "remarks": "rule_set_286" + "remarks": "rule_set_283" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup shadow File", - "remarks": "rule_set_286" + "remarks": "rule_set_283" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_shadow", - "remarks": "rule_set_287" + "remarks": "rule_set_284" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup shadow File", - "remarks": "rule_set_287" + "remarks": "rule_set_284" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_shadow", - "remarks": "rule_set_288" + "remarks": "rule_set_285" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup shadow File", - "remarks": "rule_set_288" + "remarks": "rule_set_285" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_gshadow", - "remarks": "rule_set_289" + "remarks": "rule_set_286" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns gshadow File", - "remarks": "rule_set_289" + "remarks": "rule_set_286" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_gshadow", - "remarks": "rule_set_290" + "remarks": "rule_set_287" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns gshadow File", - "remarks": "rule_set_290" + "remarks": "rule_set_287" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_gshadow", - "remarks": "rule_set_291" + "remarks": "rule_set_288" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on gshadow File", - "remarks": "rule_set_291" + "remarks": "rule_set_288" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_gshadow", - "remarks": "rule_set_292" + "remarks": "rule_set_289" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup gshadow File", - "remarks": "rule_set_292" + "remarks": "rule_set_289" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_gshadow", - "remarks": "rule_set_293" + "remarks": "rule_set_290" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup gshadow File", - "remarks": "rule_set_293" + "remarks": "rule_set_290" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_gshadow", - "remarks": "rule_set_294" + "remarks": "rule_set_291" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup gshadow File", - "remarks": "rule_set_294" + "remarks": "rule_set_291" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shells", - "remarks": "rule_set_295" + "remarks": "rule_set_292" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/shells File", - "remarks": "rule_set_295" + "remarks": "rule_set_292" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shells", - "remarks": "rule_set_296" + "remarks": "rule_set_293" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Who Owns /etc/shells File", - "remarks": "rule_set_296" + "remarks": "rule_set_293" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shells", - "remarks": "rule_set_297" + "remarks": "rule_set_294" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/shells File", - "remarks": "rule_set_297" + "remarks": "rule_set_294" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd", - "remarks": "rule_set_298" + "remarks": "rule_set_295" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd File", - "remarks": "rule_set_298" + "remarks": "rule_set_295" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd", - "remarks": "rule_set_299" + "remarks": "rule_set_296" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd File", - "remarks": "rule_set_299" + "remarks": "rule_set_296" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd", - "remarks": "rule_set_300" + "remarks": "rule_set_297" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd File", - "remarks": "rule_set_300" + "remarks": "rule_set_297" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd_old", - "remarks": "rule_set_301" + "remarks": "rule_set_298" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_301" + "remarks": "rule_set_298" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd_old", - "remarks": "rule_set_302" + "remarks": "rule_set_299" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_302" + "remarks": "rule_set_299" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd_old", - "remarks": "rule_set_303" + "remarks": "rule_set_300" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd.old File", - "remarks": "rule_set_303" + "remarks": "rule_set_300" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_304" + "remarks": "rule_set_301" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_304" + "remarks": "rule_set_301" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_305" + "remarks": "rule_set_302" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_305" + "remarks": "rule_set_302" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_unowned_by_user", - "remarks": "rule_set_306" + "remarks": "rule_set_303" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a User", - "remarks": "rule_set_306" + "remarks": "rule_set_303" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_ungroupowned", - "remarks": "rule_set_307" + "remarks": "rule_set_304" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a Group", - "remarks": "rule_set_307" + "remarks": "rule_set_304" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_all_shadowed", - "remarks": "rule_set_308" + "remarks": "rule_set_305" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify All Account Password Hashes are Shadowed", - "remarks": "rule_set_308" + "remarks": "rule_set_305" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords_etc_shadow", - "remarks": "rule_set_309" + "remarks": "rule_set_306" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure There Are No Accounts With Blank or Null Passwords", - "remarks": "rule_set_309" + "remarks": "rule_set_306" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gid_passwd_group_same", - "remarks": "rule_set_310" + "remarks": "rule_set_307" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", - "remarks": "rule_set_310" + "remarks": "rule_set_307" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_id", - "remarks": "rule_set_311" + "remarks": "rule_set_308" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique User IDs", - "remarks": "rule_set_311" + "remarks": "rule_set_308" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_id", - "remarks": "rule_set_312" + "remarks": "rule_set_309" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group ID", - "remarks": "rule_set_312" + "remarks": "rule_set_309" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_name", - "remarks": "rule_set_313" + "remarks": "rule_set_310" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique Names", - "remarks": "rule_set_313" + "remarks": "rule_set_310" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_name", - "remarks": "rule_set_314" + "remarks": "rule_set_311" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group Names", - "remarks": "rule_set_314" + "remarks": "rule_set_311" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_interactive_home_directory_exists", - "remarks": "rule_set_315" + "remarks": "rule_set_312" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive Users Home Directories Must Exist", - "remarks": "rule_set_315" + "remarks": "rule_set_312" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_home_directories", - "remarks": "rule_set_316" + "remarks": "rule_set_313" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Be Owned By The Primary User", - "remarks": "rule_set_316" + "remarks": "rule_set_313" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_home_directories", - "remarks": "rule_set_317" + "remarks": "rule_set_314" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", - "remarks": "rule_set_317" + "remarks": "rule_set_314" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_318" + "remarks": "rule_set_315" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_318" + "remarks": "rule_set_315" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_319" + "remarks": "rule_set_316" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_319" + "remarks": "rule_set_316" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_no_world_writable_programs", - "remarks": "rule_set_320" + "remarks": "rule_set_317" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Not Run World-Writable Programs", - "remarks": "rule_set_320" + "remarks": "rule_set_317" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_321" + "remarks": "rule_set_318" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_321" + "remarks": "rule_set_318" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_forward_files", - "remarks": "rule_set_322" + "remarks": "rule_set_319" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .forward Files Exist", - "remarks": "rule_set_322" + "remarks": "rule_set_319" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_netrc_files", - "remarks": "rule_set_323" + "remarks": "rule_set_320" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No netrc Files Exist", - "remarks": "rule_set_323" + "remarks": "rule_set_320" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rhost_files", - "remarks": "rule_set_324" + "remarks": "rule_set_321" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .rhost Files Exist", - "remarks": "rule_set_324" + "remarks": "rule_set_321" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_bash_history", - "remarks": "rule_set_325" + "remarks": "rule_set_322" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure User Bash History File Has Correct Permissions", - "remarks": "rule_set_325" + "remarks": "rule_set_322" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_overlayfs_disabled", - "remarks": "rule_set_326" + "remarks": "rule_set_323" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure overlayfs kernel module is not available", - "remarks": "rule_set_326" + "remarks": "rule_set_323" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_squashfs_disabled", - "remarks": "rule_set_327" + "remarks": "rule_set_324" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Mounting of squashfs", - "remarks": "rule_set_327" + "remarks": "rule_set_324" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_udf_disabled", - "remarks": "rule_set_328" + "remarks": "rule_set_325" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Mounting of udf", - "remarks": "rule_set_328" + "remarks": "rule_set_325" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_home", - "remarks": "rule_set_329" + "remarks": "rule_set_326" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /home Located On Separate Partition", - "remarks": "rule_set_329" + "remarks": "rule_set_326" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var", - "remarks": "rule_set_330" + "remarks": "rule_set_327" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var Located On Separate Partition", - "remarks": "rule_set_330" + "remarks": "rule_set_327" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_tmp", - "remarks": "rule_set_331" + "remarks": "rule_set_328" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/tmp Located On Separate Partition", - "remarks": "rule_set_331" + "remarks": "rule_set_328" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log", - "remarks": "rule_set_332" + "remarks": "rule_set_329" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log Located On Separate Partition", - "remarks": "rule_set_332" + "remarks": "rule_set_329" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log_audit", - "remarks": "rule_set_333" + "remarks": "rule_set_330" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log/audit Located On Separate Partition", - "remarks": "rule_set_333" + "remarks": "rule_set_330" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_weak_deps", - "remarks": "rule_set_334" + "remarks": "rule_set_331" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Installation of Weak Dependencies in DNF", - "remarks": "rule_set_334" + "remarks": "rule_set_331" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_state", - "remarks": "rule_set_335" + "remarks": "rule_set_332" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SELinux State is Enforcing", - "remarks": "rule_set_335" + "remarks": "rule_set_332" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_symlinks", - "remarks": "rule_set_336" + "remarks": "rule_set_333" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", - "remarks": "rule_set_336" + "remarks": "rule_set_333" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "xwayland_disabled", - "remarks": "rule_set_337" + "remarks": "rule_set_334" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable XWayland", - "remarks": "rule_set_337" + "remarks": "rule_set_334" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_cockpit_disabled", - "remarks": "rule_set_338" + "remarks": "rule_set_335" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Cockpit Management Server", - "remarks": "rule_set_338" + "remarks": "rule_set_335" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_gdm_removed", - "remarks": "rule_set_339" + "remarks": "rule_set_336" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove the GDM Package Group", - "remarks": "rule_set_339" + "remarks": "rule_set_336" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_xorg-x11-server-Xwayland_removed", - "remarks": "rule_set_340" + "remarks": "rule_set_337" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove the X Windows Xwayland Package", - "remarks": "rule_set_340" + "remarks": "rule_set_337" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_openldap-clients_removed", - "remarks": "rule_set_341" + "remarks": "rule_set_338" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure LDAP client is not installed", - "remarks": "rule_set_341" + "remarks": "rule_set_338" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_ip_forward", - "remarks": "rule_set_342" + "remarks": "rule_set_339" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IP Forwarding on IPv4 Interfaces", - "remarks": "rule_set_342" + "remarks": "rule_set_339" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_forwarding", - "remarks": "rule_set_343" + "remarks": "rule_set_340" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Forwarding", - "remarks": "rule_set_343" + "remarks": "rule_set_340" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_gssapi_auth", - "remarks": "rule_set_344" + "remarks": "rule_set_341" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GSSAPI Authentication", - "remarks": "rule_set_344" + "remarks": "rule_set_341" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_nopasswd", - "remarks": "rule_set_345" + "remarks": "rule_set_342" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD", - "remarks": "rule_set_345" + "remarks": "rule_set_342" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny_root", - "remarks": "rule_set_346" + "remarks": "rule_set_343" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the root Account for Failed Password Attempts", - "remarks": "rule_set_346" + "remarks": "rule_set_343" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_minimum_age_login_defs", - "remarks": "rule_set_347" + "remarks": "rule_set_344" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Minimum Age", - "remarks": "rule_set_347" + "remarks": "rule_set_344" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_min_life_existing", - "remarks": "rule_set_348" + "remarks": "rule_set_345" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Minimum Age", - "remarks": "rule_set_348" + "remarks": "rule_set_345" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_nologin_in_shells", - "remarks": "rule_set_349" + "remarks": "rule_set_346" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure nologin Shell is Not Listed in /etc/shells", - "remarks": "rule_set_349" + "remarks": "rule_set_346" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit_installed", - "remarks": "rule_set_350" + "remarks": "rule_set_347" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit Subsystem is Installed", - "remarks": "rule_set_350" + "remarks": "rule_set_347" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit-libs_installed", - "remarks": "rule_set_351" + "remarks": "rule_set_348" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit-libs package as a part of audit Subsystem is Installed", - "remarks": "rule_set_351" + "remarks": "rule_set_348" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_argument", - "remarks": "rule_set_352" + "remarks": "rule_set_349" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Auditing for Processes Which Start Prior to the Audit Daemon", - "remarks": "rule_set_352" + "remarks": "rule_set_349" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_backlog_limit_argument", - "remarks": "rule_set_353" + "remarks": "rule_set_350" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Extend Audit Backlog Limit for the Audit Daemon", - "remarks": "rule_set_353" + "remarks": "rule_set_350" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_auditd_enabled", - "remarks": "rule_set_354" + "remarks": "rule_set_351" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable auditd Service", - "remarks": "rule_set_354" + "remarks": "rule_set_351" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_max_log_file", - "remarks": "rule_set_355" + "remarks": "rule_set_352" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Max Log File Size", - "remarks": "rule_set_355" + "remarks": "rule_set_352" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_max_log_file_action", - "remarks": "rule_set_356" + "remarks": "rule_set_353" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd max_log_file_action Upon Reaching Maximum Log Size", - "remarks": "rule_set_356" + "remarks": "rule_set_353" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_disk_error_action", - "remarks": "rule_set_357" + "remarks": "rule_set_354" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Disk Error Action on Disk Error", - "remarks": "rule_set_357" + "remarks": "rule_set_354" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_disk_full_action", - "remarks": "rule_set_358" + "remarks": "rule_set_355" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Disk Full Action when Disk Space Is Full", - "remarks": "rule_set_358" + "remarks": "rule_set_355" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_admin_space_left_action", - "remarks": "rule_set_359" + "remarks": "rule_set_356" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd admin_space_left Action on Low Disk Space", - "remarks": "rule_set_359" + "remarks": "rule_set_356" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_space_left_action", - "remarks": "rule_set_360" + "remarks": "rule_set_357" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd space_left Action on Low Disk Space", - "remarks": "rule_set_360" + "remarks": "rule_set_357" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_sysadmin_actions", - "remarks": "rule_set_361" + "remarks": "rule_set_358" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects System Administrator Actions", - "remarks": "rule_set_361" + "remarks": "rule_set_358" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_suid_auid_privilege_function", - "remarks": "rule_set_362" + "remarks": "rule_set_359" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events When Executables Are Run As Another User", - "remarks": "rule_set_362" + "remarks": "rule_set_359" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_sudo_log_events", - "remarks": "rule_set_363" + "remarks": "rule_set_360" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to perform maintenance activities", - "remarks": "rule_set_363" + "remarks": "rule_set_360" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_adjtimex", - "remarks": "rule_set_364" + "remarks": "rule_set_361" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through adjtimex", - "remarks": "rule_set_364" + "remarks": "rule_set_361" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_settimeofday", - "remarks": "rule_set_365" + "remarks": "rule_set_362" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through settimeofday", - "remarks": "rule_set_365" + "remarks": "rule_set_362" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_clock_settime", - "remarks": "rule_set_366" + "remarks": "rule_set_363" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through clock_settime", - "remarks": "rule_set_366" + "remarks": "rule_set_363" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_watch_localtime", - "remarks": "rule_set_367" + "remarks": "rule_set_364" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter the localtime File", - "remarks": "rule_set_367" + "remarks": "rule_set_364" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_setdomainname", - "remarks": "rule_set_368" + "remarks": "rule_set_365" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - setdomainname", - "remarks": "rule_set_368" + "remarks": "rule_set_365" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_sethostname", - "remarks": "rule_set_369" + "remarks": "rule_set_366" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - sethostname", - "remarks": "rule_set_369" + "remarks": "rule_set_366" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_issue", - "remarks": "rule_set_370" + "remarks": "rule_set_367" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/issue", - "remarks": "rule_set_370" + "remarks": "rule_set_367" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_issue_net", - "remarks": "rule_set_371" + "remarks": "rule_set_368" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/issue.net", - "remarks": "rule_set_371" + "remarks": "rule_set_368" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_hosts", - "remarks": "rule_set_372" + "remarks": "rule_set_369" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/hosts", - "remarks": "rule_set_372" + "remarks": "rule_set_369" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_hostname_file", - "remarks": "rule_set_373" + "remarks": "rule_set_370" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/hostname", - "remarks": "rule_set_373" + "remarks": "rule_set_370" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_sysconfig_network", - "remarks": "rule_set_374" + "remarks": "rule_set_371" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/sysconfig/network", - "remarks": "rule_set_374" + "remarks": "rule_set_371" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_networkmanager_system_connections", - "remarks": "rule_set_375" + "remarks": "rule_set_372" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/system-connections/", - "remarks": "rule_set_375" + "remarks": "rule_set_372" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_networkmanager", - "remarks": "rule_set_376" + "remarks": "rule_set_373" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/", - "remarks": "rule_set_376" + "remarks": "rule_set_373" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands", - "remarks": "rule_set_377" + "remarks": "rule_set_374" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands", - "remarks": "rule_set_377" + "remarks": "rule_set_374" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_creat", - "remarks": "rule_set_378" + "remarks": "rule_set_375" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - creat", - "remarks": "rule_set_378" + "remarks": "rule_set_375" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_ftruncate", - "remarks": "rule_set_379" + "remarks": "rule_set_376" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - ftruncate", - "remarks": "rule_set_379" + "remarks": "rule_set_376" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_open", - "remarks": "rule_set_380" + "remarks": "rule_set_377" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - open", - "remarks": "rule_set_380" + "remarks": "rule_set_377" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_openat", - "remarks": "rule_set_381" + "remarks": "rule_set_378" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - openat", - "remarks": "rule_set_381" + "remarks": "rule_set_378" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_truncate", - "remarks": "rule_set_382" + "remarks": "rule_set_379" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - truncate", - "remarks": "rule_set_382" + "remarks": "rule_set_379" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_group", - "remarks": "rule_set_383" + "remarks": "rule_set_380" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/group", - "remarks": "rule_set_383" + "remarks": "rule_set_380" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_passwd", - "remarks": "rule_set_384" + "remarks": "rule_set_381" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/passwd", - "remarks": "rule_set_384" + "remarks": "rule_set_381" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_gshadow", - "remarks": "rule_set_385" + "remarks": "rule_set_382" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/gshadow", - "remarks": "rule_set_385" + "remarks": "rule_set_382" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_shadow", - "remarks": "rule_set_386" + "remarks": "rule_set_383" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/shadow", - "remarks": "rule_set_386" + "remarks": "rule_set_383" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_opasswd", - "remarks": "rule_set_387" + "remarks": "rule_set_384" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", - "remarks": "rule_set_387" + "remarks": "rule_set_384" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_nsswitch_conf", - "remarks": "rule_set_388" + "remarks": "rule_set_385" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/nsswitch.conf", - "remarks": "rule_set_388" + "remarks": "rule_set_385" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_pam_conf", - "remarks": "rule_set_389" + "remarks": "rule_set_386" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/pam.conf", - "remarks": "rule_set_389" + "remarks": "rule_set_386" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_pamd", - "remarks": "rule_set_390" + "remarks": "rule_set_387" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/pam.d/", - "remarks": "rule_set_390" + "remarks": "rule_set_387" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chmod", - "remarks": "rule_set_391" + "remarks": "rule_set_388" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", - "remarks": "rule_set_391" + "remarks": "rule_set_388" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmod", - "remarks": "rule_set_392" + "remarks": "rule_set_389" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmod", - "remarks": "rule_set_392" + "remarks": "rule_set_389" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat", - "remarks": "rule_set_393" + "remarks": "rule_set_390" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat", - "remarks": "rule_set_393" + "remarks": "rule_set_390" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat2", - "remarks": "rule_set_394" + "remarks": "rule_set_391" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat2", - "remarks": "rule_set_394" + "remarks": "rule_set_391" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chown", - "remarks": "rule_set_395" + "remarks": "rule_set_392" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chown", - "remarks": "rule_set_395" + "remarks": "rule_set_392" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchown", - "remarks": "rule_set_396" + "remarks": "rule_set_393" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchown", - "remarks": "rule_set_396" + "remarks": "rule_set_393" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchownat", - "remarks": "rule_set_397" + "remarks": "rule_set_394" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchownat", - "remarks": "rule_set_397" + "remarks": "rule_set_394" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lchown", - "remarks": "rule_set_398" + "remarks": "rule_set_395" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lchown", - "remarks": "rule_set_398" + "remarks": "rule_set_395" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fremovexattr", - "remarks": "rule_set_399" + "remarks": "rule_set_396" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fremovexattr", - "remarks": "rule_set_399" + "remarks": "rule_set_396" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fsetxattr", - "remarks": "rule_set_400" + "remarks": "rule_set_397" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fsetxattr", - "remarks": "rule_set_400" + "remarks": "rule_set_397" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lremovexattr", - "remarks": "rule_set_401" + "remarks": "rule_set_398" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lremovexattr", - "remarks": "rule_set_401" + "remarks": "rule_set_398" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lsetxattr", - "remarks": "rule_set_402" + "remarks": "rule_set_399" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lsetxattr", - "remarks": "rule_set_402" + "remarks": "rule_set_399" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_removexattr", - "remarks": "rule_set_403" + "remarks": "rule_set_400" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - removexattr", - "remarks": "rule_set_403" + "remarks": "rule_set_400" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_setxattr", - "remarks": "rule_set_404" + "remarks": "rule_set_401" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - setxattr", - "remarks": "rule_set_404" + "remarks": "rule_set_401" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_media_export", - "remarks": "rule_set_405" + "remarks": "rule_set_402" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Exporting to Media (successful)", - "remarks": "rule_set_405" + "remarks": "rule_set_402" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_utmp", - "remarks": "rule_set_406" + "remarks": "rule_set_403" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information utmp", - "remarks": "rule_set_406" + "remarks": "rule_set_403" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_btmp", - "remarks": "rule_set_407" + "remarks": "rule_set_404" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information btmp", - "remarks": "rule_set_407" + "remarks": "rule_set_404" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_wtmp", - "remarks": "rule_set_408" + "remarks": "rule_set_405" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", - "remarks": "rule_set_408" + "remarks": "rule_set_405" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_faillock", - "remarks": "rule_set_409" + "remarks": "rule_set_406" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - faillock", - "remarks": "rule_set_409" + "remarks": "rule_set_406" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_lastlog", - "remarks": "rule_set_410" + "remarks": "rule_set_407" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - lastlog", - "remarks": "rule_set_410" + "remarks": "rule_set_407" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlink", - "remarks": "rule_set_411" + "remarks": "rule_set_408" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlink", - "remarks": "rule_set_411" + "remarks": "rule_set_408" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlinkat", - "remarks": "rule_set_412" + "remarks": "rule_set_409" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlinkat", - "remarks": "rule_set_412" + "remarks": "rule_set_409" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rename", - "remarks": "rule_set_413" + "remarks": "rule_set_410" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rename", - "remarks": "rule_set_413" + "remarks": "rule_set_410" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat", - "remarks": "rule_set_414" + "remarks": "rule_set_411" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat", - "remarks": "rule_set_414" + "remarks": "rule_set_411" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat2", - "remarks": "rule_set_415" + "remarks": "rule_set_412" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat2", - "remarks": "rule_set_415" + "remarks": "rule_set_412" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_etc_selinux", - "remarks": "rule_set_416" + "remarks": "rule_set_413" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls (/etc/selinux)", - "remarks": "rule_set_416" + "remarks": "rule_set_413" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_usr_share", - "remarks": "rule_set_417" + "remarks": "rule_set_414" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls in usr/share", - "remarks": "rule_set_417" + "remarks": "rule_set_414" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chcon", - "remarks": "rule_set_418" + "remarks": "rule_set_415" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chcon", - "remarks": "rule_set_418" + "remarks": "rule_set_415" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_setfacl", - "remarks": "rule_set_419" + "remarks": "rule_set_416" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run setfacl", - "remarks": "rule_set_419" + "remarks": "rule_set_416" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chacl", - "remarks": "rule_set_420" + "remarks": "rule_set_417" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chacl", - "remarks": "rule_set_420" + "remarks": "rule_set_417" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_usermod", - "remarks": "rule_set_421" + "remarks": "rule_set_418" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - usermod", - "remarks": "rule_set_421" + "remarks": "rule_set_418" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_kmod", - "remarks": "rule_set_422" + "remarks": "rule_set_419" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - kmod", - "remarks": "rule_set_422" + "remarks": "rule_set_419" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_init", - "remarks": "rule_set_423" + "remarks": "rule_set_420" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading - init_module", - "remarks": "rule_set_423" + "remarks": "rule_set_420" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_finit", - "remarks": "rule_set_424" + "remarks": "rule_set_421" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - finit_module", - "remarks": "rule_set_424" + "remarks": "rule_set_421" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_delete", - "remarks": "rule_set_425" + "remarks": "rule_set_422" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Unloading - delete_module", - "remarks": "rule_set_425" + "remarks": "rule_set_422" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_query", - "remarks": "rule_set_426" + "remarks": "rule_set_423" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - query_module", - "remarks": "rule_set_426" + "remarks": "rule_set_423" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_continue_loading", - "remarks": "rule_set_427" + "remarks": "rule_set_424" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Audit Configuration is Loaded Regardless of Errors", - "remarks": "rule_set_427" + "remarks": "rule_set_424" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_immutable", - "remarks": "rule_set_428" + "remarks": "rule_set_425" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Make the auditd Configuration Immutable", - "remarks": "rule_set_428" + "remarks": "rule_set_425" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_var_log_audit", - "remarks": "rule_set_429" + "remarks": "rule_set_426" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0750 or Less Permissive", - "remarks": "rule_set_429" + "remarks": "rule_set_426" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_var_log_audit", - "remarks": "rule_set_430" + "remarks": "rule_set_427" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0640 or Less Permissive", - "remarks": "rule_set_430" + "remarks": "rule_set_427" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_var_log_audit_stig", - "remarks": "rule_set_431" + "remarks": "rule_set_428" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Owned By Root", - "remarks": "rule_set_431" + "remarks": "rule_set_428" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_group_ownership_var_log_audit", - "remarks": "rule_set_432" + "remarks": "rule_set_429" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Group Owned By Root", - "remarks": "rule_set_432" + "remarks": "rule_set_429" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_audit_configuration", - "remarks": "rule_set_433" + "remarks": "rule_set_430" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Permissions are 640 or More Restrictive", - "remarks": "rule_set_433" + "remarks": "rule_set_430" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_audit_configuration", - "remarks": "rule_set_434" + "remarks": "rule_set_431" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Must Be Owned By Root", - "remarks": "rule_set_434" + "remarks": "rule_set_431" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_audit_configuration", - "remarks": "rule_set_435" + "remarks": "rule_set_432" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Must Be Owned By Group root", - "remarks": "rule_set_435" + "remarks": "rule_set_432" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_audit_binaries", - "remarks": "rule_set_436" + "remarks": "rule_set_433" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools Have Mode 0755 or less", - "remarks": "rule_set_436" + "remarks": "rule_set_433" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_audit_binaries", - "remarks": "rule_set_437" + "remarks": "rule_set_434" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools are owned by root", - "remarks": "rule_set_437" + "remarks": "rule_set_434" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_audit_binaries", - "remarks": "rule_set_438" + "remarks": "rule_set_435" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools are owned by group root", - "remarks": "rule_set_438" + "remarks": "rule_set_435" } ], "control-implementations": [ { - "uuid": "3e1d3517-503f-47da-9689-141026c8b80d", + "uuid": "55f4d08a-8a9c-4e53-890b-42c74a77beb1", "source": "trestle://profiles/rhel10-cis_rhel10-l2_server/profile.json", "description": "Control implementation for cis", "props": [ @@ -6907,7 +6871,7 @@ ], "implemented-requirements": [ { - "uuid": "a2415e21-8082-49fb-9c5d-a070cdb5e2da", + "uuid": "d66ed932-f9ba-4494-b151-56dcfcd3e6cc", "control-id": "cis_rhel10_1-1.1.6", "description": "No notes for control-id 1.1.1.6.", "props": [ @@ -6924,7 +6888,7 @@ ] }, { - "uuid": "ae4d4ea7-0edb-4992-81fc-93f9c99ae848", + "uuid": "bae443c2-b7e5-4feb-b4b7-2a43ea07647b", "control-id": "cis_rhel10_1-1.1.7", "description": "No notes for control-id 1.1.1.7.", "props": [ @@ -6941,7 +6905,7 @@ ] }, { - "uuid": "57d943c1-37d3-4822-9b30-69908bee45d5", + "uuid": "2f1343f3-cd1a-4d1f-b812-fa2f31908827", "control-id": "cis_rhel10_1-1.1.8", "description": "No notes for control-id 1.1.1.8.", "props": [ @@ -6958,7 +6922,7 @@ ] }, { - "uuid": "23038421-5cb4-44b9-8039-6e53ec31e462", + "uuid": "add0234a-6670-427a-8a24-16e7d2ab32ba", "control-id": "cis_rhel10_1-1.2.3.1", "description": "No notes for control-id 1.1.2.3.1.", "props": [ @@ -6975,7 +6939,7 @@ ] }, { - "uuid": "fd96260a-00e1-46fd-a4d8-1d3e3479f785", + "uuid": "839326a4-6ddd-4f44-97e9-d1f6650e1e09", "control-id": "cis_rhel10_1-1.2.4.1", "description": "No notes for control-id 1.1.2.4.1.", "props": [ @@ -6992,7 +6956,7 @@ ] }, { - "uuid": "98826772-5de3-4168-88b8-5352d0810784", + "uuid": "31cc8015-c7bf-40f6-a27d-a687517ff3a3", "control-id": "cis_rhel10_1-1.2.5.1", "description": "No notes for control-id 1.1.2.5.1.", "props": [ @@ -7009,7 +6973,7 @@ ] }, { - "uuid": "7489e472-222b-48bb-9199-05cefe86146b", + "uuid": "cbd31c66-21ca-43eb-a408-75ace21512e6", "control-id": "cis_rhel10_1-1.2.6.1", "description": "No notes for control-id 1.1.2.6.1.", "props": [ @@ -7026,7 +6990,7 @@ ] }, { - "uuid": "2fe69f9b-3bc0-40ff-b423-847eee34ba2c", + "uuid": "b5bb6d95-fae7-4b37-8a76-e7cf9576cd14", "control-id": "cis_rhel10_1-1.2.7.1", "description": "No notes for control-id 1.1.2.7.1.", "props": [ @@ -7043,7 +7007,7 @@ ] }, { - "uuid": "6f86f55d-d429-46a2-8916-7c71cfcdd25a", + "uuid": "3a64d1f5-e788-40b8-a14d-6f6bc2eb7b06", "control-id": "cis_rhel10_1-2.1.3", "description": "The description for control-id cis_rhel10_1-2.1.3.", "props": [ @@ -7056,7 +7020,7 @@ ] }, { - "uuid": "8a236fac-8429-47ba-ac9b-31d84cf98bca", + "uuid": "5a67fdd2-347f-4a1a-93c2-3bcea0fc4366", "control-id": "cis_rhel10_1-2.1.5", "description": "No notes for control-id 1.2.1.5.", "props": [ @@ -7073,7 +7037,7 @@ ] }, { - "uuid": "26fb547b-792b-4cb1-9827-7646bb31e92b", + "uuid": "44e4122a-bcbf-41b5-ad43-da3a11cddb64", "control-id": "cis_rhel10_1-3.1.5", "description": "No notes for control-id 1.3.1.5.", "props": [ @@ -7090,7 +7054,7 @@ ] }, { - "uuid": "7682a560-47a3-43a1-a524-30a6af52818e", + "uuid": "1d20e693-0930-483f-9f56-03752b32e0c3", "control-id": "cis_rhel10_1-3.1.6", "description": "The description for control-id cis_rhel10_1-3.1.6.", "props": [ @@ -7103,7 +7067,7 @@ ] }, { - "uuid": "f01bd672-faff-4522-8e67-039d3ebaf661", + "uuid": "3244f97d-7f35-4df1-9663-17bd69078f52", "control-id": "cis_rhel10_1-5.3", "description": "No notes for control-id 1.5.3.", "props": [ @@ -7120,7 +7084,7 @@ ] }, { - "uuid": "4557faa8-3bff-47c8-a37e-0a66fdae02c7", + "uuid": "b52745ea-60d9-4d47-a2d7-f2e567da5e03", "control-id": "cis_rhel10_1-8.6", "description": "No notes for control-id 1.8.6.", "props": [ @@ -7137,7 +7101,7 @@ ] }, { - "uuid": "577375a4-1e9c-4686-a4ce-beef1a97f864", + "uuid": "898679ac-9d31-4389-ad9f-538847497c84", "control-id": "cis_rhel10_2-1.3", "description": "No notes for control-id 2.1.3.", "props": [ @@ -7154,7 +7118,7 @@ ] }, { - "uuid": "2fceae92-060a-4276-b919-db789898bcfe", + "uuid": "cabf3423-9424-49ea-82fb-4e8ccb21676e", "control-id": "cis_rhel10_2-1.19", "description": "No notes for control-id 2.1.19.", "props": [ @@ -7171,7 +7135,7 @@ ] }, { - "uuid": "97fa8dce-63a3-4561-8c05-883048683a88", + "uuid": "7d0a585d-afd5-4000-b3db-a735e0410e94", "control-id": "cis_rhel10_2-1.20", "description": "No notes for control-id 2.1.20.", "props": [ @@ -7188,7 +7152,7 @@ ] }, { - "uuid": "8b9f6118-448a-4e96-9fc5-0fe35bddb8a4", + "uuid": "c0a69749-a082-455d-a67b-be6244d8c524", "control-id": "cis_rhel10_2-2.2", "description": "No notes for control-id 2.2.2.", "props": [ @@ -7205,7 +7169,7 @@ ] }, { - "uuid": "ab9d5cbd-0433-49f8-a857-f7bfb0a95814", + "uuid": "3c3b3e70-6706-4151-9d54-b638d136af50", "control-id": "cis_rhel10_3-3.1.1", "description": "No notes for control-id 3.3.1.1.", "props": [ @@ -7222,7 +7186,7 @@ ] }, { - "uuid": "c0876afb-3eb8-4749-afb6-b3fda3edb7cf", + "uuid": "ec6f3c95-393b-42ba-8531-954d8a0c0a5e", "control-id": "cis_rhel10_5-1.8", "description": "No notes for control-id 5.1.8.", "props": [ @@ -7239,7 +7203,7 @@ ] }, { - "uuid": "bb98337a-7a62-4260-9ad5-622780dc87f3", + "uuid": "42e524de-2365-49fc-ab8b-2ece694f1565", "control-id": "cis_rhel10_5-1.9", "description": "No notes for control-id 5.1.9.", "props": [ @@ -7256,7 +7220,7 @@ ] }, { - "uuid": "86ba9a70-5c4a-4393-80e1-af82924392b8", + "uuid": "b6c8daa7-86de-4dc8-a999-4dc3decb9f62", "control-id": "cis_rhel10_5-2.4", "description": "No notes for control-id 5.2.4.", "props": [ @@ -7273,7 +7237,7 @@ ] }, { - "uuid": "017ceca0-a449-4a06-9c02-b904ce8480e8", + "uuid": "01754491-b572-44da-8fac-ee52c8e382a3", "control-id": "cis_rhel10_5-3.2.1.3", "description": "No notes for control-id 5.3.2.1.3.", "props": [ @@ -7290,7 +7254,7 @@ ] }, { - "uuid": "9682baf1-8bce-4a21-9e88-775b42e7912f", + "uuid": "e00bc5f9-053e-4726-a876-4126bce86ccc", "control-id": "cis_rhel10_5-4.1.2", "description": "No notes for control-id 5.4.1.2.", "props": [ @@ -7312,7 +7276,7 @@ ] }, { - "uuid": "16cdcf35-4f2f-4a07-91e9-69fe6d06280c", + "uuid": "381761c9-725d-4f95-9af8-0e9af1a13edf", "control-id": "cis_rhel10_5-4.3.1", "description": "No notes for control-id 5.4.3.1.", "props": [ @@ -7329,7 +7293,7 @@ ] }, { - "uuid": "ec9c9509-2b78-48da-94cd-68a100e99e66", + "uuid": "aa05f5e6-5bd9-41b0-9634-a01ffad23b5a", "control-id": "cis_rhel10_6-3.1.1", "description": "No notes for control-id 6.3.1.1.", "props": [ @@ -7351,7 +7315,7 @@ ] }, { - "uuid": "3fe11f3e-bb59-4187-b05a-b118efd3f9bc", + "uuid": "af7ea2eb-4e60-499c-9bcc-6617fdca245a", "control-id": "cis_rhel10_6-3.1.2", "description": "No notes for control-id 6.3.1.2.", "props": [ @@ -7368,7 +7332,7 @@ ] }, { - "uuid": "fcf5868c-4729-4798-8bb6-370bd4d741f2", + "uuid": "43272f4b-84e5-4a2e-bae9-06bc571ddb44", "control-id": "cis_rhel10_6-3.1.3", "description": "No notes for control-id 6.3.1.3.", "props": [ @@ -7385,7 +7349,7 @@ ] }, { - "uuid": "9108f169-eebb-491d-93d1-c1e1f15f99b8", + "uuid": "1aa47ff7-5045-494e-94cc-9e0a38d86b50", "control-id": "cis_rhel10_6-3.1.4", "description": "No notes for control-id 6.3.1.4.", "props": [ @@ -7402,7 +7366,7 @@ ] }, { - "uuid": "a715d9f8-7f06-4b39-9f6e-15d2d222fff6", + "uuid": "39df35bb-e295-4ae1-9b91-c419023071f2", "control-id": "cis_rhel10_6-3.2.1", "description": "No notes for control-id 6.3.2.1.", "props": [ @@ -7419,7 +7383,7 @@ ] }, { - "uuid": "bdb7057b-f62c-4c9c-a7b7-5c0763e53093", + "uuid": "f8d334a7-983b-4e07-8471-c9bb8487bb1a", "control-id": "cis_rhel10_6-3.2.2", "description": "No notes for control-id 6.3.2.2.", "props": [ @@ -7436,7 +7400,7 @@ ] }, { - "uuid": "d6fd8c0d-6b60-4245-b718-0fbab1fd051c", + "uuid": "62bd333e-9dee-4e64-b16c-4d53f9562643", "control-id": "cis_rhel10_6-3.2.3", "description": "No notes for control-id 6.3.2.3.", "props": [ @@ -7458,7 +7422,7 @@ ] }, { - "uuid": "3292e0bf-25a1-47b2-a4fa-5634a2b13fa6", + "uuid": "ae19d5fd-4e8f-48f3-8c18-9744ba799d34", "control-id": "cis_rhel10_6-3.2.4", "description": "No notes for control-id 6.3.2.4.", "props": [ @@ -7480,7 +7444,7 @@ ] }, { - "uuid": "5460c975-e7cb-4ee7-9fe2-dce340424380", + "uuid": "4a2952f3-8b99-4379-873f-ef9104228804", "control-id": "cis_rhel10_6-3.3.1", "description": "No notes for control-id 6.3.3.1.", "props": [ @@ -7497,7 +7461,7 @@ ] }, { - "uuid": "95760766-e504-4052-b2bd-337c281eb3e1", + "uuid": "b079cc4e-f83f-4605-bc5a-5fbd2fb9fccd", "control-id": "cis_rhel10_6-3.3.2", "description": "No notes for control-id 6.3.3.2.", "props": [ @@ -7514,7 +7478,7 @@ ] }, { - "uuid": "4c694be9-ee7f-4130-b33d-10ef5748a38d", + "uuid": "9ccf5cab-1679-49df-a605-d442b4134cca", "control-id": "cis_rhel10_6-3.3.3", "description": "No notes for control-id 6.3.3.3.", "props": [ @@ -7531,7 +7495,7 @@ ] }, { - "uuid": "9650181b-00a6-407d-bf8d-1a3c87b18ad3", + "uuid": "4533268a-5dbd-4b2c-8d14-aebb14144cc7", "control-id": "cis_rhel10_6-3.3.4", "description": "No notes for control-id 6.3.3.4.", "props": [ @@ -7563,7 +7527,7 @@ ] }, { - "uuid": "1b55602d-d62c-425e-812f-642cdfb971ed", + "uuid": "f0b6d3a8-6112-4fa8-bd5e-7fdc115e08a6", "control-id": "cis_rhel10_6-3.3.5", "description": "No notes for control-id 6.3.3.5.", "props": [ @@ -7585,7 +7549,7 @@ ] }, { - "uuid": "7377e204-4149-416b-afae-4c032ebd1218", + "uuid": "26efda73-fd51-46c3-b5a5-22daadba63cc", "control-id": "cis_rhel10_6-3.3.6", "description": "No notes for control-id 6.3.3.6.", "props": [ @@ -7607,7 +7571,7 @@ ] }, { - "uuid": "275ad94f-ee40-48c6-bc9d-8471cb09eff4", + "uuid": "2c7d949e-1863-47f9-92b7-d2e51ccbca6b", "control-id": "cis_rhel10_6-3.3.7", "description": "No notes for control-id 6.3.3.7.", "props": [ @@ -7629,7 +7593,7 @@ ] }, { - "uuid": "fee788b6-2d52-4b04-9711-7d24fbe083b9", + "uuid": "86a694ac-1a5b-4943-a3e1-44cd80a674ba", "control-id": "cis_rhel10_6-3.3.8", "description": "No notes for control-id 6.3.3.8.", "props": [ @@ -7651,7 +7615,7 @@ ] }, { - "uuid": "e12cbfbb-e320-4d89-ae23-d55da8000f7f", + "uuid": "d1a925d6-9fb2-455f-8a81-51c66aa23e20", "control-id": "cis_rhel10_6-3.3.9", "description": "No notes for control-id 6.3.3.9.", "props": [ @@ -7668,7 +7632,7 @@ ] }, { - "uuid": "23e3b771-40ea-490a-827f-2d0381bb7742", + "uuid": "d57ed80c-c4dd-46b9-83ac-634e7d292ece", "control-id": "cis_rhel10_6-3.3.10", "description": "No notes for control-id 6.3.3.10.", "props": [ @@ -7685,7 +7649,7 @@ ] }, { - "uuid": "902aa7c1-6eeb-49f7-93a4-530fbdef4bfc", + "uuid": "dffdcccc-4f86-4745-8557-82e11005d582", "control-id": "cis_rhel10_6-3.3.11", "description": "No notes for control-id 6.3.3.11.", "props": [ @@ -7722,7 +7686,7 @@ ] }, { - "uuid": "e51c83fb-4147-4ecd-8781-4c74e6eea226", + "uuid": "f301731c-528f-45fa-bd19-e78ae0400a6d", "control-id": "cis_rhel10_6-3.3.12", "description": "No notes for control-id 6.3.3.12.", "props": [ @@ -7739,7 +7703,7 @@ ] }, { - "uuid": "47db96af-61ae-4ff0-a40a-32bd9cbe02a1", + "uuid": "e696e25d-8a86-4e56-b596-f4f372679404", "control-id": "cis_rhel10_6-3.3.13", "description": "No notes for control-id 6.3.3.13.", "props": [ @@ -7756,7 +7720,7 @@ ] }, { - "uuid": "65e440c5-8b25-432d-8950-58fb0170bea0", + "uuid": "d0eb254f-f805-404c-970e-19f4fc00cfdf", "control-id": "cis_rhel10_6-3.3.14", "description": "No notes for control-id 6.3.3.14.", "props": [ @@ -7778,7 +7742,7 @@ ] }, { - "uuid": "e0ffbe58-7d1f-44be-96c2-f42d84322c03", + "uuid": "af341416-d635-415e-8879-18924e56f348", "control-id": "cis_rhel10_6-3.3.15", "description": "No notes for control-id 6.3.3.15.", "props": [ @@ -7795,7 +7759,7 @@ ] }, { - "uuid": "254efaa1-80ec-4cc6-b644-3a6929055ba3", + "uuid": "7f4eda9c-2950-4805-a5e7-019f8d2eaffd", "control-id": "cis_rhel10_6-3.3.16", "description": "No notes for control-id 6.3.3.16.", "props": [ @@ -7812,7 +7776,7 @@ ] }, { - "uuid": "495776f8-0e33-4db4-a0b4-8d3df4ee36f9", + "uuid": "62954b84-1c40-4f90-9116-d73c2b0c4730", "control-id": "cis_rhel10_6-3.3.17", "description": "No notes for control-id 6.3.3.17.", "props": [ @@ -7834,7 +7798,7 @@ ] }, { - "uuid": "fa0d448e-9999-4122-90f9-361275ac4785", + "uuid": "7520725e-14e8-4419-8a87-5ae6dbd9713f", "control-id": "cis_rhel10_6-3.3.18", "description": "No notes for control-id 6.3.3.18.", "props": [ @@ -7866,7 +7830,7 @@ ] }, { - "uuid": "3cc0d7f4-dc67-446b-a4cd-206e50e3d157", + "uuid": "901b6672-a57e-401b-bc8b-46c1b029de47", "control-id": "cis_rhel10_6-3.3.19", "description": "No notes for control-id 6.3.3.19.", "props": [ @@ -7898,7 +7862,7 @@ ] }, { - "uuid": "7b92f5b7-1091-4002-93be-4dc30f5eff95", + "uuid": "706a1de5-1c2e-486d-bb66-25c5d3a926dd", "control-id": "cis_rhel10_6-3.3.20", "description": "No notes for control-id 6.3.3.20.", "props": [ @@ -7940,7 +7904,7 @@ ] }, { - "uuid": "582d368a-fa19-4ceb-892f-d637e85df130", + "uuid": "f0c47227-6218-4e46-88d5-be13def1d4d2", "control-id": "cis_rhel10_6-3.3.21", "description": "No notes for control-id 6.3.3.21.", "props": [ @@ -7957,7 +7921,7 @@ ] }, { - "uuid": "eff4d450-b88c-43cf-a416-2dab1796cb32", + "uuid": "712765b2-2808-4b75-92b6-3fdb834fd21a", "control-id": "cis_rhel10_6-3.3.22", "description": "No notes for control-id 6.3.3.22.", "props": [ @@ -7984,7 +7948,7 @@ ] }, { - "uuid": "08133392-bd44-41f4-9802-b2f87d091d9b", + "uuid": "94666ead-2c62-4fa3-9010-557467ccf4fb", "control-id": "cis_rhel10_6-3.3.23", "description": "No notes for control-id 6.3.3.23.", "props": [ @@ -8006,7 +7970,7 @@ ] }, { - "uuid": "12c08845-66d7-4ebd-ac42-68737874cda5", + "uuid": "6dedd940-50e0-4d3f-a92d-6f13c96e3ca5", "control-id": "cis_rhel10_6-3.3.24", "description": "No notes for control-id 6.3.3.24.", "props": [ @@ -8028,7 +7992,7 @@ ] }, { - "uuid": "3ed9c243-6aa1-447f-985d-c13448434283", + "uuid": "f0b36f97-7e6a-4e79-9724-b349e208bca4", "control-id": "cis_rhel10_6-3.3.25", "description": "No notes for control-id 6.3.3.25.", "props": [ @@ -8055,7 +8019,7 @@ ] }, { - "uuid": "92321aac-3cac-48cf-848a-357621c4b07d", + "uuid": "135d5c2e-a38d-40e3-bf74-afce8726742b", "control-id": "cis_rhel10_6-3.3.26", "description": "No notes for control-id 6.3.3.26.", "props": [ @@ -8077,7 +8041,7 @@ ] }, { - "uuid": "219d692c-54de-43a7-8b81-6c0e5962ff16", + "uuid": "53162caa-f084-47ec-bb14-cc85f3cdedd0", "control-id": "cis_rhel10_6-3.3.27", "description": "No notes for control-id 6.3.3.27.", "props": [ @@ -8094,7 +8058,7 @@ ] }, { - "uuid": "81901f20-d941-46c1-ac4f-814f56d8ff9f", + "uuid": "a46f28d2-236c-47c5-9e54-f66c396e88fc", "control-id": "cis_rhel10_6-3.3.28", "description": "No notes for control-id 6.3.3.28.", "props": [ @@ -8111,7 +8075,7 @@ ] }, { - "uuid": "ef5bb93c-dfeb-4345-b33b-4339b3d56be6", + "uuid": "dacfa924-79ce-46f8-87bf-93281f525cbd", "control-id": "cis_rhel10_6-3.3.29", "description": "No notes for control-id 6.3.3.29.", "props": [ @@ -8128,7 +8092,7 @@ ] }, { - "uuid": "89b355b6-6099-4ec8-8fac-13c5fffa0d56", + "uuid": "ff7ade3f-b944-46d0-bb3f-70fbe04dde08", "control-id": "cis_rhel10_6-3.3.30", "description": "No notes for control-id 6.3.3.30.", "props": [ @@ -8145,7 +8109,7 @@ ] }, { - "uuid": "3bf3cadb-ebf8-4c3d-b42b-763c8a50bcc0", + "uuid": "36b6c083-e9f7-4f09-9cd3-f00fb2789c86", "control-id": "cis_rhel10_6-3.3.31", "description": "No notes for control-id 6.3.3.31.", "props": [ @@ -8162,7 +8126,7 @@ ] }, { - "uuid": "276d72e2-29d1-41e4-97c0-d057769bdd78", + "uuid": "77cd4bed-d8de-499f-84e0-3ac65e484f18", "control-id": "cis_rhel10_6-3.3.32", "description": "No notes for control-id 6.3.3.32.", "props": [ @@ -8184,7 +8148,7 @@ ] }, { - "uuid": "82b0a3ed-c8c1-4ec6-8c61-05acdcbfd2c2", + "uuid": "a5b47a99-779a-4459-957e-b155badb1336", "control-id": "cis_rhel10_6-3.3.33", "description": "No notes for control-id 6.3.3.33.", "props": [ @@ -8201,7 +8165,7 @@ ] }, { - "uuid": "ba9280d8-4146-4143-8229-d1a11a8fab28", + "uuid": "f2697152-79c9-4e56-8f4a-a0246ddbf5d0", "control-id": "cis_rhel10_6-3.3.34", "description": "No notes for control-id 6.3.3.34.", "props": [ @@ -8218,7 +8182,7 @@ ] }, { - "uuid": "823e1c91-3bed-41c3-87bf-d9b19842d90e", + "uuid": "a9182935-bd71-4668-88b9-015c5ebc2757", "control-id": "cis_rhel10_6-3.3.35", "description": "No notes for control-id 6.3.3.35.", "props": [ @@ -8235,7 +8199,7 @@ ] }, { - "uuid": "1d2416b1-a1ed-4c54-b2b4-6ce124cd385b", + "uuid": "33167a7d-edcc-4740-b996-fc826ceae17b", "control-id": "cis_rhel10_6-3.3.36", "description": "No notes for control-id 6.3.3.36.", "props": [ @@ -8252,7 +8216,7 @@ ] }, { - "uuid": "bf5d8e77-cec1-4b6a-898d-a7fffeb409c1", + "uuid": "085454d7-666b-49c0-ae18-f92839a38b25", "control-id": "cis_rhel10_6-3.3.37", "description": "The description for control-id cis_rhel10_6-3.3.37.", "props": [ @@ -8265,7 +8229,7 @@ ] }, { - "uuid": "33b0017d-97d3-471c-9d96-0c7eeca29a5c", + "uuid": "75679d75-0393-4437-ab4b-2c0b60c2e405", "control-id": "cis_rhel10_6-3.4.1", "description": "No notes for control-id 6.3.4.1.", "props": [ @@ -8282,7 +8246,7 @@ ] }, { - "uuid": "6bf99192-d675-41fd-bec2-6741aeefd73d", + "uuid": "a6654d61-b7df-4f69-91af-5143c6935612", "control-id": "cis_rhel10_6-3.4.2", "description": "No notes for control-id 6.3.4.2.", "props": [ @@ -8299,7 +8263,7 @@ ] }, { - "uuid": "bc0d85f7-e1c7-4449-b8d1-cd5a3ccfb505", + "uuid": "55348622-a020-4273-90de-f4b416d8c444", "control-id": "cis_rhel10_6-3.4.3", "description": "No notes for control-id 6.3.4.3.", "props": [ @@ -8316,7 +8280,7 @@ ] }, { - "uuid": "014c554c-8ae7-47b1-87da-32923208fd92", + "uuid": "68a39142-33bb-4a2b-ab19-818ee1b4e30e", "control-id": "cis_rhel10_6-3.4.4", "description": "No notes for control-id 6.3.4.4.", "props": [ @@ -8333,7 +8297,7 @@ ] }, { - "uuid": "365c3ff0-3b42-4607-a5b7-2c8d6b62fc3d", + "uuid": "ed43765e-4b75-463e-b5c5-2ed5bb918c35", "control-id": "cis_rhel10_6-3.4.5", "description": "No notes for control-id 6.3.4.5.", "props": [ @@ -8350,7 +8314,7 @@ ] }, { - "uuid": "f4813709-709a-4eaa-b863-2531420add20", + "uuid": "68ed1c9f-0745-4ce6-85ed-16ab8ed25955", "control-id": "cis_rhel10_6-3.4.6", "description": "No notes for control-id 6.3.4.6.", "props": [ @@ -8367,7 +8331,7 @@ ] }, { - "uuid": "f011e80c-bdd0-45bf-910f-f85ea387de92", + "uuid": "05a96fac-5849-47c4-a45a-1ed912ddac3d", "control-id": "cis_rhel10_6-3.4.7", "description": "No notes for control-id 6.3.4.7.", "props": [ @@ -8384,7 +8348,7 @@ ] }, { - "uuid": "0562c013-e36c-4175-8470-45430ff0be65", + "uuid": "15ea10c0-b3b5-4084-b86f-302e863dff7f", "control-id": "cis_rhel10_6-3.4.8", "description": "No notes for control-id 6.3.4.8.", "props": [ @@ -8401,7 +8365,7 @@ ] }, { - "uuid": "58a4c015-8bcb-4472-a73e-0bb4fbb0f448", + "uuid": "786ec652-0636-4918-ad68-892dee8c72ca", "control-id": "cis_rhel10_6-3.4.9", "description": "No notes for control-id 6.3.4.9.", "props": [ @@ -8418,7 +8382,7 @@ ] }, { - "uuid": "c068f846-a460-429a-b1f4-1b7c9885c824", + "uuid": "15c3b2f2-1ea2-4e3b-a705-40f68e216796", "control-id": "cis_rhel10_6-3.4.10", "description": "No notes for control-id 6.3.4.10.", "props": [ @@ -8435,7 +8399,7 @@ ] }, { - "uuid": "d7e4694c-a085-459c-9d6e-a435ef7c9497", + "uuid": "a0ebe2e9-5a58-4ddd-96ad-82fdc0d2c2a8", "control-id": "reload_dconf_db", "description": "This is a helper rule to reload Dconf database correctly.", "props": [ @@ -8452,7 +8416,7 @@ ] }, { - "uuid": "72c840e6-44bb-4532-8ff1-64b7039b3d6c", + "uuid": "34ad6a21-53a9-411b-a9a2-d471ab651cbd", "control-id": "cis_rhel10_1-1.1.1", "description": "No notes for control-id 1.1.1.1.", "props": [ @@ -8469,7 +8433,7 @@ ] }, { - "uuid": "429ab9c8-ecc6-41ba-8d45-967be83cc9c2", + "uuid": "25958d34-6b19-4fa5-871f-3d289613565e", "control-id": "cis_rhel10_1-1.1.2", "description": "No notes for control-id 1.1.1.2.", "props": [ @@ -8486,7 +8450,7 @@ ] }, { - "uuid": "067abcce-9b12-4eb7-8369-a486e6ed0e91", + "uuid": "1b468ccd-86e2-401f-bdcc-bb0cbc76fbce", "control-id": "cis_rhel10_1-1.1.3", "description": "No notes for control-id 1.1.1.3.", "props": [ @@ -8503,7 +8467,7 @@ ] }, { - "uuid": "40ae3669-7575-4b96-9d77-4fa7c43d5028", + "uuid": "5e6f2197-1cf3-4eb3-bceb-42d4f6f3456a", "control-id": "cis_rhel10_1-1.1.4", "description": "No notes for control-id 1.1.1.4.", "props": [ @@ -8520,7 +8484,7 @@ ] }, { - "uuid": "971341a4-2bb7-406e-95c6-b65f6a9c73a3", + "uuid": "5feea3c1-b04b-4424-819c-295d3fc3ed61", "control-id": "cis_rhel10_1-1.1.5", "description": "No notes for control-id 1.1.1.5.", "props": [ @@ -8537,7 +8501,7 @@ ] }, { - "uuid": "b396002a-92a6-4264-9a01-406fd7445010", + "uuid": "36df1266-7d3e-4108-94f9-52d6b0472266", "control-id": "cis_rhel10_1-1.1.9", "description": "No notes for control-id 1.1.1.9.", "props": [ @@ -8554,7 +8518,7 @@ ] }, { - "uuid": "83353c66-a9fd-4fb8-86d6-22ae158a1888", + "uuid": "226aa034-2c6a-4958-989e-b1e770b10cd9", "control-id": "cis_rhel10_1-1.1.10", "description": "No notes for control-id 1.1.1.10.", "props": [ @@ -8571,7 +8535,7 @@ ] }, { - "uuid": "b408493e-14f4-431d-ae00-86ec807525c2", + "uuid": "d0e1adcd-8c0f-4e77-bd7d-67c847061341", "control-id": "cis_rhel10_1-1.1.11", "description": "The description for control-id cis_rhel10_1-1.1.11.", "props": [ @@ -8584,7 +8548,7 @@ ] }, { - "uuid": "99273373-229f-46d2-aeef-a8a29cdf24ca", + "uuid": "70d55710-9a00-4c02-8673-67499dab3703", "control-id": "cis_rhel10_1-1.2.1.1", "description": "No notes for control-id 1.1.2.1.1.", "props": [ @@ -8601,7 +8565,7 @@ ] }, { - "uuid": "95fd5a5c-5bc7-49e9-93a0-b734d79879fc", + "uuid": "4a365c20-e4d5-428b-b9c1-7eb840c1e641", "control-id": "cis_rhel10_1-1.2.1.2", "description": "No notes for control-id 1.1.2.1.2.", "props": [ @@ -8618,7 +8582,7 @@ ] }, { - "uuid": "11dca27b-c1e8-42d7-955f-34a182dbe439", + "uuid": "60b92bec-e220-4cf0-92f7-91cc1f3caaa5", "control-id": "cis_rhel10_1-1.2.1.3", "description": "No notes for control-id 1.1.2.1.3.", "props": [ @@ -8635,7 +8599,7 @@ ] }, { - "uuid": "1b7033d3-e537-4070-9a50-db243c1690b6", + "uuid": "46189723-ba16-4619-bd5b-ec07ad612dee", "control-id": "cis_rhel10_1-1.2.1.4", "description": "No notes for control-id 1.1.2.1.4.", "props": [ @@ -8652,7 +8616,7 @@ ] }, { - "uuid": "0efa8342-8185-499c-aadd-75cfb10e5e9b", + "uuid": "6dea18ec-8c75-4306-bc9f-fc9b587ae706", "control-id": "cis_rhel10_1-1.2.2.1", "description": "No notes for control-id 1.1.2.2.1.", "props": [ @@ -8669,7 +8633,7 @@ ] }, { - "uuid": "1fb0c09b-2049-4fc9-857c-4199cc165c80", + "uuid": "3710c764-9ef5-490a-bab6-99196d5ddb70", "control-id": "cis_rhel10_1-1.2.2.2", "description": "No notes for control-id 1.1.2.2.2.", "props": [ @@ -8686,7 +8650,7 @@ ] }, { - "uuid": "1e383d52-ecc4-45ba-a20e-ab69a8f6d57b", + "uuid": "18f2c438-8388-418f-bdf7-f7593753ce5e", "control-id": "cis_rhel10_1-1.2.2.3", "description": "No notes for control-id 1.1.2.2.3.", "props": [ @@ -8703,7 +8667,7 @@ ] }, { - "uuid": "2fe08d52-fc9b-4c86-95d2-25a86143d5b5", + "uuid": "1c3fd67f-4eed-4094-8209-86ac9d9addb4", "control-id": "cis_rhel10_1-1.2.2.4", "description": "No notes for control-id 1.1.2.2.4.", "props": [ @@ -8720,7 +8684,7 @@ ] }, { - "uuid": "e046ddc1-fd8d-4c57-a22d-7e74c24380cb", + "uuid": "d5f77281-32c6-4ff8-9b3d-8c1df86bdf5c", "control-id": "cis_rhel10_1-1.2.3.2", "description": "No notes for control-id 1.1.2.3.2.", "props": [ @@ -8737,7 +8701,7 @@ ] }, { - "uuid": "ed3e0d44-7c59-4fda-a7f4-c0182ede9582", + "uuid": "07bf26ca-3d17-42c9-b959-5eb824eda10e", "control-id": "cis_rhel10_1-1.2.3.3", "description": "No notes for control-id 1.1.2.3.3.", "props": [ @@ -8754,7 +8718,7 @@ ] }, { - "uuid": "da80e779-ac37-4fc9-813d-54b7a342d38d", + "uuid": "4cb1b8b5-ecac-42fb-8c48-4324e493243b", "control-id": "cis_rhel10_1-1.2.4.2", "description": "No notes for control-id 1.1.2.4.2.", "props": [ @@ -8771,7 +8735,7 @@ ] }, { - "uuid": "9b2e360b-529c-445b-9baa-428d6ef6dd14", + "uuid": "610898e1-fff7-48ac-ac78-1ed59f2737a9", "control-id": "cis_rhel10_1-1.2.4.3", "description": "No notes for control-id 1.1.2.4.3.", "props": [ @@ -8788,7 +8752,7 @@ ] }, { - "uuid": "b3e160be-f43e-45d2-a4c7-6402f5e0bc99", + "uuid": "02116907-5e67-4952-ae16-5c1d9bcc21d5", "control-id": "cis_rhel10_1-1.2.5.2", "description": "No notes for control-id 1.1.2.5.2.", "props": [ @@ -8805,7 +8769,7 @@ ] }, { - "uuid": "add95b1c-b08d-48b4-83e0-1a1696f4dea8", + "uuid": "dadcc9fd-8473-4062-964a-e10b8c435bf5", "control-id": "cis_rhel10_1-1.2.5.3", "description": "No notes for control-id 1.1.2.5.3.", "props": [ @@ -8822,7 +8786,7 @@ ] }, { - "uuid": "e8406b9d-980e-43f8-a28b-376b39b67546", + "uuid": "b64d9c7e-f87f-4dd7-8f3f-2e7598d3149c", "control-id": "cis_rhel10_1-1.2.5.4", "description": "No notes for control-id 1.1.2.5.4.", "props": [ @@ -8839,7 +8803,7 @@ ] }, { - "uuid": "f595c925-7219-4ec0-8732-a7262c6185f0", + "uuid": "e4053e49-8aad-430f-ba18-96b9903c51bf", "control-id": "cis_rhel10_1-1.2.6.2", "description": "No notes for control-id 1.1.2.6.2.", "props": [ @@ -8856,7 +8820,7 @@ ] }, { - "uuid": "26130a03-b774-4100-bd72-9d1ddd45faa7", + "uuid": "91903b25-aa3c-4156-9085-02bc529b52a3", "control-id": "cis_rhel10_1-1.2.6.3", "description": "No notes for control-id 1.1.2.6.3.", "props": [ @@ -8873,7 +8837,7 @@ ] }, { - "uuid": "dfdb0bcd-87b8-45f6-9f51-2a52f4604937", + "uuid": "1545a726-692b-4e5b-ae36-5dd55b4bc49f", "control-id": "cis_rhel10_1-1.2.6.4", "description": "No notes for control-id 1.1.2.6.4.", "props": [ @@ -8890,7 +8854,7 @@ ] }, { - "uuid": "2cbf60e2-4777-4ba6-9686-1f0051724163", + "uuid": "bcaf7919-7f6b-4a72-a340-6cd8b5f04f18", "control-id": "cis_rhel10_1-1.2.7.2", "description": "No notes for control-id 1.1.2.7.2.", "props": [ @@ -8907,7 +8871,7 @@ ] }, { - "uuid": "cedf42ba-e5a4-4678-80b8-7489fdd56f10", + "uuid": "107353a2-e7f6-4168-b01a-625bb3f94db8", "control-id": "cis_rhel10_1-1.2.7.3", "description": "No notes for control-id 1.1.2.7.3.", "props": [ @@ -8924,7 +8888,7 @@ ] }, { - "uuid": "47146c3d-e38d-4f65-9563-e3d197e88864", + "uuid": "f029964d-52b2-4607-9249-814474dd8b7c", "control-id": "cis_rhel10_1-1.2.7.4", "description": "No notes for control-id 1.1.2.7.4.", "props": [ @@ -8941,7 +8905,7 @@ ] }, { - "uuid": "9868d95d-7c93-4bad-915c-64652df03ecc", + "uuid": "962fe1ee-13c4-4141-bf58-3da7a631bdff", "control-id": "cis_rhel10_1-2.1.1", "description": "The description for control-id cis_rhel10_1-2.1.1.", "props": [ @@ -8954,7 +8918,7 @@ ] }, { - "uuid": "81909519-0548-417d-bf6b-68e1f661651c", + "uuid": "f73fbaf5-4d9f-44a5-bd23-9947f8c04b71", "control-id": "cis_rhel10_1-2.1.2", "description": "No notes for control-id 1.2.1.2.", "props": [ @@ -8971,7 +8935,7 @@ ] }, { - "uuid": "9dd3ca95-8a17-4dae-b441-84fd4d9bf25c", + "uuid": "e9c320e8-0b30-42a0-9fd4-88145d5a9251", "control-id": "cis_rhel10_1-2.1.4", "description": "The description for control-id cis_rhel10_1-2.1.4.", "props": [ @@ -8984,7 +8948,7 @@ ] }, { - "uuid": "4a7bd2e1-f531-4186-82b8-9ff40e44b02a", + "uuid": "62abbc36-6bd2-4ae3-900b-8859b6cb4dcf", "control-id": "cis_rhel10_1-2.2.1", "description": "The description for control-id cis_rhel10_1-2.2.1.", "props": [ @@ -8997,7 +8961,7 @@ ] }, { - "uuid": "9fe1db59-644f-4a50-bee3-5ed85ecd9225", + "uuid": "b50d583b-01c2-4498-9a66-90c0266d98fe", "control-id": "cis_rhel10_1-3.1.1", "description": "No notes for control-id 1.3.1.1.", "props": [ @@ -9014,7 +8978,7 @@ ] }, { - "uuid": "f9897398-acf8-4dce-a8c6-18145a299c44", + "uuid": "06711181-b15c-405f-a856-854e53ea29aa", "control-id": "cis_rhel10_1-3.1.2", "description": "No notes for control-id 1.3.1.2.", "props": [ @@ -9031,7 +8995,7 @@ ] }, { - "uuid": "91a06eca-1e9f-4cde-9e1f-885f6dc78282", + "uuid": "e407058c-48b5-42be-bb44-5d02be64cba0", "control-id": "cis_rhel10_1-3.1.3", "description": "No notes for control-id 1.3.1.3.", "props": [ @@ -9048,7 +9012,7 @@ ] }, { - "uuid": "35075290-6190-44b7-873b-305e3d17f556", + "uuid": "dcb64910-8ab4-444f-a1fb-48ab99787ab9", "control-id": "cis_rhel10_1-3.1.4", "description": "No notes for control-id 1.3.1.4.", "props": [ @@ -9065,7 +9029,7 @@ ] }, { - "uuid": "8db20c47-9a43-4386-92c0-ffbbb9c30f27", + "uuid": "db4dbb3b-a410-4cc4-a6d9-a1862df6a163", "control-id": "cis_rhel10_1-3.1.7", "description": "No notes for control-id 1.3.1.7.", "props": [ @@ -9082,7 +9046,7 @@ ] }, { - "uuid": "b91d9882-22bc-4c17-94a3-dd04a59b697e", + "uuid": "2324fc19-f237-4356-b8b3-75bd2b37aa7a", "control-id": "cis_rhel10_1-3.1.8", "description": "No notes for control-id 1.3.1.8.", "props": [ @@ -9099,7 +9063,7 @@ ] }, { - "uuid": "b636c9a3-3886-4888-b541-a1172bac7701", + "uuid": "6bed18df-6e50-43aa-a65f-304136c2438d", "control-id": "cis_rhel10_1-4.1", "description": "There is no automated remediation for this rule and this is intentional.\nMore details in the rule description.", "props": [ @@ -9116,50 +9080,34 @@ ] }, { - "uuid": "1b70e1f6-cc83-423a-9b6a-38387fc143c8", + "uuid": "d2ddc886-7454-467d-b554-1564bd81a5d8", "control-id": "cis_rhel10_1-4.2", - "description": "The description for control-id cis_rhel10_1-4.2.", + "description": "This requirement demands a deeper review of the rules.", "props": [ { "name": "implementation-status", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "alternative", - "remarks": "This requirement demands a deeper review of the rules." - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_grub2_cfg" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_grub2_cfg" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_grub2_cfg" + "value": "implemented" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_user_cfg" + "value": "file_permissions_boot_grub2" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_user_cfg" + "value": "file_owner_boot_grub2" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_user_cfg" + "value": "file_groupowner_boot_grub2" } ] }, { - "uuid": "743d7b98-aa87-4fde-aaee-1f9577547429", + "uuid": "7558b121-16bf-42d7-a934-c55af2a7bf7c", "control-id": "cis_rhel10_1-5.1", "description": "No notes for control-id 1.5.1.", "props": [ @@ -9176,7 +9124,7 @@ ] }, { - "uuid": "8aaa33f9-92fc-4220-bfff-7ad117d3e6c8", + "uuid": "bec88b54-af26-42dc-ab00-0882dd93d415", "control-id": "cis_rhel10_1-5.2", "description": "No notes for control-id 1.5.2.", "props": [ @@ -9193,7 +9141,7 @@ ] }, { - "uuid": "9a577d9c-f9a1-411c-8377-68be8b188e89", + "uuid": "f4a69af8-58ef-4a24-8fef-7e78cd38caac", "control-id": "cis_rhel10_1-5.4", "description": "No notes for control-id 1.5.4.", "props": [ @@ -9210,7 +9158,7 @@ ] }, { - "uuid": "7435eef7-48a5-459a-9d8c-150a884aca90", + "uuid": "504889b2-b40c-4647-a40e-01e8de4246a5", "control-id": "cis_rhel10_1-5.5", "description": "No notes for control-id 1.5.5.", "props": [ @@ -9227,7 +9175,7 @@ ] }, { - "uuid": "03897313-b8f3-43f2-a06c-21cde0283253", + "uuid": "7ff2013f-1332-4d9d-aa64-e20ce7469c5f", "control-id": "cis_rhel10_1-5.6", "description": "No notes for control-id 1.5.6.", "props": [ @@ -9244,7 +9192,7 @@ ] }, { - "uuid": "6d762863-9449-4a93-a6e6-4245cab4b337", + "uuid": "9457fae5-1bfc-493f-9ead-ba0fa592031f", "control-id": "cis_rhel10_1-5.7", "description": "No notes for control-id 1.5.7.", "props": [ @@ -9261,7 +9209,7 @@ ] }, { - "uuid": "4627d456-71ed-4723-ae82-f00faa285b71", + "uuid": "ef4cb2ff-7687-45e7-b1cb-76271d74e6dc", "control-id": "cis_rhel10_1-5.8", "description": "Address Space Layout Randomization (ASLR)", "props": [ @@ -9278,7 +9226,7 @@ ] }, { - "uuid": "bd66a061-358d-4b9b-86e2-8cfc0b5268b6", + "uuid": "fd48c183-f35f-4c2c-ac98-9512567e839d", "control-id": "cis_rhel10_1-5.9", "description": "No notes for control-id 1.5.9.", "props": [ @@ -9295,7 +9243,7 @@ ] }, { - "uuid": "e187086f-f24a-446d-8536-5ea5168a8d04", + "uuid": "14ff64d6-f741-44f0-a88f-ba6d10d04803", "control-id": "cis_rhel10_1-5.10", "description": "No notes for control-id 1.5.10.", "props": [ @@ -9312,7 +9260,7 @@ ] }, { - "uuid": "376fa6bd-2239-4cdf-891b-7f7b3f2e6e79", + "uuid": "ab981fda-48e3-42e4-b883-d746014e859a", "control-id": "cis_rhel10_1-6.1", "description": "No notes for control-id 1.6.1.", "props": [ @@ -9329,7 +9277,7 @@ ] }, { - "uuid": "8fa106e8-a37c-427d-9246-b3af511ad262", + "uuid": "aa0ec1d5-92ca-4c17-a7ab-0ef1a8a214c9", "control-id": "cis_rhel10_1-6.2", "description": "No notes for control-id 1.6.2.", "props": [ @@ -9346,7 +9294,7 @@ ] }, { - "uuid": "32793b1e-715b-4cd8-815d-c8c5f70c7a44", + "uuid": "249c9643-8ef6-4c2c-8241-6259925d2576", "control-id": "cis_rhel10_1-6.3", "description": "No notes for control-id 1.6.3.", "props": [ @@ -9363,7 +9311,7 @@ ] }, { - "uuid": "75e3d062-cf12-4d10-8706-318a5bd12752", + "uuid": "b995ac3a-7b67-4ee8-b4a6-2abb301fad33", "control-id": "cis_rhel10_1-6.4", "description": "No notes for control-id 1.6.4.", "props": [ @@ -9380,7 +9328,7 @@ ] }, { - "uuid": "97795c74-6041-4e6b-a758-86364fd27b71", + "uuid": "4d21a23a-19a2-41a2-a1b4-0a68b648a109", "control-id": "cis_rhel10_1-7.1", "description": "No notes for control-id 1.7.1.", "props": [ @@ -9397,7 +9345,7 @@ ] }, { - "uuid": "4388a206-06fe-485a-a447-b9f51d6ed304", + "uuid": "ff3b13f0-8b72-456c-b0e6-52a9ee4df719", "control-id": "cis_rhel10_1-7.2", "description": "No notes for control-id 1.7.2.", "props": [ @@ -9414,7 +9362,7 @@ ] }, { - "uuid": "1381936f-26f9-4321-b94b-671f9df5cac3", + "uuid": "7c600fe6-1028-4ac8-a941-a8337e933fce", "control-id": "cis_rhel10_1-7.3", "description": "No notes for control-id 1.7.3.", "props": [ @@ -9431,7 +9379,7 @@ ] }, { - "uuid": "b7bff27f-3f21-4023-83ec-80abe812c9f8", + "uuid": "23199b5c-848b-4ac6-9eba-b860ca85478b", "control-id": "cis_rhel10_1-7.4", "description": "No notes for control-id 1.7.4.", "props": [ @@ -9458,7 +9406,7 @@ ] }, { - "uuid": "5f9fb131-4378-42f2-bd65-1899a47633b3", + "uuid": "7b8a52b9-ed95-43ab-8ef8-7469a5c5be38", "control-id": "cis_rhel10_1-7.5", "description": "No notes for control-id 1.7.5.", "props": [ @@ -9485,7 +9433,7 @@ ] }, { - "uuid": "c3736b36-a2d8-4a54-be4d-4839d071b4dc", + "uuid": "8acce9b7-7961-4bb8-9e2f-3a45b93db0db", "control-id": "cis_rhel10_1-7.6", "description": "No notes for control-id 1.7.6.", "props": [ @@ -9512,7 +9460,7 @@ ] }, { - "uuid": "0f23043f-8824-4acb-947b-5a9bf336db37", + "uuid": "5fa3a2bd-ea68-4e6a-9313-7641d1b2ed06", "control-id": "cis_rhel10_1-8.1", "description": "No notes for control-id 1.8.1.", "props": [ @@ -9534,7 +9482,7 @@ ] }, { - "uuid": "d0ed4302-a620-42a3-b2fe-b823222bdb47", + "uuid": "6fd98286-5f6e-47de-b00e-90327a8fc6d0", "control-id": "cis_rhel10_1-8.2", "description": "No notes for control-id 1.8.2.", "props": [ @@ -9551,7 +9499,7 @@ ] }, { - "uuid": "5b56d83a-11d9-4cb4-a084-bceb03f1ade4", + "uuid": "58d4d17f-58ef-4d29-a295-0f3ce9abd3cc", "control-id": "cis_rhel10_1-8.3", "description": "No notes for control-id 1.8.3.", "props": [ @@ -9583,7 +9531,7 @@ ] }, { - "uuid": "1a7e9864-269a-41e9-b0c0-e3e66e128705", + "uuid": "2d3ca499-2c96-4430-b2e1-0af4a3cb80b6", "control-id": "cis_rhel10_1-8.4", "description": "No notes for control-id 1.8.4.", "props": [ @@ -9605,7 +9553,7 @@ ] }, { - "uuid": "905750d6-965b-4fc7-aaab-8553064218c8", + "uuid": "adce03e3-eb16-46f4-89e4-c9d2ef181862", "control-id": "cis_rhel10_1-8.5", "description": "No notes for control-id 1.8.5.", "props": [ @@ -9622,7 +9570,7 @@ ] }, { - "uuid": "3549db24-6598-4665-a76e-956ffb94535a", + "uuid": "92ed797b-b0cf-455f-9344-a9aeb4b51af3", "control-id": "cis_rhel10_2-1.1", "description": "No notes for control-id 2.1.1.", "props": [ @@ -9639,7 +9587,7 @@ ] }, { - "uuid": "64f476d5-c055-49ac-8a2a-40d210e1a8c7", + "uuid": "e939a4d2-914b-4da1-97ac-64228b116d41", "control-id": "cis_rhel10_2-1.2", "description": "No notes for control-id 2.1.2.", "props": [ @@ -9656,7 +9604,7 @@ ] }, { - "uuid": "c9ad5eff-e145-4ab5-9f52-9b042cface29", + "uuid": "d7764454-264d-477d-a0c8-517d138195fc", "control-id": "cis_rhel10_2-1.4", "description": "No notes for control-id 2.1.4.", "props": [ @@ -9673,7 +9621,7 @@ ] }, { - "uuid": "218fc716-6883-478c-98b7-4760ac489369", + "uuid": "116a3cd3-4885-4a9e-9619-891719e18617", "control-id": "cis_rhel10_2-1.5", "description": "No notes for control-id 2.1.5.", "props": [ @@ -9690,7 +9638,7 @@ ] }, { - "uuid": "c35e3df7-3f46-4c86-953e-c18517668530", + "uuid": "719498fc-894f-4364-8bf7-1633eed98908", "control-id": "cis_rhel10_2-1.6", "description": "No notes for control-id 2.1.6.", "props": [ @@ -9707,7 +9655,7 @@ ] }, { - "uuid": "e64fe2f4-6d29-40d9-a366-e5b37c792ef7", + "uuid": "fa074af4-2688-4c71-8d96-fa42ba8ba4a1", "control-id": "cis_rhel10_2-1.7", "description": "No notes for control-id 2.1.7.", "props": [ @@ -9724,7 +9672,7 @@ ] }, { - "uuid": "d8b9ea13-8565-49ce-8cf6-0ee207938101", + "uuid": "45d908f8-ee60-4446-a98e-8e2e70b364ba", "control-id": "cis_rhel10_2-1.8", "description": "No notes for control-id 2.1.8.", "props": [ @@ -9746,7 +9694,7 @@ ] }, { - "uuid": "533972c4-4288-4ee8-89ca-1f3b9de2f856", + "uuid": "0817601f-cc34-45a0-be73-02c821531ac6", "control-id": "cis_rhel10_2-1.9", "description": "Many of the libvirt packages used by Enterprise Linux virtualization are dependent on the\nnfs-utils package.", "props": [ @@ -9763,7 +9711,7 @@ ] }, { - "uuid": "526b04cb-c6fd-49ac-ac2b-4f4215b7f692", + "uuid": "d45dd4bc-66f1-4c81-8a61-0ecba9d977e5", "control-id": "cis_rhel10_2-1.10", "description": "No notes for control-id 2.1.10.", "props": [ @@ -9780,7 +9728,7 @@ ] }, { - "uuid": "5f836e06-a5fd-4c69-a000-f1f360386bef", + "uuid": "0d7140c7-4cbf-4aee-9c0d-0c5db278c684", "control-id": "cis_rhel10_2-1.11", "description": "Many of the libvirt packages used by Enterprise Linux virtualization, and the nfs-utils\npackage used for The Network File System (NFS), are dependent on the rpcbind package.", "props": [ @@ -9797,7 +9745,7 @@ ] }, { - "uuid": "d70e43d7-71a9-4949-a1f1-6a6d52d5f629", + "uuid": "2e6cc924-729d-4475-be9b-525eca3c838f", "control-id": "cis_rhel10_2-1.12", "description": "No notes for control-id 2.1.12.", "props": [ @@ -9814,7 +9762,7 @@ ] }, { - "uuid": "3d29e29d-795d-45eb-ab77-bc69a4a90eb9", + "uuid": "fab8e75e-b8f2-41cc-bde5-9cbc28e9d45a", "control-id": "cis_rhel10_2-1.13", "description": "No notes for control-id 2.1.13.", "props": [ @@ -9831,7 +9779,7 @@ ] }, { - "uuid": "7f5e4ace-53d5-475f-a76c-547ead17704b", + "uuid": "401a3a39-ad3d-4e78-a17a-b73f8b9ef68a", "control-id": "cis_rhel10_2-1.14", "description": "No notes for control-id 2.1.14.", "props": [ @@ -9848,7 +9796,7 @@ ] }, { - "uuid": "ba2afbd3-471a-4739-a3d0-e7c21a978945", + "uuid": "987abf62-a80e-4aee-82f7-4f3f98c4af17", "control-id": "cis_rhel10_2-1.15", "description": "No notes for control-id 2.1.15.", "props": [ @@ -9865,7 +9813,7 @@ ] }, { - "uuid": "f78760eb-69a3-4fbb-9d8d-4f2f86dc9f6a", + "uuid": "7654d645-8a73-4d90-aaba-52bcb9432355", "control-id": "cis_rhel10_2-1.16", "description": "No notes for control-id 2.1.16.", "props": [ @@ -9882,7 +9830,7 @@ ] }, { - "uuid": "b8f787ab-77fc-43cb-8390-fce72dd252b4", + "uuid": "3cea5092-a4fe-4411-9610-46674bf7cae6", "control-id": "cis_rhel10_2-1.17", "description": "No notes for control-id 2.1.17.", "props": [ @@ -9899,7 +9847,7 @@ ] }, { - "uuid": "eee988ed-6588-4fa5-9f98-4dc5223f351d", + "uuid": "cada3e39-6cb4-4410-8f78-a1027d97b7b3", "control-id": "cis_rhel10_2-1.18", "description": "No notes for control-id 2.1.18.", "props": [ @@ -9921,7 +9869,7 @@ ] }, { - "uuid": "eacc0c02-6876-419e-aab3-f0f4b20fe516", + "uuid": "1c6c5c4a-3343-471c-933f-da7133c4e78d", "control-id": "cis_rhel10_2-1.21", "description": "No notes for control-id 2.1.21.", "props": [ @@ -9943,7 +9891,7 @@ ] }, { - "uuid": "230c8834-eaf1-4dc5-93f7-113e8e0929ba", + "uuid": "a4b62bf4-1fa9-4077-aaab-678ff69f424d", "control-id": "cis_rhel10_2-1.22", "description": "The description for control-id cis_rhel10_2-1.22.", "props": [ @@ -9956,7 +9904,7 @@ ] }, { - "uuid": "f4c15a40-f625-4f93-af2e-fea146574abf", + "uuid": "624cbf30-5fd6-4092-8996-5d0650e94b20", "control-id": "cis_rhel10_2-2.1", "description": "No notes for control-id 2.2.1.", "props": [ @@ -9973,7 +9921,7 @@ ] }, { - "uuid": "157fc945-ecc6-46f5-9b8f-d20cc75125c9", + "uuid": "ef5edd8e-960e-4fe2-a6fe-f234ddfe52b5", "control-id": "cis_rhel10_2-2.3", "description": "No notes for control-id 2.2.3.", "props": [ @@ -9990,7 +9938,7 @@ ] }, { - "uuid": "9639b75b-2eec-4e2b-ab07-9b22e6d5fb4f", + "uuid": "848843cb-2f96-4a07-b171-d5c458698521", "control-id": "cis_rhel10_2-2.4", "description": "No notes for control-id 2.2.4.", "props": [ @@ -10007,7 +9955,7 @@ ] }, { - "uuid": "25e11a79-75a7-4af4-a1b2-9be1ac38443c", + "uuid": "7353b60f-b2e9-4541-97cb-ce9e47abe6ac", "control-id": "cis_rhel10_2-3.1", "description": "No notes for control-id 2.3.1.", "props": [ @@ -10019,7 +9967,7 @@ ] }, { - "uuid": "371dd61b-24be-4089-a7ef-eb7c32fad259", + "uuid": "54b5dc43-0aa9-42c2-97fb-57014d19f296", "control-id": "cis_rhel10_2-3.2", "description": "No notes for control-id 2.3.2.", "props": [ @@ -10036,7 +9984,7 @@ ] }, { - "uuid": "dd6f90c0-8995-474a-8978-811c88fbaa37", + "uuid": "4271c060-106a-4ae8-ad76-74f2966c880b", "control-id": "cis_rhel10_2-3.3", "description": "No notes for control-id 2.3.3.", "props": [ @@ -10053,7 +10001,7 @@ ] }, { - "uuid": "ae628e00-c58c-4a9c-b638-84b3e20959c6", + "uuid": "7aa7da09-1cc0-45d2-a6d0-56d7c3ceb86b", "control-id": "cis_rhel10_2-4.1.1", "description": "No notes for control-id 2.4.1.1.", "props": [ @@ -10075,7 +10023,7 @@ ] }, { - "uuid": "4b06f842-98e2-48a6-97f6-9699c314dc48", + "uuid": "eae46244-2716-44c1-a8ad-85bb57fa2a98", "control-id": "cis_rhel10_2-4.1.2", "description": "No notes for control-id 2.4.1.2.", "props": [ @@ -10102,7 +10050,7 @@ ] }, { - "uuid": "488091da-769c-4923-920d-16bd232350f1", + "uuid": "1ff76c4a-ebfc-49c3-8c28-efed6a54c793", "control-id": "cis_rhel10_2-4.1.3", "description": "No notes for control-id 2.4.1.3.", "props": [ @@ -10129,7 +10077,7 @@ ] }, { - "uuid": "f07612b8-d81e-4a18-8dd0-1769b531c7bc", + "uuid": "780ea027-6440-4284-8383-edee3fbd6c3e", "control-id": "cis_rhel10_2-4.1.4", "description": "No notes for control-id 2.4.1.4.", "props": [ @@ -10156,7 +10104,7 @@ ] }, { - "uuid": "c9703487-b47e-42a6-9ba0-5a7885b69680", + "uuid": "17a45829-0044-44fc-8acd-17a864b81a8d", "control-id": "cis_rhel10_2-4.1.5", "description": "No notes for control-id 2.4.1.5.", "props": [ @@ -10183,7 +10131,7 @@ ] }, { - "uuid": "73c1b6d0-baf7-460a-b533-e0fc28c49691", + "uuid": "dc01ed2e-5f52-45fd-910f-2e55b3ffbcf7", "control-id": "cis_rhel10_2-4.1.6", "description": "No notes for control-id 2.4.1.6.", "props": [ @@ -10210,7 +10158,7 @@ ] }, { - "uuid": "9135b971-2ea2-43dc-ae2f-3f892feb4bc9", + "uuid": "1b878181-d63d-45ad-a013-a6cb1a3d15b4", "control-id": "cis_rhel10_2-4.1.7", "description": "No notes for control-id 2.4.1.7.", "props": [ @@ -10237,7 +10185,7 @@ ] }, { - "uuid": "67c4728a-aecf-4082-b85e-cf417ae473b0", + "uuid": "051f5a8f-b64e-41e1-aeaf-07d87cb475ae", "control-id": "cis_rhel10_2-4.1.8", "description": "No notes for control-id 2.4.1.8.", "props": [ @@ -10264,7 +10212,7 @@ ] }, { - "uuid": "f135f782-3df0-4878-8489-5deb7e0cc72d", + "uuid": "e36ad643-176a-4671-9425-72f3fdd3611c", "control-id": "cis_rhel10_2-4.1.9", "description": "No notes for control-id 2.4.1.9.", "props": [ @@ -10301,7 +10249,7 @@ ] }, { - "uuid": "526d2eda-9d8c-457b-8efe-8d5a8cf2076a", + "uuid": "12c439de-72ee-4467-89da-cfe647183c4f", "control-id": "cis_rhel10_2-4.2.1", "description": "No notes for control-id 2.4.2.1.", "props": [ @@ -10338,7 +10286,7 @@ ] }, { - "uuid": "e3344401-d7ed-40c0-89d2-ceca9339faac", + "uuid": "b12f69a9-0487-4496-8b48-23eb6dfe4999", "control-id": "cis_rhel10_3-1.1", "description": "The description for control-id cis_rhel10_3-1.1.", "props": [ @@ -10351,7 +10299,7 @@ ] }, { - "uuid": "0da8391f-807d-4f88-b6a8-f4a5efa07b29", + "uuid": "0f61a814-434c-4004-bc9e-3b74323a40b0", "control-id": "cis_rhel10_3-1.2", "description": "No notes for control-id 3.1.2.", "props": [ @@ -10368,7 +10316,7 @@ ] }, { - "uuid": "253d7587-92c1-405f-babf-9d94e58d5c7d", + "uuid": "b6cfa7ce-55d3-48c8-80b4-0bbf786ff903", "control-id": "cis_rhel10_3-1.3", "description": "No notes for control-id 3.1.3.", "props": [ @@ -10385,7 +10333,7 @@ ] }, { - "uuid": "470b178d-5578-48ca-a192-c2c10d66cbe7", + "uuid": "fe17bb30-c1c9-4e75-8eaa-8b678144f2db", "control-id": "cis_rhel10_3-2.1", "description": "No notes for control-id 3.2.1.", "props": [ @@ -10402,7 +10350,7 @@ ] }, { - "uuid": "bbbeedcf-2659-430d-98a8-49ea047745a8", + "uuid": "f06d241f-5a18-4a52-b8d6-a6be87a4c839", "control-id": "cis_rhel10_3-2.2", "description": "No notes for control-id 3.2.2.", "props": [ @@ -10419,7 +10367,7 @@ ] }, { - "uuid": "5b0c4fb7-faa1-453c-a65d-ee9c2cbef5dc", + "uuid": "f6564e70-ab09-4749-8b24-35450876141d", "control-id": "cis_rhel10_3-2.3", "description": "No notes for control-id 3.2.3.", "props": [ @@ -10436,7 +10384,7 @@ ] }, { - "uuid": "397880ae-9497-4c9e-95ea-6549481377ec", + "uuid": "7713b0a8-e192-4d7f-99c8-e464d61d2ea4", "control-id": "cis_rhel10_3-2.4", "description": "No notes for control-id 3.2.4.", "props": [ @@ -10453,7 +10401,7 @@ ] }, { - "uuid": "432a0a03-a69f-4f12-9972-66bbcec22171", + "uuid": "aa07ea21-d880-4be1-97ef-6e17081c961e", "control-id": "cis_rhel10_3-2.5", "description": "No notes for control-id 3.2.5.", "props": [ @@ -10470,7 +10418,7 @@ ] }, { - "uuid": "fb209614-2bea-41aa-8680-2e3ff8086110", + "uuid": "f7ec3e05-a8f4-4eab-93d7-ce006d680eb9", "control-id": "cis_rhel10_3-2.6", "description": "No notes for control-id 3.2.6.", "props": [ @@ -10487,7 +10435,7 @@ ] }, { - "uuid": "5a051be2-48ee-4c87-9877-dfe575918a0d", + "uuid": "3f6bb7cf-3cde-4969-bd43-e8a9571896ea", "control-id": "cis_rhel10_3-3.1.2", "description": "No notes for control-id 3.3.1.2.", "props": [ @@ -10504,7 +10452,7 @@ ] }, { - "uuid": "fcd60b3e-a3e4-4f1f-ab72-365442c8f645", + "uuid": "4aa69b6b-9cb2-4fd0-9eb6-b644ddc48a6d", "control-id": "cis_rhel10_3-3.1.3", "description": "No notes for control-id 3.3.1.3.", "props": [ @@ -10521,7 +10469,7 @@ ] }, { - "uuid": "e4cf70ce-5189-4ddc-b78a-f3cdf720abe2", + "uuid": "1577a10a-fac7-4103-a46f-6386c43471d6", "control-id": "cis_rhel10_3-3.1.4", "description": "No notes for control-id 3.3.1.4.", "props": [ @@ -10538,7 +10486,7 @@ ] }, { - "uuid": "a963ccdf-dd98-45f9-b2e6-9c3d7919bdac", + "uuid": "49c6e6d3-f674-48d1-8f83-7553cdaa6ad9", "control-id": "cis_rhel10_3-3.1.5", "description": "No notes for control-id 3.3.1.5.", "props": [ @@ -10555,7 +10503,7 @@ ] }, { - "uuid": "67e49808-4c01-4661-88da-9671722f8c1c", + "uuid": "c3842e3d-fea3-4170-bcc7-55611e586471", "control-id": "cis_rhel10_3-3.1.6", "description": "No notes for control-id 3.3.1.6.", "props": [ @@ -10572,7 +10520,7 @@ ] }, { - "uuid": "ec4ef1d7-acae-4b6c-ba27-0acd8aa8f240", + "uuid": "04586302-6e25-4404-9c4b-af4bff42c9e7", "control-id": "cis_rhel10_3-3.1.7", "description": "No notes for control-id 3.3.1.7.", "props": [ @@ -10589,7 +10537,7 @@ ] }, { - "uuid": "ff161c9a-cf80-4004-a0c5-78c8d2ab11a5", + "uuid": "9f2ef66f-b173-492f-b8ba-52e31e748447", "control-id": "cis_rhel10_3-3.1.8", "description": "No notes for control-id 3.3.1.8.", "props": [ @@ -10606,7 +10554,7 @@ ] }, { - "uuid": "c9d27a1f-7ed6-4269-85dc-6333885222d1", + "uuid": "47d67b4c-cfdc-49d4-b5e4-725fff768e20", "control-id": "cis_rhel10_3-3.1.9", "description": "No notes for control-id 3.3.1.9.", "props": [ @@ -10623,7 +10571,7 @@ ] }, { - "uuid": "bb79b254-c90b-4445-a969-f7b66adbfc0a", + "uuid": "9c60a62d-7eec-4084-8522-005794cc3fd7", "control-id": "cis_rhel10_3-3.1.10", "description": "No notes for control-id 3.3.1.10.", "props": [ @@ -10640,7 +10588,7 @@ ] }, { - "uuid": "ea91f4d3-078a-4b25-868b-fe443afea0c2", + "uuid": "f05c0a8c-723c-4653-aaf0-014d6fb86a3a", "control-id": "cis_rhel10_3-3.1.11", "description": "No notes for control-id 3.3.1.11.", "props": [ @@ -10657,7 +10605,7 @@ ] }, { - "uuid": "6052c04f-053a-4394-a734-55f65dbc6872", + "uuid": "a628a4b6-5b42-4112-8151-5ff13825f970", "control-id": "cis_rhel10_3-3.1.12", "description": "No notes for control-id 3.3.1.12.", "props": [ @@ -10674,7 +10622,7 @@ ] }, { - "uuid": "d3ef1c88-1458-45ee-8c20-78ff61d16706", + "uuid": "9c43fc43-b68d-42e9-ba44-67d62f08a2f5", "control-id": "cis_rhel10_3-3.1.13", "description": "No notes for control-id 3.3.1.13.", "props": [ @@ -10691,7 +10639,7 @@ ] }, { - "uuid": "c1cde79e-85cd-4084-9d6b-6aabe181413c", + "uuid": "07756683-33a9-424e-983e-1d734f3fdd0d", "control-id": "cis_rhel10_3-3.1.14", "description": "No notes for control-id 3.3.1.14.", "props": [ @@ -10708,7 +10656,7 @@ ] }, { - "uuid": "9a0da855-9b88-4a3a-9090-be6aa08a553c", + "uuid": "1407dbbb-23cb-430b-8d26-266c9aa5f1ec", "control-id": "cis_rhel10_3-3.1.15", "description": "No notes for control-id 3.3.1.15.", "props": [ @@ -10725,7 +10673,7 @@ ] }, { - "uuid": "5bf7ac65-50b0-4971-8431-e1aad81c6401", + "uuid": "91231512-fd68-48d8-afd6-2693c25d00a9", "control-id": "cis_rhel10_3-3.1.16", "description": "No notes for control-id 3.3.1.16.", "props": [ @@ -10742,7 +10690,7 @@ ] }, { - "uuid": "33194423-f24c-4a64-b875-ea08ab22f426", + "uuid": "96059859-7484-42df-8064-ad106d965895", "control-id": "cis_rhel10_3-3.1.17", "description": "No notes for control-id 3.3.1.17.", "props": [ @@ -10759,7 +10707,7 @@ ] }, { - "uuid": "b4a4c7c8-fbee-441f-989d-1071683f0a2c", + "uuid": "772e0ae4-4bf0-4303-9131-37220ce18edd", "control-id": "cis_rhel10_3-3.1.18", "description": "No notes for control-id 3.3.1.18.", "props": [ @@ -10776,7 +10724,7 @@ ] }, { - "uuid": "ff557ac8-a6ba-4ce2-9c39-8d1253868f4e", + "uuid": "35c8c841-1758-4760-8de9-9fb56da68833", "control-id": "cis_rhel10_3-3.2.1", "description": "No notes for control-id 3.3.2.1.", "props": [ @@ -10793,7 +10741,7 @@ ] }, { - "uuid": "200c713d-7de0-4240-b7b7-29411c7aa1ed", + "uuid": "d233a056-0e75-49f3-9341-42537794d5d5", "control-id": "cis_rhel10_3-3.2.2", "description": "No notes for control-id 3.3.2.2.", "props": [ @@ -10810,7 +10758,7 @@ ] }, { - "uuid": "b5ed2126-0118-4192-9b9b-0e78ad8ff445", + "uuid": "a977cb55-b827-43c1-8569-bea8fec4679e", "control-id": "cis_rhel10_3-3.2.3", "description": "No notes for control-id 3.3.2.3.", "props": [ @@ -10827,7 +10775,7 @@ ] }, { - "uuid": "75a734ab-980d-4d07-a396-93b5d3de1c59", + "uuid": "7163aca1-bc6c-425c-a4a5-aaa46edd8561", "control-id": "cis_rhel10_3-3.2.4", "description": "No notes for control-id 3.3.2.4.", "props": [ @@ -10844,7 +10792,7 @@ ] }, { - "uuid": "ac0ffa08-7818-4dca-a4e2-5ca609e17336", + "uuid": "2d3bb6d7-a141-4527-9228-50e1e8117a21", "control-id": "cis_rhel10_3-3.2.5", "description": "No notes for control-id 3.3.2.5.", "props": [ @@ -10861,7 +10809,7 @@ ] }, { - "uuid": "5188749b-ad79-49cd-8898-facd2e4d88d9", + "uuid": "c82724e4-58e7-4248-8358-8bdac73c21c6", "control-id": "cis_rhel10_3-3.2.6", "description": "No notes for control-id 3.3.2.6.", "props": [ @@ -10878,7 +10826,7 @@ ] }, { - "uuid": "45b89984-2a61-421d-88c1-d9ae7e05d5b9", + "uuid": "7ed06b85-4ce8-4632-a226-0bd73df85bc6", "control-id": "cis_rhel10_3-3.2.7", "description": "No notes for control-id 3.3.2.7.", "props": [ @@ -10895,7 +10843,7 @@ ] }, { - "uuid": "bedb0377-c70a-4a23-8fae-9353eb9e3b05", + "uuid": "6fb7ab8a-78f1-4da8-9847-2b6de16c5206", "control-id": "cis_rhel10_3-3.2.8", "description": "No notes for control-id 3.3.2.8.", "props": [ @@ -10912,7 +10860,7 @@ ] }, { - "uuid": "98a1ffb9-c36c-4cef-99c4-01a0cd91e415", + "uuid": "0dd8c41d-31b1-4030-80a7-5ef0547da074", "control-id": "cis_rhel10_4-1.1", "description": "No notes for control-id 4.1.1.", "props": [ @@ -10929,7 +10877,7 @@ ] }, { - "uuid": "62c0cd07-11e4-4933-92f3-ab6e9df8e76e", + "uuid": "779b3b93-701d-4e6a-8cd3-c786c4946753", "control-id": "cis_rhel10_4-1.2", "description": "No notes for control-id 4.1.2.", "props": [ @@ -10946,7 +10894,7 @@ ] }, { - "uuid": "c37f04e8-ae78-4600-8e55-35cc69e66d7c", + "uuid": "47bf942e-eb4f-4257-8bb2-9b0bc7be9227", "control-id": "cis_rhel10_4-1.3", "description": "No notes for control-id 4.1.3.", "props": [ @@ -10963,7 +10911,7 @@ ] }, { - "uuid": "440cbd69-94da-45f0-b0c7-befbb7e85c02", + "uuid": "d61a71bc-9396-4a2f-bf17-e65052631479", "control-id": "cis_rhel10_4-1.4", "description": "The description for control-id cis_rhel10_4-1.4.", "props": [ @@ -10976,7 +10924,7 @@ ] }, { - "uuid": "61b62fa9-2a8f-4638-8942-95844ef20317", + "uuid": "335fb6c1-b778-4119-9826-7dda1d33ca5b", "control-id": "cis_rhel10_4-1.5", "description": "Firewalld in Red Hat Enterprise Linux 10 accepts loopback traffic by default.", "props": [ @@ -10993,7 +10941,7 @@ ] }, { - "uuid": "fa70609e-487d-4577-9bca-7177d0701f6d", + "uuid": "83348104-fea2-435a-8add-6debde79a884", "control-id": "cis_rhel10_4-1.6", "description": "The description for control-id cis_rhel10_4-1.6.", "props": [ @@ -11006,7 +10954,7 @@ ] }, { - "uuid": "51dac9cb-d5d7-4155-a8c5-db0d91a06088", + "uuid": "ba3645f2-43a7-4a7f-930b-8ad3544c6639", "control-id": "cis_rhel10_4-1.7", "description": "The description for control-id cis_rhel10_4-1.7.", "props": [ @@ -11019,7 +10967,7 @@ ] }, { - "uuid": "77c14ce9-81fc-4561-97a3-d0752d2f46ea", + "uuid": "b0278187-239e-43e6-bde2-8854cb4bb3fc", "control-id": "cis_rhel10_5-1.1", "description": "No notes for control-id 5.1.1.", "props": [ @@ -11076,7 +11024,7 @@ ] }, { - "uuid": "74e44274-73ca-4d97-ba78-26c79d07f292", + "uuid": "1a7ba208-3907-45ae-acc8-80f9f111681c", "control-id": "cis_rhel10_5-1.2", "description": "No notes for control-id 5.1.2.", "props": [ @@ -11103,7 +11051,7 @@ ] }, { - "uuid": "3ec9d482-be31-4860-9642-494d08fee5dc", + "uuid": "a037f80f-77bc-4fa4-ba4b-69439b3d5a5f", "control-id": "cis_rhel10_5-1.3", "description": "No notes for control-id 5.1.3.", "props": [ @@ -11130,7 +11078,7 @@ ] }, { - "uuid": "67320758-83ad-4e13-a7e4-4f414c892e98", + "uuid": "423bde49-4b84-4098-bfe5-772f957efea9", "control-id": "cis_rhel10_5-1.4", "description": "No notes for control-id 5.1.4.", "props": [ @@ -11147,7 +11095,7 @@ ] }, { - "uuid": "3970ce1e-8147-4814-b46c-00900a9040f6", + "uuid": "e8f5cdb4-3fd9-41c6-87ed-8e0309b3f202", "control-id": "cis_rhel10_5-1.5", "description": "No notes for control-id 5.1.5.", "props": [ @@ -11164,7 +11112,7 @@ ] }, { - "uuid": "f00017f5-8f87-44e9-84e4-d037a6eae866", + "uuid": "87ff263a-3084-442d-a6f1-59026c44351d", "control-id": "cis_rhel10_5-1.6", "description": "No notes for control-id 5.1.6.", "props": [ @@ -11181,7 +11129,7 @@ ] }, { - "uuid": "acc2345c-9952-4a04-ab50-11e083c87c2a", + "uuid": "1adeef60-bff0-479f-9d44-0ddb69abe1b4", "control-id": "cis_rhel10_5-1.7", "description": "The requirement gives an example of 45 seconds, but is flexible about the values. It is only\nnecessary to ensure there is a timeout configured in alignment to the site policy.", "props": [ @@ -11203,7 +11151,7 @@ ] }, { - "uuid": "aa098eb6-5d70-408b-b355-69ca1808a0ab", + "uuid": "10a75803-ef5e-4891-9bfb-432ec1c383ba", "control-id": "cis_rhel10_5-1.10", "description": "No notes for control-id 5.1.10.", "props": [ @@ -11220,7 +11168,7 @@ ] }, { - "uuid": "d90052b6-7851-48fa-82bf-8103aef934ef", + "uuid": "f6ca7633-b264-4ccc-a0af-086e1458db70", "control-id": "cis_rhel10_5-1.11", "description": "No notes for control-id 5.1.11.", "props": [ @@ -11237,7 +11185,7 @@ ] }, { - "uuid": "42ce937f-5386-4636-9213-aa44022d009f", + "uuid": "05f7d706-b470-4414-899b-c7bcd78f6338", "control-id": "cis_rhel10_5-1.12", "description": "The description for control-id cis_rhel10_5-1.12.", "props": [ @@ -11255,7 +11203,7 @@ ] }, { - "uuid": "d73a1b45-189a-4e9f-b2a9-11d79286d2e7", + "uuid": "a379099f-46cf-47ce-aa5f-5e63a8836a79", "control-id": "cis_rhel10_5-1.13", "description": "No notes for control-id 5.1.13.", "props": [ @@ -11272,7 +11220,7 @@ ] }, { - "uuid": "f5351309-5534-4974-9896-6746a7e218c4", + "uuid": "5d78bbfc-596c-465d-9462-f26b14a17ceb", "control-id": "cis_rhel10_5-1.14", "description": "The CIS benchmark is not opinionated about which loglevel is selected here. Here, this\nprofile uses VERBOSE by default, as it allows for the capture of login and logout activity\nas well as key fingerprints.", "props": [ @@ -11289,7 +11237,7 @@ ] }, { - "uuid": "9233ea19-e0b6-4486-9a0c-a3035f8b1e5d", + "uuid": "34ab12dc-7982-41e4-a4af-df783b99e869", "control-id": "cis_rhel10_5-1.15", "description": "No notes for control-id 5.1.15.", "props": [ @@ -11306,7 +11254,7 @@ ] }, { - "uuid": "91f75136-c679-4369-b67c-55af5961b21e", + "uuid": "ec921d2f-202d-4288-a5d0-df197b3537aa", "control-id": "cis_rhel10_5-1.16", "description": "No notes for control-id 5.1.16.", "props": [ @@ -11323,7 +11271,7 @@ ] }, { - "uuid": "f1a4dc47-ca7c-42f2-86ea-89fb2e9865d7", + "uuid": "3c13b640-0038-47c5-93ce-c65d75e46a67", "control-id": "cis_rhel10_5-1.17", "description": "No notes for control-id 5.1.17.", "props": [ @@ -11340,7 +11288,7 @@ ] }, { - "uuid": "d1b04c6b-3f42-47e1-8e2d-122e2b74ba2b", + "uuid": "e295d990-c27f-48b7-b8f4-6a0053873ab3", "control-id": "cis_rhel10_5-1.18", "description": "No notes for control-id 5.1.18.", "props": [ @@ -11357,7 +11305,7 @@ ] }, { - "uuid": "b053b248-26ee-435d-9997-9d548083d1e2", + "uuid": "db99d356-120e-4a4f-bc8d-6f66a8772c0b", "control-id": "cis_rhel10_5-1.19", "description": "No notes for control-id 5.1.19.", "props": [ @@ -11374,7 +11322,7 @@ ] }, { - "uuid": "b8f01e11-a8b1-4f32-9a85-5a9a00fe8333", + "uuid": "4ebbff45-e336-48cc-8d83-ec2e3b381724", "control-id": "cis_rhel10_5-1.20", "description": "No notes for control-id 5.1.20.", "props": [ @@ -11391,7 +11339,7 @@ ] }, { - "uuid": "d304101d-eb32-4253-9c2e-72971c37871c", + "uuid": "a9f5d127-fe7e-4a68-8038-f2e258f65e2f", "control-id": "cis_rhel10_5-1.21", "description": "No notes for control-id 5.1.21.", "props": [ @@ -11408,7 +11356,7 @@ ] }, { - "uuid": "2e68bc97-6d98-46fd-81d1-762f8cf0dfba", + "uuid": "175c9492-e870-4ab6-a9d0-20d764e745c8", "control-id": "cis_rhel10_5-1.22", "description": "No notes for control-id 5.1.22.", "props": [ @@ -11425,7 +11373,7 @@ ] }, { - "uuid": "8a15f522-ce0d-4d93-bf01-7c0cfa3c9173", + "uuid": "56c9c9dd-f180-46b8-8085-d7cc79985188", "control-id": "cis_rhel10_5-2.1", "description": "No notes for control-id 5.2.1.", "props": [ @@ -11442,7 +11390,7 @@ ] }, { - "uuid": "52111d45-3d5b-490f-be55-1d0d605567ac", + "uuid": "33ebc51c-74ae-4691-8dc6-859acd874bd1", "control-id": "cis_rhel10_5-2.2", "description": "No notes for control-id 5.2.2.", "props": [ @@ -11459,7 +11407,7 @@ ] }, { - "uuid": "c4055552-fde0-4000-b59a-238ec13beaf7", + "uuid": "d3ef39f3-851d-4b71-9ff9-b015ddf42f35", "control-id": "cis_rhel10_5-2.3", "description": "No notes for control-id 5.2.3.", "props": [ @@ -11476,7 +11424,7 @@ ] }, { - "uuid": "66034426-088e-47ba-a478-a09f5ab4e2b1", + "uuid": "9e3b76a3-9893-473d-b7a2-cb1975a4a649", "control-id": "cis_rhel10_5-2.5", "description": "No notes for control-id 5.2.5.", "props": [ @@ -11493,7 +11441,7 @@ ] }, { - "uuid": "eac2989d-b17e-445c-a687-affa08d55dbc", + "uuid": "869cd847-824d-4593-be01-86d09464be88", "control-id": "cis_rhel10_5-2.6", "description": "No notes for control-id 5.2.6.", "props": [ @@ -11510,7 +11458,7 @@ ] }, { - "uuid": "a1c733be-2585-4149-b035-b26bcb7fe06d", + "uuid": "66fd1d9e-f6ea-4bed-9159-54beaa5f10db", "control-id": "cis_rhel10_5-2.7", "description": "Members of \"wheel\" or GID 0 groups are checked by default if the group option is not set for\npam_wheel.so module. The recommendation states the group should be empty to reinforce the\nuse of \"sudo\" for privileged access. Therefore, members of these groups should be manually\nchecked or a different group should be informed.", "props": [ @@ -11532,7 +11480,7 @@ ] }, { - "uuid": "cefb3f0f-3941-40c4-87b2-32578ba2eea9", + "uuid": "e1073c90-af53-4eaa-8b15-ef52004d5a11", "control-id": "cis_rhel10_5-3.1.1", "description": "This requirement is hard to be automated without any specific requirement. The policy even\nstates that provided commands are examples, other custom settings might be in place and the\nsettings might be different depending on site policies. The other rules will already make\nsure there is a correct autheselect profile regardless of the existing settings. It is\nnecessary to better discuss with CIS Community.", "props": [ @@ -11544,7 +11492,7 @@ ] }, { - "uuid": "cae9f83b-2faa-4c90-b206-fbeb140c7e75", + "uuid": "b828e176-af35-4577-a005-076279eebd61", "control-id": "cis_rhel10_5-3.1.2", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.1.", "props": [ @@ -11566,7 +11514,7 @@ ] }, { - "uuid": "58839197-1fa9-412b-b4df-407b631218c6", + "uuid": "432d8716-f89d-4197-ab95-5c0204047b20", "control-id": "cis_rhel10_5-3.1.3", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.2.", "props": [ @@ -11593,7 +11541,7 @@ ] }, { - "uuid": "4225e97d-bf86-4d3e-9296-09b56739bc66", + "uuid": "b2487b11-dcb2-4774-9d79-9fb29f6c19ac", "control-id": "cis_rhel10_5-3.1.4", "description": "The module is properly enabled by the rules mentioned in related_rules.\nRequirements in 5.3.2.3 use these rules.", "props": [ @@ -11605,7 +11553,7 @@ ] }, { - "uuid": "b8b46b08-3a7c-444c-9616-f2fdc4f97938", + "uuid": "4fe4142d-d020-49e5-b3e1-9fa149337e4a", "control-id": "cis_rhel10_5-3.1.5", "description": "No notes for control-id 5.3.1.5.", "props": [ @@ -11622,7 +11570,7 @@ ] }, { - "uuid": "8baee14c-0115-4583-8221-3cf1b21c6f0c", + "uuid": "05425f37-73dc-4fc1-aa32-362c4d0c654f", "control-id": "cis_rhel10_5-3.2.1.1", "description": "No notes for control-id 5.3.2.1.1.", "props": [ @@ -11639,7 +11587,7 @@ ] }, { - "uuid": "4df69264-bf55-4b0d-b8a0-6c39a2746d69", + "uuid": "44dbfffb-9676-4beb-a428-fa7a81fc0e2e", "control-id": "cis_rhel10_5-3.2.1.2", "description": "The policy also accepts value 0, which means the locked accounts should be manually unlocked\nby an administrator. However, it also mentions that using value 0 can facilitate a DoS\nattack to legitimate users.", "props": [ @@ -11656,7 +11604,7 @@ ] }, { - "uuid": "3b46dbbb-44ec-4e47-9558-27a697f2dc68", + "uuid": "68998d85-74d3-4e7a-bd8b-3780b25b2382", "control-id": "cis_rhel10_5-3.2.2.1", "description": "No notes for control-id 5.3.2.2.1.", "props": [ @@ -11673,7 +11621,7 @@ ] }, { - "uuid": "42b30290-39dd-4c40-990e-7b9734b09ca2", + "uuid": "07558737-7a98-4a22-92a6-a3475995e307", "control-id": "cis_rhel10_5-3.2.2.2", "description": "No notes for control-id 5.3.2.2.2.", "props": [ @@ -11690,7 +11638,7 @@ ] }, { - "uuid": "1ef82755-f713-4bab-af00-53369b111bd5", + "uuid": "7bf956d2-fc40-492a-852d-bf3edb7dd66d", "control-id": "cis_rhel10_5-3.2.2.3", "description": "This requirement is expected to be manual. However, in previous versions of the policy\nit was already automated the configuration of \"minclass\" option. This posture was kept for\nRHEL 10 in this new version. Rules related to other options are informed in related_rules.\nIn short, minclass=4 alone can achieve the same result achieved by the combination of the\nother 4 options mentioned in the policy.", "props": [ @@ -11707,7 +11655,7 @@ ] }, { - "uuid": "e591f141-b103-411b-8f9b-4eabebac445a", + "uuid": "d685aa9e-c7af-43c9-ae99-54358ee347ed", "control-id": "cis_rhel10_5-3.2.2.4", "description": "No notes for control-id 5.3.2.2.4.", "props": [ @@ -11724,7 +11672,7 @@ ] }, { - "uuid": "15b098b6-ede6-43a3-a437-b970fadbad24", + "uuid": "a63736b1-4802-4d9b-8a9f-b2fbb530d86f", "control-id": "cis_rhel10_5-3.2.2.5", "description": "No notes for control-id 5.3.2.2.5.", "props": [ @@ -11741,7 +11689,7 @@ ] }, { - "uuid": "6867606b-8b64-4abf-8c0e-d5b0db125f7d", + "uuid": "681e9ce1-cd67-4b7f-8cf6-9c32073b3ca6", "control-id": "cis_rhel10_5-3.2.2.6", "description": "No notes for control-id 5.3.2.2.6.", "props": [ @@ -11758,7 +11706,7 @@ ] }, { - "uuid": "234f8dd9-5288-4739-bb8c-ebce9d921b82", + "uuid": "1ddb4d39-6441-45c6-bcea-d4e9e15d859e", "control-id": "cis_rhel10_5-3.2.2.7", "description": "No notes for control-id 5.3.2.2.7.", "props": [ @@ -11775,7 +11723,7 @@ ] }, { - "uuid": "70d814bd-291e-4e3a-8449-3528e913fe8a", + "uuid": "044d8fac-fa04-4afa-b44e-a38159266ef0", "control-id": "cis_rhel10_5-3.2.3.1", "description": "Although mentioned in the section 5.3.3.3, there is no explicit requirement to configure\nretry option of pam_pwhistory. If come in the future, the rule accounts_password_pam_retry\ncan be used.", "props": [ @@ -11797,7 +11745,7 @@ ] }, { - "uuid": "3b83414d-09ea-455b-aabe-e86e731ca03b", + "uuid": "77313e4d-3e91-408a-bba8-648ec7438cb2", "control-id": "cis_rhel10_5-3.2.3.2", "description": "No notes for control-id 5.3.2.3.2.", "props": [ @@ -11814,7 +11762,7 @@ ] }, { - "uuid": "c040a495-66e6-4908-a36d-bddbe5b45a25", + "uuid": "00dbc305-4939-4454-bb78-f833e8fc21b8", "control-id": "cis_rhel10_5-3.2.3.3", "description": "In RHEL 10 pam_pwhistory is enabled via authselect feature, as required in 5.3.1.4. The\nfeature automatically set \"use_authok\" option. In any case, we don't have a rule to check\nthis option specifically.", "props": [ @@ -11831,7 +11779,7 @@ ] }, { - "uuid": "a79224e3-4e48-4290-b8f7-f75a8e8d79ad", + "uuid": "94294d3d-3f88-41ce-9286-37c4e6100147", "control-id": "cis_rhel10_5-3.2.4.1", "description": "The rule more specifically used in this requirement also satify the requirement 5.3.1.5.", "props": [ @@ -11848,7 +11796,7 @@ ] }, { - "uuid": "d2faeb53-94e9-42e4-a4dc-b4ff1264461b", + "uuid": "14cf50b9-ba72-4af5-b9cf-a9c60330ba06", "control-id": "cis_rhel10_5-3.2.4.2", "description": "Usage of pam_unix.so module together with \"remember\" option is deprecated and is not\nrecommended by this policy. Instead, it should be used remember option of pam_pwhistory\nmodule, as required in 5.3.2.3.1. See here for more details about pam_unix.so:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1778929", "props": [ @@ -11865,7 +11813,7 @@ ] }, { - "uuid": "32696ec8-6ba8-475b-95c6-74d6bb061e2c", + "uuid": "a9e2ae10-074b-452e-8928-41223ee74e21", "control-id": "cis_rhel10_5-3.2.4.3", "description": "Changes in logindefs mentioned in this requirement are more specifically covered by 5.4.1.4", "props": [ @@ -11887,7 +11835,7 @@ ] }, { - "uuid": "1e72a065-4942-4415-b42b-f2cf9585c66e", + "uuid": "f327a6b9-5bee-48e2-9527-2da148661515", "control-id": "cis_rhel10_5-3.2.4.4", "description": "In RHEL 10 pam_unix is enabled by default in all authselect profiles already with the\nuse_authtok option set. In any case, we don't have a rule to check this option specifically,\nlike in 5.3.2.3.3.", "props": [ @@ -11904,7 +11852,7 @@ ] }, { - "uuid": "85092c48-c63f-4a95-9dff-f4954711bc06", + "uuid": "2a4c377a-9870-4330-9fd9-07591105761a", "control-id": "cis_rhel10_5-4.1.1", "description": "No notes for control-id 5.4.1.1.", "props": [ @@ -11926,7 +11874,7 @@ ] }, { - "uuid": "213fda20-4a7e-4dee-aa31-586b0c8a954e", + "uuid": "1a749009-d6a1-42b9-9900-f89ebf605b13", "control-id": "cis_rhel10_5-4.1.3", "description": "No notes for control-id 5.4.1.3.", "props": [ @@ -11948,7 +11896,7 @@ ] }, { - "uuid": "8796d0f4-64a4-4b90-99ac-fd5f669d2f8f", + "uuid": "84e023c5-51c2-4e63-9687-dc6b5f00e358", "control-id": "cis_rhel10_5-4.1.4", "description": "There's a \"new\" set of options in /etc/login.defs file to define the number of iterations\nperformed during the hashing process.", "props": [ @@ -11970,7 +11918,7 @@ ] }, { - "uuid": "4d5259f6-8439-4a52-921a-08cdd93b8b35", + "uuid": "22db36ee-a78b-4bce-9d6e-fce71b1d0258", "control-id": "cis_rhel10_5-4.1.5", "description": "No notes for control-id 5.4.1.5.", "props": [ @@ -11992,7 +11940,7 @@ ] }, { - "uuid": "f1c21d6d-9b4b-45d7-a6b0-0c1268a24ddd", + "uuid": "566735f7-d041-4eac-8fea-9b8023881351", "control-id": "cis_rhel10_5-4.1.6", "description": "No notes for control-id 5.4.1.6.", "props": [ @@ -12009,7 +11957,7 @@ ] }, { - "uuid": "c11524ea-8c32-47ae-b53a-34fdbb676b5a", + "uuid": "d2235499-f8eb-4c61-9b73-7dfc36da0731", "control-id": "cis_rhel10_5-4.2.1", "description": "No notes for control-id 5.4.2.1.", "props": [ @@ -12026,7 +11974,7 @@ ] }, { - "uuid": "e2607765-d3d6-4c2b-a8be-3a4477537003", + "uuid": "35b7af36-daa3-4022-9ab1-8c85fb2c1a9c", "control-id": "cis_rhel10_5-4.2.2", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -12043,7 +11991,7 @@ ] }, { - "uuid": "09c7ca00-c491-4579-8fb8-d98fd2f25806", + "uuid": "e0b19090-bbe3-4e05-a804-e67eb89a2b18", "control-id": "cis_rhel10_5-4.2.3", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -12060,7 +12008,7 @@ ] }, { - "uuid": "e239a355-d401-4d97-a4b9-a57b7a59ab19", + "uuid": "5092c32d-5f27-4d54-9f98-30c76507461d", "control-id": "cis_rhel10_5-4.2.4", "description": "No notes for control-id 5.4.2.4.", "props": [ @@ -12077,7 +12025,7 @@ ] }, { - "uuid": "ea01b703-4825-42d6-bc4c-fc080881fe2a", + "uuid": "aa6bb1c2-0ada-47f6-a55a-b79188f3afdf", "control-id": "cis_rhel10_5-4.2.5", "description": "No notes for control-id 5.4.2.5.", "props": [ @@ -12099,7 +12047,7 @@ ] }, { - "uuid": "96e76059-cca2-45aa-bbd7-4f2cd7dd14a7", + "uuid": "f70822f9-87c8-41ef-80e2-7ecfdaad6dba", "control-id": "cis_rhel10_5-4.2.6", "description": "No notes for control-id 5.4.2.6.", "props": [ @@ -12116,7 +12064,7 @@ ] }, { - "uuid": "1b8008c1-5336-42ef-9b65-6777811bcc29", + "uuid": "71477e5c-21eb-44ff-a84d-e0a0b242bfa7", "control-id": "cis_rhel10_5-4.2.7", "description": "No notes for control-id 5.4.2.7.", "props": [ @@ -12138,7 +12086,7 @@ ] }, { - "uuid": "030a62da-dadc-4820-9c2f-d26e27a009ca", + "uuid": "b72fa05b-ddf8-4305-8873-a9f182f7d3c7", "control-id": "cis_rhel10_5-4.2.8", "description": "No notes for control-id 5.4.2.8.", "props": [ @@ -12155,7 +12103,7 @@ ] }, { - "uuid": "04cd0938-2220-40da-8bb9-e6f56482ff45", + "uuid": "3f001eb9-a05f-44f0-8ac3-201f3344e24a", "control-id": "cis_rhel10_5-4.3.2", "description": "No notes for control-id 5.4.3.2.", "props": [ @@ -12172,7 +12120,7 @@ ] }, { - "uuid": "b0e4e996-73b5-4903-890a-45ef990bc82e", + "uuid": "fdfbb3b0-6c34-4d2f-b4d9-df1b3601c9ed", "control-id": "cis_rhel10_5-4.3.3", "description": "No notes for control-id 5.4.3.3.", "props": [ @@ -12199,7 +12147,7 @@ ] }, { - "uuid": "60028d14-141f-4d84-880d-2e4916e7ed19", + "uuid": "04c26451-d9db-426c-8c33-956209392b55", "control-id": "cis_rhel10_6-1.1", "description": "No notes for control-id 6.1.1.", "props": [ @@ -12221,7 +12169,7 @@ ] }, { - "uuid": "96775ee9-f550-4b2a-8b39-64b782fa011d", + "uuid": "63a5abfd-b8fd-48f0-9ada-621214942f46", "control-id": "cis_rhel10_6-1.2", "description": "No notes for control-id 6.1.2.", "props": [ @@ -12238,7 +12186,7 @@ ] }, { - "uuid": "b8131b78-edc8-4abf-80a8-d8c8e50a0b21", + "uuid": "96bbbdfe-9b60-4f02-90e1-423c89c9bad5", "control-id": "cis_rhel10_6-1.3", "description": "No notes for control-id 6.1.3.", "props": [ @@ -12255,7 +12203,7 @@ ] }, { - "uuid": "0aff2ebc-99e7-4ea2-b5f6-71bba66d482c", + "uuid": "adf3678e-6729-43cb-be75-b1b67186795c", "control-id": "cis_rhel10_6-2.1.1", "description": "No notes for control-id 6.2.1.1.", "props": [ @@ -12272,7 +12220,7 @@ ] }, { - "uuid": "41fe832c-4223-4768-98e9-a66a253256e7", + "uuid": "bd42116d-7fcf-4405-abb1-ad9d63338474", "control-id": "cis_rhel10_6-2.1.2", "description": "The description for control-id cis_rhel10_6-2.1.2.", "props": [ @@ -12285,7 +12233,7 @@ ] }, { - "uuid": "9bb91d17-f131-433a-bb7e-154bb24df7cc", + "uuid": "448561e5-5405-480e-b19e-b32e88788733", "control-id": "cis_rhel10_6-2.1.3", "description": "The description for control-id cis_rhel10_6-2.1.3.", "props": [ @@ -12298,7 +12246,7 @@ ] }, { - "uuid": "d5ff2bb2-ef1b-46ce-ba96-7ca56aadface", + "uuid": "a27937ef-2f04-4190-b918-45aa16328666", "control-id": "cis_rhel10_6-2.1.4", "description": "No notes for control-id 6.2.1.4.", "props": [ @@ -12315,7 +12263,7 @@ ] }, { - "uuid": "4165ad9c-a9d1-4ae9-ab6c-2b0f6163e03d", + "uuid": "b82c10bd-6e3f-4df4-9ca9-b59fe012f179", "control-id": "cis_rhel10_6-2.2.1.1", "description": "No notes for control-id 6.2.2.1.1.", "props": [ @@ -12332,7 +12280,7 @@ ] }, { - "uuid": "d919324b-ae55-4950-80ce-90c3d89c5690", + "uuid": "0349dc43-dcdf-479d-a622-4d7b22a5bd37", "control-id": "cis_rhel10_6-2.2.1.2", "description": "The description for control-id cis_rhel10_6-2.2.1.2.", "props": [ @@ -12345,7 +12293,7 @@ ] }, { - "uuid": "d731b5bd-cff6-4b14-b6b8-a9b1ba3ae330", + "uuid": "699af1ed-f4bf-483d-8e94-93a5ae8f6bac", "control-id": "cis_rhel10_6-2.2.1.3", "description": "No notes for control-id 6.2.2.1.3.", "props": [ @@ -12362,7 +12310,7 @@ ] }, { - "uuid": "7bb4918b-bb25-493f-a074-1720d5c75bcf", + "uuid": "1972e831-0542-465a-8be3-35c6bb9153a5", "control-id": "cis_rhel10_6-2.2.1.4", "description": "No notes for control-id 6.2.2.1.4.", "props": [ @@ -12379,7 +12327,7 @@ ] }, { - "uuid": "9b15aa17-b43b-4183-b490-1a31a23dcea4", + "uuid": "c2bb166d-c690-4ca0-a789-b907adc83e0b", "control-id": "cis_rhel10_6-2.2.2", "description": "No notes for control-id 6.2.2.2.", "props": [ @@ -12396,7 +12344,7 @@ ] }, { - "uuid": "bcc0fa7a-f245-4bfa-9192-d2b285e1a721", + "uuid": "4ae399f1-7046-4efb-9c72-5b358bf45250", "control-id": "cis_rhel10_6-2.2.3", "description": "No notes for control-id 6.2.2.3.", "props": [ @@ -12413,7 +12361,7 @@ ] }, { - "uuid": "3b0d692c-0e25-42a7-8b33-4f44815c8b8d", + "uuid": "f8c293e9-d866-46b8-8cfa-ced8a31d9606", "control-id": "cis_rhel10_6-2.2.4", "description": "No notes for control-id 6.2.2.4.", "props": [ @@ -12430,7 +12378,7 @@ ] }, { - "uuid": "7e1c0fcd-e305-4137-aa94-062b58c586ca", + "uuid": "b0a42e80-7a96-4337-9f37-66ea686dae94", "control-id": "cis_rhel10_6-2.3.1", "description": "No notes for control-id 6.2.3.1.", "props": [ @@ -12442,7 +12390,7 @@ ] }, { - "uuid": "de7e933f-09b7-449b-b4a0-f7b35b1ff319", + "uuid": "33ab8bb1-465c-431a-9d4f-4fb2896ea587", "control-id": "cis_rhel10_6-2.3.2", "description": "No notes for control-id 6.2.3.2.", "props": [ @@ -12454,7 +12402,7 @@ ] }, { - "uuid": "b7dd3855-a295-4256-96bd-5bdff753d6a8", + "uuid": "1407ba93-98c2-4a29-9701-cc29f75633bb", "control-id": "cis_rhel10_6-2.3.3", "description": "No notes for control-id 6.2.3.3.", "props": [ @@ -12466,7 +12414,7 @@ ] }, { - "uuid": "db9e4eda-62d0-48f9-b5c7-deff117d9fc3", + "uuid": "57d1efb7-2fa8-4b30-ae31-b2809271eef2", "control-id": "cis_rhel10_6-2.3.4", "description": "No notes for control-id 6.2.3.4.", "props": [ @@ -12478,7 +12426,7 @@ ] }, { - "uuid": "a947d8a7-4b60-43be-81df-1329e6a04de9", + "uuid": "049a351b-2ad2-4d09-be47-f02543d708d7", "control-id": "cis_rhel10_6-2.3.5", "description": "The description for control-id cis_rhel10_6-2.3.5.", "props": [ @@ -12491,7 +12439,7 @@ ] }, { - "uuid": "84aadb28-bd66-4687-9449-98ed0fd8efc8", + "uuid": "335a42f5-835d-44da-8214-eff484b56628", "control-id": "cis_rhel10_6-2.3.6", "description": "The description for control-id cis_rhel10_6-2.3.6.", "props": [ @@ -12504,7 +12452,7 @@ ] }, { - "uuid": "cf6045d1-e8a0-41f0-8900-c1423d866ea5", + "uuid": "774f4252-1a42-48a5-ae9f-0dd76c892240", "control-id": "cis_rhel10_6-2.3.7", "description": "No notes for control-id 6.2.3.7.", "props": [ @@ -12516,7 +12464,7 @@ ] }, { - "uuid": "e7beb7b4-45e9-4f28-823b-5fd22e32fead", + "uuid": "290b781d-cea7-4eff-9c17-a456db5196ea", "control-id": "cis_rhel10_6-2.3.8", "description": "The description for control-id cis_rhel10_6-2.3.8.", "props": [ @@ -12529,7 +12477,7 @@ ] }, { - "uuid": "718d5242-4bdc-4a73-88c5-bdbb9d2d4a71", + "uuid": "fff99cec-0419-4431-abfd-d42b2cf12f5f", "control-id": "cis_rhel10_6-2.4.1", "description": "It is not harmful to run these rules even if rsyslog is not installed or active.", "props": [ @@ -12556,7 +12504,7 @@ ] }, { - "uuid": "90de383a-5781-4e21-81b9-e085dca6b9d6", + "uuid": "a74be25b-5745-4c4d-9b0b-36906229c5b3", "control-id": "cis_rhel10_7-1.1", "description": "No notes for control-id 7.1.1.", "props": [ @@ -12583,7 +12531,7 @@ ] }, { - "uuid": "9fa6bdef-20f8-4f50-bdc0-656cdb216ead", + "uuid": "3067a058-6107-4153-b6a8-0385b1de5e22", "control-id": "cis_rhel10_7-1.2", "description": "No notes for control-id 7.1.2.", "props": [ @@ -12610,7 +12558,7 @@ ] }, { - "uuid": "01f3ef43-ad73-4075-bf43-dd06c990cf9f", + "uuid": "fbf17046-cc66-4724-badf-e66efcd8ad37", "control-id": "cis_rhel10_7-1.3", "description": "No notes for control-id 7.1.3.", "props": [ @@ -12637,7 +12585,7 @@ ] }, { - "uuid": "f39023f5-f7fd-429c-9e21-383a12e4f086", + "uuid": "b3e3515e-4b23-4370-8f08-6c5074fd8454", "control-id": "cis_rhel10_7-1.4", "description": "No notes for control-id 7.1.4.", "props": [ @@ -12664,7 +12612,7 @@ ] }, { - "uuid": "be839d18-b458-428c-be3e-686c2e5c1a94", + "uuid": "71f60ddd-6875-4e01-959f-31412dd277ff", "control-id": "cis_rhel10_7-1.5", "description": "No notes for control-id 7.1.5.", "props": [ @@ -12691,7 +12639,7 @@ ] }, { - "uuid": "16221182-1a1b-45c1-8019-a6feae08ef4b", + "uuid": "fb11915f-c4a1-45af-9765-d32f558833ce", "control-id": "cis_rhel10_7-1.6", "description": "No notes for control-id 7.1.6.", "props": [ @@ -12718,7 +12666,7 @@ ] }, { - "uuid": "6d81a5cf-0f3c-4729-b80c-928b2b655196", + "uuid": "ae2d1dac-7315-4a07-87c6-01166e2b12eb", "control-id": "cis_rhel10_7-1.7", "description": "No notes for control-id 7.1.7.", "props": [ @@ -12745,7 +12693,7 @@ ] }, { - "uuid": "bb96e4ae-6d22-4681-ba9d-deea4e770aa5", + "uuid": "be291c14-0746-4cbc-8ec2-5a3a20956e40", "control-id": "cis_rhel10_7-1.8", "description": "No notes for control-id 7.1.8.", "props": [ @@ -12772,7 +12720,7 @@ ] }, { - "uuid": "99f30337-d91b-4ee9-ad6a-38241590c6e1", + "uuid": "a21c17f6-9758-4bcd-a048-51cbe4840ef1", "control-id": "cis_rhel10_7-1.9", "description": "No notes for control-id 7.1.9.", "props": [ @@ -12799,7 +12747,7 @@ ] }, { - "uuid": "ddfacb17-d7dd-4daa-9448-c528e0316518", + "uuid": "167a43cd-3c3e-4bf3-b650-3e49e288a5ce", "control-id": "cis_rhel10_7-1.10", "description": "No notes for control-id 7.1.10.", "props": [ @@ -12841,7 +12789,7 @@ ] }, { - "uuid": "37494c06-fabb-4c9b-bcd7-53f0be76a0e7", + "uuid": "4d8891cc-cd67-45f1-ad72-07542335a137", "control-id": "cis_rhel10_7-1.11", "description": "No notes for control-id 7.1.11.", "props": [ @@ -12863,7 +12811,7 @@ ] }, { - "uuid": "ad8e9e23-3969-4e1f-8fee-e5ec5a9494dd", + "uuid": "2a27a9a2-a011-44b7-b5ee-a1a8a93f5af6", "control-id": "cis_rhel10_7-1.12", "description": "No notes for control-id 7.1.12.", "props": [ @@ -12885,7 +12833,7 @@ ] }, { - "uuid": "a58864d8-0dab-4535-bea0-9b9af1b26013", + "uuid": "089c7218-a25a-43ec-8dc9-384d2a0a0d2b", "control-id": "cis_rhel10_7-1.13", "description": "The description for control-id cis_rhel10_7-1.13.", "props": [ @@ -12898,7 +12846,7 @@ ] }, { - "uuid": "603ff561-318f-4095-aab3-988381ba5137", + "uuid": "8cfd0e33-4661-49eb-b54e-a5d0632794f4", "control-id": "cis_rhel10_7-2.1", "description": "No notes for control-id 7.2.1.", "props": [ @@ -12915,7 +12863,7 @@ ] }, { - "uuid": "d7c84c38-4c9c-49e7-a59b-1bd33162bd8a", + "uuid": "54906feb-6fd3-4bfc-9732-92e675a1a788", "control-id": "cis_rhel10_7-2.2", "description": "No notes for control-id 7.2.2.", "props": [ @@ -12932,7 +12880,7 @@ ] }, { - "uuid": "822446d9-5217-4121-9f9d-dab256b84227", + "uuid": "78b02b66-658d-40e8-99b5-6488576cc700", "control-id": "cis_rhel10_7-2.3", "description": "No notes for control-id 7.2.3.", "props": [ @@ -12949,7 +12897,7 @@ ] }, { - "uuid": "7550f725-a678-4f59-986e-4cd8d74241bd", + "uuid": "faf799a7-874d-46cb-a65f-5a3517dd2d13", "control-id": "cis_rhel10_7-2.4", "description": "No notes for control-id 7.2.4.", "props": [ @@ -12966,7 +12914,7 @@ ] }, { - "uuid": "209a6303-b02b-42e7-9399-a3099244b398", + "uuid": "0604d903-5ded-41f9-a32f-418ecb27c701", "control-id": "cis_rhel10_7-2.5", "description": "No notes for control-id 7.2.5.", "props": [ @@ -12983,7 +12931,7 @@ ] }, { - "uuid": "f15178d0-8e67-4dd9-bb5c-c0f0d9c48da2", + "uuid": "0e8c5ad7-4023-4dbf-9c40-8f77be8618e3", "control-id": "cis_rhel10_7-2.6", "description": "No notes for control-id 7.2.6.", "props": [ @@ -13000,7 +12948,7 @@ ] }, { - "uuid": "8879c3a8-a3a2-4c5b-abcc-e1129d7b20e9", + "uuid": "8ca20a41-38db-4590-91ab-085d30fd5f44", "control-id": "cis_rhel10_7-2.7", "description": "No notes for control-id 7.2.7.", "props": [ @@ -13017,7 +12965,7 @@ ] }, { - "uuid": "7b4c6dbb-24fd-45be-acab-78802c15af1f", + "uuid": "62ae1c61-a6df-4913-9add-adf127928778", "control-id": "cis_rhel10_7-2.8", "description": "No notes for control-id 7.2.8.", "props": [ @@ -13044,7 +12992,7 @@ ] }, { - "uuid": "5faaa507-baef-42ed-982d-e43baba04755", + "uuid": "1af28be2-a5e2-4075-b2a2-7702c2841b21", "control-id": "cis_rhel10_7-2.9", "description": "No notes for control-id 7.2.9.", "props": [ @@ -15202,9655 +15150,9583 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_grub2_cfg", + "value": "file_permissions_boot_grub2", "remarks": "rule_set_037" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/grub.cfg Group Ownership", + "value": "All GRUB configuration files must have mode 0600 or more restrictive", "remarks": "rule_set_037" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_grub2_cfg", + "value": "file_permissions_boot_grub2", "remarks": "rule_set_037" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/grub.cfg Group Ownership", + "value": "All GRUB configuration files must have mode 0600 or more restrictive", "remarks": "rule_set_037" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_grub2_cfg", + "value": "file_owner_boot_grub2", "remarks": "rule_set_038" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/grub.cfg User Ownership", + "value": "All GRUB configuration files must be owned by root", "remarks": "rule_set_038" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_grub2_cfg", + "value": "file_owner_boot_grub2", "remarks": "rule_set_038" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/grub.cfg User Ownership", + "value": "All GRUB configuration files must be owned by root", "remarks": "rule_set_038" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_grub2_cfg", + "value": "file_groupowner_boot_grub2", "remarks": "rule_set_039" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/grub.cfg Permissions", + "value": "All GRUB configuration files must be group-owned by root", "remarks": "rule_set_039" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_grub2_cfg", + "value": "file_groupowner_boot_grub2", "remarks": "rule_set_039" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/grub.cfg Permissions", + "value": "All GRUB configuration files must be group-owned by root", "remarks": "rule_set_039" }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_user_cfg", - "remarks": "rule_set_040" - }, - { - "name": "Rule_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/user.cfg Group Ownership", - "remarks": "rule_set_040" - }, - { - "name": "Check_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_user_cfg", - "remarks": "rule_set_040" - }, - { - "name": "Check_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/user.cfg Group Ownership", - "remarks": "rule_set_040" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_user_cfg", - "remarks": "rule_set_041" - }, - { - "name": "Rule_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/user.cfg User Ownership", - "remarks": "rule_set_041" - }, - { - "name": "Check_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_user_cfg", - "remarks": "rule_set_041" - }, - { - "name": "Check_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/user.cfg User Ownership", - "remarks": "rule_set_041" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_user_cfg", - "remarks": "rule_set_042" - }, - { - "name": "Rule_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/user.cfg Permissions", - "remarks": "rule_set_042" - }, - { - "name": "Check_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_user_cfg", - "remarks": "rule_set_042" - }, - { - "name": "Check_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/user.cfg Permissions", - "remarks": "rule_set_042" - }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_users_coredumps", - "remarks": "rule_set_043" + "remarks": "rule_set_040" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Core Dumps for All Users", - "remarks": "rule_set_043" + "remarks": "rule_set_040" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_users_coredumps", - "remarks": "rule_set_043" + "remarks": "rule_set_040" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Core Dumps for All Users", - "remarks": "rule_set_043" + "remarks": "rule_set_040" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_hardlinks", - "remarks": "rule_set_044" + "remarks": "rule_set_041" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Hardlinks", - "remarks": "rule_set_044" + "remarks": "rule_set_041" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_hardlinks", - "remarks": "rule_set_044" + "remarks": "rule_set_041" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Hardlinks", - "remarks": "rule_set_044" + "remarks": "rule_set_041" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_suid_dumpable", - "remarks": "rule_set_045" + "remarks": "rule_set_042" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Core Dumps for SUID programs", - "remarks": "rule_set_045" + "remarks": "rule_set_042" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_suid_dumpable", - "remarks": "rule_set_045" + "remarks": "rule_set_042" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Core Dumps for SUID programs", - "remarks": "rule_set_045" + "remarks": "rule_set_042" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_dmesg_restrict", - "remarks": "rule_set_046" + "remarks": "rule_set_043" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Access to Kernel Message Buffer", - "remarks": "rule_set_046" + "remarks": "rule_set_043" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_dmesg_restrict", - "remarks": "rule_set_046" + "remarks": "rule_set_043" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Access to Kernel Message Buffer", - "remarks": "rule_set_046" + "remarks": "rule_set_043" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_kptr_restrict", - "remarks": "rule_set_047" + "remarks": "rule_set_044" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Exposed Kernel Pointer Addresses Access", - "remarks": "rule_set_047" + "remarks": "rule_set_044" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_kptr_restrict", - "remarks": "rule_set_047" + "remarks": "rule_set_044" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Exposed Kernel Pointer Addresses Access", - "remarks": "rule_set_047" + "remarks": "rule_set_044" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_yama_ptrace_scope", - "remarks": "rule_set_048" + "remarks": "rule_set_045" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict usage of ptrace to descendant processes", - "remarks": "rule_set_048" + "remarks": "rule_set_045" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_yama_ptrace_scope", - "remarks": "rule_set_048" + "remarks": "rule_set_045" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict usage of ptrace to descendant processes", - "remarks": "rule_set_048" + "remarks": "rule_set_045" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_randomize_va_space", - "remarks": "rule_set_049" + "remarks": "rule_set_046" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Randomized Layout of Virtual Address Space", - "remarks": "rule_set_049" + "remarks": "rule_set_046" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_randomize_va_space", - "remarks": "rule_set_049" + "remarks": "rule_set_046" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Randomized Layout of Virtual Address Space", - "remarks": "rule_set_049" + "remarks": "rule_set_046" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "coredump_disable_backtraces", - "remarks": "rule_set_050" + "remarks": "rule_set_047" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable core dump backtraces", - "remarks": "rule_set_050" + "remarks": "rule_set_047" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "coredump_disable_backtraces", - "remarks": "rule_set_050" + "remarks": "rule_set_047" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable core dump backtraces", - "remarks": "rule_set_050" + "remarks": "rule_set_047" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "coredump_disable_storage", - "remarks": "rule_set_051" + "remarks": "rule_set_048" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable storing core dump", - "remarks": "rule_set_051" + "remarks": "rule_set_048" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "coredump_disable_storage", - "remarks": "rule_set_051" + "remarks": "rule_set_048" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable storing core dump", - "remarks": "rule_set_051" + "remarks": "rule_set_048" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_custom_crypto_policy_cis", - "remarks": "rule_set_052" + "remarks": "rule_set_049" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Implement Custom Crypto Policy Modules for CIS Benchmark", - "remarks": "rule_set_052" + "remarks": "rule_set_049" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_custom_crypto_policy_cis", - "remarks": "rule_set_052" + "remarks": "rule_set_049" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Implement Custom Crypto Policy Modules for CIS Benchmark", - "remarks": "rule_set_052" + "remarks": "rule_set_049" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "banner_etc_motd_cis", - "remarks": "rule_set_053" + "remarks": "rule_set_050" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Message Of The Day Is Configured Properly", - "remarks": "rule_set_053" + "remarks": "rule_set_050" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "banner_etc_motd_cis", - "remarks": "rule_set_053" + "remarks": "rule_set_050" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Message Of The Day Is Configured Properly", - "remarks": "rule_set_053" + "remarks": "rule_set_050" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "banner_etc_issue_cis", - "remarks": "rule_set_054" + "remarks": "rule_set_051" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Local Login Warning Banner Is Configured Properly", - "remarks": "rule_set_054" + "remarks": "rule_set_051" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "banner_etc_issue_cis", - "remarks": "rule_set_054" + "remarks": "rule_set_051" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Local Login Warning Banner Is Configured Properly", - "remarks": "rule_set_054" + "remarks": "rule_set_051" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "banner_etc_issue_net_cis", - "remarks": "rule_set_055" + "remarks": "rule_set_052" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Remote Login Warning Banner Is Configured Properly", - "remarks": "rule_set_055" + "remarks": "rule_set_052" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "banner_etc_issue_net_cis", - "remarks": "rule_set_055" + "remarks": "rule_set_052" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Remote Login Warning Banner Is Configured Properly", - "remarks": "rule_set_055" + "remarks": "rule_set_052" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_motd", - "remarks": "rule_set_056" + "remarks": "rule_set_053" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership of Message of the Day Banner", - "remarks": "rule_set_056" + "remarks": "rule_set_053" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_motd", - "remarks": "rule_set_056" + "remarks": "rule_set_053" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership of Message of the Day Banner", - "remarks": "rule_set_056" + "remarks": "rule_set_053" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_motd", - "remarks": "rule_set_057" + "remarks": "rule_set_054" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify ownership of Message of the Day Banner", - "remarks": "rule_set_057" + "remarks": "rule_set_054" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_motd", - "remarks": "rule_set_057" + "remarks": "rule_set_054" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify ownership of Message of the Day Banner", - "remarks": "rule_set_057" + "remarks": "rule_set_054" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_motd", - "remarks": "rule_set_058" + "remarks": "rule_set_055" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify permissions on Message of the Day Banner", - "remarks": "rule_set_058" + "remarks": "rule_set_055" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_motd", - "remarks": "rule_set_058" + "remarks": "rule_set_055" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify permissions on Message of the Day Banner", - "remarks": "rule_set_058" + "remarks": "rule_set_055" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_issue", - "remarks": "rule_set_059" + "remarks": "rule_set_056" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership of System Login Banner", - "remarks": "rule_set_059" + "remarks": "rule_set_056" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_issue", - "remarks": "rule_set_059" + "remarks": "rule_set_056" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership of System Login Banner", - "remarks": "rule_set_059" + "remarks": "rule_set_056" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_issue", - "remarks": "rule_set_060" + "remarks": "rule_set_057" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify ownership of System Login Banner", - "remarks": "rule_set_060" + "remarks": "rule_set_057" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_issue", - "remarks": "rule_set_060" + "remarks": "rule_set_057" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify ownership of System Login Banner", - "remarks": "rule_set_060" + "remarks": "rule_set_057" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_issue", - "remarks": "rule_set_061" + "remarks": "rule_set_058" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify permissions on System Login Banner", - "remarks": "rule_set_061" + "remarks": "rule_set_058" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_issue", - "remarks": "rule_set_061" + "remarks": "rule_set_058" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify permissions on System Login Banner", - "remarks": "rule_set_061" + "remarks": "rule_set_058" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_issue_net", - "remarks": "rule_set_062" + "remarks": "rule_set_059" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership of System Login Banner for Remote Connections", - "remarks": "rule_set_062" + "remarks": "rule_set_059" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_issue_net", - "remarks": "rule_set_062" + "remarks": "rule_set_059" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership of System Login Banner for Remote Connections", - "remarks": "rule_set_062" + "remarks": "rule_set_059" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_issue_net", - "remarks": "rule_set_063" + "remarks": "rule_set_060" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify ownership of System Login Banner for Remote Connections", - "remarks": "rule_set_063" + "remarks": "rule_set_060" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_issue_net", - "remarks": "rule_set_063" + "remarks": "rule_set_060" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify ownership of System Login Banner for Remote Connections", - "remarks": "rule_set_063" + "remarks": "rule_set_060" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_issue_net", - "remarks": "rule_set_064" + "remarks": "rule_set_061" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify permissions on System Login Banner for Remote Connections", - "remarks": "rule_set_064" + "remarks": "rule_set_061" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_issue_net", - "remarks": "rule_set_064" + "remarks": "rule_set_061" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify permissions on System Login Banner for Remote Connections", - "remarks": "rule_set_064" + "remarks": "rule_set_061" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_banner_enabled", - "remarks": "rule_set_065" + "remarks": "rule_set_062" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable GNOME3 Login Warning Banner", - "remarks": "rule_set_065" + "remarks": "rule_set_062" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_banner_enabled", - "remarks": "rule_set_065" + "remarks": "rule_set_062" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable GNOME3 Login Warning Banner", - "remarks": "rule_set_065" + "remarks": "rule_set_062" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_login_banner_text", - "remarks": "rule_set_066" + "remarks": "rule_set_063" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set the GNOME3 Login Warning Banner Text", - "remarks": "rule_set_066" + "remarks": "rule_set_063" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_login_banner_text", - "remarks": "rule_set_066" + "remarks": "rule_set_063" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set the GNOME3 Login Warning Banner Text", - "remarks": "rule_set_066" + "remarks": "rule_set_063" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_user_list", - "remarks": "rule_set_067" + "remarks": "rule_set_064" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the GNOME3 Login User List", - "remarks": "rule_set_067" + "remarks": "rule_set_064" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_user_list", - "remarks": "rule_set_067" + "remarks": "rule_set_064" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the GNOME3 Login User List", - "remarks": "rule_set_067" + "remarks": "rule_set_064" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_idle_delay", - "remarks": "rule_set_068" + "remarks": "rule_set_065" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set GNOME3 Screensaver Inactivity Timeout", - "remarks": "rule_set_068" + "remarks": "rule_set_065" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_idle_delay", - "remarks": "rule_set_068" + "remarks": "rule_set_065" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set GNOME3 Screensaver Inactivity Timeout", - "remarks": "rule_set_068" + "remarks": "rule_set_065" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_lock_delay", - "remarks": "rule_set_069" + "remarks": "rule_set_066" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set GNOME3 Screensaver Lock Delay After Activation Period", - "remarks": "rule_set_069" + "remarks": "rule_set_066" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_lock_delay", - "remarks": "rule_set_069" + "remarks": "rule_set_066" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set GNOME3 Screensaver Lock Delay After Activation Period", - "remarks": "rule_set_069" + "remarks": "rule_set_066" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_session_idle_user_locks", - "remarks": "rule_set_070" + "remarks": "rule_set_067" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Cannot Change GNOME3 Session Idle Settings", - "remarks": "rule_set_070" + "remarks": "rule_set_067" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_session_idle_user_locks", - "remarks": "rule_set_070" + "remarks": "rule_set_067" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Cannot Change GNOME3 Session Idle Settings", - "remarks": "rule_set_070" + "remarks": "rule_set_067" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_user_locks", - "remarks": "rule_set_071" + "remarks": "rule_set_068" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Cannot Change GNOME3 Screensaver Settings", - "remarks": "rule_set_071" + "remarks": "rule_set_068" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_user_locks", - "remarks": "rule_set_071" + "remarks": "rule_set_068" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Cannot Change GNOME3 Screensaver Settings", - "remarks": "rule_set_071" + "remarks": "rule_set_068" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_automount", - "remarks": "rule_set_072" + "remarks": "rule_set_069" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automounting", - "remarks": "rule_set_072" + "remarks": "rule_set_069" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_automount", - "remarks": "rule_set_072" + "remarks": "rule_set_069" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automounting", - "remarks": "rule_set_072" + "remarks": "rule_set_069" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_automount_open", - "remarks": "rule_set_073" + "remarks": "rule_set_070" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automount Opening", - "remarks": "rule_set_073" + "remarks": "rule_set_070" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_automount_open", - "remarks": "rule_set_073" + "remarks": "rule_set_070" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automount Opening", - "remarks": "rule_set_073" + "remarks": "rule_set_070" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_autorun", - "remarks": "rule_set_074" + "remarks": "rule_set_071" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automount running", - "remarks": "rule_set_074" + "remarks": "rule_set_071" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_autorun", - "remarks": "rule_set_074" + "remarks": "rule_set_071" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automount running", - "remarks": "rule_set_074" + "remarks": "rule_set_071" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_autofs_disabled", - "remarks": "rule_set_075" + "remarks": "rule_set_072" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the Automounter", - "remarks": "rule_set_075" + "remarks": "rule_set_072" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_autofs_disabled", - "remarks": "rule_set_075" + "remarks": "rule_set_072" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the Automounter", - "remarks": "rule_set_075" + "remarks": "rule_set_072" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_avahi-daemon_disabled", - "remarks": "rule_set_076" + "remarks": "rule_set_073" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Avahi Server Software", - "remarks": "rule_set_076" + "remarks": "rule_set_073" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_avahi-daemon_disabled", - "remarks": "rule_set_076" + "remarks": "rule_set_073" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Avahi Server Software", - "remarks": "rule_set_076" + "remarks": "rule_set_073" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_kea_removed", - "remarks": "rule_set_077" + "remarks": "rule_set_074" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall kea Package", - "remarks": "rule_set_077" + "remarks": "rule_set_074" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_kea_removed", - "remarks": "rule_set_077" + "remarks": "rule_set_074" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall kea Package", - "remarks": "rule_set_077" + "remarks": "rule_set_074" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_bind_removed", - "remarks": "rule_set_078" + "remarks": "rule_set_075" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall bind Package", - "remarks": "rule_set_078" + "remarks": "rule_set_075" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_bind_removed", - "remarks": "rule_set_078" + "remarks": "rule_set_075" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall bind Package", - "remarks": "rule_set_078" + "remarks": "rule_set_075" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_dnsmasq_removed", - "remarks": "rule_set_079" + "remarks": "rule_set_076" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall dnsmasq Package", - "remarks": "rule_set_079" + "remarks": "rule_set_076" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_dnsmasq_removed", - "remarks": "rule_set_079" + "remarks": "rule_set_076" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall dnsmasq Package", - "remarks": "rule_set_079" + "remarks": "rule_set_076" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_vsftpd_removed", - "remarks": "rule_set_080" + "remarks": "rule_set_077" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall vsftpd Package", - "remarks": "rule_set_080" + "remarks": "rule_set_077" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_vsftpd_removed", - "remarks": "rule_set_080" + "remarks": "rule_set_077" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall vsftpd Package", - "remarks": "rule_set_080" + "remarks": "rule_set_077" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_dovecot_removed", - "remarks": "rule_set_081" + "remarks": "rule_set_078" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall dovecot Package", - "remarks": "rule_set_081" + "remarks": "rule_set_078" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_dovecot_removed", - "remarks": "rule_set_081" + "remarks": "rule_set_078" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall dovecot Package", - "remarks": "rule_set_081" + "remarks": "rule_set_078" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_cyrus-imapd_removed", - "remarks": "rule_set_082" + "remarks": "rule_set_079" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall cyrus-imapd Package", - "remarks": "rule_set_082" + "remarks": "rule_set_079" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_cyrus-imapd_removed", - "remarks": "rule_set_082" + "remarks": "rule_set_079" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall cyrus-imapd Package", - "remarks": "rule_set_082" + "remarks": "rule_set_079" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_nfs_disabled", - "remarks": "rule_set_083" + "remarks": "rule_set_080" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Network File System (nfs)", - "remarks": "rule_set_083" + "remarks": "rule_set_080" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_nfs_disabled", - "remarks": "rule_set_083" + "remarks": "rule_set_080" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Network File System (nfs)", - "remarks": "rule_set_083" + "remarks": "rule_set_080" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_cups_disabled", - "remarks": "rule_set_084" + "remarks": "rule_set_081" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the CUPS Service", - "remarks": "rule_set_084" + "remarks": "rule_set_081" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_cups_disabled", - "remarks": "rule_set_084" + "remarks": "rule_set_081" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the CUPS Service", - "remarks": "rule_set_084" + "remarks": "rule_set_081" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_rpcbind_disabled", - "remarks": "rule_set_085" + "remarks": "rule_set_082" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable rpcbind Service", - "remarks": "rule_set_085" + "remarks": "rule_set_082" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_rpcbind_disabled", - "remarks": "rule_set_085" + "remarks": "rule_set_082" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable rpcbind Service", - "remarks": "rule_set_085" + "remarks": "rule_set_082" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_rsync_removed", - "remarks": "rule_set_086" + "remarks": "rule_set_083" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall rsync Package", - "remarks": "rule_set_086" + "remarks": "rule_set_083" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_rsync_removed", - "remarks": "rule_set_086" + "remarks": "rule_set_083" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall rsync Package", - "remarks": "rule_set_086" + "remarks": "rule_set_083" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_samba_removed", - "remarks": "rule_set_087" + "remarks": "rule_set_084" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall Samba Package", - "remarks": "rule_set_087" + "remarks": "rule_set_084" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_samba_removed", - "remarks": "rule_set_087" + "remarks": "rule_set_084" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall Samba Package", - "remarks": "rule_set_087" + "remarks": "rule_set_084" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_net-snmp_removed", - "remarks": "rule_set_088" + "remarks": "rule_set_085" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall net-snmp Package", - "remarks": "rule_set_088" + "remarks": "rule_set_085" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_net-snmp_removed", - "remarks": "rule_set_088" + "remarks": "rule_set_085" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall net-snmp Package", - "remarks": "rule_set_088" + "remarks": "rule_set_085" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_telnet-server_removed", - "remarks": "rule_set_089" + "remarks": "rule_set_086" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall telnet-server Package", - "remarks": "rule_set_089" + "remarks": "rule_set_086" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_telnet-server_removed", - "remarks": "rule_set_089" + "remarks": "rule_set_086" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall telnet-server Package", - "remarks": "rule_set_089" + "remarks": "rule_set_086" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_tftp-server_removed", - "remarks": "rule_set_090" + "remarks": "rule_set_087" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall tftp-server Package", - "remarks": "rule_set_090" + "remarks": "rule_set_087" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_tftp-server_removed", - "remarks": "rule_set_090" + "remarks": "rule_set_087" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall tftp-server Package", - "remarks": "rule_set_090" + "remarks": "rule_set_087" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_squid_removed", - "remarks": "rule_set_091" + "remarks": "rule_set_088" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall squid Package", - "remarks": "rule_set_091" + "remarks": "rule_set_088" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_squid_removed", - "remarks": "rule_set_091" + "remarks": "rule_set_088" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall squid Package", - "remarks": "rule_set_091" + "remarks": "rule_set_088" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_httpd_removed", - "remarks": "rule_set_092" + "remarks": "rule_set_089" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall httpd Package", - "remarks": "rule_set_092" + "remarks": "rule_set_089" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_httpd_removed", - "remarks": "rule_set_092" + "remarks": "rule_set_089" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall httpd Package", - "remarks": "rule_set_092" + "remarks": "rule_set_089" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_nginx_removed", - "remarks": "rule_set_093" + "remarks": "rule_set_090" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall nginx Package", - "remarks": "rule_set_093" + "remarks": "rule_set_090" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_nginx_removed", - "remarks": "rule_set_093" + "remarks": "rule_set_090" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall nginx Package", - "remarks": "rule_set_093" + "remarks": "rule_set_090" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "postfix_network_listening_disabled", - "remarks": "rule_set_094" + "remarks": "rule_set_091" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Postfix Network Listening", - "remarks": "rule_set_094" + "remarks": "rule_set_091" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "postfix_network_listening_disabled", - "remarks": "rule_set_094" + "remarks": "rule_set_091" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Postfix Network Listening", - "remarks": "rule_set_094" + "remarks": "rule_set_091" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "has_nonlocal_mta", - "remarks": "rule_set_095" + "remarks": "rule_set_092" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Mail Transfer Agent is not Listening on any non-loopback Address", - "remarks": "rule_set_095" + "remarks": "rule_set_092" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "has_nonlocal_mta", - "remarks": "rule_set_095" + "remarks": "rule_set_092" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Mail Transfer Agent is not Listening on any non-loopback Address", - "remarks": "rule_set_095" + "remarks": "rule_set_092" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_ftp_removed", - "remarks": "rule_set_096" + "remarks": "rule_set_093" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove ftp Package", - "remarks": "rule_set_096" + "remarks": "rule_set_093" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_ftp_removed", - "remarks": "rule_set_096" + "remarks": "rule_set_093" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove ftp Package", - "remarks": "rule_set_096" + "remarks": "rule_set_093" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_telnet_removed", - "remarks": "rule_set_097" + "remarks": "rule_set_094" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove telnet Clients", - "remarks": "rule_set_097" + "remarks": "rule_set_094" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_telnet_removed", - "remarks": "rule_set_097" + "remarks": "rule_set_094" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove telnet Clients", - "remarks": "rule_set_097" + "remarks": "rule_set_094" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_tftp_removed", - "remarks": "rule_set_098" + "remarks": "rule_set_095" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove tftp Daemon", - "remarks": "rule_set_098" + "remarks": "rule_set_095" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_tftp_removed", - "remarks": "rule_set_098" + "remarks": "rule_set_095" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove tftp Daemon", - "remarks": "rule_set_098" + "remarks": "rule_set_095" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_specify_remote_server", - "remarks": "rule_set_099" + "remarks": "rule_set_096" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "A remote time server for Chrony is configured", - "remarks": "rule_set_099" + "remarks": "rule_set_096" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_specify_remote_server", - "remarks": "rule_set_099" + "remarks": "rule_set_096" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "A remote time server for Chrony is configured", - "remarks": "rule_set_099" + "remarks": "rule_set_096" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_run_as_chrony_user", - "remarks": "rule_set_100" + "remarks": "rule_set_097" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that chronyd is running under chrony user account", - "remarks": "rule_set_100" + "remarks": "rule_set_097" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_run_as_chrony_user", - "remarks": "rule_set_100" + "remarks": "rule_set_097" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that chronyd is running under chrony user account", - "remarks": "rule_set_100" + "remarks": "rule_set_097" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_cron_installed", - "remarks": "rule_set_101" + "remarks": "rule_set_098" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install the cron service", - "remarks": "rule_set_101" + "remarks": "rule_set_098" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_cron_installed", - "remarks": "rule_set_101" + "remarks": "rule_set_098" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install the cron service", - "remarks": "rule_set_101" + "remarks": "rule_set_098" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_crond_enabled", - "remarks": "rule_set_102" + "remarks": "rule_set_099" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable cron Service", - "remarks": "rule_set_102" + "remarks": "rule_set_099" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_crond_enabled", - "remarks": "rule_set_102" + "remarks": "rule_set_099" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable cron Service", - "remarks": "rule_set_102" + "remarks": "rule_set_099" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_crontab", - "remarks": "rule_set_103" + "remarks": "rule_set_100" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Crontab", - "remarks": "rule_set_103" + "remarks": "rule_set_100" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_crontab", - "remarks": "rule_set_103" + "remarks": "rule_set_100" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Crontab", - "remarks": "rule_set_103" + "remarks": "rule_set_100" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_crontab", - "remarks": "rule_set_104" + "remarks": "rule_set_101" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on crontab", - "remarks": "rule_set_104" + "remarks": "rule_set_101" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_crontab", - "remarks": "rule_set_104" + "remarks": "rule_set_101" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on crontab", - "remarks": "rule_set_104" + "remarks": "rule_set_101" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_crontab", - "remarks": "rule_set_105" + "remarks": "rule_set_102" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on crontab", - "remarks": "rule_set_105" + "remarks": "rule_set_102" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_crontab", - "remarks": "rule_set_105" + "remarks": "rule_set_102" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on crontab", - "remarks": "rule_set_105" + "remarks": "rule_set_102" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_hourly", - "remarks": "rule_set_106" + "remarks": "rule_set_103" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.hourly", - "remarks": "rule_set_106" + "remarks": "rule_set_103" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_hourly", - "remarks": "rule_set_106" + "remarks": "rule_set_103" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.hourly", - "remarks": "rule_set_106" + "remarks": "rule_set_103" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_hourly", - "remarks": "rule_set_107" + "remarks": "rule_set_104" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.hourly", - "remarks": "rule_set_107" + "remarks": "rule_set_104" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_hourly", - "remarks": "rule_set_107" + "remarks": "rule_set_104" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.hourly", - "remarks": "rule_set_107" + "remarks": "rule_set_104" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_hourly", - "remarks": "rule_set_108" + "remarks": "rule_set_105" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.hourly", - "remarks": "rule_set_108" + "remarks": "rule_set_105" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_hourly", - "remarks": "rule_set_108" + "remarks": "rule_set_105" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.hourly", - "remarks": "rule_set_108" + "remarks": "rule_set_105" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_daily", - "remarks": "rule_set_109" + "remarks": "rule_set_106" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.daily", - "remarks": "rule_set_109" + "remarks": "rule_set_106" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_daily", - "remarks": "rule_set_109" + "remarks": "rule_set_106" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.daily", - "remarks": "rule_set_109" + "remarks": "rule_set_106" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_daily", - "remarks": "rule_set_110" + "remarks": "rule_set_107" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.daily", - "remarks": "rule_set_110" + "remarks": "rule_set_107" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_daily", - "remarks": "rule_set_110" + "remarks": "rule_set_107" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.daily", - "remarks": "rule_set_110" + "remarks": "rule_set_107" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_daily", - "remarks": "rule_set_111" + "remarks": "rule_set_108" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.daily", - "remarks": "rule_set_111" + "remarks": "rule_set_108" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_daily", - "remarks": "rule_set_111" + "remarks": "rule_set_108" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.daily", - "remarks": "rule_set_111" + "remarks": "rule_set_108" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_weekly", - "remarks": "rule_set_112" + "remarks": "rule_set_109" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.weekly", - "remarks": "rule_set_112" + "remarks": "rule_set_109" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_weekly", - "remarks": "rule_set_112" + "remarks": "rule_set_109" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.weekly", - "remarks": "rule_set_112" + "remarks": "rule_set_109" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_weekly", - "remarks": "rule_set_113" + "remarks": "rule_set_110" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.weekly", - "remarks": "rule_set_113" + "remarks": "rule_set_110" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_weekly", - "remarks": "rule_set_113" + "remarks": "rule_set_110" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.weekly", - "remarks": "rule_set_113" + "remarks": "rule_set_110" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_weekly", - "remarks": "rule_set_114" + "remarks": "rule_set_111" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.weekly", - "remarks": "rule_set_114" + "remarks": "rule_set_111" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_weekly", - "remarks": "rule_set_114" + "remarks": "rule_set_111" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.weekly", - "remarks": "rule_set_114" + "remarks": "rule_set_111" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_monthly", - "remarks": "rule_set_115" + "remarks": "rule_set_112" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.monthly", - "remarks": "rule_set_115" + "remarks": "rule_set_112" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_monthly", - "remarks": "rule_set_115" + "remarks": "rule_set_112" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.monthly", - "remarks": "rule_set_115" + "remarks": "rule_set_112" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_monthly", - "remarks": "rule_set_116" + "remarks": "rule_set_113" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.monthly", - "remarks": "rule_set_116" + "remarks": "rule_set_113" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_monthly", - "remarks": "rule_set_116" + "remarks": "rule_set_113" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.monthly", - "remarks": "rule_set_116" + "remarks": "rule_set_113" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_monthly", - "remarks": "rule_set_117" + "remarks": "rule_set_114" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.monthly", - "remarks": "rule_set_117" + "remarks": "rule_set_114" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_monthly", - "remarks": "rule_set_117" + "remarks": "rule_set_114" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.monthly", - "remarks": "rule_set_117" + "remarks": "rule_set_114" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_yearly", - "remarks": "rule_set_118" + "remarks": "rule_set_115" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.yearly", - "remarks": "rule_set_118" + "remarks": "rule_set_115" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_yearly", - "remarks": "rule_set_118" + "remarks": "rule_set_115" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.yearly", - "remarks": "rule_set_118" + "remarks": "rule_set_115" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_yearly", - "remarks": "rule_set_119" + "remarks": "rule_set_116" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.yearly", - "remarks": "rule_set_119" + "remarks": "rule_set_116" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_yearly", - "remarks": "rule_set_119" + "remarks": "rule_set_116" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.yearly", - "remarks": "rule_set_119" + "remarks": "rule_set_116" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_yearly", - "remarks": "rule_set_120" + "remarks": "rule_set_117" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.yearly", - "remarks": "rule_set_120" + "remarks": "rule_set_117" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_yearly", - "remarks": "rule_set_120" + "remarks": "rule_set_117" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.yearly", - "remarks": "rule_set_120" + "remarks": "rule_set_117" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_d", - "remarks": "rule_set_121" + "remarks": "rule_set_118" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.d", - "remarks": "rule_set_121" + "remarks": "rule_set_118" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_d", - "remarks": "rule_set_121" + "remarks": "rule_set_118" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.d", - "remarks": "rule_set_121" + "remarks": "rule_set_118" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_d", - "remarks": "rule_set_122" + "remarks": "rule_set_119" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.d", - "remarks": "rule_set_122" + "remarks": "rule_set_119" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_d", - "remarks": "rule_set_122" + "remarks": "rule_set_119" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.d", - "remarks": "rule_set_122" + "remarks": "rule_set_119" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_d", - "remarks": "rule_set_123" + "remarks": "rule_set_120" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.d", - "remarks": "rule_set_123" + "remarks": "rule_set_120" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_d", - "remarks": "rule_set_123" + "remarks": "rule_set_120" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.d", - "remarks": "rule_set_123" + "remarks": "rule_set_120" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_cron_deny_not_exist", - "remarks": "rule_set_124" + "remarks": "rule_set_121" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/cron.deny does not exist", - "remarks": "rule_set_124" + "remarks": "rule_set_121" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_cron_deny_not_exist", - "remarks": "rule_set_124" + "remarks": "rule_set_121" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/cron.deny does not exist", - "remarks": "rule_set_124" + "remarks": "rule_set_121" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_cron_allow_exists", - "remarks": "rule_set_125" + "remarks": "rule_set_122" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/cron.allow exists", - "remarks": "rule_set_125" + "remarks": "rule_set_122" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_cron_allow_exists", - "remarks": "rule_set_125" + "remarks": "rule_set_122" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/cron.allow exists", - "remarks": "rule_set_125" + "remarks": "rule_set_122" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_allow", - "remarks": "rule_set_126" + "remarks": "rule_set_123" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/cron.allow file", - "remarks": "rule_set_126" + "remarks": "rule_set_123" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_allow", - "remarks": "rule_set_126" + "remarks": "rule_set_123" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/cron.allow file", - "remarks": "rule_set_126" + "remarks": "rule_set_123" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_allow", - "remarks": "rule_set_127" + "remarks": "rule_set_124" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/cron.allow file", - "remarks": "rule_set_127" + "remarks": "rule_set_124" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_allow", - "remarks": "rule_set_127" + "remarks": "rule_set_124" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/cron.allow file", - "remarks": "rule_set_127" + "remarks": "rule_set_124" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_allow", - "remarks": "rule_set_128" + "remarks": "rule_set_125" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/cron.allow file", - "remarks": "rule_set_128" + "remarks": "rule_set_125" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_allow", - "remarks": "rule_set_128" + "remarks": "rule_set_125" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/cron.allow file", - "remarks": "rule_set_128" + "remarks": "rule_set_125" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_at_deny_not_exist", - "remarks": "rule_set_129" + "remarks": "rule_set_126" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/at.deny does not exist", - "remarks": "rule_set_129" + "remarks": "rule_set_126" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_at_deny_not_exist", - "remarks": "rule_set_129" + "remarks": "rule_set_126" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/at.deny does not exist", - "remarks": "rule_set_129" + "remarks": "rule_set_126" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_at_allow_exists", - "remarks": "rule_set_130" + "remarks": "rule_set_127" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/at.allow exists", - "remarks": "rule_set_130" + "remarks": "rule_set_127" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_at_allow_exists", - "remarks": "rule_set_130" + "remarks": "rule_set_127" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/at.allow exists", - "remarks": "rule_set_130" + "remarks": "rule_set_127" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_at_allow", - "remarks": "rule_set_131" + "remarks": "rule_set_128" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/at.allow file", - "remarks": "rule_set_131" + "remarks": "rule_set_128" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_at_allow", - "remarks": "rule_set_131" + "remarks": "rule_set_128" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/at.allow file", - "remarks": "rule_set_131" + "remarks": "rule_set_128" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_at_allow", - "remarks": "rule_set_132" + "remarks": "rule_set_129" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/at.allow file", - "remarks": "rule_set_132" + "remarks": "rule_set_129" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_at_allow", - "remarks": "rule_set_132" + "remarks": "rule_set_129" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/at.allow file", - "remarks": "rule_set_132" + "remarks": "rule_set_129" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_at_allow", - "remarks": "rule_set_133" + "remarks": "rule_set_130" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/at.allow file", - "remarks": "rule_set_133" + "remarks": "rule_set_130" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_at_allow", - "remarks": "rule_set_133" + "remarks": "rule_set_130" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/at.allow file", - "remarks": "rule_set_133" + "remarks": "rule_set_130" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "wireless_disable_interfaces", - "remarks": "rule_set_134" + "remarks": "rule_set_131" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Deactivate Wireless Network Interfaces", - "remarks": "rule_set_134" + "remarks": "rule_set_131" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "wireless_disable_interfaces", - "remarks": "rule_set_134" + "remarks": "rule_set_131" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Deactivate Wireless Network Interfaces", - "remarks": "rule_set_134" + "remarks": "rule_set_131" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_bluetooth_disabled", - "remarks": "rule_set_135" + "remarks": "rule_set_132" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Bluetooth Service", - "remarks": "rule_set_135" + "remarks": "rule_set_132" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_bluetooth_disabled", - "remarks": "rule_set_135" + "remarks": "rule_set_132" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Bluetooth Service", - "remarks": "rule_set_135" + "remarks": "rule_set_132" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_atm_disabled", - "remarks": "rule_set_136" + "remarks": "rule_set_133" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable ATM Support", - "remarks": "rule_set_136" + "remarks": "rule_set_133" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_atm_disabled", - "remarks": "rule_set_136" + "remarks": "rule_set_133" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable ATM Support", - "remarks": "rule_set_136" + "remarks": "rule_set_133" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_can_disabled", - "remarks": "rule_set_137" + "remarks": "rule_set_134" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable CAN Support", - "remarks": "rule_set_137" + "remarks": "rule_set_134" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_can_disabled", - "remarks": "rule_set_137" + "remarks": "rule_set_134" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable CAN Support", - "remarks": "rule_set_137" + "remarks": "rule_set_134" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_dccp_disabled", - "remarks": "rule_set_138" + "remarks": "rule_set_135" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable DCCP Support", - "remarks": "rule_set_138" + "remarks": "rule_set_135" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_dccp_disabled", - "remarks": "rule_set_138" + "remarks": "rule_set_135" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable DCCP Support", - "remarks": "rule_set_138" + "remarks": "rule_set_135" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_tipc_disabled", - "remarks": "rule_set_139" + "remarks": "rule_set_136" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable TIPC Support", - "remarks": "rule_set_139" + "remarks": "rule_set_136" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_tipc_disabled", - "remarks": "rule_set_139" + "remarks": "rule_set_136" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable TIPC Support", - "remarks": "rule_set_139" + "remarks": "rule_set_136" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_rds_disabled", - "remarks": "rule_set_140" + "remarks": "rule_set_137" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable RDS Support", - "remarks": "rule_set_140" + "remarks": "rule_set_137" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_rds_disabled", - "remarks": "rule_set_140" + "remarks": "rule_set_137" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable RDS Support", - "remarks": "rule_set_140" + "remarks": "rule_set_137" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_sctp_disabled", - "remarks": "rule_set_141" + "remarks": "rule_set_138" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SCTP Support", - "remarks": "rule_set_141" + "remarks": "rule_set_138" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_sctp_disabled", - "remarks": "rule_set_141" + "remarks": "rule_set_138" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SCTP Support", - "remarks": "rule_set_141" + "remarks": "rule_set_138" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_forwarding", - "remarks": "rule_set_142" + "remarks": "rule_set_139" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv4 Forwarding on all IPv4 Interfaces", - "remarks": "rule_set_142" + "remarks": "rule_set_139" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_forwarding", - "remarks": "rule_set_142" + "remarks": "rule_set_139" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv4 Forwarding on all IPv4 Interfaces", - "remarks": "rule_set_142" + "remarks": "rule_set_139" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_forwarding", - "remarks": "rule_set_143" + "remarks": "rule_set_140" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv4 Forwarding By Default", - "remarks": "rule_set_143" + "remarks": "rule_set_140" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_forwarding", - "remarks": "rule_set_143" + "remarks": "rule_set_140" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv4 Forwarding By Default", - "remarks": "rule_set_143" + "remarks": "rule_set_140" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_send_redirects", - "remarks": "rule_set_144" + "remarks": "rule_set_141" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_144" + "remarks": "rule_set_141" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_send_redirects", - "remarks": "rule_set_144" + "remarks": "rule_set_141" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_144" + "remarks": "rule_set_141" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_send_redirects", - "remarks": "rule_set_145" + "remarks": "rule_set_142" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces by Default", - "remarks": "rule_set_145" + "remarks": "rule_set_142" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_send_redirects", - "remarks": "rule_set_145" + "remarks": "rule_set_142" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces by Default", - "remarks": "rule_set_145" + "remarks": "rule_set_142" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses", - "remarks": "rule_set_146" + "remarks": "rule_set_143" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Ignore Bogus ICMP Error Responses on IPv4 Interfaces", - "remarks": "rule_set_146" + "remarks": "rule_set_143" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses", - "remarks": "rule_set_146" + "remarks": "rule_set_143" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Ignore Bogus ICMP Error Responses on IPv4 Interfaces", - "remarks": "rule_set_146" + "remarks": "rule_set_143" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_icmp_echo_ignore_broadcasts", - "remarks": "rule_set_147" + "remarks": "rule_set_144" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Ignore ICMP Broadcast Echo Requests on IPv4 Interfaces", - "remarks": "rule_set_147" + "remarks": "rule_set_144" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_icmp_echo_ignore_broadcasts", - "remarks": "rule_set_147" + "remarks": "rule_set_144" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Ignore ICMP Broadcast Echo Requests on IPv4 Interfaces", - "remarks": "rule_set_147" + "remarks": "rule_set_144" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_redirects", - "remarks": "rule_set_148" + "remarks": "rule_set_145" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv4 Interfaces", - "remarks": "rule_set_148" + "remarks": "rule_set_145" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_redirects", - "remarks": "rule_set_148" + "remarks": "rule_set_145" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv4 Interfaces", - "remarks": "rule_set_148" + "remarks": "rule_set_145" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_redirects", - "remarks": "rule_set_149" + "remarks": "rule_set_146" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv4 Interfaces", - "remarks": "rule_set_149" + "remarks": "rule_set_146" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_redirects", - "remarks": "rule_set_149" + "remarks": "rule_set_146" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv4 Interfaces", - "remarks": "rule_set_149" + "remarks": "rule_set_146" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_secure_redirects", - "remarks": "rule_set_150" + "remarks": "rule_set_147" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Secure ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_150" + "remarks": "rule_set_147" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_secure_redirects", - "remarks": "rule_set_150" + "remarks": "rule_set_147" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Secure ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_150" + "remarks": "rule_set_147" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_secure_redirects", - "remarks": "rule_set_151" + "remarks": "rule_set_148" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Kernel Parameter for Accepting Secure Redirects By Default", - "remarks": "rule_set_151" + "remarks": "rule_set_148" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_secure_redirects", - "remarks": "rule_set_151" + "remarks": "rule_set_148" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Kernel Parameter for Accepting Secure Redirects By Default", - "remarks": "rule_set_151" + "remarks": "rule_set_148" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_rp_filter", - "remarks": "rule_set_152" + "remarks": "rule_set_149" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces", - "remarks": "rule_set_152" + "remarks": "rule_set_149" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_rp_filter", - "remarks": "rule_set_152" + "remarks": "rule_set_149" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces", - "remarks": "rule_set_152" + "remarks": "rule_set_149" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_rp_filter", - "remarks": "rule_set_153" + "remarks": "rule_set_150" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces by Default", - "remarks": "rule_set_153" + "remarks": "rule_set_150" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_rp_filter", - "remarks": "rule_set_153" + "remarks": "rule_set_150" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces by Default", - "remarks": "rule_set_153" + "remarks": "rule_set_150" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_source_route", - "remarks": "rule_set_154" + "remarks": "rule_set_151" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces", - "remarks": "rule_set_154" + "remarks": "rule_set_151" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_source_route", - "remarks": "rule_set_154" + "remarks": "rule_set_151" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces", - "remarks": "rule_set_154" + "remarks": "rule_set_151" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_source_route", - "remarks": "rule_set_155" + "remarks": "rule_set_152" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv4 Interfaces by Default", - "remarks": "rule_set_155" + "remarks": "rule_set_152" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_source_route", - "remarks": "rule_set_155" + "remarks": "rule_set_152" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv4 Interfaces by Default", - "remarks": "rule_set_155" + "remarks": "rule_set_152" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_log_martians", - "remarks": "rule_set_156" + "remarks": "rule_set_153" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces", - "remarks": "rule_set_156" + "remarks": "rule_set_153" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_log_martians", - "remarks": "rule_set_156" + "remarks": "rule_set_153" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces", - "remarks": "rule_set_156" + "remarks": "rule_set_153" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_log_martians", - "remarks": "rule_set_157" + "remarks": "rule_set_154" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces by Default", - "remarks": "rule_set_157" + "remarks": "rule_set_154" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_log_martians", - "remarks": "rule_set_157" + "remarks": "rule_set_154" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces by Default", - "remarks": "rule_set_157" + "remarks": "rule_set_154" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_tcp_syncookies", - "remarks": "rule_set_158" + "remarks": "rule_set_155" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use TCP Syncookies on Network Interfaces", - "remarks": "rule_set_158" + "remarks": "rule_set_155" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_tcp_syncookies", - "remarks": "rule_set_158" + "remarks": "rule_set_155" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use TCP Syncookies on Network Interfaces", - "remarks": "rule_set_158" + "remarks": "rule_set_155" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_forwarding", - "remarks": "rule_set_159" + "remarks": "rule_set_156" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv6 Forwarding", - "remarks": "rule_set_159" + "remarks": "rule_set_156" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_forwarding", - "remarks": "rule_set_159" + "remarks": "rule_set_156" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv6 Forwarding", - "remarks": "rule_set_159" + "remarks": "rule_set_156" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_forwarding", - "remarks": "rule_set_160" + "remarks": "rule_set_157" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv6 Forwarding by default", - "remarks": "rule_set_160" + "remarks": "rule_set_157" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_forwarding", - "remarks": "rule_set_160" + "remarks": "rule_set_157" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv6 Forwarding by default", - "remarks": "rule_set_160" + "remarks": "rule_set_157" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_redirects", - "remarks": "rule_set_161" + "remarks": "rule_set_158" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv6 Interfaces", - "remarks": "rule_set_161" + "remarks": "rule_set_158" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_redirects", - "remarks": "rule_set_161" + "remarks": "rule_set_158" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv6 Interfaces", - "remarks": "rule_set_161" + "remarks": "rule_set_158" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_redirects", - "remarks": "rule_set_162" + "remarks": "rule_set_159" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv6 Interfaces", - "remarks": "rule_set_162" + "remarks": "rule_set_159" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_redirects", - "remarks": "rule_set_162" + "remarks": "rule_set_159" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv6 Interfaces", - "remarks": "rule_set_162" + "remarks": "rule_set_159" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_source_route", - "remarks": "rule_set_163" + "remarks": "rule_set_160" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv6 Interfaces", - "remarks": "rule_set_163" + "remarks": "rule_set_160" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_source_route", - "remarks": "rule_set_163" + "remarks": "rule_set_160" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv6 Interfaces", - "remarks": "rule_set_163" + "remarks": "rule_set_160" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_source_route", - "remarks": "rule_set_164" + "remarks": "rule_set_161" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv6 Interfaces by Default", - "remarks": "rule_set_164" + "remarks": "rule_set_161" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_source_route", - "remarks": "rule_set_164" + "remarks": "rule_set_161" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv6 Interfaces by Default", - "remarks": "rule_set_164" + "remarks": "rule_set_161" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_ra", - "remarks": "rule_set_165" + "remarks": "rule_set_162" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Router Advertisements on All IPv6 Interfaces", - "remarks": "rule_set_165" + "remarks": "rule_set_162" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_ra", - "remarks": "rule_set_165" + "remarks": "rule_set_162" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Router Advertisements on All IPv6 Interfaces", - "remarks": "rule_set_165" + "remarks": "rule_set_162" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_ra", - "remarks": "rule_set_166" + "remarks": "rule_set_163" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting Router Advertisements on all IPv6 Interfaces by Default", - "remarks": "rule_set_166" + "remarks": "rule_set_163" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_ra", - "remarks": "rule_set_166" + "remarks": "rule_set_163" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting Router Advertisements on all IPv6 Interfaces by Default", - "remarks": "rule_set_166" + "remarks": "rule_set_163" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_firewalld_installed", - "remarks": "rule_set_167" + "remarks": "rule_set_164" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install firewalld Package", - "remarks": "rule_set_167" + "remarks": "rule_set_164" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_firewalld_installed", - "remarks": "rule_set_167" + "remarks": "rule_set_164" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install firewalld Package", - "remarks": "rule_set_167" + "remarks": "rule_set_164" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "firewalld-backend", - "remarks": "rule_set_168" + "remarks": "rule_set_165" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Firewalld to Use the Nftables Backend", - "remarks": "rule_set_168" + "remarks": "rule_set_165" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "firewalld-backend", - "remarks": "rule_set_168" + "remarks": "rule_set_165" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Firewalld to Use the Nftables Backend", - "remarks": "rule_set_168" + "remarks": "rule_set_165" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_firewalld_enabled", - "remarks": "rule_set_169" + "remarks": "rule_set_166" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify firewalld Enabled", - "remarks": "rule_set_169" + "remarks": "rule_set_166" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_firewalld_enabled", - "remarks": "rule_set_169" + "remarks": "rule_set_166" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify firewalld Enabled", - "remarks": "rule_set_169" + "remarks": "rule_set_166" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "firewalld_loopback_traffic_trusted", - "remarks": "rule_set_170" + "remarks": "rule_set_167" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Firewalld to Trust Loopback Traffic", - "remarks": "rule_set_170" + "remarks": "rule_set_167" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "firewalld_loopback_traffic_trusted", - "remarks": "rule_set_170" + "remarks": "rule_set_167" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Firewalld to Trust Loopback Traffic", - "remarks": "rule_set_170" + "remarks": "rule_set_167" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_config", - "remarks": "rule_set_171" + "remarks": "rule_set_168" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server config file", - "remarks": "rule_set_171" + "remarks": "rule_set_168" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_config", - "remarks": "rule_set_171" + "remarks": "rule_set_168" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server config file", - "remarks": "rule_set_171" + "remarks": "rule_set_168" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_config", - "remarks": "rule_set_172" + "remarks": "rule_set_169" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server config file", - "remarks": "rule_set_172" + "remarks": "rule_set_169" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_config", - "remarks": "rule_set_172" + "remarks": "rule_set_169" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server config file", - "remarks": "rule_set_172" + "remarks": "rule_set_169" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_config", - "remarks": "rule_set_173" + "remarks": "rule_set_170" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server config file", - "remarks": "rule_set_173" + "remarks": "rule_set_170" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_config", - "remarks": "rule_set_173" + "remarks": "rule_set_170" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server config file", - "remarks": "rule_set_173" + "remarks": "rule_set_170" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_sshd_config_d", - "remarks": "rule_set_174" + "remarks": "rule_set_171" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Config File", - "remarks": "rule_set_174" + "remarks": "rule_set_171" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_sshd_config_d", - "remarks": "rule_set_174" + "remarks": "rule_set_171" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Config File", - "remarks": "rule_set_174" + "remarks": "rule_set_171" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_drop_in_config", - "remarks": "rule_set_175" + "remarks": "rule_set_172" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Config File", - "remarks": "rule_set_175" + "remarks": "rule_set_172" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_drop_in_config", - "remarks": "rule_set_175" + "remarks": "rule_set_172" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Config File", - "remarks": "rule_set_175" + "remarks": "rule_set_172" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_sshd_config_d", - "remarks": "rule_set_176" + "remarks": "rule_set_173" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server Configuration Files", - "remarks": "rule_set_176" + "remarks": "rule_set_173" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_sshd_config_d", - "remarks": "rule_set_176" + "remarks": "rule_set_173" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server Configuration Files", - "remarks": "rule_set_176" + "remarks": "rule_set_173" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_sshd_config_d", - "remarks": "rule_set_177" + "remarks": "rule_set_174" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server Configuration Files", - "remarks": "rule_set_177" + "remarks": "rule_set_174" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_sshd_config_d", - "remarks": "rule_set_177" + "remarks": "rule_set_174" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server Configuration Files", - "remarks": "rule_set_177" + "remarks": "rule_set_174" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_drop_in_config", - "remarks": "rule_set_178" + "remarks": "rule_set_175" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server Configuration Files", - "remarks": "rule_set_178" + "remarks": "rule_set_175" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_drop_in_config", - "remarks": "rule_set_178" + "remarks": "rule_set_175" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server Configuration Files", - "remarks": "rule_set_178" + "remarks": "rule_set_175" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_drop_in_config", - "remarks": "rule_set_179" + "remarks": "rule_set_176" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server Configuration Files", - "remarks": "rule_set_179" + "remarks": "rule_set_176" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_drop_in_config", - "remarks": "rule_set_179" + "remarks": "rule_set_176" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server Configuration Files", - "remarks": "rule_set_179" + "remarks": "rule_set_176" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_private_key", - "remarks": "rule_set_180" + "remarks": "rule_set_177" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_180" + "remarks": "rule_set_177" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_private_key", - "remarks": "rule_set_180" + "remarks": "rule_set_177" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_180" + "remarks": "rule_set_177" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_private_key", - "remarks": "rule_set_181" + "remarks": "rule_set_178" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_181" + "remarks": "rule_set_178" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_private_key", - "remarks": "rule_set_181" + "remarks": "rule_set_178" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_181" + "remarks": "rule_set_178" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_private_key", - "remarks": "rule_set_182" + "remarks": "rule_set_179" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Private *_key Key Files", - "remarks": "rule_set_182" + "remarks": "rule_set_179" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_private_key", - "remarks": "rule_set_182" + "remarks": "rule_set_179" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Private *_key Key Files", - "remarks": "rule_set_182" + "remarks": "rule_set_179" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_pub_key", - "remarks": "rule_set_183" + "remarks": "rule_set_180" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_183" + "remarks": "rule_set_180" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_pub_key", - "remarks": "rule_set_183" + "remarks": "rule_set_180" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_183" + "remarks": "rule_set_180" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_pub_key", - "remarks": "rule_set_184" + "remarks": "rule_set_181" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_184" + "remarks": "rule_set_181" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_pub_key", - "remarks": "rule_set_184" + "remarks": "rule_set_181" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_184" + "remarks": "rule_set_181" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_pub_key", - "remarks": "rule_set_185" + "remarks": "rule_set_182" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Public *.pub Key Files", - "remarks": "rule_set_185" + "remarks": "rule_set_182" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_pub_key", - "remarks": "rule_set_185" + "remarks": "rule_set_182" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Public *.pub Key Files", - "remarks": "rule_set_185" + "remarks": "rule_set_182" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_limit_user_access", - "remarks": "rule_set_186" + "remarks": "rule_set_183" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Users' SSH Access", - "remarks": "rule_set_186" + "remarks": "rule_set_183" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_limit_user_access", - "remarks": "rule_set_186" + "remarks": "rule_set_183" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Users' SSH Access", - "remarks": "rule_set_186" + "remarks": "rule_set_183" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_warning_banner_net", - "remarks": "rule_set_187" + "remarks": "rule_set_184" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable SSH Warning Banner", - "remarks": "rule_set_187" + "remarks": "rule_set_184" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_warning_banner_net", - "remarks": "rule_set_187" + "remarks": "rule_set_184" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable SSH Warning Banner", - "remarks": "rule_set_187" + "remarks": "rule_set_184" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_idle_timeout", - "remarks": "rule_set_188" + "remarks": "rule_set_185" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Interval", - "remarks": "rule_set_188" + "remarks": "rule_set_185" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_idle_timeout", - "remarks": "rule_set_188" + "remarks": "rule_set_185" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Interval", - "remarks": "rule_set_188" + "remarks": "rule_set_185" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_keepalive", - "remarks": "rule_set_189" + "remarks": "rule_set_186" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Count Max", - "remarks": "rule_set_189" + "remarks": "rule_set_186" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_keepalive", - "remarks": "rule_set_189" + "remarks": "rule_set_186" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Count Max", - "remarks": "rule_set_189" + "remarks": "rule_set_186" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_host_auth", - "remarks": "rule_set_190" + "remarks": "rule_set_187" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Host-Based Authentication", - "remarks": "rule_set_190" + "remarks": "rule_set_187" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_host_auth", - "remarks": "rule_set_190" + "remarks": "rule_set_187" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Host-Based Authentication", - "remarks": "rule_set_190" + "remarks": "rule_set_187" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_rhosts", - "remarks": "rule_set_191" + "remarks": "rule_set_188" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Support for .rhosts Files", - "remarks": "rule_set_191" + "remarks": "rule_set_188" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_rhosts", - "remarks": "rule_set_191" + "remarks": "rule_set_188" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Support for .rhosts Files", - "remarks": "rule_set_191" + "remarks": "rule_set_188" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_use_strong_kex", - "remarks": "rule_set_192" + "remarks": "rule_set_189" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Use Only Strong Key Exchange algorithms", - "remarks": "rule_set_192" + "remarks": "rule_set_189" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_use_strong_kex", - "remarks": "rule_set_192" + "remarks": "rule_set_189" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Use Only Strong Key Exchange algorithms", - "remarks": "rule_set_192" + "remarks": "rule_set_189" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_login_grace_time", - "remarks": "rule_set_193" + "remarks": "rule_set_190" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SSH LoginGraceTime is configured", - "remarks": "rule_set_193" + "remarks": "rule_set_190" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_login_grace_time", - "remarks": "rule_set_193" + "remarks": "rule_set_190" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SSH LoginGraceTime is configured", - "remarks": "rule_set_193" + "remarks": "rule_set_190" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_loglevel_verbose", - "remarks": "rule_set_194" + "remarks": "rule_set_191" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Daemon LogLevel to VERBOSE", - "remarks": "rule_set_194" + "remarks": "rule_set_191" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_loglevel_verbose", - "remarks": "rule_set_194" + "remarks": "rule_set_191" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Daemon LogLevel to VERBOSE", - "remarks": "rule_set_194" + "remarks": "rule_set_191" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_auth_tries", - "remarks": "rule_set_195" + "remarks": "rule_set_192" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH authentication attempt limit", - "remarks": "rule_set_195" + "remarks": "rule_set_192" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_auth_tries", - "remarks": "rule_set_195" + "remarks": "rule_set_192" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH authentication attempt limit", - "remarks": "rule_set_195" + "remarks": "rule_set_192" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_maxstartups", - "remarks": "rule_set_196" + "remarks": "rule_set_193" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SSH MaxStartups is configured", - "remarks": "rule_set_196" + "remarks": "rule_set_193" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_maxstartups", - "remarks": "rule_set_196" + "remarks": "rule_set_193" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SSH MaxStartups is configured", - "remarks": "rule_set_196" + "remarks": "rule_set_193" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_sessions", - "remarks": "rule_set_197" + "remarks": "rule_set_194" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH MaxSessions limit", - "remarks": "rule_set_197" + "remarks": "rule_set_194" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_sessions", - "remarks": "rule_set_197" + "remarks": "rule_set_194" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH MaxSessions limit", - "remarks": "rule_set_197" + "remarks": "rule_set_194" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_empty_passwords", - "remarks": "rule_set_198" + "remarks": "rule_set_195" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Access via Empty Passwords", - "remarks": "rule_set_198" + "remarks": "rule_set_195" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_empty_passwords", - "remarks": "rule_set_198" + "remarks": "rule_set_195" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Access via Empty Passwords", - "remarks": "rule_set_198" + "remarks": "rule_set_195" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_root_login", - "remarks": "rule_set_199" + "remarks": "rule_set_196" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Root Login", - "remarks": "rule_set_199" + "remarks": "rule_set_196" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_root_login", - "remarks": "rule_set_199" + "remarks": "rule_set_196" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Root Login", - "remarks": "rule_set_199" + "remarks": "rule_set_196" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_do_not_permit_user_env", - "remarks": "rule_set_200" + "remarks": "rule_set_197" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Do Not Allow SSH Environment Options", - "remarks": "rule_set_200" + "remarks": "rule_set_197" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_do_not_permit_user_env", - "remarks": "rule_set_200" + "remarks": "rule_set_197" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Do Not Allow SSH Environment Options", - "remarks": "rule_set_200" + "remarks": "rule_set_197" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_pam", - "remarks": "rule_set_201" + "remarks": "rule_set_198" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable PAM", - "remarks": "rule_set_201" + "remarks": "rule_set_198" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_pam", - "remarks": "rule_set_201" + "remarks": "rule_set_198" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable PAM", - "remarks": "rule_set_201" + "remarks": "rule_set_198" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_sudo_installed", - "remarks": "rule_set_202" + "remarks": "rule_set_199" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install sudo Package", - "remarks": "rule_set_202" + "remarks": "rule_set_199" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_sudo_installed", - "remarks": "rule_set_202" + "remarks": "rule_set_199" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install sudo Package", - "remarks": "rule_set_202" + "remarks": "rule_set_199" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_use_pty", - "remarks": "rule_set_203" + "remarks": "rule_set_200" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo use_pty", - "remarks": "rule_set_203" + "remarks": "rule_set_200" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_use_pty", - "remarks": "rule_set_203" + "remarks": "rule_set_200" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo use_pty", - "remarks": "rule_set_203" + "remarks": "rule_set_200" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_custom_logfile", - "remarks": "rule_set_204" + "remarks": "rule_set_201" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Sudo Logfile Exists - sudo logfile", - "remarks": "rule_set_204" + "remarks": "rule_set_201" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_custom_logfile", - "remarks": "rule_set_204" + "remarks": "rule_set_201" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Sudo Logfile Exists - sudo logfile", - "remarks": "rule_set_204" + "remarks": "rule_set_201" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_no_authenticate", - "remarks": "rule_set_205" + "remarks": "rule_set_202" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo !authenticate", - "remarks": "rule_set_205" + "remarks": "rule_set_202" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_no_authenticate", - "remarks": "rule_set_205" + "remarks": "rule_set_202" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo !authenticate", - "remarks": "rule_set_205" + "remarks": "rule_set_202" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_require_reauthentication", - "remarks": "rule_set_206" + "remarks": "rule_set_203" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require Re-Authentication When Using the sudo Command", - "remarks": "rule_set_206" + "remarks": "rule_set_203" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_require_reauthentication", - "remarks": "rule_set_206" + "remarks": "rule_set_203" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require Re-Authentication When Using the sudo Command", - "remarks": "rule_set_206" + "remarks": "rule_set_203" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "use_pam_wheel_group_for_su", - "remarks": "rule_set_207" + "remarks": "rule_set_204" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Usage of pam_wheel with Group Parameter for su Authentication", - "remarks": "rule_set_207" + "remarks": "rule_set_204" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "use_pam_wheel_group_for_su", - "remarks": "rule_set_207" + "remarks": "rule_set_204" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Usage of pam_wheel with Group Parameter for su Authentication", - "remarks": "rule_set_207" + "remarks": "rule_set_204" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_pam_wheel_group_empty", - "remarks": "rule_set_208" + "remarks": "rule_set_205" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Group Used by pam_wheel.so Module Exists on System and is Empty", - "remarks": "rule_set_208" + "remarks": "rule_set_205" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_pam_wheel_group_empty", - "remarks": "rule_set_208" + "remarks": "rule_set_205" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Group Used by pam_wheel.so Module Exists on System and is Empty", - "remarks": "rule_set_208" + "remarks": "rule_set_205" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_password_pam_faillock_password_auth", - "remarks": "rule_set_209" + "remarks": "rule_set_206" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/password-auth File.", - "remarks": "rule_set_209" + "remarks": "rule_set_206" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_password_pam_faillock_password_auth", - "remarks": "rule_set_209" + "remarks": "rule_set_206" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/password-auth File.", - "remarks": "rule_set_209" + "remarks": "rule_set_206" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_password_pam_faillock_system_auth", - "remarks": "rule_set_210" + "remarks": "rule_set_207" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/system-auth File.", - "remarks": "rule_set_210" + "remarks": "rule_set_207" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_password_pam_faillock_system_auth", - "remarks": "rule_set_210" + "remarks": "rule_set_207" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/system-auth File.", - "remarks": "rule_set_210" + "remarks": "rule_set_207" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_pam_pwquality_installed", - "remarks": "rule_set_211" + "remarks": "rule_set_208" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install pam_pwquality Package", - "remarks": "rule_set_211" + "remarks": "rule_set_208" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_pam_pwquality_installed", - "remarks": "rule_set_211" + "remarks": "rule_set_208" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install pam_pwquality Package", - "remarks": "rule_set_211" + "remarks": "rule_set_208" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwquality_password_auth", - "remarks": "rule_set_212" + "remarks": "rule_set_209" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM password complexity module is enabled in password-auth", - "remarks": "rule_set_212" + "remarks": "rule_set_209" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwquality_password_auth", - "remarks": "rule_set_212" + "remarks": "rule_set_209" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM password complexity module is enabled in password-auth", - "remarks": "rule_set_212" + "remarks": "rule_set_209" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwquality_system_auth", - "remarks": "rule_set_213" + "remarks": "rule_set_210" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM password complexity module is enabled in system-auth", - "remarks": "rule_set_213" + "remarks": "rule_set_210" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwquality_system_auth", - "remarks": "rule_set_213" + "remarks": "rule_set_210" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM password complexity module is enabled in system-auth", - "remarks": "rule_set_213" + "remarks": "rule_set_210" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_enabled", - "remarks": "rule_set_214" + "remarks": "rule_set_211" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify pam_unix module is activated", - "remarks": "rule_set_214" + "remarks": "rule_set_211" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_enabled", - "remarks": "rule_set_214" + "remarks": "rule_set_211" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify pam_unix module is activated", - "remarks": "rule_set_214" + "remarks": "rule_set_211" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny", - "remarks": "rule_set_215" + "remarks": "rule_set_212" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Lock Accounts After Failed Password Attempts", - "remarks": "rule_set_215" + "remarks": "rule_set_212" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny", - "remarks": "rule_set_215" + "remarks": "rule_set_212" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Lock Accounts After Failed Password Attempts", - "remarks": "rule_set_215" + "remarks": "rule_set_212" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_unlock_time_with_zero", - "remarks": "rule_set_216" + "remarks": "rule_set_213" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Lockout Time for Failed Password Attempts", - "remarks": "rule_set_216" + "remarks": "rule_set_213" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_unlock_time_with_zero", - "remarks": "rule_set_216" + "remarks": "rule_set_213" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Lockout Time for Failed Password Attempts", - "remarks": "rule_set_216" + "remarks": "rule_set_213" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_difok", - "remarks": "rule_set_217" + "remarks": "rule_set_214" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Characters", - "remarks": "rule_set_217" + "remarks": "rule_set_214" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_difok", - "remarks": "rule_set_217" + "remarks": "rule_set_214" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Characters", - "remarks": "rule_set_217" + "remarks": "rule_set_214" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minlen", - "remarks": "rule_set_218" + "remarks": "rule_set_215" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Length", - "remarks": "rule_set_218" + "remarks": "rule_set_215" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minlen", - "remarks": "rule_set_218" + "remarks": "rule_set_215" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Length", - "remarks": "rule_set_218" + "remarks": "rule_set_215" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minclass", - "remarks": "rule_set_219" + "remarks": "rule_set_216" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", - "remarks": "rule_set_219" + "remarks": "rule_set_216" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minclass", - "remarks": "rule_set_219" + "remarks": "rule_set_216" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", - "remarks": "rule_set_219" + "remarks": "rule_set_216" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_maxrepeat", - "remarks": "rule_set_220" + "remarks": "rule_set_217" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Consecutive Repeating Characters", - "remarks": "rule_set_220" + "remarks": "rule_set_217" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_maxrepeat", - "remarks": "rule_set_220" + "remarks": "rule_set_217" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Consecutive Repeating Characters", - "remarks": "rule_set_220" + "remarks": "rule_set_217" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_maxsequence", - "remarks": "rule_set_221" + "remarks": "rule_set_218" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit the maximum number of sequential characters in passwords", - "remarks": "rule_set_221" + "remarks": "rule_set_218" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_maxsequence", - "remarks": "rule_set_221" + "remarks": "rule_set_218" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit the maximum number of sequential characters in passwords", - "remarks": "rule_set_221" + "remarks": "rule_set_218" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_dictcheck", - "remarks": "rule_set_222" + "remarks": "rule_set_219" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Prevent the Use of Dictionary Words", - "remarks": "rule_set_222" + "remarks": "rule_set_219" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_dictcheck", - "remarks": "rule_set_222" + "remarks": "rule_set_219" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Prevent the Use of Dictionary Words", - "remarks": "rule_set_222" + "remarks": "rule_set_219" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_enforce_root", - "remarks": "rule_set_223" + "remarks": "rule_set_220" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Enforce for root User", - "remarks": "rule_set_223" + "remarks": "rule_set_220" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_enforce_root", - "remarks": "rule_set_223" + "remarks": "rule_set_220" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Enforce for root User", - "remarks": "rule_set_223" + "remarks": "rule_set_220" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_password_auth", - "remarks": "rule_set_224" + "remarks": "rule_set_221" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: password-auth", - "remarks": "rule_set_224" + "remarks": "rule_set_221" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_password_auth", - "remarks": "rule_set_224" + "remarks": "rule_set_221" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: password-auth", - "remarks": "rule_set_224" + "remarks": "rule_set_221" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_system_auth", - "remarks": "rule_set_225" + "remarks": "rule_set_222" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: system-auth", - "remarks": "rule_set_225" + "remarks": "rule_set_222" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_system_auth", - "remarks": "rule_set_225" + "remarks": "rule_set_222" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: system-auth", - "remarks": "rule_set_225" + "remarks": "rule_set_222" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_enforce_for_root", - "remarks": "rule_set_226" + "remarks": "rule_set_223" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Password History Is Enforced for the Root User", - "remarks": "rule_set_226" + "remarks": "rule_set_223" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_enforce_for_root", - "remarks": "rule_set_226" + "remarks": "rule_set_223" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Password History Is Enforced for the Root User", - "remarks": "rule_set_226" + "remarks": "rule_set_223" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_use_authtok", - "remarks": "rule_set_227" + "remarks": "rule_set_224" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Password History with use_authtok", - "remarks": "rule_set_227" + "remarks": "rule_set_224" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_use_authtok", - "remarks": "rule_set_227" + "remarks": "rule_set_224" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Password History with use_authtok", - "remarks": "rule_set_227" + "remarks": "rule_set_224" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords", - "remarks": "rule_set_228" + "remarks": "rule_set_225" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent Login to Accounts With Empty Password", - "remarks": "rule_set_228" + "remarks": "rule_set_225" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords", - "remarks": "rule_set_228" + "remarks": "rule_set_225" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent Login to Accounts With Empty Password", - "remarks": "rule_set_228" + "remarks": "rule_set_225" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_no_remember", - "remarks": "rule_set_229" + "remarks": "rule_set_226" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Avoid using remember in pam_unix module", - "remarks": "rule_set_229" + "remarks": "rule_set_226" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_no_remember", - "remarks": "rule_set_229" + "remarks": "rule_set_226" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Avoid using remember in pam_unix module", - "remarks": "rule_set_229" + "remarks": "rule_set_226" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_systemauth", - "remarks": "rule_set_230" + "remarks": "rule_set_227" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - system-auth", - "remarks": "rule_set_230" + "remarks": "rule_set_227" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_systemauth", - "remarks": "rule_set_230" + "remarks": "rule_set_227" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - system-auth", - "remarks": "rule_set_230" + "remarks": "rule_set_227" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_passwordauth", - "remarks": "rule_set_231" + "remarks": "rule_set_228" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - password-auth", - "remarks": "rule_set_231" + "remarks": "rule_set_228" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_passwordauth", - "remarks": "rule_set_231" + "remarks": "rule_set_228" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - password-auth", - "remarks": "rule_set_231" + "remarks": "rule_set_228" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_authtok", - "remarks": "rule_set_232" + "remarks": "rule_set_229" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require use_authtok for pam_unix.so", - "remarks": "rule_set_232" + "remarks": "rule_set_229" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_authtok", - "remarks": "rule_set_232" + "remarks": "rule_set_229" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require use_authtok for pam_unix.so", - "remarks": "rule_set_232" + "remarks": "rule_set_229" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_maximum_age_login_defs", - "remarks": "rule_set_233" + "remarks": "rule_set_230" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Age", - "remarks": "rule_set_233" + "remarks": "rule_set_230" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_maximum_age_login_defs", - "remarks": "rule_set_233" + "remarks": "rule_set_230" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Age", - "remarks": "rule_set_233" + "remarks": "rule_set_230" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_max_life_existing", - "remarks": "rule_set_234" + "remarks": "rule_set_231" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Maximum Age", - "remarks": "rule_set_234" + "remarks": "rule_set_231" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_max_life_existing", - "remarks": "rule_set_234" + "remarks": "rule_set_231" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Maximum Age", - "remarks": "rule_set_234" + "remarks": "rule_set_231" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_warn_age_login_defs", - "remarks": "rule_set_235" + "remarks": "rule_set_232" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Warning Age", - "remarks": "rule_set_235" + "remarks": "rule_set_232" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_warn_age_login_defs", - "remarks": "rule_set_235" + "remarks": "rule_set_232" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Warning Age", - "remarks": "rule_set_235" + "remarks": "rule_set_232" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_warn_age_existing", - "remarks": "rule_set_236" + "remarks": "rule_set_233" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Warning Age", - "remarks": "rule_set_236" + "remarks": "rule_set_233" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_warn_age_existing", - "remarks": "rule_set_236" + "remarks": "rule_set_233" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Warning Age", - "remarks": "rule_set_236" + "remarks": "rule_set_233" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_libuserconf", - "remarks": "rule_set_237" + "remarks": "rule_set_234" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/libuser.conf", - "remarks": "rule_set_237" + "remarks": "rule_set_234" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_libuserconf", - "remarks": "rule_set_237" + "remarks": "rule_set_234" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/libuser.conf", - "remarks": "rule_set_237" + "remarks": "rule_set_234" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_logindefs", - "remarks": "rule_set_238" + "remarks": "rule_set_235" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/login.defs", - "remarks": "rule_set_238" + "remarks": "rule_set_235" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_logindefs", - "remarks": "rule_set_238" + "remarks": "rule_set_235" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/login.defs", - "remarks": "rule_set_238" + "remarks": "rule_set_235" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_disable_post_pw_expiration", - "remarks": "rule_set_239" + "remarks": "rule_set_236" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Account Expiration Following Inactivity", - "remarks": "rule_set_239" + "remarks": "rule_set_236" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_disable_post_pw_expiration", - "remarks": "rule_set_239" + "remarks": "rule_set_236" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Account Expiration Following Inactivity", - "remarks": "rule_set_239" + "remarks": "rule_set_236" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_set_post_pw_existing", - "remarks": "rule_set_240" + "remarks": "rule_set_237" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set existing passwords a period of inactivity before they been locked", - "remarks": "rule_set_240" + "remarks": "rule_set_237" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_set_post_pw_existing", - "remarks": "rule_set_240" + "remarks": "rule_set_237" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set existing passwords a period of inactivity before they been locked", - "remarks": "rule_set_240" + "remarks": "rule_set_237" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_last_change_is_in_past", - "remarks": "rule_set_241" + "remarks": "rule_set_238" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure all users last password change date is in the past", - "remarks": "rule_set_241" + "remarks": "rule_set_238" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_last_change_is_in_past", - "remarks": "rule_set_241" + "remarks": "rule_set_238" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure all users last password change date is in the past", - "remarks": "rule_set_241" + "remarks": "rule_set_238" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_no_uid_except_zero", - "remarks": "rule_set_242" + "remarks": "rule_set_239" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Root Has UID 0", - "remarks": "rule_set_242" + "remarks": "rule_set_239" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_no_uid_except_zero", - "remarks": "rule_set_242" + "remarks": "rule_set_239" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Root Has UID 0", - "remarks": "rule_set_242" + "remarks": "rule_set_239" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_gid_zero", - "remarks": "rule_set_243" + "remarks": "rule_set_240" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Root Has A Primary GID 0", - "remarks": "rule_set_243" + "remarks": "rule_set_240" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_gid_zero", - "remarks": "rule_set_243" + "remarks": "rule_set_240" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Root Has A Primary GID 0", - "remarks": "rule_set_243" + "remarks": "rule_set_240" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "groups_no_zero_gid_except_root", - "remarks": "rule_set_244" + "remarks": "rule_set_241" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Group Root Has GID 0", - "remarks": "rule_set_244" + "remarks": "rule_set_241" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "groups_no_zero_gid_except_root", - "remarks": "rule_set_244" + "remarks": "rule_set_241" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Group Root Has GID 0", - "remarks": "rule_set_244" + "remarks": "rule_set_241" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_root_password_configured", - "remarks": "rule_set_245" + "remarks": "rule_set_242" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Authentication Required for Single User Mode", - "remarks": "rule_set_245" + "remarks": "rule_set_242" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_root_password_configured", - "remarks": "rule_set_245" + "remarks": "rule_set_242" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Authentication Required for Single User Mode", - "remarks": "rule_set_245" + "remarks": "rule_set_242" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_path_dirs_no_write", - "remarks": "rule_set_246" + "remarks": "rule_set_243" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include World or Group-Writable Directories", - "remarks": "rule_set_246" + "remarks": "rule_set_243" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_path_dirs_no_write", - "remarks": "rule_set_246" + "remarks": "rule_set_243" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include World or Group-Writable Directories", - "remarks": "rule_set_246" + "remarks": "rule_set_243" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "root_path_no_dot", - "remarks": "rule_set_247" + "remarks": "rule_set_244" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include Relative Paths or Null Directories", - "remarks": "rule_set_247" + "remarks": "rule_set_244" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "root_path_no_dot", - "remarks": "rule_set_247" + "remarks": "rule_set_244" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include Relative Paths or Null Directories", - "remarks": "rule_set_247" + "remarks": "rule_set_244" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_root", - "remarks": "rule_set_248" + "remarks": "rule_set_245" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Root Bash Umask is Set Correctly", - "remarks": "rule_set_248" + "remarks": "rule_set_245" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_root", - "remarks": "rule_set_248" + "remarks": "rule_set_245" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Root Bash Umask is Set Correctly", - "remarks": "rule_set_248" + "remarks": "rule_set_245" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_password_auth_for_systemaccounts", - "remarks": "rule_set_249" + "remarks": "rule_set_246" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Are Locked", - "remarks": "rule_set_249" + "remarks": "rule_set_246" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_password_auth_for_systemaccounts", - "remarks": "rule_set_249" + "remarks": "rule_set_246" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Are Locked", - "remarks": "rule_set_249" + "remarks": "rule_set_246" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_shelllogin_for_systemaccounts", - "remarks": "rule_set_250" + "remarks": "rule_set_247" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", - "remarks": "rule_set_250" + "remarks": "rule_set_247" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_shelllogin_for_systemaccounts", - "remarks": "rule_set_250" + "remarks": "rule_set_247" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", - "remarks": "rule_set_250" + "remarks": "rule_set_247" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_invalid_shell_accounts_unlocked", - "remarks": "rule_set_251" + "remarks": "rule_set_248" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Non-Interactive Accounts Are Locked", - "remarks": "rule_set_251" + "remarks": "rule_set_248" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_invalid_shell_accounts_unlocked", - "remarks": "rule_set_251" + "remarks": "rule_set_248" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Non-Interactive Accounts Are Locked", - "remarks": "rule_set_251" + "remarks": "rule_set_248" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_tmout", - "remarks": "rule_set_252" + "remarks": "rule_set_249" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Interactive Session Timeout", - "remarks": "rule_set_252" + "remarks": "rule_set_249" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_tmout", - "remarks": "rule_set_252" + "remarks": "rule_set_249" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Interactive Session Timeout", - "remarks": "rule_set_252" + "remarks": "rule_set_249" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_bashrc", - "remarks": "rule_set_253" + "remarks": "rule_set_250" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Bash Umask is Set Correctly", - "remarks": "rule_set_253" + "remarks": "rule_set_250" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_bashrc", - "remarks": "rule_set_253" + "remarks": "rule_set_250" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Bash Umask is Set Correctly", - "remarks": "rule_set_253" + "remarks": "rule_set_250" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_login_defs", - "remarks": "rule_set_254" + "remarks": "rule_set_251" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in login.defs", - "remarks": "rule_set_254" + "remarks": "rule_set_251" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_login_defs", - "remarks": "rule_set_254" + "remarks": "rule_set_251" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in login.defs", - "remarks": "rule_set_254" + "remarks": "rule_set_251" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_profile", - "remarks": "rule_set_255" + "remarks": "rule_set_252" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in /etc/profile", - "remarks": "rule_set_255" + "remarks": "rule_set_252" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_profile", - "remarks": "rule_set_255" + "remarks": "rule_set_252" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in /etc/profile", - "remarks": "rule_set_255" + "remarks": "rule_set_252" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_256" + "remarks": "rule_set_253" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_256" + "remarks": "rule_set_253" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_256" + "remarks": "rule_set_253" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_256" + "remarks": "rule_set_253" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_build_database", - "remarks": "rule_set_257" + "remarks": "rule_set_254" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Build and Test AIDE Database", - "remarks": "rule_set_257" + "remarks": "rule_set_254" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_build_database", - "remarks": "rule_set_257" + "remarks": "rule_set_254" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Build and Test AIDE Database", - "remarks": "rule_set_257" + "remarks": "rule_set_254" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_periodic_cron_checking", - "remarks": "rule_set_258" + "remarks": "rule_set_255" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Periodic Execution of AIDE", - "remarks": "rule_set_258" + "remarks": "rule_set_255" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_periodic_cron_checking", - "remarks": "rule_set_258" + "remarks": "rule_set_255" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Periodic Execution of AIDE", - "remarks": "rule_set_258" + "remarks": "rule_set_255" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_check_audit_tools", - "remarks": "rule_set_259" + "remarks": "rule_set_256" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure AIDE to Verify the Audit Tools", - "remarks": "rule_set_259" + "remarks": "rule_set_256" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_check_audit_tools", - "remarks": "rule_set_259" + "remarks": "rule_set_256" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure AIDE to Verify the Audit Tools", - "remarks": "rule_set_259" + "remarks": "rule_set_256" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journald_enabled", - "remarks": "rule_set_260" + "remarks": "rule_set_257" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journald Service", - "remarks": "rule_set_260" + "remarks": "rule_set_257" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journald_enabled", - "remarks": "rule_set_260" + "remarks": "rule_set_257" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journald Service", - "remarks": "rule_set_260" + "remarks": "rule_set_257" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_journald_and_rsyslog_not_active_together", - "remarks": "rule_set_261" + "remarks": "rule_set_258" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald and rsyslog Are Not Active Together", - "remarks": "rule_set_261" + "remarks": "rule_set_258" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_journald_and_rsyslog_not_active_together", - "remarks": "rule_set_261" + "remarks": "rule_set_258" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald and rsyslog Are Not Active Together", - "remarks": "rule_set_261" + "remarks": "rule_set_258" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_systemd-journal-remote_installed", - "remarks": "rule_set_262" + "remarks": "rule_set_259" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install systemd-journal-remote Package", - "remarks": "rule_set_262" + "remarks": "rule_set_259" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_systemd-journal-remote_installed", - "remarks": "rule_set_262" + "remarks": "rule_set_259" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install systemd-journal-remote Package", - "remarks": "rule_set_262" + "remarks": "rule_set_259" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journal-upload_enabled", - "remarks": "rule_set_263" + "remarks": "rule_set_260" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journal-upload Service", - "remarks": "rule_set_263" + "remarks": "rule_set_260" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journal-upload_enabled", - "remarks": "rule_set_263" + "remarks": "rule_set_260" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journal-upload Service", - "remarks": "rule_set_263" + "remarks": "rule_set_260" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "socket_systemd-journal-remote_disabled", - "remarks": "rule_set_264" + "remarks": "rule_set_261" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable systemd-journal-remote Socket", - "remarks": "rule_set_264" + "remarks": "rule_set_261" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "socket_systemd-journal-remote_disabled", - "remarks": "rule_set_264" + "remarks": "rule_set_261" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable systemd-journal-remote Socket", - "remarks": "rule_set_264" + "remarks": "rule_set_261" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_disable_forward_to_syslog", - "remarks": "rule_set_265" + "remarks": "rule_set_262" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald ForwardToSyslog is disabled", - "remarks": "rule_set_265" + "remarks": "rule_set_262" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_disable_forward_to_syslog", - "remarks": "rule_set_265" + "remarks": "rule_set_262" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald ForwardToSyslog is disabled", - "remarks": "rule_set_265" + "remarks": "rule_set_262" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_compress", - "remarks": "rule_set_266" + "remarks": "rule_set_263" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to compress large log files", - "remarks": "rule_set_266" + "remarks": "rule_set_263" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_compress", - "remarks": "rule_set_266" + "remarks": "rule_set_263" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to compress large log files", - "remarks": "rule_set_266" + "remarks": "rule_set_263" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_storage", - "remarks": "rule_set_267" + "remarks": "rule_set_264" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to write log files to persistent disk", - "remarks": "rule_set_267" + "remarks": "rule_set_264" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_storage", - "remarks": "rule_set_267" + "remarks": "rule_set_264" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to write log files to persistent disk", - "remarks": "rule_set_267" + "remarks": "rule_set_264" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_268" + "remarks": "rule_set_265" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_268" + "remarks": "rule_set_265" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_268" + "remarks": "rule_set_265" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_268" + "remarks": "rule_set_265" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_269" + "remarks": "rule_set_266" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_269" + "remarks": "rule_set_266" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_269" + "remarks": "rule_set_266" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_269" + "remarks": "rule_set_266" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_270" + "remarks": "rule_set_267" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_270" + "remarks": "rule_set_267" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_270" + "remarks": "rule_set_267" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_270" + "remarks": "rule_set_267" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_passwd", - "remarks": "rule_set_271" + "remarks": "rule_set_268" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns passwd File", - "remarks": "rule_set_271" + "remarks": "rule_set_268" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_passwd", - "remarks": "rule_set_271" + "remarks": "rule_set_268" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns passwd File", - "remarks": "rule_set_271" + "remarks": "rule_set_268" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_passwd", - "remarks": "rule_set_272" + "remarks": "rule_set_269" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns passwd File", - "remarks": "rule_set_272" + "remarks": "rule_set_269" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_passwd", - "remarks": "rule_set_272" + "remarks": "rule_set_269" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns passwd File", - "remarks": "rule_set_272" + "remarks": "rule_set_269" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_passwd", - "remarks": "rule_set_273" + "remarks": "rule_set_270" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on passwd File", - "remarks": "rule_set_273" + "remarks": "rule_set_270" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_passwd", - "remarks": "rule_set_273" + "remarks": "rule_set_270" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on passwd File", - "remarks": "rule_set_273" + "remarks": "rule_set_270" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_passwd", - "remarks": "rule_set_274" + "remarks": "rule_set_271" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup passwd File", - "remarks": "rule_set_274" + "remarks": "rule_set_271" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_passwd", - "remarks": "rule_set_274" + "remarks": "rule_set_271" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup passwd File", - "remarks": "rule_set_274" + "remarks": "rule_set_271" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_passwd", - "remarks": "rule_set_275" + "remarks": "rule_set_272" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup passwd File", - "remarks": "rule_set_275" + "remarks": "rule_set_272" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_passwd", - "remarks": "rule_set_275" + "remarks": "rule_set_272" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup passwd File", - "remarks": "rule_set_275" + "remarks": "rule_set_272" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_passwd", - "remarks": "rule_set_276" + "remarks": "rule_set_273" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup passwd File", - "remarks": "rule_set_276" + "remarks": "rule_set_273" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_passwd", - "remarks": "rule_set_276" + "remarks": "rule_set_273" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup passwd File", - "remarks": "rule_set_276" + "remarks": "rule_set_273" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_group", - "remarks": "rule_set_277" + "remarks": "rule_set_274" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns group File", - "remarks": "rule_set_277" + "remarks": "rule_set_274" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_group", - "remarks": "rule_set_277" + "remarks": "rule_set_274" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns group File", - "remarks": "rule_set_277" + "remarks": "rule_set_274" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_group", - "remarks": "rule_set_278" + "remarks": "rule_set_275" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns group File", - "remarks": "rule_set_278" + "remarks": "rule_set_275" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_group", - "remarks": "rule_set_278" + "remarks": "rule_set_275" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns group File", - "remarks": "rule_set_278" + "remarks": "rule_set_275" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_group", - "remarks": "rule_set_279" + "remarks": "rule_set_276" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on group File", - "remarks": "rule_set_279" + "remarks": "rule_set_276" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_group", - "remarks": "rule_set_279" + "remarks": "rule_set_276" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on group File", - "remarks": "rule_set_279" + "remarks": "rule_set_276" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_group", - "remarks": "rule_set_280" + "remarks": "rule_set_277" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup group File", - "remarks": "rule_set_280" + "remarks": "rule_set_277" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_group", - "remarks": "rule_set_280" + "remarks": "rule_set_277" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup group File", - "remarks": "rule_set_280" + "remarks": "rule_set_277" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_group", - "remarks": "rule_set_281" + "remarks": "rule_set_278" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup group File", - "remarks": "rule_set_281" + "remarks": "rule_set_278" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_group", - "remarks": "rule_set_281" + "remarks": "rule_set_278" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup group File", - "remarks": "rule_set_281" + "remarks": "rule_set_278" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_group", - "remarks": "rule_set_282" + "remarks": "rule_set_279" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup group File", - "remarks": "rule_set_282" + "remarks": "rule_set_279" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_group", - "remarks": "rule_set_282" + "remarks": "rule_set_279" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup group File", - "remarks": "rule_set_282" + "remarks": "rule_set_279" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shadow", - "remarks": "rule_set_283" + "remarks": "rule_set_280" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns shadow File", - "remarks": "rule_set_283" + "remarks": "rule_set_280" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shadow", - "remarks": "rule_set_283" + "remarks": "rule_set_280" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns shadow File", - "remarks": "rule_set_283" + "remarks": "rule_set_280" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shadow", - "remarks": "rule_set_284" + "remarks": "rule_set_281" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns shadow File", - "remarks": "rule_set_284" + "remarks": "rule_set_281" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shadow", - "remarks": "rule_set_284" + "remarks": "rule_set_281" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns shadow File", - "remarks": "rule_set_284" + "remarks": "rule_set_281" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shadow", - "remarks": "rule_set_285" + "remarks": "rule_set_282" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on shadow File", - "remarks": "rule_set_285" + "remarks": "rule_set_282" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shadow", - "remarks": "rule_set_285" + "remarks": "rule_set_282" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on shadow File", - "remarks": "rule_set_285" + "remarks": "rule_set_282" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_shadow", - "remarks": "rule_set_286" + "remarks": "rule_set_283" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup shadow File", - "remarks": "rule_set_286" + "remarks": "rule_set_283" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_shadow", - "remarks": "rule_set_286" + "remarks": "rule_set_283" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup shadow File", - "remarks": "rule_set_286" + "remarks": "rule_set_283" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_shadow", - "remarks": "rule_set_287" + "remarks": "rule_set_284" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup shadow File", - "remarks": "rule_set_287" + "remarks": "rule_set_284" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_shadow", - "remarks": "rule_set_287" + "remarks": "rule_set_284" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup shadow File", - "remarks": "rule_set_287" + "remarks": "rule_set_284" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_shadow", - "remarks": "rule_set_288" + "remarks": "rule_set_285" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup shadow File", - "remarks": "rule_set_288" + "remarks": "rule_set_285" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_shadow", - "remarks": "rule_set_288" + "remarks": "rule_set_285" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup shadow File", - "remarks": "rule_set_288" + "remarks": "rule_set_285" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_gshadow", - "remarks": "rule_set_289" + "remarks": "rule_set_286" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns gshadow File", - "remarks": "rule_set_289" + "remarks": "rule_set_286" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_gshadow", - "remarks": "rule_set_289" + "remarks": "rule_set_286" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns gshadow File", - "remarks": "rule_set_289" + "remarks": "rule_set_286" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_gshadow", - "remarks": "rule_set_290" + "remarks": "rule_set_287" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns gshadow File", - "remarks": "rule_set_290" + "remarks": "rule_set_287" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_gshadow", - "remarks": "rule_set_290" + "remarks": "rule_set_287" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns gshadow File", - "remarks": "rule_set_290" + "remarks": "rule_set_287" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_gshadow", - "remarks": "rule_set_291" + "remarks": "rule_set_288" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on gshadow File", - "remarks": "rule_set_291" + "remarks": "rule_set_288" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_gshadow", - "remarks": "rule_set_291" + "remarks": "rule_set_288" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on gshadow File", - "remarks": "rule_set_291" + "remarks": "rule_set_288" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_gshadow", - "remarks": "rule_set_292" + "remarks": "rule_set_289" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup gshadow File", - "remarks": "rule_set_292" + "remarks": "rule_set_289" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_gshadow", - "remarks": "rule_set_292" + "remarks": "rule_set_289" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup gshadow File", - "remarks": "rule_set_292" + "remarks": "rule_set_289" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_gshadow", - "remarks": "rule_set_293" + "remarks": "rule_set_290" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup gshadow File", - "remarks": "rule_set_293" + "remarks": "rule_set_290" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_gshadow", - "remarks": "rule_set_293" + "remarks": "rule_set_290" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup gshadow File", - "remarks": "rule_set_293" + "remarks": "rule_set_290" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_gshadow", - "remarks": "rule_set_294" + "remarks": "rule_set_291" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup gshadow File", - "remarks": "rule_set_294" + "remarks": "rule_set_291" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_gshadow", - "remarks": "rule_set_294" + "remarks": "rule_set_291" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup gshadow File", - "remarks": "rule_set_294" + "remarks": "rule_set_291" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shells", - "remarks": "rule_set_295" + "remarks": "rule_set_292" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/shells File", - "remarks": "rule_set_295" + "remarks": "rule_set_292" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shells", - "remarks": "rule_set_295" + "remarks": "rule_set_292" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/shells File", - "remarks": "rule_set_295" + "remarks": "rule_set_292" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shells", - "remarks": "rule_set_296" + "remarks": "rule_set_293" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Who Owns /etc/shells File", - "remarks": "rule_set_296" + "remarks": "rule_set_293" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shells", - "remarks": "rule_set_296" + "remarks": "rule_set_293" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Who Owns /etc/shells File", - "remarks": "rule_set_296" + "remarks": "rule_set_293" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shells", - "remarks": "rule_set_297" + "remarks": "rule_set_294" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/shells File", - "remarks": "rule_set_297" + "remarks": "rule_set_294" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shells", - "remarks": "rule_set_297" + "remarks": "rule_set_294" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/shells File", - "remarks": "rule_set_297" + "remarks": "rule_set_294" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd", - "remarks": "rule_set_298" + "remarks": "rule_set_295" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd File", - "remarks": "rule_set_298" + "remarks": "rule_set_295" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd", - "remarks": "rule_set_298" + "remarks": "rule_set_295" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd File", - "remarks": "rule_set_298" + "remarks": "rule_set_295" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd", - "remarks": "rule_set_299" + "remarks": "rule_set_296" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd File", - "remarks": "rule_set_299" + "remarks": "rule_set_296" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd", - "remarks": "rule_set_299" + "remarks": "rule_set_296" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd File", - "remarks": "rule_set_299" + "remarks": "rule_set_296" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd", - "remarks": "rule_set_300" + "remarks": "rule_set_297" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd File", - "remarks": "rule_set_300" + "remarks": "rule_set_297" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd", - "remarks": "rule_set_300" + "remarks": "rule_set_297" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd File", - "remarks": "rule_set_300" + "remarks": "rule_set_297" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd_old", - "remarks": "rule_set_301" + "remarks": "rule_set_298" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_301" + "remarks": "rule_set_298" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd_old", - "remarks": "rule_set_301" + "remarks": "rule_set_298" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_301" + "remarks": "rule_set_298" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd_old", - "remarks": "rule_set_302" + "remarks": "rule_set_299" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_302" + "remarks": "rule_set_299" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd_old", - "remarks": "rule_set_302" + "remarks": "rule_set_299" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_302" + "remarks": "rule_set_299" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd_old", - "remarks": "rule_set_303" + "remarks": "rule_set_300" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd.old File", - "remarks": "rule_set_303" + "remarks": "rule_set_300" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd_old", - "remarks": "rule_set_303" + "remarks": "rule_set_300" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd.old File", - "remarks": "rule_set_303" + "remarks": "rule_set_300" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_304" + "remarks": "rule_set_301" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_304" + "remarks": "rule_set_301" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_304" + "remarks": "rule_set_301" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_304" + "remarks": "rule_set_301" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_305" + "remarks": "rule_set_302" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_305" + "remarks": "rule_set_302" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_305" + "remarks": "rule_set_302" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_305" + "remarks": "rule_set_302" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_unowned_by_user", - "remarks": "rule_set_306" + "remarks": "rule_set_303" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a User", - "remarks": "rule_set_306" + "remarks": "rule_set_303" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_unowned_by_user", - "remarks": "rule_set_306" + "remarks": "rule_set_303" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a User", - "remarks": "rule_set_306" + "remarks": "rule_set_303" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_ungroupowned", - "remarks": "rule_set_307" + "remarks": "rule_set_304" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a Group", - "remarks": "rule_set_307" + "remarks": "rule_set_304" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_ungroupowned", - "remarks": "rule_set_307" + "remarks": "rule_set_304" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a Group", - "remarks": "rule_set_307" + "remarks": "rule_set_304" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_all_shadowed", - "remarks": "rule_set_308" + "remarks": "rule_set_305" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify All Account Password Hashes are Shadowed", - "remarks": "rule_set_308" + "remarks": "rule_set_305" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_all_shadowed", - "remarks": "rule_set_308" + "remarks": "rule_set_305" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify All Account Password Hashes are Shadowed", - "remarks": "rule_set_308" + "remarks": "rule_set_305" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords_etc_shadow", - "remarks": "rule_set_309" + "remarks": "rule_set_306" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure There Are No Accounts With Blank or Null Passwords", - "remarks": "rule_set_309" + "remarks": "rule_set_306" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords_etc_shadow", - "remarks": "rule_set_309" + "remarks": "rule_set_306" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure There Are No Accounts With Blank or Null Passwords", - "remarks": "rule_set_309" + "remarks": "rule_set_306" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gid_passwd_group_same", - "remarks": "rule_set_310" + "remarks": "rule_set_307" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", - "remarks": "rule_set_310" + "remarks": "rule_set_307" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gid_passwd_group_same", - "remarks": "rule_set_310" + "remarks": "rule_set_307" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", - "remarks": "rule_set_310" + "remarks": "rule_set_307" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_id", - "remarks": "rule_set_311" + "remarks": "rule_set_308" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique User IDs", - "remarks": "rule_set_311" + "remarks": "rule_set_308" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_id", - "remarks": "rule_set_311" + "remarks": "rule_set_308" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique User IDs", - "remarks": "rule_set_311" + "remarks": "rule_set_308" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_id", - "remarks": "rule_set_312" + "remarks": "rule_set_309" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group ID", - "remarks": "rule_set_312" + "remarks": "rule_set_309" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_id", - "remarks": "rule_set_312" + "remarks": "rule_set_309" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group ID", - "remarks": "rule_set_312" + "remarks": "rule_set_309" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_name", - "remarks": "rule_set_313" + "remarks": "rule_set_310" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique Names", - "remarks": "rule_set_313" + "remarks": "rule_set_310" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_name", - "remarks": "rule_set_313" + "remarks": "rule_set_310" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique Names", - "remarks": "rule_set_313" + "remarks": "rule_set_310" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_name", - "remarks": "rule_set_314" + "remarks": "rule_set_311" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group Names", - "remarks": "rule_set_314" + "remarks": "rule_set_311" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_name", - "remarks": "rule_set_314" + "remarks": "rule_set_311" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group Names", - "remarks": "rule_set_314" + "remarks": "rule_set_311" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_interactive_home_directory_exists", - "remarks": "rule_set_315" + "remarks": "rule_set_312" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive Users Home Directories Must Exist", - "remarks": "rule_set_315" + "remarks": "rule_set_312" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_interactive_home_directory_exists", - "remarks": "rule_set_315" + "remarks": "rule_set_312" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive Users Home Directories Must Exist", - "remarks": "rule_set_315" + "remarks": "rule_set_312" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_home_directories", - "remarks": "rule_set_316" + "remarks": "rule_set_313" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Be Owned By The Primary User", - "remarks": "rule_set_316" + "remarks": "rule_set_313" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_home_directories", - "remarks": "rule_set_316" + "remarks": "rule_set_313" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Be Owned By The Primary User", - "remarks": "rule_set_316" + "remarks": "rule_set_313" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_home_directories", - "remarks": "rule_set_317" + "remarks": "rule_set_314" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", - "remarks": "rule_set_317" + "remarks": "rule_set_314" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_home_directories", - "remarks": "rule_set_317" + "remarks": "rule_set_314" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", - "remarks": "rule_set_317" + "remarks": "rule_set_314" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_318" + "remarks": "rule_set_315" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_318" + "remarks": "rule_set_315" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_318" + "remarks": "rule_set_315" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_318" + "remarks": "rule_set_315" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_319" + "remarks": "rule_set_316" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_319" + "remarks": "rule_set_316" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_319" + "remarks": "rule_set_316" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_319" + "remarks": "rule_set_316" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_no_world_writable_programs", - "remarks": "rule_set_320" + "remarks": "rule_set_317" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Not Run World-Writable Programs", - "remarks": "rule_set_320" + "remarks": "rule_set_317" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_no_world_writable_programs", - "remarks": "rule_set_320" + "remarks": "rule_set_317" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Not Run World-Writable Programs", - "remarks": "rule_set_320" + "remarks": "rule_set_317" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_321" + "remarks": "rule_set_318" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_321" + "remarks": "rule_set_318" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_321" + "remarks": "rule_set_318" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_321" + "remarks": "rule_set_318" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_forward_files", - "remarks": "rule_set_322" + "remarks": "rule_set_319" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .forward Files Exist", - "remarks": "rule_set_322" + "remarks": "rule_set_319" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_forward_files", - "remarks": "rule_set_322" + "remarks": "rule_set_319" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .forward Files Exist", - "remarks": "rule_set_322" + "remarks": "rule_set_319" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_netrc_files", - "remarks": "rule_set_323" + "remarks": "rule_set_320" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No netrc Files Exist", - "remarks": "rule_set_323" + "remarks": "rule_set_320" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_netrc_files", - "remarks": "rule_set_323" + "remarks": "rule_set_320" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No netrc Files Exist", - "remarks": "rule_set_323" + "remarks": "rule_set_320" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rhost_files", - "remarks": "rule_set_324" + "remarks": "rule_set_321" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .rhost Files Exist", - "remarks": "rule_set_324" + "remarks": "rule_set_321" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rhost_files", - "remarks": "rule_set_324" + "remarks": "rule_set_321" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .rhost Files Exist", - "remarks": "rule_set_324" + "remarks": "rule_set_321" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_bash_history", - "remarks": "rule_set_325" + "remarks": "rule_set_322" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure User Bash History File Has Correct Permissions", - "remarks": "rule_set_325" + "remarks": "rule_set_322" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_bash_history", - "remarks": "rule_set_325" + "remarks": "rule_set_322" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure User Bash History File Has Correct Permissions", - "remarks": "rule_set_325" + "remarks": "rule_set_322" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_overlayfs_disabled", - "remarks": "rule_set_326" + "remarks": "rule_set_323" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure overlayfs kernel module is not available", - "remarks": "rule_set_326" + "remarks": "rule_set_323" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_overlayfs_disabled", - "remarks": "rule_set_326" + "remarks": "rule_set_323" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure overlayfs kernel module is not available", - "remarks": "rule_set_326" + "remarks": "rule_set_323" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_squashfs_disabled", - "remarks": "rule_set_327" + "remarks": "rule_set_324" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Mounting of squashfs", - "remarks": "rule_set_327" + "remarks": "rule_set_324" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_squashfs_disabled", - "remarks": "rule_set_327" + "remarks": "rule_set_324" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Mounting of squashfs", - "remarks": "rule_set_327" + "remarks": "rule_set_324" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_udf_disabled", - "remarks": "rule_set_328" + "remarks": "rule_set_325" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Mounting of udf", - "remarks": "rule_set_328" + "remarks": "rule_set_325" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_udf_disabled", - "remarks": "rule_set_328" + "remarks": "rule_set_325" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Mounting of udf", - "remarks": "rule_set_328" + "remarks": "rule_set_325" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_home", - "remarks": "rule_set_329" + "remarks": "rule_set_326" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /home Located On Separate Partition", - "remarks": "rule_set_329" + "remarks": "rule_set_326" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_home", - "remarks": "rule_set_329" + "remarks": "rule_set_326" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /home Located On Separate Partition", - "remarks": "rule_set_329" + "remarks": "rule_set_326" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var", - "remarks": "rule_set_330" + "remarks": "rule_set_327" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var Located On Separate Partition", - "remarks": "rule_set_330" + "remarks": "rule_set_327" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var", - "remarks": "rule_set_330" + "remarks": "rule_set_327" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var Located On Separate Partition", - "remarks": "rule_set_330" + "remarks": "rule_set_327" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_tmp", - "remarks": "rule_set_331" + "remarks": "rule_set_328" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/tmp Located On Separate Partition", - "remarks": "rule_set_331" + "remarks": "rule_set_328" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_tmp", - "remarks": "rule_set_331" + "remarks": "rule_set_328" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/tmp Located On Separate Partition", - "remarks": "rule_set_331" + "remarks": "rule_set_328" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log", - "remarks": "rule_set_332" + "remarks": "rule_set_329" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log Located On Separate Partition", - "remarks": "rule_set_332" + "remarks": "rule_set_329" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log", - "remarks": "rule_set_332" + "remarks": "rule_set_329" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log Located On Separate Partition", - "remarks": "rule_set_332" + "remarks": "rule_set_329" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log_audit", - "remarks": "rule_set_333" + "remarks": "rule_set_330" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log/audit Located On Separate Partition", - "remarks": "rule_set_333" + "remarks": "rule_set_330" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log_audit", - "remarks": "rule_set_333" + "remarks": "rule_set_330" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log/audit Located On Separate Partition", - "remarks": "rule_set_333" + "remarks": "rule_set_330" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_weak_deps", - "remarks": "rule_set_334" + "remarks": "rule_set_331" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Installation of Weak Dependencies in DNF", - "remarks": "rule_set_334" + "remarks": "rule_set_331" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_weak_deps", - "remarks": "rule_set_334" + "remarks": "rule_set_331" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Installation of Weak Dependencies in DNF", - "remarks": "rule_set_334" + "remarks": "rule_set_331" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_state", - "remarks": "rule_set_335" + "remarks": "rule_set_332" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SELinux State is Enforcing", - "remarks": "rule_set_335" + "remarks": "rule_set_332" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_state", - "remarks": "rule_set_335" + "remarks": "rule_set_332" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SELinux State is Enforcing", - "remarks": "rule_set_335" + "remarks": "rule_set_332" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_symlinks", - "remarks": "rule_set_336" + "remarks": "rule_set_333" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", - "remarks": "rule_set_336" + "remarks": "rule_set_333" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_symlinks", - "remarks": "rule_set_336" + "remarks": "rule_set_333" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", - "remarks": "rule_set_336" + "remarks": "rule_set_333" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "xwayland_disabled", - "remarks": "rule_set_337" + "remarks": "rule_set_334" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable XWayland", - "remarks": "rule_set_337" + "remarks": "rule_set_334" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "xwayland_disabled", - "remarks": "rule_set_337" + "remarks": "rule_set_334" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable XWayland", - "remarks": "rule_set_337" + "remarks": "rule_set_334" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_cockpit_disabled", - "remarks": "rule_set_338" + "remarks": "rule_set_335" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Cockpit Management Server", - "remarks": "rule_set_338" + "remarks": "rule_set_335" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_cockpit_disabled", - "remarks": "rule_set_338" + "remarks": "rule_set_335" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Cockpit Management Server", - "remarks": "rule_set_338" + "remarks": "rule_set_335" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_gdm_removed", - "remarks": "rule_set_339" + "remarks": "rule_set_336" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove the GDM Package Group", - "remarks": "rule_set_339" + "remarks": "rule_set_336" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_gdm_removed", - "remarks": "rule_set_339" + "remarks": "rule_set_336" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove the GDM Package Group", - "remarks": "rule_set_339" + "remarks": "rule_set_336" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_xorg-x11-server-Xwayland_removed", - "remarks": "rule_set_340" + "remarks": "rule_set_337" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove the X Windows Xwayland Package", - "remarks": "rule_set_340" + "remarks": "rule_set_337" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_xorg-x11-server-Xwayland_removed", - "remarks": "rule_set_340" + "remarks": "rule_set_337" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove the X Windows Xwayland Package", - "remarks": "rule_set_340" + "remarks": "rule_set_337" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_openldap-clients_removed", - "remarks": "rule_set_341" + "remarks": "rule_set_338" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure LDAP client is not installed", - "remarks": "rule_set_341" + "remarks": "rule_set_338" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_openldap-clients_removed", - "remarks": "rule_set_341" + "remarks": "rule_set_338" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure LDAP client is not installed", - "remarks": "rule_set_341" + "remarks": "rule_set_338" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_ip_forward", - "remarks": "rule_set_342" + "remarks": "rule_set_339" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IP Forwarding on IPv4 Interfaces", - "remarks": "rule_set_342" + "remarks": "rule_set_339" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_ip_forward", - "remarks": "rule_set_342" + "remarks": "rule_set_339" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IP Forwarding on IPv4 Interfaces", - "remarks": "rule_set_342" + "remarks": "rule_set_339" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_forwarding", - "remarks": "rule_set_343" + "remarks": "rule_set_340" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Forwarding", - "remarks": "rule_set_343" + "remarks": "rule_set_340" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_forwarding", - "remarks": "rule_set_343" + "remarks": "rule_set_340" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Forwarding", - "remarks": "rule_set_343" + "remarks": "rule_set_340" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_gssapi_auth", - "remarks": "rule_set_344" + "remarks": "rule_set_341" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GSSAPI Authentication", - "remarks": "rule_set_344" + "remarks": "rule_set_341" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_gssapi_auth", - "remarks": "rule_set_344" + "remarks": "rule_set_341" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GSSAPI Authentication", - "remarks": "rule_set_344" + "remarks": "rule_set_341" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_nopasswd", - "remarks": "rule_set_345" + "remarks": "rule_set_342" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD", - "remarks": "rule_set_345" + "remarks": "rule_set_342" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_nopasswd", - "remarks": "rule_set_345" + "remarks": "rule_set_342" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD", - "remarks": "rule_set_345" + "remarks": "rule_set_342" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny_root", - "remarks": "rule_set_346" + "remarks": "rule_set_343" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the root Account for Failed Password Attempts", - "remarks": "rule_set_346" + "remarks": "rule_set_343" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny_root", - "remarks": "rule_set_346" + "remarks": "rule_set_343" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the root Account for Failed Password Attempts", - "remarks": "rule_set_346" + "remarks": "rule_set_343" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_minimum_age_login_defs", - "remarks": "rule_set_347" + "remarks": "rule_set_344" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Minimum Age", - "remarks": "rule_set_347" + "remarks": "rule_set_344" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_minimum_age_login_defs", - "remarks": "rule_set_347" + "remarks": "rule_set_344" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Minimum Age", - "remarks": "rule_set_347" + "remarks": "rule_set_344" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_min_life_existing", - "remarks": "rule_set_348" + "remarks": "rule_set_345" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Minimum Age", - "remarks": "rule_set_348" + "remarks": "rule_set_345" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_min_life_existing", - "remarks": "rule_set_348" + "remarks": "rule_set_345" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Minimum Age", - "remarks": "rule_set_348" + "remarks": "rule_set_345" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_nologin_in_shells", - "remarks": "rule_set_349" + "remarks": "rule_set_346" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure nologin Shell is Not Listed in /etc/shells", - "remarks": "rule_set_349" + "remarks": "rule_set_346" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_nologin_in_shells", - "remarks": "rule_set_349" + "remarks": "rule_set_346" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure nologin Shell is Not Listed in /etc/shells", - "remarks": "rule_set_349" + "remarks": "rule_set_346" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit_installed", - "remarks": "rule_set_350" + "remarks": "rule_set_347" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit Subsystem is Installed", - "remarks": "rule_set_350" + "remarks": "rule_set_347" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit_installed", - "remarks": "rule_set_350" + "remarks": "rule_set_347" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit Subsystem is Installed", - "remarks": "rule_set_350" + "remarks": "rule_set_347" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit-libs_installed", - "remarks": "rule_set_351" + "remarks": "rule_set_348" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit-libs package as a part of audit Subsystem is Installed", - "remarks": "rule_set_351" + "remarks": "rule_set_348" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit-libs_installed", - "remarks": "rule_set_351" + "remarks": "rule_set_348" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit-libs package as a part of audit Subsystem is Installed", - "remarks": "rule_set_351" + "remarks": "rule_set_348" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_argument", - "remarks": "rule_set_352" + "remarks": "rule_set_349" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Auditing for Processes Which Start Prior to the Audit Daemon", - "remarks": "rule_set_352" + "remarks": "rule_set_349" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_argument", - "remarks": "rule_set_352" + "remarks": "rule_set_349" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Auditing for Processes Which Start Prior to the Audit Daemon", - "remarks": "rule_set_352" + "remarks": "rule_set_349" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_backlog_limit_argument", - "remarks": "rule_set_353" + "remarks": "rule_set_350" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Extend Audit Backlog Limit for the Audit Daemon", - "remarks": "rule_set_353" + "remarks": "rule_set_350" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_backlog_limit_argument", - "remarks": "rule_set_353" + "remarks": "rule_set_350" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Extend Audit Backlog Limit for the Audit Daemon", - "remarks": "rule_set_353" + "remarks": "rule_set_350" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_auditd_enabled", - "remarks": "rule_set_354" + "remarks": "rule_set_351" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable auditd Service", - "remarks": "rule_set_354" + "remarks": "rule_set_351" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_auditd_enabled", - "remarks": "rule_set_354" + "remarks": "rule_set_351" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable auditd Service", - "remarks": "rule_set_354" + "remarks": "rule_set_351" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_max_log_file", - "remarks": "rule_set_355" + "remarks": "rule_set_352" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Max Log File Size", - "remarks": "rule_set_355" + "remarks": "rule_set_352" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_max_log_file", - "remarks": "rule_set_355" + "remarks": "rule_set_352" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Max Log File Size", - "remarks": "rule_set_355" + "remarks": "rule_set_352" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_max_log_file_action", - "remarks": "rule_set_356" + "remarks": "rule_set_353" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd max_log_file_action Upon Reaching Maximum Log Size", - "remarks": "rule_set_356" + "remarks": "rule_set_353" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_max_log_file_action", - "remarks": "rule_set_356" + "remarks": "rule_set_353" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd max_log_file_action Upon Reaching Maximum Log Size", - "remarks": "rule_set_356" + "remarks": "rule_set_353" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_disk_error_action", - "remarks": "rule_set_357" + "remarks": "rule_set_354" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Disk Error Action on Disk Error", - "remarks": "rule_set_357" + "remarks": "rule_set_354" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_disk_error_action", - "remarks": "rule_set_357" + "remarks": "rule_set_354" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Disk Error Action on Disk Error", - "remarks": "rule_set_357" + "remarks": "rule_set_354" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_disk_full_action", - "remarks": "rule_set_358" + "remarks": "rule_set_355" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Disk Full Action when Disk Space Is Full", - "remarks": "rule_set_358" + "remarks": "rule_set_355" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_disk_full_action", - "remarks": "rule_set_358" + "remarks": "rule_set_355" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Disk Full Action when Disk Space Is Full", - "remarks": "rule_set_358" + "remarks": "rule_set_355" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_admin_space_left_action", - "remarks": "rule_set_359" + "remarks": "rule_set_356" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd admin_space_left Action on Low Disk Space", - "remarks": "rule_set_359" + "remarks": "rule_set_356" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_admin_space_left_action", - "remarks": "rule_set_359" + "remarks": "rule_set_356" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd admin_space_left Action on Low Disk Space", - "remarks": "rule_set_359" + "remarks": "rule_set_356" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_space_left_action", - "remarks": "rule_set_360" + "remarks": "rule_set_357" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd space_left Action on Low Disk Space", - "remarks": "rule_set_360" + "remarks": "rule_set_357" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_space_left_action", - "remarks": "rule_set_360" + "remarks": "rule_set_357" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd space_left Action on Low Disk Space", - "remarks": "rule_set_360" + "remarks": "rule_set_357" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_sysadmin_actions", - "remarks": "rule_set_361" + "remarks": "rule_set_358" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects System Administrator Actions", - "remarks": "rule_set_361" + "remarks": "rule_set_358" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_sysadmin_actions", - "remarks": "rule_set_361" + "remarks": "rule_set_358" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects System Administrator Actions", - "remarks": "rule_set_361" + "remarks": "rule_set_358" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_suid_auid_privilege_function", - "remarks": "rule_set_362" + "remarks": "rule_set_359" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events When Executables Are Run As Another User", - "remarks": "rule_set_362" + "remarks": "rule_set_359" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_suid_auid_privilege_function", - "remarks": "rule_set_362" + "remarks": "rule_set_359" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events When Executables Are Run As Another User", - "remarks": "rule_set_362" + "remarks": "rule_set_359" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_sudo_log_events", - "remarks": "rule_set_363" + "remarks": "rule_set_360" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to perform maintenance activities", - "remarks": "rule_set_363" + "remarks": "rule_set_360" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_sudo_log_events", - "remarks": "rule_set_363" + "remarks": "rule_set_360" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to perform maintenance activities", - "remarks": "rule_set_363" + "remarks": "rule_set_360" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_adjtimex", - "remarks": "rule_set_364" + "remarks": "rule_set_361" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through adjtimex", - "remarks": "rule_set_364" + "remarks": "rule_set_361" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_adjtimex", - "remarks": "rule_set_364" + "remarks": "rule_set_361" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through adjtimex", - "remarks": "rule_set_364" + "remarks": "rule_set_361" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_settimeofday", - "remarks": "rule_set_365" + "remarks": "rule_set_362" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through settimeofday", - "remarks": "rule_set_365" + "remarks": "rule_set_362" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_settimeofday", - "remarks": "rule_set_365" + "remarks": "rule_set_362" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through settimeofday", - "remarks": "rule_set_365" + "remarks": "rule_set_362" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_clock_settime", - "remarks": "rule_set_366" + "remarks": "rule_set_363" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through clock_settime", - "remarks": "rule_set_366" + "remarks": "rule_set_363" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_clock_settime", - "remarks": "rule_set_366" + "remarks": "rule_set_363" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through clock_settime", - "remarks": "rule_set_366" + "remarks": "rule_set_363" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_watch_localtime", - "remarks": "rule_set_367" + "remarks": "rule_set_364" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter the localtime File", - "remarks": "rule_set_367" + "remarks": "rule_set_364" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_watch_localtime", - "remarks": "rule_set_367" + "remarks": "rule_set_364" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter the localtime File", - "remarks": "rule_set_367" + "remarks": "rule_set_364" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_setdomainname", - "remarks": "rule_set_368" + "remarks": "rule_set_365" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - setdomainname", - "remarks": "rule_set_368" + "remarks": "rule_set_365" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_setdomainname", - "remarks": "rule_set_368" + "remarks": "rule_set_365" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - setdomainname", - "remarks": "rule_set_368" + "remarks": "rule_set_365" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_sethostname", - "remarks": "rule_set_369" + "remarks": "rule_set_366" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - sethostname", - "remarks": "rule_set_369" + "remarks": "rule_set_366" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_sethostname", - "remarks": "rule_set_369" + "remarks": "rule_set_366" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - sethostname", - "remarks": "rule_set_369" + "remarks": "rule_set_366" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_issue", - "remarks": "rule_set_370" + "remarks": "rule_set_367" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/issue", - "remarks": "rule_set_370" + "remarks": "rule_set_367" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_issue", - "remarks": "rule_set_370" + "remarks": "rule_set_367" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/issue", - "remarks": "rule_set_370" + "remarks": "rule_set_367" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_issue_net", - "remarks": "rule_set_371" + "remarks": "rule_set_368" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/issue.net", - "remarks": "rule_set_371" + "remarks": "rule_set_368" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_issue_net", - "remarks": "rule_set_371" + "remarks": "rule_set_368" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/issue.net", - "remarks": "rule_set_371" + "remarks": "rule_set_368" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_hosts", - "remarks": "rule_set_372" + "remarks": "rule_set_369" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/hosts", - "remarks": "rule_set_372" + "remarks": "rule_set_369" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_hosts", - "remarks": "rule_set_372" + "remarks": "rule_set_369" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/hosts", - "remarks": "rule_set_372" + "remarks": "rule_set_369" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_hostname_file", - "remarks": "rule_set_373" + "remarks": "rule_set_370" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/hostname", - "remarks": "rule_set_373" + "remarks": "rule_set_370" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_hostname_file", - "remarks": "rule_set_373" + "remarks": "rule_set_370" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/hostname", - "remarks": "rule_set_373" + "remarks": "rule_set_370" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_sysconfig_network", - "remarks": "rule_set_374" + "remarks": "rule_set_371" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/sysconfig/network", - "remarks": "rule_set_374" + "remarks": "rule_set_371" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_sysconfig_network", - "remarks": "rule_set_374" + "remarks": "rule_set_371" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/sysconfig/network", - "remarks": "rule_set_374" + "remarks": "rule_set_371" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_networkmanager_system_connections", - "remarks": "rule_set_375" + "remarks": "rule_set_372" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/system-connections/", - "remarks": "rule_set_375" + "remarks": "rule_set_372" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_networkmanager_system_connections", - "remarks": "rule_set_375" + "remarks": "rule_set_372" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/system-connections/", - "remarks": "rule_set_375" + "remarks": "rule_set_372" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_networkmanager", - "remarks": "rule_set_376" + "remarks": "rule_set_373" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/", - "remarks": "rule_set_376" + "remarks": "rule_set_373" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_networkmanager", - "remarks": "rule_set_376" + "remarks": "rule_set_373" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/", - "remarks": "rule_set_376" + "remarks": "rule_set_373" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands", - "remarks": "rule_set_377" + "remarks": "rule_set_374" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands", - "remarks": "rule_set_377" + "remarks": "rule_set_374" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands", - "remarks": "rule_set_377" + "remarks": "rule_set_374" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands", - "remarks": "rule_set_377" + "remarks": "rule_set_374" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_creat", - "remarks": "rule_set_378" + "remarks": "rule_set_375" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - creat", - "remarks": "rule_set_378" + "remarks": "rule_set_375" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_creat", - "remarks": "rule_set_378" + "remarks": "rule_set_375" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - creat", - "remarks": "rule_set_378" + "remarks": "rule_set_375" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_ftruncate", - "remarks": "rule_set_379" + "remarks": "rule_set_376" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - ftruncate", - "remarks": "rule_set_379" + "remarks": "rule_set_376" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_ftruncate", - "remarks": "rule_set_379" + "remarks": "rule_set_376" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - ftruncate", - "remarks": "rule_set_379" + "remarks": "rule_set_376" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_open", - "remarks": "rule_set_380" + "remarks": "rule_set_377" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - open", - "remarks": "rule_set_380" + "remarks": "rule_set_377" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_open", - "remarks": "rule_set_380" + "remarks": "rule_set_377" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - open", - "remarks": "rule_set_380" + "remarks": "rule_set_377" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_openat", - "remarks": "rule_set_381" + "remarks": "rule_set_378" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - openat", - "remarks": "rule_set_381" + "remarks": "rule_set_378" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_openat", - "remarks": "rule_set_381" + "remarks": "rule_set_378" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - openat", - "remarks": "rule_set_381" + "remarks": "rule_set_378" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_truncate", - "remarks": "rule_set_382" + "remarks": "rule_set_379" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - truncate", - "remarks": "rule_set_382" + "remarks": "rule_set_379" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_truncate", - "remarks": "rule_set_382" + "remarks": "rule_set_379" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - truncate", - "remarks": "rule_set_382" + "remarks": "rule_set_379" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_group", - "remarks": "rule_set_383" + "remarks": "rule_set_380" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/group", - "remarks": "rule_set_383" + "remarks": "rule_set_380" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_group", - "remarks": "rule_set_383" + "remarks": "rule_set_380" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/group", - "remarks": "rule_set_383" + "remarks": "rule_set_380" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_passwd", - "remarks": "rule_set_384" + "remarks": "rule_set_381" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/passwd", - "remarks": "rule_set_384" + "remarks": "rule_set_381" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_passwd", - "remarks": "rule_set_384" + "remarks": "rule_set_381" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/passwd", - "remarks": "rule_set_384" + "remarks": "rule_set_381" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_gshadow", - "remarks": "rule_set_385" + "remarks": "rule_set_382" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/gshadow", - "remarks": "rule_set_385" + "remarks": "rule_set_382" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_gshadow", - "remarks": "rule_set_385" + "remarks": "rule_set_382" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/gshadow", - "remarks": "rule_set_385" + "remarks": "rule_set_382" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_shadow", - "remarks": "rule_set_386" + "remarks": "rule_set_383" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/shadow", - "remarks": "rule_set_386" + "remarks": "rule_set_383" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_shadow", - "remarks": "rule_set_386" + "remarks": "rule_set_383" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/shadow", - "remarks": "rule_set_386" + "remarks": "rule_set_383" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_opasswd", - "remarks": "rule_set_387" + "remarks": "rule_set_384" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", - "remarks": "rule_set_387" + "remarks": "rule_set_384" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_opasswd", - "remarks": "rule_set_387" + "remarks": "rule_set_384" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", - "remarks": "rule_set_387" + "remarks": "rule_set_384" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_nsswitch_conf", - "remarks": "rule_set_388" + "remarks": "rule_set_385" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/nsswitch.conf", - "remarks": "rule_set_388" + "remarks": "rule_set_385" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_nsswitch_conf", - "remarks": "rule_set_388" + "remarks": "rule_set_385" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/nsswitch.conf", - "remarks": "rule_set_388" + "remarks": "rule_set_385" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_pam_conf", - "remarks": "rule_set_389" + "remarks": "rule_set_386" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/pam.conf", - "remarks": "rule_set_389" + "remarks": "rule_set_386" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_pam_conf", - "remarks": "rule_set_389" + "remarks": "rule_set_386" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/pam.conf", - "remarks": "rule_set_389" + "remarks": "rule_set_386" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_pamd", - "remarks": "rule_set_390" + "remarks": "rule_set_387" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/pam.d/", - "remarks": "rule_set_390" + "remarks": "rule_set_387" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_pamd", - "remarks": "rule_set_390" + "remarks": "rule_set_387" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/pam.d/", - "remarks": "rule_set_390" + "remarks": "rule_set_387" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chmod", - "remarks": "rule_set_391" + "remarks": "rule_set_388" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", - "remarks": "rule_set_391" + "remarks": "rule_set_388" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chmod", - "remarks": "rule_set_391" + "remarks": "rule_set_388" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", - "remarks": "rule_set_391" + "remarks": "rule_set_388" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmod", - "remarks": "rule_set_392" + "remarks": "rule_set_389" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmod", - "remarks": "rule_set_392" + "remarks": "rule_set_389" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmod", - "remarks": "rule_set_392" + "remarks": "rule_set_389" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmod", - "remarks": "rule_set_392" + "remarks": "rule_set_389" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat", - "remarks": "rule_set_393" + "remarks": "rule_set_390" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat", - "remarks": "rule_set_393" + "remarks": "rule_set_390" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat", - "remarks": "rule_set_393" + "remarks": "rule_set_390" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat", - "remarks": "rule_set_393" + "remarks": "rule_set_390" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat2", - "remarks": "rule_set_394" + "remarks": "rule_set_391" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat2", - "remarks": "rule_set_394" + "remarks": "rule_set_391" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat2", - "remarks": "rule_set_394" + "remarks": "rule_set_391" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat2", - "remarks": "rule_set_394" + "remarks": "rule_set_391" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chown", - "remarks": "rule_set_395" + "remarks": "rule_set_392" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chown", - "remarks": "rule_set_395" + "remarks": "rule_set_392" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chown", - "remarks": "rule_set_395" + "remarks": "rule_set_392" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chown", - "remarks": "rule_set_395" + "remarks": "rule_set_392" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchown", - "remarks": "rule_set_396" + "remarks": "rule_set_393" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchown", - "remarks": "rule_set_396" + "remarks": "rule_set_393" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchown", - "remarks": "rule_set_396" + "remarks": "rule_set_393" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchown", - "remarks": "rule_set_396" + "remarks": "rule_set_393" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchownat", - "remarks": "rule_set_397" + "remarks": "rule_set_394" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchownat", - "remarks": "rule_set_397" + "remarks": "rule_set_394" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchownat", - "remarks": "rule_set_397" + "remarks": "rule_set_394" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchownat", - "remarks": "rule_set_397" + "remarks": "rule_set_394" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lchown", - "remarks": "rule_set_398" + "remarks": "rule_set_395" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lchown", - "remarks": "rule_set_398" + "remarks": "rule_set_395" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lchown", - "remarks": "rule_set_398" + "remarks": "rule_set_395" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lchown", - "remarks": "rule_set_398" + "remarks": "rule_set_395" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fremovexattr", - "remarks": "rule_set_399" + "remarks": "rule_set_396" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fremovexattr", - "remarks": "rule_set_399" + "remarks": "rule_set_396" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fremovexattr", - "remarks": "rule_set_399" + "remarks": "rule_set_396" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fremovexattr", - "remarks": "rule_set_399" + "remarks": "rule_set_396" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fsetxattr", - "remarks": "rule_set_400" + "remarks": "rule_set_397" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fsetxattr", - "remarks": "rule_set_400" + "remarks": "rule_set_397" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fsetxattr", - "remarks": "rule_set_400" + "remarks": "rule_set_397" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fsetxattr", - "remarks": "rule_set_400" + "remarks": "rule_set_397" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lremovexattr", - "remarks": "rule_set_401" + "remarks": "rule_set_398" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lremovexattr", - "remarks": "rule_set_401" + "remarks": "rule_set_398" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lremovexattr", - "remarks": "rule_set_401" + "remarks": "rule_set_398" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lremovexattr", - "remarks": "rule_set_401" + "remarks": "rule_set_398" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lsetxattr", - "remarks": "rule_set_402" + "remarks": "rule_set_399" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lsetxattr", - "remarks": "rule_set_402" + "remarks": "rule_set_399" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lsetxattr", - "remarks": "rule_set_402" + "remarks": "rule_set_399" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lsetxattr", - "remarks": "rule_set_402" + "remarks": "rule_set_399" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_removexattr", - "remarks": "rule_set_403" + "remarks": "rule_set_400" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - removexattr", - "remarks": "rule_set_403" + "remarks": "rule_set_400" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_removexattr", - "remarks": "rule_set_403" + "remarks": "rule_set_400" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - removexattr", - "remarks": "rule_set_403" + "remarks": "rule_set_400" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_setxattr", - "remarks": "rule_set_404" + "remarks": "rule_set_401" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - setxattr", - "remarks": "rule_set_404" + "remarks": "rule_set_401" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_setxattr", - "remarks": "rule_set_404" + "remarks": "rule_set_401" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - setxattr", - "remarks": "rule_set_404" + "remarks": "rule_set_401" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_media_export", - "remarks": "rule_set_405" + "remarks": "rule_set_402" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Exporting to Media (successful)", - "remarks": "rule_set_405" + "remarks": "rule_set_402" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_media_export", - "remarks": "rule_set_405" + "remarks": "rule_set_402" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Exporting to Media (successful)", - "remarks": "rule_set_405" + "remarks": "rule_set_402" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_utmp", - "remarks": "rule_set_406" + "remarks": "rule_set_403" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information utmp", - "remarks": "rule_set_406" + "remarks": "rule_set_403" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_utmp", - "remarks": "rule_set_406" + "remarks": "rule_set_403" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information utmp", - "remarks": "rule_set_406" + "remarks": "rule_set_403" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_btmp", - "remarks": "rule_set_407" + "remarks": "rule_set_404" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information btmp", - "remarks": "rule_set_407" + "remarks": "rule_set_404" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_btmp", - "remarks": "rule_set_407" + "remarks": "rule_set_404" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information btmp", - "remarks": "rule_set_407" + "remarks": "rule_set_404" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_wtmp", - "remarks": "rule_set_408" + "remarks": "rule_set_405" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", - "remarks": "rule_set_408" + "remarks": "rule_set_405" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_wtmp", - "remarks": "rule_set_408" + "remarks": "rule_set_405" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", - "remarks": "rule_set_408" + "remarks": "rule_set_405" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_faillock", - "remarks": "rule_set_409" + "remarks": "rule_set_406" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - faillock", - "remarks": "rule_set_409" + "remarks": "rule_set_406" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_faillock", - "remarks": "rule_set_409" + "remarks": "rule_set_406" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - faillock", - "remarks": "rule_set_409" + "remarks": "rule_set_406" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_lastlog", - "remarks": "rule_set_410" + "remarks": "rule_set_407" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - lastlog", - "remarks": "rule_set_410" + "remarks": "rule_set_407" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_lastlog", - "remarks": "rule_set_410" + "remarks": "rule_set_407" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - lastlog", - "remarks": "rule_set_410" + "remarks": "rule_set_407" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlink", - "remarks": "rule_set_411" + "remarks": "rule_set_408" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlink", - "remarks": "rule_set_411" + "remarks": "rule_set_408" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlink", - "remarks": "rule_set_411" + "remarks": "rule_set_408" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlink", - "remarks": "rule_set_411" + "remarks": "rule_set_408" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlinkat", - "remarks": "rule_set_412" + "remarks": "rule_set_409" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlinkat", - "remarks": "rule_set_412" + "remarks": "rule_set_409" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlinkat", - "remarks": "rule_set_412" + "remarks": "rule_set_409" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlinkat", - "remarks": "rule_set_412" + "remarks": "rule_set_409" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rename", - "remarks": "rule_set_413" + "remarks": "rule_set_410" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rename", - "remarks": "rule_set_413" + "remarks": "rule_set_410" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rename", - "remarks": "rule_set_413" + "remarks": "rule_set_410" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rename", - "remarks": "rule_set_413" + "remarks": "rule_set_410" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat", - "remarks": "rule_set_414" + "remarks": "rule_set_411" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat", - "remarks": "rule_set_414" + "remarks": "rule_set_411" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat", - "remarks": "rule_set_414" + "remarks": "rule_set_411" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat", - "remarks": "rule_set_414" + "remarks": "rule_set_411" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat2", - "remarks": "rule_set_415" + "remarks": "rule_set_412" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat2", - "remarks": "rule_set_415" + "remarks": "rule_set_412" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat2", - "remarks": "rule_set_415" + "remarks": "rule_set_412" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat2", - "remarks": "rule_set_415" + "remarks": "rule_set_412" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_etc_selinux", - "remarks": "rule_set_416" + "remarks": "rule_set_413" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls (/etc/selinux)", - "remarks": "rule_set_416" + "remarks": "rule_set_413" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_etc_selinux", - "remarks": "rule_set_416" + "remarks": "rule_set_413" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls (/etc/selinux)", - "remarks": "rule_set_416" + "remarks": "rule_set_413" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_usr_share", - "remarks": "rule_set_417" + "remarks": "rule_set_414" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls in usr/share", - "remarks": "rule_set_417" + "remarks": "rule_set_414" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_usr_share", - "remarks": "rule_set_417" + "remarks": "rule_set_414" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls in usr/share", - "remarks": "rule_set_417" + "remarks": "rule_set_414" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chcon", - "remarks": "rule_set_418" + "remarks": "rule_set_415" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chcon", - "remarks": "rule_set_418" + "remarks": "rule_set_415" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chcon", - "remarks": "rule_set_418" + "remarks": "rule_set_415" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chcon", - "remarks": "rule_set_418" + "remarks": "rule_set_415" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_setfacl", - "remarks": "rule_set_419" + "remarks": "rule_set_416" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run setfacl", - "remarks": "rule_set_419" + "remarks": "rule_set_416" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_setfacl", - "remarks": "rule_set_419" + "remarks": "rule_set_416" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run setfacl", - "remarks": "rule_set_419" + "remarks": "rule_set_416" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chacl", - "remarks": "rule_set_420" + "remarks": "rule_set_417" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chacl", - "remarks": "rule_set_420" + "remarks": "rule_set_417" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chacl", - "remarks": "rule_set_420" + "remarks": "rule_set_417" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chacl", - "remarks": "rule_set_420" + "remarks": "rule_set_417" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_usermod", - "remarks": "rule_set_421" + "remarks": "rule_set_418" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - usermod", - "remarks": "rule_set_421" + "remarks": "rule_set_418" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_usermod", - "remarks": "rule_set_421" + "remarks": "rule_set_418" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - usermod", - "remarks": "rule_set_421" + "remarks": "rule_set_418" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_kmod", - "remarks": "rule_set_422" + "remarks": "rule_set_419" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - kmod", - "remarks": "rule_set_422" + "remarks": "rule_set_419" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_kmod", - "remarks": "rule_set_422" + "remarks": "rule_set_419" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - kmod", - "remarks": "rule_set_422" + "remarks": "rule_set_419" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_init", - "remarks": "rule_set_423" + "remarks": "rule_set_420" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading - init_module", - "remarks": "rule_set_423" + "remarks": "rule_set_420" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_init", - "remarks": "rule_set_423" + "remarks": "rule_set_420" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading - init_module", - "remarks": "rule_set_423" + "remarks": "rule_set_420" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_finit", - "remarks": "rule_set_424" + "remarks": "rule_set_421" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - finit_module", - "remarks": "rule_set_424" + "remarks": "rule_set_421" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_finit", - "remarks": "rule_set_424" + "remarks": "rule_set_421" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - finit_module", - "remarks": "rule_set_424" + "remarks": "rule_set_421" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_delete", - "remarks": "rule_set_425" + "remarks": "rule_set_422" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Unloading - delete_module", - "remarks": "rule_set_425" + "remarks": "rule_set_422" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_delete", - "remarks": "rule_set_425" + "remarks": "rule_set_422" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Unloading - delete_module", - "remarks": "rule_set_425" + "remarks": "rule_set_422" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_query", - "remarks": "rule_set_426" + "remarks": "rule_set_423" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - query_module", - "remarks": "rule_set_426" + "remarks": "rule_set_423" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_query", - "remarks": "rule_set_426" + "remarks": "rule_set_423" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - query_module", - "remarks": "rule_set_426" + "remarks": "rule_set_423" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_continue_loading", - "remarks": "rule_set_427" + "remarks": "rule_set_424" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Audit Configuration is Loaded Regardless of Errors", - "remarks": "rule_set_427" + "remarks": "rule_set_424" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_continue_loading", - "remarks": "rule_set_427" + "remarks": "rule_set_424" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Audit Configuration is Loaded Regardless of Errors", - "remarks": "rule_set_427" + "remarks": "rule_set_424" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_immutable", - "remarks": "rule_set_428" + "remarks": "rule_set_425" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Make the auditd Configuration Immutable", - "remarks": "rule_set_428" + "remarks": "rule_set_425" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_immutable", - "remarks": "rule_set_428" + "remarks": "rule_set_425" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Make the auditd Configuration Immutable", - "remarks": "rule_set_428" + "remarks": "rule_set_425" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_var_log_audit", - "remarks": "rule_set_429" + "remarks": "rule_set_426" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0750 or Less Permissive", - "remarks": "rule_set_429" + "remarks": "rule_set_426" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_var_log_audit", - "remarks": "rule_set_429" + "remarks": "rule_set_426" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0750 or Less Permissive", - "remarks": "rule_set_429" + "remarks": "rule_set_426" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_var_log_audit", - "remarks": "rule_set_430" + "remarks": "rule_set_427" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0640 or Less Permissive", - "remarks": "rule_set_430" + "remarks": "rule_set_427" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_var_log_audit", - "remarks": "rule_set_430" + "remarks": "rule_set_427" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0640 or Less Permissive", - "remarks": "rule_set_430" + "remarks": "rule_set_427" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_var_log_audit_stig", - "remarks": "rule_set_431" + "remarks": "rule_set_428" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Owned By Root", - "remarks": "rule_set_431" + "remarks": "rule_set_428" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_var_log_audit_stig", - "remarks": "rule_set_431" + "remarks": "rule_set_428" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Owned By Root", - "remarks": "rule_set_431" + "remarks": "rule_set_428" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_group_ownership_var_log_audit", - "remarks": "rule_set_432" + "remarks": "rule_set_429" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Group Owned By Root", - "remarks": "rule_set_432" + "remarks": "rule_set_429" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_group_ownership_var_log_audit", - "remarks": "rule_set_432" + "remarks": "rule_set_429" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Group Owned By Root", - "remarks": "rule_set_432" + "remarks": "rule_set_429" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_audit_configuration", - "remarks": "rule_set_433" + "remarks": "rule_set_430" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Permissions are 640 or More Restrictive", - "remarks": "rule_set_433" + "remarks": "rule_set_430" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_audit_configuration", - "remarks": "rule_set_433" + "remarks": "rule_set_430" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Permissions are 640 or More Restrictive", - "remarks": "rule_set_433" + "remarks": "rule_set_430" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_audit_configuration", - "remarks": "rule_set_434" + "remarks": "rule_set_431" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Must Be Owned By Root", - "remarks": "rule_set_434" + "remarks": "rule_set_431" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_audit_configuration", - "remarks": "rule_set_434" + "remarks": "rule_set_431" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Must Be Owned By Root", - "remarks": "rule_set_434" + "remarks": "rule_set_431" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_audit_configuration", - "remarks": "rule_set_435" + "remarks": "rule_set_432" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Must Be Owned By Group root", - "remarks": "rule_set_435" + "remarks": "rule_set_432" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_audit_configuration", - "remarks": "rule_set_435" + "remarks": "rule_set_432" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Must Be Owned By Group root", - "remarks": "rule_set_435" + "remarks": "rule_set_432" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_audit_binaries", - "remarks": "rule_set_436" + "remarks": "rule_set_433" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools Have Mode 0755 or less", - "remarks": "rule_set_436" + "remarks": "rule_set_433" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_audit_binaries", - "remarks": "rule_set_436" + "remarks": "rule_set_433" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools Have Mode 0755 or less", - "remarks": "rule_set_436" + "remarks": "rule_set_433" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_audit_binaries", - "remarks": "rule_set_437" + "remarks": "rule_set_434" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools are owned by root", - "remarks": "rule_set_437" + "remarks": "rule_set_434" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_audit_binaries", - "remarks": "rule_set_437" + "remarks": "rule_set_434" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools are owned by root", - "remarks": "rule_set_437" + "remarks": "rule_set_434" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_audit_binaries", - "remarks": "rule_set_438" + "remarks": "rule_set_435" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools are owned by group root", - "remarks": "rule_set_438" + "remarks": "rule_set_435" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_audit_binaries", - "remarks": "rule_set_438" + "remarks": "rule_set_435" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools are owned by group root", - "remarks": "rule_set_438" + "remarks": "rule_set_435" } ], "control-implementations": [ { - "uuid": "7775bf24-0b9a-45b0-ab98-c71b6b694543", + "uuid": "9fb00875-f492-49df-860c-1d1da42b9481", "source": "trestle://profiles/rhel10-cis_rhel10-l2_server/profile.json", "description": "Control implementation for cis", "props": [ @@ -25266,7 +25142,7 @@ ], "implemented-requirements": [ { - "uuid": "51f40174-4f7d-4332-87fd-151d378c9481", + "uuid": "8fcbcd6e-1cab-46e6-a394-c69208293c4a", "control-id": "cis_rhel10_1-1.1.6", "description": "No notes for control-id 1.1.1.6.", "props": [ @@ -25283,7 +25159,7 @@ ] }, { - "uuid": "36493181-3457-467a-a606-cbd06c4e99d1", + "uuid": "d62dbcf8-2cc0-4b6c-b668-db5e430993b9", "control-id": "cis_rhel10_1-1.1.7", "description": "No notes for control-id 1.1.1.7.", "props": [ @@ -25300,7 +25176,7 @@ ] }, { - "uuid": "0a211ad4-5ab7-49a3-b9e3-2be9f2c84898", + "uuid": "ca7a05cd-0081-4e01-9780-d1dd170cb484", "control-id": "cis_rhel10_1-1.1.8", "description": "No notes for control-id 1.1.1.8.", "props": [ @@ -25317,7 +25193,7 @@ ] }, { - "uuid": "f97e5326-ffc8-4cf3-a3ec-5d7492c49db6", + "uuid": "1fd99b3e-6ff2-468c-8381-df653c198419", "control-id": "cis_rhel10_1-1.2.3.1", "description": "No notes for control-id 1.1.2.3.1.", "props": [ @@ -25334,7 +25210,7 @@ ] }, { - "uuid": "632c4123-3743-4199-b9da-99bf0f7d0d69", + "uuid": "c08f63ee-c8ae-487d-ac30-d0d1074e3f16", "control-id": "cis_rhel10_1-1.2.4.1", "description": "No notes for control-id 1.1.2.4.1.", "props": [ @@ -25351,7 +25227,7 @@ ] }, { - "uuid": "f6df4a66-6b58-4fd4-95fa-f21a7f7d4b22", + "uuid": "17413451-67a2-4884-b9e3-ea6abce1ddea", "control-id": "cis_rhel10_1-1.2.5.1", "description": "No notes for control-id 1.1.2.5.1.", "props": [ @@ -25368,7 +25244,7 @@ ] }, { - "uuid": "bcbd5d5a-a666-4999-8104-7aa0814e7461", + "uuid": "ad1dde29-c436-4610-9722-ed887b11b468", "control-id": "cis_rhel10_1-1.2.6.1", "description": "No notes for control-id 1.1.2.6.1.", "props": [ @@ -25385,7 +25261,7 @@ ] }, { - "uuid": "2f70e406-7310-40da-a5ea-26bbe9f88188", + "uuid": "c00e71b3-e8b4-41b2-93bd-a435114811ca", "control-id": "cis_rhel10_1-1.2.7.1", "description": "No notes for control-id 1.1.2.7.1.", "props": [ @@ -25402,7 +25278,7 @@ ] }, { - "uuid": "b0da200c-57e4-41a6-a88e-61b96a7acaf8", + "uuid": "e21500d7-398a-4b4f-b3a0-4714bf62a28a", "control-id": "cis_rhel10_1-2.1.3", "description": "The description for control-id cis_rhel10_1-2.1.3.", "props": [ @@ -25415,7 +25291,7 @@ ] }, { - "uuid": "a168a144-9fa3-407a-8480-3e29031343c4", + "uuid": "2ff1fa11-54e2-465e-a069-8c7b04dbb22d", "control-id": "cis_rhel10_1-2.1.5", "description": "No notes for control-id 1.2.1.5.", "props": [ @@ -25432,7 +25308,7 @@ ] }, { - "uuid": "23bca976-42a2-48af-85e4-9bb5d952d516", + "uuid": "8eae5f37-0064-4587-87b9-81d3e3ffda21", "control-id": "cis_rhel10_1-3.1.5", "description": "No notes for control-id 1.3.1.5.", "props": [ @@ -25449,7 +25325,7 @@ ] }, { - "uuid": "16a1a92e-4572-48f9-8d10-f78065735a7e", + "uuid": "bcd54a2e-2ea9-4698-912a-ef30ee047bd9", "control-id": "cis_rhel10_1-3.1.6", "description": "The description for control-id cis_rhel10_1-3.1.6.", "props": [ @@ -25462,7 +25338,7 @@ ] }, { - "uuid": "15ff9d5e-7020-4802-828e-bc44de189af2", + "uuid": "e1680c6d-e24c-44ff-bbac-492da55c1c12", "control-id": "cis_rhel10_1-5.3", "description": "No notes for control-id 1.5.3.", "props": [ @@ -25479,7 +25355,7 @@ ] }, { - "uuid": "83fcc49a-dfde-402a-a29d-d0312f920d97", + "uuid": "3ded6faa-31f5-44bc-b342-7a750ae5cee8", "control-id": "cis_rhel10_1-8.6", "description": "No notes for control-id 1.8.6.", "props": [ @@ -25496,7 +25372,7 @@ ] }, { - "uuid": "26a6252e-7c48-4ef5-b77e-117d8d4157ca", + "uuid": "16b6d02d-c86e-4fb6-b7d4-b3da88b4ff22", "control-id": "cis_rhel10_2-1.3", "description": "No notes for control-id 2.1.3.", "props": [ @@ -25513,7 +25389,7 @@ ] }, { - "uuid": "55da12ad-0623-46cb-82b3-90342e689770", + "uuid": "bcd338c6-3e4b-46b4-8588-d6d2dde824fe", "control-id": "cis_rhel10_2-1.19", "description": "No notes for control-id 2.1.19.", "props": [ @@ -25530,7 +25406,7 @@ ] }, { - "uuid": "290f78c1-5e19-4496-af5d-d3e58df83f97", + "uuid": "b6673ead-e1d1-4f79-9eab-c68fb3e06ddb", "control-id": "cis_rhel10_2-1.20", "description": "No notes for control-id 2.1.20.", "props": [ @@ -25547,7 +25423,7 @@ ] }, { - "uuid": "2e5dda27-4ac6-40fb-90ef-38df474ef186", + "uuid": "909912e0-9fce-4f54-9acc-262163f3cca7", "control-id": "cis_rhel10_2-2.2", "description": "No notes for control-id 2.2.2.", "props": [ @@ -25564,7 +25440,7 @@ ] }, { - "uuid": "a4696476-1842-43ee-bab5-63b71f2dd3cb", + "uuid": "bb0ed740-b6d3-495f-aaa1-3e634ddfc423", "control-id": "cis_rhel10_3-3.1.1", "description": "No notes for control-id 3.3.1.1.", "props": [ @@ -25581,7 +25457,7 @@ ] }, { - "uuid": "ab940c5f-08f8-4986-90e0-e28dd639cd97", + "uuid": "fc5acfbd-bfc6-4a27-b8a6-d04ed901363c", "control-id": "cis_rhel10_5-1.8", "description": "No notes for control-id 5.1.8.", "props": [ @@ -25598,7 +25474,7 @@ ] }, { - "uuid": "ad42af86-cefa-4b2a-84ef-23942c3e5e2b", + "uuid": "9b7ecc52-a164-4c23-a0f1-18d95257662e", "control-id": "cis_rhel10_5-1.9", "description": "No notes for control-id 5.1.9.", "props": [ @@ -25615,7 +25491,7 @@ ] }, { - "uuid": "4fee4f1d-877d-4c8d-95be-621e300c0999", + "uuid": "5618b9e5-63d2-47f8-99bc-e1aa5a5e6e50", "control-id": "cis_rhel10_5-2.4", "description": "No notes for control-id 5.2.4.", "props": [ @@ -25632,7 +25508,7 @@ ] }, { - "uuid": "4992f003-7350-4faa-85c7-c4816a002dfb", + "uuid": "a74e11c7-5097-4d79-8e8e-6a3586d1d135", "control-id": "cis_rhel10_5-3.2.1.3", "description": "No notes for control-id 5.3.2.1.3.", "props": [ @@ -25649,7 +25525,7 @@ ] }, { - "uuid": "bbe9fe70-077a-40ff-a6ab-c00a3f9f20e5", + "uuid": "177d3823-7358-4e1e-b7e6-0bfafa8693c9", "control-id": "cis_rhel10_5-4.1.2", "description": "No notes for control-id 5.4.1.2.", "props": [ @@ -25671,7 +25547,7 @@ ] }, { - "uuid": "3be4ed5c-7aa9-4cd5-afdb-1ae010608895", + "uuid": "97be2da8-7b7b-49bf-b0f0-41db0081867c", "control-id": "cis_rhel10_5-4.3.1", "description": "No notes for control-id 5.4.3.1.", "props": [ @@ -25688,7 +25564,7 @@ ] }, { - "uuid": "9121c560-bea3-4dcf-9813-6df02f8f2938", + "uuid": "cec5e254-d76c-4e29-9bf8-113db2682ed0", "control-id": "cis_rhel10_6-3.1.1", "description": "No notes for control-id 6.3.1.1.", "props": [ @@ -25710,7 +25586,7 @@ ] }, { - "uuid": "d71e478f-82d4-45d6-88d9-e073141b504d", + "uuid": "8b4bc9aa-c68a-43ce-8c54-b56bb4fecf77", "control-id": "cis_rhel10_6-3.1.2", "description": "No notes for control-id 6.3.1.2.", "props": [ @@ -25727,7 +25603,7 @@ ] }, { - "uuid": "8a4adf86-3f3d-4a7b-aa0a-513826d792ca", + "uuid": "8231963c-e710-4941-b48d-6976e7123398", "control-id": "cis_rhel10_6-3.1.3", "description": "No notes for control-id 6.3.1.3.", "props": [ @@ -25744,7 +25620,7 @@ ] }, { - "uuid": "da4e1a36-721d-4c12-94dd-f04dc9507bd6", + "uuid": "aa717eca-500f-45c5-94e5-f5ae71b22913", "control-id": "cis_rhel10_6-3.1.4", "description": "No notes for control-id 6.3.1.4.", "props": [ @@ -25761,7 +25637,7 @@ ] }, { - "uuid": "140afe82-170a-4094-9308-478c0a3ce295", + "uuid": "d551b6e5-d1e4-4ecc-9305-0cf811962b08", "control-id": "cis_rhel10_6-3.2.1", "description": "No notes for control-id 6.3.2.1.", "props": [ @@ -25778,7 +25654,7 @@ ] }, { - "uuid": "156bbecd-8de7-49c0-9881-8ac656dafbc2", + "uuid": "779ef02d-1b0a-4b3d-a40a-dccd5c156e81", "control-id": "cis_rhel10_6-3.2.2", "description": "No notes for control-id 6.3.2.2.", "props": [ @@ -25795,7 +25671,7 @@ ] }, { - "uuid": "96cd26cb-ca71-4368-a640-aec712ae18ee", + "uuid": "7601f9cb-277a-4075-8888-0fe9edb3b5d0", "control-id": "cis_rhel10_6-3.2.3", "description": "No notes for control-id 6.3.2.3.", "props": [ @@ -25817,7 +25693,7 @@ ] }, { - "uuid": "2a363e07-7ede-4877-8e0e-1340528f70ee", + "uuid": "9e256e4b-feb9-47c3-93de-badfe8b36372", "control-id": "cis_rhel10_6-3.2.4", "description": "No notes for control-id 6.3.2.4.", "props": [ @@ -25839,7 +25715,7 @@ ] }, { - "uuid": "70c2e36c-d053-48be-b739-07a8e1043b5a", + "uuid": "75e8f551-f73a-4371-a3f7-e496f23c633f", "control-id": "cis_rhel10_6-3.3.1", "description": "No notes for control-id 6.3.3.1.", "props": [ @@ -25856,7 +25732,7 @@ ] }, { - "uuid": "dfda5cfa-ab74-495d-9893-1b56346f635c", + "uuid": "4c53cc66-8853-4fe5-9ab0-0ccd21ff3254", "control-id": "cis_rhel10_6-3.3.2", "description": "No notes for control-id 6.3.3.2.", "props": [ @@ -25873,7 +25749,7 @@ ] }, { - "uuid": "369af7a5-f624-4682-882b-eabf1d27a1fb", + "uuid": "12a0e9ab-6d5c-452d-b859-dfc7f785fc5d", "control-id": "cis_rhel10_6-3.3.3", "description": "No notes for control-id 6.3.3.3.", "props": [ @@ -25890,7 +25766,7 @@ ] }, { - "uuid": "8887056b-559e-4b38-8dc6-7a40352dda96", + "uuid": "f461dcf5-a508-4dc2-b0b9-f92c71119395", "control-id": "cis_rhel10_6-3.3.4", "description": "No notes for control-id 6.3.3.4.", "props": [ @@ -25922,7 +25798,7 @@ ] }, { - "uuid": "2822747c-837c-40d4-a131-8e9ec15d9b7c", + "uuid": "d5212cd5-3c3e-4572-99d6-222b7ee92af3", "control-id": "cis_rhel10_6-3.3.5", "description": "No notes for control-id 6.3.3.5.", "props": [ @@ -25944,7 +25820,7 @@ ] }, { - "uuid": "7a064eaa-4e0a-4052-b12b-9afba785f655", + "uuid": "299ad60b-2a05-47d2-a129-1abe6493a823", "control-id": "cis_rhel10_6-3.3.6", "description": "No notes for control-id 6.3.3.6.", "props": [ @@ -25966,7 +25842,7 @@ ] }, { - "uuid": "3f6b4e3f-3268-4eb3-978e-bd5b9dca4567", + "uuid": "ac76e8b4-9b59-4b4d-9188-eb4e4213d2f4", "control-id": "cis_rhel10_6-3.3.7", "description": "No notes for control-id 6.3.3.7.", "props": [ @@ -25988,7 +25864,7 @@ ] }, { - "uuid": "24394f19-6a0e-4efe-a0fb-c3ef922df2f2", + "uuid": "936d38bf-fe16-40e7-9df7-04587314ea5e", "control-id": "cis_rhel10_6-3.3.8", "description": "No notes for control-id 6.3.3.8.", "props": [ @@ -26010,7 +25886,7 @@ ] }, { - "uuid": "c7e91010-a052-465b-9ab9-291befd5bff8", + "uuid": "57c6eba0-7784-463e-93cd-31a26ddc59c2", "control-id": "cis_rhel10_6-3.3.9", "description": "No notes for control-id 6.3.3.9.", "props": [ @@ -26027,7 +25903,7 @@ ] }, { - "uuid": "711a8df4-998f-4652-8bc5-1b520fbba82e", + "uuid": "977b5306-7611-435a-9f2d-de9fc1da6980", "control-id": "cis_rhel10_6-3.3.10", "description": "No notes for control-id 6.3.3.10.", "props": [ @@ -26044,7 +25920,7 @@ ] }, { - "uuid": "dddea162-14b6-461a-a795-cf83e8741cf9", + "uuid": "f4040820-92fd-498c-a4b4-f0d0aa68ead1", "control-id": "cis_rhel10_6-3.3.11", "description": "No notes for control-id 6.3.3.11.", "props": [ @@ -26081,7 +25957,7 @@ ] }, { - "uuid": "9944aa3c-8759-40f1-ac10-45ea44401f21", + "uuid": "be93bb99-77b6-45d8-8beb-b1d9079de5c8", "control-id": "cis_rhel10_6-3.3.12", "description": "No notes for control-id 6.3.3.12.", "props": [ @@ -26098,7 +25974,7 @@ ] }, { - "uuid": "4a552990-b02b-42c0-a114-0be8457dc83b", + "uuid": "df295a78-3ed8-4c11-9526-9e161394815c", "control-id": "cis_rhel10_6-3.3.13", "description": "No notes for control-id 6.3.3.13.", "props": [ @@ -26115,7 +25991,7 @@ ] }, { - "uuid": "54cd34d2-f3d7-4a6a-9fdb-734327f5efee", + "uuid": "b9415a6b-685c-48f8-84dc-322bd53d5b0a", "control-id": "cis_rhel10_6-3.3.14", "description": "No notes for control-id 6.3.3.14.", "props": [ @@ -26137,7 +26013,7 @@ ] }, { - "uuid": "eca6cd65-e65d-4b5f-b3ee-458c8c8c7c8a", + "uuid": "37c8d4ae-7210-41cf-bec7-e5c327c96192", "control-id": "cis_rhel10_6-3.3.15", "description": "No notes for control-id 6.3.3.15.", "props": [ @@ -26154,7 +26030,7 @@ ] }, { - "uuid": "12fed3f3-754c-49fe-a0fa-a2fdd81c7af1", + "uuid": "465bd8ca-a5e7-4cfc-ab79-6259b2c80fe9", "control-id": "cis_rhel10_6-3.3.16", "description": "No notes for control-id 6.3.3.16.", "props": [ @@ -26171,7 +26047,7 @@ ] }, { - "uuid": "d29016ee-30ae-4681-ba3d-9b78d87516d2", + "uuid": "9c06f9e1-f766-4157-9646-90e524e0cb1f", "control-id": "cis_rhel10_6-3.3.17", "description": "No notes for control-id 6.3.3.17.", "props": [ @@ -26193,7 +26069,7 @@ ] }, { - "uuid": "2cd7c636-450e-49aa-8f51-549f8fcd7568", + "uuid": "ed5a65b2-838a-4943-ac76-bc18d452eff5", "control-id": "cis_rhel10_6-3.3.18", "description": "No notes for control-id 6.3.3.18.", "props": [ @@ -26225,7 +26101,7 @@ ] }, { - "uuid": "fe282819-ad0c-4003-a01d-b0a2428fb467", + "uuid": "3813cb6a-c552-4cc3-9435-3ff1cf974645", "control-id": "cis_rhel10_6-3.3.19", "description": "No notes for control-id 6.3.3.19.", "props": [ @@ -26257,7 +26133,7 @@ ] }, { - "uuid": "0bbbc94b-ad55-4b04-80b4-72e7f187103b", + "uuid": "2baab209-4a12-4829-a1bd-6ffb078d6dc3", "control-id": "cis_rhel10_6-3.3.20", "description": "No notes for control-id 6.3.3.20.", "props": [ @@ -26299,7 +26175,7 @@ ] }, { - "uuid": "9e682a1a-d472-46f2-9a01-8d3c10f3df3d", + "uuid": "a86c6d4a-a868-4f94-a007-9e0597ac8262", "control-id": "cis_rhel10_6-3.3.21", "description": "No notes for control-id 6.3.3.21.", "props": [ @@ -26316,7 +26192,7 @@ ] }, { - "uuid": "cd776e91-3270-48ca-8bd1-369a9d4a87e3", + "uuid": "dc2343fa-baff-4cc1-813f-2497f0c17b29", "control-id": "cis_rhel10_6-3.3.22", "description": "No notes for control-id 6.3.3.22.", "props": [ @@ -26343,7 +26219,7 @@ ] }, { - "uuid": "b152958c-358d-41bc-a266-27b85de28710", + "uuid": "884d7e4d-2e65-4222-9dcb-5b9e10d59e20", "control-id": "cis_rhel10_6-3.3.23", "description": "No notes for control-id 6.3.3.23.", "props": [ @@ -26365,7 +26241,7 @@ ] }, { - "uuid": "802a799b-cdc1-40dd-829a-c9774c91e034", + "uuid": "f5e8c23b-52e3-42eb-9363-ab41226d3ff6", "control-id": "cis_rhel10_6-3.3.24", "description": "No notes for control-id 6.3.3.24.", "props": [ @@ -26387,7 +26263,7 @@ ] }, { - "uuid": "22e9d805-4769-4f4c-910b-9a7738a85ae0", + "uuid": "e6903ebf-52d5-4612-b0a6-4336e74aa945", "control-id": "cis_rhel10_6-3.3.25", "description": "No notes for control-id 6.3.3.25.", "props": [ @@ -26414,7 +26290,7 @@ ] }, { - "uuid": "38c4f24a-c4d0-4453-89df-a407af6833a9", + "uuid": "d092ec07-44e6-4de7-9a74-8fd50df931fa", "control-id": "cis_rhel10_6-3.3.26", "description": "No notes for control-id 6.3.3.26.", "props": [ @@ -26436,7 +26312,7 @@ ] }, { - "uuid": "7e19016e-d59d-4794-b68a-ae3e7ada320e", + "uuid": "4805c115-570f-46de-984d-7f0c915cd527", "control-id": "cis_rhel10_6-3.3.27", "description": "No notes for control-id 6.3.3.27.", "props": [ @@ -26453,7 +26329,7 @@ ] }, { - "uuid": "a9ae9c82-648b-4936-894d-bd9267eb3a68", + "uuid": "0184d814-b283-48bf-9cdc-91e7028fb0b3", "control-id": "cis_rhel10_6-3.3.28", "description": "No notes for control-id 6.3.3.28.", "props": [ @@ -26470,7 +26346,7 @@ ] }, { - "uuid": "84fbb5a0-54ec-49a2-b30f-09f5215c4862", + "uuid": "7fa29cd9-3a30-41fa-8ef4-4dd268c098f4", "control-id": "cis_rhel10_6-3.3.29", "description": "No notes for control-id 6.3.3.29.", "props": [ @@ -26487,7 +26363,7 @@ ] }, { - "uuid": "adab8e6a-f740-4acd-ae31-3316be620ccd", + "uuid": "3b62320d-1c2d-491a-86ea-160b374f04df", "control-id": "cis_rhel10_6-3.3.30", "description": "No notes for control-id 6.3.3.30.", "props": [ @@ -26504,7 +26380,7 @@ ] }, { - "uuid": "91a112e7-864b-4084-a9f7-1c6d14c70066", + "uuid": "9b5fa7cb-01a1-4d98-a832-80fbe8581b1e", "control-id": "cis_rhel10_6-3.3.31", "description": "No notes for control-id 6.3.3.31.", "props": [ @@ -26521,7 +26397,7 @@ ] }, { - "uuid": "117bce7c-679a-4564-b1a7-e86ce7cb7593", + "uuid": "b6833371-41fd-4cd1-bacb-bb5dbfd73cfd", "control-id": "cis_rhel10_6-3.3.32", "description": "No notes for control-id 6.3.3.32.", "props": [ @@ -26543,7 +26419,7 @@ ] }, { - "uuid": "eddb5d0a-a2f8-468d-8660-af15420d328e", + "uuid": "6baacee9-b03d-45d1-a60e-da5edaa46fb2", "control-id": "cis_rhel10_6-3.3.33", "description": "No notes for control-id 6.3.3.33.", "props": [ @@ -26560,7 +26436,7 @@ ] }, { - "uuid": "bc7bb521-d99c-4cc3-a680-2767a24a4b29", + "uuid": "4acf6bb9-8a4d-4c39-8a15-721c6aa96f85", "control-id": "cis_rhel10_6-3.3.34", "description": "No notes for control-id 6.3.3.34.", "props": [ @@ -26577,7 +26453,7 @@ ] }, { - "uuid": "aaf18982-0902-4b93-b35f-54a7cbfc68d6", + "uuid": "26f3a024-3a47-485b-8024-d434f5e301a8", "control-id": "cis_rhel10_6-3.3.35", "description": "No notes for control-id 6.3.3.35.", "props": [ @@ -26594,7 +26470,7 @@ ] }, { - "uuid": "380c4661-7077-4fa8-bab9-c3fda22302b9", + "uuid": "fc9393b3-3a2b-447f-8134-5775d2018bc0", "control-id": "cis_rhel10_6-3.3.36", "description": "No notes for control-id 6.3.3.36.", "props": [ @@ -26611,7 +26487,7 @@ ] }, { - "uuid": "be63db8f-6a07-4a52-b67a-d132f06667b5", + "uuid": "1e0522b5-6511-4b72-888a-5a0af21bcff3", "control-id": "cis_rhel10_6-3.3.37", "description": "The description for control-id cis_rhel10_6-3.3.37.", "props": [ @@ -26624,7 +26500,7 @@ ] }, { - "uuid": "eefc1c27-1ea6-430e-9c85-1475a1c19bce", + "uuid": "943c36a5-7df0-4651-a558-dc2db94c3b12", "control-id": "cis_rhel10_6-3.4.1", "description": "No notes for control-id 6.3.4.1.", "props": [ @@ -26641,7 +26517,7 @@ ] }, { - "uuid": "35064aa4-bd51-4665-9da4-a83b16a666e1", + "uuid": "23abe7d9-738e-49c5-a350-5b271024329c", "control-id": "cis_rhel10_6-3.4.2", "description": "No notes for control-id 6.3.4.2.", "props": [ @@ -26658,7 +26534,7 @@ ] }, { - "uuid": "6228b9f8-5aba-4f5d-bd55-308181d803c8", + "uuid": "c2063889-52ca-4854-90e0-b355481939a4", "control-id": "cis_rhel10_6-3.4.3", "description": "No notes for control-id 6.3.4.3.", "props": [ @@ -26675,7 +26551,7 @@ ] }, { - "uuid": "5edda0f5-dc00-4e0f-bd9d-4a3676167d9e", + "uuid": "98d86418-0861-4fe6-81c4-8058a2e02992", "control-id": "cis_rhel10_6-3.4.4", "description": "No notes for control-id 6.3.4.4.", "props": [ @@ -26692,7 +26568,7 @@ ] }, { - "uuid": "0de29e48-39f0-4929-a2de-4df65280677f", + "uuid": "1762af79-7bfd-46db-bff3-38eebf3e22c7", "control-id": "cis_rhel10_6-3.4.5", "description": "No notes for control-id 6.3.4.5.", "props": [ @@ -26709,7 +26585,7 @@ ] }, { - "uuid": "965ec1f8-b47d-4631-89f3-904941c2fd23", + "uuid": "1aabfb6f-ab78-4efa-9676-c26d51352e1b", "control-id": "cis_rhel10_6-3.4.6", "description": "No notes for control-id 6.3.4.6.", "props": [ @@ -26726,7 +26602,7 @@ ] }, { - "uuid": "7e0a3cc4-c5ec-4456-b4d6-b443f3043727", + "uuid": "e1771629-95ab-49e7-95ec-2a1fca4718a2", "control-id": "cis_rhel10_6-3.4.7", "description": "No notes for control-id 6.3.4.7.", "props": [ @@ -26743,7 +26619,7 @@ ] }, { - "uuid": "a769a052-2c6b-4702-8e1f-2685868da0c8", + "uuid": "f5ed92cf-a681-49fc-b850-bdf19b860f69", "control-id": "cis_rhel10_6-3.4.8", "description": "No notes for control-id 6.3.4.8.", "props": [ @@ -26760,7 +26636,7 @@ ] }, { - "uuid": "fb4fb8c2-aa4f-408b-9769-39234f0bc236", + "uuid": "0ad7f285-3e62-4149-be36-8c0d6da2565b", "control-id": "cis_rhel10_6-3.4.9", "description": "No notes for control-id 6.3.4.9.", "props": [ @@ -26777,7 +26653,7 @@ ] }, { - "uuid": "6f580f95-640d-4b1a-9f6e-c56a412f9cc0", + "uuid": "6550f6c4-c285-4cbc-9176-b3a1ee34a8bb", "control-id": "cis_rhel10_6-3.4.10", "description": "No notes for control-id 6.3.4.10.", "props": [ @@ -26794,7 +26670,7 @@ ] }, { - "uuid": "fb2d8d3c-573b-4a84-bc34-376301a80def", + "uuid": "d08135e0-9689-47fb-9c43-dae8408fe6ac", "control-id": "reload_dconf_db", "description": "This is a helper rule to reload Dconf database correctly.", "props": [ @@ -26811,7 +26687,7 @@ ] }, { - "uuid": "f0810aa4-b9d8-4c06-870e-1a12ec428ae5", + "uuid": "1b1198c3-fc46-4436-ab8f-6f9754c7c82e", "control-id": "cis_rhel10_1-1.1.1", "description": "No notes for control-id 1.1.1.1.", "props": [ @@ -26828,7 +26704,7 @@ ] }, { - "uuid": "4eed4f06-a99f-465c-9462-8df19dab74d8", + "uuid": "36c5d24e-99b7-4e7b-be4b-fb9b5a59122c", "control-id": "cis_rhel10_1-1.1.2", "description": "No notes for control-id 1.1.1.2.", "props": [ @@ -26845,7 +26721,7 @@ ] }, { - "uuid": "1c4a7e28-7651-4bc1-be14-e0a3b95a2621", + "uuid": "db2c8b59-fe7c-4d17-bdf9-2f90473828a2", "control-id": "cis_rhel10_1-1.1.3", "description": "No notes for control-id 1.1.1.3.", "props": [ @@ -26862,7 +26738,7 @@ ] }, { - "uuid": "651406d4-53e8-457d-8c43-186ea0332bad", + "uuid": "976b129a-1ea9-439e-bd8a-3c25d7a7ca2f", "control-id": "cis_rhel10_1-1.1.4", "description": "No notes for control-id 1.1.1.4.", "props": [ @@ -26879,7 +26755,7 @@ ] }, { - "uuid": "7aa9d6a2-4068-4c5b-9d07-88040764db60", + "uuid": "00e63d4a-8baf-4a79-a27e-e01e3745645d", "control-id": "cis_rhel10_1-1.1.5", "description": "No notes for control-id 1.1.1.5.", "props": [ @@ -26896,7 +26772,7 @@ ] }, { - "uuid": "0ddb39fd-e80d-4563-b6c2-e9772bfffc26", + "uuid": "893cea2d-f16e-47e0-8d67-8b025408c6b4", "control-id": "cis_rhel10_1-1.1.9", "description": "No notes for control-id 1.1.1.9.", "props": [ @@ -26913,7 +26789,7 @@ ] }, { - "uuid": "8213fea5-4252-422d-ae8d-64db35487822", + "uuid": "2bc54c86-dadb-4bc7-bb8e-a11af00a01c1", "control-id": "cis_rhel10_1-1.1.10", "description": "No notes for control-id 1.1.1.10.", "props": [ @@ -26930,7 +26806,7 @@ ] }, { - "uuid": "636030d6-e083-4e72-a44b-547056b42807", + "uuid": "c094e08e-5a54-4040-8541-6334265abfc5", "control-id": "cis_rhel10_1-1.1.11", "description": "The description for control-id cis_rhel10_1-1.1.11.", "props": [ @@ -26943,7 +26819,7 @@ ] }, { - "uuid": "4b297ced-26fb-4544-8ee8-3624ba9abba9", + "uuid": "7d1f808a-2d4b-4d85-a7af-57c46fb0e32d", "control-id": "cis_rhel10_1-1.2.1.1", "description": "No notes for control-id 1.1.2.1.1.", "props": [ @@ -26960,7 +26836,7 @@ ] }, { - "uuid": "2eedaa8b-4301-429a-be74-edc33fd01a0c", + "uuid": "5dc505fa-20da-439d-968d-d031c5b2489a", "control-id": "cis_rhel10_1-1.2.1.2", "description": "No notes for control-id 1.1.2.1.2.", "props": [ @@ -26977,7 +26853,7 @@ ] }, { - "uuid": "bda507d4-c99e-42d6-8193-c5bbce805c84", + "uuid": "5a2f2fb1-4167-4ef7-ac31-b9a06c52c89b", "control-id": "cis_rhel10_1-1.2.1.3", "description": "No notes for control-id 1.1.2.1.3.", "props": [ @@ -26994,7 +26870,7 @@ ] }, { - "uuid": "a58499e0-2d8d-4b32-894a-4f9579243a70", + "uuid": "03a244eb-c7b0-4e25-b43a-3910f3d3eb97", "control-id": "cis_rhel10_1-1.2.1.4", "description": "No notes for control-id 1.1.2.1.4.", "props": [ @@ -27011,7 +26887,7 @@ ] }, { - "uuid": "e5a46b95-454c-4d97-afbe-8e902387db43", + "uuid": "fddd0503-3a32-492b-8a33-5a4a3814646e", "control-id": "cis_rhel10_1-1.2.2.1", "description": "No notes for control-id 1.1.2.2.1.", "props": [ @@ -27028,7 +26904,7 @@ ] }, { - "uuid": "7351dfc9-9cdb-4ead-87d2-b68c5c791e9d", + "uuid": "00544a39-f70c-49b7-a8ee-294bc69cb153", "control-id": "cis_rhel10_1-1.2.2.2", "description": "No notes for control-id 1.1.2.2.2.", "props": [ @@ -27045,7 +26921,7 @@ ] }, { - "uuid": "c00a77b0-a517-46aa-a000-7d40e1461ea4", + "uuid": "c3758d60-a998-43fb-8aae-678834977e2c", "control-id": "cis_rhel10_1-1.2.2.3", "description": "No notes for control-id 1.1.2.2.3.", "props": [ @@ -27062,7 +26938,7 @@ ] }, { - "uuid": "39297dff-7185-4447-964a-3dd6af6a9e3c", + "uuid": "581a134e-f316-497e-a2a3-f5e4b5fa6961", "control-id": "cis_rhel10_1-1.2.2.4", "description": "No notes for control-id 1.1.2.2.4.", "props": [ @@ -27079,7 +26955,7 @@ ] }, { - "uuid": "dbd89ad3-b1c4-419c-834a-3d37b40405a9", + "uuid": "9236dae4-bcd8-430b-945a-205b7c0fa0a7", "control-id": "cis_rhel10_1-1.2.3.2", "description": "No notes for control-id 1.1.2.3.2.", "props": [ @@ -27096,7 +26972,7 @@ ] }, { - "uuid": "dfccf500-ced3-4fd9-b169-3f438637ef35", + "uuid": "8de34d4c-d341-4566-93b2-c70b7e38028a", "control-id": "cis_rhel10_1-1.2.3.3", "description": "No notes for control-id 1.1.2.3.3.", "props": [ @@ -27113,7 +26989,7 @@ ] }, { - "uuid": "368c81e2-edfb-4cf7-9ba8-e437ec166119", + "uuid": "597ce154-f5e5-4ea8-9faa-b71251062581", "control-id": "cis_rhel10_1-1.2.4.2", "description": "No notes for control-id 1.1.2.4.2.", "props": [ @@ -27130,7 +27006,7 @@ ] }, { - "uuid": "3f72a0c4-f7e5-41c8-a434-8f14fa9f7a89", + "uuid": "f1a0943c-9787-4d6e-8fec-eecb1d1ce71c", "control-id": "cis_rhel10_1-1.2.4.3", "description": "No notes for control-id 1.1.2.4.3.", "props": [ @@ -27147,7 +27023,7 @@ ] }, { - "uuid": "a07f77ea-17e5-43c6-b5b5-f42c4763fe21", + "uuid": "abcc2dbb-1eed-41cd-b8d2-1fcdfc9f78cb", "control-id": "cis_rhel10_1-1.2.5.2", "description": "No notes for control-id 1.1.2.5.2.", "props": [ @@ -27164,7 +27040,7 @@ ] }, { - "uuid": "22cdf68d-4bbb-40f5-88cf-06d85d6a2754", + "uuid": "2650dd02-9d2f-4883-a6f4-dc652ee738ba", "control-id": "cis_rhel10_1-1.2.5.3", "description": "No notes for control-id 1.1.2.5.3.", "props": [ @@ -27181,7 +27057,7 @@ ] }, { - "uuid": "01b16d19-9607-4744-9d34-ad48208dc1b0", + "uuid": "df49d592-a255-44ae-9c82-9cb9d13295f4", "control-id": "cis_rhel10_1-1.2.5.4", "description": "No notes for control-id 1.1.2.5.4.", "props": [ @@ -27198,7 +27074,7 @@ ] }, { - "uuid": "762de24f-d757-4a51-b33a-3e91273fb994", + "uuid": "d24c5ccd-116b-407a-916e-590cdb7a6a57", "control-id": "cis_rhel10_1-1.2.6.2", "description": "No notes for control-id 1.1.2.6.2.", "props": [ @@ -27215,7 +27091,7 @@ ] }, { - "uuid": "eda535a2-68fe-40fe-aa83-9d8d1bccba34", + "uuid": "e4a160e8-5e66-4db6-9d19-36adeabfb392", "control-id": "cis_rhel10_1-1.2.6.3", "description": "No notes for control-id 1.1.2.6.3.", "props": [ @@ -27232,7 +27108,7 @@ ] }, { - "uuid": "9d37546b-c980-4b54-9362-0cbe71a885db", + "uuid": "df041b65-4cfd-4f43-8ddf-25be37cf4466", "control-id": "cis_rhel10_1-1.2.6.4", "description": "No notes for control-id 1.1.2.6.4.", "props": [ @@ -27249,7 +27125,7 @@ ] }, { - "uuid": "904e344d-274a-4e1b-8cae-28b4fdcc4da3", + "uuid": "e7d2aae3-4124-4597-bc4c-dd3c6582882e", "control-id": "cis_rhel10_1-1.2.7.2", "description": "No notes for control-id 1.1.2.7.2.", "props": [ @@ -27266,7 +27142,7 @@ ] }, { - "uuid": "783376c1-6a3f-4564-9d1c-d83b54a191d4", + "uuid": "51cbd322-b11a-4276-97f2-00d077c8d7b6", "control-id": "cis_rhel10_1-1.2.7.3", "description": "No notes for control-id 1.1.2.7.3.", "props": [ @@ -27283,7 +27159,7 @@ ] }, { - "uuid": "074ce163-d5ef-46c2-88c6-f99a643c41f8", + "uuid": "0b2354c8-8be6-4c4f-a385-b35bd676f4dc", "control-id": "cis_rhel10_1-1.2.7.4", "description": "No notes for control-id 1.1.2.7.4.", "props": [ @@ -27300,7 +27176,7 @@ ] }, { - "uuid": "a071a0e9-1d91-4bb3-8e97-d00d72f5ffd3", + "uuid": "d8b6ec98-00aa-4f8b-bcbf-96deb85c05eb", "control-id": "cis_rhel10_1-2.1.1", "description": "The description for control-id cis_rhel10_1-2.1.1.", "props": [ @@ -27313,7 +27189,7 @@ ] }, { - "uuid": "c5bff484-02b1-4886-be18-c3e231ef0221", + "uuid": "25f488d7-9ea0-471e-b53a-f861770cdfc0", "control-id": "cis_rhel10_1-2.1.2", "description": "No notes for control-id 1.2.1.2.", "props": [ @@ -27330,7 +27206,7 @@ ] }, { - "uuid": "5a525901-2b61-4965-9339-2ed6106cc99e", + "uuid": "09f36140-7ff3-4f3e-8589-a7a20da6a26b", "control-id": "cis_rhel10_1-2.1.4", "description": "The description for control-id cis_rhel10_1-2.1.4.", "props": [ @@ -27343,7 +27219,7 @@ ] }, { - "uuid": "cf081890-ec66-4c40-9d34-3027a2373b88", + "uuid": "530eaf40-ad24-4f3a-b85b-97f5ea6b4858", "control-id": "cis_rhel10_1-2.2.1", "description": "The description for control-id cis_rhel10_1-2.2.1.", "props": [ @@ -27356,7 +27232,7 @@ ] }, { - "uuid": "47cdc0ac-75cd-4a78-a61d-10c660563a80", + "uuid": "535ed6b4-2f3e-4a89-baea-ed6455624c37", "control-id": "cis_rhel10_1-3.1.1", "description": "No notes for control-id 1.3.1.1.", "props": [ @@ -27373,7 +27249,7 @@ ] }, { - "uuid": "b42897ed-b16d-44c1-a3eb-a9eb3c1ee875", + "uuid": "037dd34d-2115-4ced-9acc-a7c3600232e2", "control-id": "cis_rhel10_1-3.1.2", "description": "No notes for control-id 1.3.1.2.", "props": [ @@ -27390,7 +27266,7 @@ ] }, { - "uuid": "e3b75e47-f214-40fd-b524-5fe85a3f4949", + "uuid": "3fecae7a-7a13-40a9-999c-1e99985e9f0c", "control-id": "cis_rhel10_1-3.1.3", "description": "No notes for control-id 1.3.1.3.", "props": [ @@ -27407,7 +27283,7 @@ ] }, { - "uuid": "c8855c2e-e452-46fd-934b-be886ce70609", + "uuid": "13c7251c-f3ec-4fc6-bcf5-a6dc5307f4a1", "control-id": "cis_rhel10_1-3.1.4", "description": "No notes for control-id 1.3.1.4.", "props": [ @@ -27424,7 +27300,7 @@ ] }, { - "uuid": "9c1c54a0-4ef2-4671-ac44-674f8fd581e2", + "uuid": "be6f5276-615e-41e0-8634-c08ab166be0b", "control-id": "cis_rhel10_1-3.1.7", "description": "No notes for control-id 1.3.1.7.", "props": [ @@ -27441,7 +27317,7 @@ ] }, { - "uuid": "821beaf4-f05f-4f86-bb79-25ba2f108e2b", + "uuid": "271485ca-6064-4f77-af5e-df68ff8b2112", "control-id": "cis_rhel10_1-3.1.8", "description": "No notes for control-id 1.3.1.8.", "props": [ @@ -27458,7 +27334,7 @@ ] }, { - "uuid": "aa257ee8-74c4-43f6-bec9-93bffb8741ab", + "uuid": "4bc6de9a-4dad-4ec4-b828-a8f9d0cb85db", "control-id": "cis_rhel10_1-4.1", "description": "There is no automated remediation for this rule and this is intentional.\nMore details in the rule description.", "props": [ @@ -27475,50 +27351,34 @@ ] }, { - "uuid": "0aca636c-c361-40d4-9e4e-9f6fa4a58aab", + "uuid": "640795ce-2bd9-4eed-9882-c18c65b34019", "control-id": "cis_rhel10_1-4.2", - "description": "The description for control-id cis_rhel10_1-4.2.", + "description": "This requirement demands a deeper review of the rules.", "props": [ { "name": "implementation-status", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "alternative", - "remarks": "This requirement demands a deeper review of the rules." - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_grub2_cfg" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_grub2_cfg" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_grub2_cfg" + "value": "implemented" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_user_cfg" + "value": "file_permissions_boot_grub2" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_user_cfg" + "value": "file_owner_boot_grub2" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_user_cfg" + "value": "file_groupowner_boot_grub2" } ] }, { - "uuid": "bd732d90-a3f4-4bde-b952-71d900cd0f0a", + "uuid": "61c8a254-df0e-4319-acb1-7a28da1fa0f7", "control-id": "cis_rhel10_1-5.1", "description": "No notes for control-id 1.5.1.", "props": [ @@ -27535,7 +27395,7 @@ ] }, { - "uuid": "d60de18c-801c-485d-ba00-f5b1c8c78ce8", + "uuid": "63102002-b5b2-43b8-bb93-095bff5340e4", "control-id": "cis_rhel10_1-5.2", "description": "No notes for control-id 1.5.2.", "props": [ @@ -27552,7 +27412,7 @@ ] }, { - "uuid": "4aaf6330-6b52-4304-977b-e7b242490ec8", + "uuid": "0303a9f8-bdf1-47f9-a789-13bb250d2f4b", "control-id": "cis_rhel10_1-5.4", "description": "No notes for control-id 1.5.4.", "props": [ @@ -27569,7 +27429,7 @@ ] }, { - "uuid": "5303162a-fef5-4925-93e0-2c606d5b55b6", + "uuid": "867982a4-02fe-4b28-883a-60d2bfd0a07d", "control-id": "cis_rhel10_1-5.5", "description": "No notes for control-id 1.5.5.", "props": [ @@ -27586,7 +27446,7 @@ ] }, { - "uuid": "387b0a7a-2560-4e19-856a-e120814cf4b6", + "uuid": "92de2069-fcb8-4884-9266-72f64577f79e", "control-id": "cis_rhel10_1-5.6", "description": "No notes for control-id 1.5.6.", "props": [ @@ -27603,7 +27463,7 @@ ] }, { - "uuid": "cc6bf17e-bd19-472a-ae20-12cc588767c7", + "uuid": "487afe8c-a42f-409b-87a8-15e32175e54a", "control-id": "cis_rhel10_1-5.7", "description": "No notes for control-id 1.5.7.", "props": [ @@ -27620,7 +27480,7 @@ ] }, { - "uuid": "69dd8a44-db60-440d-ac88-7e7689881764", + "uuid": "bca55a66-8c10-44e3-87d8-512cf06f4b38", "control-id": "cis_rhel10_1-5.8", "description": "Address Space Layout Randomization (ASLR)", "props": [ @@ -27637,7 +27497,7 @@ ] }, { - "uuid": "fc27a765-8547-4db3-b30f-c2d3fd9eb4d7", + "uuid": "f392ee4c-e810-4c43-a968-47406b741564", "control-id": "cis_rhel10_1-5.9", "description": "No notes for control-id 1.5.9.", "props": [ @@ -27654,7 +27514,7 @@ ] }, { - "uuid": "fda21a9e-e2b5-406a-b1cd-8171cc71fdb9", + "uuid": "f6c1d4a2-a49a-41a1-911f-c6474fe004c3", "control-id": "cis_rhel10_1-5.10", "description": "No notes for control-id 1.5.10.", "props": [ @@ -27671,7 +27531,7 @@ ] }, { - "uuid": "a1ae9bdc-56bf-4956-85ca-d4207256b2b8", + "uuid": "4a5af045-0878-4bb2-bea4-def613a82179", "control-id": "cis_rhel10_1-6.1", "description": "No notes for control-id 1.6.1.", "props": [ @@ -27688,7 +27548,7 @@ ] }, { - "uuid": "ded5839e-f9d1-46fd-82c4-59b23a2e715a", + "uuid": "10f0710e-3a93-4f1f-b5a9-e5a6aea3f1db", "control-id": "cis_rhel10_1-6.2", "description": "No notes for control-id 1.6.2.", "props": [ @@ -27705,7 +27565,7 @@ ] }, { - "uuid": "f53a5194-547b-4a91-bff3-9cf13c455a9a", + "uuid": "9eb6b6d4-3826-43d2-bcad-6b39e0b0303c", "control-id": "cis_rhel10_1-6.3", "description": "No notes for control-id 1.6.3.", "props": [ @@ -27722,7 +27582,7 @@ ] }, { - "uuid": "be7576d0-c3a9-447e-9a35-af9334c148f8", + "uuid": "d1ffe6db-63e8-4b7b-a252-005ff9b593f7", "control-id": "cis_rhel10_1-6.4", "description": "No notes for control-id 1.6.4.", "props": [ @@ -27739,7 +27599,7 @@ ] }, { - "uuid": "7331e308-c0b7-4097-bc1e-f51a8687eb39", + "uuid": "bf16b2bd-27bb-4934-901c-f4ca30235988", "control-id": "cis_rhel10_1-7.1", "description": "No notes for control-id 1.7.1.", "props": [ @@ -27756,7 +27616,7 @@ ] }, { - "uuid": "990f8a12-ff62-4e48-a828-42914b6ca926", + "uuid": "c5d26ee6-9851-4dba-b8bb-8e4158e418eb", "control-id": "cis_rhel10_1-7.2", "description": "No notes for control-id 1.7.2.", "props": [ @@ -27773,7 +27633,7 @@ ] }, { - "uuid": "d2bf7d07-d047-4caf-b228-f1e65b46ce4e", + "uuid": "30449dd0-19ce-44c5-a499-30267d9fcbf2", "control-id": "cis_rhel10_1-7.3", "description": "No notes for control-id 1.7.3.", "props": [ @@ -27790,7 +27650,7 @@ ] }, { - "uuid": "58aad08b-ab75-45f5-b7dc-fdb2fcbcd649", + "uuid": "6559a754-f4d2-4fbd-807d-5f2755332764", "control-id": "cis_rhel10_1-7.4", "description": "No notes for control-id 1.7.4.", "props": [ @@ -27817,7 +27677,7 @@ ] }, { - "uuid": "acfefad3-1362-4766-86fe-a6ebbe95f62e", + "uuid": "5a799427-8286-4bdc-a01e-0ca4b0446e4c", "control-id": "cis_rhel10_1-7.5", "description": "No notes for control-id 1.7.5.", "props": [ @@ -27844,7 +27704,7 @@ ] }, { - "uuid": "ce082933-0131-459e-9c08-ad7705a4b1cd", + "uuid": "c73fb3de-d773-4905-bef8-970b5165fb1a", "control-id": "cis_rhel10_1-7.6", "description": "No notes for control-id 1.7.6.", "props": [ @@ -27871,7 +27731,7 @@ ] }, { - "uuid": "0562fdf9-44f5-4118-ba0b-1ed7beb525cf", + "uuid": "c072ca2b-ff8e-447d-a342-b9386dcbd3fb", "control-id": "cis_rhel10_1-8.1", "description": "No notes for control-id 1.8.1.", "props": [ @@ -27893,7 +27753,7 @@ ] }, { - "uuid": "3de2036c-5e52-4645-bb4f-252fb13fd2a9", + "uuid": "47167cb9-a2ca-4d3b-8ebd-d76ef31ee68b", "control-id": "cis_rhel10_1-8.2", "description": "No notes for control-id 1.8.2.", "props": [ @@ -27910,7 +27770,7 @@ ] }, { - "uuid": "7a0bbb19-ebb4-4981-8a93-f8b0dd407e7f", + "uuid": "bc417013-f146-4309-951b-136d900af707", "control-id": "cis_rhel10_1-8.3", "description": "No notes for control-id 1.8.3.", "props": [ @@ -27942,7 +27802,7 @@ ] }, { - "uuid": "b5edbe72-49ae-4f6d-bd22-661655d89d09", + "uuid": "412c1ff3-0cbd-43cd-9ce2-999aa73ffd99", "control-id": "cis_rhel10_1-8.4", "description": "No notes for control-id 1.8.4.", "props": [ @@ -27964,7 +27824,7 @@ ] }, { - "uuid": "4415b1f0-8fc2-45d5-9c30-dc5e2f464c01", + "uuid": "05fd08a7-775d-41bd-80ca-595b3647b24d", "control-id": "cis_rhel10_1-8.5", "description": "No notes for control-id 1.8.5.", "props": [ @@ -27981,7 +27841,7 @@ ] }, { - "uuid": "c8fe1124-6c97-4929-a729-bfc4f5ae6fd4", + "uuid": "55605c33-f9d5-4e9f-8765-f47f7a4f8193", "control-id": "cis_rhel10_2-1.1", "description": "No notes for control-id 2.1.1.", "props": [ @@ -27998,7 +27858,7 @@ ] }, { - "uuid": "d62a3850-502f-4db3-8680-2e45fbf194fb", + "uuid": "e3cac23b-0bca-42b6-a1dc-c7e38761bd72", "control-id": "cis_rhel10_2-1.2", "description": "No notes for control-id 2.1.2.", "props": [ @@ -28015,7 +27875,7 @@ ] }, { - "uuid": "ec606762-bfbe-41ae-89f2-49f74a141563", + "uuid": "731a4b74-fe51-4910-8337-d08b6d0a36e5", "control-id": "cis_rhel10_2-1.4", "description": "No notes for control-id 2.1.4.", "props": [ @@ -28032,7 +27892,7 @@ ] }, { - "uuid": "6ffcf211-c175-4bb7-a173-ade9a143ec47", + "uuid": "5edbb6ab-b666-4193-9430-58f699a5a8db", "control-id": "cis_rhel10_2-1.5", "description": "No notes for control-id 2.1.5.", "props": [ @@ -28049,7 +27909,7 @@ ] }, { - "uuid": "68fd9c4e-f9db-4c77-9438-4eb2d60697dd", + "uuid": "eb0713b3-ddbb-4a17-934a-f99c651beac2", "control-id": "cis_rhel10_2-1.6", "description": "No notes for control-id 2.1.6.", "props": [ @@ -28066,7 +27926,7 @@ ] }, { - "uuid": "f1cbffac-fda1-4e8a-8383-4e754434c36a", + "uuid": "8ae4c8d6-1151-41dd-96dc-e1cf9a0d4286", "control-id": "cis_rhel10_2-1.7", "description": "No notes for control-id 2.1.7.", "props": [ @@ -28083,7 +27943,7 @@ ] }, { - "uuid": "ac2cdc8f-8087-43ed-b160-b88f273f8dc5", + "uuid": "ef1c4128-2c47-498c-a3d6-3e0293a88134", "control-id": "cis_rhel10_2-1.8", "description": "No notes for control-id 2.1.8.", "props": [ @@ -28105,7 +27965,7 @@ ] }, { - "uuid": "b892feec-acb7-45e5-bf83-5532b64105f0", + "uuid": "e5a53b67-0eee-4840-9109-61a94e08b52e", "control-id": "cis_rhel10_2-1.9", "description": "Many of the libvirt packages used by Enterprise Linux virtualization are dependent on the\nnfs-utils package.", "props": [ @@ -28122,7 +27982,7 @@ ] }, { - "uuid": "f566fdda-008a-4b7f-9f9e-168b68b641f5", + "uuid": "ed282758-add8-48c9-bd34-e893f5ed78ca", "control-id": "cis_rhel10_2-1.10", "description": "No notes for control-id 2.1.10.", "props": [ @@ -28139,7 +27999,7 @@ ] }, { - "uuid": "ada9d9e9-8e52-47d6-ae51-f441b68edacc", + "uuid": "49204629-63f5-4487-8fbc-eb7c3715d879", "control-id": "cis_rhel10_2-1.11", "description": "Many of the libvirt packages used by Enterprise Linux virtualization, and the nfs-utils\npackage used for The Network File System (NFS), are dependent on the rpcbind package.", "props": [ @@ -28156,7 +28016,7 @@ ] }, { - "uuid": "e5984007-ab8c-4ce5-ad23-fceef05eb35c", + "uuid": "a5099c6b-4491-4659-ac0e-0104493b47e4", "control-id": "cis_rhel10_2-1.12", "description": "No notes for control-id 2.1.12.", "props": [ @@ -28173,7 +28033,7 @@ ] }, { - "uuid": "6390f162-1e8f-49ac-bad0-517659ae0f55", + "uuid": "91ea43f8-4565-419d-a60e-1faa87fe4a8f", "control-id": "cis_rhel10_2-1.13", "description": "No notes for control-id 2.1.13.", "props": [ @@ -28190,7 +28050,7 @@ ] }, { - "uuid": "0cd1de82-5354-4f4b-9f07-95e773f13579", + "uuid": "be7cdc19-c936-45ce-b4ff-cd67083dd665", "control-id": "cis_rhel10_2-1.14", "description": "No notes for control-id 2.1.14.", "props": [ @@ -28207,7 +28067,7 @@ ] }, { - "uuid": "97188940-4adf-4967-88bd-2c21b4955606", + "uuid": "266c4d2e-f320-4315-826e-bd7fa4638e83", "control-id": "cis_rhel10_2-1.15", "description": "No notes for control-id 2.1.15.", "props": [ @@ -28224,7 +28084,7 @@ ] }, { - "uuid": "da9bf111-cb4d-4492-beb8-9cfc2eac1a17", + "uuid": "36e3ccef-1c84-44c3-b1b2-47a4c0cd6cf9", "control-id": "cis_rhel10_2-1.16", "description": "No notes for control-id 2.1.16.", "props": [ @@ -28241,7 +28101,7 @@ ] }, { - "uuid": "6717e8af-7dde-4632-a1e6-c90fd2f1f8d3", + "uuid": "a10d91d5-a72c-4304-9a53-082ed8f360b6", "control-id": "cis_rhel10_2-1.17", "description": "No notes for control-id 2.1.17.", "props": [ @@ -28258,7 +28118,7 @@ ] }, { - "uuid": "0030cb5b-36c9-4c47-b343-c3d3ec7eb5a7", + "uuid": "5d4eedb9-b6c6-4020-9183-7eba8e3a97cd", "control-id": "cis_rhel10_2-1.18", "description": "No notes for control-id 2.1.18.", "props": [ @@ -28280,7 +28140,7 @@ ] }, { - "uuid": "aedcebb2-77f4-487e-957c-03315923f53d", + "uuid": "d5e9daef-b0be-4639-8a8a-e28c6781c570", "control-id": "cis_rhel10_2-1.21", "description": "No notes for control-id 2.1.21.", "props": [ @@ -28302,7 +28162,7 @@ ] }, { - "uuid": "f976c958-d575-41e7-8d1d-74f935f3d034", + "uuid": "277493a8-24e5-46dc-aabb-32c4cb7b5b62", "control-id": "cis_rhel10_2-1.22", "description": "The description for control-id cis_rhel10_2-1.22.", "props": [ @@ -28315,7 +28175,7 @@ ] }, { - "uuid": "f5cb39ca-70c0-4eb3-8756-1053a86fb22a", + "uuid": "0d1cc29a-c7a0-427a-be57-31d62ec1c40f", "control-id": "cis_rhel10_2-2.1", "description": "No notes for control-id 2.2.1.", "props": [ @@ -28332,7 +28192,7 @@ ] }, { - "uuid": "4bffd6ce-e420-4f58-9a85-79a7478c40a3", + "uuid": "6b959ee2-3ba2-4e0f-8aff-410cd4b3add5", "control-id": "cis_rhel10_2-2.3", "description": "No notes for control-id 2.2.3.", "props": [ @@ -28349,7 +28209,7 @@ ] }, { - "uuid": "0984e463-4a22-4e80-8016-cf27d16b11d2", + "uuid": "64c616c4-f542-4113-a743-f981d470d893", "control-id": "cis_rhel10_2-2.4", "description": "No notes for control-id 2.2.4.", "props": [ @@ -28366,7 +28226,7 @@ ] }, { - "uuid": "17702452-6c28-46ab-9eb0-4a85f3b84b0e", + "uuid": "ac2fa6c8-a749-4050-bcb2-b6e4c671504e", "control-id": "cis_rhel10_2-3.1", "description": "No notes for control-id 2.3.1.", "props": [ @@ -28378,7 +28238,7 @@ ] }, { - "uuid": "07055a22-3f9f-4167-a96e-746044e5effb", + "uuid": "03c62476-60f4-4d48-8668-16b1fd0886cb", "control-id": "cis_rhel10_2-3.2", "description": "No notes for control-id 2.3.2.", "props": [ @@ -28395,7 +28255,7 @@ ] }, { - "uuid": "401894cb-14f2-4968-a629-b43a7967f260", + "uuid": "6fb3cf05-84c1-470f-80bf-c23676b51bbc", "control-id": "cis_rhel10_2-3.3", "description": "No notes for control-id 2.3.3.", "props": [ @@ -28412,7 +28272,7 @@ ] }, { - "uuid": "601154e8-b088-4981-84be-9c9292f123ce", + "uuid": "13639621-458a-4de0-8f6a-7a5ef60d6bdd", "control-id": "cis_rhel10_2-4.1.1", "description": "No notes for control-id 2.4.1.1.", "props": [ @@ -28434,7 +28294,7 @@ ] }, { - "uuid": "44e1d3dd-6900-4d13-869b-6c6d943d1f21", + "uuid": "c83985d2-8793-4cd0-976e-542807465376", "control-id": "cis_rhel10_2-4.1.2", "description": "No notes for control-id 2.4.1.2.", "props": [ @@ -28461,7 +28321,7 @@ ] }, { - "uuid": "02e84d35-334e-4d02-9c86-c0a6a97e58af", + "uuid": "3bb44ada-adc2-4fb8-9d07-b5003a222cbf", "control-id": "cis_rhel10_2-4.1.3", "description": "No notes for control-id 2.4.1.3.", "props": [ @@ -28488,7 +28348,7 @@ ] }, { - "uuid": "f2c11aa1-45ac-4e09-842f-d3c33d0a964c", + "uuid": "dd974f9f-e4a7-47fb-a138-add6e57959e5", "control-id": "cis_rhel10_2-4.1.4", "description": "No notes for control-id 2.4.1.4.", "props": [ @@ -28515,7 +28375,7 @@ ] }, { - "uuid": "05252a9f-840e-4ed6-9b4d-60d6a6c3dd86", + "uuid": "0299f63e-312b-4354-b0ba-568b61f7a210", "control-id": "cis_rhel10_2-4.1.5", "description": "No notes for control-id 2.4.1.5.", "props": [ @@ -28542,7 +28402,7 @@ ] }, { - "uuid": "0662b804-fab2-4a3b-aa7e-c2f417810325", + "uuid": "3eeba01d-6e06-48ff-baa9-94737aa9b800", "control-id": "cis_rhel10_2-4.1.6", "description": "No notes for control-id 2.4.1.6.", "props": [ @@ -28569,7 +28429,7 @@ ] }, { - "uuid": "a48b87ba-fd05-4ee6-82e4-881649ce0cff", + "uuid": "a0acdafc-bebb-4abe-8d2d-61157e0dd7dc", "control-id": "cis_rhel10_2-4.1.7", "description": "No notes for control-id 2.4.1.7.", "props": [ @@ -28596,7 +28456,7 @@ ] }, { - "uuid": "dceee609-8a1c-4baf-9441-e94f863d682b", + "uuid": "94052cb2-5a79-489a-b444-3097b612d37f", "control-id": "cis_rhel10_2-4.1.8", "description": "No notes for control-id 2.4.1.8.", "props": [ @@ -28623,7 +28483,7 @@ ] }, { - "uuid": "924b8f07-05d5-4f6c-bf3f-48452547ec6d", + "uuid": "9a01b8c7-126a-42e7-b47f-405a55ba3c79", "control-id": "cis_rhel10_2-4.1.9", "description": "No notes for control-id 2.4.1.9.", "props": [ @@ -28660,7 +28520,7 @@ ] }, { - "uuid": "af378f71-4272-4553-8b63-a26598bb77ba", + "uuid": "20483658-f859-42d0-88f0-5c225b483a6d", "control-id": "cis_rhel10_2-4.2.1", "description": "No notes for control-id 2.4.2.1.", "props": [ @@ -28697,7 +28557,7 @@ ] }, { - "uuid": "7d6b5085-6281-4158-8c7f-43fb20320cd7", + "uuid": "b873edba-f3d6-481d-96db-3f77d8f5d4a3", "control-id": "cis_rhel10_3-1.1", "description": "The description for control-id cis_rhel10_3-1.1.", "props": [ @@ -28710,7 +28570,7 @@ ] }, { - "uuid": "2d41d14d-e5ea-4418-b346-03e12638a4db", + "uuid": "5b43caa9-7a0e-4441-83d6-271b13d91422", "control-id": "cis_rhel10_3-1.2", "description": "No notes for control-id 3.1.2.", "props": [ @@ -28727,7 +28587,7 @@ ] }, { - "uuid": "71aa9e62-42b4-41a8-9666-b09dde0bb95b", + "uuid": "bee4e701-d261-4c42-9985-6ffb8eb6c9bf", "control-id": "cis_rhel10_3-1.3", "description": "No notes for control-id 3.1.3.", "props": [ @@ -28744,7 +28604,7 @@ ] }, { - "uuid": "f2447090-0dde-452c-9a26-474a2227b5c5", + "uuid": "310761f2-f3dd-4a03-83b9-30ab2c352927", "control-id": "cis_rhel10_3-2.1", "description": "No notes for control-id 3.2.1.", "props": [ @@ -28761,7 +28621,7 @@ ] }, { - "uuid": "96769c55-99bc-48fe-a893-b9c96228eb59", + "uuid": "b2179942-ce87-46df-853b-b42f46e448cf", "control-id": "cis_rhel10_3-2.2", "description": "No notes for control-id 3.2.2.", "props": [ @@ -28778,7 +28638,7 @@ ] }, { - "uuid": "892b7f56-2f8e-4b91-998b-52d23e09f75e", + "uuid": "235b0c35-7aa5-4e67-ba02-847bf68acb38", "control-id": "cis_rhel10_3-2.3", "description": "No notes for control-id 3.2.3.", "props": [ @@ -28795,7 +28655,7 @@ ] }, { - "uuid": "d0d7271e-a417-42cb-afb1-0e829c788723", + "uuid": "4bb1ff39-344f-4b40-9bb9-44eae51af3b5", "control-id": "cis_rhel10_3-2.4", "description": "No notes for control-id 3.2.4.", "props": [ @@ -28812,7 +28672,7 @@ ] }, { - "uuid": "c8f60f6e-681c-4478-b573-287eca81beff", + "uuid": "4eafdf89-8ca6-44d9-8ee8-6246b54e3ba0", "control-id": "cis_rhel10_3-2.5", "description": "No notes for control-id 3.2.5.", "props": [ @@ -28829,7 +28689,7 @@ ] }, { - "uuid": "b2085564-5ac4-4a42-ba6a-61c62a3e8a7f", + "uuid": "638982ce-9d75-4f07-b427-23c39583c965", "control-id": "cis_rhel10_3-2.6", "description": "No notes for control-id 3.2.6.", "props": [ @@ -28846,7 +28706,7 @@ ] }, { - "uuid": "f549f3ea-bc40-42a0-93e4-b83056079400", + "uuid": "11e77d16-0357-4f45-a7a3-a144d326af54", "control-id": "cis_rhel10_3-3.1.2", "description": "No notes for control-id 3.3.1.2.", "props": [ @@ -28863,7 +28723,7 @@ ] }, { - "uuid": "a226f7c9-147a-4240-b51b-91b87bab2f9d", + "uuid": "88db2277-e29c-40a6-8e6b-191d6c1e4a68", "control-id": "cis_rhel10_3-3.1.3", "description": "No notes for control-id 3.3.1.3.", "props": [ @@ -28880,7 +28740,7 @@ ] }, { - "uuid": "136e61c6-15b8-4736-b2f3-353d1df6c7e9", + "uuid": "e5289c5e-7965-47a8-9e23-155223a72bbb", "control-id": "cis_rhel10_3-3.1.4", "description": "No notes for control-id 3.3.1.4.", "props": [ @@ -28897,7 +28757,7 @@ ] }, { - "uuid": "28839c5d-348b-4ebb-b8ee-93239ed0668a", + "uuid": "f93fadc3-42b6-457e-a94e-61ce445f0f66", "control-id": "cis_rhel10_3-3.1.5", "description": "No notes for control-id 3.3.1.5.", "props": [ @@ -28914,7 +28774,7 @@ ] }, { - "uuid": "0cc3589e-8bed-4b32-96f0-b7f8f0636b3b", + "uuid": "39c5cc3b-6673-4d21-ae87-3e6e5a7b8284", "control-id": "cis_rhel10_3-3.1.6", "description": "No notes for control-id 3.3.1.6.", "props": [ @@ -28931,7 +28791,7 @@ ] }, { - "uuid": "7bdd2c84-7f3e-4bdb-ba67-7794d9954113", + "uuid": "3208a26e-2682-4650-bbfe-30bf444504e8", "control-id": "cis_rhel10_3-3.1.7", "description": "No notes for control-id 3.3.1.7.", "props": [ @@ -28948,7 +28808,7 @@ ] }, { - "uuid": "85328743-7f2d-4919-b199-2abfc1bb092b", + "uuid": "b420d8c5-6b98-4fd3-877c-822a620eb71b", "control-id": "cis_rhel10_3-3.1.8", "description": "No notes for control-id 3.3.1.8.", "props": [ @@ -28965,7 +28825,7 @@ ] }, { - "uuid": "95a6f148-d8ce-4e95-8061-2b2e2f13b250", + "uuid": "8961a376-1c24-4ce7-9aa8-4498ad88279a", "control-id": "cis_rhel10_3-3.1.9", "description": "No notes for control-id 3.3.1.9.", "props": [ @@ -28982,7 +28842,7 @@ ] }, { - "uuid": "6d8bd879-0597-4f68-b5b3-d73ff08079ea", + "uuid": "01505262-b713-47b5-9c6d-5bce79a2c4d4", "control-id": "cis_rhel10_3-3.1.10", "description": "No notes for control-id 3.3.1.10.", "props": [ @@ -28999,7 +28859,7 @@ ] }, { - "uuid": "276c06f3-5671-46b3-a6eb-64316559d05c", + "uuid": "5a384e18-77aa-49a6-be09-cac4efe15acb", "control-id": "cis_rhel10_3-3.1.11", "description": "No notes for control-id 3.3.1.11.", "props": [ @@ -29016,7 +28876,7 @@ ] }, { - "uuid": "26d56451-4b3d-411b-be3a-71a9b09f55c8", + "uuid": "40cd4ff5-2db1-4491-ad75-4103ce5f0c48", "control-id": "cis_rhel10_3-3.1.12", "description": "No notes for control-id 3.3.1.12.", "props": [ @@ -29033,7 +28893,7 @@ ] }, { - "uuid": "9827809e-840c-4de9-93fc-c76298ac31f0", + "uuid": "5bdbc619-75a3-48e3-8d31-846cb8bbd8e7", "control-id": "cis_rhel10_3-3.1.13", "description": "No notes for control-id 3.3.1.13.", "props": [ @@ -29050,7 +28910,7 @@ ] }, { - "uuid": "32cdd04f-b5a8-45cb-b969-c0490ddf6cdd", + "uuid": "f068a0b8-e567-41f1-9020-92ae1b68e5e3", "control-id": "cis_rhel10_3-3.1.14", "description": "No notes for control-id 3.3.1.14.", "props": [ @@ -29067,7 +28927,7 @@ ] }, { - "uuid": "a5421be9-a4ee-4ea2-90a8-bb253164f29d", + "uuid": "7d637f6f-77a5-4c4c-b9b6-fc59820d84ff", "control-id": "cis_rhel10_3-3.1.15", "description": "No notes for control-id 3.3.1.15.", "props": [ @@ -29084,7 +28944,7 @@ ] }, { - "uuid": "f2804ac9-ba4f-483c-acec-0629c8439832", + "uuid": "16eeed6f-6881-4cfe-ae11-120f2d6b28f2", "control-id": "cis_rhel10_3-3.1.16", "description": "No notes for control-id 3.3.1.16.", "props": [ @@ -29101,7 +28961,7 @@ ] }, { - "uuid": "9620d2e1-c278-4b93-9918-a96da7c6824e", + "uuid": "fb95c99b-15d4-45ae-8267-a6257a4e925a", "control-id": "cis_rhel10_3-3.1.17", "description": "No notes for control-id 3.3.1.17.", "props": [ @@ -29118,7 +28978,7 @@ ] }, { - "uuid": "b07a55b3-4570-419b-94b0-d074da80a59d", + "uuid": "6db38e08-6715-493c-a0c9-dd92ba1e139b", "control-id": "cis_rhel10_3-3.1.18", "description": "No notes for control-id 3.3.1.18.", "props": [ @@ -29135,7 +28995,7 @@ ] }, { - "uuid": "f6d19135-bc29-4b2b-b430-f75f5031037a", + "uuid": "69528305-748d-48a6-bcf1-7075654d18b2", "control-id": "cis_rhel10_3-3.2.1", "description": "No notes for control-id 3.3.2.1.", "props": [ @@ -29152,7 +29012,7 @@ ] }, { - "uuid": "f45c122b-46ad-421d-8dec-8a4d36588a15", + "uuid": "ca680376-7746-4953-a678-3f45c372c2f2", "control-id": "cis_rhel10_3-3.2.2", "description": "No notes for control-id 3.3.2.2.", "props": [ @@ -29169,7 +29029,7 @@ ] }, { - "uuid": "6442e47e-fb78-4d7d-9e46-0532e58bd42f", + "uuid": "517dd33d-440a-4a2e-92d8-5731f10b9ada", "control-id": "cis_rhel10_3-3.2.3", "description": "No notes for control-id 3.3.2.3.", "props": [ @@ -29186,7 +29046,7 @@ ] }, { - "uuid": "01584378-048b-4ad5-9e68-1585431c4846", + "uuid": "dc647231-9722-4712-b0e3-6b7c4d391bea", "control-id": "cis_rhel10_3-3.2.4", "description": "No notes for control-id 3.3.2.4.", "props": [ @@ -29203,7 +29063,7 @@ ] }, { - "uuid": "153943d8-5d08-489a-8798-ca0a88a7f349", + "uuid": "d463bbe3-c2e2-443a-b564-9d0d14037898", "control-id": "cis_rhel10_3-3.2.5", "description": "No notes for control-id 3.3.2.5.", "props": [ @@ -29220,7 +29080,7 @@ ] }, { - "uuid": "d393cf42-a339-4ed4-b960-ec98a8fbd191", + "uuid": "4aa6eb54-fb83-4782-a9d8-7075b7f4372c", "control-id": "cis_rhel10_3-3.2.6", "description": "No notes for control-id 3.3.2.6.", "props": [ @@ -29237,7 +29097,7 @@ ] }, { - "uuid": "ff0feb74-5ae8-4072-9c5e-4ecae0ebfa69", + "uuid": "3843d048-9c8d-46de-9e29-a418c8c614c6", "control-id": "cis_rhel10_3-3.2.7", "description": "No notes for control-id 3.3.2.7.", "props": [ @@ -29254,7 +29114,7 @@ ] }, { - "uuid": "97700e36-927b-44b9-8f85-be31515385a6", + "uuid": "d5bdef46-fb2f-40e6-b729-e6628572bfa3", "control-id": "cis_rhel10_3-3.2.8", "description": "No notes for control-id 3.3.2.8.", "props": [ @@ -29271,7 +29131,7 @@ ] }, { - "uuid": "f79abb36-cfce-4f3e-9eba-f2b8f4d3dfd4", + "uuid": "836da335-0716-4304-b6e8-5510069f69ad", "control-id": "cis_rhel10_4-1.1", "description": "No notes for control-id 4.1.1.", "props": [ @@ -29288,7 +29148,7 @@ ] }, { - "uuid": "cc744d5c-6913-4edb-89da-08358ccfe082", + "uuid": "2b0dbe6a-bba9-44cd-aa2d-da6ccd543206", "control-id": "cis_rhel10_4-1.2", "description": "No notes for control-id 4.1.2.", "props": [ @@ -29305,7 +29165,7 @@ ] }, { - "uuid": "123361c7-9fcf-4e7c-b133-156a984c74a6", + "uuid": "38e23eb8-8da2-4a22-bb74-83f1cf8a21f0", "control-id": "cis_rhel10_4-1.3", "description": "No notes for control-id 4.1.3.", "props": [ @@ -29322,7 +29182,7 @@ ] }, { - "uuid": "325437dc-310e-41c3-a975-c5a352a2d391", + "uuid": "2ea15ff6-8849-4376-88fd-bc52bc3ba894", "control-id": "cis_rhel10_4-1.4", "description": "The description for control-id cis_rhel10_4-1.4.", "props": [ @@ -29335,7 +29195,7 @@ ] }, { - "uuid": "b139c749-5756-4e80-a2d8-8f1725ec0214", + "uuid": "7dbfb93e-c1c9-46d0-b2a5-444f5f930ea7", "control-id": "cis_rhel10_4-1.5", "description": "Firewalld in Red Hat Enterprise Linux 10 accepts loopback traffic by default.", "props": [ @@ -29352,7 +29212,7 @@ ] }, { - "uuid": "e06659ac-b53b-46be-82c5-424ce918d8ff", + "uuid": "d48f1db9-2a07-4f9c-8ac5-592891455e26", "control-id": "cis_rhel10_4-1.6", "description": "The description for control-id cis_rhel10_4-1.6.", "props": [ @@ -29365,7 +29225,7 @@ ] }, { - "uuid": "7fc53d82-cf98-4b34-b3d4-0cbd89c0bcaa", + "uuid": "87ff15d6-e4b1-41d2-bd41-4c8982556ae5", "control-id": "cis_rhel10_4-1.7", "description": "The description for control-id cis_rhel10_4-1.7.", "props": [ @@ -29378,7 +29238,7 @@ ] }, { - "uuid": "115f83b4-7323-4250-87cc-b828cc18ce97", + "uuid": "33835a41-f232-4c1e-bd71-6f934fb1ed27", "control-id": "cis_rhel10_5-1.1", "description": "No notes for control-id 5.1.1.", "props": [ @@ -29435,7 +29295,7 @@ ] }, { - "uuid": "5025de4b-42f9-4491-881d-68d62969dfb9", + "uuid": "a5cfdd34-a0f5-47a9-89bc-b5b8fbd629a0", "control-id": "cis_rhel10_5-1.2", "description": "No notes for control-id 5.1.2.", "props": [ @@ -29462,7 +29322,7 @@ ] }, { - "uuid": "3e1e64cb-2e0b-448f-b782-0b4e5717297b", + "uuid": "f2b403c5-b266-44b5-9101-069df492ffa7", "control-id": "cis_rhel10_5-1.3", "description": "No notes for control-id 5.1.3.", "props": [ @@ -29489,7 +29349,7 @@ ] }, { - "uuid": "04b851fc-51e5-4645-b613-6928cc991413", + "uuid": "4dfc732c-b72f-406f-871d-499c5e33dbc0", "control-id": "cis_rhel10_5-1.4", "description": "No notes for control-id 5.1.4.", "props": [ @@ -29506,7 +29366,7 @@ ] }, { - "uuid": "4a7b6e2f-6d84-4581-b01d-f7a14bd478c0", + "uuid": "c995c40e-011e-40ee-ac84-102913bb862d", "control-id": "cis_rhel10_5-1.5", "description": "No notes for control-id 5.1.5.", "props": [ @@ -29523,7 +29383,7 @@ ] }, { - "uuid": "a4449f37-564f-4a5e-9a1f-aacdf1d368a0", + "uuid": "18cf1bc0-0899-4ded-9c82-ef6c5d3ea5f8", "control-id": "cis_rhel10_5-1.6", "description": "No notes for control-id 5.1.6.", "props": [ @@ -29540,7 +29400,7 @@ ] }, { - "uuid": "75fbbac4-9e88-40a7-a2e7-64ff28d856de", + "uuid": "c5d4b12c-951c-4c15-bf33-f9bc75f47c69", "control-id": "cis_rhel10_5-1.7", "description": "The requirement gives an example of 45 seconds, but is flexible about the values. It is only\nnecessary to ensure there is a timeout configured in alignment to the site policy.", "props": [ @@ -29562,7 +29422,7 @@ ] }, { - "uuid": "388a49a4-4551-409e-86ce-3fef0bc32e0b", + "uuid": "e01a4457-916c-400c-9ba7-21c005efc418", "control-id": "cis_rhel10_5-1.10", "description": "No notes for control-id 5.1.10.", "props": [ @@ -29579,7 +29439,7 @@ ] }, { - "uuid": "d1c94dab-1d46-463a-a611-f4adf231fda1", + "uuid": "4ec56535-c7b1-4df0-b968-a790f3456757", "control-id": "cis_rhel10_5-1.11", "description": "No notes for control-id 5.1.11.", "props": [ @@ -29596,7 +29456,7 @@ ] }, { - "uuid": "e71c7d1f-52dd-4c6c-9528-a8c54ce960fb", + "uuid": "9b606d6a-a3b7-4bfb-a7ce-041c74b692fa", "control-id": "cis_rhel10_5-1.12", "description": "The description for control-id cis_rhel10_5-1.12.", "props": [ @@ -29614,7 +29474,7 @@ ] }, { - "uuid": "9cc86a46-6fc7-465c-9545-20052b52370b", + "uuid": "d9466438-5e0d-4940-8a0f-cd0f6265baee", "control-id": "cis_rhel10_5-1.13", "description": "No notes for control-id 5.1.13.", "props": [ @@ -29631,7 +29491,7 @@ ] }, { - "uuid": "79195621-2873-4275-941f-4d1cd6b78e08", + "uuid": "54c30adb-f71e-4c31-b659-32b07a72cdd7", "control-id": "cis_rhel10_5-1.14", "description": "The CIS benchmark is not opinionated about which loglevel is selected here. Here, this\nprofile uses VERBOSE by default, as it allows for the capture of login and logout activity\nas well as key fingerprints.", "props": [ @@ -29648,7 +29508,7 @@ ] }, { - "uuid": "6183235b-07ee-411a-9a3b-01533efe6624", + "uuid": "814f555c-43c5-4a0c-8f52-cd91d7451c12", "control-id": "cis_rhel10_5-1.15", "description": "No notes for control-id 5.1.15.", "props": [ @@ -29665,7 +29525,7 @@ ] }, { - "uuid": "d5fd3ab3-c8e6-4cd2-935e-3e7bef36a704", + "uuid": "8ff185e6-cf4f-4758-82b9-b8fc15c75ce8", "control-id": "cis_rhel10_5-1.16", "description": "No notes for control-id 5.1.16.", "props": [ @@ -29682,7 +29542,7 @@ ] }, { - "uuid": "78389d05-7c8c-466a-bf5e-9639b4db6938", + "uuid": "870940dc-aa9b-4768-81b9-d51834c1ed07", "control-id": "cis_rhel10_5-1.17", "description": "No notes for control-id 5.1.17.", "props": [ @@ -29699,7 +29559,7 @@ ] }, { - "uuid": "e8b4f8cb-9848-450f-ac58-7859d0e00212", + "uuid": "b7753880-8b1f-4779-859c-c2208c110073", "control-id": "cis_rhel10_5-1.18", "description": "No notes for control-id 5.1.18.", "props": [ @@ -29716,7 +29576,7 @@ ] }, { - "uuid": "4a4190dd-5178-46c1-a0b4-c002908a143d", + "uuid": "c3fd421c-2c80-459f-8937-ec936873f26f", "control-id": "cis_rhel10_5-1.19", "description": "No notes for control-id 5.1.19.", "props": [ @@ -29733,7 +29593,7 @@ ] }, { - "uuid": "b335f861-737c-4d01-a21c-d2cb492de555", + "uuid": "2bf8d547-e4af-4c79-9ae1-42d58a87916c", "control-id": "cis_rhel10_5-1.20", "description": "No notes for control-id 5.1.20.", "props": [ @@ -29750,7 +29610,7 @@ ] }, { - "uuid": "b12a233a-9ae3-4be8-a483-68834383af0b", + "uuid": "51f988ee-a690-4c50-9008-4b46aa489c11", "control-id": "cis_rhel10_5-1.21", "description": "No notes for control-id 5.1.21.", "props": [ @@ -29767,7 +29627,7 @@ ] }, { - "uuid": "d6826da9-e18e-40a6-b99e-20118c97ca12", + "uuid": "c9b3fb80-555a-4534-b83d-bdd3c9b94ee6", "control-id": "cis_rhel10_5-1.22", "description": "No notes for control-id 5.1.22.", "props": [ @@ -29784,7 +29644,7 @@ ] }, { - "uuid": "2e10f02c-e568-4b06-a5a5-1a8301de0faa", + "uuid": "7941e1e3-6450-4bdb-a48d-2869b8aaa662", "control-id": "cis_rhel10_5-2.1", "description": "No notes for control-id 5.2.1.", "props": [ @@ -29801,7 +29661,7 @@ ] }, { - "uuid": "3e4ceaef-ef15-475f-a935-c3872677b2eb", + "uuid": "75b0ad5c-1b60-4283-a4b6-53d63a97d635", "control-id": "cis_rhel10_5-2.2", "description": "No notes for control-id 5.2.2.", "props": [ @@ -29818,7 +29678,7 @@ ] }, { - "uuid": "c2743713-ad4d-4129-904f-69c0716d23c5", + "uuid": "94bff4af-f952-4ed8-b7a7-63a13e830b03", "control-id": "cis_rhel10_5-2.3", "description": "No notes for control-id 5.2.3.", "props": [ @@ -29835,7 +29695,7 @@ ] }, { - "uuid": "186eb317-56df-4853-8387-3e49c9bc0632", + "uuid": "c75267f0-2220-4832-ae06-27b5b41b31f7", "control-id": "cis_rhel10_5-2.5", "description": "No notes for control-id 5.2.5.", "props": [ @@ -29852,7 +29712,7 @@ ] }, { - "uuid": "f7b432c3-1085-48ca-adff-d9667206b4e2", + "uuid": "5a52fb87-fadc-40c8-a889-410458f1e940", "control-id": "cis_rhel10_5-2.6", "description": "No notes for control-id 5.2.6.", "props": [ @@ -29869,7 +29729,7 @@ ] }, { - "uuid": "9b7d3f28-96a0-45b5-a2c4-145bf2ff76ca", + "uuid": "42fe36b6-62a6-4f42-a56e-2b4c674062e4", "control-id": "cis_rhel10_5-2.7", "description": "Members of \"wheel\" or GID 0 groups are checked by default if the group option is not set for\npam_wheel.so module. The recommendation states the group should be empty to reinforce the\nuse of \"sudo\" for privileged access. Therefore, members of these groups should be manually\nchecked or a different group should be informed.", "props": [ @@ -29891,7 +29751,7 @@ ] }, { - "uuid": "9aacec40-0e93-4a6c-b603-068cef75ea64", + "uuid": "dd05585b-09c4-4fcd-a96b-a59d20e3c7be", "control-id": "cis_rhel10_5-3.1.1", "description": "This requirement is hard to be automated without any specific requirement. The policy even\nstates that provided commands are examples, other custom settings might be in place and the\nsettings might be different depending on site policies. The other rules will already make\nsure there is a correct autheselect profile regardless of the existing settings. It is\nnecessary to better discuss with CIS Community.", "props": [ @@ -29903,7 +29763,7 @@ ] }, { - "uuid": "87812294-8e4c-470a-9e73-e3246c76646a", + "uuid": "12dd8981-e21d-4756-9ad1-b4b7701e3983", "control-id": "cis_rhel10_5-3.1.2", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.1.", "props": [ @@ -29925,7 +29785,7 @@ ] }, { - "uuid": "9870a318-625f-4997-affa-e4367d35bff3", + "uuid": "c923bc3b-6692-456a-8116-f4cf3e02b780", "control-id": "cis_rhel10_5-3.1.3", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.2.", "props": [ @@ -29952,7 +29812,7 @@ ] }, { - "uuid": "49f89900-edbf-44ac-9d17-f4a861e13c61", + "uuid": "66d9c1d9-dd2d-4992-a54e-19c6f0801ab6", "control-id": "cis_rhel10_5-3.1.4", "description": "The module is properly enabled by the rules mentioned in related_rules.\nRequirements in 5.3.2.3 use these rules.", "props": [ @@ -29964,7 +29824,7 @@ ] }, { - "uuid": "e406f9d7-ee31-48e1-9c65-f22856507b47", + "uuid": "f4f33e60-68a2-4143-a288-3a0b9406a1ca", "control-id": "cis_rhel10_5-3.1.5", "description": "No notes for control-id 5.3.1.5.", "props": [ @@ -29981,7 +29841,7 @@ ] }, { - "uuid": "edb3e79d-7824-4f4d-ac83-a92e71c6959f", + "uuid": "efc9216c-2b1c-4175-875c-287ebf78a054", "control-id": "cis_rhel10_5-3.2.1.1", "description": "No notes for control-id 5.3.2.1.1.", "props": [ @@ -29998,7 +29858,7 @@ ] }, { - "uuid": "da84570d-0f08-4078-ab9a-899f0c33ad83", + "uuid": "2b49bfdf-2067-470c-8948-f172db5368ca", "control-id": "cis_rhel10_5-3.2.1.2", "description": "The policy also accepts value 0, which means the locked accounts should be manually unlocked\nby an administrator. However, it also mentions that using value 0 can facilitate a DoS\nattack to legitimate users.", "props": [ @@ -30015,7 +29875,7 @@ ] }, { - "uuid": "8a738286-b8e4-4211-a5ad-3cc45276d0cf", + "uuid": "91bb299c-b900-4abf-82eb-e24d595df71c", "control-id": "cis_rhel10_5-3.2.2.1", "description": "No notes for control-id 5.3.2.2.1.", "props": [ @@ -30032,7 +29892,7 @@ ] }, { - "uuid": "b71ca97a-4d2f-49a4-be74-4d901bc5ef68", + "uuid": "17e4eea1-ff62-4d6b-a568-cde433eca728", "control-id": "cis_rhel10_5-3.2.2.2", "description": "No notes for control-id 5.3.2.2.2.", "props": [ @@ -30049,7 +29909,7 @@ ] }, { - "uuid": "cc09f2c0-59e5-474e-b5eb-02a76b36629d", + "uuid": "09c03901-1469-49eb-8862-d18e762c4207", "control-id": "cis_rhel10_5-3.2.2.3", "description": "This requirement is expected to be manual. However, in previous versions of the policy\nit was already automated the configuration of \"minclass\" option. This posture was kept for\nRHEL 10 in this new version. Rules related to other options are informed in related_rules.\nIn short, minclass=4 alone can achieve the same result achieved by the combination of the\nother 4 options mentioned in the policy.", "props": [ @@ -30066,7 +29926,7 @@ ] }, { - "uuid": "77cbd447-a3d7-4c0d-99fb-cd79e5533de3", + "uuid": "cf42c635-cbfa-46a3-828e-55dd95c2f02d", "control-id": "cis_rhel10_5-3.2.2.4", "description": "No notes for control-id 5.3.2.2.4.", "props": [ @@ -30083,7 +29943,7 @@ ] }, { - "uuid": "47384c2c-ba74-4abf-a7e4-8d54c13dc4d6", + "uuid": "ef0be797-7d7c-41bf-82d1-25e2966dc3e0", "control-id": "cis_rhel10_5-3.2.2.5", "description": "No notes for control-id 5.3.2.2.5.", "props": [ @@ -30100,7 +29960,7 @@ ] }, { - "uuid": "eb608ffe-13e0-4da8-aeff-4aade4937e86", + "uuid": "b036891e-7a2e-4676-9b0f-05b70e30dd38", "control-id": "cis_rhel10_5-3.2.2.6", "description": "No notes for control-id 5.3.2.2.6.", "props": [ @@ -30117,7 +29977,7 @@ ] }, { - "uuid": "14ce8ca7-5ad6-411a-9d67-301c5bec0b72", + "uuid": "79d2d4f1-8f12-4a8c-bc66-d1b7dc7589ea", "control-id": "cis_rhel10_5-3.2.2.7", "description": "No notes for control-id 5.3.2.2.7.", "props": [ @@ -30134,7 +29994,7 @@ ] }, { - "uuid": "27d880d5-9507-4a1f-aab0-d20570233588", + "uuid": "bd5bc406-fd84-4f69-9a61-08d170b0e91d", "control-id": "cis_rhel10_5-3.2.3.1", "description": "Although mentioned in the section 5.3.3.3, there is no explicit requirement to configure\nretry option of pam_pwhistory. If come in the future, the rule accounts_password_pam_retry\ncan be used.", "props": [ @@ -30156,7 +30016,7 @@ ] }, { - "uuid": "952a7af3-d0e2-4b90-b7e1-d788bb409d66", + "uuid": "2a5a127c-caba-4d78-9a1f-74dbf8814c79", "control-id": "cis_rhel10_5-3.2.3.2", "description": "No notes for control-id 5.3.2.3.2.", "props": [ @@ -30173,7 +30033,7 @@ ] }, { - "uuid": "07d5df1f-4cd5-4a7c-a6bc-fb4a8f7b4349", + "uuid": "060da05e-8e54-4f30-bb58-217e8814351d", "control-id": "cis_rhel10_5-3.2.3.3", "description": "In RHEL 10 pam_pwhistory is enabled via authselect feature, as required in 5.3.1.4. The\nfeature automatically set \"use_authok\" option. In any case, we don't have a rule to check\nthis option specifically.", "props": [ @@ -30190,7 +30050,7 @@ ] }, { - "uuid": "4f85f904-dc13-4dc5-894a-7dd9b797f1f7", + "uuid": "5e65591d-4d9c-4264-9222-26c79ff3202a", "control-id": "cis_rhel10_5-3.2.4.1", "description": "The rule more specifically used in this requirement also satify the requirement 5.3.1.5.", "props": [ @@ -30207,7 +30067,7 @@ ] }, { - "uuid": "0bffd58f-328f-4a98-aca3-2896f498362e", + "uuid": "7ce1403e-f02e-4a20-9bbb-e9ca85aebcb8", "control-id": "cis_rhel10_5-3.2.4.2", "description": "Usage of pam_unix.so module together with \"remember\" option is deprecated and is not\nrecommended by this policy. Instead, it should be used remember option of pam_pwhistory\nmodule, as required in 5.3.2.3.1. See here for more details about pam_unix.so:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1778929", "props": [ @@ -30224,7 +30084,7 @@ ] }, { - "uuid": "15827763-9963-40cd-84fa-86feaf0abe25", + "uuid": "f226b6f3-0ac8-4d25-aeb5-75cd72732da0", "control-id": "cis_rhel10_5-3.2.4.3", "description": "Changes in logindefs mentioned in this requirement are more specifically covered by 5.4.1.4", "props": [ @@ -30246,7 +30106,7 @@ ] }, { - "uuid": "eaca231a-7f6a-4930-899d-c8dde840c82c", + "uuid": "d1f503c8-c2de-4ddc-9f6c-248854629772", "control-id": "cis_rhel10_5-3.2.4.4", "description": "In RHEL 10 pam_unix is enabled by default in all authselect profiles already with the\nuse_authtok option set. In any case, we don't have a rule to check this option specifically,\nlike in 5.3.2.3.3.", "props": [ @@ -30263,7 +30123,7 @@ ] }, { - "uuid": "136ab7ee-89cc-451b-8c0c-42a0da9b07f6", + "uuid": "3ec271f8-698c-4230-b381-b4dc63370613", "control-id": "cis_rhel10_5-4.1.1", "description": "No notes for control-id 5.4.1.1.", "props": [ @@ -30285,7 +30145,7 @@ ] }, { - "uuid": "d9c719e4-f291-4ff1-accc-915a7aa9005e", + "uuid": "840943b2-7404-4ee7-a598-95ef0501075a", "control-id": "cis_rhel10_5-4.1.3", "description": "No notes for control-id 5.4.1.3.", "props": [ @@ -30307,7 +30167,7 @@ ] }, { - "uuid": "e22f6968-66a0-4886-be55-6dd3bf16095e", + "uuid": "2fdfbf31-586d-4861-8507-8a58337ac0ba", "control-id": "cis_rhel10_5-4.1.4", "description": "There's a \"new\" set of options in /etc/login.defs file to define the number of iterations\nperformed during the hashing process.", "props": [ @@ -30329,7 +30189,7 @@ ] }, { - "uuid": "e829575f-6356-49e1-9d1e-4b0479eef15a", + "uuid": "cf0e8860-22e5-4981-8606-568d0f49f0e1", "control-id": "cis_rhel10_5-4.1.5", "description": "No notes for control-id 5.4.1.5.", "props": [ @@ -30351,7 +30211,7 @@ ] }, { - "uuid": "fb6e205a-fa2e-436e-a55d-17c68ca9ef7e", + "uuid": "550e9d55-4f28-404b-b2ff-f1a10c082efe", "control-id": "cis_rhel10_5-4.1.6", "description": "No notes for control-id 5.4.1.6.", "props": [ @@ -30368,7 +30228,7 @@ ] }, { - "uuid": "ae6d203b-1002-448c-b49f-a94726914b90", + "uuid": "15dc0304-3ab4-41f7-a43f-6176a13329f4", "control-id": "cis_rhel10_5-4.2.1", "description": "No notes for control-id 5.4.2.1.", "props": [ @@ -30385,7 +30245,7 @@ ] }, { - "uuid": "155dfc6c-51e8-42a1-b288-1cf111c9e271", + "uuid": "0bb3cb33-9a39-47ba-928f-72c5e0511cac", "control-id": "cis_rhel10_5-4.2.2", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -30402,7 +30262,7 @@ ] }, { - "uuid": "3ea23490-dbc5-4e29-b5ff-4ac4659cd491", + "uuid": "2151b2cc-4fa7-46a7-ba0d-da6331c07472", "control-id": "cis_rhel10_5-4.2.3", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -30419,7 +30279,7 @@ ] }, { - "uuid": "23b0d7f4-b0c2-4ae1-ae27-096a5d1e35c4", + "uuid": "379381b0-6f84-4a6c-b96a-bb2af91face0", "control-id": "cis_rhel10_5-4.2.4", "description": "No notes for control-id 5.4.2.4.", "props": [ @@ -30436,7 +30296,7 @@ ] }, { - "uuid": "43495795-6a79-4e95-8b1e-f99ecbb79dea", + "uuid": "be330cb6-120f-4752-8646-2c396a76a664", "control-id": "cis_rhel10_5-4.2.5", "description": "No notes for control-id 5.4.2.5.", "props": [ @@ -30458,7 +30318,7 @@ ] }, { - "uuid": "16823c31-558e-4ebd-9e41-9810e29d3d5b", + "uuid": "4e0a993a-f836-43ec-9939-5dd2686e0f79", "control-id": "cis_rhel10_5-4.2.6", "description": "No notes for control-id 5.4.2.6.", "props": [ @@ -30475,7 +30335,7 @@ ] }, { - "uuid": "9a11181a-8c26-463b-ae54-6d5d741d1d79", + "uuid": "d466cc62-d265-45af-bf43-86f08c39fc86", "control-id": "cis_rhel10_5-4.2.7", "description": "No notes for control-id 5.4.2.7.", "props": [ @@ -30497,7 +30357,7 @@ ] }, { - "uuid": "e9c819a0-0518-4c14-ab92-d82cca34e7e8", + "uuid": "59a5e902-13ef-4add-84d8-cb96e9356225", "control-id": "cis_rhel10_5-4.2.8", "description": "No notes for control-id 5.4.2.8.", "props": [ @@ -30514,7 +30374,7 @@ ] }, { - "uuid": "f563e182-48ca-4b64-8922-0e032baa599a", + "uuid": "b060783a-d73c-450e-9106-8d67aa188b89", "control-id": "cis_rhel10_5-4.3.2", "description": "No notes for control-id 5.4.3.2.", "props": [ @@ -30531,7 +30391,7 @@ ] }, { - "uuid": "0181aa61-d5f3-4cd5-8b89-2b5585d4fe45", + "uuid": "f57dba22-cad0-46bc-b9de-2de5903e4a84", "control-id": "cis_rhel10_5-4.3.3", "description": "No notes for control-id 5.4.3.3.", "props": [ @@ -30558,7 +30418,7 @@ ] }, { - "uuid": "1a48f010-6b50-4048-81af-57fbedb14abe", + "uuid": "59766100-b259-4ff4-8a40-9e2ba518ed12", "control-id": "cis_rhel10_6-1.1", "description": "No notes for control-id 6.1.1.", "props": [ @@ -30580,7 +30440,7 @@ ] }, { - "uuid": "e07552a5-6610-4a17-941f-f6ef93b1853a", + "uuid": "a9eecb91-e407-4850-8349-11336ab3d288", "control-id": "cis_rhel10_6-1.2", "description": "No notes for control-id 6.1.2.", "props": [ @@ -30597,7 +30457,7 @@ ] }, { - "uuid": "28713621-de2b-4557-bf17-9b481a1a2aa6", + "uuid": "16248e2c-47a6-4537-a811-803a62a231b1", "control-id": "cis_rhel10_6-1.3", "description": "No notes for control-id 6.1.3.", "props": [ @@ -30614,7 +30474,7 @@ ] }, { - "uuid": "c1dd35fd-11f0-41bf-a060-35a37adfa193", + "uuid": "3cfb486e-76eb-4eb9-b1c6-398db57c0d38", "control-id": "cis_rhel10_6-2.1.1", "description": "No notes for control-id 6.2.1.1.", "props": [ @@ -30631,7 +30491,7 @@ ] }, { - "uuid": "e8e3326b-ebca-46f6-897d-2c525214e56a", + "uuid": "711d6c3e-811c-40ce-be1d-4ea6f2fd53f2", "control-id": "cis_rhel10_6-2.1.2", "description": "The description for control-id cis_rhel10_6-2.1.2.", "props": [ @@ -30644,7 +30504,7 @@ ] }, { - "uuid": "5f2d4f88-dc5b-44ed-9c9b-4b7a4d3e7b8f", + "uuid": "36ccafe1-c9b5-450f-83b9-9c2f2a3b4ec6", "control-id": "cis_rhel10_6-2.1.3", "description": "The description for control-id cis_rhel10_6-2.1.3.", "props": [ @@ -30657,7 +30517,7 @@ ] }, { - "uuid": "7e7ee7b4-b1e0-4ab1-ade0-5d9950770d15", + "uuid": "d9ea5ece-8bd9-4437-8fac-d49e2cf527bc", "control-id": "cis_rhel10_6-2.1.4", "description": "No notes for control-id 6.2.1.4.", "props": [ @@ -30674,7 +30534,7 @@ ] }, { - "uuid": "66201e7d-a519-4f1e-a811-614b9fa47a26", + "uuid": "048f3219-b3d6-4ff1-824d-6d5e5ca73252", "control-id": "cis_rhel10_6-2.2.1.1", "description": "No notes for control-id 6.2.2.1.1.", "props": [ @@ -30691,7 +30551,7 @@ ] }, { - "uuid": "be307ae5-259b-499a-871c-00cafdc31a78", + "uuid": "e179c121-43ad-4705-ad78-bd79350a32f9", "control-id": "cis_rhel10_6-2.2.1.2", "description": "The description for control-id cis_rhel10_6-2.2.1.2.", "props": [ @@ -30704,7 +30564,7 @@ ] }, { - "uuid": "eac2df58-b995-4a95-b854-cd47867fcef3", + "uuid": "e71ffbf2-7e82-4ac5-a212-7d1219f1b2d6", "control-id": "cis_rhel10_6-2.2.1.3", "description": "No notes for control-id 6.2.2.1.3.", "props": [ @@ -30721,7 +30581,7 @@ ] }, { - "uuid": "78606759-74cb-43b2-b504-f11ed8564798", + "uuid": "314b5bfb-d3cb-4c9b-86ac-56745e768e96", "control-id": "cis_rhel10_6-2.2.1.4", "description": "No notes for control-id 6.2.2.1.4.", "props": [ @@ -30738,7 +30598,7 @@ ] }, { - "uuid": "b351a412-62c9-4559-8d15-e86a54af8ba5", + "uuid": "019c1164-f873-43c1-bf13-e2e4d39fae12", "control-id": "cis_rhel10_6-2.2.2", "description": "No notes for control-id 6.2.2.2.", "props": [ @@ -30755,7 +30615,7 @@ ] }, { - "uuid": "429a0c38-4351-4ed6-899a-2af33a3f6044", + "uuid": "f9cd53ff-15d9-4209-ae20-2c702af684ad", "control-id": "cis_rhel10_6-2.2.3", "description": "No notes for control-id 6.2.2.3.", "props": [ @@ -30772,7 +30632,7 @@ ] }, { - "uuid": "89e771c0-9b29-46f1-b88c-e24fe0b94a75", + "uuid": "5663a366-ef4f-41a3-934c-6abfd8c0a17e", "control-id": "cis_rhel10_6-2.2.4", "description": "No notes for control-id 6.2.2.4.", "props": [ @@ -30789,7 +30649,7 @@ ] }, { - "uuid": "1c0638fc-c162-4b16-a326-a6d94fcc065a", + "uuid": "7c84e327-f5c2-434d-ae9b-338220c0a4fe", "control-id": "cis_rhel10_6-2.3.1", "description": "No notes for control-id 6.2.3.1.", "props": [ @@ -30801,7 +30661,7 @@ ] }, { - "uuid": "a8e0e41c-ea01-4a0d-a9cb-9bc8d959657b", + "uuid": "054360e4-322e-4915-b20c-c16932d00513", "control-id": "cis_rhel10_6-2.3.2", "description": "No notes for control-id 6.2.3.2.", "props": [ @@ -30813,7 +30673,7 @@ ] }, { - "uuid": "55b2498e-658f-4d13-bfe2-a2c97aae2805", + "uuid": "64672808-9d6b-4683-b46f-ca5962b62c72", "control-id": "cis_rhel10_6-2.3.3", "description": "No notes for control-id 6.2.3.3.", "props": [ @@ -30825,7 +30685,7 @@ ] }, { - "uuid": "28727ce7-df8c-4089-ac7d-3c5b9f9e178a", + "uuid": "f61b5656-4a5e-45a6-95b3-f2edcc48c071", "control-id": "cis_rhel10_6-2.3.4", "description": "No notes for control-id 6.2.3.4.", "props": [ @@ -30837,7 +30697,7 @@ ] }, { - "uuid": "b5eaabf8-6636-471c-b9d5-7ec8d6b9d579", + "uuid": "6971dff0-8275-4146-af66-a366bbdb2c42", "control-id": "cis_rhel10_6-2.3.5", "description": "The description for control-id cis_rhel10_6-2.3.5.", "props": [ @@ -30850,7 +30710,7 @@ ] }, { - "uuid": "ec5872f2-117a-48e3-b170-a8fd2f9d0b2a", + "uuid": "89b9548d-650b-4f25-aff7-a5c6c81bcdf9", "control-id": "cis_rhel10_6-2.3.6", "description": "The description for control-id cis_rhel10_6-2.3.6.", "props": [ @@ -30863,7 +30723,7 @@ ] }, { - "uuid": "1e5460bb-4d28-4592-80bc-8f1852b766a6", + "uuid": "8d1376e0-2707-4778-84dd-f16a466226af", "control-id": "cis_rhel10_6-2.3.7", "description": "No notes for control-id 6.2.3.7.", "props": [ @@ -30875,7 +30735,7 @@ ] }, { - "uuid": "f264b966-0209-4286-b4ec-68f1ff432413", + "uuid": "32d4690a-2657-4e7d-bba0-c6143c353e96", "control-id": "cis_rhel10_6-2.3.8", "description": "The description for control-id cis_rhel10_6-2.3.8.", "props": [ @@ -30888,7 +30748,7 @@ ] }, { - "uuid": "fd585079-a96b-40a5-8824-9d64f9a63b55", + "uuid": "4649bff2-b487-48fe-9064-7320069f9c09", "control-id": "cis_rhel10_6-2.4.1", "description": "It is not harmful to run these rules even if rsyslog is not installed or active.", "props": [ @@ -30915,7 +30775,7 @@ ] }, { - "uuid": "233bee3d-8537-4638-ba18-79effb8fe945", + "uuid": "06bac560-1941-4b8b-a14d-d5f4941463ed", "control-id": "cis_rhel10_7-1.1", "description": "No notes for control-id 7.1.1.", "props": [ @@ -30942,7 +30802,7 @@ ] }, { - "uuid": "70e4e706-6776-4c9f-9613-e18a5c246d97", + "uuid": "81af5ef6-ab18-4498-b04c-89733f6cbea8", "control-id": "cis_rhel10_7-1.2", "description": "No notes for control-id 7.1.2.", "props": [ @@ -30969,7 +30829,7 @@ ] }, { - "uuid": "54d11a66-ee06-424a-9ffe-17fd73687690", + "uuid": "7b7355ec-02a5-4bd1-ab4a-7d91194e0a33", "control-id": "cis_rhel10_7-1.3", "description": "No notes for control-id 7.1.3.", "props": [ @@ -30996,7 +30856,7 @@ ] }, { - "uuid": "ee9d44cc-7dcf-4c6a-8d68-2dfdc9ea01dc", + "uuid": "b7de8b0b-5244-4048-86b9-103d09a0f92b", "control-id": "cis_rhel10_7-1.4", "description": "No notes for control-id 7.1.4.", "props": [ @@ -31023,7 +30883,7 @@ ] }, { - "uuid": "993fdb30-ae5d-4abd-b9ca-0f5e2021052d", + "uuid": "dc9ea67c-e7f4-4e83-abbc-73a6a8276fe8", "control-id": "cis_rhel10_7-1.5", "description": "No notes for control-id 7.1.5.", "props": [ @@ -31050,7 +30910,7 @@ ] }, { - "uuid": "1a0f3374-4648-4888-9a8f-b6e6bee456dc", + "uuid": "0541432a-2d8c-4457-8fed-aa6528a045ba", "control-id": "cis_rhel10_7-1.6", "description": "No notes for control-id 7.1.6.", "props": [ @@ -31077,7 +30937,7 @@ ] }, { - "uuid": "3ee8a08b-ffaf-4c28-9ae7-d5463fee671c", + "uuid": "78e97b58-3f8d-44bb-baec-76d170890b88", "control-id": "cis_rhel10_7-1.7", "description": "No notes for control-id 7.1.7.", "props": [ @@ -31104,7 +30964,7 @@ ] }, { - "uuid": "814da729-be96-4ee6-b768-8e07d4e0b7f4", + "uuid": "ce43d873-e206-4667-b7d9-a7fb715aa435", "control-id": "cis_rhel10_7-1.8", "description": "No notes for control-id 7.1.8.", "props": [ @@ -31131,7 +30991,7 @@ ] }, { - "uuid": "01dfd7ed-5095-40d5-9847-4ab3ee047b0a", + "uuid": "ace4e2f5-c814-4c8c-87f6-71e35d16b71d", "control-id": "cis_rhel10_7-1.9", "description": "No notes for control-id 7.1.9.", "props": [ @@ -31158,7 +31018,7 @@ ] }, { - "uuid": "7deb6c14-6234-4e5a-9d98-068d87da2591", + "uuid": "11a7d589-a2dd-466b-a667-13f1cae1fddb", "control-id": "cis_rhel10_7-1.10", "description": "No notes for control-id 7.1.10.", "props": [ @@ -31200,7 +31060,7 @@ ] }, { - "uuid": "aa4b1ed5-5d53-4003-a42d-ed9b5c05debd", + "uuid": "c64c16ec-57d2-40d6-9768-208eeb0df199", "control-id": "cis_rhel10_7-1.11", "description": "No notes for control-id 7.1.11.", "props": [ @@ -31222,7 +31082,7 @@ ] }, { - "uuid": "3e976702-2081-4c34-b9cd-c4c9bb7726b6", + "uuid": "658ef2ff-6fe4-4b25-8978-09fca32b0cf0", "control-id": "cis_rhel10_7-1.12", "description": "No notes for control-id 7.1.12.", "props": [ @@ -31244,7 +31104,7 @@ ] }, { - "uuid": "db9114a1-782c-4205-9c4f-dc1723067a30", + "uuid": "0274f837-7da9-43e9-a3d6-66e44a06ae11", "control-id": "cis_rhel10_7-1.13", "description": "The description for control-id cis_rhel10_7-1.13.", "props": [ @@ -31257,7 +31117,7 @@ ] }, { - "uuid": "e18266ce-629e-42dd-b7de-aea17b92a41c", + "uuid": "033c6e38-d10f-48af-9a0d-c7ff6a965e3a", "control-id": "cis_rhel10_7-2.1", "description": "No notes for control-id 7.2.1.", "props": [ @@ -31274,7 +31134,7 @@ ] }, { - "uuid": "dd5c959f-187a-49d8-9cd4-1673d5dc91ef", + "uuid": "a54d3fb2-6aa9-4e87-b2eb-927414c5bf4b", "control-id": "cis_rhel10_7-2.2", "description": "No notes for control-id 7.2.2.", "props": [ @@ -31291,7 +31151,7 @@ ] }, { - "uuid": "41656683-7ef0-4595-a754-e98373c4ec18", + "uuid": "4378dc19-5696-492a-b433-b72c5038555a", "control-id": "cis_rhel10_7-2.3", "description": "No notes for control-id 7.2.3.", "props": [ @@ -31308,7 +31168,7 @@ ] }, { - "uuid": "f7fc01d9-94d5-4cb4-8df7-ce729ed95ed7", + "uuid": "e73ca224-ff86-4ba0-923c-6b046ddb5031", "control-id": "cis_rhel10_7-2.4", "description": "No notes for control-id 7.2.4.", "props": [ @@ -31325,7 +31185,7 @@ ] }, { - "uuid": "56ffe900-0209-4929-84e9-22cb7a72383b", + "uuid": "3c9b193f-38da-476e-9464-8404119aa5f0", "control-id": "cis_rhel10_7-2.5", "description": "No notes for control-id 7.2.5.", "props": [ @@ -31342,7 +31202,7 @@ ] }, { - "uuid": "4347f8ff-d50d-4912-89ce-ed68711e32d9", + "uuid": "d8237234-f062-4346-87c9-8b2dcb021f23", "control-id": "cis_rhel10_7-2.6", "description": "No notes for control-id 7.2.6.", "props": [ @@ -31359,7 +31219,7 @@ ] }, { - "uuid": "9da46c20-4f5d-44fe-9924-6934e09f4d77", + "uuid": "699a4dc1-b2d8-405d-ab8c-1ff61e04d0bb", "control-id": "cis_rhel10_7-2.7", "description": "No notes for control-id 7.2.7.", "props": [ @@ -31376,7 +31236,7 @@ ] }, { - "uuid": "db7a6030-6463-4ea7-bbad-dc3e6ff652ed", + "uuid": "f5a01062-eb1f-4eeb-ad67-fe3d56c5b565", "control-id": "cis_rhel10_7-2.8", "description": "No notes for control-id 7.2.8.", "props": [ @@ -31403,7 +31263,7 @@ ] }, { - "uuid": "c8defcae-e335-4be9-a3c4-273347ec51d3", + "uuid": "5e2fcee2-5743-41dc-a235-aea7c94dd619", "control-id": "cis_rhel10_7-2.9", "description": "No notes for control-id 7.2.9.", "props": [ diff --git a/component-definitions/rhel10/rhel10-cis_rhel10-l2_workstation/component-definition.json b/component-definitions/rhel10/rhel10-cis_rhel10-l2_workstation/component-definition.json index f85b4159..dff42c4f 100644 --- a/component-definitions/rhel10/rhel10-cis_rhel10-l2_workstation/component-definition.json +++ b/component-definitions/rhel10/rhel10-cis_rhel10-l2_workstation/component-definition.json @@ -3,8 +3,8 @@ "uuid": "9025707c-c78d-4c60-a2df-d0a822467a29", "metadata": { "title": "Component definition for rhel10", - "last-modified": "2025-12-15T16:33:32.096994+00:00", - "version": "4.4", + "last-modified": "2025-12-16T14:25:38.248613+00:00", + "version": "4.5", "oscal-version": "1.1.3" }, "components": [ @@ -1631,4807 +1631,4771 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_grub2_cfg", + "value": "file_permissions_boot_grub2", "remarks": "rule_set_034" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/grub.cfg Group Ownership", + "value": "All GRUB configuration files must have mode 0600 or more restrictive", "remarks": "rule_set_034" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_grub2_cfg", + "value": "file_owner_boot_grub2", "remarks": "rule_set_035" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/grub.cfg User Ownership", + "value": "All GRUB configuration files must be owned by root", "remarks": "rule_set_035" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_grub2_cfg", + "value": "file_groupowner_boot_grub2", "remarks": "rule_set_036" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/grub.cfg Permissions", + "value": "All GRUB configuration files must be group-owned by root", "remarks": "rule_set_036" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_user_cfg", + "value": "disable_users_coredumps", "remarks": "rule_set_037" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/user.cfg Group Ownership", + "value": "Disable Core Dumps for All Users", "remarks": "rule_set_037" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_user_cfg", + "value": "sysctl_fs_protected_hardlinks", "remarks": "rule_set_038" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/user.cfg User Ownership", + "value": "Enable Kernel Parameter to Enforce DAC on Hardlinks", "remarks": "rule_set_038" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_user_cfg", + "value": "sysctl_fs_suid_dumpable", "remarks": "rule_set_039" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/user.cfg Permissions", + "value": "Disable Core Dumps for SUID programs", "remarks": "rule_set_039" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "disable_users_coredumps", + "value": "sysctl_kernel_dmesg_restrict", "remarks": "rule_set_040" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Core Dumps for All Users", + "value": "Restrict Access to Kernel Message Buffer", "remarks": "rule_set_040" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_protected_hardlinks", + "value": "sysctl_kernel_kptr_restrict", "remarks": "rule_set_041" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Enforce DAC on Hardlinks", + "value": "Restrict Exposed Kernel Pointer Addresses Access", "remarks": "rule_set_041" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_suid_dumpable", + "value": "sysctl_kernel_yama_ptrace_scope", "remarks": "rule_set_042" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Core Dumps for SUID programs", + "value": "Restrict usage of ptrace to descendant processes", "remarks": "rule_set_042" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_dmesg_restrict", + "value": "sysctl_kernel_randomize_va_space", "remarks": "rule_set_043" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict Access to Kernel Message Buffer", + "value": "Enable Randomized Layout of Virtual Address Space", "remarks": "rule_set_043" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_kptr_restrict", + "value": "coredump_disable_backtraces", "remarks": "rule_set_044" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict Exposed Kernel Pointer Addresses Access", + "value": "Disable core dump backtraces", "remarks": "rule_set_044" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_yama_ptrace_scope", + "value": "coredump_disable_storage", "remarks": "rule_set_045" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict usage of ptrace to descendant processes", + "value": "Disable storing core dump", "remarks": "rule_set_045" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_randomize_va_space", + "value": "configure_custom_crypto_policy_cis", "remarks": "rule_set_046" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Randomized Layout of Virtual Address Space", + "value": "Implement Custom Crypto Policy Modules for CIS Benchmark", "remarks": "rule_set_046" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "coredump_disable_backtraces", + "value": "banner_etc_motd_cis", "remarks": "rule_set_047" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable core dump backtraces", + "value": "Ensure Message Of The Day Is Configured Properly", "remarks": "rule_set_047" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "coredump_disable_storage", + "value": "banner_etc_issue_cis", "remarks": "rule_set_048" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable storing core dump", + "value": "Ensure Local Login Warning Banner Is Configured Properly", "remarks": "rule_set_048" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_custom_crypto_policy_cis", + "value": "banner_etc_issue_net_cis", "remarks": "rule_set_049" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Implement Custom Crypto Policy Modules for CIS Benchmark", + "value": "Ensure Remote Login Warning Banner Is Configured Properly", "remarks": "rule_set_049" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "banner_etc_motd_cis", + "value": "file_groupowner_etc_motd", "remarks": "rule_set_050" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Message Of The Day Is Configured Properly", + "value": "Verify Group Ownership of Message of the Day Banner", "remarks": "rule_set_050" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "banner_etc_issue_cis", + "value": "file_owner_etc_motd", "remarks": "rule_set_051" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Local Login Warning Banner Is Configured Properly", + "value": "Verify ownership of Message of the Day Banner", "remarks": "rule_set_051" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "banner_etc_issue_net_cis", + "value": "file_permissions_etc_motd", "remarks": "rule_set_052" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Remote Login Warning Banner Is Configured Properly", + "value": "Verify permissions on Message of the Day Banner", "remarks": "rule_set_052" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_motd", + "value": "file_groupowner_etc_issue", "remarks": "rule_set_053" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Ownership of Message of the Day Banner", + "value": "Verify Group Ownership of System Login Banner", "remarks": "rule_set_053" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_motd", + "value": "file_owner_etc_issue", "remarks": "rule_set_054" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify ownership of Message of the Day Banner", + "value": "Verify ownership of System Login Banner", "remarks": "rule_set_054" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_motd", + "value": "file_permissions_etc_issue", "remarks": "rule_set_055" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify permissions on Message of the Day Banner", + "value": "Verify permissions on System Login Banner", "remarks": "rule_set_055" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_issue", + "value": "file_groupowner_etc_issue_net", "remarks": "rule_set_056" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Ownership of System Login Banner", + "value": "Verify Group Ownership of System Login Banner for Remote Connections", "remarks": "rule_set_056" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_issue", + "value": "file_owner_etc_issue_net", "remarks": "rule_set_057" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify ownership of System Login Banner", + "value": "Verify ownership of System Login Banner for Remote Connections", "remarks": "rule_set_057" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_issue", + "value": "file_permissions_etc_issue_net", "remarks": "rule_set_058" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify permissions on System Login Banner", + "value": "Verify permissions on System Login Banner for Remote Connections", "remarks": "rule_set_058" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_issue_net", + "value": "dconf_gnome_banner_enabled", "remarks": "rule_set_059" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Ownership of System Login Banner for Remote Connections", + "value": "Enable GNOME3 Login Warning Banner", "remarks": "rule_set_059" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_issue_net", + "value": "dconf_gnome_login_banner_text", "remarks": "rule_set_060" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify ownership of System Login Banner for Remote Connections", + "value": "Set the GNOME3 Login Warning Banner Text", "remarks": "rule_set_060" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_issue_net", + "value": "dconf_gnome_disable_user_list", "remarks": "rule_set_061" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify permissions on System Login Banner for Remote Connections", + "value": "Disable the GNOME3 Login User List", "remarks": "rule_set_061" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_banner_enabled", + "value": "dconf_gnome_screensaver_idle_delay", "remarks": "rule_set_062" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable GNOME3 Login Warning Banner", + "value": "Set GNOME3 Screensaver Inactivity Timeout", "remarks": "rule_set_062" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_login_banner_text", + "value": "dconf_gnome_screensaver_lock_delay", "remarks": "rule_set_063" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set the GNOME3 Login Warning Banner Text", + "value": "Set GNOME3 Screensaver Lock Delay After Activation Period", "remarks": "rule_set_063" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_disable_user_list", + "value": "dconf_gnome_session_idle_user_locks", "remarks": "rule_set_064" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable the GNOME3 Login User List", + "value": "Ensure Users Cannot Change GNOME3 Session Idle Settings", "remarks": "rule_set_064" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_idle_delay", + "value": "dconf_gnome_screensaver_user_locks", "remarks": "rule_set_065" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set GNOME3 Screensaver Inactivity Timeout", + "value": "Ensure Users Cannot Change GNOME3 Screensaver Settings", "remarks": "rule_set_065" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_lock_delay", + "value": "dconf_gnome_disable_autorun", "remarks": "rule_set_066" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set GNOME3 Screensaver Lock Delay After Activation Period", + "value": "Disable GNOME3 Automount running", "remarks": "rule_set_066" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_session_idle_user_locks", + "value": "package_kea_removed", "remarks": "rule_set_067" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Users Cannot Change GNOME3 Session Idle Settings", + "value": "Uninstall kea Package", "remarks": "rule_set_067" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_user_locks", + "value": "package_bind_removed", "remarks": "rule_set_068" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Users Cannot Change GNOME3 Screensaver Settings", + "value": "Uninstall bind Package", "remarks": "rule_set_068" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_disable_autorun", + "value": "package_dnsmasq_removed", "remarks": "rule_set_069" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable GNOME3 Automount running", + "value": "Uninstall dnsmasq Package", "remarks": "rule_set_069" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_kea_removed", + "value": "package_vsftpd_removed", "remarks": "rule_set_070" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall kea Package", + "value": "Uninstall vsftpd Package", "remarks": "rule_set_070" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_bind_removed", + "value": "package_dovecot_removed", "remarks": "rule_set_071" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall bind Package", + "value": "Uninstall dovecot Package", "remarks": "rule_set_071" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_dnsmasq_removed", + "value": "package_cyrus-imapd_removed", "remarks": "rule_set_072" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall dnsmasq Package", + "value": "Uninstall cyrus-imapd Package", "remarks": "rule_set_072" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_vsftpd_removed", + "value": "service_nfs_disabled", "remarks": "rule_set_073" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall vsftpd Package", + "value": "Disable Network File System (nfs)", "remarks": "rule_set_073" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_dovecot_removed", + "value": "service_rpcbind_disabled", "remarks": "rule_set_074" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall dovecot Package", + "value": "Disable rpcbind Service", "remarks": "rule_set_074" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_cyrus-imapd_removed", + "value": "package_rsync_removed", "remarks": "rule_set_075" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall cyrus-imapd Package", + "value": "Uninstall rsync Package", "remarks": "rule_set_075" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_nfs_disabled", + "value": "package_samba_removed", "remarks": "rule_set_076" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Network File System (nfs)", + "value": "Uninstall Samba Package", "remarks": "rule_set_076" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_rpcbind_disabled", + "value": "package_net-snmp_removed", "remarks": "rule_set_077" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable rpcbind Service", + "value": "Uninstall net-snmp Package", "remarks": "rule_set_077" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_rsync_removed", + "value": "package_telnet-server_removed", "remarks": "rule_set_078" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall rsync Package", + "value": "Uninstall telnet-server Package", "remarks": "rule_set_078" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_samba_removed", + "value": "package_tftp-server_removed", "remarks": "rule_set_079" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall Samba Package", + "value": "Uninstall tftp-server Package", "remarks": "rule_set_079" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_net-snmp_removed", + "value": "package_squid_removed", "remarks": "rule_set_080" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall net-snmp Package", + "value": "Uninstall squid Package", "remarks": "rule_set_080" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet-server_removed", + "value": "package_httpd_removed", "remarks": "rule_set_081" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall telnet-server Package", + "value": "Uninstall httpd Package", "remarks": "rule_set_081" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_tftp-server_removed", + "value": "package_nginx_removed", "remarks": "rule_set_082" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall tftp-server Package", + "value": "Uninstall nginx Package", "remarks": "rule_set_082" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_squid_removed", + "value": "postfix_network_listening_disabled", "remarks": "rule_set_083" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall squid Package", + "value": "Disable Postfix Network Listening", "remarks": "rule_set_083" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_httpd_removed", + "value": "has_nonlocal_mta", "remarks": "rule_set_084" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall httpd Package", + "value": "Ensure Mail Transfer Agent is not Listening on any non-loopback Address", "remarks": "rule_set_084" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_nginx_removed", + "value": "package_ftp_removed", "remarks": "rule_set_085" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall nginx Package", + "value": "Remove ftp Package", "remarks": "rule_set_085" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "postfix_network_listening_disabled", + "value": "package_telnet_removed", "remarks": "rule_set_086" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Postfix Network Listening", + "value": "Remove telnet Clients", "remarks": "rule_set_086" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "has_nonlocal_mta", + "value": "package_tftp_removed", "remarks": "rule_set_087" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Mail Transfer Agent is not Listening on any non-loopback Address", + "value": "Remove tftp Daemon", "remarks": "rule_set_087" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_ftp_removed", + "value": "chronyd_specify_remote_server", "remarks": "rule_set_088" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove ftp Package", + "value": "A remote time server for Chrony is configured", "remarks": "rule_set_088" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet_removed", + "value": "chronyd_run_as_chrony_user", "remarks": "rule_set_089" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove telnet Clients", + "value": "Ensure that chronyd is running under chrony user account", "remarks": "rule_set_089" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_tftp_removed", + "value": "package_cron_installed", "remarks": "rule_set_090" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove tftp Daemon", + "value": "Install the cron service", "remarks": "rule_set_090" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "chronyd_specify_remote_server", + "value": "service_crond_enabled", "remarks": "rule_set_091" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "A remote time server for Chrony is configured", + "value": "Enable cron Service", "remarks": "rule_set_091" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "chronyd_run_as_chrony_user", + "value": "file_groupowner_crontab", "remarks": "rule_set_092" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that chronyd is running under chrony user account", + "value": "Verify Group Who Owns Crontab", "remarks": "rule_set_092" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_cron_installed", + "value": "file_owner_crontab", "remarks": "rule_set_093" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install the cron service", + "value": "Verify Owner on crontab", "remarks": "rule_set_093" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_crond_enabled", + "value": "file_permissions_crontab", "remarks": "rule_set_094" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable cron Service", + "value": "Verify Permissions on crontab", "remarks": "rule_set_094" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_crontab", + "value": "file_groupowner_cron_hourly", "remarks": "rule_set_095" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Crontab", + "value": "Verify Group Who Owns cron.hourly", "remarks": "rule_set_095" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_crontab", + "value": "file_owner_cron_hourly", "remarks": "rule_set_096" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on crontab", + "value": "Verify Owner on cron.hourly", "remarks": "rule_set_096" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_crontab", + "value": "file_permissions_cron_hourly", "remarks": "rule_set_097" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on crontab", + "value": "Verify Permissions on cron.hourly", "remarks": "rule_set_097" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_cron_hourly", + "value": "file_groupowner_cron_daily", "remarks": "rule_set_098" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns cron.hourly", + "value": "Verify Group Who Owns cron.daily", "remarks": "rule_set_098" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_cron_hourly", + "value": "file_owner_cron_daily", "remarks": "rule_set_099" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on cron.hourly", + "value": "Verify Owner on cron.daily", "remarks": "rule_set_099" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_cron_hourly", + "value": "file_permissions_cron_daily", "remarks": "rule_set_100" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on cron.hourly", + "value": "Verify Permissions on cron.daily", "remarks": "rule_set_100" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_cron_daily", + "value": "file_groupowner_cron_weekly", "remarks": "rule_set_101" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns cron.daily", + "value": "Verify Group Who Owns cron.weekly", "remarks": "rule_set_101" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_cron_daily", + "value": "file_owner_cron_weekly", "remarks": "rule_set_102" }, - { - "name": "Rule_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on cron.daily", - "remarks": "rule_set_102" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_cron_daily", - "remarks": "rule_set_103" - }, - { - "name": "Rule_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on cron.daily", - "remarks": "rule_set_103" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_cron_weekly", - "remarks": "rule_set_104" - }, - { - "name": "Rule_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns cron.weekly", - "remarks": "rule_set_104" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_cron_weekly", - "remarks": "rule_set_105" - }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.weekly", - "remarks": "rule_set_105" + "remarks": "rule_set_102" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_weekly", - "remarks": "rule_set_106" + "remarks": "rule_set_103" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.weekly", - "remarks": "rule_set_106" + "remarks": "rule_set_103" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_monthly", - "remarks": "rule_set_107" + "remarks": "rule_set_104" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.monthly", - "remarks": "rule_set_107" + "remarks": "rule_set_104" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_monthly", - "remarks": "rule_set_108" + "remarks": "rule_set_105" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.monthly", - "remarks": "rule_set_108" + "remarks": "rule_set_105" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_monthly", - "remarks": "rule_set_109" + "remarks": "rule_set_106" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.monthly", - "remarks": "rule_set_109" + "remarks": "rule_set_106" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_yearly", - "remarks": "rule_set_110" + "remarks": "rule_set_107" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.yearly", - "remarks": "rule_set_110" + "remarks": "rule_set_107" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_yearly", - "remarks": "rule_set_111" + "remarks": "rule_set_108" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.yearly", - "remarks": "rule_set_111" + "remarks": "rule_set_108" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_yearly", - "remarks": "rule_set_112" + "remarks": "rule_set_109" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.yearly", - "remarks": "rule_set_112" + "remarks": "rule_set_109" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_d", - "remarks": "rule_set_113" + "remarks": "rule_set_110" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.d", - "remarks": "rule_set_113" + "remarks": "rule_set_110" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_d", - "remarks": "rule_set_114" + "remarks": "rule_set_111" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.d", - "remarks": "rule_set_114" + "remarks": "rule_set_111" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_d", - "remarks": "rule_set_115" + "remarks": "rule_set_112" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.d", - "remarks": "rule_set_115" + "remarks": "rule_set_112" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_cron_deny_not_exist", - "remarks": "rule_set_116" + "remarks": "rule_set_113" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/cron.deny does not exist", - "remarks": "rule_set_116" + "remarks": "rule_set_113" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_cron_allow_exists", - "remarks": "rule_set_117" + "remarks": "rule_set_114" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/cron.allow exists", - "remarks": "rule_set_117" + "remarks": "rule_set_114" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_allow", - "remarks": "rule_set_118" + "remarks": "rule_set_115" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/cron.allow file", - "remarks": "rule_set_118" + "remarks": "rule_set_115" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_allow", - "remarks": "rule_set_119" + "remarks": "rule_set_116" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/cron.allow file", - "remarks": "rule_set_119" + "remarks": "rule_set_116" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_allow", - "remarks": "rule_set_120" + "remarks": "rule_set_117" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/cron.allow file", - "remarks": "rule_set_120" + "remarks": "rule_set_117" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_at_deny_not_exist", - "remarks": "rule_set_121" + "remarks": "rule_set_118" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/at.deny does not exist", - "remarks": "rule_set_121" + "remarks": "rule_set_118" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_at_allow_exists", - "remarks": "rule_set_122" + "remarks": "rule_set_119" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/at.allow exists", - "remarks": "rule_set_122" + "remarks": "rule_set_119" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_at_allow", - "remarks": "rule_set_123" + "remarks": "rule_set_120" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/at.allow file", - "remarks": "rule_set_123" + "remarks": "rule_set_120" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_at_allow", - "remarks": "rule_set_124" + "remarks": "rule_set_121" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/at.allow file", - "remarks": "rule_set_124" + "remarks": "rule_set_121" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_at_allow", - "remarks": "rule_set_125" + "remarks": "rule_set_122" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/at.allow file", - "remarks": "rule_set_125" + "remarks": "rule_set_122" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_atm_disabled", - "remarks": "rule_set_126" + "remarks": "rule_set_123" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable ATM Support", - "remarks": "rule_set_126" + "remarks": "rule_set_123" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_can_disabled", - "remarks": "rule_set_127" + "remarks": "rule_set_124" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable CAN Support", - "remarks": "rule_set_127" + "remarks": "rule_set_124" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_dccp_disabled", - "remarks": "rule_set_128" + "remarks": "rule_set_125" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable DCCP Support", - "remarks": "rule_set_128" + "remarks": "rule_set_125" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_tipc_disabled", - "remarks": "rule_set_129" + "remarks": "rule_set_126" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable TIPC Support", - "remarks": "rule_set_129" + "remarks": "rule_set_126" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_rds_disabled", - "remarks": "rule_set_130" + "remarks": "rule_set_127" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable RDS Support", - "remarks": "rule_set_130" + "remarks": "rule_set_127" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_sctp_disabled", - "remarks": "rule_set_131" + "remarks": "rule_set_128" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SCTP Support", - "remarks": "rule_set_131" + "remarks": "rule_set_128" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_ip_forward", - "remarks": "rule_set_132" + "remarks": "rule_set_129" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IP Forwarding on IPv4 Interfaces", - "remarks": "rule_set_132" + "remarks": "rule_set_129" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_forwarding", - "remarks": "rule_set_133" + "remarks": "rule_set_130" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv4 Forwarding on all IPv4 Interfaces", - "remarks": "rule_set_133" + "remarks": "rule_set_130" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_forwarding", - "remarks": "rule_set_134" + "remarks": "rule_set_131" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv4 Forwarding By Default", - "remarks": "rule_set_134" + "remarks": "rule_set_131" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_send_redirects", - "remarks": "rule_set_135" + "remarks": "rule_set_132" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_135" + "remarks": "rule_set_132" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_send_redirects", - "remarks": "rule_set_136" + "remarks": "rule_set_133" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces by Default", - "remarks": "rule_set_136" + "remarks": "rule_set_133" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses", - "remarks": "rule_set_137" + "remarks": "rule_set_134" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Ignore Bogus ICMP Error Responses on IPv4 Interfaces", - "remarks": "rule_set_137" + "remarks": "rule_set_134" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_icmp_echo_ignore_broadcasts", - "remarks": "rule_set_138" + "remarks": "rule_set_135" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Ignore ICMP Broadcast Echo Requests on IPv4 Interfaces", - "remarks": "rule_set_138" + "remarks": "rule_set_135" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_redirects", - "remarks": "rule_set_139" + "remarks": "rule_set_136" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv4 Interfaces", - "remarks": "rule_set_139" + "remarks": "rule_set_136" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_redirects", - "remarks": "rule_set_140" + "remarks": "rule_set_137" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv4 Interfaces", - "remarks": "rule_set_140" + "remarks": "rule_set_137" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_secure_redirects", - "remarks": "rule_set_141" + "remarks": "rule_set_138" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Secure ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_141" + "remarks": "rule_set_138" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_secure_redirects", - "remarks": "rule_set_142" + "remarks": "rule_set_139" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Kernel Parameter for Accepting Secure Redirects By Default", - "remarks": "rule_set_142" + "remarks": "rule_set_139" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_rp_filter", - "remarks": "rule_set_143" + "remarks": "rule_set_140" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces", - "remarks": "rule_set_143" + "remarks": "rule_set_140" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_rp_filter", - "remarks": "rule_set_144" + "remarks": "rule_set_141" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces by Default", - "remarks": "rule_set_144" + "remarks": "rule_set_141" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_source_route", - "remarks": "rule_set_145" + "remarks": "rule_set_142" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces", - "remarks": "rule_set_145" + "remarks": "rule_set_142" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_source_route", - "remarks": "rule_set_146" + "remarks": "rule_set_143" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv4 Interfaces by Default", - "remarks": "rule_set_146" + "remarks": "rule_set_143" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_log_martians", - "remarks": "rule_set_147" + "remarks": "rule_set_144" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces", - "remarks": "rule_set_147" + "remarks": "rule_set_144" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_log_martians", - "remarks": "rule_set_148" + "remarks": "rule_set_145" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces by Default", - "remarks": "rule_set_148" + "remarks": "rule_set_145" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_tcp_syncookies", - "remarks": "rule_set_149" + "remarks": "rule_set_146" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use TCP Syncookies on Network Interfaces", - "remarks": "rule_set_149" + "remarks": "rule_set_146" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_forwarding", - "remarks": "rule_set_150" + "remarks": "rule_set_147" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv6 Forwarding", - "remarks": "rule_set_150" + "remarks": "rule_set_147" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_forwarding", - "remarks": "rule_set_151" + "remarks": "rule_set_148" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv6 Forwarding by default", - "remarks": "rule_set_151" + "remarks": "rule_set_148" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_redirects", - "remarks": "rule_set_152" + "remarks": "rule_set_149" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv6 Interfaces", - "remarks": "rule_set_152" + "remarks": "rule_set_149" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_redirects", - "remarks": "rule_set_153" + "remarks": "rule_set_150" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv6 Interfaces", - "remarks": "rule_set_153" + "remarks": "rule_set_150" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_source_route", - "remarks": "rule_set_154" + "remarks": "rule_set_151" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv6 Interfaces", - "remarks": "rule_set_154" + "remarks": "rule_set_151" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_source_route", - "remarks": "rule_set_155" + "remarks": "rule_set_152" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv6 Interfaces by Default", - "remarks": "rule_set_155" + "remarks": "rule_set_152" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_ra", - "remarks": "rule_set_156" + "remarks": "rule_set_153" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Router Advertisements on All IPv6 Interfaces", - "remarks": "rule_set_156" + "remarks": "rule_set_153" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_ra", - "remarks": "rule_set_157" + "remarks": "rule_set_154" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting Router Advertisements on all IPv6 Interfaces by Default", - "remarks": "rule_set_157" + "remarks": "rule_set_154" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_firewalld_installed", - "remarks": "rule_set_158" + "remarks": "rule_set_155" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install firewalld Package", - "remarks": "rule_set_158" + "remarks": "rule_set_155" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "firewalld-backend", - "remarks": "rule_set_159" + "remarks": "rule_set_156" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Firewalld to Use the Nftables Backend", - "remarks": "rule_set_159" + "remarks": "rule_set_156" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_firewalld_enabled", - "remarks": "rule_set_160" + "remarks": "rule_set_157" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify firewalld Enabled", - "remarks": "rule_set_160" + "remarks": "rule_set_157" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "firewalld_loopback_traffic_trusted", - "remarks": "rule_set_161" + "remarks": "rule_set_158" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Firewalld to Trust Loopback Traffic", - "remarks": "rule_set_161" + "remarks": "rule_set_158" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_config", - "remarks": "rule_set_162" + "remarks": "rule_set_159" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server config file", - "remarks": "rule_set_162" + "remarks": "rule_set_159" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_config", - "remarks": "rule_set_163" + "remarks": "rule_set_160" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server config file", - "remarks": "rule_set_163" + "remarks": "rule_set_160" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_config", - "remarks": "rule_set_164" + "remarks": "rule_set_161" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server config file", - "remarks": "rule_set_164" + "remarks": "rule_set_161" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_sshd_config_d", - "remarks": "rule_set_165" + "remarks": "rule_set_162" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Config File", - "remarks": "rule_set_165" + "remarks": "rule_set_162" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_drop_in_config", - "remarks": "rule_set_166" + "remarks": "rule_set_163" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Config File", - "remarks": "rule_set_166" + "remarks": "rule_set_163" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_sshd_config_d", - "remarks": "rule_set_167" + "remarks": "rule_set_164" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server Configuration Files", - "remarks": "rule_set_167" + "remarks": "rule_set_164" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_sshd_config_d", - "remarks": "rule_set_168" + "remarks": "rule_set_165" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server Configuration Files", - "remarks": "rule_set_168" + "remarks": "rule_set_165" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_drop_in_config", - "remarks": "rule_set_169" + "remarks": "rule_set_166" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server Configuration Files", - "remarks": "rule_set_169" + "remarks": "rule_set_166" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_drop_in_config", - "remarks": "rule_set_170" + "remarks": "rule_set_167" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server Configuration Files", - "remarks": "rule_set_170" + "remarks": "rule_set_167" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_private_key", - "remarks": "rule_set_171" + "remarks": "rule_set_168" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_171" + "remarks": "rule_set_168" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_private_key", - "remarks": "rule_set_172" + "remarks": "rule_set_169" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_172" + "remarks": "rule_set_169" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_private_key", - "remarks": "rule_set_173" + "remarks": "rule_set_170" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Private *_key Key Files", - "remarks": "rule_set_173" + "remarks": "rule_set_170" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_pub_key", - "remarks": "rule_set_174" + "remarks": "rule_set_171" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_174" + "remarks": "rule_set_171" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_pub_key", - "remarks": "rule_set_175" + "remarks": "rule_set_172" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_175" + "remarks": "rule_set_172" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_pub_key", - "remarks": "rule_set_176" + "remarks": "rule_set_173" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Public *.pub Key Files", - "remarks": "rule_set_176" + "remarks": "rule_set_173" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_limit_user_access", - "remarks": "rule_set_177" + "remarks": "rule_set_174" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Users' SSH Access", - "remarks": "rule_set_177" + "remarks": "rule_set_174" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_warning_banner_net", - "remarks": "rule_set_178" + "remarks": "rule_set_175" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable SSH Warning Banner", - "remarks": "rule_set_178" + "remarks": "rule_set_175" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_idle_timeout", - "remarks": "rule_set_179" + "remarks": "rule_set_176" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Interval", - "remarks": "rule_set_179" + "remarks": "rule_set_176" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_keepalive", - "remarks": "rule_set_180" + "remarks": "rule_set_177" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Count Max", - "remarks": "rule_set_180" + "remarks": "rule_set_177" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_forwarding", - "remarks": "rule_set_181" + "remarks": "rule_set_178" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Forwarding", - "remarks": "rule_set_181" + "remarks": "rule_set_178" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_gssapi_auth", - "remarks": "rule_set_182" + "remarks": "rule_set_179" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GSSAPI Authentication", - "remarks": "rule_set_182" + "remarks": "rule_set_179" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_host_auth", - "remarks": "rule_set_183" + "remarks": "rule_set_180" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Host-Based Authentication", - "remarks": "rule_set_183" + "remarks": "rule_set_180" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_rhosts", - "remarks": "rule_set_184" + "remarks": "rule_set_181" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Support for .rhosts Files", - "remarks": "rule_set_184" + "remarks": "rule_set_181" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_use_strong_kex", - "remarks": "rule_set_185" + "remarks": "rule_set_182" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Use Only Strong Key Exchange algorithms", - "remarks": "rule_set_185" + "remarks": "rule_set_182" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_login_grace_time", - "remarks": "rule_set_186" + "remarks": "rule_set_183" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SSH LoginGraceTime is configured", - "remarks": "rule_set_186" + "remarks": "rule_set_183" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_loglevel_verbose", - "remarks": "rule_set_187" + "remarks": "rule_set_184" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Daemon LogLevel to VERBOSE", - "remarks": "rule_set_187" + "remarks": "rule_set_184" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_auth_tries", - "remarks": "rule_set_188" + "remarks": "rule_set_185" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH authentication attempt limit", - "remarks": "rule_set_188" + "remarks": "rule_set_185" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_maxstartups", - "remarks": "rule_set_189" + "remarks": "rule_set_186" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SSH MaxStartups is configured", - "remarks": "rule_set_189" + "remarks": "rule_set_186" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_sessions", - "remarks": "rule_set_190" + "remarks": "rule_set_187" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH MaxSessions limit", - "remarks": "rule_set_190" + "remarks": "rule_set_187" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_empty_passwords", - "remarks": "rule_set_191" + "remarks": "rule_set_188" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Access via Empty Passwords", - "remarks": "rule_set_191" + "remarks": "rule_set_188" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_root_login", - "remarks": "rule_set_192" + "remarks": "rule_set_189" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Root Login", - "remarks": "rule_set_192" + "remarks": "rule_set_189" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_do_not_permit_user_env", - "remarks": "rule_set_193" + "remarks": "rule_set_190" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Do Not Allow SSH Environment Options", - "remarks": "rule_set_193" + "remarks": "rule_set_190" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_pam", - "remarks": "rule_set_194" + "remarks": "rule_set_191" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable PAM", - "remarks": "rule_set_194" + "remarks": "rule_set_191" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_sudo_installed", - "remarks": "rule_set_195" + "remarks": "rule_set_192" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install sudo Package", - "remarks": "rule_set_195" + "remarks": "rule_set_192" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_use_pty", - "remarks": "rule_set_196" + "remarks": "rule_set_193" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo use_pty", - "remarks": "rule_set_196" + "remarks": "rule_set_193" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_custom_logfile", - "remarks": "rule_set_197" + "remarks": "rule_set_194" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Sudo Logfile Exists - sudo logfile", - "remarks": "rule_set_197" + "remarks": "rule_set_194" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_no_authenticate", - "remarks": "rule_set_198" + "remarks": "rule_set_195" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo !authenticate", - "remarks": "rule_set_198" + "remarks": "rule_set_195" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_require_reauthentication", - "remarks": "rule_set_199" + "remarks": "rule_set_196" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require Re-Authentication When Using the sudo Command", - "remarks": "rule_set_199" + "remarks": "rule_set_196" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "use_pam_wheel_group_for_su", - "remarks": "rule_set_200" + "remarks": "rule_set_197" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Usage of pam_wheel with Group Parameter for su Authentication", - "remarks": "rule_set_200" + "remarks": "rule_set_197" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_pam_wheel_group_empty", - "remarks": "rule_set_201" + "remarks": "rule_set_198" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Group Used by pam_wheel.so Module Exists on System and is Empty", - "remarks": "rule_set_201" + "remarks": "rule_set_198" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_password_pam_faillock_password_auth", - "remarks": "rule_set_202" + "remarks": "rule_set_199" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/password-auth File.", - "remarks": "rule_set_202" + "remarks": "rule_set_199" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_password_pam_faillock_system_auth", - "remarks": "rule_set_203" + "remarks": "rule_set_200" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/system-auth File.", - "remarks": "rule_set_203" + "remarks": "rule_set_200" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_pam_pwquality_installed", - "remarks": "rule_set_204" + "remarks": "rule_set_201" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install pam_pwquality Package", - "remarks": "rule_set_204" + "remarks": "rule_set_201" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwquality_password_auth", - "remarks": "rule_set_205" + "remarks": "rule_set_202" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM password complexity module is enabled in password-auth", - "remarks": "rule_set_205" + "remarks": "rule_set_202" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwquality_system_auth", - "remarks": "rule_set_206" + "remarks": "rule_set_203" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM password complexity module is enabled in system-auth", - "remarks": "rule_set_206" + "remarks": "rule_set_203" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_enabled", - "remarks": "rule_set_207" + "remarks": "rule_set_204" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify pam_unix module is activated", - "remarks": "rule_set_207" + "remarks": "rule_set_204" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny", - "remarks": "rule_set_208" + "remarks": "rule_set_205" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Lock Accounts After Failed Password Attempts", - "remarks": "rule_set_208" + "remarks": "rule_set_205" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_unlock_time_with_zero", - "remarks": "rule_set_209" + "remarks": "rule_set_206" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Lockout Time for Failed Password Attempts", - "remarks": "rule_set_209" + "remarks": "rule_set_206" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_difok", - "remarks": "rule_set_210" + "remarks": "rule_set_207" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Characters", - "remarks": "rule_set_210" + "remarks": "rule_set_207" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minlen", - "remarks": "rule_set_211" + "remarks": "rule_set_208" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Length", - "remarks": "rule_set_211" + "remarks": "rule_set_208" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minclass", - "remarks": "rule_set_212" + "remarks": "rule_set_209" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", - "remarks": "rule_set_212" + "remarks": "rule_set_209" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_maxrepeat", - "remarks": "rule_set_213" + "remarks": "rule_set_210" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Consecutive Repeating Characters", - "remarks": "rule_set_213" + "remarks": "rule_set_210" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_maxsequence", - "remarks": "rule_set_214" + "remarks": "rule_set_211" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit the maximum number of sequential characters in passwords", - "remarks": "rule_set_214" + "remarks": "rule_set_211" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_dictcheck", - "remarks": "rule_set_215" + "remarks": "rule_set_212" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Prevent the Use of Dictionary Words", - "remarks": "rule_set_215" + "remarks": "rule_set_212" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_enforce_root", - "remarks": "rule_set_216" + "remarks": "rule_set_213" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Enforce for root User", - "remarks": "rule_set_216" + "remarks": "rule_set_213" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_password_auth", - "remarks": "rule_set_217" + "remarks": "rule_set_214" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: password-auth", - "remarks": "rule_set_217" + "remarks": "rule_set_214" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_system_auth", - "remarks": "rule_set_218" + "remarks": "rule_set_215" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: system-auth", - "remarks": "rule_set_218" + "remarks": "rule_set_215" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_enforce_for_root", - "remarks": "rule_set_219" + "remarks": "rule_set_216" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Password History Is Enforced for the Root User", - "remarks": "rule_set_219" + "remarks": "rule_set_216" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_use_authtok", - "remarks": "rule_set_220" + "remarks": "rule_set_217" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Password History with use_authtok", - "remarks": "rule_set_220" + "remarks": "rule_set_217" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords", - "remarks": "rule_set_221" + "remarks": "rule_set_218" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent Login to Accounts With Empty Password", - "remarks": "rule_set_221" + "remarks": "rule_set_218" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_no_remember", - "remarks": "rule_set_222" + "remarks": "rule_set_219" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Avoid using remember in pam_unix module", - "remarks": "rule_set_222" + "remarks": "rule_set_219" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_systemauth", - "remarks": "rule_set_223" + "remarks": "rule_set_220" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - system-auth", - "remarks": "rule_set_223" + "remarks": "rule_set_220" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_passwordauth", - "remarks": "rule_set_224" + "remarks": "rule_set_221" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - password-auth", - "remarks": "rule_set_224" + "remarks": "rule_set_221" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_authtok", - "remarks": "rule_set_225" + "remarks": "rule_set_222" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require use_authtok for pam_unix.so", - "remarks": "rule_set_225" + "remarks": "rule_set_222" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_maximum_age_login_defs", - "remarks": "rule_set_226" + "remarks": "rule_set_223" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Age", - "remarks": "rule_set_226" + "remarks": "rule_set_223" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_max_life_existing", - "remarks": "rule_set_227" + "remarks": "rule_set_224" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Maximum Age", - "remarks": "rule_set_227" + "remarks": "rule_set_224" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_warn_age_login_defs", - "remarks": "rule_set_228" + "remarks": "rule_set_225" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Warning Age", - "remarks": "rule_set_228" + "remarks": "rule_set_225" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_warn_age_existing", - "remarks": "rule_set_229" + "remarks": "rule_set_226" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Warning Age", - "remarks": "rule_set_229" + "remarks": "rule_set_226" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_libuserconf", - "remarks": "rule_set_230" + "remarks": "rule_set_227" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/libuser.conf", - "remarks": "rule_set_230" + "remarks": "rule_set_227" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_logindefs", - "remarks": "rule_set_231" + "remarks": "rule_set_228" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/login.defs", - "remarks": "rule_set_231" + "remarks": "rule_set_228" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_disable_post_pw_expiration", - "remarks": "rule_set_232" + "remarks": "rule_set_229" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Account Expiration Following Inactivity", - "remarks": "rule_set_232" + "remarks": "rule_set_229" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_set_post_pw_existing", - "remarks": "rule_set_233" + "remarks": "rule_set_230" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set existing passwords a period of inactivity before they been locked", - "remarks": "rule_set_233" + "remarks": "rule_set_230" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_last_change_is_in_past", - "remarks": "rule_set_234" + "remarks": "rule_set_231" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure all users last password change date is in the past", - "remarks": "rule_set_234" + "remarks": "rule_set_231" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_no_uid_except_zero", - "remarks": "rule_set_235" + "remarks": "rule_set_232" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Root Has UID 0", - "remarks": "rule_set_235" + "remarks": "rule_set_232" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_gid_zero", - "remarks": "rule_set_236" + "remarks": "rule_set_233" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Root Has A Primary GID 0", - "remarks": "rule_set_236" + "remarks": "rule_set_233" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "groups_no_zero_gid_except_root", - "remarks": "rule_set_237" + "remarks": "rule_set_234" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Group Root Has GID 0", - "remarks": "rule_set_237" + "remarks": "rule_set_234" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_root_password_configured", - "remarks": "rule_set_238" + "remarks": "rule_set_235" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Authentication Required for Single User Mode", - "remarks": "rule_set_238" + "remarks": "rule_set_235" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_path_dirs_no_write", - "remarks": "rule_set_239" + "remarks": "rule_set_236" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include World or Group-Writable Directories", - "remarks": "rule_set_239" + "remarks": "rule_set_236" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "root_path_no_dot", - "remarks": "rule_set_240" + "remarks": "rule_set_237" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include Relative Paths or Null Directories", - "remarks": "rule_set_240" + "remarks": "rule_set_237" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_root", - "remarks": "rule_set_241" + "remarks": "rule_set_238" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Root Bash Umask is Set Correctly", - "remarks": "rule_set_241" + "remarks": "rule_set_238" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_password_auth_for_systemaccounts", - "remarks": "rule_set_242" + "remarks": "rule_set_239" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Are Locked", - "remarks": "rule_set_242" + "remarks": "rule_set_239" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_shelllogin_for_systemaccounts", - "remarks": "rule_set_243" + "remarks": "rule_set_240" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", - "remarks": "rule_set_243" + "remarks": "rule_set_240" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_invalid_shell_accounts_unlocked", - "remarks": "rule_set_244" + "remarks": "rule_set_241" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Non-Interactive Accounts Are Locked", - "remarks": "rule_set_244" + "remarks": "rule_set_241" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_tmout", - "remarks": "rule_set_245" + "remarks": "rule_set_242" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Interactive Session Timeout", - "remarks": "rule_set_245" + "remarks": "rule_set_242" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_bashrc", - "remarks": "rule_set_246" + "remarks": "rule_set_243" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Bash Umask is Set Correctly", - "remarks": "rule_set_246" + "remarks": "rule_set_243" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_login_defs", - "remarks": "rule_set_247" + "remarks": "rule_set_244" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in login.defs", - "remarks": "rule_set_247" + "remarks": "rule_set_244" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_profile", - "remarks": "rule_set_248" + "remarks": "rule_set_245" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in /etc/profile", - "remarks": "rule_set_248" + "remarks": "rule_set_245" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_249" + "remarks": "rule_set_246" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_249" + "remarks": "rule_set_246" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_build_database", - "remarks": "rule_set_250" + "remarks": "rule_set_247" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Build and Test AIDE Database", - "remarks": "rule_set_250" + "remarks": "rule_set_247" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_periodic_cron_checking", - "remarks": "rule_set_251" + "remarks": "rule_set_248" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Periodic Execution of AIDE", - "remarks": "rule_set_251" + "remarks": "rule_set_248" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_check_audit_tools", - "remarks": "rule_set_252" + "remarks": "rule_set_249" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure AIDE to Verify the Audit Tools", - "remarks": "rule_set_252" + "remarks": "rule_set_249" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journald_enabled", - "remarks": "rule_set_253" + "remarks": "rule_set_250" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journald Service", - "remarks": "rule_set_253" + "remarks": "rule_set_250" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_journald_and_rsyslog_not_active_together", - "remarks": "rule_set_254" + "remarks": "rule_set_251" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald and rsyslog Are Not Active Together", - "remarks": "rule_set_254" + "remarks": "rule_set_251" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_systemd-journal-remote_installed", - "remarks": "rule_set_255" + "remarks": "rule_set_252" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install systemd-journal-remote Package", - "remarks": "rule_set_255" + "remarks": "rule_set_252" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journal-upload_enabled", - "remarks": "rule_set_256" + "remarks": "rule_set_253" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journal-upload Service", - "remarks": "rule_set_256" + "remarks": "rule_set_253" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "socket_systemd-journal-remote_disabled", - "remarks": "rule_set_257" + "remarks": "rule_set_254" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable systemd-journal-remote Socket", - "remarks": "rule_set_257" + "remarks": "rule_set_254" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_disable_forward_to_syslog", - "remarks": "rule_set_258" + "remarks": "rule_set_255" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald ForwardToSyslog is disabled", - "remarks": "rule_set_258" + "remarks": "rule_set_255" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_compress", - "remarks": "rule_set_259" + "remarks": "rule_set_256" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to compress large log files", - "remarks": "rule_set_259" + "remarks": "rule_set_256" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_storage", - "remarks": "rule_set_260" + "remarks": "rule_set_257" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to write log files to persistent disk", - "remarks": "rule_set_260" + "remarks": "rule_set_257" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_261" + "remarks": "rule_set_258" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_261" + "remarks": "rule_set_258" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_262" + "remarks": "rule_set_259" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_262" + "remarks": "rule_set_259" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_263" + "remarks": "rule_set_260" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_263" + "remarks": "rule_set_260" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_passwd", - "remarks": "rule_set_264" + "remarks": "rule_set_261" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns passwd File", - "remarks": "rule_set_264" + "remarks": "rule_set_261" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_passwd", - "remarks": "rule_set_265" + "remarks": "rule_set_262" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns passwd File", - "remarks": "rule_set_265" + "remarks": "rule_set_262" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_passwd", - "remarks": "rule_set_266" + "remarks": "rule_set_263" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on passwd File", - "remarks": "rule_set_266" + "remarks": "rule_set_263" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_passwd", - "remarks": "rule_set_267" + "remarks": "rule_set_264" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup passwd File", - "remarks": "rule_set_267" + "remarks": "rule_set_264" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_passwd", - "remarks": "rule_set_268" + "remarks": "rule_set_265" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup passwd File", - "remarks": "rule_set_268" + "remarks": "rule_set_265" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_passwd", - "remarks": "rule_set_269" + "remarks": "rule_set_266" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup passwd File", - "remarks": "rule_set_269" + "remarks": "rule_set_266" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_group", - "remarks": "rule_set_270" + "remarks": "rule_set_267" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns group File", - "remarks": "rule_set_270" + "remarks": "rule_set_267" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_group", - "remarks": "rule_set_271" + "remarks": "rule_set_268" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns group File", - "remarks": "rule_set_271" + "remarks": "rule_set_268" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_group", - "remarks": "rule_set_272" + "remarks": "rule_set_269" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on group File", - "remarks": "rule_set_272" + "remarks": "rule_set_269" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_group", - "remarks": "rule_set_273" + "remarks": "rule_set_270" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup group File", - "remarks": "rule_set_273" + "remarks": "rule_set_270" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_group", - "remarks": "rule_set_274" + "remarks": "rule_set_271" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup group File", - "remarks": "rule_set_274" + "remarks": "rule_set_271" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_group", - "remarks": "rule_set_275" + "remarks": "rule_set_272" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup group File", - "remarks": "rule_set_275" + "remarks": "rule_set_272" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shadow", - "remarks": "rule_set_276" + "remarks": "rule_set_273" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns shadow File", - "remarks": "rule_set_276" + "remarks": "rule_set_273" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shadow", - "remarks": "rule_set_277" + "remarks": "rule_set_274" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns shadow File", - "remarks": "rule_set_277" + "remarks": "rule_set_274" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shadow", - "remarks": "rule_set_278" + "remarks": "rule_set_275" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on shadow File", - "remarks": "rule_set_278" + "remarks": "rule_set_275" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_shadow", - "remarks": "rule_set_279" + "remarks": "rule_set_276" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup shadow File", - "remarks": "rule_set_279" + "remarks": "rule_set_276" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_shadow", - "remarks": "rule_set_280" + "remarks": "rule_set_277" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup shadow File", - "remarks": "rule_set_280" + "remarks": "rule_set_277" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_shadow", - "remarks": "rule_set_281" + "remarks": "rule_set_278" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup shadow File", - "remarks": "rule_set_281" + "remarks": "rule_set_278" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_gshadow", - "remarks": "rule_set_282" + "remarks": "rule_set_279" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns gshadow File", - "remarks": "rule_set_282" + "remarks": "rule_set_279" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_gshadow", - "remarks": "rule_set_283" + "remarks": "rule_set_280" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns gshadow File", - "remarks": "rule_set_283" + "remarks": "rule_set_280" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_gshadow", - "remarks": "rule_set_284" + "remarks": "rule_set_281" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on gshadow File", - "remarks": "rule_set_284" + "remarks": "rule_set_281" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_gshadow", - "remarks": "rule_set_285" + "remarks": "rule_set_282" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup gshadow File", - "remarks": "rule_set_285" + "remarks": "rule_set_282" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_gshadow", - "remarks": "rule_set_286" + "remarks": "rule_set_283" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup gshadow File", - "remarks": "rule_set_286" + "remarks": "rule_set_283" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_gshadow", - "remarks": "rule_set_287" + "remarks": "rule_set_284" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup gshadow File", - "remarks": "rule_set_287" + "remarks": "rule_set_284" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shells", - "remarks": "rule_set_288" + "remarks": "rule_set_285" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/shells File", - "remarks": "rule_set_288" + "remarks": "rule_set_285" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shells", - "remarks": "rule_set_289" + "remarks": "rule_set_286" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Who Owns /etc/shells File", - "remarks": "rule_set_289" + "remarks": "rule_set_286" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shells", - "remarks": "rule_set_290" + "remarks": "rule_set_287" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/shells File", - "remarks": "rule_set_290" + "remarks": "rule_set_287" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd", - "remarks": "rule_set_291" + "remarks": "rule_set_288" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd File", - "remarks": "rule_set_291" + "remarks": "rule_set_288" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd", - "remarks": "rule_set_292" + "remarks": "rule_set_289" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd File", - "remarks": "rule_set_292" + "remarks": "rule_set_289" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd", - "remarks": "rule_set_293" + "remarks": "rule_set_290" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd File", - "remarks": "rule_set_293" + "remarks": "rule_set_290" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd_old", - "remarks": "rule_set_294" + "remarks": "rule_set_291" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_294" + "remarks": "rule_set_291" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd_old", - "remarks": "rule_set_295" + "remarks": "rule_set_292" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_295" + "remarks": "rule_set_292" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd_old", - "remarks": "rule_set_296" + "remarks": "rule_set_293" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd.old File", - "remarks": "rule_set_296" + "remarks": "rule_set_293" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_297" + "remarks": "rule_set_294" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_297" + "remarks": "rule_set_294" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_298" + "remarks": "rule_set_295" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_298" + "remarks": "rule_set_295" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_unowned_by_user", - "remarks": "rule_set_299" + "remarks": "rule_set_296" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a User", - "remarks": "rule_set_299" + "remarks": "rule_set_296" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_ungroupowned", - "remarks": "rule_set_300" + "remarks": "rule_set_297" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a Group", - "remarks": "rule_set_300" + "remarks": "rule_set_297" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_all_shadowed", - "remarks": "rule_set_301" + "remarks": "rule_set_298" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify All Account Password Hashes are Shadowed", - "remarks": "rule_set_301" + "remarks": "rule_set_298" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords_etc_shadow", - "remarks": "rule_set_302" + "remarks": "rule_set_299" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure There Are No Accounts With Blank or Null Passwords", - "remarks": "rule_set_302" + "remarks": "rule_set_299" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gid_passwd_group_same", - "remarks": "rule_set_303" + "remarks": "rule_set_300" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", - "remarks": "rule_set_303" + "remarks": "rule_set_300" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_id", - "remarks": "rule_set_304" + "remarks": "rule_set_301" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique User IDs", - "remarks": "rule_set_304" + "remarks": "rule_set_301" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_id", - "remarks": "rule_set_305" + "remarks": "rule_set_302" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group ID", - "remarks": "rule_set_305" + "remarks": "rule_set_302" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_name", - "remarks": "rule_set_306" + "remarks": "rule_set_303" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique Names", - "remarks": "rule_set_306" + "remarks": "rule_set_303" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_name", - "remarks": "rule_set_307" + "remarks": "rule_set_304" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group Names", - "remarks": "rule_set_307" + "remarks": "rule_set_304" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_interactive_home_directory_exists", - "remarks": "rule_set_308" + "remarks": "rule_set_305" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive Users Home Directories Must Exist", - "remarks": "rule_set_308" + "remarks": "rule_set_305" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_home_directories", - "remarks": "rule_set_309" + "remarks": "rule_set_306" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Be Owned By The Primary User", - "remarks": "rule_set_309" + "remarks": "rule_set_306" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_home_directories", - "remarks": "rule_set_310" + "remarks": "rule_set_307" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", - "remarks": "rule_set_310" + "remarks": "rule_set_307" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_311" + "remarks": "rule_set_308" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_311" + "remarks": "rule_set_308" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_312" + "remarks": "rule_set_309" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_312" + "remarks": "rule_set_309" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_no_world_writable_programs", - "remarks": "rule_set_313" + "remarks": "rule_set_310" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Not Run World-Writable Programs", - "remarks": "rule_set_313" + "remarks": "rule_set_310" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_314" + "remarks": "rule_set_311" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_314" + "remarks": "rule_set_311" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_forward_files", - "remarks": "rule_set_315" + "remarks": "rule_set_312" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .forward Files Exist", - "remarks": "rule_set_315" + "remarks": "rule_set_312" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_netrc_files", - "remarks": "rule_set_316" + "remarks": "rule_set_313" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No netrc Files Exist", - "remarks": "rule_set_316" + "remarks": "rule_set_313" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rhost_files", - "remarks": "rule_set_317" + "remarks": "rule_set_314" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .rhost Files Exist", - "remarks": "rule_set_317" + "remarks": "rule_set_314" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_bash_history", - "remarks": "rule_set_318" + "remarks": "rule_set_315" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure User Bash History File Has Correct Permissions", - "remarks": "rule_set_318" + "remarks": "rule_set_315" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_overlayfs_disabled", - "remarks": "rule_set_319" + "remarks": "rule_set_316" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure overlayfs kernel module is not available", - "remarks": "rule_set_319" + "remarks": "rule_set_316" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_squashfs_disabled", - "remarks": "rule_set_320" + "remarks": "rule_set_317" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Mounting of squashfs", - "remarks": "rule_set_320" + "remarks": "rule_set_317" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_udf_disabled", - "remarks": "rule_set_321" + "remarks": "rule_set_318" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Mounting of udf", - "remarks": "rule_set_321" + "remarks": "rule_set_318" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_firewire-core_disabled", - "remarks": "rule_set_322" + "remarks": "rule_set_319" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable IEEE 1394 (FireWire) Support", - "remarks": "rule_set_322" + "remarks": "rule_set_319" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_usb-storage_disabled", - "remarks": "rule_set_323" + "remarks": "rule_set_320" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Modprobe Loading of USB Storage Driver", - "remarks": "rule_set_323" + "remarks": "rule_set_320" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_home", - "remarks": "rule_set_324" + "remarks": "rule_set_321" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /home Located On Separate Partition", - "remarks": "rule_set_324" + "remarks": "rule_set_321" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var", - "remarks": "rule_set_325" + "remarks": "rule_set_322" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var Located On Separate Partition", - "remarks": "rule_set_325" + "remarks": "rule_set_322" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_tmp", - "remarks": "rule_set_326" + "remarks": "rule_set_323" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/tmp Located On Separate Partition", - "remarks": "rule_set_326" + "remarks": "rule_set_323" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log", - "remarks": "rule_set_327" + "remarks": "rule_set_324" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log Located On Separate Partition", - "remarks": "rule_set_327" + "remarks": "rule_set_324" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log_audit", - "remarks": "rule_set_328" + "remarks": "rule_set_325" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log/audit Located On Separate Partition", - "remarks": "rule_set_328" + "remarks": "rule_set_325" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_weak_deps", - "remarks": "rule_set_329" + "remarks": "rule_set_326" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Installation of Weak Dependencies in DNF", - "remarks": "rule_set_329" + "remarks": "rule_set_326" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_state", - "remarks": "rule_set_330" + "remarks": "rule_set_327" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SELinux State is Enforcing", - "remarks": "rule_set_330" + "remarks": "rule_set_327" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_symlinks", - "remarks": "rule_set_331" + "remarks": "rule_set_328" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", - "remarks": "rule_set_331" + "remarks": "rule_set_328" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_automount", - "remarks": "rule_set_332" + "remarks": "rule_set_329" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automounting", - "remarks": "rule_set_332" + "remarks": "rule_set_329" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_automount_open", - "remarks": "rule_set_333" + "remarks": "rule_set_330" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automount Opening", - "remarks": "rule_set_333" + "remarks": "rule_set_330" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "xwayland_disabled", - "remarks": "rule_set_334" + "remarks": "rule_set_331" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable XWayland", - "remarks": "rule_set_334" + "remarks": "rule_set_331" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_autofs_disabled", - "remarks": "rule_set_335" + "remarks": "rule_set_332" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the Automounter", - "remarks": "rule_set_335" + "remarks": "rule_set_332" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_avahi-daemon_disabled", - "remarks": "rule_set_336" + "remarks": "rule_set_333" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Avahi Server Software", - "remarks": "rule_set_336" + "remarks": "rule_set_333" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_cockpit_disabled", - "remarks": "rule_set_337" + "remarks": "rule_set_334" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Cockpit Management Server", - "remarks": "rule_set_337" + "remarks": "rule_set_334" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_openldap-clients_removed", - "remarks": "rule_set_338" + "remarks": "rule_set_335" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure LDAP client is not installed", - "remarks": "rule_set_338" + "remarks": "rule_set_335" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_bluetooth_disabled", - "remarks": "rule_set_339" + "remarks": "rule_set_336" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Bluetooth Service", - "remarks": "rule_set_339" + "remarks": "rule_set_336" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_nopasswd", - "remarks": "rule_set_340" + "remarks": "rule_set_337" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD", - "remarks": "rule_set_340" + "remarks": "rule_set_337" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny_root", - "remarks": "rule_set_341" + "remarks": "rule_set_338" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the root Account for Failed Password Attempts", - "remarks": "rule_set_341" + "remarks": "rule_set_338" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_minimum_age_login_defs", - "remarks": "rule_set_342" + "remarks": "rule_set_339" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Minimum Age", - "remarks": "rule_set_342" + "remarks": "rule_set_339" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_min_life_existing", - "remarks": "rule_set_343" + "remarks": "rule_set_340" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Minimum Age", - "remarks": "rule_set_343" + "remarks": "rule_set_340" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_nologin_in_shells", - "remarks": "rule_set_344" + "remarks": "rule_set_341" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure nologin Shell is Not Listed in /etc/shells", - "remarks": "rule_set_344" + "remarks": "rule_set_341" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit_installed", - "remarks": "rule_set_345" + "remarks": "rule_set_342" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit Subsystem is Installed", - "remarks": "rule_set_345" + "remarks": "rule_set_342" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit-libs_installed", - "remarks": "rule_set_346" + "remarks": "rule_set_343" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit-libs package as a part of audit Subsystem is Installed", - "remarks": "rule_set_346" + "remarks": "rule_set_343" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_argument", - "remarks": "rule_set_347" + "remarks": "rule_set_344" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Auditing for Processes Which Start Prior to the Audit Daemon", - "remarks": "rule_set_347" + "remarks": "rule_set_344" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_backlog_limit_argument", - "remarks": "rule_set_348" + "remarks": "rule_set_345" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Extend Audit Backlog Limit for the Audit Daemon", - "remarks": "rule_set_348" + "remarks": "rule_set_345" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_auditd_enabled", - "remarks": "rule_set_349" + "remarks": "rule_set_346" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable auditd Service", - "remarks": "rule_set_349" + "remarks": "rule_set_346" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_max_log_file", - "remarks": "rule_set_350" + "remarks": "rule_set_347" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Max Log File Size", - "remarks": "rule_set_350" + "remarks": "rule_set_347" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_max_log_file_action", - "remarks": "rule_set_351" + "remarks": "rule_set_348" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd max_log_file_action Upon Reaching Maximum Log Size", - "remarks": "rule_set_351" + "remarks": "rule_set_348" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_disk_error_action", - "remarks": "rule_set_352" + "remarks": "rule_set_349" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Disk Error Action on Disk Error", - "remarks": "rule_set_352" + "remarks": "rule_set_349" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_disk_full_action", - "remarks": "rule_set_353" + "remarks": "rule_set_350" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Disk Full Action when Disk Space Is Full", - "remarks": "rule_set_353" + "remarks": "rule_set_350" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_admin_space_left_action", - "remarks": "rule_set_354" + "remarks": "rule_set_351" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd admin_space_left Action on Low Disk Space", - "remarks": "rule_set_354" + "remarks": "rule_set_351" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_space_left_action", - "remarks": "rule_set_355" + "remarks": "rule_set_352" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd space_left Action on Low Disk Space", - "remarks": "rule_set_355" + "remarks": "rule_set_352" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_sysadmin_actions", - "remarks": "rule_set_356" + "remarks": "rule_set_353" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects System Administrator Actions", - "remarks": "rule_set_356" + "remarks": "rule_set_353" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_suid_auid_privilege_function", - "remarks": "rule_set_357" + "remarks": "rule_set_354" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events When Executables Are Run As Another User", - "remarks": "rule_set_357" + "remarks": "rule_set_354" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_sudo_log_events", - "remarks": "rule_set_358" + "remarks": "rule_set_355" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to perform maintenance activities", - "remarks": "rule_set_358" + "remarks": "rule_set_355" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_adjtimex", - "remarks": "rule_set_359" + "remarks": "rule_set_356" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through adjtimex", - "remarks": "rule_set_359" + "remarks": "rule_set_356" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_settimeofday", - "remarks": "rule_set_360" + "remarks": "rule_set_357" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through settimeofday", - "remarks": "rule_set_360" + "remarks": "rule_set_357" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_clock_settime", - "remarks": "rule_set_361" + "remarks": "rule_set_358" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through clock_settime", - "remarks": "rule_set_361" + "remarks": "rule_set_358" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_watch_localtime", - "remarks": "rule_set_362" + "remarks": "rule_set_359" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter the localtime File", - "remarks": "rule_set_362" + "remarks": "rule_set_359" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_setdomainname", - "remarks": "rule_set_363" + "remarks": "rule_set_360" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - setdomainname", - "remarks": "rule_set_363" + "remarks": "rule_set_360" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_sethostname", - "remarks": "rule_set_364" + "remarks": "rule_set_361" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - sethostname", - "remarks": "rule_set_364" + "remarks": "rule_set_361" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_issue", - "remarks": "rule_set_365" + "remarks": "rule_set_362" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/issue", - "remarks": "rule_set_365" + "remarks": "rule_set_362" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_issue_net", - "remarks": "rule_set_366" + "remarks": "rule_set_363" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/issue.net", - "remarks": "rule_set_366" + "remarks": "rule_set_363" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_hosts", - "remarks": "rule_set_367" + "remarks": "rule_set_364" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/hosts", - "remarks": "rule_set_367" + "remarks": "rule_set_364" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_hostname_file", - "remarks": "rule_set_368" + "remarks": "rule_set_365" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/hostname", - "remarks": "rule_set_368" + "remarks": "rule_set_365" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_sysconfig_network", - "remarks": "rule_set_369" + "remarks": "rule_set_366" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/sysconfig/network", - "remarks": "rule_set_369" + "remarks": "rule_set_366" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_networkmanager_system_connections", - "remarks": "rule_set_370" + "remarks": "rule_set_367" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/system-connections/", - "remarks": "rule_set_370" + "remarks": "rule_set_367" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_networkmanager", - "remarks": "rule_set_371" + "remarks": "rule_set_368" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/", - "remarks": "rule_set_371" + "remarks": "rule_set_368" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands", - "remarks": "rule_set_372" + "remarks": "rule_set_369" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands", - "remarks": "rule_set_372" + "remarks": "rule_set_369" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_creat", - "remarks": "rule_set_373" + "remarks": "rule_set_370" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - creat", - "remarks": "rule_set_373" + "remarks": "rule_set_370" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_ftruncate", - "remarks": "rule_set_374" + "remarks": "rule_set_371" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - ftruncate", - "remarks": "rule_set_374" + "remarks": "rule_set_371" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_open", - "remarks": "rule_set_375" + "remarks": "rule_set_372" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - open", - "remarks": "rule_set_375" + "remarks": "rule_set_372" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_openat", - "remarks": "rule_set_376" + "remarks": "rule_set_373" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - openat", - "remarks": "rule_set_376" + "remarks": "rule_set_373" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_truncate", - "remarks": "rule_set_377" + "remarks": "rule_set_374" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - truncate", - "remarks": "rule_set_377" + "remarks": "rule_set_374" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_group", - "remarks": "rule_set_378" + "remarks": "rule_set_375" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/group", - "remarks": "rule_set_378" + "remarks": "rule_set_375" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_passwd", - "remarks": "rule_set_379" + "remarks": "rule_set_376" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/passwd", - "remarks": "rule_set_379" + "remarks": "rule_set_376" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_gshadow", - "remarks": "rule_set_380" + "remarks": "rule_set_377" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/gshadow", - "remarks": "rule_set_380" + "remarks": "rule_set_377" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_shadow", - "remarks": "rule_set_381" + "remarks": "rule_set_378" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/shadow", - "remarks": "rule_set_381" + "remarks": "rule_set_378" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_opasswd", - "remarks": "rule_set_382" + "remarks": "rule_set_379" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", - "remarks": "rule_set_382" + "remarks": "rule_set_379" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_nsswitch_conf", - "remarks": "rule_set_383" + "remarks": "rule_set_380" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/nsswitch.conf", - "remarks": "rule_set_383" + "remarks": "rule_set_380" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_pam_conf", - "remarks": "rule_set_384" + "remarks": "rule_set_381" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/pam.conf", - "remarks": "rule_set_384" + "remarks": "rule_set_381" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_pamd", - "remarks": "rule_set_385" + "remarks": "rule_set_382" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/pam.d/", - "remarks": "rule_set_385" + "remarks": "rule_set_382" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chmod", - "remarks": "rule_set_386" + "remarks": "rule_set_383" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", - "remarks": "rule_set_386" + "remarks": "rule_set_383" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmod", - "remarks": "rule_set_387" + "remarks": "rule_set_384" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmod", - "remarks": "rule_set_387" + "remarks": "rule_set_384" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat", - "remarks": "rule_set_388" + "remarks": "rule_set_385" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat", - "remarks": "rule_set_388" + "remarks": "rule_set_385" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat2", - "remarks": "rule_set_389" + "remarks": "rule_set_386" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat2", - "remarks": "rule_set_389" + "remarks": "rule_set_386" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chown", - "remarks": "rule_set_390" + "remarks": "rule_set_387" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chown", - "remarks": "rule_set_390" + "remarks": "rule_set_387" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchown", - "remarks": "rule_set_391" + "remarks": "rule_set_388" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchown", - "remarks": "rule_set_391" + "remarks": "rule_set_388" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchownat", - "remarks": "rule_set_392" + "remarks": "rule_set_389" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchownat", - "remarks": "rule_set_392" + "remarks": "rule_set_389" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lchown", - "remarks": "rule_set_393" + "remarks": "rule_set_390" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lchown", - "remarks": "rule_set_393" + "remarks": "rule_set_390" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fremovexattr", - "remarks": "rule_set_394" + "remarks": "rule_set_391" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fremovexattr", - "remarks": "rule_set_394" + "remarks": "rule_set_391" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fsetxattr", - "remarks": "rule_set_395" + "remarks": "rule_set_392" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fsetxattr", - "remarks": "rule_set_395" + "remarks": "rule_set_392" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lremovexattr", - "remarks": "rule_set_396" + "remarks": "rule_set_393" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lremovexattr", - "remarks": "rule_set_396" + "remarks": "rule_set_393" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lsetxattr", - "remarks": "rule_set_397" + "remarks": "rule_set_394" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lsetxattr", - "remarks": "rule_set_397" + "remarks": "rule_set_394" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_removexattr", - "remarks": "rule_set_398" + "remarks": "rule_set_395" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - removexattr", - "remarks": "rule_set_398" + "remarks": "rule_set_395" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_setxattr", - "remarks": "rule_set_399" + "remarks": "rule_set_396" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - setxattr", - "remarks": "rule_set_399" + "remarks": "rule_set_396" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_media_export", - "remarks": "rule_set_400" + "remarks": "rule_set_397" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Exporting to Media (successful)", - "remarks": "rule_set_400" + "remarks": "rule_set_397" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_utmp", - "remarks": "rule_set_401" + "remarks": "rule_set_398" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information utmp", - "remarks": "rule_set_401" + "remarks": "rule_set_398" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_btmp", - "remarks": "rule_set_402" + "remarks": "rule_set_399" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information btmp", - "remarks": "rule_set_402" + "remarks": "rule_set_399" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_wtmp", - "remarks": "rule_set_403" + "remarks": "rule_set_400" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", - "remarks": "rule_set_403" + "remarks": "rule_set_400" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_faillock", - "remarks": "rule_set_404" + "remarks": "rule_set_401" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - faillock", - "remarks": "rule_set_404" + "remarks": "rule_set_401" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_lastlog", - "remarks": "rule_set_405" + "remarks": "rule_set_402" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - lastlog", - "remarks": "rule_set_405" + "remarks": "rule_set_402" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlink", - "remarks": "rule_set_406" + "remarks": "rule_set_403" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlink", - "remarks": "rule_set_406" + "remarks": "rule_set_403" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlinkat", - "remarks": "rule_set_407" + "remarks": "rule_set_404" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlinkat", - "remarks": "rule_set_407" + "remarks": "rule_set_404" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rename", - "remarks": "rule_set_408" + "remarks": "rule_set_405" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rename", - "remarks": "rule_set_408" + "remarks": "rule_set_405" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat", - "remarks": "rule_set_409" + "remarks": "rule_set_406" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat", - "remarks": "rule_set_409" + "remarks": "rule_set_406" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat2", - "remarks": "rule_set_410" + "remarks": "rule_set_407" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat2", - "remarks": "rule_set_410" + "remarks": "rule_set_407" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_etc_selinux", - "remarks": "rule_set_411" + "remarks": "rule_set_408" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls (/etc/selinux)", - "remarks": "rule_set_411" + "remarks": "rule_set_408" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_usr_share", - "remarks": "rule_set_412" + "remarks": "rule_set_409" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls in usr/share", - "remarks": "rule_set_412" + "remarks": "rule_set_409" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chcon", - "remarks": "rule_set_413" + "remarks": "rule_set_410" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chcon", - "remarks": "rule_set_413" + "remarks": "rule_set_410" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_setfacl", - "remarks": "rule_set_414" + "remarks": "rule_set_411" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run setfacl", - "remarks": "rule_set_414" + "remarks": "rule_set_411" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chacl", - "remarks": "rule_set_415" + "remarks": "rule_set_412" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chacl", - "remarks": "rule_set_415" + "remarks": "rule_set_412" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_usermod", - "remarks": "rule_set_416" + "remarks": "rule_set_413" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - usermod", - "remarks": "rule_set_416" + "remarks": "rule_set_413" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_kmod", - "remarks": "rule_set_417" + "remarks": "rule_set_414" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - kmod", - "remarks": "rule_set_417" + "remarks": "rule_set_414" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_init", - "remarks": "rule_set_418" + "remarks": "rule_set_415" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading - init_module", - "remarks": "rule_set_418" + "remarks": "rule_set_415" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_finit", - "remarks": "rule_set_419" + "remarks": "rule_set_416" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - finit_module", - "remarks": "rule_set_419" + "remarks": "rule_set_416" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_delete", - "remarks": "rule_set_420" + "remarks": "rule_set_417" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Unloading - delete_module", - "remarks": "rule_set_420" + "remarks": "rule_set_417" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_query", - "remarks": "rule_set_421" + "remarks": "rule_set_418" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - query_module", - "remarks": "rule_set_421" + "remarks": "rule_set_418" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_continue_loading", - "remarks": "rule_set_422" + "remarks": "rule_set_419" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Audit Configuration is Loaded Regardless of Errors", - "remarks": "rule_set_422" + "remarks": "rule_set_419" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_immutable", - "remarks": "rule_set_423" + "remarks": "rule_set_420" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Make the auditd Configuration Immutable", - "remarks": "rule_set_423" + "remarks": "rule_set_420" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_var_log_audit", - "remarks": "rule_set_424" + "remarks": "rule_set_421" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0750 or Less Permissive", - "remarks": "rule_set_424" + "remarks": "rule_set_421" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_var_log_audit", - "remarks": "rule_set_425" + "remarks": "rule_set_422" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0640 or Less Permissive", - "remarks": "rule_set_425" + "remarks": "rule_set_422" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_var_log_audit_stig", - "remarks": "rule_set_426" + "remarks": "rule_set_423" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Owned By Root", - "remarks": "rule_set_426" + "remarks": "rule_set_423" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_group_ownership_var_log_audit", - "remarks": "rule_set_427" + "remarks": "rule_set_424" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Group Owned By Root", - "remarks": "rule_set_427" + "remarks": "rule_set_424" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_audit_configuration", - "remarks": "rule_set_428" + "remarks": "rule_set_425" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Permissions are 640 or More Restrictive", - "remarks": "rule_set_428" + "remarks": "rule_set_425" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_audit_configuration", - "remarks": "rule_set_429" + "remarks": "rule_set_426" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Must Be Owned By Root", - "remarks": "rule_set_429" + "remarks": "rule_set_426" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_audit_configuration", - "remarks": "rule_set_430" + "remarks": "rule_set_427" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Must Be Owned By Group root", - "remarks": "rule_set_430" + "remarks": "rule_set_427" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_audit_binaries", - "remarks": "rule_set_431" + "remarks": "rule_set_428" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools Have Mode 0755 or less", - "remarks": "rule_set_431" + "remarks": "rule_set_428" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_audit_binaries", - "remarks": "rule_set_432" + "remarks": "rule_set_429" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools are owned by root", - "remarks": "rule_set_432" + "remarks": "rule_set_429" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_audit_binaries", - "remarks": "rule_set_433" + "remarks": "rule_set_430" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools are owned by group root", - "remarks": "rule_set_433" + "remarks": "rule_set_430" } ], "control-implementations": [ { - "uuid": "0be94f20-1d17-4699-91d3-62a04cc3b8ec", + "uuid": "22877161-51ce-4965-bdeb-0bf1a09336ec", "source": "trestle://profiles/rhel10-cis_rhel10-l2_workstation/profile.json", "description": "Control implementation for cis_workstation_l2", "props": [ @@ -6847,7 +6811,7 @@ ], "implemented-requirements": [ { - "uuid": "a3dc2ced-d785-43e7-8992-dd3c2ca5797e", + "uuid": "d7e4ef30-88a2-408e-8814-32073ec4201e", "control-id": "cis_rhel10_1-1.1.6", "description": "No notes for control-id 1.1.1.6.", "props": [ @@ -6864,7 +6828,7 @@ ] }, { - "uuid": "a782163f-50e2-456f-ab7c-260e456fef7a", + "uuid": "c6d1e083-959c-4883-af13-bca5247fee5c", "control-id": "cis_rhel10_1-1.1.7", "description": "No notes for control-id 1.1.1.7.", "props": [ @@ -6881,7 +6845,7 @@ ] }, { - "uuid": "4a95d705-4a2a-4d04-b1bb-f89f9cd2c892", + "uuid": "55bb9398-e09d-46de-9aeb-3fc6b8dab9c6", "control-id": "cis_rhel10_1-1.1.8", "description": "No notes for control-id 1.1.1.8.", "props": [ @@ -6898,7 +6862,7 @@ ] }, { - "uuid": "e0d1678b-be99-406d-bb79-a312d39c2b39", + "uuid": "48fe1698-5fd8-4bf9-bf44-1292d6e281e1", "control-id": "cis_rhel10_1-1.1.9", "description": "No notes for control-id 1.1.1.9.", "props": [ @@ -6915,7 +6879,7 @@ ] }, { - "uuid": "897d775d-3aca-4f5d-b9d4-5e95232cb8fc", + "uuid": "d18eb161-ec9a-419d-b93a-c57354bdb366", "control-id": "cis_rhel10_1-1.1.10", "description": "No notes for control-id 1.1.1.10.", "props": [ @@ -6932,7 +6896,7 @@ ] }, { - "uuid": "90c40d2d-5a80-4d60-85fb-73747f02806f", + "uuid": "93863adf-8471-4089-bebd-ede5ebbaa47e", "control-id": "cis_rhel10_1-1.2.3.1", "description": "No notes for control-id 1.1.2.3.1.", "props": [ @@ -6949,7 +6913,7 @@ ] }, { - "uuid": "bad7225f-52fa-4b30-89e0-67bae66a90ad", + "uuid": "39c9a97b-bfe9-42ad-b2da-93290a2cbbcf", "control-id": "cis_rhel10_1-1.2.4.1", "description": "No notes for control-id 1.1.2.4.1.", "props": [ @@ -6966,7 +6930,7 @@ ] }, { - "uuid": "d96a4e51-f560-4e16-9311-f9605efe7cae", + "uuid": "333d7f21-2657-45f9-b689-da11bdc9c754", "control-id": "cis_rhel10_1-1.2.5.1", "description": "No notes for control-id 1.1.2.5.1.", "props": [ @@ -6983,7 +6947,7 @@ ] }, { - "uuid": "c01b8f1b-5777-4a16-bd97-16232bb97843", + "uuid": "6495b451-6c8b-48cb-bdc9-c36dfcc44007", "control-id": "cis_rhel10_1-1.2.6.1", "description": "No notes for control-id 1.1.2.6.1.", "props": [ @@ -7000,7 +6964,7 @@ ] }, { - "uuid": "89558872-7852-4df7-b614-5199439b7df9", + "uuid": "cd1468ac-cc40-4442-bf02-5038b4ace749", "control-id": "cis_rhel10_1-1.2.7.1", "description": "No notes for control-id 1.1.2.7.1.", "props": [ @@ -7017,7 +6981,7 @@ ] }, { - "uuid": "5f21e900-4b6b-422f-a0af-bbd1c92317f8", + "uuid": "097f2ad0-9697-4f5e-947b-43d8bdcbbdb2", "control-id": "cis_rhel10_1-2.1.3", "description": "The description for control-id cis_rhel10_1-2.1.3.", "props": [ @@ -7030,7 +6994,7 @@ ] }, { - "uuid": "4e762eab-a02d-4097-8046-772ad93958f5", + "uuid": "505f2b2d-2141-47a6-ae09-0d54432b4a17", "control-id": "cis_rhel10_1-2.1.5", "description": "No notes for control-id 1.2.1.5.", "props": [ @@ -7047,7 +7011,7 @@ ] }, { - "uuid": "22c5046f-d458-4698-9e4b-35f47a661673", + "uuid": "b47c917e-9068-450c-834f-4e243b3d3419", "control-id": "cis_rhel10_1-3.1.5", "description": "No notes for control-id 1.3.1.5.", "props": [ @@ -7064,7 +7028,7 @@ ] }, { - "uuid": "f7854195-8c27-406e-b2cb-37f3f95766d0", + "uuid": "be87b259-3ae8-4d6a-be41-0f871e8d3987", "control-id": "cis_rhel10_1-3.1.6", "description": "The description for control-id cis_rhel10_1-3.1.6.", "props": [ @@ -7077,7 +7041,7 @@ ] }, { - "uuid": "48a35d04-ddde-451c-b028-e17e23849a27", + "uuid": "ee7c701d-826e-4167-914d-ef5164ad0993", "control-id": "cis_rhel10_1-5.3", "description": "No notes for control-id 1.5.3.", "props": [ @@ -7094,7 +7058,7 @@ ] }, { - "uuid": "943b3490-2019-4986-863c-43fdcc7a4152", + "uuid": "2a07d607-9a10-44c3-a67b-24e4ccb78558", "control-id": "cis_rhel10_1-8.4", "description": "No notes for control-id 1.8.4.", "props": [ @@ -7116,7 +7080,7 @@ ] }, { - "uuid": "44ef7705-bec3-4771-a596-6b3e90239414", + "uuid": "e13cba1a-48c3-456b-a0fa-a9ee78487ca0", "control-id": "cis_rhel10_1-8.6", "description": "No notes for control-id 1.8.6.", "props": [ @@ -7133,7 +7097,7 @@ ] }, { - "uuid": "eee10fd6-4255-494a-900b-29a5b8c1f440", + "uuid": "69b8ac34-1763-49bb-aaf9-3d2ce021cafd", "control-id": "cis_rhel10_2-1.1", "description": "No notes for control-id 2.1.1.", "props": [ @@ -7150,7 +7114,7 @@ ] }, { - "uuid": "7d833fd4-1ad0-454e-a9b2-be7a45ccc362", + "uuid": "36b18fa3-bd91-437b-b3da-42a28bebaa66", "control-id": "cis_rhel10_2-1.2", "description": "No notes for control-id 2.1.2.", "props": [ @@ -7167,7 +7131,7 @@ ] }, { - "uuid": "528f8e2b-8871-4055-86a7-55acab15e0ea", + "uuid": "bde0482f-565a-4ff9-84dd-470a1fff0709", "control-id": "cis_rhel10_2-1.3", "description": "No notes for control-id 2.1.3.", "props": [ @@ -7184,7 +7148,7 @@ ] }, { - "uuid": "66e5241c-4345-4742-9447-c94b05f61b81", + "uuid": "f3c95c14-edac-488d-9fb0-ea1d1e2b2ea2", "control-id": "cis_rhel10_2-2.2", "description": "No notes for control-id 2.2.2.", "props": [ @@ -7201,7 +7165,7 @@ ] }, { - "uuid": "16af65e3-7900-4d0e-81c6-9adcd4a6944b", + "uuid": "6823a545-01ee-4a36-85a3-356761495dfd", "control-id": "cis_rhel10_3-1.3", "description": "No notes for control-id 3.1.3.", "props": [ @@ -7218,7 +7182,7 @@ ] }, { - "uuid": "e1609546-b920-40b8-9bb7-732e9b9bd7f8", + "uuid": "fd4ce144-08be-4214-9bd1-0e4322a10fb3", "control-id": "cis_rhel10_5-2.4", "description": "No notes for control-id 5.2.4.", "props": [ @@ -7235,7 +7199,7 @@ ] }, { - "uuid": "aaebebc3-f5c1-439a-aeeb-40045f6738da", + "uuid": "844cac4f-eb80-4ff9-8f2b-41f0a65033fc", "control-id": "cis_rhel10_5-3.2.1.3", "description": "No notes for control-id 5.3.2.1.3.", "props": [ @@ -7252,7 +7216,7 @@ ] }, { - "uuid": "b42b4005-d815-4bef-a207-183dfa85b094", + "uuid": "86a91c7f-3f66-4cf5-a456-201747dbeeef", "control-id": "cis_rhel10_5-4.1.2", "description": "No notes for control-id 5.4.1.2.", "props": [ @@ -7274,7 +7238,7 @@ ] }, { - "uuid": "3aac84f3-798c-4909-bd76-ac066a49b5a6", + "uuid": "080016ba-6c5e-4e3e-a1d8-05bbc74b35d6", "control-id": "cis_rhel10_5-4.3.1", "description": "No notes for control-id 5.4.3.1.", "props": [ @@ -7291,7 +7255,7 @@ ] }, { - "uuid": "4ffe0cf7-21c8-41f3-989c-d45e2f664f61", + "uuid": "462f2092-ecef-4cfd-a7f1-864b0eeb58ba", "control-id": "cis_rhel10_6-3.1.1", "description": "No notes for control-id 6.3.1.1.", "props": [ @@ -7313,7 +7277,7 @@ ] }, { - "uuid": "96a495dd-62cd-4bf4-bd33-56c39f4f3ec1", + "uuid": "65394589-9e33-4687-a70c-ddc22bf1708e", "control-id": "cis_rhel10_6-3.1.2", "description": "No notes for control-id 6.3.1.2.", "props": [ @@ -7330,7 +7294,7 @@ ] }, { - "uuid": "2be9d952-f42c-4898-8dcc-ccda44636498", + "uuid": "79a8d195-a20b-47d1-bc0f-58c02a6f671d", "control-id": "cis_rhel10_6-3.1.3", "description": "No notes for control-id 6.3.1.3.", "props": [ @@ -7347,7 +7311,7 @@ ] }, { - "uuid": "34da38d0-6bc9-455f-8151-64e821df2116", + "uuid": "06149568-76ae-4edb-ab2e-9a0bcb891898", "control-id": "cis_rhel10_6-3.1.4", "description": "No notes for control-id 6.3.1.4.", "props": [ @@ -7364,7 +7328,7 @@ ] }, { - "uuid": "46833f68-3b80-42b0-853e-3f852107bc7e", + "uuid": "6404108b-ff29-4f77-9224-d0bf51869482", "control-id": "cis_rhel10_6-3.2.1", "description": "No notes for control-id 6.3.2.1.", "props": [ @@ -7381,7 +7345,7 @@ ] }, { - "uuid": "b5e48bdf-9cb6-4284-b773-528d79bc2415", + "uuid": "6f164048-c4dd-4083-8efd-2f9875533f60", "control-id": "cis_rhel10_6-3.2.2", "description": "No notes for control-id 6.3.2.2.", "props": [ @@ -7398,7 +7362,7 @@ ] }, { - "uuid": "1d154458-1cb4-4181-8853-2f72993f1a15", + "uuid": "7aa6fb10-e7f0-4524-bbb8-3e732ebf2229", "control-id": "cis_rhel10_6-3.2.3", "description": "No notes for control-id 6.3.2.3.", "props": [ @@ -7420,7 +7384,7 @@ ] }, { - "uuid": "978f3d8b-dc6f-4490-9de3-3924ab9a9cf2", + "uuid": "b2a02688-bddf-44c7-9606-0423e27b0ff0", "control-id": "cis_rhel10_6-3.2.4", "description": "No notes for control-id 6.3.2.4.", "props": [ @@ -7442,7 +7406,7 @@ ] }, { - "uuid": "30d93606-9f3c-49b6-951a-d4622c1cba2f", + "uuid": "75dc7dab-5d88-44a2-988e-5eda5242d284", "control-id": "cis_rhel10_6-3.3.1", "description": "No notes for control-id 6.3.3.1.", "props": [ @@ -7459,7 +7423,7 @@ ] }, { - "uuid": "129fc28e-81bb-45e6-9cd4-cb76955ac64b", + "uuid": "e7ee7890-e00b-45eb-b695-fe8de01e1b3b", "control-id": "cis_rhel10_6-3.3.2", "description": "No notes for control-id 6.3.3.2.", "props": [ @@ -7476,7 +7440,7 @@ ] }, { - "uuid": "59a83d89-1644-418d-9708-d34cc3762ca9", + "uuid": "04aa7403-4a40-414d-bae1-8c67053631f4", "control-id": "cis_rhel10_6-3.3.3", "description": "No notes for control-id 6.3.3.3.", "props": [ @@ -7493,7 +7457,7 @@ ] }, { - "uuid": "35c8fd50-2d74-4823-9305-229aa4b7b699", + "uuid": "4cbc427d-647c-4627-aa0b-9f016425a554", "control-id": "cis_rhel10_6-3.3.4", "description": "No notes for control-id 6.3.3.4.", "props": [ @@ -7525,7 +7489,7 @@ ] }, { - "uuid": "603ebb19-d36a-4295-98fb-9443173c90b4", + "uuid": "1cefa896-4f10-4cb0-9b5f-3b8b3771c665", "control-id": "cis_rhel10_6-3.3.5", "description": "No notes for control-id 6.3.3.5.", "props": [ @@ -7547,7 +7511,7 @@ ] }, { - "uuid": "6bc3997c-c14f-4ca8-8629-961fb274065b", + "uuid": "d2d1952f-b454-4d62-a80d-2de805c8de23", "control-id": "cis_rhel10_6-3.3.6", "description": "No notes for control-id 6.3.3.6.", "props": [ @@ -7569,7 +7533,7 @@ ] }, { - "uuid": "106a5b35-f1ee-4361-8922-509501a4be33", + "uuid": "1fc826ba-2d53-44b9-a8d0-3de4724615f2", "control-id": "cis_rhel10_6-3.3.7", "description": "No notes for control-id 6.3.3.7.", "props": [ @@ -7591,7 +7555,7 @@ ] }, { - "uuid": "5ca38d72-16a4-4fa8-8a2f-9055afeeca43", + "uuid": "b66a6a60-5833-4333-9fb4-0297aabcad30", "control-id": "cis_rhel10_6-3.3.8", "description": "No notes for control-id 6.3.3.8.", "props": [ @@ -7613,7 +7577,7 @@ ] }, { - "uuid": "d1997c09-6bcf-43f3-8b94-8ad89e3b2a98", + "uuid": "fc065d65-c5dc-42e6-a58f-2cf3366bbb87", "control-id": "cis_rhel10_6-3.3.9", "description": "No notes for control-id 6.3.3.9.", "props": [ @@ -7630,7 +7594,7 @@ ] }, { - "uuid": "737a8043-1337-4dc0-88a6-8e4f5acadafb", + "uuid": "c745b8ac-c003-4785-a508-b959d6c293fb", "control-id": "cis_rhel10_6-3.3.10", "description": "No notes for control-id 6.3.3.10.", "props": [ @@ -7647,7 +7611,7 @@ ] }, { - "uuid": "06c7bde9-9999-4266-9e7e-d36bb3355b3f", + "uuid": "bf987c36-4209-4455-a38c-ae98c90f2108", "control-id": "cis_rhel10_6-3.3.11", "description": "No notes for control-id 6.3.3.11.", "props": [ @@ -7684,7 +7648,7 @@ ] }, { - "uuid": "8c34070e-174e-4bd0-8092-544c35568c66", + "uuid": "386a548a-2619-4aff-8a22-78e9b1c41795", "control-id": "cis_rhel10_6-3.3.12", "description": "No notes for control-id 6.3.3.12.", "props": [ @@ -7701,7 +7665,7 @@ ] }, { - "uuid": "ebc1d440-a0f4-4dd6-a9bf-7907227df009", + "uuid": "ae809a72-7e75-44ac-9c96-376c58c0bbd5", "control-id": "cis_rhel10_6-3.3.13", "description": "No notes for control-id 6.3.3.13.", "props": [ @@ -7718,7 +7682,7 @@ ] }, { - "uuid": "a0942c3d-51f1-45a3-8df6-9e092932527b", + "uuid": "600e4237-9429-4ff1-acf1-2661f741acc9", "control-id": "cis_rhel10_6-3.3.14", "description": "No notes for control-id 6.3.3.14.", "props": [ @@ -7740,7 +7704,7 @@ ] }, { - "uuid": "d8d6f7e7-ce1d-4395-bbf5-8e7e22ab24c6", + "uuid": "3ecf861a-c555-466f-be55-c83d3ab9121d", "control-id": "cis_rhel10_6-3.3.15", "description": "No notes for control-id 6.3.3.15.", "props": [ @@ -7757,7 +7721,7 @@ ] }, { - "uuid": "6435520c-2404-4ef8-826a-3d28aee180b4", + "uuid": "41679833-b64b-4d6e-996c-bbf344964321", "control-id": "cis_rhel10_6-3.3.16", "description": "No notes for control-id 6.3.3.16.", "props": [ @@ -7774,7 +7738,7 @@ ] }, { - "uuid": "edc7f9c3-b385-4508-a4d4-b40d940667d9", + "uuid": "b8fcb021-afc3-44ae-87b3-1b43971ac644", "control-id": "cis_rhel10_6-3.3.17", "description": "No notes for control-id 6.3.3.17.", "props": [ @@ -7796,7 +7760,7 @@ ] }, { - "uuid": "2ef5bcf3-203b-4b4e-ae40-551f132c43cd", + "uuid": "606b4a00-4531-4579-b73c-d794ea276fd9", "control-id": "cis_rhel10_6-3.3.18", "description": "No notes for control-id 6.3.3.18.", "props": [ @@ -7828,7 +7792,7 @@ ] }, { - "uuid": "373f877e-9ae1-4582-a3f9-34c5dfd5d235", + "uuid": "3af6c26b-dc8c-47eb-b0f6-b71ac4f2eafc", "control-id": "cis_rhel10_6-3.3.19", "description": "No notes for control-id 6.3.3.19.", "props": [ @@ -7860,7 +7824,7 @@ ] }, { - "uuid": "087dc219-5b38-41e8-8330-19e9fc560b1d", + "uuid": "016b8c6d-1ffe-4941-a978-63db1147b559", "control-id": "cis_rhel10_6-3.3.20", "description": "No notes for control-id 6.3.3.20.", "props": [ @@ -7902,7 +7866,7 @@ ] }, { - "uuid": "d341655f-0798-4500-a067-017e3e41d385", + "uuid": "0949544c-1aa6-4c55-b92e-f166e1a78674", "control-id": "cis_rhel10_6-3.3.21", "description": "No notes for control-id 6.3.3.21.", "props": [ @@ -7919,7 +7883,7 @@ ] }, { - "uuid": "863c6bca-a5d6-4241-ae01-c206ac9f2e53", + "uuid": "454cb590-992e-4801-8d2c-0c1248b02f05", "control-id": "cis_rhel10_6-3.3.22", "description": "No notes for control-id 6.3.3.22.", "props": [ @@ -7946,7 +7910,7 @@ ] }, { - "uuid": "8d6a5f23-b852-4e92-8c39-4eb1acaf4ea2", + "uuid": "4077c889-913f-4829-a955-a4fbf8815f6e", "control-id": "cis_rhel10_6-3.3.23", "description": "No notes for control-id 6.3.3.23.", "props": [ @@ -7968,7 +7932,7 @@ ] }, { - "uuid": "66dc1ac1-4f73-4ae8-8f60-1500bef03dff", + "uuid": "4d01138e-f91b-4ea8-bc01-2b7daab130c4", "control-id": "cis_rhel10_6-3.3.24", "description": "No notes for control-id 6.3.3.24.", "props": [ @@ -7990,7 +7954,7 @@ ] }, { - "uuid": "ab54e25b-2c08-4ad7-97f7-b89eb36620dc", + "uuid": "983f8b0b-3316-46e1-b30a-8fc2228ccb19", "control-id": "cis_rhel10_6-3.3.25", "description": "No notes for control-id 6.3.3.25.", "props": [ @@ -8017,7 +7981,7 @@ ] }, { - "uuid": "5b7ab4fe-9169-435a-bfff-7be013bd57db", + "uuid": "23d525e5-f085-4d4d-a673-ca94bc672665", "control-id": "cis_rhel10_6-3.3.26", "description": "No notes for control-id 6.3.3.26.", "props": [ @@ -8039,7 +8003,7 @@ ] }, { - "uuid": "d4363bc0-52b0-41dd-95e3-ca979613a007", + "uuid": "5b5901e5-4423-4c73-a947-fa83c75f9948", "control-id": "cis_rhel10_6-3.3.27", "description": "No notes for control-id 6.3.3.27.", "props": [ @@ -8056,7 +8020,7 @@ ] }, { - "uuid": "2b141338-8395-40a5-8b30-3cb928f75a37", + "uuid": "c3d26f7a-1630-44de-a53e-83adede5d5bf", "control-id": "cis_rhel10_6-3.3.28", "description": "No notes for control-id 6.3.3.28.", "props": [ @@ -8073,7 +8037,7 @@ ] }, { - "uuid": "4dadfd16-dfa3-4996-b6e1-a12a3d660f9f", + "uuid": "e9a5c29c-502e-42d1-9753-59775c75cdec", "control-id": "cis_rhel10_6-3.3.29", "description": "No notes for control-id 6.3.3.29.", "props": [ @@ -8090,7 +8054,7 @@ ] }, { - "uuid": "7c8c8eff-0436-4216-b510-20346532c4ba", + "uuid": "d383c4aa-1997-440e-b285-ceac8af0ced8", "control-id": "cis_rhel10_6-3.3.30", "description": "No notes for control-id 6.3.3.30.", "props": [ @@ -8107,7 +8071,7 @@ ] }, { - "uuid": "78c0d1ed-f498-4256-9b32-bd60c113fba8", + "uuid": "dd1ffadc-ad95-4883-8bed-fbeb78bb871c", "control-id": "cis_rhel10_6-3.3.31", "description": "No notes for control-id 6.3.3.31.", "props": [ @@ -8124,7 +8088,7 @@ ] }, { - "uuid": "492e1355-4cdc-427f-9698-b3d0060c1610", + "uuid": "27906cbd-a29e-43ee-9e66-d52b4a66b332", "control-id": "cis_rhel10_6-3.3.32", "description": "No notes for control-id 6.3.3.32.", "props": [ @@ -8146,7 +8110,7 @@ ] }, { - "uuid": "1b64fed8-a6ad-4b22-869a-c4b7e0d23deb", + "uuid": "71d016c1-a6d4-48b3-b5ef-3ef1b677e58b", "control-id": "cis_rhel10_6-3.3.33", "description": "No notes for control-id 6.3.3.33.", "props": [ @@ -8163,7 +8127,7 @@ ] }, { - "uuid": "314cf364-3288-45df-9508-9c342512edce", + "uuid": "4ab4132b-0fc4-4e66-b0a1-3b8b8b5acadd", "control-id": "cis_rhel10_6-3.3.34", "description": "No notes for control-id 6.3.3.34.", "props": [ @@ -8180,7 +8144,7 @@ ] }, { - "uuid": "5ef33ba2-fbe2-4b6d-916f-92619bd1da7f", + "uuid": "307f471a-de93-405e-957c-5e641f3058c8", "control-id": "cis_rhel10_6-3.3.35", "description": "No notes for control-id 6.3.3.35.", "props": [ @@ -8197,7 +8161,7 @@ ] }, { - "uuid": "aecf4e26-d120-4bc0-85c8-cfe9493a8327", + "uuid": "bc7eff4f-3f1d-460e-9d78-2b3b3c92ccd3", "control-id": "cis_rhel10_6-3.3.36", "description": "No notes for control-id 6.3.3.36.", "props": [ @@ -8214,7 +8178,7 @@ ] }, { - "uuid": "0acdfd82-e3ef-4430-aa7d-e202c40afd81", + "uuid": "55ff6a2e-8baa-4582-a117-e27ef6e0c6c7", "control-id": "cis_rhel10_6-3.3.37", "description": "The description for control-id cis_rhel10_6-3.3.37.", "props": [ @@ -8227,7 +8191,7 @@ ] }, { - "uuid": "bf170cdd-2092-4821-a294-15f3022ff679", + "uuid": "f9326180-ea10-42b8-afb9-3226b023e317", "control-id": "cis_rhel10_6-3.4.1", "description": "No notes for control-id 6.3.4.1.", "props": [ @@ -8244,7 +8208,7 @@ ] }, { - "uuid": "69804f11-d1de-42ae-9d68-7547d844d1ad", + "uuid": "620c4ad4-51fa-4184-a702-3e2079a58b38", "control-id": "cis_rhel10_6-3.4.2", "description": "No notes for control-id 6.3.4.2.", "props": [ @@ -8261,7 +8225,7 @@ ] }, { - "uuid": "39bbe776-c1ed-4cc9-9c86-8b70b9ed5da6", + "uuid": "49e1a1c9-bb9d-41ad-ad0a-b2771638d90e", "control-id": "cis_rhel10_6-3.4.3", "description": "No notes for control-id 6.3.4.3.", "props": [ @@ -8278,7 +8242,7 @@ ] }, { - "uuid": "7d5ccd96-eaba-4c1f-b519-1e320c290627", + "uuid": "17efae5f-08c1-42b8-a561-bc1451e882a5", "control-id": "cis_rhel10_6-3.4.4", "description": "No notes for control-id 6.3.4.4.", "props": [ @@ -8295,7 +8259,7 @@ ] }, { - "uuid": "e0248030-92a8-4383-a39a-0b7f6dbdda5a", + "uuid": "5f2b974b-c63b-4176-94be-58f3b6c99670", "control-id": "cis_rhel10_6-3.4.5", "description": "No notes for control-id 6.3.4.5.", "props": [ @@ -8312,7 +8276,7 @@ ] }, { - "uuid": "0ab21235-7761-47eb-b771-b245fde44a8f", + "uuid": "b48d4a16-7c0c-4033-bcca-5cb14f912fbb", "control-id": "cis_rhel10_6-3.4.6", "description": "No notes for control-id 6.3.4.6.", "props": [ @@ -8329,7 +8293,7 @@ ] }, { - "uuid": "e52c3e6b-fac4-4b7f-bdd4-56fce69ff5a3", + "uuid": "280d0b61-e97b-43d3-9e67-4e70e20eaa29", "control-id": "cis_rhel10_6-3.4.7", "description": "No notes for control-id 6.3.4.7.", "props": [ @@ -8346,7 +8310,7 @@ ] }, { - "uuid": "73e180e6-b786-4573-be6d-c9cb73bcd954", + "uuid": "0ba4cafa-4430-4873-88e6-3841ac723def", "control-id": "cis_rhel10_6-3.4.8", "description": "No notes for control-id 6.3.4.8.", "props": [ @@ -8363,7 +8327,7 @@ ] }, { - "uuid": "1c445b03-39bd-469d-9760-e117c576ea7a", + "uuid": "eefb816b-f701-4be9-a7a8-a07cc7cf19ec", "control-id": "cis_rhel10_6-3.4.9", "description": "No notes for control-id 6.3.4.9.", "props": [ @@ -8380,7 +8344,7 @@ ] }, { - "uuid": "900a1d38-2df1-4964-97f0-3e003fb0cbf7", + "uuid": "757c3ed5-bd40-4f8b-b0e0-31fd4a0dc55a", "control-id": "cis_rhel10_6-3.4.10", "description": "No notes for control-id 6.3.4.10.", "props": [ @@ -8397,7 +8361,7 @@ ] }, { - "uuid": "899f677e-b692-4e9a-a520-34cf71ceeffb", + "uuid": "af7b7d8f-5ed2-48e8-b51a-7852aa5f7a1f", "control-id": "reload_dconf_db", "description": "This is a helper rule to reload Dconf database correctly.", "props": [ @@ -8414,7 +8378,7 @@ ] }, { - "uuid": "5fd301f2-6f3e-4d61-ad99-f7322073f1b6", + "uuid": "2480dd48-9d09-4ae8-bbb9-798cbe0132c3", "control-id": "cis_rhel10_1-1.1.1", "description": "No notes for control-id 1.1.1.1.", "props": [ @@ -8431,7 +8395,7 @@ ] }, { - "uuid": "4989f86e-8b8d-4a21-af06-a7c1d3b1b204", + "uuid": "afffbafe-9fdd-49e3-8a95-023ede86bd64", "control-id": "cis_rhel10_1-1.1.2", "description": "No notes for control-id 1.1.1.2.", "props": [ @@ -8448,7 +8412,7 @@ ] }, { - "uuid": "062a08ee-fd9a-4c3f-b44f-624bdb77a5f0", + "uuid": "7f09b83d-a05d-4e36-bbf5-49c8affd957d", "control-id": "cis_rhel10_1-1.1.3", "description": "No notes for control-id 1.1.1.3.", "props": [ @@ -8465,7 +8429,7 @@ ] }, { - "uuid": "039af6cf-1874-421e-ba4a-2e6a3a357089", + "uuid": "f2e191e8-8264-46e7-be0d-f8f3c2c5b35d", "control-id": "cis_rhel10_1-1.1.4", "description": "No notes for control-id 1.1.1.4.", "props": [ @@ -8482,7 +8446,7 @@ ] }, { - "uuid": "f48e85c0-516d-4326-91fe-1c08fdfc3256", + "uuid": "38fb8401-7408-48b2-94ee-b4c26c2b215b", "control-id": "cis_rhel10_1-1.1.5", "description": "No notes for control-id 1.1.1.5.", "props": [ @@ -8499,7 +8463,7 @@ ] }, { - "uuid": "8f33022c-73e9-4280-8892-413741233be2", + "uuid": "344e430b-87c6-484c-bcfb-e0f34478b4d9", "control-id": "cis_rhel10_1-1.1.11", "description": "The description for control-id cis_rhel10_1-1.1.11.", "props": [ @@ -8512,7 +8476,7 @@ ] }, { - "uuid": "56dc5088-cc88-4d44-937f-9dbb1e309b17", + "uuid": "d7edbcd1-b43d-4585-bbc5-205975ab37d8", "control-id": "cis_rhel10_1-1.2.1.1", "description": "No notes for control-id 1.1.2.1.1.", "props": [ @@ -8529,7 +8493,7 @@ ] }, { - "uuid": "1e5b6f3b-0994-4552-b750-f5a30bcd3e32", + "uuid": "d43e4518-efe6-480a-a164-c5d4f1e0e9ff", "control-id": "cis_rhel10_1-1.2.1.2", "description": "No notes for control-id 1.1.2.1.2.", "props": [ @@ -8546,7 +8510,7 @@ ] }, { - "uuid": "8d054722-58d6-4214-9565-bc9b261e30a3", + "uuid": "4b64934a-55a1-4ce5-bc2c-3567c35c19fa", "control-id": "cis_rhel10_1-1.2.1.3", "description": "No notes for control-id 1.1.2.1.3.", "props": [ @@ -8563,7 +8527,7 @@ ] }, { - "uuid": "e3fac93f-1eb5-4514-b174-6c3649f10f5a", + "uuid": "da872c54-59e9-4eca-b18b-b702f5d9c9d0", "control-id": "cis_rhel10_1-1.2.1.4", "description": "No notes for control-id 1.1.2.1.4.", "props": [ @@ -8580,7 +8544,7 @@ ] }, { - "uuid": "e228bcec-cb9a-49f1-8f04-7dbcc9324ea8", + "uuid": "80f4d794-c5c6-438e-85a4-217e573ac386", "control-id": "cis_rhel10_1-1.2.2.1", "description": "No notes for control-id 1.1.2.2.1.", "props": [ @@ -8597,7 +8561,7 @@ ] }, { - "uuid": "2363f651-cf05-47b3-86b4-90477987c18c", + "uuid": "fadf0e85-4120-48fe-b832-21eeb369fd50", "control-id": "cis_rhel10_1-1.2.2.2", "description": "No notes for control-id 1.1.2.2.2.", "props": [ @@ -8614,7 +8578,7 @@ ] }, { - "uuid": "5c9028ab-40b3-41b9-aa40-29dbad46d4b4", + "uuid": "9d41054f-31db-4fe4-9b7d-a5f32377ef87", "control-id": "cis_rhel10_1-1.2.2.3", "description": "No notes for control-id 1.1.2.2.3.", "props": [ @@ -8631,7 +8595,7 @@ ] }, { - "uuid": "f6235371-1e4a-44d3-86f9-dd1563efe2bf", + "uuid": "6a84d067-6c05-438a-93d0-f170f8eb616c", "control-id": "cis_rhel10_1-1.2.2.4", "description": "No notes for control-id 1.1.2.2.4.", "props": [ @@ -8648,7 +8612,7 @@ ] }, { - "uuid": "dd2d4c3c-f299-4310-99d0-9ccbf5cc5d72", + "uuid": "1a284e25-91af-4995-8d8e-7f8f1917c7f2", "control-id": "cis_rhel10_1-1.2.3.2", "description": "No notes for control-id 1.1.2.3.2.", "props": [ @@ -8665,7 +8629,7 @@ ] }, { - "uuid": "008c10b2-b75c-4d7b-b692-1618ca4b3b5f", + "uuid": "55f1d433-685a-4797-bc44-60576c695617", "control-id": "cis_rhel10_1-1.2.3.3", "description": "No notes for control-id 1.1.2.3.3.", "props": [ @@ -8682,7 +8646,7 @@ ] }, { - "uuid": "28b84a07-2069-4652-afd0-d45dc70cb625", + "uuid": "54a2282e-82dc-46f1-b6c0-b8b9647e8c2d", "control-id": "cis_rhel10_1-1.2.4.2", "description": "No notes for control-id 1.1.2.4.2.", "props": [ @@ -8699,7 +8663,7 @@ ] }, { - "uuid": "4d825603-5b34-46a8-ae36-c31c832a6758", + "uuid": "12628204-a063-4020-9d7d-0a8e570184ea", "control-id": "cis_rhel10_1-1.2.4.3", "description": "No notes for control-id 1.1.2.4.3.", "props": [ @@ -8716,7 +8680,7 @@ ] }, { - "uuid": "42282b35-f934-4d51-8109-19379b6c60b9", + "uuid": "1f382f82-5f08-46c5-af56-c6c7b94f11bb", "control-id": "cis_rhel10_1-1.2.5.2", "description": "No notes for control-id 1.1.2.5.2.", "props": [ @@ -8733,7 +8697,7 @@ ] }, { - "uuid": "72b3a086-a0e7-4f5f-a47f-ec3f0ed14886", + "uuid": "c921b663-7dfc-4ac1-95f9-e2061634f004", "control-id": "cis_rhel10_1-1.2.5.3", "description": "No notes for control-id 1.1.2.5.3.", "props": [ @@ -8750,7 +8714,7 @@ ] }, { - "uuid": "83f23883-d68d-460d-8bbc-cc78cae31365", + "uuid": "f5f489a0-e72d-4246-8927-398c06b9a616", "control-id": "cis_rhel10_1-1.2.5.4", "description": "No notes for control-id 1.1.2.5.4.", "props": [ @@ -8767,7 +8731,7 @@ ] }, { - "uuid": "381a1072-1e1c-45ed-ab8b-7466aad2b8ca", + "uuid": "8de33599-794d-4fbd-bf0a-1653d2e1ab2f", "control-id": "cis_rhel10_1-1.2.6.2", "description": "No notes for control-id 1.1.2.6.2.", "props": [ @@ -8784,7 +8748,7 @@ ] }, { - "uuid": "caa3a059-3ce9-461f-aa99-042b98543edc", + "uuid": "e214b927-2cdf-4e34-9ab9-3c0bb19ecb7e", "control-id": "cis_rhel10_1-1.2.6.3", "description": "No notes for control-id 1.1.2.6.3.", "props": [ @@ -8801,7 +8765,7 @@ ] }, { - "uuid": "5e54cbbe-c5a5-4781-9751-18a580756608", + "uuid": "13a9e059-6fa0-477d-83a7-3ba08b991a96", "control-id": "cis_rhel10_1-1.2.6.4", "description": "No notes for control-id 1.1.2.6.4.", "props": [ @@ -8818,7 +8782,7 @@ ] }, { - "uuid": "5ca7e999-c1f3-4fb2-a6d6-fbea304871e6", + "uuid": "490637e4-22fe-4770-a7ae-fb459a9be2de", "control-id": "cis_rhel10_1-1.2.7.2", "description": "No notes for control-id 1.1.2.7.2.", "props": [ @@ -8835,7 +8799,7 @@ ] }, { - "uuid": "f6b14611-1c0f-4be7-9eaf-3d36d595a191", + "uuid": "7778b936-950e-4a3e-83a4-4a79f85cc5d4", "control-id": "cis_rhel10_1-1.2.7.3", "description": "No notes for control-id 1.1.2.7.3.", "props": [ @@ -8852,7 +8816,7 @@ ] }, { - "uuid": "74153b02-14ec-4bbf-bb10-df477855132e", + "uuid": "8fcebd0c-be7b-4161-a9fe-606b13ddae01", "control-id": "cis_rhel10_1-1.2.7.4", "description": "No notes for control-id 1.1.2.7.4.", "props": [ @@ -8869,7 +8833,7 @@ ] }, { - "uuid": "a3d1d1db-5ba5-4da4-bf6e-4a8b4e909607", + "uuid": "859df09f-e5a8-49e7-a6da-50825cf077b9", "control-id": "cis_rhel10_1-2.1.1", "description": "The description for control-id cis_rhel10_1-2.1.1.", "props": [ @@ -8882,7 +8846,7 @@ ] }, { - "uuid": "8266298a-5675-43e4-9823-c29e53fc693d", + "uuid": "70e045e4-1dc7-41c4-a6c5-e4029f444098", "control-id": "cis_rhel10_1-2.1.2", "description": "No notes for control-id 1.2.1.2.", "props": [ @@ -8899,7 +8863,7 @@ ] }, { - "uuid": "66b82bb9-e1ce-4aa7-aef2-9567530b55f5", + "uuid": "e1f41f9d-ec2d-48ae-aa3c-3c13174ea4e4", "control-id": "cis_rhel10_1-2.1.4", "description": "The description for control-id cis_rhel10_1-2.1.4.", "props": [ @@ -8912,7 +8876,7 @@ ] }, { - "uuid": "0c16b575-5821-4644-8cf0-371d58f17c80", + "uuid": "fe569375-dec0-4316-b682-a1ff08cc9467", "control-id": "cis_rhel10_1-2.2.1", "description": "The description for control-id cis_rhel10_1-2.2.1.", "props": [ @@ -8925,7 +8889,7 @@ ] }, { - "uuid": "7ffa7f6f-0df5-4966-af31-eebb9adcf36f", + "uuid": "74fc16df-aaeb-4ade-a9d8-f1bf5fb36a39", "control-id": "cis_rhel10_1-3.1.1", "description": "No notes for control-id 1.3.1.1.", "props": [ @@ -8942,7 +8906,7 @@ ] }, { - "uuid": "6dbefb55-f819-49e3-9146-0cdd6f1e6296", + "uuid": "47f7e30a-c54b-4069-a123-f6cc8e102072", "control-id": "cis_rhel10_1-3.1.2", "description": "No notes for control-id 1.3.1.2.", "props": [ @@ -8959,7 +8923,7 @@ ] }, { - "uuid": "5ebc033d-ccc4-4fea-887c-5259c4921f70", + "uuid": "dc5b2b26-b264-4f23-a9bd-02d85a251a4e", "control-id": "cis_rhel10_1-3.1.3", "description": "No notes for control-id 1.3.1.3.", "props": [ @@ -8976,7 +8940,7 @@ ] }, { - "uuid": "c13e7831-aad2-4253-a35b-5ab66b7945fd", + "uuid": "386d55b5-9fb8-4361-ad9e-d8b3541bb071", "control-id": "cis_rhel10_1-3.1.4", "description": "No notes for control-id 1.3.1.4.", "props": [ @@ -8993,7 +8957,7 @@ ] }, { - "uuid": "69e3fed5-583a-459a-83e2-f95081f4b2ef", + "uuid": "99901716-541d-4856-9c9b-f200a2fed32f", "control-id": "cis_rhel10_1-3.1.7", "description": "No notes for control-id 1.3.1.7.", "props": [ @@ -9010,7 +8974,7 @@ ] }, { - "uuid": "bcdb7c01-f289-45bf-b489-ef4b7d003be5", + "uuid": "b24112cc-d320-442d-9f8a-7b267abf1d36", "control-id": "cis_rhel10_1-4.1", "description": "There is no automated remediation for this rule and this is intentional.\nMore details in the rule description.", "props": [ @@ -9027,50 +8991,34 @@ ] }, { - "uuid": "f57f3d29-613d-4527-92bc-695d9b3fb09a", + "uuid": "2e388d0a-8b65-4f19-ab18-016c97ae9dd3", "control-id": "cis_rhel10_1-4.2", - "description": "The description for control-id cis_rhel10_1-4.2.", + "description": "This requirement demands a deeper review of the rules.", "props": [ { "name": "implementation-status", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "alternative", - "remarks": "This requirement demands a deeper review of the rules." - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_grub2_cfg" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_grub2_cfg" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_grub2_cfg" + "value": "implemented" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_user_cfg" + "value": "file_permissions_boot_grub2" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_user_cfg" + "value": "file_owner_boot_grub2" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_user_cfg" + "value": "file_groupowner_boot_grub2" } ] }, { - "uuid": "ae5c3afe-20b6-4dd8-b1a2-9bc9393bc9d4", + "uuid": "dd1f542e-70ff-41b8-b7ce-2929a0bb2ff2", "control-id": "cis_rhel10_1-5.1", "description": "No notes for control-id 1.5.1.", "props": [ @@ -9087,7 +9035,7 @@ ] }, { - "uuid": "54206f4c-117d-48be-ba99-06a77b9b53eb", + "uuid": "c345b10a-c62b-4007-b3e1-b0aecda33f04", "control-id": "cis_rhel10_1-5.2", "description": "No notes for control-id 1.5.2.", "props": [ @@ -9104,7 +9052,7 @@ ] }, { - "uuid": "eb4868b4-7a44-44e8-828f-ee9f333be071", + "uuid": "c672e662-43ba-4a42-a903-f48a86739969", "control-id": "cis_rhel10_1-5.4", "description": "No notes for control-id 1.5.4.", "props": [ @@ -9121,7 +9069,7 @@ ] }, { - "uuid": "bf654ffe-121d-47e7-aa5d-2371e3fd914f", + "uuid": "5e41801f-d82b-46a2-aa8b-17ded3802cae", "control-id": "cis_rhel10_1-5.5", "description": "No notes for control-id 1.5.5.", "props": [ @@ -9138,7 +9086,7 @@ ] }, { - "uuid": "c79df9f3-39ce-4d3b-8734-86e32800cd6e", + "uuid": "23ca5b3a-78dc-4b0b-a289-84ae5f9ed288", "control-id": "cis_rhel10_1-5.6", "description": "No notes for control-id 1.5.6.", "props": [ @@ -9155,7 +9103,7 @@ ] }, { - "uuid": "9c6f1d1e-d545-4d52-9a63-723f36368e6b", + "uuid": "2afbcab6-18ef-4d6b-ada1-254ec236bc55", "control-id": "cis_rhel10_1-5.7", "description": "No notes for control-id 1.5.7.", "props": [ @@ -9172,7 +9120,7 @@ ] }, { - "uuid": "d45855b7-ca55-4ec0-9d52-b8af228dacf7", + "uuid": "4c3d766a-3272-4d11-8441-e5f038ce7715", "control-id": "cis_rhel10_1-5.8", "description": "Address Space Layout Randomization (ASLR)", "props": [ @@ -9189,7 +9137,7 @@ ] }, { - "uuid": "f714a85d-f8b8-46b8-8448-93ab3762712d", + "uuid": "698266f1-eb1d-42be-b8f1-9c8f08ddb0da", "control-id": "cis_rhel10_1-5.9", "description": "No notes for control-id 1.5.9.", "props": [ @@ -9206,7 +9154,7 @@ ] }, { - "uuid": "a4a9adbd-f755-44dd-bd56-19715b6b4e3e", + "uuid": "ceb9a350-d919-41bc-bc36-c177d6919061", "control-id": "cis_rhel10_1-5.10", "description": "No notes for control-id 1.5.10.", "props": [ @@ -9223,7 +9171,7 @@ ] }, { - "uuid": "9c9ced2f-2f16-4a84-87a0-2ba73d4b9b59", + "uuid": "df61f5b7-ee35-4170-9f30-a65885d62ef2", "control-id": "cis_rhel10_1-6.1", "description": "No notes for control-id 1.6.1.", "props": [ @@ -9240,7 +9188,7 @@ ] }, { - "uuid": "23891ecc-2faa-4f8b-bcad-7921f428c6da", + "uuid": "42457188-c0f5-4469-9c5e-ec3949e54468", "control-id": "cis_rhel10_1-6.2", "description": "No notes for control-id 1.6.2.", "props": [ @@ -9257,7 +9205,7 @@ ] }, { - "uuid": "4db25ec7-d511-4c8e-8208-522a23263e02", + "uuid": "1d99da9b-9a9d-4f61-b199-84c3155b9285", "control-id": "cis_rhel10_1-6.3", "description": "No notes for control-id 1.6.3.", "props": [ @@ -9274,7 +9222,7 @@ ] }, { - "uuid": "341f329d-d5c5-4f72-b4bb-81a1887a6ef7", + "uuid": "bb9edfe3-82ab-4be2-8742-7dbfaa51b4c4", "control-id": "cis_rhel10_1-6.4", "description": "No notes for control-id 1.6.4.", "props": [ @@ -9291,7 +9239,7 @@ ] }, { - "uuid": "25efe80d-6f93-4893-99a5-9662a55f3a34", + "uuid": "ef3b7eaf-cb55-430d-8800-993d7806223f", "control-id": "cis_rhel10_1-7.1", "description": "No notes for control-id 1.7.1.", "props": [ @@ -9308,7 +9256,7 @@ ] }, { - "uuid": "a3629e63-8820-4dec-afc1-4b070298094d", + "uuid": "2735a1b0-3cbf-4c1c-8f60-d56a715dda8a", "control-id": "cis_rhel10_1-7.2", "description": "No notes for control-id 1.7.2.", "props": [ @@ -9325,7 +9273,7 @@ ] }, { - "uuid": "95d06db8-9821-4e55-913e-2e12089639a3", + "uuid": "5a737ecf-dd74-43ac-8d30-d8b3f5e50f9f", "control-id": "cis_rhel10_1-7.3", "description": "No notes for control-id 1.7.3.", "props": [ @@ -9342,7 +9290,7 @@ ] }, { - "uuid": "9b789e27-5292-4bee-a115-ec47ff1b0e99", + "uuid": "a0a7e176-595f-4a61-9f3c-36944a7d38b0", "control-id": "cis_rhel10_1-7.4", "description": "No notes for control-id 1.7.4.", "props": [ @@ -9369,7 +9317,7 @@ ] }, { - "uuid": "e322f206-e412-4f11-94e7-61315aa32055", + "uuid": "c707f2a3-2ad5-4013-9c9f-90354ea39aa1", "control-id": "cis_rhel10_1-7.5", "description": "No notes for control-id 1.7.5.", "props": [ @@ -9396,7 +9344,7 @@ ] }, { - "uuid": "82e5e6a5-0415-473a-af0c-81886ca26e4d", + "uuid": "f83fbf37-b24f-4e2d-85e0-db339c3d3e6d", "control-id": "cis_rhel10_1-7.6", "description": "No notes for control-id 1.7.6.", "props": [ @@ -9423,7 +9371,7 @@ ] }, { - "uuid": "3f5d3062-4f3c-4c69-a544-d0f41db2170b", + "uuid": "7b748fb7-89ca-4b07-bc47-140cfefa3427", "control-id": "cis_rhel10_1-8.1", "description": "No notes for control-id 1.8.1.", "props": [ @@ -9445,7 +9393,7 @@ ] }, { - "uuid": "ee1c1ab9-1a3f-4fb8-bf91-80a79458f073", + "uuid": "983e498a-aef7-4044-a060-a1f239d786c5", "control-id": "cis_rhel10_1-8.2", "description": "No notes for control-id 1.8.2.", "props": [ @@ -9462,7 +9410,7 @@ ] }, { - "uuid": "4e0015af-6df3-4bea-bf15-000c8209d272", + "uuid": "b5e78c22-ff97-4cf4-a57e-f3d24045d4e5", "control-id": "cis_rhel10_1-8.3", "description": "No notes for control-id 1.8.3.", "props": [ @@ -9494,7 +9442,7 @@ ] }, { - "uuid": "c317e1d5-115e-4617-b2a5-c6be508e31d4", + "uuid": "33a543a2-8b24-4ae2-bd21-03c1f884bdc9", "control-id": "cis_rhel10_1-8.5", "description": "No notes for control-id 1.8.5.", "props": [ @@ -9511,7 +9459,7 @@ ] }, { - "uuid": "316159c8-a58c-4461-be2b-81c5c21af72d", + "uuid": "1b67be20-6ec2-4de4-8a9e-ac1d4e624284", "control-id": "cis_rhel10_2-1.4", "description": "No notes for control-id 2.1.4.", "props": [ @@ -9528,7 +9476,7 @@ ] }, { - "uuid": "74518def-70e2-414c-8738-0341f5129f75", + "uuid": "4191c52a-0389-41de-8dce-5fac959f814c", "control-id": "cis_rhel10_2-1.5", "description": "No notes for control-id 2.1.5.", "props": [ @@ -9545,7 +9493,7 @@ ] }, { - "uuid": "81d5bfba-c1d7-424f-8387-ccde5c7e4799", + "uuid": "a94581ce-12b3-4182-9bb3-98f0fec347f6", "control-id": "cis_rhel10_2-1.6", "description": "No notes for control-id 2.1.6.", "props": [ @@ -9562,7 +9510,7 @@ ] }, { - "uuid": "bf5543d3-1e5c-46e6-affa-b52e54eef9ae", + "uuid": "1b5dd828-2787-4d96-bbc0-71b83a4099cb", "control-id": "cis_rhel10_2-1.7", "description": "No notes for control-id 2.1.7.", "props": [ @@ -9579,7 +9527,7 @@ ] }, { - "uuid": "c6bf3dbe-877e-4f81-a735-eab8aeda4bc7", + "uuid": "a41a6682-4397-4c65-873f-30a05c4f13b6", "control-id": "cis_rhel10_2-1.8", "description": "No notes for control-id 2.1.8.", "props": [ @@ -9601,7 +9549,7 @@ ] }, { - "uuid": "8e56de6c-1aaf-4dd7-aa69-765df4360a81", + "uuid": "01064869-c2bc-420a-9957-657d00f9ad7a", "control-id": "cis_rhel10_2-1.9", "description": "Many of the libvirt packages used by Enterprise Linux virtualization are dependent on the\nnfs-utils package.", "props": [ @@ -9618,7 +9566,7 @@ ] }, { - "uuid": "91f2d9c8-46bd-40a3-b2b7-a2eba0606669", + "uuid": "5cbf26bd-de65-45fb-be13-b03e6316f06c", "control-id": "cis_rhel10_2-1.11", "description": "Many of the libvirt packages used by Enterprise Linux virtualization, and the nfs-utils\npackage used for The Network File System (NFS), are dependent on the rpcbind package.", "props": [ @@ -9635,7 +9583,7 @@ ] }, { - "uuid": "6632c036-e443-4ebc-8356-f025dc8bfe28", + "uuid": "5f5d4442-cad0-45f0-99c9-7d68b37f18c4", "control-id": "cis_rhel10_2-1.12", "description": "No notes for control-id 2.1.12.", "props": [ @@ -9652,7 +9600,7 @@ ] }, { - "uuid": "f17edb4a-2d24-4e59-8345-730924392aa2", + "uuid": "9bd43fea-f878-412f-8734-f5a311c5345b", "control-id": "cis_rhel10_2-1.13", "description": "No notes for control-id 2.1.13.", "props": [ @@ -9669,7 +9617,7 @@ ] }, { - "uuid": "ceff9384-d1f8-44c2-b747-b5133558a2d3", + "uuid": "2ecdef8f-bc32-4add-8cf4-17f860eea7c7", "control-id": "cis_rhel10_2-1.14", "description": "No notes for control-id 2.1.14.", "props": [ @@ -9686,7 +9634,7 @@ ] }, { - "uuid": "f417da7d-1113-489b-b9db-faa69ccb4f67", + "uuid": "0799c95e-a023-4abf-9e64-0afac596759b", "control-id": "cis_rhel10_2-1.15", "description": "No notes for control-id 2.1.15.", "props": [ @@ -9703,7 +9651,7 @@ ] }, { - "uuid": "25c45c53-ab7e-4019-8ddf-29dfcefcff48", + "uuid": "974e86aa-2c66-4fcd-9ada-284a3bdca9d4", "control-id": "cis_rhel10_2-1.16", "description": "No notes for control-id 2.1.16.", "props": [ @@ -9720,7 +9668,7 @@ ] }, { - "uuid": "be7b6e8c-cad8-4e9d-b02f-46656a76b6cc", + "uuid": "c6d53f0c-291d-4a42-bb85-27e52277dd7c", "control-id": "cis_rhel10_2-1.17", "description": "No notes for control-id 2.1.17.", "props": [ @@ -9737,7 +9685,7 @@ ] }, { - "uuid": "7708a2a0-ce31-4ebb-b3ac-a532d1c3806b", + "uuid": "354b300e-3982-43bf-8676-6c8e8df46652", "control-id": "cis_rhel10_2-1.18", "description": "No notes for control-id 2.1.18.", "props": [ @@ -9759,7 +9707,7 @@ ] }, { - "uuid": "426bec1a-04e2-4c79-93a5-5d8b8d5ce04a", + "uuid": "a0480bc6-c4b1-4cd2-9ac9-e0664662c354", "control-id": "cis_rhel10_2-1.21", "description": "No notes for control-id 2.1.21.", "props": [ @@ -9781,7 +9729,7 @@ ] }, { - "uuid": "0b43046a-d51e-4a80-8ffc-b44dff2e21cf", + "uuid": "bd66dcf9-10cd-4bdf-b483-a3a37eb773bd", "control-id": "cis_rhel10_2-1.22", "description": "The description for control-id cis_rhel10_2-1.22.", "props": [ @@ -9794,7 +9742,7 @@ ] }, { - "uuid": "cdda78e8-ef43-4328-968c-55d3184fffc5", + "uuid": "3bb334b5-7bff-4bf8-9e72-e4a8da818ef3", "control-id": "cis_rhel10_2-2.1", "description": "No notes for control-id 2.2.1.", "props": [ @@ -9811,7 +9759,7 @@ ] }, { - "uuid": "6953da60-9a91-4f28-8499-f52ab9dac445", + "uuid": "6f9ae313-3670-43a9-81fc-76f47f840dad", "control-id": "cis_rhel10_2-2.3", "description": "No notes for control-id 2.2.3.", "props": [ @@ -9828,7 +9776,7 @@ ] }, { - "uuid": "b5cc4296-03aa-47c1-8f71-a2badace617f", + "uuid": "8d322a7c-86cf-4760-aeea-ed180cfe6757", "control-id": "cis_rhel10_2-2.4", "description": "No notes for control-id 2.2.4.", "props": [ @@ -9845,7 +9793,7 @@ ] }, { - "uuid": "a4996da5-9e80-46c3-aaf9-7b03c087c882", + "uuid": "aaed98ad-60b8-4629-aff5-41e36fad1e08", "control-id": "cis_rhel10_2-3.1", "description": "No notes for control-id 2.3.1.", "props": [ @@ -9857,7 +9805,7 @@ ] }, { - "uuid": "44f33fc3-0614-4e9e-97e4-ea0c5e35dcab", + "uuid": "aa0b1e2b-526f-45d4-baee-b7ca350225f2", "control-id": "cis_rhel10_2-3.2", "description": "No notes for control-id 2.3.2.", "props": [ @@ -9874,7 +9822,7 @@ ] }, { - "uuid": "2403992c-3a72-4594-85c8-cd0db0cc3252", + "uuid": "56dc51c2-f171-424f-979f-f8a2abdea0bb", "control-id": "cis_rhel10_2-3.3", "description": "No notes for control-id 2.3.3.", "props": [ @@ -9891,7 +9839,7 @@ ] }, { - "uuid": "00672342-3f34-425b-9e25-f592500898ae", + "uuid": "127ee5dd-504f-4174-9189-ca5e4917de4a", "control-id": "cis_rhel10_2-4.1.1", "description": "No notes for control-id 2.4.1.1.", "props": [ @@ -9913,7 +9861,7 @@ ] }, { - "uuid": "01838605-d2bc-40f3-a2d0-95ac8749f0f3", + "uuid": "e5afe273-24da-47e1-a156-5b488fd08226", "control-id": "cis_rhel10_2-4.1.2", "description": "No notes for control-id 2.4.1.2.", "props": [ @@ -9940,7 +9888,7 @@ ] }, { - "uuid": "81da97de-e73b-4165-b729-502f4150a971", + "uuid": "60622171-ab96-4692-bf95-74f53f249089", "control-id": "cis_rhel10_2-4.1.3", "description": "No notes for control-id 2.4.1.3.", "props": [ @@ -9967,7 +9915,7 @@ ] }, { - "uuid": "42355531-c723-4154-8d96-df130fa1040a", + "uuid": "0a900fdc-cf42-49db-8c70-16a43561340b", "control-id": "cis_rhel10_2-4.1.4", "description": "No notes for control-id 2.4.1.4.", "props": [ @@ -9994,7 +9942,7 @@ ] }, { - "uuid": "d310b4e3-88fe-4257-8053-3275864c5eb8", + "uuid": "3f017ccf-48c7-479b-bda0-6b7a8f4a416d", "control-id": "cis_rhel10_2-4.1.5", "description": "No notes for control-id 2.4.1.5.", "props": [ @@ -10021,7 +9969,7 @@ ] }, { - "uuid": "b67afc8a-9f6e-405c-ad78-5827b5f6da47", + "uuid": "ce67a59e-7438-4d84-a65c-c73be5014184", "control-id": "cis_rhel10_2-4.1.6", "description": "No notes for control-id 2.4.1.6.", "props": [ @@ -10048,7 +9996,7 @@ ] }, { - "uuid": "dd475cfe-0a9f-474f-b8e7-4a30a47e943e", + "uuid": "2624a793-eb27-4995-837c-8f1bfc2481da", "control-id": "cis_rhel10_2-4.1.7", "description": "No notes for control-id 2.4.1.7.", "props": [ @@ -10075,7 +10023,7 @@ ] }, { - "uuid": "3c604415-7721-4cee-b405-ca392a65c57e", + "uuid": "a9c0fdfb-bf07-4695-88ed-c9021819181c", "control-id": "cis_rhel10_2-4.1.8", "description": "No notes for control-id 2.4.1.8.", "props": [ @@ -10102,7 +10050,7 @@ ] }, { - "uuid": "29a271a7-a927-451d-baed-425a9a33bdd4", + "uuid": "bc48967d-391b-4611-a4fc-40b850652a8a", "control-id": "cis_rhel10_2-4.1.9", "description": "No notes for control-id 2.4.1.9.", "props": [ @@ -10139,7 +10087,7 @@ ] }, { - "uuid": "4a9d3b30-0e02-4f71-8d97-5aad7754f5f0", + "uuid": "d8414852-73ed-4029-ab70-270eb0bef8fd", "control-id": "cis_rhel10_2-4.2.1", "description": "No notes for control-id 2.4.2.1.", "props": [ @@ -10176,7 +10124,7 @@ ] }, { - "uuid": "3f75eb8a-b4ce-434a-9a8d-13d9b9a7e7dd", + "uuid": "dda899ab-d3fb-4785-90c2-b10596cf5803", "control-id": "cis_rhel10_3-1.1", "description": "The description for control-id cis_rhel10_3-1.1.", "props": [ @@ -10189,7 +10137,7 @@ ] }, { - "uuid": "2efc2eae-0613-4d00-a2d0-9211054efefa", + "uuid": "6bc9bf70-64df-49e4-a560-9aea7db958b2", "control-id": "cis_rhel10_3-2.1", "description": "No notes for control-id 3.2.1.", "props": [ @@ -10206,7 +10154,7 @@ ] }, { - "uuid": "5a749e68-f23c-4fb4-95c1-0d0aa4176b04", + "uuid": "db06689e-0139-43db-84a5-b052395bb5c2", "control-id": "cis_rhel10_3-2.2", "description": "No notes for control-id 3.2.2.", "props": [ @@ -10223,7 +10171,7 @@ ] }, { - "uuid": "ee1e4b0c-58c1-49a2-8ba7-581d6b964005", + "uuid": "d15053fd-5d61-4e1b-838c-5cb67697f9b0", "control-id": "cis_rhel10_3-2.3", "description": "No notes for control-id 3.2.3.", "props": [ @@ -10240,7 +10188,7 @@ ] }, { - "uuid": "683480ae-609b-4073-8012-aa46b28c60c9", + "uuid": "c8a67bef-061c-4c9b-a5dd-114d3b5b54d9", "control-id": "cis_rhel10_3-2.4", "description": "No notes for control-id 3.2.4.", "props": [ @@ -10257,7 +10205,7 @@ ] }, { - "uuid": "ca33b915-c200-4391-a5b3-d7056ac22bbc", + "uuid": "72a37ccf-43fb-4798-bf32-67eef01c4b73", "control-id": "cis_rhel10_3-2.5", "description": "No notes for control-id 3.2.5.", "props": [ @@ -10274,7 +10222,7 @@ ] }, { - "uuid": "82835fc6-6597-4450-997b-4f43a6e3a7ca", + "uuid": "3244e515-49dc-438b-bfc1-b9800a145723", "control-id": "cis_rhel10_3-2.6", "description": "No notes for control-id 3.2.6.", "props": [ @@ -10291,7 +10239,7 @@ ] }, { - "uuid": "cc638aa7-aacb-46b0-900a-cb544ec718b7", + "uuid": "c26e2cfa-408f-4232-b870-a409f7d26736", "control-id": "cis_rhel10_3-3.1.1", "description": "No notes for control-id 3.3.1.1.", "props": [ @@ -10308,7 +10256,7 @@ ] }, { - "uuid": "8fd76ff5-9b30-4004-8715-6134976b0759", + "uuid": "d5d0541d-3f8c-4f2c-8cb8-6683fdc46eda", "control-id": "cis_rhel10_3-3.1.2", "description": "No notes for control-id 3.3.1.2.", "props": [ @@ -10325,7 +10273,7 @@ ] }, { - "uuid": "347d75df-89bc-4e1a-8cf4-19bc22f42fa6", + "uuid": "455c00cd-07e1-45c1-975e-f3ddabcfb1c3", "control-id": "cis_rhel10_3-3.1.3", "description": "No notes for control-id 3.3.1.3.", "props": [ @@ -10342,7 +10290,7 @@ ] }, { - "uuid": "783646c8-35ba-4516-a1ad-67ea4de8a84a", + "uuid": "0c2cf421-6c91-43d1-b21c-708d80b65b33", "control-id": "cis_rhel10_3-3.1.4", "description": "No notes for control-id 3.3.1.4.", "props": [ @@ -10359,7 +10307,7 @@ ] }, { - "uuid": "f2ea1c6d-1cc3-4a9d-8d0d-186b18d4e77d", + "uuid": "100fb241-2642-4455-8852-e64cac97fb0a", "control-id": "cis_rhel10_3-3.1.5", "description": "No notes for control-id 3.3.1.5.", "props": [ @@ -10376,7 +10324,7 @@ ] }, { - "uuid": "42c2d044-7e4b-4a88-9241-bde058aa8e64", + "uuid": "1c92e356-73a0-4743-8753-ce0657690716", "control-id": "cis_rhel10_3-3.1.6", "description": "No notes for control-id 3.3.1.6.", "props": [ @@ -10393,7 +10341,7 @@ ] }, { - "uuid": "ea351856-0f65-4113-8c76-47a110f12156", + "uuid": "dcc33b2f-9811-4897-905b-bb9b42f57dca", "control-id": "cis_rhel10_3-3.1.7", "description": "No notes for control-id 3.3.1.7.", "props": [ @@ -10410,7 +10358,7 @@ ] }, { - "uuid": "40241c53-fff6-4d60-8888-c41bcb2e7022", + "uuid": "0a8f0dd4-ee72-42ed-a921-ef4e886a8d4b", "control-id": "cis_rhel10_3-3.1.8", "description": "No notes for control-id 3.3.1.8.", "props": [ @@ -10427,7 +10375,7 @@ ] }, { - "uuid": "253452d7-48a2-4bb2-afbe-9e2991f3f36a", + "uuid": "0f4f7a79-45d5-403f-bca7-07d114b1bf49", "control-id": "cis_rhel10_3-3.1.9", "description": "No notes for control-id 3.3.1.9.", "props": [ @@ -10444,7 +10392,7 @@ ] }, { - "uuid": "757faacf-ade9-4a68-a303-45b4c547b77b", + "uuid": "2a106ed1-523d-4c47-a02d-6ed7367c4075", "control-id": "cis_rhel10_3-3.1.10", "description": "No notes for control-id 3.3.1.10.", "props": [ @@ -10461,7 +10409,7 @@ ] }, { - "uuid": "78cb0815-b2b7-4fa1-9474-bffb7f911cb5", + "uuid": "3a6692a0-9c5d-4ea2-bad9-bc29d390a638", "control-id": "cis_rhel10_3-3.1.11", "description": "No notes for control-id 3.3.1.11.", "props": [ @@ -10478,7 +10426,7 @@ ] }, { - "uuid": "708b1d5c-0757-4b5f-9a8f-91a1d8027c97", + "uuid": "abd02327-8c76-4fa0-b234-51755e0e7b8b", "control-id": "cis_rhel10_3-3.1.12", "description": "No notes for control-id 3.3.1.12.", "props": [ @@ -10495,7 +10443,7 @@ ] }, { - "uuid": "0242260b-c682-4b67-8e30-9ee4c893e7ef", + "uuid": "cc98d830-a8ff-470b-8650-420044025822", "control-id": "cis_rhel10_3-3.1.13", "description": "No notes for control-id 3.3.1.13.", "props": [ @@ -10512,7 +10460,7 @@ ] }, { - "uuid": "5130700e-3159-41cb-9775-251c6280d5b0", + "uuid": "faf7629d-282c-41ea-b5b4-dc4b8ee8304f", "control-id": "cis_rhel10_3-3.1.14", "description": "No notes for control-id 3.3.1.14.", "props": [ @@ -10529,7 +10477,7 @@ ] }, { - "uuid": "9692fec2-2c92-4ff9-868c-62b658f73b19", + "uuid": "8b2da97c-fcf9-4dff-b178-8315b77a404c", "control-id": "cis_rhel10_3-3.1.15", "description": "No notes for control-id 3.3.1.15.", "props": [ @@ -10546,7 +10494,7 @@ ] }, { - "uuid": "1b6507e4-c0f0-456c-a7d2-f576f91562b7", + "uuid": "1d761cc0-6a4c-4e30-b085-6777466ea365", "control-id": "cis_rhel10_3-3.1.16", "description": "No notes for control-id 3.3.1.16.", "props": [ @@ -10563,7 +10511,7 @@ ] }, { - "uuid": "179763f2-67dc-46b8-acfe-65cf652eedf3", + "uuid": "57ca0039-20b3-4225-a086-f46f76bacea3", "control-id": "cis_rhel10_3-3.1.17", "description": "No notes for control-id 3.3.1.17.", "props": [ @@ -10580,7 +10528,7 @@ ] }, { - "uuid": "97b2c265-75ed-449c-94d7-697db88bfff9", + "uuid": "7a7cc576-b81b-47a1-acc8-3ae73e2d4de9", "control-id": "cis_rhel10_3-3.1.18", "description": "No notes for control-id 3.3.1.18.", "props": [ @@ -10597,7 +10545,7 @@ ] }, { - "uuid": "9cf456e5-9ec0-43f6-8ef4-fec9d6183142", + "uuid": "c168b239-42d0-4e7c-ac06-0cdde7ab427b", "control-id": "cis_rhel10_3-3.2.1", "description": "No notes for control-id 3.3.2.1.", "props": [ @@ -10614,7 +10562,7 @@ ] }, { - "uuid": "a15e0d4d-ce6e-426e-88b1-b0e3e3166cb9", + "uuid": "baf96b3c-8522-434b-9e2a-58542d740532", "control-id": "cis_rhel10_3-3.2.2", "description": "No notes for control-id 3.3.2.2.", "props": [ @@ -10631,7 +10579,7 @@ ] }, { - "uuid": "336759b9-8b93-4e5d-a19d-a038db3fa044", + "uuid": "acdd050e-749f-4dab-80ac-bf2cf5d55be5", "control-id": "cis_rhel10_3-3.2.3", "description": "No notes for control-id 3.3.2.3.", "props": [ @@ -10648,7 +10596,7 @@ ] }, { - "uuid": "2f44909a-5e49-4e25-901d-e6ade2fffafc", + "uuid": "d858a2e2-da33-4174-a927-ad9849bdb621", "control-id": "cis_rhel10_3-3.2.4", "description": "No notes for control-id 3.3.2.4.", "props": [ @@ -10665,7 +10613,7 @@ ] }, { - "uuid": "b3c1d0bb-ec09-434d-9e51-b87abc97b147", + "uuid": "c9082c75-44e0-4f11-96a7-d37643c58588", "control-id": "cis_rhel10_3-3.2.5", "description": "No notes for control-id 3.3.2.5.", "props": [ @@ -10682,7 +10630,7 @@ ] }, { - "uuid": "37438013-6422-4d96-886f-2240b95cc51b", + "uuid": "1ce59f6c-f15b-4f65-b207-c85aa5798a22", "control-id": "cis_rhel10_3-3.2.6", "description": "No notes for control-id 3.3.2.6.", "props": [ @@ -10699,7 +10647,7 @@ ] }, { - "uuid": "c876f688-edd7-4ddd-968b-5743e2b35e09", + "uuid": "ff54da19-1f91-4eb9-b6be-d4dddc01e892", "control-id": "cis_rhel10_3-3.2.7", "description": "No notes for control-id 3.3.2.7.", "props": [ @@ -10716,7 +10664,7 @@ ] }, { - "uuid": "c4791d8a-82b3-4445-acc4-bab0264ebbee", + "uuid": "c97a9e0a-0803-4cb4-b44b-7f517346eb42", "control-id": "cis_rhel10_3-3.2.8", "description": "No notes for control-id 3.3.2.8.", "props": [ @@ -10733,7 +10681,7 @@ ] }, { - "uuid": "23202adc-bb43-4261-a21a-80f781635ee5", + "uuid": "2cebb099-e8bb-44a4-b4ff-9bfac70b03ba", "control-id": "cis_rhel10_4-1.1", "description": "No notes for control-id 4.1.1.", "props": [ @@ -10750,7 +10698,7 @@ ] }, { - "uuid": "32b77277-b597-4943-88ea-46740575b31f", + "uuid": "7a90a779-d38c-4060-9e84-119dc3afc0d7", "control-id": "cis_rhel10_4-1.2", "description": "No notes for control-id 4.1.2.", "props": [ @@ -10767,7 +10715,7 @@ ] }, { - "uuid": "1dc3bf05-8ad2-4c1f-958d-887eeba2f26e", + "uuid": "030a9d99-1b73-4442-90de-9a9a190d3f94", "control-id": "cis_rhel10_4-1.3", "description": "No notes for control-id 4.1.3.", "props": [ @@ -10784,7 +10732,7 @@ ] }, { - "uuid": "6e46f7db-b79e-4ac2-b74f-6b477fd74f8d", + "uuid": "314440a1-27f3-4731-b5b4-4d4fe9924e12", "control-id": "cis_rhel10_4-1.4", "description": "The description for control-id cis_rhel10_4-1.4.", "props": [ @@ -10797,7 +10745,7 @@ ] }, { - "uuid": "fca67e8f-95f4-4c04-b1bb-80f0e0b1a3ec", + "uuid": "5cdb2aad-f5e8-4d7a-826b-15e46657b295", "control-id": "cis_rhel10_4-1.5", "description": "Firewalld in Red Hat Enterprise Linux 10 accepts loopback traffic by default.", "props": [ @@ -10814,7 +10762,7 @@ ] }, { - "uuid": "81c87f60-32c3-4fbc-8e3b-6e34ac4f9df2", + "uuid": "dbb5ad87-b893-4b95-a068-5ed201b930f4", "control-id": "cis_rhel10_4-1.6", "description": "The description for control-id cis_rhel10_4-1.6.", "props": [ @@ -10827,7 +10775,7 @@ ] }, { - "uuid": "8d78181c-7513-49f8-85ba-e048fefa3304", + "uuid": "5ea5522c-a6c1-4cd2-b888-3997f658f36d", "control-id": "cis_rhel10_4-1.7", "description": "The description for control-id cis_rhel10_4-1.7.", "props": [ @@ -10840,7 +10788,7 @@ ] }, { - "uuid": "676dd659-d6da-43f1-a151-55c047da83da", + "uuid": "50e14d14-cfe4-4e68-8560-b337b8db0589", "control-id": "cis_rhel10_5-1.1", "description": "No notes for control-id 5.1.1.", "props": [ @@ -10897,7 +10845,7 @@ ] }, { - "uuid": "8fa88004-c2e0-400f-8dd4-bcc53135bb6c", + "uuid": "976c8fc9-3974-4abb-8bfa-239b3c6c6f99", "control-id": "cis_rhel10_5-1.2", "description": "No notes for control-id 5.1.2.", "props": [ @@ -10924,7 +10872,7 @@ ] }, { - "uuid": "710bc375-263a-4671-9f57-271ea4d0a934", + "uuid": "ee5cec7b-6a8d-4955-abe7-42b28eadc916", "control-id": "cis_rhel10_5-1.3", "description": "No notes for control-id 5.1.3.", "props": [ @@ -10951,7 +10899,7 @@ ] }, { - "uuid": "bc2fa6fa-2eec-42fb-aba7-db5d42c10a73", + "uuid": "603d4557-a165-427b-8b04-a11858014498", "control-id": "cis_rhel10_5-1.4", "description": "No notes for control-id 5.1.4.", "props": [ @@ -10968,7 +10916,7 @@ ] }, { - "uuid": "5dc359fd-94d0-4777-9ec5-3fc51d806141", + "uuid": "3f198902-65fc-4337-8447-3d0da872dc3c", "control-id": "cis_rhel10_5-1.5", "description": "No notes for control-id 5.1.5.", "props": [ @@ -10985,7 +10933,7 @@ ] }, { - "uuid": "407ba38a-499f-4dca-a67e-bd720b22cda9", + "uuid": "866734a1-1f99-4f60-8a03-abf0978543b7", "control-id": "cis_rhel10_5-1.6", "description": "No notes for control-id 5.1.6.", "props": [ @@ -11002,7 +10950,7 @@ ] }, { - "uuid": "0bdb7cf0-c6de-4fd8-a1d1-b4b63c0c191c", + "uuid": "7a3a2dd6-ba13-417c-832c-9156018f7d67", "control-id": "cis_rhel10_5-1.7", "description": "The requirement gives an example of 45 seconds, but is flexible about the values. It is only\nnecessary to ensure there is a timeout configured in alignment to the site policy.", "props": [ @@ -11024,7 +10972,7 @@ ] }, { - "uuid": "6accdd42-a7a8-4a37-8856-ffec0dba1f73", + "uuid": "f21a36b2-6e8f-4463-ae11-ecd08ad8abaf", "control-id": "cis_rhel10_5-1.8", "description": "No notes for control-id 5.1.8.", "props": [ @@ -11041,7 +10989,7 @@ ] }, { - "uuid": "e68a51c6-4c20-44da-9257-8861daf9197a", + "uuid": "f419dbfd-6feb-42c3-a339-c117758f1656", "control-id": "cis_rhel10_5-1.9", "description": "No notes for control-id 5.1.9.", "props": [ @@ -11058,7 +11006,7 @@ ] }, { - "uuid": "89c7b67c-9ccf-45ff-8ba6-0418cdcd87a0", + "uuid": "a65bd8bf-1d5c-4b50-9ef5-a9950226eed7", "control-id": "cis_rhel10_5-1.10", "description": "No notes for control-id 5.1.10.", "props": [ @@ -11075,7 +11023,7 @@ ] }, { - "uuid": "8fc800b0-b388-44fa-a486-1d468b0099b1", + "uuid": "cf36e9c3-18ee-4a6f-9e29-5c6f40a7d158", "control-id": "cis_rhel10_5-1.11", "description": "No notes for control-id 5.1.11.", "props": [ @@ -11092,7 +11040,7 @@ ] }, { - "uuid": "a5a9a75f-ece4-4a9a-a4da-1a76ae5f799c", + "uuid": "794009f2-82f1-45f4-9489-73f624a24798", "control-id": "cis_rhel10_5-1.12", "description": "The description for control-id cis_rhel10_5-1.12.", "props": [ @@ -11110,7 +11058,7 @@ ] }, { - "uuid": "17aca0c5-a71d-41d2-8b36-41bf75a309e8", + "uuid": "c62d7add-14bd-4d29-8145-7900b6e1d54b", "control-id": "cis_rhel10_5-1.13", "description": "No notes for control-id 5.1.13.", "props": [ @@ -11127,7 +11075,7 @@ ] }, { - "uuid": "74db6a80-229e-4d61-91c6-c71410c8d098", + "uuid": "9648df6f-2dd8-4cfd-bcff-99f972d2463e", "control-id": "cis_rhel10_5-1.14", "description": "The CIS benchmark is not opinionated about which loglevel is selected here. Here, this\nprofile uses VERBOSE by default, as it allows for the capture of login and logout activity\nas well as key fingerprints.", "props": [ @@ -11144,7 +11092,7 @@ ] }, { - "uuid": "c20b4553-e7f9-4285-8d13-15f9d565455d", + "uuid": "61095d28-db3f-462d-ae0c-086f560608c3", "control-id": "cis_rhel10_5-1.15", "description": "No notes for control-id 5.1.15.", "props": [ @@ -11161,7 +11109,7 @@ ] }, { - "uuid": "891d54be-8caa-44c1-bf59-e3d69a655a10", + "uuid": "7e3e3e6f-6b9d-453f-83d2-e24f2581b127", "control-id": "cis_rhel10_5-1.16", "description": "No notes for control-id 5.1.16.", "props": [ @@ -11178,7 +11126,7 @@ ] }, { - "uuid": "2cce5e3f-cd29-4527-9310-71eaede0fb9b", + "uuid": "77e2fe82-3384-4a9e-8201-e2ef138ee9b6", "control-id": "cis_rhel10_5-1.17", "description": "No notes for control-id 5.1.17.", "props": [ @@ -11195,7 +11143,7 @@ ] }, { - "uuid": "b87b78f2-0255-4b55-9372-50a4b02a6dd9", + "uuid": "e2ab0182-add6-4f26-9621-69a6b7670778", "control-id": "cis_rhel10_5-1.18", "description": "No notes for control-id 5.1.18.", "props": [ @@ -11212,7 +11160,7 @@ ] }, { - "uuid": "21112800-6ec1-4cde-a478-296b390bd922", + "uuid": "13f8ec63-ffdf-4ace-b9f6-60e1783305ac", "control-id": "cis_rhel10_5-1.19", "description": "No notes for control-id 5.1.19.", "props": [ @@ -11229,7 +11177,7 @@ ] }, { - "uuid": "beef1843-2eea-4665-9bab-eeca1ff1c25f", + "uuid": "f3c83759-d272-419f-85d6-d7b76827cb33", "control-id": "cis_rhel10_5-1.20", "description": "No notes for control-id 5.1.20.", "props": [ @@ -11246,7 +11194,7 @@ ] }, { - "uuid": "e4d6fa8f-b796-4520-848f-b5495b88e478", + "uuid": "f79d275c-a6a6-4c12-84b3-735d9ca74ba2", "control-id": "cis_rhel10_5-1.21", "description": "No notes for control-id 5.1.21.", "props": [ @@ -11263,7 +11211,7 @@ ] }, { - "uuid": "2c711eb8-7608-4f44-a91c-be44076ca6c1", + "uuid": "57af5fd3-b5a8-40c4-8876-d9183088811e", "control-id": "cis_rhel10_5-1.22", "description": "No notes for control-id 5.1.22.", "props": [ @@ -11280,7 +11228,7 @@ ] }, { - "uuid": "d598ab2d-c91a-497d-8236-c37e65783f54", + "uuid": "4be1dd17-d105-47f7-8650-532dbe467bb6", "control-id": "cis_rhel10_5-2.1", "description": "No notes for control-id 5.2.1.", "props": [ @@ -11297,7 +11245,7 @@ ] }, { - "uuid": "57f80dc8-44a2-4512-9939-9aa4754fcaa3", + "uuid": "1aa20276-deca-451d-a30c-3c8ca86dbc32", "control-id": "cis_rhel10_5-2.2", "description": "No notes for control-id 5.2.2.", "props": [ @@ -11314,7 +11262,7 @@ ] }, { - "uuid": "ab9d02e9-787b-446e-bab3-c7a69f76eb7c", + "uuid": "fba5a714-28d9-4eee-a5f4-517edf2d44a1", "control-id": "cis_rhel10_5-2.3", "description": "No notes for control-id 5.2.3.", "props": [ @@ -11331,7 +11279,7 @@ ] }, { - "uuid": "f10b0066-1bb0-44af-85d1-717e2504f300", + "uuid": "c8a12868-0f31-48d0-b3c3-5e31fd42a9ee", "control-id": "cis_rhel10_5-2.5", "description": "No notes for control-id 5.2.5.", "props": [ @@ -11348,7 +11296,7 @@ ] }, { - "uuid": "2f18ae7b-0cd8-470a-a13c-d8d460331de6", + "uuid": "07d23d59-7289-49d3-b8c0-41d82a792787", "control-id": "cis_rhel10_5-2.6", "description": "No notes for control-id 5.2.6.", "props": [ @@ -11365,7 +11313,7 @@ ] }, { - "uuid": "2ff9ce97-3a6a-4dc6-b9d8-e55a16576df9", + "uuid": "2fa9b2c4-7561-4018-8ac0-5fa20daf417f", "control-id": "cis_rhel10_5-2.7", "description": "Members of \"wheel\" or GID 0 groups are checked by default if the group option is not set for\npam_wheel.so module. The recommendation states the group should be empty to reinforce the\nuse of \"sudo\" for privileged access. Therefore, members of these groups should be manually\nchecked or a different group should be informed.", "props": [ @@ -11387,7 +11335,7 @@ ] }, { - "uuid": "d8da5474-3701-4b2a-816f-cbbfed5719b3", + "uuid": "e22aa909-19bf-4062-853f-8d830113bf05", "control-id": "cis_rhel10_5-3.1.1", "description": "This requirement is hard to be automated without any specific requirement. The policy even\nstates that provided commands are examples, other custom settings might be in place and the\nsettings might be different depending on site policies. The other rules will already make\nsure there is a correct autheselect profile regardless of the existing settings. It is\nnecessary to better discuss with CIS Community.", "props": [ @@ -11399,7 +11347,7 @@ ] }, { - "uuid": "65333b4f-5062-41bb-8316-5e41faee2927", + "uuid": "183276d6-bc24-4364-b5b9-6193d00b74bd", "control-id": "cis_rhel10_5-3.1.2", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.1.", "props": [ @@ -11421,7 +11369,7 @@ ] }, { - "uuid": "d935b007-09fe-477a-b908-500957151834", + "uuid": "5aa9ef07-d9f6-451c-90c0-162c5875518c", "control-id": "cis_rhel10_5-3.1.3", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.2.", "props": [ @@ -11448,7 +11396,7 @@ ] }, { - "uuid": "80a88aa6-c672-4519-a3c7-79c753cd512a", + "uuid": "13035521-75ce-40c4-808b-4ce8627afee3", "control-id": "cis_rhel10_5-3.1.4", "description": "The module is properly enabled by the rules mentioned in related_rules.\nRequirements in 5.3.2.3 use these rules.", "props": [ @@ -11460,7 +11408,7 @@ ] }, { - "uuid": "117261fe-b111-4a6c-a114-96efec9d661e", + "uuid": "84141c9a-d450-466b-9a86-bb8dcbba1181", "control-id": "cis_rhel10_5-3.1.5", "description": "No notes for control-id 5.3.1.5.", "props": [ @@ -11477,7 +11425,7 @@ ] }, { - "uuid": "cb84ac51-0203-48ae-b821-4789587313fa", + "uuid": "9d7a6b54-d450-446a-b1fc-7f4496df3891", "control-id": "cis_rhel10_5-3.2.1.1", "description": "No notes for control-id 5.3.2.1.1.", "props": [ @@ -11494,7 +11442,7 @@ ] }, { - "uuid": "fee0e45d-3d07-411f-b2ce-c68494cb1d8d", + "uuid": "abef596d-4037-49dd-b701-1d8fdf8a3645", "control-id": "cis_rhel10_5-3.2.1.2", "description": "The policy also accepts value 0, which means the locked accounts should be manually unlocked\nby an administrator. However, it also mentions that using value 0 can facilitate a DoS\nattack to legitimate users.", "props": [ @@ -11511,7 +11459,7 @@ ] }, { - "uuid": "a45940e2-a2d9-4982-9bf2-1902ecb2bfad", + "uuid": "80cdbc14-413d-471c-ab36-4315d21a1fb4", "control-id": "cis_rhel10_5-3.2.2.1", "description": "No notes for control-id 5.3.2.2.1.", "props": [ @@ -11528,7 +11476,7 @@ ] }, { - "uuid": "d2427bf6-e4e3-4e3f-b7df-2188bb6ab63f", + "uuid": "6963dcef-2892-4491-b11d-c77b21e2f34e", "control-id": "cis_rhel10_5-3.2.2.2", "description": "No notes for control-id 5.3.2.2.2.", "props": [ @@ -11545,7 +11493,7 @@ ] }, { - "uuid": "8a009ab4-b22e-4add-ab98-2ac6e4273073", + "uuid": "e2ed4c06-b750-4d64-9626-e8ed2637bfb9", "control-id": "cis_rhel10_5-3.2.2.3", "description": "This requirement is expected to be manual. However, in previous versions of the policy\nit was already automated the configuration of \"minclass\" option. This posture was kept for\nRHEL 10 in this new version. Rules related to other options are informed in related_rules.\nIn short, minclass=4 alone can achieve the same result achieved by the combination of the\nother 4 options mentioned in the policy.", "props": [ @@ -11562,7 +11510,7 @@ ] }, { - "uuid": "3f9407ac-1151-4cb9-a9f9-d988101010ca", + "uuid": "ebfccccf-6476-438c-9de8-6b954e2f154c", "control-id": "cis_rhel10_5-3.2.2.4", "description": "No notes for control-id 5.3.2.2.4.", "props": [ @@ -11579,7 +11527,7 @@ ] }, { - "uuid": "041bcc8e-5ec8-4f44-8ed4-f7d8dc0bc88c", + "uuid": "063006cd-8370-4e13-907c-c1cbe52af107", "control-id": "cis_rhel10_5-3.2.2.5", "description": "No notes for control-id 5.3.2.2.5.", "props": [ @@ -11596,7 +11544,7 @@ ] }, { - "uuid": "5f400d21-1f95-4e58-bb89-80154c924d97", + "uuid": "40f09dce-887d-4359-81cd-b18d2dd7391d", "control-id": "cis_rhel10_5-3.2.2.6", "description": "No notes for control-id 5.3.2.2.6.", "props": [ @@ -11613,7 +11561,7 @@ ] }, { - "uuid": "b6fb188f-2735-492a-9ea9-1ad6ca15ddf7", + "uuid": "1f376766-1794-42b8-84da-03f0a76c286f", "control-id": "cis_rhel10_5-3.2.2.7", "description": "No notes for control-id 5.3.2.2.7.", "props": [ @@ -11630,7 +11578,7 @@ ] }, { - "uuid": "62126886-b888-4787-836c-31b3aa386646", + "uuid": "002f8a4b-7040-4559-b857-2a14ff87f7b1", "control-id": "cis_rhel10_5-3.2.3.1", "description": "Although mentioned in the section 5.3.3.3, there is no explicit requirement to configure\nretry option of pam_pwhistory. If come in the future, the rule accounts_password_pam_retry\ncan be used.", "props": [ @@ -11652,7 +11600,7 @@ ] }, { - "uuid": "793476f4-4378-4e2e-a27d-50cf503a9388", + "uuid": "8b43a60a-8d2c-4ee7-87bd-54317cb15c5c", "control-id": "cis_rhel10_5-3.2.3.2", "description": "No notes for control-id 5.3.2.3.2.", "props": [ @@ -11669,7 +11617,7 @@ ] }, { - "uuid": "a9a508f6-274d-4386-b529-8089a1f855d8", + "uuid": "e3916e2d-7266-4333-bc83-1dade19ffef5", "control-id": "cis_rhel10_5-3.2.3.3", "description": "In RHEL 10 pam_pwhistory is enabled via authselect feature, as required in 5.3.1.4. The\nfeature automatically set \"use_authok\" option. In any case, we don't have a rule to check\nthis option specifically.", "props": [ @@ -11686,7 +11634,7 @@ ] }, { - "uuid": "8ae1c34c-c85c-4e82-b587-85089a7e7075", + "uuid": "3e2fc1d8-9b57-48a5-9e35-73403b1fc36c", "control-id": "cis_rhel10_5-3.2.4.1", "description": "The rule more specifically used in this requirement also satify the requirement 5.3.1.5.", "props": [ @@ -11703,7 +11651,7 @@ ] }, { - "uuid": "1a03f32a-dc46-4321-a351-8ba28eb1ac07", + "uuid": "27c86479-301a-4c93-8481-d1b7aefdce90", "control-id": "cis_rhel10_5-3.2.4.2", "description": "Usage of pam_unix.so module together with \"remember\" option is deprecated and is not\nrecommended by this policy. Instead, it should be used remember option of pam_pwhistory\nmodule, as required in 5.3.2.3.1. See here for more details about pam_unix.so:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1778929", "props": [ @@ -11720,7 +11668,7 @@ ] }, { - "uuid": "ba2cc29a-78da-4ecd-8f75-2669ee3ad80c", + "uuid": "bd23d69c-edaf-47e9-89bb-160c97baf3ac", "control-id": "cis_rhel10_5-3.2.4.3", "description": "Changes in logindefs mentioned in this requirement are more specifically covered by 5.4.1.4", "props": [ @@ -11742,7 +11690,7 @@ ] }, { - "uuid": "2c4e4309-ff5e-480f-8f79-a2e0861e1f56", + "uuid": "12bd90a2-805c-464d-bd83-e4ea0cbb3c73", "control-id": "cis_rhel10_5-3.2.4.4", "description": "In RHEL 10 pam_unix is enabled by default in all authselect profiles already with the\nuse_authtok option set. In any case, we don't have a rule to check this option specifically,\nlike in 5.3.2.3.3.", "props": [ @@ -11759,7 +11707,7 @@ ] }, { - "uuid": "b78ff26c-f6eb-4142-a647-f5ed52acac09", + "uuid": "fd3e7fdb-4562-4a5e-9d72-eba6cdaabba7", "control-id": "cis_rhel10_5-4.1.1", "description": "No notes for control-id 5.4.1.1.", "props": [ @@ -11781,7 +11729,7 @@ ] }, { - "uuid": "3d13da79-2271-4b9e-97e5-b3e43292a7c7", + "uuid": "3f07b0f3-0523-487a-b251-de9bc93d80a3", "control-id": "cis_rhel10_5-4.1.3", "description": "No notes for control-id 5.4.1.3.", "props": [ @@ -11803,7 +11751,7 @@ ] }, { - "uuid": "09407091-4598-4d5c-9707-70f6bf3d3c43", + "uuid": "a43da28f-7320-41e0-8d64-59b9cb4435a8", "control-id": "cis_rhel10_5-4.1.4", "description": "There's a \"new\" set of options in /etc/login.defs file to define the number of iterations\nperformed during the hashing process.", "props": [ @@ -11825,7 +11773,7 @@ ] }, { - "uuid": "1e65de0f-5cd7-41f2-8536-9b0869bfaa3b", + "uuid": "a072c988-0cc6-46f2-8bd2-64e983e31bd7", "control-id": "cis_rhel10_5-4.1.5", "description": "No notes for control-id 5.4.1.5.", "props": [ @@ -11847,7 +11795,7 @@ ] }, { - "uuid": "25327533-9fe3-4f25-992b-bab5b52b0322", + "uuid": "95a3a86b-98a9-43dd-980f-897348a67391", "control-id": "cis_rhel10_5-4.1.6", "description": "No notes for control-id 5.4.1.6.", "props": [ @@ -11864,7 +11812,7 @@ ] }, { - "uuid": "622dd5be-f00f-4593-ac62-6ebc7ae63e95", + "uuid": "4da4b083-6b09-4bdd-9714-e8e8ccdb2954", "control-id": "cis_rhel10_5-4.2.1", "description": "No notes for control-id 5.4.2.1.", "props": [ @@ -11881,7 +11829,7 @@ ] }, { - "uuid": "3c4b8a0d-d4ec-47d0-9f31-5490e2c6c85e", + "uuid": "7d62c9d9-f919-483a-a705-2a3ebd429052", "control-id": "cis_rhel10_5-4.2.2", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -11898,7 +11846,7 @@ ] }, { - "uuid": "64796f30-edcd-41fd-b596-3723e2aa3b79", + "uuid": "cc38acfc-8692-468c-9e94-bdc0ac553e8f", "control-id": "cis_rhel10_5-4.2.3", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -11915,7 +11863,7 @@ ] }, { - "uuid": "2e6f25dd-f129-42be-b253-23f9826d2012", + "uuid": "08760203-1f4a-477d-85b5-0340667843f6", "control-id": "cis_rhel10_5-4.2.4", "description": "No notes for control-id 5.4.2.4.", "props": [ @@ -11932,7 +11880,7 @@ ] }, { - "uuid": "defb2d92-afb4-4340-899d-ae947764b144", + "uuid": "5fb18116-435f-4bc2-91a3-785bf781e3c8", "control-id": "cis_rhel10_5-4.2.5", "description": "No notes for control-id 5.4.2.5.", "props": [ @@ -11954,7 +11902,7 @@ ] }, { - "uuid": "6c56edac-47fa-4a18-a6f0-e0aa6e631a66", + "uuid": "e9d4b6b4-b8f8-428c-87da-37981175f3ba", "control-id": "cis_rhel10_5-4.2.6", "description": "No notes for control-id 5.4.2.6.", "props": [ @@ -11971,7 +11919,7 @@ ] }, { - "uuid": "5a22d8a8-5902-4581-b3af-073cf3052a07", + "uuid": "e2afa0b8-4351-4839-a70b-6d1c74df31f2", "control-id": "cis_rhel10_5-4.2.7", "description": "No notes for control-id 5.4.2.7.", "props": [ @@ -11993,7 +11941,7 @@ ] }, { - "uuid": "c896fa65-179a-4595-8501-b1d883768a91", + "uuid": "2c84bb01-0cc7-41e3-a8b3-5432750a79aa", "control-id": "cis_rhel10_5-4.2.8", "description": "No notes for control-id 5.4.2.8.", "props": [ @@ -12010,7 +11958,7 @@ ] }, { - "uuid": "f9521704-fd5f-465c-be71-41ebe43c2765", + "uuid": "0fbbaab6-e63f-4a36-a18b-370eb4bd2a7e", "control-id": "cis_rhel10_5-4.3.2", "description": "No notes for control-id 5.4.3.2.", "props": [ @@ -12027,7 +11975,7 @@ ] }, { - "uuid": "94a13233-2c60-430a-afe7-0131fde1316d", + "uuid": "957535b5-8a79-466a-8677-227f37706b73", "control-id": "cis_rhel10_5-4.3.3", "description": "No notes for control-id 5.4.3.3.", "props": [ @@ -12054,7 +12002,7 @@ ] }, { - "uuid": "67848280-1a79-41a8-9212-fab3cf97a33b", + "uuid": "cfde7f3d-9a00-48fc-ae70-2e794adc9002", "control-id": "cis_rhel10_6-1.1", "description": "No notes for control-id 6.1.1.", "props": [ @@ -12076,7 +12024,7 @@ ] }, { - "uuid": "b315f782-49f2-48e8-98c6-3f824feb08f4", + "uuid": "93bc5caa-09c9-4ed4-b307-212456c6714c", "control-id": "cis_rhel10_6-1.2", "description": "No notes for control-id 6.1.2.", "props": [ @@ -12093,7 +12041,7 @@ ] }, { - "uuid": "4339fdc8-33df-47db-a7c9-a4aa529036b6", + "uuid": "6d67b39e-4003-4409-9e04-dfff8e50fd5f", "control-id": "cis_rhel10_6-1.3", "description": "No notes for control-id 6.1.3.", "props": [ @@ -12110,7 +12058,7 @@ ] }, { - "uuid": "7e277030-9ade-4408-ac60-9dcf6661993e", + "uuid": "65e5b6eb-6572-48fa-8445-3270bf4224ee", "control-id": "cis_rhel10_6-2.1.1", "description": "No notes for control-id 6.2.1.1.", "props": [ @@ -12127,7 +12075,7 @@ ] }, { - "uuid": "5378b3ea-5843-4337-8fbd-c741204a891c", + "uuid": "8626a290-3cea-40d3-a5e5-029edadaf813", "control-id": "cis_rhel10_6-2.1.2", "description": "The description for control-id cis_rhel10_6-2.1.2.", "props": [ @@ -12140,7 +12088,7 @@ ] }, { - "uuid": "de183516-389e-4f12-a0f4-4c5f2dd19a39", + "uuid": "47c958e3-888e-4553-aa00-9a6b56d2797b", "control-id": "cis_rhel10_6-2.1.3", "description": "The description for control-id cis_rhel10_6-2.1.3.", "props": [ @@ -12153,7 +12101,7 @@ ] }, { - "uuid": "77a47df1-64c4-4a63-8bfd-df34d6164c1f", + "uuid": "bda84d65-59e6-4caf-b627-c234a0428b9c", "control-id": "cis_rhel10_6-2.1.4", "description": "No notes for control-id 6.2.1.4.", "props": [ @@ -12170,7 +12118,7 @@ ] }, { - "uuid": "1b0c1f57-be46-4bb2-aafe-0725c776b506", + "uuid": "92d4dec2-f04d-4a63-8891-1aac2fc8958c", "control-id": "cis_rhel10_6-2.2.1.1", "description": "No notes for control-id 6.2.2.1.1.", "props": [ @@ -12187,7 +12135,7 @@ ] }, { - "uuid": "e4f1e6c2-f314-44f5-8572-f15b08576cc9", + "uuid": "03e8f211-0acf-4280-b2ff-23f80d1492f0", "control-id": "cis_rhel10_6-2.2.1.2", "description": "The description for control-id cis_rhel10_6-2.2.1.2.", "props": [ @@ -12200,7 +12148,7 @@ ] }, { - "uuid": "c47f18c4-e807-42d5-a71a-0d671e2c2b3e", + "uuid": "490b085b-82cc-4209-8122-68f4dfa65a5e", "control-id": "cis_rhel10_6-2.2.1.3", "description": "No notes for control-id 6.2.2.1.3.", "props": [ @@ -12217,7 +12165,7 @@ ] }, { - "uuid": "07bc6f8c-f6d8-4fd7-b307-635d9c3ea057", + "uuid": "c6837dd2-f34a-4369-bba8-a0fb1f6ce2c2", "control-id": "cis_rhel10_6-2.2.1.4", "description": "No notes for control-id 6.2.2.1.4.", "props": [ @@ -12234,7 +12182,7 @@ ] }, { - "uuid": "88acbebf-1b78-46e3-a738-6f4176a30856", + "uuid": "71273285-7ad0-491a-9f2e-13b8bf51731b", "control-id": "cis_rhel10_6-2.2.2", "description": "No notes for control-id 6.2.2.2.", "props": [ @@ -12251,7 +12199,7 @@ ] }, { - "uuid": "98c12949-6787-41d6-b784-e51f32e7cc06", + "uuid": "01352900-0eed-48f0-81ed-9fb76c5f616e", "control-id": "cis_rhel10_6-2.2.3", "description": "No notes for control-id 6.2.2.3.", "props": [ @@ -12268,7 +12216,7 @@ ] }, { - "uuid": "a06ed04f-7552-4b4d-aee5-07a4616d21c9", + "uuid": "2e83fe75-320e-410e-b480-f0dba5751019", "control-id": "cis_rhel10_6-2.2.4", "description": "No notes for control-id 6.2.2.4.", "props": [ @@ -12285,7 +12233,7 @@ ] }, { - "uuid": "9d8a3d05-55e5-4f01-98e9-8015272d4953", + "uuid": "4e4940cd-6d52-43e4-be6a-9c5ba9fdf7de", "control-id": "cis_rhel10_6-2.3.1", "description": "No notes for control-id 6.2.3.1.", "props": [ @@ -12297,7 +12245,7 @@ ] }, { - "uuid": "103f4384-f5de-41bb-8fd5-c9f0a0e0392e", + "uuid": "e101c7d6-85da-409b-9bf6-b27d1bdefe25", "control-id": "cis_rhel10_6-2.3.2", "description": "No notes for control-id 6.2.3.2.", "props": [ @@ -12309,7 +12257,7 @@ ] }, { - "uuid": "36473f69-99dc-491e-ba79-3652fb6ece6c", + "uuid": "f3f8c093-a7a5-4981-8ddc-4ddc4c8e4931", "control-id": "cis_rhel10_6-2.3.3", "description": "No notes for control-id 6.2.3.3.", "props": [ @@ -12321,7 +12269,7 @@ ] }, { - "uuid": "63c22f00-4ae9-4909-b280-d0c7b3a82e13", + "uuid": "75453bfc-5538-46d9-a064-0efb737d498d", "control-id": "cis_rhel10_6-2.3.4", "description": "No notes for control-id 6.2.3.4.", "props": [ @@ -12333,7 +12281,7 @@ ] }, { - "uuid": "cdcb8fc0-7b8e-4b4b-b270-446457f07bfd", + "uuid": "5e7bc7a0-dce7-463f-b651-e1a513ae77c6", "control-id": "cis_rhel10_6-2.3.5", "description": "The description for control-id cis_rhel10_6-2.3.5.", "props": [ @@ -12346,7 +12294,7 @@ ] }, { - "uuid": "56f0f689-5b86-4d74-ab10-e4610a27c220", + "uuid": "3902a7ba-c2f9-423a-a7f8-d8d2ba02b39f", "control-id": "cis_rhel10_6-2.3.6", "description": "The description for control-id cis_rhel10_6-2.3.6.", "props": [ @@ -12359,7 +12307,7 @@ ] }, { - "uuid": "4a6387b9-519f-4e6c-a393-f7cbe24a9532", + "uuid": "2765c91d-6523-4ba6-94d1-9c736d492dff", "control-id": "cis_rhel10_6-2.3.7", "description": "No notes for control-id 6.2.3.7.", "props": [ @@ -12371,7 +12319,7 @@ ] }, { - "uuid": "c37d367e-3218-47cf-8603-f849a30ad02b", + "uuid": "894b5f0b-38d7-4491-b7c9-9f1b1b028eec", "control-id": "cis_rhel10_6-2.3.8", "description": "The description for control-id cis_rhel10_6-2.3.8.", "props": [ @@ -12384,7 +12332,7 @@ ] }, { - "uuid": "f813e389-0671-4883-9d93-4857c304234c", + "uuid": "4705f6e1-85b9-4754-a3cb-69d4105884ab", "control-id": "cis_rhel10_6-2.4.1", "description": "It is not harmful to run these rules even if rsyslog is not installed or active.", "props": [ @@ -12411,7 +12359,7 @@ ] }, { - "uuid": "a136e99d-2800-4a62-87ab-1aadb8ab021e", + "uuid": "d6c91433-6cda-4448-91ae-9e5d90fe489b", "control-id": "cis_rhel10_7-1.1", "description": "No notes for control-id 7.1.1.", "props": [ @@ -12438,7 +12386,7 @@ ] }, { - "uuid": "8abcc26f-4423-4f0f-b796-5c02b43d4b9d", + "uuid": "6423cb05-ba06-4412-9bfb-5483c0ad635c", "control-id": "cis_rhel10_7-1.2", "description": "No notes for control-id 7.1.2.", "props": [ @@ -12465,7 +12413,7 @@ ] }, { - "uuid": "e3cf33f5-6722-40da-aeba-cdf60d2c2d4a", + "uuid": "67f09774-982c-40a9-89fd-55c5d150a5d0", "control-id": "cis_rhel10_7-1.3", "description": "No notes for control-id 7.1.3.", "props": [ @@ -12492,7 +12440,7 @@ ] }, { - "uuid": "3eebd407-58a9-470d-982f-74a8e6880c74", + "uuid": "17fa2ab3-f688-4b62-8463-a657325b1f0e", "control-id": "cis_rhel10_7-1.4", "description": "No notes for control-id 7.1.4.", "props": [ @@ -12519,7 +12467,7 @@ ] }, { - "uuid": "879fac11-47c7-4944-8b28-bbb3234ee874", + "uuid": "4150635e-62b5-4bb2-bac7-98810dd95c03", "control-id": "cis_rhel10_7-1.5", "description": "No notes for control-id 7.1.5.", "props": [ @@ -12546,7 +12494,7 @@ ] }, { - "uuid": "f0ff9c83-cafd-4868-835d-ae95031acf95", + "uuid": "c9f3134a-d954-442a-80f0-000108898a1c", "control-id": "cis_rhel10_7-1.6", "description": "No notes for control-id 7.1.6.", "props": [ @@ -12573,7 +12521,7 @@ ] }, { - "uuid": "ae304732-1cbb-4dbe-bc57-f8f2efccb29f", + "uuid": "390727a2-b224-4968-84b6-1c7a5cd3c95d", "control-id": "cis_rhel10_7-1.7", "description": "No notes for control-id 7.1.7.", "props": [ @@ -12600,7 +12548,7 @@ ] }, { - "uuid": "48e0dbee-351d-431b-9561-11a1b9b524f1", + "uuid": "3db5445b-96c0-4171-ae3f-d4f54f28643e", "control-id": "cis_rhel10_7-1.8", "description": "No notes for control-id 7.1.8.", "props": [ @@ -12627,7 +12575,7 @@ ] }, { - "uuid": "d5b11c34-bae4-47a0-899e-892bb39ff0d5", + "uuid": "bd7ce5d9-df63-498d-89b7-88a060628c9a", "control-id": "cis_rhel10_7-1.9", "description": "No notes for control-id 7.1.9.", "props": [ @@ -12654,7 +12602,7 @@ ] }, { - "uuid": "bd71b350-9a3a-4dae-a4a8-d3eea35201d0", + "uuid": "c8080373-96df-4afb-9857-740fcc7f539f", "control-id": "cis_rhel10_7-1.10", "description": "No notes for control-id 7.1.10.", "props": [ @@ -12696,7 +12644,7 @@ ] }, { - "uuid": "85e8deb8-ff28-4ea1-8dd0-57696d5489e7", + "uuid": "8447a0c0-766b-4e76-9195-634b24c98904", "control-id": "cis_rhel10_7-1.11", "description": "No notes for control-id 7.1.11.", "props": [ @@ -12718,7 +12666,7 @@ ] }, { - "uuid": "e2e74905-baa2-4793-8686-5e428bcd456a", + "uuid": "24f44df1-86e0-40c1-bdfe-622b86529d4f", "control-id": "cis_rhel10_7-1.12", "description": "No notes for control-id 7.1.12.", "props": [ @@ -12740,7 +12688,7 @@ ] }, { - "uuid": "fe86c14f-5729-44eb-a7b0-86dfe2cbcb82", + "uuid": "a7753913-88bf-4fb2-b86f-7ece08898b8d", "control-id": "cis_rhel10_7-1.13", "description": "The description for control-id cis_rhel10_7-1.13.", "props": [ @@ -12753,7 +12701,7 @@ ] }, { - "uuid": "98d33782-46bb-419b-a2ab-7d62022ff4c1", + "uuid": "00fc0cc8-360c-436f-be4c-4a8c258ec45f", "control-id": "cis_rhel10_7-2.1", "description": "No notes for control-id 7.2.1.", "props": [ @@ -12770,7 +12718,7 @@ ] }, { - "uuid": "d4367f1b-3da1-453f-982c-fa583071e9c7", + "uuid": "37a6fdd0-815b-4e78-89d2-cbddde222c70", "control-id": "cis_rhel10_7-2.2", "description": "No notes for control-id 7.2.2.", "props": [ @@ -12787,7 +12735,7 @@ ] }, { - "uuid": "38550404-5ac7-42a8-a48f-851f98df59bd", + "uuid": "943b662b-9465-433b-815e-f300b62de40b", "control-id": "cis_rhel10_7-2.3", "description": "No notes for control-id 7.2.3.", "props": [ @@ -12804,7 +12752,7 @@ ] }, { - "uuid": "f183b126-3466-4492-b0e1-ca73f96eec13", + "uuid": "18d2d18d-3c89-48a9-bc9e-cf03bf1fc908", "control-id": "cis_rhel10_7-2.4", "description": "No notes for control-id 7.2.4.", "props": [ @@ -12821,7 +12769,7 @@ ] }, { - "uuid": "a6631a52-9e1d-4c75-ab1a-25f2c088af1c", + "uuid": "299cb9c5-8738-4612-b148-c5e984e2d33d", "control-id": "cis_rhel10_7-2.5", "description": "No notes for control-id 7.2.5.", "props": [ @@ -12838,7 +12786,7 @@ ] }, { - "uuid": "4ad7a4af-986d-4946-97e0-8041e2bbbd11", + "uuid": "3d4cd95a-0382-4bf1-8319-7a25d4d94155", "control-id": "cis_rhel10_7-2.6", "description": "No notes for control-id 7.2.6.", "props": [ @@ -12855,7 +12803,7 @@ ] }, { - "uuid": "a757e135-1f48-47e2-881e-184fc4e6fb2a", + "uuid": "52fc77d5-eea9-4eef-8a9b-7938d7fe8c80", "control-id": "cis_rhel10_7-2.7", "description": "No notes for control-id 7.2.7.", "props": [ @@ -12872,7 +12820,7 @@ ] }, { - "uuid": "a9aa9afd-3c97-4905-ad4d-b6b35b6ba4b2", + "uuid": "cc46c26e-f5b8-49f3-b3a6-0da77c05ce02", "control-id": "cis_rhel10_7-2.8", "description": "No notes for control-id 7.2.8.", "props": [ @@ -12899,7 +12847,7 @@ ] }, { - "uuid": "bc5ee524-8a45-4edf-b67a-cec9af299af0", + "uuid": "33f10f8c-4701-489d-b6c2-47c6b39ecbfd", "control-id": "cis_rhel10_7-2.9", "description": "No notes for control-id 7.2.9.", "props": [ @@ -14985,9607 +14933,9535 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_grub2_cfg", + "value": "file_permissions_boot_grub2", "remarks": "rule_set_034" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/grub.cfg Group Ownership", + "value": "All GRUB configuration files must have mode 0600 or more restrictive", "remarks": "rule_set_034" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_grub2_cfg", + "value": "file_permissions_boot_grub2", "remarks": "rule_set_034" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/grub.cfg Group Ownership", + "value": "All GRUB configuration files must have mode 0600 or more restrictive", "remarks": "rule_set_034" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_grub2_cfg", + "value": "file_owner_boot_grub2", "remarks": "rule_set_035" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/grub.cfg User Ownership", + "value": "All GRUB configuration files must be owned by root", "remarks": "rule_set_035" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_grub2_cfg", + "value": "file_owner_boot_grub2", "remarks": "rule_set_035" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/grub.cfg User Ownership", + "value": "All GRUB configuration files must be owned by root", "remarks": "rule_set_035" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_grub2_cfg", + "value": "file_groupowner_boot_grub2", "remarks": "rule_set_036" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/grub.cfg Permissions", + "value": "All GRUB configuration files must be group-owned by root", "remarks": "rule_set_036" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_grub2_cfg", + "value": "file_groupowner_boot_grub2", "remarks": "rule_set_036" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/grub.cfg Permissions", + "value": "All GRUB configuration files must be group-owned by root", "remarks": "rule_set_036" }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_user_cfg", - "remarks": "rule_set_037" - }, - { - "name": "Rule_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/user.cfg Group Ownership", - "remarks": "rule_set_037" - }, - { - "name": "Check_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_user_cfg", - "remarks": "rule_set_037" - }, - { - "name": "Check_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/user.cfg Group Ownership", - "remarks": "rule_set_037" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_user_cfg", - "remarks": "rule_set_038" - }, - { - "name": "Rule_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/user.cfg User Ownership", - "remarks": "rule_set_038" - }, - { - "name": "Check_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_user_cfg", - "remarks": "rule_set_038" - }, - { - "name": "Check_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/user.cfg User Ownership", - "remarks": "rule_set_038" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_user_cfg", - "remarks": "rule_set_039" - }, - { - "name": "Rule_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/user.cfg Permissions", - "remarks": "rule_set_039" - }, - { - "name": "Check_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_user_cfg", - "remarks": "rule_set_039" - }, - { - "name": "Check_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify /boot/grub2/user.cfg Permissions", - "remarks": "rule_set_039" - }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_users_coredumps", - "remarks": "rule_set_040" + "remarks": "rule_set_037" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Core Dumps for All Users", - "remarks": "rule_set_040" + "remarks": "rule_set_037" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_users_coredumps", - "remarks": "rule_set_040" + "remarks": "rule_set_037" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Core Dumps for All Users", - "remarks": "rule_set_040" + "remarks": "rule_set_037" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_hardlinks", - "remarks": "rule_set_041" + "remarks": "rule_set_038" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Hardlinks", - "remarks": "rule_set_041" + "remarks": "rule_set_038" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_hardlinks", - "remarks": "rule_set_041" + "remarks": "rule_set_038" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Hardlinks", - "remarks": "rule_set_041" + "remarks": "rule_set_038" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_suid_dumpable", - "remarks": "rule_set_042" + "remarks": "rule_set_039" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Core Dumps for SUID programs", - "remarks": "rule_set_042" + "remarks": "rule_set_039" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_suid_dumpable", - "remarks": "rule_set_042" + "remarks": "rule_set_039" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Core Dumps for SUID programs", - "remarks": "rule_set_042" + "remarks": "rule_set_039" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_dmesg_restrict", - "remarks": "rule_set_043" + "remarks": "rule_set_040" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Access to Kernel Message Buffer", - "remarks": "rule_set_043" + "remarks": "rule_set_040" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_dmesg_restrict", - "remarks": "rule_set_043" + "remarks": "rule_set_040" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Access to Kernel Message Buffer", - "remarks": "rule_set_043" + "remarks": "rule_set_040" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_kptr_restrict", - "remarks": "rule_set_044" + "remarks": "rule_set_041" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Exposed Kernel Pointer Addresses Access", - "remarks": "rule_set_044" + "remarks": "rule_set_041" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_kptr_restrict", - "remarks": "rule_set_044" + "remarks": "rule_set_041" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Exposed Kernel Pointer Addresses Access", - "remarks": "rule_set_044" + "remarks": "rule_set_041" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_yama_ptrace_scope", - "remarks": "rule_set_045" + "remarks": "rule_set_042" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict usage of ptrace to descendant processes", - "remarks": "rule_set_045" + "remarks": "rule_set_042" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_yama_ptrace_scope", - "remarks": "rule_set_045" + "remarks": "rule_set_042" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict usage of ptrace to descendant processes", - "remarks": "rule_set_045" + "remarks": "rule_set_042" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_randomize_va_space", - "remarks": "rule_set_046" + "remarks": "rule_set_043" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Randomized Layout of Virtual Address Space", - "remarks": "rule_set_046" + "remarks": "rule_set_043" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_randomize_va_space", - "remarks": "rule_set_046" + "remarks": "rule_set_043" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Randomized Layout of Virtual Address Space", - "remarks": "rule_set_046" + "remarks": "rule_set_043" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "coredump_disable_backtraces", - "remarks": "rule_set_047" + "remarks": "rule_set_044" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable core dump backtraces", - "remarks": "rule_set_047" + "remarks": "rule_set_044" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "coredump_disable_backtraces", - "remarks": "rule_set_047" + "remarks": "rule_set_044" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable core dump backtraces", - "remarks": "rule_set_047" + "remarks": "rule_set_044" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "coredump_disable_storage", - "remarks": "rule_set_048" + "remarks": "rule_set_045" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable storing core dump", - "remarks": "rule_set_048" + "remarks": "rule_set_045" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "coredump_disable_storage", - "remarks": "rule_set_048" + "remarks": "rule_set_045" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable storing core dump", - "remarks": "rule_set_048" + "remarks": "rule_set_045" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_custom_crypto_policy_cis", - "remarks": "rule_set_049" + "remarks": "rule_set_046" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Implement Custom Crypto Policy Modules for CIS Benchmark", - "remarks": "rule_set_049" + "remarks": "rule_set_046" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_custom_crypto_policy_cis", - "remarks": "rule_set_049" + "remarks": "rule_set_046" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Implement Custom Crypto Policy Modules for CIS Benchmark", - "remarks": "rule_set_049" + "remarks": "rule_set_046" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "banner_etc_motd_cis", - "remarks": "rule_set_050" + "remarks": "rule_set_047" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Message Of The Day Is Configured Properly", - "remarks": "rule_set_050" + "remarks": "rule_set_047" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "banner_etc_motd_cis", - "remarks": "rule_set_050" + "remarks": "rule_set_047" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Message Of The Day Is Configured Properly", - "remarks": "rule_set_050" + "remarks": "rule_set_047" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "banner_etc_issue_cis", - "remarks": "rule_set_051" + "remarks": "rule_set_048" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Local Login Warning Banner Is Configured Properly", - "remarks": "rule_set_051" + "remarks": "rule_set_048" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "banner_etc_issue_cis", - "remarks": "rule_set_051" + "remarks": "rule_set_048" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Local Login Warning Banner Is Configured Properly", - "remarks": "rule_set_051" + "remarks": "rule_set_048" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "banner_etc_issue_net_cis", - "remarks": "rule_set_052" + "remarks": "rule_set_049" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Remote Login Warning Banner Is Configured Properly", - "remarks": "rule_set_052" + "remarks": "rule_set_049" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "banner_etc_issue_net_cis", - "remarks": "rule_set_052" + "remarks": "rule_set_049" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Remote Login Warning Banner Is Configured Properly", - "remarks": "rule_set_052" + "remarks": "rule_set_049" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_motd", - "remarks": "rule_set_053" + "remarks": "rule_set_050" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership of Message of the Day Banner", - "remarks": "rule_set_053" + "remarks": "rule_set_050" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_motd", - "remarks": "rule_set_053" + "remarks": "rule_set_050" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership of Message of the Day Banner", - "remarks": "rule_set_053" + "remarks": "rule_set_050" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_motd", - "remarks": "rule_set_054" + "remarks": "rule_set_051" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify ownership of Message of the Day Banner", - "remarks": "rule_set_054" + "remarks": "rule_set_051" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_motd", - "remarks": "rule_set_054" + "remarks": "rule_set_051" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify ownership of Message of the Day Banner", - "remarks": "rule_set_054" + "remarks": "rule_set_051" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_motd", - "remarks": "rule_set_055" + "remarks": "rule_set_052" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify permissions on Message of the Day Banner", - "remarks": "rule_set_055" + "remarks": "rule_set_052" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_motd", - "remarks": "rule_set_055" + "remarks": "rule_set_052" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify permissions on Message of the Day Banner", - "remarks": "rule_set_055" + "remarks": "rule_set_052" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_issue", - "remarks": "rule_set_056" + "remarks": "rule_set_053" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership of System Login Banner", - "remarks": "rule_set_056" + "remarks": "rule_set_053" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_issue", - "remarks": "rule_set_056" + "remarks": "rule_set_053" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership of System Login Banner", - "remarks": "rule_set_056" + "remarks": "rule_set_053" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_issue", - "remarks": "rule_set_057" + "remarks": "rule_set_054" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify ownership of System Login Banner", - "remarks": "rule_set_057" + "remarks": "rule_set_054" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_issue", - "remarks": "rule_set_057" + "remarks": "rule_set_054" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify ownership of System Login Banner", - "remarks": "rule_set_057" + "remarks": "rule_set_054" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_issue", - "remarks": "rule_set_058" + "remarks": "rule_set_055" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify permissions on System Login Banner", - "remarks": "rule_set_058" + "remarks": "rule_set_055" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_issue", - "remarks": "rule_set_058" + "remarks": "rule_set_055" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify permissions on System Login Banner", - "remarks": "rule_set_058" + "remarks": "rule_set_055" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_issue_net", - "remarks": "rule_set_059" + "remarks": "rule_set_056" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership of System Login Banner for Remote Connections", - "remarks": "rule_set_059" + "remarks": "rule_set_056" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_issue_net", - "remarks": "rule_set_059" + "remarks": "rule_set_056" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership of System Login Banner for Remote Connections", - "remarks": "rule_set_059" + "remarks": "rule_set_056" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_issue_net", - "remarks": "rule_set_060" + "remarks": "rule_set_057" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify ownership of System Login Banner for Remote Connections", - "remarks": "rule_set_060" + "remarks": "rule_set_057" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_issue_net", - "remarks": "rule_set_060" + "remarks": "rule_set_057" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify ownership of System Login Banner for Remote Connections", - "remarks": "rule_set_060" + "remarks": "rule_set_057" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_issue_net", - "remarks": "rule_set_061" + "remarks": "rule_set_058" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify permissions on System Login Banner for Remote Connections", - "remarks": "rule_set_061" + "remarks": "rule_set_058" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_issue_net", - "remarks": "rule_set_061" + "remarks": "rule_set_058" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify permissions on System Login Banner for Remote Connections", - "remarks": "rule_set_061" + "remarks": "rule_set_058" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_banner_enabled", - "remarks": "rule_set_062" + "remarks": "rule_set_059" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable GNOME3 Login Warning Banner", - "remarks": "rule_set_062" + "remarks": "rule_set_059" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_banner_enabled", - "remarks": "rule_set_062" + "remarks": "rule_set_059" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable GNOME3 Login Warning Banner", - "remarks": "rule_set_062" + "remarks": "rule_set_059" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_login_banner_text", - "remarks": "rule_set_063" + "remarks": "rule_set_060" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set the GNOME3 Login Warning Banner Text", - "remarks": "rule_set_063" + "remarks": "rule_set_060" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_login_banner_text", - "remarks": "rule_set_063" + "remarks": "rule_set_060" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set the GNOME3 Login Warning Banner Text", - "remarks": "rule_set_063" + "remarks": "rule_set_060" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_user_list", - "remarks": "rule_set_064" + "remarks": "rule_set_061" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the GNOME3 Login User List", - "remarks": "rule_set_064" + "remarks": "rule_set_061" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_user_list", - "remarks": "rule_set_064" + "remarks": "rule_set_061" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the GNOME3 Login User List", - "remarks": "rule_set_064" + "remarks": "rule_set_061" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_idle_delay", - "remarks": "rule_set_065" + "remarks": "rule_set_062" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set GNOME3 Screensaver Inactivity Timeout", - "remarks": "rule_set_065" + "remarks": "rule_set_062" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_idle_delay", - "remarks": "rule_set_065" + "remarks": "rule_set_062" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set GNOME3 Screensaver Inactivity Timeout", - "remarks": "rule_set_065" + "remarks": "rule_set_062" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_lock_delay", - "remarks": "rule_set_066" + "remarks": "rule_set_063" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set GNOME3 Screensaver Lock Delay After Activation Period", - "remarks": "rule_set_066" + "remarks": "rule_set_063" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_lock_delay", - "remarks": "rule_set_066" + "remarks": "rule_set_063" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set GNOME3 Screensaver Lock Delay After Activation Period", - "remarks": "rule_set_066" + "remarks": "rule_set_063" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_session_idle_user_locks", - "remarks": "rule_set_067" + "remarks": "rule_set_064" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Cannot Change GNOME3 Session Idle Settings", - "remarks": "rule_set_067" + "remarks": "rule_set_064" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_session_idle_user_locks", - "remarks": "rule_set_067" + "remarks": "rule_set_064" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Cannot Change GNOME3 Session Idle Settings", - "remarks": "rule_set_067" + "remarks": "rule_set_064" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_user_locks", - "remarks": "rule_set_068" + "remarks": "rule_set_065" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Cannot Change GNOME3 Screensaver Settings", - "remarks": "rule_set_068" + "remarks": "rule_set_065" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_screensaver_user_locks", - "remarks": "rule_set_068" + "remarks": "rule_set_065" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Cannot Change GNOME3 Screensaver Settings", - "remarks": "rule_set_068" + "remarks": "rule_set_065" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_autorun", - "remarks": "rule_set_069" + "remarks": "rule_set_066" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automount running", - "remarks": "rule_set_069" + "remarks": "rule_set_066" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_autorun", - "remarks": "rule_set_069" + "remarks": "rule_set_066" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automount running", - "remarks": "rule_set_069" + "remarks": "rule_set_066" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_kea_removed", - "remarks": "rule_set_070" + "remarks": "rule_set_067" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall kea Package", - "remarks": "rule_set_070" + "remarks": "rule_set_067" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_kea_removed", - "remarks": "rule_set_070" + "remarks": "rule_set_067" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall kea Package", - "remarks": "rule_set_070" + "remarks": "rule_set_067" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_bind_removed", - "remarks": "rule_set_071" + "remarks": "rule_set_068" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall bind Package", - "remarks": "rule_set_071" + "remarks": "rule_set_068" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_bind_removed", - "remarks": "rule_set_071" + "remarks": "rule_set_068" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall bind Package", - "remarks": "rule_set_071" + "remarks": "rule_set_068" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_dnsmasq_removed", - "remarks": "rule_set_072" + "remarks": "rule_set_069" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall dnsmasq Package", - "remarks": "rule_set_072" + "remarks": "rule_set_069" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_dnsmasq_removed", - "remarks": "rule_set_072" + "remarks": "rule_set_069" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall dnsmasq Package", - "remarks": "rule_set_072" + "remarks": "rule_set_069" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_vsftpd_removed", - "remarks": "rule_set_073" + "remarks": "rule_set_070" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall vsftpd Package", - "remarks": "rule_set_073" + "remarks": "rule_set_070" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_vsftpd_removed", - "remarks": "rule_set_073" + "remarks": "rule_set_070" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall vsftpd Package", - "remarks": "rule_set_073" + "remarks": "rule_set_070" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_dovecot_removed", - "remarks": "rule_set_074" + "remarks": "rule_set_071" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall dovecot Package", - "remarks": "rule_set_074" + "remarks": "rule_set_071" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_dovecot_removed", - "remarks": "rule_set_074" + "remarks": "rule_set_071" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall dovecot Package", - "remarks": "rule_set_074" + "remarks": "rule_set_071" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_cyrus-imapd_removed", - "remarks": "rule_set_075" + "remarks": "rule_set_072" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall cyrus-imapd Package", - "remarks": "rule_set_075" + "remarks": "rule_set_072" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_cyrus-imapd_removed", - "remarks": "rule_set_075" + "remarks": "rule_set_072" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall cyrus-imapd Package", - "remarks": "rule_set_075" + "remarks": "rule_set_072" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_nfs_disabled", - "remarks": "rule_set_076" + "remarks": "rule_set_073" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Network File System (nfs)", - "remarks": "rule_set_076" + "remarks": "rule_set_073" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_nfs_disabled", - "remarks": "rule_set_076" + "remarks": "rule_set_073" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Network File System (nfs)", - "remarks": "rule_set_076" + "remarks": "rule_set_073" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_rpcbind_disabled", - "remarks": "rule_set_077" + "remarks": "rule_set_074" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable rpcbind Service", - "remarks": "rule_set_077" + "remarks": "rule_set_074" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_rpcbind_disabled", - "remarks": "rule_set_077" + "remarks": "rule_set_074" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable rpcbind Service", - "remarks": "rule_set_077" + "remarks": "rule_set_074" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_rsync_removed", - "remarks": "rule_set_078" + "remarks": "rule_set_075" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall rsync Package", - "remarks": "rule_set_078" + "remarks": "rule_set_075" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_rsync_removed", - "remarks": "rule_set_078" + "remarks": "rule_set_075" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall rsync Package", - "remarks": "rule_set_078" + "remarks": "rule_set_075" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_samba_removed", - "remarks": "rule_set_079" + "remarks": "rule_set_076" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall Samba Package", - "remarks": "rule_set_079" + "remarks": "rule_set_076" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_samba_removed", - "remarks": "rule_set_079" + "remarks": "rule_set_076" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall Samba Package", - "remarks": "rule_set_079" + "remarks": "rule_set_076" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_net-snmp_removed", - "remarks": "rule_set_080" + "remarks": "rule_set_077" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall net-snmp Package", - "remarks": "rule_set_080" + "remarks": "rule_set_077" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_net-snmp_removed", - "remarks": "rule_set_080" + "remarks": "rule_set_077" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall net-snmp Package", - "remarks": "rule_set_080" + "remarks": "rule_set_077" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_telnet-server_removed", - "remarks": "rule_set_081" + "remarks": "rule_set_078" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall telnet-server Package", - "remarks": "rule_set_081" + "remarks": "rule_set_078" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_telnet-server_removed", - "remarks": "rule_set_081" + "remarks": "rule_set_078" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall telnet-server Package", - "remarks": "rule_set_081" + "remarks": "rule_set_078" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_tftp-server_removed", - "remarks": "rule_set_082" + "remarks": "rule_set_079" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall tftp-server Package", - "remarks": "rule_set_082" + "remarks": "rule_set_079" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_tftp-server_removed", - "remarks": "rule_set_082" + "remarks": "rule_set_079" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall tftp-server Package", - "remarks": "rule_set_082" + "remarks": "rule_set_079" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_squid_removed", - "remarks": "rule_set_083" + "remarks": "rule_set_080" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall squid Package", - "remarks": "rule_set_083" + "remarks": "rule_set_080" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_squid_removed", - "remarks": "rule_set_083" + "remarks": "rule_set_080" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall squid Package", - "remarks": "rule_set_083" + "remarks": "rule_set_080" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_httpd_removed", - "remarks": "rule_set_084" + "remarks": "rule_set_081" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall httpd Package", - "remarks": "rule_set_084" + "remarks": "rule_set_081" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_httpd_removed", - "remarks": "rule_set_084" + "remarks": "rule_set_081" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall httpd Package", - "remarks": "rule_set_084" + "remarks": "rule_set_081" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_nginx_removed", - "remarks": "rule_set_085" + "remarks": "rule_set_082" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall nginx Package", - "remarks": "rule_set_085" + "remarks": "rule_set_082" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_nginx_removed", - "remarks": "rule_set_085" + "remarks": "rule_set_082" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall nginx Package", - "remarks": "rule_set_085" + "remarks": "rule_set_082" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "postfix_network_listening_disabled", - "remarks": "rule_set_086" + "remarks": "rule_set_083" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Postfix Network Listening", - "remarks": "rule_set_086" + "remarks": "rule_set_083" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "postfix_network_listening_disabled", - "remarks": "rule_set_086" + "remarks": "rule_set_083" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Postfix Network Listening", - "remarks": "rule_set_086" + "remarks": "rule_set_083" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "has_nonlocal_mta", - "remarks": "rule_set_087" + "remarks": "rule_set_084" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Mail Transfer Agent is not Listening on any non-loopback Address", - "remarks": "rule_set_087" + "remarks": "rule_set_084" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "has_nonlocal_mta", - "remarks": "rule_set_087" + "remarks": "rule_set_084" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Mail Transfer Agent is not Listening on any non-loopback Address", - "remarks": "rule_set_087" + "remarks": "rule_set_084" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_ftp_removed", - "remarks": "rule_set_088" + "remarks": "rule_set_085" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove ftp Package", - "remarks": "rule_set_088" + "remarks": "rule_set_085" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_ftp_removed", - "remarks": "rule_set_088" + "remarks": "rule_set_085" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove ftp Package", - "remarks": "rule_set_088" + "remarks": "rule_set_085" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_telnet_removed", - "remarks": "rule_set_089" + "remarks": "rule_set_086" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove telnet Clients", - "remarks": "rule_set_089" + "remarks": "rule_set_086" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_telnet_removed", - "remarks": "rule_set_089" + "remarks": "rule_set_086" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove telnet Clients", - "remarks": "rule_set_089" + "remarks": "rule_set_086" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_tftp_removed", - "remarks": "rule_set_090" + "remarks": "rule_set_087" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove tftp Daemon", - "remarks": "rule_set_090" + "remarks": "rule_set_087" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_tftp_removed", - "remarks": "rule_set_090" + "remarks": "rule_set_087" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove tftp Daemon", - "remarks": "rule_set_090" + "remarks": "rule_set_087" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_specify_remote_server", - "remarks": "rule_set_091" + "remarks": "rule_set_088" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "A remote time server for Chrony is configured", - "remarks": "rule_set_091" + "remarks": "rule_set_088" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_specify_remote_server", - "remarks": "rule_set_091" + "remarks": "rule_set_088" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "A remote time server for Chrony is configured", - "remarks": "rule_set_091" + "remarks": "rule_set_088" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_run_as_chrony_user", - "remarks": "rule_set_092" + "remarks": "rule_set_089" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that chronyd is running under chrony user account", - "remarks": "rule_set_092" + "remarks": "rule_set_089" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_run_as_chrony_user", - "remarks": "rule_set_092" + "remarks": "rule_set_089" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that chronyd is running under chrony user account", - "remarks": "rule_set_092" + "remarks": "rule_set_089" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_cron_installed", - "remarks": "rule_set_093" + "remarks": "rule_set_090" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install the cron service", - "remarks": "rule_set_093" + "remarks": "rule_set_090" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_cron_installed", - "remarks": "rule_set_093" + "remarks": "rule_set_090" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install the cron service", - "remarks": "rule_set_093" + "remarks": "rule_set_090" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_crond_enabled", - "remarks": "rule_set_094" + "remarks": "rule_set_091" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable cron Service", - "remarks": "rule_set_094" + "remarks": "rule_set_091" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_crond_enabled", - "remarks": "rule_set_094" + "remarks": "rule_set_091" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable cron Service", - "remarks": "rule_set_094" + "remarks": "rule_set_091" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_crontab", - "remarks": "rule_set_095" + "remarks": "rule_set_092" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Crontab", - "remarks": "rule_set_095" + "remarks": "rule_set_092" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_crontab", - "remarks": "rule_set_095" + "remarks": "rule_set_092" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Crontab", - "remarks": "rule_set_095" + "remarks": "rule_set_092" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_crontab", - "remarks": "rule_set_096" + "remarks": "rule_set_093" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on crontab", - "remarks": "rule_set_096" + "remarks": "rule_set_093" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_crontab", - "remarks": "rule_set_096" + "remarks": "rule_set_093" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on crontab", - "remarks": "rule_set_096" + "remarks": "rule_set_093" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_crontab", - "remarks": "rule_set_097" + "remarks": "rule_set_094" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on crontab", - "remarks": "rule_set_097" + "remarks": "rule_set_094" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_crontab", - "remarks": "rule_set_097" + "remarks": "rule_set_094" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on crontab", - "remarks": "rule_set_097" + "remarks": "rule_set_094" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_hourly", - "remarks": "rule_set_098" + "remarks": "rule_set_095" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.hourly", - "remarks": "rule_set_098" + "remarks": "rule_set_095" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_hourly", - "remarks": "rule_set_098" + "remarks": "rule_set_095" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.hourly", - "remarks": "rule_set_098" + "remarks": "rule_set_095" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_hourly", - "remarks": "rule_set_099" + "remarks": "rule_set_096" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.hourly", - "remarks": "rule_set_099" + "remarks": "rule_set_096" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_hourly", - "remarks": "rule_set_099" + "remarks": "rule_set_096" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.hourly", - "remarks": "rule_set_099" + "remarks": "rule_set_096" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_hourly", - "remarks": "rule_set_100" + "remarks": "rule_set_097" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.hourly", - "remarks": "rule_set_100" + "remarks": "rule_set_097" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_hourly", - "remarks": "rule_set_100" + "remarks": "rule_set_097" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.hourly", - "remarks": "rule_set_100" + "remarks": "rule_set_097" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_daily", - "remarks": "rule_set_101" + "remarks": "rule_set_098" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.daily", - "remarks": "rule_set_101" + "remarks": "rule_set_098" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_daily", - "remarks": "rule_set_101" + "remarks": "rule_set_098" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.daily", - "remarks": "rule_set_101" + "remarks": "rule_set_098" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_daily", - "remarks": "rule_set_102" + "remarks": "rule_set_099" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.daily", - "remarks": "rule_set_102" + "remarks": "rule_set_099" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_daily", - "remarks": "rule_set_102" + "remarks": "rule_set_099" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.daily", - "remarks": "rule_set_102" + "remarks": "rule_set_099" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_daily", - "remarks": "rule_set_103" + "remarks": "rule_set_100" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.daily", - "remarks": "rule_set_103" + "remarks": "rule_set_100" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_daily", - "remarks": "rule_set_103" + "remarks": "rule_set_100" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.daily", - "remarks": "rule_set_103" + "remarks": "rule_set_100" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_weekly", - "remarks": "rule_set_104" + "remarks": "rule_set_101" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.weekly", - "remarks": "rule_set_104" + "remarks": "rule_set_101" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_weekly", - "remarks": "rule_set_104" + "remarks": "rule_set_101" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.weekly", - "remarks": "rule_set_104" + "remarks": "rule_set_101" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_weekly", - "remarks": "rule_set_105" + "remarks": "rule_set_102" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.weekly", - "remarks": "rule_set_105" + "remarks": "rule_set_102" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_weekly", - "remarks": "rule_set_105" + "remarks": "rule_set_102" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.weekly", - "remarks": "rule_set_105" + "remarks": "rule_set_102" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_weekly", - "remarks": "rule_set_106" + "remarks": "rule_set_103" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.weekly", - "remarks": "rule_set_106" + "remarks": "rule_set_103" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_weekly", - "remarks": "rule_set_106" + "remarks": "rule_set_103" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.weekly", - "remarks": "rule_set_106" + "remarks": "rule_set_103" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_monthly", - "remarks": "rule_set_107" + "remarks": "rule_set_104" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.monthly", - "remarks": "rule_set_107" + "remarks": "rule_set_104" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_monthly", - "remarks": "rule_set_107" + "remarks": "rule_set_104" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.monthly", - "remarks": "rule_set_107" + "remarks": "rule_set_104" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_monthly", - "remarks": "rule_set_108" + "remarks": "rule_set_105" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.monthly", - "remarks": "rule_set_108" + "remarks": "rule_set_105" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_monthly", - "remarks": "rule_set_108" + "remarks": "rule_set_105" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.monthly", - "remarks": "rule_set_108" + "remarks": "rule_set_105" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_monthly", - "remarks": "rule_set_109" + "remarks": "rule_set_106" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.monthly", - "remarks": "rule_set_109" + "remarks": "rule_set_106" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_monthly", - "remarks": "rule_set_109" + "remarks": "rule_set_106" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.monthly", - "remarks": "rule_set_109" + "remarks": "rule_set_106" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_yearly", - "remarks": "rule_set_110" + "remarks": "rule_set_107" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.yearly", - "remarks": "rule_set_110" + "remarks": "rule_set_107" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_yearly", - "remarks": "rule_set_110" + "remarks": "rule_set_107" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.yearly", - "remarks": "rule_set_110" + "remarks": "rule_set_107" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_yearly", - "remarks": "rule_set_111" + "remarks": "rule_set_108" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.yearly", - "remarks": "rule_set_111" + "remarks": "rule_set_108" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_yearly", - "remarks": "rule_set_111" + "remarks": "rule_set_108" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.yearly", - "remarks": "rule_set_111" + "remarks": "rule_set_108" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_yearly", - "remarks": "rule_set_112" + "remarks": "rule_set_109" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.yearly", - "remarks": "rule_set_112" + "remarks": "rule_set_109" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_yearly", - "remarks": "rule_set_112" + "remarks": "rule_set_109" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.yearly", - "remarks": "rule_set_112" + "remarks": "rule_set_109" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_d", - "remarks": "rule_set_113" + "remarks": "rule_set_110" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.d", - "remarks": "rule_set_113" + "remarks": "rule_set_110" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_d", - "remarks": "rule_set_113" + "remarks": "rule_set_110" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns cron.d", - "remarks": "rule_set_113" + "remarks": "rule_set_110" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_d", - "remarks": "rule_set_114" + "remarks": "rule_set_111" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.d", - "remarks": "rule_set_114" + "remarks": "rule_set_111" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_d", - "remarks": "rule_set_114" + "remarks": "rule_set_111" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on cron.d", - "remarks": "rule_set_114" + "remarks": "rule_set_111" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_d", - "remarks": "rule_set_115" + "remarks": "rule_set_112" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.d", - "remarks": "rule_set_115" + "remarks": "rule_set_112" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_d", - "remarks": "rule_set_115" + "remarks": "rule_set_112" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on cron.d", - "remarks": "rule_set_115" + "remarks": "rule_set_112" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_cron_deny_not_exist", - "remarks": "rule_set_116" + "remarks": "rule_set_113" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/cron.deny does not exist", - "remarks": "rule_set_116" + "remarks": "rule_set_113" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_cron_deny_not_exist", - "remarks": "rule_set_116" + "remarks": "rule_set_113" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/cron.deny does not exist", - "remarks": "rule_set_116" + "remarks": "rule_set_113" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_cron_allow_exists", - "remarks": "rule_set_117" + "remarks": "rule_set_114" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/cron.allow exists", - "remarks": "rule_set_117" + "remarks": "rule_set_114" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_cron_allow_exists", - "remarks": "rule_set_117" + "remarks": "rule_set_114" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/cron.allow exists", - "remarks": "rule_set_117" + "remarks": "rule_set_114" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_allow", - "remarks": "rule_set_118" + "remarks": "rule_set_115" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/cron.allow file", - "remarks": "rule_set_118" + "remarks": "rule_set_115" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_cron_allow", - "remarks": "rule_set_118" + "remarks": "rule_set_115" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/cron.allow file", - "remarks": "rule_set_118" + "remarks": "rule_set_115" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_allow", - "remarks": "rule_set_119" + "remarks": "rule_set_116" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/cron.allow file", - "remarks": "rule_set_119" + "remarks": "rule_set_116" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_cron_allow", - "remarks": "rule_set_119" + "remarks": "rule_set_116" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/cron.allow file", - "remarks": "rule_set_119" + "remarks": "rule_set_116" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_allow", - "remarks": "rule_set_120" + "remarks": "rule_set_117" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/cron.allow file", - "remarks": "rule_set_120" + "remarks": "rule_set_117" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_cron_allow", - "remarks": "rule_set_120" + "remarks": "rule_set_117" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/cron.allow file", - "remarks": "rule_set_120" + "remarks": "rule_set_117" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_at_deny_not_exist", - "remarks": "rule_set_121" + "remarks": "rule_set_118" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/at.deny does not exist", - "remarks": "rule_set_121" + "remarks": "rule_set_118" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_at_deny_not_exist", - "remarks": "rule_set_121" + "remarks": "rule_set_118" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/at.deny does not exist", - "remarks": "rule_set_121" + "remarks": "rule_set_118" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_at_allow_exists", - "remarks": "rule_set_122" + "remarks": "rule_set_119" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/at.allow exists", - "remarks": "rule_set_122" + "remarks": "rule_set_119" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_at_allow_exists", - "remarks": "rule_set_122" + "remarks": "rule_set_119" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that /etc/at.allow exists", - "remarks": "rule_set_122" + "remarks": "rule_set_119" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_at_allow", - "remarks": "rule_set_123" + "remarks": "rule_set_120" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/at.allow file", - "remarks": "rule_set_123" + "remarks": "rule_set_120" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_at_allow", - "remarks": "rule_set_123" + "remarks": "rule_set_120" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/at.allow file", - "remarks": "rule_set_123" + "remarks": "rule_set_120" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_at_allow", - "remarks": "rule_set_124" + "remarks": "rule_set_121" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/at.allow file", - "remarks": "rule_set_124" + "remarks": "rule_set_121" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_at_allow", - "remarks": "rule_set_124" + "remarks": "rule_set_121" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/at.allow file", - "remarks": "rule_set_124" + "remarks": "rule_set_121" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_at_allow", - "remarks": "rule_set_125" + "remarks": "rule_set_122" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/at.allow file", - "remarks": "rule_set_125" + "remarks": "rule_set_122" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_at_allow", - "remarks": "rule_set_125" + "remarks": "rule_set_122" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/at.allow file", - "remarks": "rule_set_125" + "remarks": "rule_set_122" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_atm_disabled", - "remarks": "rule_set_126" + "remarks": "rule_set_123" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable ATM Support", - "remarks": "rule_set_126" + "remarks": "rule_set_123" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_atm_disabled", - "remarks": "rule_set_126" + "remarks": "rule_set_123" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable ATM Support", - "remarks": "rule_set_126" + "remarks": "rule_set_123" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_can_disabled", - "remarks": "rule_set_127" + "remarks": "rule_set_124" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable CAN Support", - "remarks": "rule_set_127" + "remarks": "rule_set_124" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_can_disabled", - "remarks": "rule_set_127" + "remarks": "rule_set_124" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable CAN Support", - "remarks": "rule_set_127" + "remarks": "rule_set_124" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_dccp_disabled", - "remarks": "rule_set_128" + "remarks": "rule_set_125" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable DCCP Support", - "remarks": "rule_set_128" + "remarks": "rule_set_125" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_dccp_disabled", - "remarks": "rule_set_128" + "remarks": "rule_set_125" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable DCCP Support", - "remarks": "rule_set_128" + "remarks": "rule_set_125" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_tipc_disabled", - "remarks": "rule_set_129" + "remarks": "rule_set_126" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable TIPC Support", - "remarks": "rule_set_129" + "remarks": "rule_set_126" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_tipc_disabled", - "remarks": "rule_set_129" + "remarks": "rule_set_126" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable TIPC Support", - "remarks": "rule_set_129" + "remarks": "rule_set_126" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_rds_disabled", - "remarks": "rule_set_130" + "remarks": "rule_set_127" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable RDS Support", - "remarks": "rule_set_130" + "remarks": "rule_set_127" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_rds_disabled", - "remarks": "rule_set_130" + "remarks": "rule_set_127" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable RDS Support", - "remarks": "rule_set_130" + "remarks": "rule_set_127" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_sctp_disabled", - "remarks": "rule_set_131" + "remarks": "rule_set_128" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SCTP Support", - "remarks": "rule_set_131" + "remarks": "rule_set_128" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_sctp_disabled", - "remarks": "rule_set_131" + "remarks": "rule_set_128" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SCTP Support", - "remarks": "rule_set_131" + "remarks": "rule_set_128" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_ip_forward", - "remarks": "rule_set_132" + "remarks": "rule_set_129" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IP Forwarding on IPv4 Interfaces", - "remarks": "rule_set_132" + "remarks": "rule_set_129" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_ip_forward", - "remarks": "rule_set_132" + "remarks": "rule_set_129" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IP Forwarding on IPv4 Interfaces", - "remarks": "rule_set_132" + "remarks": "rule_set_129" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_forwarding", - "remarks": "rule_set_133" + "remarks": "rule_set_130" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv4 Forwarding on all IPv4 Interfaces", - "remarks": "rule_set_133" + "remarks": "rule_set_130" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_forwarding", - "remarks": "rule_set_133" + "remarks": "rule_set_130" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv4 Forwarding on all IPv4 Interfaces", - "remarks": "rule_set_133" + "remarks": "rule_set_130" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_forwarding", - "remarks": "rule_set_134" + "remarks": "rule_set_131" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv4 Forwarding By Default", - "remarks": "rule_set_134" + "remarks": "rule_set_131" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_forwarding", - "remarks": "rule_set_134" + "remarks": "rule_set_131" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv4 Forwarding By Default", - "remarks": "rule_set_134" + "remarks": "rule_set_131" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_send_redirects", - "remarks": "rule_set_135" + "remarks": "rule_set_132" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_135" + "remarks": "rule_set_132" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_send_redirects", - "remarks": "rule_set_135" + "remarks": "rule_set_132" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_135" + "remarks": "rule_set_132" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_send_redirects", - "remarks": "rule_set_136" + "remarks": "rule_set_133" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces by Default", - "remarks": "rule_set_136" + "remarks": "rule_set_133" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_send_redirects", - "remarks": "rule_set_136" + "remarks": "rule_set_133" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces by Default", - "remarks": "rule_set_136" + "remarks": "rule_set_133" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses", - "remarks": "rule_set_137" + "remarks": "rule_set_134" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Ignore Bogus ICMP Error Responses on IPv4 Interfaces", - "remarks": "rule_set_137" + "remarks": "rule_set_134" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses", - "remarks": "rule_set_137" + "remarks": "rule_set_134" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Ignore Bogus ICMP Error Responses on IPv4 Interfaces", - "remarks": "rule_set_137" + "remarks": "rule_set_134" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_icmp_echo_ignore_broadcasts", - "remarks": "rule_set_138" + "remarks": "rule_set_135" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Ignore ICMP Broadcast Echo Requests on IPv4 Interfaces", - "remarks": "rule_set_138" + "remarks": "rule_set_135" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_icmp_echo_ignore_broadcasts", - "remarks": "rule_set_138" + "remarks": "rule_set_135" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Ignore ICMP Broadcast Echo Requests on IPv4 Interfaces", - "remarks": "rule_set_138" + "remarks": "rule_set_135" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_redirects", - "remarks": "rule_set_139" + "remarks": "rule_set_136" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv4 Interfaces", - "remarks": "rule_set_139" + "remarks": "rule_set_136" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_redirects", - "remarks": "rule_set_139" + "remarks": "rule_set_136" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv4 Interfaces", - "remarks": "rule_set_139" + "remarks": "rule_set_136" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_redirects", - "remarks": "rule_set_140" + "remarks": "rule_set_137" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv4 Interfaces", - "remarks": "rule_set_140" + "remarks": "rule_set_137" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_redirects", - "remarks": "rule_set_140" + "remarks": "rule_set_137" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv4 Interfaces", - "remarks": "rule_set_140" + "remarks": "rule_set_137" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_secure_redirects", - "remarks": "rule_set_141" + "remarks": "rule_set_138" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Secure ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_141" + "remarks": "rule_set_138" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_secure_redirects", - "remarks": "rule_set_141" + "remarks": "rule_set_138" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Secure ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_141" + "remarks": "rule_set_138" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_secure_redirects", - "remarks": "rule_set_142" + "remarks": "rule_set_139" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Kernel Parameter for Accepting Secure Redirects By Default", - "remarks": "rule_set_142" + "remarks": "rule_set_139" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_secure_redirects", - "remarks": "rule_set_142" + "remarks": "rule_set_139" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Kernel Parameter for Accepting Secure Redirects By Default", - "remarks": "rule_set_142" + "remarks": "rule_set_139" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_rp_filter", - "remarks": "rule_set_143" + "remarks": "rule_set_140" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces", - "remarks": "rule_set_143" + "remarks": "rule_set_140" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_rp_filter", - "remarks": "rule_set_143" + "remarks": "rule_set_140" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces", - "remarks": "rule_set_143" + "remarks": "rule_set_140" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_rp_filter", - "remarks": "rule_set_144" + "remarks": "rule_set_141" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces by Default", - "remarks": "rule_set_144" + "remarks": "rule_set_141" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_rp_filter", - "remarks": "rule_set_144" + "remarks": "rule_set_141" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces by Default", - "remarks": "rule_set_144" + "remarks": "rule_set_141" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_source_route", - "remarks": "rule_set_145" + "remarks": "rule_set_142" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces", - "remarks": "rule_set_145" + "remarks": "rule_set_142" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_source_route", - "remarks": "rule_set_145" + "remarks": "rule_set_142" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces", - "remarks": "rule_set_145" + "remarks": "rule_set_142" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_source_route", - "remarks": "rule_set_146" + "remarks": "rule_set_143" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv4 Interfaces by Default", - "remarks": "rule_set_146" + "remarks": "rule_set_143" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_source_route", - "remarks": "rule_set_146" + "remarks": "rule_set_143" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv4 Interfaces by Default", - "remarks": "rule_set_146" + "remarks": "rule_set_143" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_log_martians", - "remarks": "rule_set_147" + "remarks": "rule_set_144" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces", - "remarks": "rule_set_147" + "remarks": "rule_set_144" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_log_martians", - "remarks": "rule_set_147" + "remarks": "rule_set_144" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces", - "remarks": "rule_set_147" + "remarks": "rule_set_144" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_log_martians", - "remarks": "rule_set_148" + "remarks": "rule_set_145" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces by Default", - "remarks": "rule_set_148" + "remarks": "rule_set_145" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_log_martians", - "remarks": "rule_set_148" + "remarks": "rule_set_145" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Log Martian Packets on all IPv4 Interfaces by Default", - "remarks": "rule_set_148" + "remarks": "rule_set_145" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_tcp_syncookies", - "remarks": "rule_set_149" + "remarks": "rule_set_146" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use TCP Syncookies on Network Interfaces", - "remarks": "rule_set_149" + "remarks": "rule_set_146" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_tcp_syncookies", - "remarks": "rule_set_149" + "remarks": "rule_set_146" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use TCP Syncookies on Network Interfaces", - "remarks": "rule_set_149" + "remarks": "rule_set_146" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_forwarding", - "remarks": "rule_set_150" + "remarks": "rule_set_147" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv6 Forwarding", - "remarks": "rule_set_150" + "remarks": "rule_set_147" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_forwarding", - "remarks": "rule_set_150" + "remarks": "rule_set_147" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv6 Forwarding", - "remarks": "rule_set_150" + "remarks": "rule_set_147" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_forwarding", - "remarks": "rule_set_151" + "remarks": "rule_set_148" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv6 Forwarding by default", - "remarks": "rule_set_151" + "remarks": "rule_set_148" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_forwarding", - "remarks": "rule_set_151" + "remarks": "rule_set_148" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IPv6 Forwarding by default", - "remarks": "rule_set_151" + "remarks": "rule_set_148" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_redirects", - "remarks": "rule_set_152" + "remarks": "rule_set_149" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv6 Interfaces", - "remarks": "rule_set_152" + "remarks": "rule_set_149" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_redirects", - "remarks": "rule_set_152" + "remarks": "rule_set_149" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv6 Interfaces", - "remarks": "rule_set_152" + "remarks": "rule_set_149" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_redirects", - "remarks": "rule_set_153" + "remarks": "rule_set_150" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv6 Interfaces", - "remarks": "rule_set_153" + "remarks": "rule_set_150" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_redirects", - "remarks": "rule_set_153" + "remarks": "rule_set_150" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv6 Interfaces", - "remarks": "rule_set_153" + "remarks": "rule_set_150" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_source_route", - "remarks": "rule_set_154" + "remarks": "rule_set_151" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv6 Interfaces", - "remarks": "rule_set_154" + "remarks": "rule_set_151" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_source_route", - "remarks": "rule_set_154" + "remarks": "rule_set_151" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv6 Interfaces", - "remarks": "rule_set_154" + "remarks": "rule_set_151" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_source_route", - "remarks": "rule_set_155" + "remarks": "rule_set_152" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv6 Interfaces by Default", - "remarks": "rule_set_155" + "remarks": "rule_set_152" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_source_route", - "remarks": "rule_set_155" + "remarks": "rule_set_152" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv6 Interfaces by Default", - "remarks": "rule_set_155" + "remarks": "rule_set_152" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_ra", - "remarks": "rule_set_156" + "remarks": "rule_set_153" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Router Advertisements on All IPv6 Interfaces", - "remarks": "rule_set_156" + "remarks": "rule_set_153" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_ra", - "remarks": "rule_set_156" + "remarks": "rule_set_153" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Router Advertisements on All IPv6 Interfaces", - "remarks": "rule_set_156" + "remarks": "rule_set_153" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_ra", - "remarks": "rule_set_157" + "remarks": "rule_set_154" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting Router Advertisements on all IPv6 Interfaces by Default", - "remarks": "rule_set_157" + "remarks": "rule_set_154" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_ra", - "remarks": "rule_set_157" + "remarks": "rule_set_154" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting Router Advertisements on all IPv6 Interfaces by Default", - "remarks": "rule_set_157" + "remarks": "rule_set_154" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_firewalld_installed", - "remarks": "rule_set_158" + "remarks": "rule_set_155" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install firewalld Package", - "remarks": "rule_set_158" + "remarks": "rule_set_155" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_firewalld_installed", - "remarks": "rule_set_158" + "remarks": "rule_set_155" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install firewalld Package", - "remarks": "rule_set_158" + "remarks": "rule_set_155" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "firewalld-backend", - "remarks": "rule_set_159" + "remarks": "rule_set_156" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Firewalld to Use the Nftables Backend", - "remarks": "rule_set_159" + "remarks": "rule_set_156" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "firewalld-backend", - "remarks": "rule_set_159" + "remarks": "rule_set_156" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Firewalld to Use the Nftables Backend", - "remarks": "rule_set_159" + "remarks": "rule_set_156" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_firewalld_enabled", - "remarks": "rule_set_160" + "remarks": "rule_set_157" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify firewalld Enabled", - "remarks": "rule_set_160" + "remarks": "rule_set_157" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_firewalld_enabled", - "remarks": "rule_set_160" + "remarks": "rule_set_157" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify firewalld Enabled", - "remarks": "rule_set_160" + "remarks": "rule_set_157" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "firewalld_loopback_traffic_trusted", - "remarks": "rule_set_161" + "remarks": "rule_set_158" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Firewalld to Trust Loopback Traffic", - "remarks": "rule_set_161" + "remarks": "rule_set_158" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "firewalld_loopback_traffic_trusted", - "remarks": "rule_set_161" + "remarks": "rule_set_158" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Firewalld to Trust Loopback Traffic", - "remarks": "rule_set_161" + "remarks": "rule_set_158" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_config", - "remarks": "rule_set_162" + "remarks": "rule_set_159" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server config file", - "remarks": "rule_set_162" + "remarks": "rule_set_159" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_config", - "remarks": "rule_set_162" + "remarks": "rule_set_159" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server config file", - "remarks": "rule_set_162" + "remarks": "rule_set_159" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_config", - "remarks": "rule_set_163" + "remarks": "rule_set_160" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server config file", - "remarks": "rule_set_163" + "remarks": "rule_set_160" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_config", - "remarks": "rule_set_163" + "remarks": "rule_set_160" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server config file", - "remarks": "rule_set_163" + "remarks": "rule_set_160" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_config", - "remarks": "rule_set_164" + "remarks": "rule_set_161" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server config file", - "remarks": "rule_set_164" + "remarks": "rule_set_161" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_config", - "remarks": "rule_set_164" + "remarks": "rule_set_161" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server config file", - "remarks": "rule_set_164" + "remarks": "rule_set_161" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_sshd_config_d", - "remarks": "rule_set_165" + "remarks": "rule_set_162" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Config File", - "remarks": "rule_set_165" + "remarks": "rule_set_162" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_sshd_config_d", - "remarks": "rule_set_165" + "remarks": "rule_set_162" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Config File", - "remarks": "rule_set_165" + "remarks": "rule_set_162" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_drop_in_config", - "remarks": "rule_set_166" + "remarks": "rule_set_163" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Config File", - "remarks": "rule_set_166" + "remarks": "rule_set_163" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_drop_in_config", - "remarks": "rule_set_166" + "remarks": "rule_set_163" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Config File", - "remarks": "rule_set_166" + "remarks": "rule_set_163" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_sshd_config_d", - "remarks": "rule_set_167" + "remarks": "rule_set_164" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server Configuration Files", - "remarks": "rule_set_167" + "remarks": "rule_set_164" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_sshd_config_d", - "remarks": "rule_set_167" + "remarks": "rule_set_164" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server Configuration Files", - "remarks": "rule_set_167" + "remarks": "rule_set_164" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_sshd_config_d", - "remarks": "rule_set_168" + "remarks": "rule_set_165" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server Configuration Files", - "remarks": "rule_set_168" + "remarks": "rule_set_165" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_sshd_config_d", - "remarks": "rule_set_168" + "remarks": "rule_set_165" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server Configuration Files", - "remarks": "rule_set_168" + "remarks": "rule_set_165" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_drop_in_config", - "remarks": "rule_set_169" + "remarks": "rule_set_166" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server Configuration Files", - "remarks": "rule_set_169" + "remarks": "rule_set_166" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_drop_in_config", - "remarks": "rule_set_169" + "remarks": "rule_set_166" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server Configuration Files", - "remarks": "rule_set_169" + "remarks": "rule_set_166" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_drop_in_config", - "remarks": "rule_set_170" + "remarks": "rule_set_167" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server Configuration Files", - "remarks": "rule_set_170" + "remarks": "rule_set_167" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_drop_in_config", - "remarks": "rule_set_170" + "remarks": "rule_set_167" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server Configuration Files", - "remarks": "rule_set_170" + "remarks": "rule_set_167" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_private_key", - "remarks": "rule_set_171" + "remarks": "rule_set_168" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_171" + "remarks": "rule_set_168" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_private_key", - "remarks": "rule_set_171" + "remarks": "rule_set_168" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_171" + "remarks": "rule_set_168" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_private_key", - "remarks": "rule_set_172" + "remarks": "rule_set_169" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_172" + "remarks": "rule_set_169" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_private_key", - "remarks": "rule_set_172" + "remarks": "rule_set_169" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_172" + "remarks": "rule_set_169" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_private_key", - "remarks": "rule_set_173" + "remarks": "rule_set_170" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Private *_key Key Files", - "remarks": "rule_set_173" + "remarks": "rule_set_170" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_private_key", - "remarks": "rule_set_173" + "remarks": "rule_set_170" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Private *_key Key Files", - "remarks": "rule_set_173" + "remarks": "rule_set_170" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_pub_key", - "remarks": "rule_set_174" + "remarks": "rule_set_171" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_174" + "remarks": "rule_set_171" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_pub_key", - "remarks": "rule_set_174" + "remarks": "rule_set_171" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_174" + "remarks": "rule_set_171" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_pub_key", - "remarks": "rule_set_175" + "remarks": "rule_set_172" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_175" + "remarks": "rule_set_172" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_pub_key", - "remarks": "rule_set_175" + "remarks": "rule_set_172" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_175" + "remarks": "rule_set_172" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_pub_key", - "remarks": "rule_set_176" + "remarks": "rule_set_173" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Public *.pub Key Files", - "remarks": "rule_set_176" + "remarks": "rule_set_173" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_pub_key", - "remarks": "rule_set_176" + "remarks": "rule_set_173" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Public *.pub Key Files", - "remarks": "rule_set_176" + "remarks": "rule_set_173" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_limit_user_access", - "remarks": "rule_set_177" + "remarks": "rule_set_174" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Users' SSH Access", - "remarks": "rule_set_177" + "remarks": "rule_set_174" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_limit_user_access", - "remarks": "rule_set_177" + "remarks": "rule_set_174" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Users' SSH Access", - "remarks": "rule_set_177" + "remarks": "rule_set_174" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_warning_banner_net", - "remarks": "rule_set_178" + "remarks": "rule_set_175" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable SSH Warning Banner", - "remarks": "rule_set_178" + "remarks": "rule_set_175" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_warning_banner_net", - "remarks": "rule_set_178" + "remarks": "rule_set_175" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable SSH Warning Banner", - "remarks": "rule_set_178" + "remarks": "rule_set_175" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_idle_timeout", - "remarks": "rule_set_179" + "remarks": "rule_set_176" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Interval", - "remarks": "rule_set_179" + "remarks": "rule_set_176" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_idle_timeout", - "remarks": "rule_set_179" + "remarks": "rule_set_176" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Interval", - "remarks": "rule_set_179" + "remarks": "rule_set_176" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_keepalive", - "remarks": "rule_set_180" + "remarks": "rule_set_177" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Count Max", - "remarks": "rule_set_180" + "remarks": "rule_set_177" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_keepalive", - "remarks": "rule_set_180" + "remarks": "rule_set_177" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Client Alive Count Max", - "remarks": "rule_set_180" + "remarks": "rule_set_177" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_forwarding", - "remarks": "rule_set_181" + "remarks": "rule_set_178" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Forwarding", - "remarks": "rule_set_181" + "remarks": "rule_set_178" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_forwarding", - "remarks": "rule_set_181" + "remarks": "rule_set_178" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Forwarding", - "remarks": "rule_set_181" + "remarks": "rule_set_178" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_gssapi_auth", - "remarks": "rule_set_182" + "remarks": "rule_set_179" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GSSAPI Authentication", - "remarks": "rule_set_182" + "remarks": "rule_set_179" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_gssapi_auth", - "remarks": "rule_set_182" + "remarks": "rule_set_179" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GSSAPI Authentication", - "remarks": "rule_set_182" + "remarks": "rule_set_179" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_host_auth", - "remarks": "rule_set_183" + "remarks": "rule_set_180" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Host-Based Authentication", - "remarks": "rule_set_183" + "remarks": "rule_set_180" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_host_auth", - "remarks": "rule_set_183" + "remarks": "rule_set_180" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Host-Based Authentication", - "remarks": "rule_set_183" + "remarks": "rule_set_180" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_rhosts", - "remarks": "rule_set_184" + "remarks": "rule_set_181" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Support for .rhosts Files", - "remarks": "rule_set_184" + "remarks": "rule_set_181" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_rhosts", - "remarks": "rule_set_184" + "remarks": "rule_set_181" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Support for .rhosts Files", - "remarks": "rule_set_184" + "remarks": "rule_set_181" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_use_strong_kex", - "remarks": "rule_set_185" + "remarks": "rule_set_182" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Use Only Strong Key Exchange algorithms", - "remarks": "rule_set_185" + "remarks": "rule_set_182" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_use_strong_kex", - "remarks": "rule_set_185" + "remarks": "rule_set_182" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Use Only Strong Key Exchange algorithms", - "remarks": "rule_set_185" + "remarks": "rule_set_182" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_login_grace_time", - "remarks": "rule_set_186" + "remarks": "rule_set_183" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SSH LoginGraceTime is configured", - "remarks": "rule_set_186" + "remarks": "rule_set_183" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_login_grace_time", - "remarks": "rule_set_186" + "remarks": "rule_set_183" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SSH LoginGraceTime is configured", - "remarks": "rule_set_186" + "remarks": "rule_set_183" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_loglevel_verbose", - "remarks": "rule_set_187" + "remarks": "rule_set_184" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Daemon LogLevel to VERBOSE", - "remarks": "rule_set_187" + "remarks": "rule_set_184" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_loglevel_verbose", - "remarks": "rule_set_187" + "remarks": "rule_set_184" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH Daemon LogLevel to VERBOSE", - "remarks": "rule_set_187" + "remarks": "rule_set_184" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_auth_tries", - "remarks": "rule_set_188" + "remarks": "rule_set_185" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH authentication attempt limit", - "remarks": "rule_set_188" + "remarks": "rule_set_185" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_auth_tries", - "remarks": "rule_set_188" + "remarks": "rule_set_185" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH authentication attempt limit", - "remarks": "rule_set_188" + "remarks": "rule_set_185" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_maxstartups", - "remarks": "rule_set_189" + "remarks": "rule_set_186" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SSH MaxStartups is configured", - "remarks": "rule_set_189" + "remarks": "rule_set_186" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_maxstartups", - "remarks": "rule_set_189" + "remarks": "rule_set_186" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SSH MaxStartups is configured", - "remarks": "rule_set_189" + "remarks": "rule_set_186" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_sessions", - "remarks": "rule_set_190" + "remarks": "rule_set_187" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH MaxSessions limit", - "remarks": "rule_set_190" + "remarks": "rule_set_187" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_sessions", - "remarks": "rule_set_190" + "remarks": "rule_set_187" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH MaxSessions limit", - "remarks": "rule_set_190" + "remarks": "rule_set_187" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_empty_passwords", - "remarks": "rule_set_191" + "remarks": "rule_set_188" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Access via Empty Passwords", - "remarks": "rule_set_191" + "remarks": "rule_set_188" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_empty_passwords", - "remarks": "rule_set_191" + "remarks": "rule_set_188" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Access via Empty Passwords", - "remarks": "rule_set_191" + "remarks": "rule_set_188" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_root_login", - "remarks": "rule_set_192" + "remarks": "rule_set_189" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Root Login", - "remarks": "rule_set_192" + "remarks": "rule_set_189" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_root_login", - "remarks": "rule_set_192" + "remarks": "rule_set_189" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Root Login", - "remarks": "rule_set_192" + "remarks": "rule_set_189" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_do_not_permit_user_env", - "remarks": "rule_set_193" + "remarks": "rule_set_190" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Do Not Allow SSH Environment Options", - "remarks": "rule_set_193" + "remarks": "rule_set_190" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_do_not_permit_user_env", - "remarks": "rule_set_193" + "remarks": "rule_set_190" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Do Not Allow SSH Environment Options", - "remarks": "rule_set_193" + "remarks": "rule_set_190" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_pam", - "remarks": "rule_set_194" + "remarks": "rule_set_191" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable PAM", - "remarks": "rule_set_194" + "remarks": "rule_set_191" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_pam", - "remarks": "rule_set_194" + "remarks": "rule_set_191" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable PAM", - "remarks": "rule_set_194" + "remarks": "rule_set_191" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_sudo_installed", - "remarks": "rule_set_195" + "remarks": "rule_set_192" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install sudo Package", - "remarks": "rule_set_195" + "remarks": "rule_set_192" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_sudo_installed", - "remarks": "rule_set_195" + "remarks": "rule_set_192" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install sudo Package", - "remarks": "rule_set_195" + "remarks": "rule_set_192" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_use_pty", - "remarks": "rule_set_196" + "remarks": "rule_set_193" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo use_pty", - "remarks": "rule_set_196" + "remarks": "rule_set_193" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_use_pty", - "remarks": "rule_set_196" + "remarks": "rule_set_193" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo use_pty", - "remarks": "rule_set_196" + "remarks": "rule_set_193" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_custom_logfile", - "remarks": "rule_set_197" + "remarks": "rule_set_194" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Sudo Logfile Exists - sudo logfile", - "remarks": "rule_set_197" + "remarks": "rule_set_194" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_custom_logfile", - "remarks": "rule_set_197" + "remarks": "rule_set_194" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Sudo Logfile Exists - sudo logfile", - "remarks": "rule_set_197" + "remarks": "rule_set_194" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_no_authenticate", - "remarks": "rule_set_198" + "remarks": "rule_set_195" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo !authenticate", - "remarks": "rule_set_198" + "remarks": "rule_set_195" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_no_authenticate", - "remarks": "rule_set_198" + "remarks": "rule_set_195" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo !authenticate", - "remarks": "rule_set_198" + "remarks": "rule_set_195" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_require_reauthentication", - "remarks": "rule_set_199" + "remarks": "rule_set_196" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require Re-Authentication When Using the sudo Command", - "remarks": "rule_set_199" + "remarks": "rule_set_196" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_require_reauthentication", - "remarks": "rule_set_199" + "remarks": "rule_set_196" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require Re-Authentication When Using the sudo Command", - "remarks": "rule_set_199" + "remarks": "rule_set_196" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "use_pam_wheel_group_for_su", - "remarks": "rule_set_200" + "remarks": "rule_set_197" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Usage of pam_wheel with Group Parameter for su Authentication", - "remarks": "rule_set_200" + "remarks": "rule_set_197" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "use_pam_wheel_group_for_su", - "remarks": "rule_set_200" + "remarks": "rule_set_197" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Usage of pam_wheel with Group Parameter for su Authentication", - "remarks": "rule_set_200" + "remarks": "rule_set_197" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_pam_wheel_group_empty", - "remarks": "rule_set_201" + "remarks": "rule_set_198" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Group Used by pam_wheel.so Module Exists on System and is Empty", - "remarks": "rule_set_201" + "remarks": "rule_set_198" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_pam_wheel_group_empty", - "remarks": "rule_set_201" + "remarks": "rule_set_198" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Group Used by pam_wheel.so Module Exists on System and is Empty", - "remarks": "rule_set_201" + "remarks": "rule_set_198" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_password_pam_faillock_password_auth", - "remarks": "rule_set_202" + "remarks": "rule_set_199" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/password-auth File.", - "remarks": "rule_set_202" + "remarks": "rule_set_199" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_password_pam_faillock_password_auth", - "remarks": "rule_set_202" + "remarks": "rule_set_199" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/password-auth File.", - "remarks": "rule_set_202" + "remarks": "rule_set_199" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_password_pam_faillock_system_auth", - "remarks": "rule_set_203" + "remarks": "rule_set_200" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/system-auth File.", - "remarks": "rule_set_203" + "remarks": "rule_set_200" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_password_pam_faillock_system_auth", - "remarks": "rule_set_203" + "remarks": "rule_set_200" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Use of the pam_faillock.so Module in the /etc/pam.d/system-auth File.", - "remarks": "rule_set_203" + "remarks": "rule_set_200" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_pam_pwquality_installed", - "remarks": "rule_set_204" + "remarks": "rule_set_201" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install pam_pwquality Package", - "remarks": "rule_set_204" + "remarks": "rule_set_201" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_pam_pwquality_installed", - "remarks": "rule_set_204" + "remarks": "rule_set_201" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install pam_pwquality Package", - "remarks": "rule_set_204" + "remarks": "rule_set_201" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwquality_password_auth", - "remarks": "rule_set_205" + "remarks": "rule_set_202" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM password complexity module is enabled in password-auth", - "remarks": "rule_set_205" + "remarks": "rule_set_202" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwquality_password_auth", - "remarks": "rule_set_205" + "remarks": "rule_set_202" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM password complexity module is enabled in password-auth", - "remarks": "rule_set_205" + "remarks": "rule_set_202" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwquality_system_auth", - "remarks": "rule_set_206" + "remarks": "rule_set_203" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM password complexity module is enabled in system-auth", - "remarks": "rule_set_206" + "remarks": "rule_set_203" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwquality_system_auth", - "remarks": "rule_set_206" + "remarks": "rule_set_203" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM password complexity module is enabled in system-auth", - "remarks": "rule_set_206" + "remarks": "rule_set_203" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_enabled", - "remarks": "rule_set_207" + "remarks": "rule_set_204" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify pam_unix module is activated", - "remarks": "rule_set_207" + "remarks": "rule_set_204" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_enabled", - "remarks": "rule_set_207" + "remarks": "rule_set_204" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify pam_unix module is activated", - "remarks": "rule_set_207" + "remarks": "rule_set_204" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny", - "remarks": "rule_set_208" + "remarks": "rule_set_205" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Lock Accounts After Failed Password Attempts", - "remarks": "rule_set_208" + "remarks": "rule_set_205" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny", - "remarks": "rule_set_208" + "remarks": "rule_set_205" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Lock Accounts After Failed Password Attempts", - "remarks": "rule_set_208" + "remarks": "rule_set_205" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_unlock_time_with_zero", - "remarks": "rule_set_209" + "remarks": "rule_set_206" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Lockout Time for Failed Password Attempts", - "remarks": "rule_set_209" + "remarks": "rule_set_206" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_unlock_time_with_zero", - "remarks": "rule_set_209" + "remarks": "rule_set_206" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Lockout Time for Failed Password Attempts", - "remarks": "rule_set_209" + "remarks": "rule_set_206" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_difok", - "remarks": "rule_set_210" + "remarks": "rule_set_207" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Characters", - "remarks": "rule_set_210" + "remarks": "rule_set_207" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_difok", - "remarks": "rule_set_210" + "remarks": "rule_set_207" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Characters", - "remarks": "rule_set_210" + "remarks": "rule_set_207" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minlen", - "remarks": "rule_set_211" + "remarks": "rule_set_208" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Length", - "remarks": "rule_set_211" + "remarks": "rule_set_208" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minlen", - "remarks": "rule_set_211" + "remarks": "rule_set_208" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Length", - "remarks": "rule_set_211" + "remarks": "rule_set_208" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minclass", - "remarks": "rule_set_212" + "remarks": "rule_set_209" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", - "remarks": "rule_set_212" + "remarks": "rule_set_209" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minclass", - "remarks": "rule_set_212" + "remarks": "rule_set_209" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", - "remarks": "rule_set_212" + "remarks": "rule_set_209" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_maxrepeat", - "remarks": "rule_set_213" + "remarks": "rule_set_210" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Consecutive Repeating Characters", - "remarks": "rule_set_213" + "remarks": "rule_set_210" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_maxrepeat", - "remarks": "rule_set_213" + "remarks": "rule_set_210" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Consecutive Repeating Characters", - "remarks": "rule_set_213" + "remarks": "rule_set_210" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_maxsequence", - "remarks": "rule_set_214" + "remarks": "rule_set_211" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit the maximum number of sequential characters in passwords", - "remarks": "rule_set_214" + "remarks": "rule_set_211" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_maxsequence", - "remarks": "rule_set_214" + "remarks": "rule_set_211" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit the maximum number of sequential characters in passwords", - "remarks": "rule_set_214" + "remarks": "rule_set_211" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_dictcheck", - "remarks": "rule_set_215" + "remarks": "rule_set_212" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Prevent the Use of Dictionary Words", - "remarks": "rule_set_215" + "remarks": "rule_set_212" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_dictcheck", - "remarks": "rule_set_215" + "remarks": "rule_set_212" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Prevent the Use of Dictionary Words", - "remarks": "rule_set_215" + "remarks": "rule_set_212" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_enforce_root", - "remarks": "rule_set_216" + "remarks": "rule_set_213" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Enforce for root User", - "remarks": "rule_set_216" + "remarks": "rule_set_213" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_enforce_root", - "remarks": "rule_set_216" + "remarks": "rule_set_213" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Enforce for root User", - "remarks": "rule_set_216" + "remarks": "rule_set_213" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_password_auth", - "remarks": "rule_set_217" + "remarks": "rule_set_214" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: password-auth", - "remarks": "rule_set_217" + "remarks": "rule_set_214" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_password_auth", - "remarks": "rule_set_217" + "remarks": "rule_set_214" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: password-auth", - "remarks": "rule_set_217" + "remarks": "rule_set_214" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_system_auth", - "remarks": "rule_set_218" + "remarks": "rule_set_215" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: system-auth", - "remarks": "rule_set_218" + "remarks": "rule_set_215" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_remember_system_auth", - "remarks": "rule_set_218" + "remarks": "rule_set_215" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit Password Reuse: system-auth", - "remarks": "rule_set_218" + "remarks": "rule_set_215" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_enforce_for_root", - "remarks": "rule_set_219" + "remarks": "rule_set_216" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Password History Is Enforced for the Root User", - "remarks": "rule_set_219" + "remarks": "rule_set_216" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_enforce_for_root", - "remarks": "rule_set_219" + "remarks": "rule_set_216" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Password History Is Enforced for the Root User", - "remarks": "rule_set_219" + "remarks": "rule_set_216" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_use_authtok", - "remarks": "rule_set_220" + "remarks": "rule_set_217" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Password History with use_authtok", - "remarks": "rule_set_220" + "remarks": "rule_set_217" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_pwhistory_use_authtok", - "remarks": "rule_set_220" + "remarks": "rule_set_217" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Password History with use_authtok", - "remarks": "rule_set_220" + "remarks": "rule_set_217" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords", - "remarks": "rule_set_221" + "remarks": "rule_set_218" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent Login to Accounts With Empty Password", - "remarks": "rule_set_221" + "remarks": "rule_set_218" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords", - "remarks": "rule_set_221" + "remarks": "rule_set_218" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent Login to Accounts With Empty Password", - "remarks": "rule_set_221" + "remarks": "rule_set_218" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_no_remember", - "remarks": "rule_set_222" + "remarks": "rule_set_219" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Avoid using remember in pam_unix module", - "remarks": "rule_set_222" + "remarks": "rule_set_219" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_no_remember", - "remarks": "rule_set_222" + "remarks": "rule_set_219" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Avoid using remember in pam_unix module", - "remarks": "rule_set_222" + "remarks": "rule_set_219" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_systemauth", - "remarks": "rule_set_223" + "remarks": "rule_set_220" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - system-auth", - "remarks": "rule_set_223" + "remarks": "rule_set_220" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_systemauth", - "remarks": "rule_set_223" + "remarks": "rule_set_220" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - system-auth", - "remarks": "rule_set_223" + "remarks": "rule_set_220" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_passwordauth", - "remarks": "rule_set_224" + "remarks": "rule_set_221" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - password-auth", - "remarks": "rule_set_224" + "remarks": "rule_set_221" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_passwordauth", - "remarks": "rule_set_224" + "remarks": "rule_set_221" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - password-auth", - "remarks": "rule_set_224" + "remarks": "rule_set_221" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_authtok", - "remarks": "rule_set_225" + "remarks": "rule_set_222" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require use_authtok for pam_unix.so", - "remarks": "rule_set_225" + "remarks": "rule_set_222" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_authtok", - "remarks": "rule_set_225" + "remarks": "rule_set_222" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require use_authtok for pam_unix.so", - "remarks": "rule_set_225" + "remarks": "rule_set_222" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_maximum_age_login_defs", - "remarks": "rule_set_226" + "remarks": "rule_set_223" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Age", - "remarks": "rule_set_226" + "remarks": "rule_set_223" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_maximum_age_login_defs", - "remarks": "rule_set_226" + "remarks": "rule_set_223" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Age", - "remarks": "rule_set_226" + "remarks": "rule_set_223" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_max_life_existing", - "remarks": "rule_set_227" + "remarks": "rule_set_224" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Maximum Age", - "remarks": "rule_set_227" + "remarks": "rule_set_224" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_max_life_existing", - "remarks": "rule_set_227" + "remarks": "rule_set_224" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Maximum Age", - "remarks": "rule_set_227" + "remarks": "rule_set_224" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_warn_age_login_defs", - "remarks": "rule_set_228" + "remarks": "rule_set_225" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Warning Age", - "remarks": "rule_set_228" + "remarks": "rule_set_225" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_warn_age_login_defs", - "remarks": "rule_set_228" + "remarks": "rule_set_225" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Warning Age", - "remarks": "rule_set_228" + "remarks": "rule_set_225" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_warn_age_existing", - "remarks": "rule_set_229" + "remarks": "rule_set_226" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Warning Age", - "remarks": "rule_set_229" + "remarks": "rule_set_226" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_warn_age_existing", - "remarks": "rule_set_229" + "remarks": "rule_set_226" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Warning Age", - "remarks": "rule_set_229" + "remarks": "rule_set_226" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_libuserconf", - "remarks": "rule_set_230" + "remarks": "rule_set_227" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/libuser.conf", - "remarks": "rule_set_230" + "remarks": "rule_set_227" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_libuserconf", - "remarks": "rule_set_230" + "remarks": "rule_set_227" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/libuser.conf", - "remarks": "rule_set_230" + "remarks": "rule_set_227" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_logindefs", - "remarks": "rule_set_231" + "remarks": "rule_set_228" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/login.defs", - "remarks": "rule_set_231" + "remarks": "rule_set_228" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_logindefs", - "remarks": "rule_set_231" + "remarks": "rule_set_228" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/login.defs", - "remarks": "rule_set_231" + "remarks": "rule_set_228" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_disable_post_pw_expiration", - "remarks": "rule_set_232" + "remarks": "rule_set_229" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Account Expiration Following Inactivity", - "remarks": "rule_set_232" + "remarks": "rule_set_229" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_disable_post_pw_expiration", - "remarks": "rule_set_232" + "remarks": "rule_set_229" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Account Expiration Following Inactivity", - "remarks": "rule_set_232" + "remarks": "rule_set_229" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_set_post_pw_existing", - "remarks": "rule_set_233" + "remarks": "rule_set_230" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set existing passwords a period of inactivity before they been locked", - "remarks": "rule_set_233" + "remarks": "rule_set_230" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_set_post_pw_existing", - "remarks": "rule_set_233" + "remarks": "rule_set_230" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set existing passwords a period of inactivity before they been locked", - "remarks": "rule_set_233" + "remarks": "rule_set_230" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_last_change_is_in_past", - "remarks": "rule_set_234" + "remarks": "rule_set_231" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure all users last password change date is in the past", - "remarks": "rule_set_234" + "remarks": "rule_set_231" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_last_change_is_in_past", - "remarks": "rule_set_234" + "remarks": "rule_set_231" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure all users last password change date is in the past", - "remarks": "rule_set_234" + "remarks": "rule_set_231" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_no_uid_except_zero", - "remarks": "rule_set_235" + "remarks": "rule_set_232" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Root Has UID 0", - "remarks": "rule_set_235" + "remarks": "rule_set_232" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_no_uid_except_zero", - "remarks": "rule_set_235" + "remarks": "rule_set_232" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Root Has UID 0", - "remarks": "rule_set_235" + "remarks": "rule_set_232" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_gid_zero", - "remarks": "rule_set_236" + "remarks": "rule_set_233" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Root Has A Primary GID 0", - "remarks": "rule_set_236" + "remarks": "rule_set_233" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_gid_zero", - "remarks": "rule_set_236" + "remarks": "rule_set_233" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Root Has A Primary GID 0", - "remarks": "rule_set_236" + "remarks": "rule_set_233" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "groups_no_zero_gid_except_root", - "remarks": "rule_set_237" + "remarks": "rule_set_234" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Group Root Has GID 0", - "remarks": "rule_set_237" + "remarks": "rule_set_234" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "groups_no_zero_gid_except_root", - "remarks": "rule_set_237" + "remarks": "rule_set_234" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Group Root Has GID 0", - "remarks": "rule_set_237" + "remarks": "rule_set_234" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_root_password_configured", - "remarks": "rule_set_238" + "remarks": "rule_set_235" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Authentication Required for Single User Mode", - "remarks": "rule_set_238" + "remarks": "rule_set_235" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_root_password_configured", - "remarks": "rule_set_238" + "remarks": "rule_set_235" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Authentication Required for Single User Mode", - "remarks": "rule_set_238" + "remarks": "rule_set_235" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_path_dirs_no_write", - "remarks": "rule_set_239" + "remarks": "rule_set_236" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include World or Group-Writable Directories", - "remarks": "rule_set_239" + "remarks": "rule_set_236" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_path_dirs_no_write", - "remarks": "rule_set_239" + "remarks": "rule_set_236" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include World or Group-Writable Directories", - "remarks": "rule_set_239" + "remarks": "rule_set_236" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "root_path_no_dot", - "remarks": "rule_set_240" + "remarks": "rule_set_237" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include Relative Paths or Null Directories", - "remarks": "rule_set_240" + "remarks": "rule_set_237" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "root_path_no_dot", - "remarks": "rule_set_240" + "remarks": "rule_set_237" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include Relative Paths or Null Directories", - "remarks": "rule_set_240" + "remarks": "rule_set_237" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_root", - "remarks": "rule_set_241" + "remarks": "rule_set_238" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Root Bash Umask is Set Correctly", - "remarks": "rule_set_241" + "remarks": "rule_set_238" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_root", - "remarks": "rule_set_241" + "remarks": "rule_set_238" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Root Bash Umask is Set Correctly", - "remarks": "rule_set_241" + "remarks": "rule_set_238" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_password_auth_for_systemaccounts", - "remarks": "rule_set_242" + "remarks": "rule_set_239" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Are Locked", - "remarks": "rule_set_242" + "remarks": "rule_set_239" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_password_auth_for_systemaccounts", - "remarks": "rule_set_242" + "remarks": "rule_set_239" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Are Locked", - "remarks": "rule_set_242" + "remarks": "rule_set_239" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_shelllogin_for_systemaccounts", - "remarks": "rule_set_243" + "remarks": "rule_set_240" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", - "remarks": "rule_set_243" + "remarks": "rule_set_240" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_shelllogin_for_systemaccounts", - "remarks": "rule_set_243" + "remarks": "rule_set_240" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", - "remarks": "rule_set_243" + "remarks": "rule_set_240" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_invalid_shell_accounts_unlocked", - "remarks": "rule_set_244" + "remarks": "rule_set_241" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Non-Interactive Accounts Are Locked", - "remarks": "rule_set_244" + "remarks": "rule_set_241" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_invalid_shell_accounts_unlocked", - "remarks": "rule_set_244" + "remarks": "rule_set_241" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Non-Interactive Accounts Are Locked", - "remarks": "rule_set_244" + "remarks": "rule_set_241" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_tmout", - "remarks": "rule_set_245" + "remarks": "rule_set_242" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Interactive Session Timeout", - "remarks": "rule_set_245" + "remarks": "rule_set_242" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_tmout", - "remarks": "rule_set_245" + "remarks": "rule_set_242" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Interactive Session Timeout", - "remarks": "rule_set_245" + "remarks": "rule_set_242" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_bashrc", - "remarks": "rule_set_246" + "remarks": "rule_set_243" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Bash Umask is Set Correctly", - "remarks": "rule_set_246" + "remarks": "rule_set_243" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_bashrc", - "remarks": "rule_set_246" + "remarks": "rule_set_243" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Bash Umask is Set Correctly", - "remarks": "rule_set_246" + "remarks": "rule_set_243" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_login_defs", - "remarks": "rule_set_247" + "remarks": "rule_set_244" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in login.defs", - "remarks": "rule_set_247" + "remarks": "rule_set_244" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_login_defs", - "remarks": "rule_set_247" + "remarks": "rule_set_244" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in login.defs", - "remarks": "rule_set_247" + "remarks": "rule_set_244" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_profile", - "remarks": "rule_set_248" + "remarks": "rule_set_245" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in /etc/profile", - "remarks": "rule_set_248" + "remarks": "rule_set_245" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_profile", - "remarks": "rule_set_248" + "remarks": "rule_set_245" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in /etc/profile", - "remarks": "rule_set_248" + "remarks": "rule_set_245" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_249" + "remarks": "rule_set_246" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_249" + "remarks": "rule_set_246" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_249" + "remarks": "rule_set_246" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_249" + "remarks": "rule_set_246" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_build_database", - "remarks": "rule_set_250" + "remarks": "rule_set_247" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Build and Test AIDE Database", - "remarks": "rule_set_250" + "remarks": "rule_set_247" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_build_database", - "remarks": "rule_set_250" + "remarks": "rule_set_247" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Build and Test AIDE Database", - "remarks": "rule_set_250" + "remarks": "rule_set_247" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_periodic_cron_checking", - "remarks": "rule_set_251" + "remarks": "rule_set_248" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Periodic Execution of AIDE", - "remarks": "rule_set_251" + "remarks": "rule_set_248" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_periodic_cron_checking", - "remarks": "rule_set_251" + "remarks": "rule_set_248" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Periodic Execution of AIDE", - "remarks": "rule_set_251" + "remarks": "rule_set_248" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_check_audit_tools", - "remarks": "rule_set_252" + "remarks": "rule_set_249" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure AIDE to Verify the Audit Tools", - "remarks": "rule_set_252" + "remarks": "rule_set_249" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_check_audit_tools", - "remarks": "rule_set_252" + "remarks": "rule_set_249" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure AIDE to Verify the Audit Tools", - "remarks": "rule_set_252" + "remarks": "rule_set_249" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journald_enabled", - "remarks": "rule_set_253" + "remarks": "rule_set_250" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journald Service", - "remarks": "rule_set_253" + "remarks": "rule_set_250" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journald_enabled", - "remarks": "rule_set_253" + "remarks": "rule_set_250" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journald Service", - "remarks": "rule_set_253" + "remarks": "rule_set_250" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_journald_and_rsyslog_not_active_together", - "remarks": "rule_set_254" + "remarks": "rule_set_251" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald and rsyslog Are Not Active Together", - "remarks": "rule_set_254" + "remarks": "rule_set_251" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_journald_and_rsyslog_not_active_together", - "remarks": "rule_set_254" + "remarks": "rule_set_251" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald and rsyslog Are Not Active Together", - "remarks": "rule_set_254" + "remarks": "rule_set_251" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_systemd-journal-remote_installed", - "remarks": "rule_set_255" + "remarks": "rule_set_252" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install systemd-journal-remote Package", - "remarks": "rule_set_255" + "remarks": "rule_set_252" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_systemd-journal-remote_installed", - "remarks": "rule_set_255" + "remarks": "rule_set_252" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install systemd-journal-remote Package", - "remarks": "rule_set_255" + "remarks": "rule_set_252" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journal-upload_enabled", - "remarks": "rule_set_256" + "remarks": "rule_set_253" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journal-upload Service", - "remarks": "rule_set_256" + "remarks": "rule_set_253" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journal-upload_enabled", - "remarks": "rule_set_256" + "remarks": "rule_set_253" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journal-upload Service", - "remarks": "rule_set_256" + "remarks": "rule_set_253" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "socket_systemd-journal-remote_disabled", - "remarks": "rule_set_257" + "remarks": "rule_set_254" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable systemd-journal-remote Socket", - "remarks": "rule_set_257" + "remarks": "rule_set_254" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "socket_systemd-journal-remote_disabled", - "remarks": "rule_set_257" + "remarks": "rule_set_254" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable systemd-journal-remote Socket", - "remarks": "rule_set_257" + "remarks": "rule_set_254" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_disable_forward_to_syslog", - "remarks": "rule_set_258" + "remarks": "rule_set_255" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald ForwardToSyslog is disabled", - "remarks": "rule_set_258" + "remarks": "rule_set_255" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_disable_forward_to_syslog", - "remarks": "rule_set_258" + "remarks": "rule_set_255" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald ForwardToSyslog is disabled", - "remarks": "rule_set_258" + "remarks": "rule_set_255" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_compress", - "remarks": "rule_set_259" + "remarks": "rule_set_256" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to compress large log files", - "remarks": "rule_set_259" + "remarks": "rule_set_256" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_compress", - "remarks": "rule_set_259" + "remarks": "rule_set_256" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to compress large log files", - "remarks": "rule_set_259" + "remarks": "rule_set_256" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_storage", - "remarks": "rule_set_260" + "remarks": "rule_set_257" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to write log files to persistent disk", - "remarks": "rule_set_260" + "remarks": "rule_set_257" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_storage", - "remarks": "rule_set_260" + "remarks": "rule_set_257" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to write log files to persistent disk", - "remarks": "rule_set_260" + "remarks": "rule_set_257" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_261" + "remarks": "rule_set_258" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_261" + "remarks": "rule_set_258" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_261" + "remarks": "rule_set_258" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_261" + "remarks": "rule_set_258" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_262" + "remarks": "rule_set_259" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_262" + "remarks": "rule_set_259" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_262" + "remarks": "rule_set_259" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_262" + "remarks": "rule_set_259" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_263" + "remarks": "rule_set_260" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_263" + "remarks": "rule_set_260" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_263" + "remarks": "rule_set_260" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_263" + "remarks": "rule_set_260" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_passwd", - "remarks": "rule_set_264" + "remarks": "rule_set_261" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns passwd File", - "remarks": "rule_set_264" + "remarks": "rule_set_261" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_passwd", - "remarks": "rule_set_264" + "remarks": "rule_set_261" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns passwd File", - "remarks": "rule_set_264" + "remarks": "rule_set_261" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_passwd", - "remarks": "rule_set_265" + "remarks": "rule_set_262" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns passwd File", - "remarks": "rule_set_265" + "remarks": "rule_set_262" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_passwd", - "remarks": "rule_set_265" + "remarks": "rule_set_262" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns passwd File", - "remarks": "rule_set_265" + "remarks": "rule_set_262" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_passwd", - "remarks": "rule_set_266" + "remarks": "rule_set_263" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on passwd File", - "remarks": "rule_set_266" + "remarks": "rule_set_263" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_passwd", - "remarks": "rule_set_266" + "remarks": "rule_set_263" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on passwd File", - "remarks": "rule_set_266" + "remarks": "rule_set_263" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_passwd", - "remarks": "rule_set_267" + "remarks": "rule_set_264" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup passwd File", - "remarks": "rule_set_267" + "remarks": "rule_set_264" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_passwd", - "remarks": "rule_set_267" + "remarks": "rule_set_264" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup passwd File", - "remarks": "rule_set_267" + "remarks": "rule_set_264" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_passwd", - "remarks": "rule_set_268" + "remarks": "rule_set_265" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup passwd File", - "remarks": "rule_set_268" + "remarks": "rule_set_265" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_passwd", - "remarks": "rule_set_268" + "remarks": "rule_set_265" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup passwd File", - "remarks": "rule_set_268" + "remarks": "rule_set_265" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_passwd", - "remarks": "rule_set_269" + "remarks": "rule_set_266" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup passwd File", - "remarks": "rule_set_269" + "remarks": "rule_set_266" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_passwd", - "remarks": "rule_set_269" + "remarks": "rule_set_266" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup passwd File", - "remarks": "rule_set_269" + "remarks": "rule_set_266" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_group", - "remarks": "rule_set_270" + "remarks": "rule_set_267" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns group File", - "remarks": "rule_set_270" + "remarks": "rule_set_267" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_group", - "remarks": "rule_set_270" + "remarks": "rule_set_267" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns group File", - "remarks": "rule_set_270" + "remarks": "rule_set_267" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_group", - "remarks": "rule_set_271" + "remarks": "rule_set_268" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns group File", - "remarks": "rule_set_271" + "remarks": "rule_set_268" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_group", - "remarks": "rule_set_271" + "remarks": "rule_set_268" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns group File", - "remarks": "rule_set_271" + "remarks": "rule_set_268" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_group", - "remarks": "rule_set_272" + "remarks": "rule_set_269" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on group File", - "remarks": "rule_set_272" + "remarks": "rule_set_269" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_group", - "remarks": "rule_set_272" + "remarks": "rule_set_269" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on group File", - "remarks": "rule_set_272" + "remarks": "rule_set_269" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_group", - "remarks": "rule_set_273" + "remarks": "rule_set_270" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup group File", - "remarks": "rule_set_273" + "remarks": "rule_set_270" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_group", - "remarks": "rule_set_273" + "remarks": "rule_set_270" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup group File", - "remarks": "rule_set_273" + "remarks": "rule_set_270" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_group", - "remarks": "rule_set_274" + "remarks": "rule_set_271" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup group File", - "remarks": "rule_set_274" + "remarks": "rule_set_271" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_group", - "remarks": "rule_set_274" + "remarks": "rule_set_271" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup group File", - "remarks": "rule_set_274" + "remarks": "rule_set_271" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_group", - "remarks": "rule_set_275" + "remarks": "rule_set_272" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup group File", - "remarks": "rule_set_275" + "remarks": "rule_set_272" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_group", - "remarks": "rule_set_275" + "remarks": "rule_set_272" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup group File", - "remarks": "rule_set_275" + "remarks": "rule_set_272" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shadow", - "remarks": "rule_set_276" + "remarks": "rule_set_273" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns shadow File", - "remarks": "rule_set_276" + "remarks": "rule_set_273" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shadow", - "remarks": "rule_set_276" + "remarks": "rule_set_273" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns shadow File", - "remarks": "rule_set_276" + "remarks": "rule_set_273" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shadow", - "remarks": "rule_set_277" + "remarks": "rule_set_274" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns shadow File", - "remarks": "rule_set_277" + "remarks": "rule_set_274" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shadow", - "remarks": "rule_set_277" + "remarks": "rule_set_274" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns shadow File", - "remarks": "rule_set_277" + "remarks": "rule_set_274" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shadow", - "remarks": "rule_set_278" + "remarks": "rule_set_275" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on shadow File", - "remarks": "rule_set_278" + "remarks": "rule_set_275" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shadow", - "remarks": "rule_set_278" + "remarks": "rule_set_275" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on shadow File", - "remarks": "rule_set_278" + "remarks": "rule_set_275" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_shadow", - "remarks": "rule_set_279" + "remarks": "rule_set_276" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup shadow File", - "remarks": "rule_set_279" + "remarks": "rule_set_276" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_shadow", - "remarks": "rule_set_279" + "remarks": "rule_set_276" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup shadow File", - "remarks": "rule_set_279" + "remarks": "rule_set_276" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_shadow", - "remarks": "rule_set_280" + "remarks": "rule_set_277" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup shadow File", - "remarks": "rule_set_280" + "remarks": "rule_set_277" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_shadow", - "remarks": "rule_set_280" + "remarks": "rule_set_277" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup shadow File", - "remarks": "rule_set_280" + "remarks": "rule_set_277" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_shadow", - "remarks": "rule_set_281" + "remarks": "rule_set_278" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup shadow File", - "remarks": "rule_set_281" + "remarks": "rule_set_278" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_shadow", - "remarks": "rule_set_281" + "remarks": "rule_set_278" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup shadow File", - "remarks": "rule_set_281" + "remarks": "rule_set_278" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_gshadow", - "remarks": "rule_set_282" + "remarks": "rule_set_279" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns gshadow File", - "remarks": "rule_set_282" + "remarks": "rule_set_279" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_gshadow", - "remarks": "rule_set_282" + "remarks": "rule_set_279" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns gshadow File", - "remarks": "rule_set_282" + "remarks": "rule_set_279" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_gshadow", - "remarks": "rule_set_283" + "remarks": "rule_set_280" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns gshadow File", - "remarks": "rule_set_283" + "remarks": "rule_set_280" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_gshadow", - "remarks": "rule_set_283" + "remarks": "rule_set_280" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns gshadow File", - "remarks": "rule_set_283" + "remarks": "rule_set_280" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_gshadow", - "remarks": "rule_set_284" + "remarks": "rule_set_281" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on gshadow File", - "remarks": "rule_set_284" + "remarks": "rule_set_281" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_gshadow", - "remarks": "rule_set_284" + "remarks": "rule_set_281" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on gshadow File", - "remarks": "rule_set_284" + "remarks": "rule_set_281" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_gshadow", - "remarks": "rule_set_285" + "remarks": "rule_set_282" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup gshadow File", - "remarks": "rule_set_285" + "remarks": "rule_set_282" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_gshadow", - "remarks": "rule_set_285" + "remarks": "rule_set_282" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup gshadow File", - "remarks": "rule_set_285" + "remarks": "rule_set_282" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_gshadow", - "remarks": "rule_set_286" + "remarks": "rule_set_283" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup gshadow File", - "remarks": "rule_set_286" + "remarks": "rule_set_283" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_gshadow", - "remarks": "rule_set_286" + "remarks": "rule_set_283" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup gshadow File", - "remarks": "rule_set_286" + "remarks": "rule_set_283" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_gshadow", - "remarks": "rule_set_287" + "remarks": "rule_set_284" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup gshadow File", - "remarks": "rule_set_287" + "remarks": "rule_set_284" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_gshadow", - "remarks": "rule_set_287" + "remarks": "rule_set_284" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup gshadow File", - "remarks": "rule_set_287" + "remarks": "rule_set_284" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shells", - "remarks": "rule_set_288" + "remarks": "rule_set_285" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/shells File", - "remarks": "rule_set_288" + "remarks": "rule_set_285" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shells", - "remarks": "rule_set_288" + "remarks": "rule_set_285" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/shells File", - "remarks": "rule_set_288" + "remarks": "rule_set_285" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shells", - "remarks": "rule_set_289" + "remarks": "rule_set_286" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Who Owns /etc/shells File", - "remarks": "rule_set_289" + "remarks": "rule_set_286" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shells", - "remarks": "rule_set_289" + "remarks": "rule_set_286" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Who Owns /etc/shells File", - "remarks": "rule_set_289" + "remarks": "rule_set_286" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shells", - "remarks": "rule_set_290" + "remarks": "rule_set_287" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/shells File", - "remarks": "rule_set_290" + "remarks": "rule_set_287" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shells", - "remarks": "rule_set_290" + "remarks": "rule_set_287" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/shells File", - "remarks": "rule_set_290" + "remarks": "rule_set_287" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd", - "remarks": "rule_set_291" + "remarks": "rule_set_288" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd File", - "remarks": "rule_set_291" + "remarks": "rule_set_288" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd", - "remarks": "rule_set_291" + "remarks": "rule_set_288" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd File", - "remarks": "rule_set_291" + "remarks": "rule_set_288" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd", - "remarks": "rule_set_292" + "remarks": "rule_set_289" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd File", - "remarks": "rule_set_292" + "remarks": "rule_set_289" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd", - "remarks": "rule_set_292" + "remarks": "rule_set_289" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd File", - "remarks": "rule_set_292" + "remarks": "rule_set_289" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd", - "remarks": "rule_set_293" + "remarks": "rule_set_290" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd File", - "remarks": "rule_set_293" + "remarks": "rule_set_290" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd", - "remarks": "rule_set_293" + "remarks": "rule_set_290" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd File", - "remarks": "rule_set_293" + "remarks": "rule_set_290" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd_old", - "remarks": "rule_set_294" + "remarks": "rule_set_291" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_294" + "remarks": "rule_set_291" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd_old", - "remarks": "rule_set_294" + "remarks": "rule_set_291" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_294" + "remarks": "rule_set_291" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd_old", - "remarks": "rule_set_295" + "remarks": "rule_set_292" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_295" + "remarks": "rule_set_292" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd_old", - "remarks": "rule_set_295" + "remarks": "rule_set_292" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_295" + "remarks": "rule_set_292" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd_old", - "remarks": "rule_set_296" + "remarks": "rule_set_293" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd.old File", - "remarks": "rule_set_296" + "remarks": "rule_set_293" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd_old", - "remarks": "rule_set_296" + "remarks": "rule_set_293" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd.old File", - "remarks": "rule_set_296" + "remarks": "rule_set_293" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_297" + "remarks": "rule_set_294" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_297" + "remarks": "rule_set_294" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_297" + "remarks": "rule_set_294" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_297" + "remarks": "rule_set_294" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_298" + "remarks": "rule_set_295" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_298" + "remarks": "rule_set_295" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_298" + "remarks": "rule_set_295" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_298" + "remarks": "rule_set_295" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_unowned_by_user", - "remarks": "rule_set_299" + "remarks": "rule_set_296" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a User", - "remarks": "rule_set_299" + "remarks": "rule_set_296" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_unowned_by_user", - "remarks": "rule_set_299" + "remarks": "rule_set_296" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a User", - "remarks": "rule_set_299" + "remarks": "rule_set_296" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_ungroupowned", - "remarks": "rule_set_300" + "remarks": "rule_set_297" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a Group", - "remarks": "rule_set_300" + "remarks": "rule_set_297" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_ungroupowned", - "remarks": "rule_set_300" + "remarks": "rule_set_297" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a Group", - "remarks": "rule_set_300" + "remarks": "rule_set_297" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_all_shadowed", - "remarks": "rule_set_301" + "remarks": "rule_set_298" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify All Account Password Hashes are Shadowed", - "remarks": "rule_set_301" + "remarks": "rule_set_298" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_all_shadowed", - "remarks": "rule_set_301" + "remarks": "rule_set_298" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify All Account Password Hashes are Shadowed", - "remarks": "rule_set_301" + "remarks": "rule_set_298" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords_etc_shadow", - "remarks": "rule_set_302" + "remarks": "rule_set_299" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure There Are No Accounts With Blank or Null Passwords", - "remarks": "rule_set_302" + "remarks": "rule_set_299" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords_etc_shadow", - "remarks": "rule_set_302" + "remarks": "rule_set_299" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure There Are No Accounts With Blank or Null Passwords", - "remarks": "rule_set_302" + "remarks": "rule_set_299" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gid_passwd_group_same", - "remarks": "rule_set_303" + "remarks": "rule_set_300" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", - "remarks": "rule_set_303" + "remarks": "rule_set_300" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gid_passwd_group_same", - "remarks": "rule_set_303" + "remarks": "rule_set_300" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", - "remarks": "rule_set_303" + "remarks": "rule_set_300" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_id", - "remarks": "rule_set_304" + "remarks": "rule_set_301" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique User IDs", - "remarks": "rule_set_304" + "remarks": "rule_set_301" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_id", - "remarks": "rule_set_304" + "remarks": "rule_set_301" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique User IDs", - "remarks": "rule_set_304" + "remarks": "rule_set_301" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_id", - "remarks": "rule_set_305" + "remarks": "rule_set_302" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group ID", - "remarks": "rule_set_305" + "remarks": "rule_set_302" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_id", - "remarks": "rule_set_305" + "remarks": "rule_set_302" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group ID", - "remarks": "rule_set_305" + "remarks": "rule_set_302" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_name", - "remarks": "rule_set_306" + "remarks": "rule_set_303" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique Names", - "remarks": "rule_set_306" + "remarks": "rule_set_303" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_name", - "remarks": "rule_set_306" + "remarks": "rule_set_303" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique Names", - "remarks": "rule_set_306" + "remarks": "rule_set_303" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_name", - "remarks": "rule_set_307" + "remarks": "rule_set_304" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group Names", - "remarks": "rule_set_307" + "remarks": "rule_set_304" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_name", - "remarks": "rule_set_307" + "remarks": "rule_set_304" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group Names", - "remarks": "rule_set_307" + "remarks": "rule_set_304" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_interactive_home_directory_exists", - "remarks": "rule_set_308" + "remarks": "rule_set_305" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive Users Home Directories Must Exist", - "remarks": "rule_set_308" + "remarks": "rule_set_305" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_interactive_home_directory_exists", - "remarks": "rule_set_308" + "remarks": "rule_set_305" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive Users Home Directories Must Exist", - "remarks": "rule_set_308" + "remarks": "rule_set_305" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_home_directories", - "remarks": "rule_set_309" + "remarks": "rule_set_306" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Be Owned By The Primary User", - "remarks": "rule_set_309" + "remarks": "rule_set_306" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_home_directories", - "remarks": "rule_set_309" + "remarks": "rule_set_306" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Be Owned By The Primary User", - "remarks": "rule_set_309" + "remarks": "rule_set_306" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_home_directories", - "remarks": "rule_set_310" + "remarks": "rule_set_307" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", - "remarks": "rule_set_310" + "remarks": "rule_set_307" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_home_directories", - "remarks": "rule_set_310" + "remarks": "rule_set_307" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", - "remarks": "rule_set_310" + "remarks": "rule_set_307" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_311" + "remarks": "rule_set_308" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_311" + "remarks": "rule_set_308" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_311" + "remarks": "rule_set_308" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_311" + "remarks": "rule_set_308" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_312" + "remarks": "rule_set_309" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_312" + "remarks": "rule_set_309" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_312" + "remarks": "rule_set_309" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_312" + "remarks": "rule_set_309" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_no_world_writable_programs", - "remarks": "rule_set_313" + "remarks": "rule_set_310" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Not Run World-Writable Programs", - "remarks": "rule_set_313" + "remarks": "rule_set_310" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_no_world_writable_programs", - "remarks": "rule_set_313" + "remarks": "rule_set_310" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Not Run World-Writable Programs", - "remarks": "rule_set_313" + "remarks": "rule_set_310" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_314" + "remarks": "rule_set_311" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_314" + "remarks": "rule_set_311" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_314" + "remarks": "rule_set_311" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_314" + "remarks": "rule_set_311" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_forward_files", - "remarks": "rule_set_315" + "remarks": "rule_set_312" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .forward Files Exist", - "remarks": "rule_set_315" + "remarks": "rule_set_312" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_forward_files", - "remarks": "rule_set_315" + "remarks": "rule_set_312" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .forward Files Exist", - "remarks": "rule_set_315" + "remarks": "rule_set_312" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_netrc_files", - "remarks": "rule_set_316" + "remarks": "rule_set_313" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No netrc Files Exist", - "remarks": "rule_set_316" + "remarks": "rule_set_313" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_netrc_files", - "remarks": "rule_set_316" + "remarks": "rule_set_313" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No netrc Files Exist", - "remarks": "rule_set_316" + "remarks": "rule_set_313" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rhost_files", - "remarks": "rule_set_317" + "remarks": "rule_set_314" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .rhost Files Exist", - "remarks": "rule_set_317" + "remarks": "rule_set_314" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rhost_files", - "remarks": "rule_set_317" + "remarks": "rule_set_314" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .rhost Files Exist", - "remarks": "rule_set_317" + "remarks": "rule_set_314" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_bash_history", - "remarks": "rule_set_318" + "remarks": "rule_set_315" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure User Bash History File Has Correct Permissions", - "remarks": "rule_set_318" + "remarks": "rule_set_315" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_bash_history", - "remarks": "rule_set_318" + "remarks": "rule_set_315" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure User Bash History File Has Correct Permissions", - "remarks": "rule_set_318" + "remarks": "rule_set_315" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_overlayfs_disabled", - "remarks": "rule_set_319" + "remarks": "rule_set_316" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure overlayfs kernel module is not available", - "remarks": "rule_set_319" + "remarks": "rule_set_316" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_overlayfs_disabled", - "remarks": "rule_set_319" + "remarks": "rule_set_316" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure overlayfs kernel module is not available", - "remarks": "rule_set_319" + "remarks": "rule_set_316" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_squashfs_disabled", - "remarks": "rule_set_320" + "remarks": "rule_set_317" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Mounting of squashfs", - "remarks": "rule_set_320" + "remarks": "rule_set_317" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_squashfs_disabled", - "remarks": "rule_set_320" + "remarks": "rule_set_317" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Mounting of squashfs", - "remarks": "rule_set_320" + "remarks": "rule_set_317" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_udf_disabled", - "remarks": "rule_set_321" + "remarks": "rule_set_318" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Mounting of udf", - "remarks": "rule_set_321" + "remarks": "rule_set_318" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_udf_disabled", - "remarks": "rule_set_321" + "remarks": "rule_set_318" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Mounting of udf", - "remarks": "rule_set_321" + "remarks": "rule_set_318" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_firewire-core_disabled", - "remarks": "rule_set_322" + "remarks": "rule_set_319" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable IEEE 1394 (FireWire) Support", - "remarks": "rule_set_322" + "remarks": "rule_set_319" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_firewire-core_disabled", - "remarks": "rule_set_322" + "remarks": "rule_set_319" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable IEEE 1394 (FireWire) Support", - "remarks": "rule_set_322" + "remarks": "rule_set_319" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_usb-storage_disabled", - "remarks": "rule_set_323" + "remarks": "rule_set_320" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Modprobe Loading of USB Storage Driver", - "remarks": "rule_set_323" + "remarks": "rule_set_320" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_usb-storage_disabled", - "remarks": "rule_set_323" + "remarks": "rule_set_320" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Modprobe Loading of USB Storage Driver", - "remarks": "rule_set_323" + "remarks": "rule_set_320" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_home", - "remarks": "rule_set_324" + "remarks": "rule_set_321" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /home Located On Separate Partition", - "remarks": "rule_set_324" + "remarks": "rule_set_321" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_home", - "remarks": "rule_set_324" + "remarks": "rule_set_321" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /home Located On Separate Partition", - "remarks": "rule_set_324" + "remarks": "rule_set_321" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var", - "remarks": "rule_set_325" + "remarks": "rule_set_322" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var Located On Separate Partition", - "remarks": "rule_set_325" + "remarks": "rule_set_322" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var", - "remarks": "rule_set_325" + "remarks": "rule_set_322" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var Located On Separate Partition", - "remarks": "rule_set_325" + "remarks": "rule_set_322" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_tmp", - "remarks": "rule_set_326" + "remarks": "rule_set_323" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/tmp Located On Separate Partition", - "remarks": "rule_set_326" + "remarks": "rule_set_323" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_tmp", - "remarks": "rule_set_326" + "remarks": "rule_set_323" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/tmp Located On Separate Partition", - "remarks": "rule_set_326" + "remarks": "rule_set_323" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log", - "remarks": "rule_set_327" + "remarks": "rule_set_324" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log Located On Separate Partition", - "remarks": "rule_set_327" + "remarks": "rule_set_324" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log", - "remarks": "rule_set_327" + "remarks": "rule_set_324" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log Located On Separate Partition", - "remarks": "rule_set_327" + "remarks": "rule_set_324" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log_audit", - "remarks": "rule_set_328" + "remarks": "rule_set_325" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log/audit Located On Separate Partition", - "remarks": "rule_set_328" + "remarks": "rule_set_325" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log_audit", - "remarks": "rule_set_328" + "remarks": "rule_set_325" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log/audit Located On Separate Partition", - "remarks": "rule_set_328" + "remarks": "rule_set_325" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_weak_deps", - "remarks": "rule_set_329" + "remarks": "rule_set_326" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Installation of Weak Dependencies in DNF", - "remarks": "rule_set_329" + "remarks": "rule_set_326" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_weak_deps", - "remarks": "rule_set_329" + "remarks": "rule_set_326" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Installation of Weak Dependencies in DNF", - "remarks": "rule_set_329" + "remarks": "rule_set_326" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_state", - "remarks": "rule_set_330" + "remarks": "rule_set_327" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SELinux State is Enforcing", - "remarks": "rule_set_330" + "remarks": "rule_set_327" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_state", - "remarks": "rule_set_330" + "remarks": "rule_set_327" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SELinux State is Enforcing", - "remarks": "rule_set_330" + "remarks": "rule_set_327" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_symlinks", - "remarks": "rule_set_331" + "remarks": "rule_set_328" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", - "remarks": "rule_set_331" + "remarks": "rule_set_328" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_symlinks", - "remarks": "rule_set_331" + "remarks": "rule_set_328" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", - "remarks": "rule_set_331" + "remarks": "rule_set_328" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_automount", - "remarks": "rule_set_332" + "remarks": "rule_set_329" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automounting", - "remarks": "rule_set_332" + "remarks": "rule_set_329" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_automount", - "remarks": "rule_set_332" + "remarks": "rule_set_329" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automounting", - "remarks": "rule_set_332" + "remarks": "rule_set_329" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_automount_open", - "remarks": "rule_set_333" + "remarks": "rule_set_330" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automount Opening", - "remarks": "rule_set_333" + "remarks": "rule_set_330" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_automount_open", - "remarks": "rule_set_333" + "remarks": "rule_set_330" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automount Opening", - "remarks": "rule_set_333" + "remarks": "rule_set_330" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "xwayland_disabled", - "remarks": "rule_set_334" + "remarks": "rule_set_331" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable XWayland", - "remarks": "rule_set_334" + "remarks": "rule_set_331" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "xwayland_disabled", - "remarks": "rule_set_334" + "remarks": "rule_set_331" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable XWayland", - "remarks": "rule_set_334" + "remarks": "rule_set_331" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_autofs_disabled", - "remarks": "rule_set_335" + "remarks": "rule_set_332" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the Automounter", - "remarks": "rule_set_335" + "remarks": "rule_set_332" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_autofs_disabled", - "remarks": "rule_set_335" + "remarks": "rule_set_332" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the Automounter", - "remarks": "rule_set_335" + "remarks": "rule_set_332" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_avahi-daemon_disabled", - "remarks": "rule_set_336" + "remarks": "rule_set_333" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Avahi Server Software", - "remarks": "rule_set_336" + "remarks": "rule_set_333" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_avahi-daemon_disabled", - "remarks": "rule_set_336" + "remarks": "rule_set_333" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Avahi Server Software", - "remarks": "rule_set_336" + "remarks": "rule_set_333" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_cockpit_disabled", - "remarks": "rule_set_337" + "remarks": "rule_set_334" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Cockpit Management Server", - "remarks": "rule_set_337" + "remarks": "rule_set_334" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_cockpit_disabled", - "remarks": "rule_set_337" + "remarks": "rule_set_334" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Cockpit Management Server", - "remarks": "rule_set_337" + "remarks": "rule_set_334" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_openldap-clients_removed", - "remarks": "rule_set_338" + "remarks": "rule_set_335" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure LDAP client is not installed", - "remarks": "rule_set_338" + "remarks": "rule_set_335" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_openldap-clients_removed", - "remarks": "rule_set_338" + "remarks": "rule_set_335" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure LDAP client is not installed", - "remarks": "rule_set_338" + "remarks": "rule_set_335" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_bluetooth_disabled", - "remarks": "rule_set_339" + "remarks": "rule_set_336" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Bluetooth Service", - "remarks": "rule_set_339" + "remarks": "rule_set_336" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_bluetooth_disabled", - "remarks": "rule_set_339" + "remarks": "rule_set_336" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Bluetooth Service", - "remarks": "rule_set_339" + "remarks": "rule_set_336" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_nopasswd", - "remarks": "rule_set_340" + "remarks": "rule_set_337" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD", - "remarks": "rule_set_340" + "remarks": "rule_set_337" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_nopasswd", - "remarks": "rule_set_340" + "remarks": "rule_set_337" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD", - "remarks": "rule_set_340" + "remarks": "rule_set_337" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny_root", - "remarks": "rule_set_341" + "remarks": "rule_set_338" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the root Account for Failed Password Attempts", - "remarks": "rule_set_341" + "remarks": "rule_set_338" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny_root", - "remarks": "rule_set_341" + "remarks": "rule_set_338" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the root Account for Failed Password Attempts", - "remarks": "rule_set_341" + "remarks": "rule_set_338" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_minimum_age_login_defs", - "remarks": "rule_set_342" + "remarks": "rule_set_339" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Minimum Age", - "remarks": "rule_set_342" + "remarks": "rule_set_339" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_minimum_age_login_defs", - "remarks": "rule_set_342" + "remarks": "rule_set_339" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Minimum Age", - "remarks": "rule_set_342" + "remarks": "rule_set_339" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_min_life_existing", - "remarks": "rule_set_343" + "remarks": "rule_set_340" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Minimum Age", - "remarks": "rule_set_343" + "remarks": "rule_set_340" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_min_life_existing", - "remarks": "rule_set_343" + "remarks": "rule_set_340" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Minimum Age", - "remarks": "rule_set_343" + "remarks": "rule_set_340" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_nologin_in_shells", - "remarks": "rule_set_344" + "remarks": "rule_set_341" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure nologin Shell is Not Listed in /etc/shells", - "remarks": "rule_set_344" + "remarks": "rule_set_341" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_nologin_in_shells", - "remarks": "rule_set_344" + "remarks": "rule_set_341" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure nologin Shell is Not Listed in /etc/shells", - "remarks": "rule_set_344" + "remarks": "rule_set_341" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit_installed", - "remarks": "rule_set_345" + "remarks": "rule_set_342" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit Subsystem is Installed", - "remarks": "rule_set_345" + "remarks": "rule_set_342" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit_installed", - "remarks": "rule_set_345" + "remarks": "rule_set_342" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit Subsystem is Installed", - "remarks": "rule_set_345" + "remarks": "rule_set_342" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit-libs_installed", - "remarks": "rule_set_346" + "remarks": "rule_set_343" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit-libs package as a part of audit Subsystem is Installed", - "remarks": "rule_set_346" + "remarks": "rule_set_343" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit-libs_installed", - "remarks": "rule_set_346" + "remarks": "rule_set_343" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit-libs package as a part of audit Subsystem is Installed", - "remarks": "rule_set_346" + "remarks": "rule_set_343" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_argument", - "remarks": "rule_set_347" + "remarks": "rule_set_344" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Auditing for Processes Which Start Prior to the Audit Daemon", - "remarks": "rule_set_347" + "remarks": "rule_set_344" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_argument", - "remarks": "rule_set_347" + "remarks": "rule_set_344" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Auditing for Processes Which Start Prior to the Audit Daemon", - "remarks": "rule_set_347" + "remarks": "rule_set_344" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_backlog_limit_argument", - "remarks": "rule_set_348" + "remarks": "rule_set_345" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Extend Audit Backlog Limit for the Audit Daemon", - "remarks": "rule_set_348" + "remarks": "rule_set_345" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_backlog_limit_argument", - "remarks": "rule_set_348" + "remarks": "rule_set_345" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Extend Audit Backlog Limit for the Audit Daemon", - "remarks": "rule_set_348" + "remarks": "rule_set_345" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_auditd_enabled", - "remarks": "rule_set_349" + "remarks": "rule_set_346" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable auditd Service", - "remarks": "rule_set_349" + "remarks": "rule_set_346" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_auditd_enabled", - "remarks": "rule_set_349" + "remarks": "rule_set_346" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable auditd Service", - "remarks": "rule_set_349" + "remarks": "rule_set_346" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_max_log_file", - "remarks": "rule_set_350" + "remarks": "rule_set_347" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Max Log File Size", - "remarks": "rule_set_350" + "remarks": "rule_set_347" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_max_log_file", - "remarks": "rule_set_350" + "remarks": "rule_set_347" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Max Log File Size", - "remarks": "rule_set_350" + "remarks": "rule_set_347" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_max_log_file_action", - "remarks": "rule_set_351" + "remarks": "rule_set_348" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd max_log_file_action Upon Reaching Maximum Log Size", - "remarks": "rule_set_351" + "remarks": "rule_set_348" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_max_log_file_action", - "remarks": "rule_set_351" + "remarks": "rule_set_348" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd max_log_file_action Upon Reaching Maximum Log Size", - "remarks": "rule_set_351" + "remarks": "rule_set_348" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_disk_error_action", - "remarks": "rule_set_352" + "remarks": "rule_set_349" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Disk Error Action on Disk Error", - "remarks": "rule_set_352" + "remarks": "rule_set_349" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_disk_error_action", - "remarks": "rule_set_352" + "remarks": "rule_set_349" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Disk Error Action on Disk Error", - "remarks": "rule_set_352" + "remarks": "rule_set_349" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_disk_full_action", - "remarks": "rule_set_353" + "remarks": "rule_set_350" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Disk Full Action when Disk Space Is Full", - "remarks": "rule_set_353" + "remarks": "rule_set_350" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_disk_full_action", - "remarks": "rule_set_353" + "remarks": "rule_set_350" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Disk Full Action when Disk Space Is Full", - "remarks": "rule_set_353" + "remarks": "rule_set_350" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_admin_space_left_action", - "remarks": "rule_set_354" + "remarks": "rule_set_351" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd admin_space_left Action on Low Disk Space", - "remarks": "rule_set_354" + "remarks": "rule_set_351" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_admin_space_left_action", - "remarks": "rule_set_354" + "remarks": "rule_set_351" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd admin_space_left Action on Low Disk Space", - "remarks": "rule_set_354" + "remarks": "rule_set_351" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_space_left_action", - "remarks": "rule_set_355" + "remarks": "rule_set_352" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd space_left Action on Low Disk Space", - "remarks": "rule_set_355" + "remarks": "rule_set_352" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_space_left_action", - "remarks": "rule_set_355" + "remarks": "rule_set_352" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd space_left Action on Low Disk Space", - "remarks": "rule_set_355" + "remarks": "rule_set_352" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_sysadmin_actions", - "remarks": "rule_set_356" + "remarks": "rule_set_353" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects System Administrator Actions", - "remarks": "rule_set_356" + "remarks": "rule_set_353" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_sysadmin_actions", - "remarks": "rule_set_356" + "remarks": "rule_set_353" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects System Administrator Actions", - "remarks": "rule_set_356" + "remarks": "rule_set_353" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_suid_auid_privilege_function", - "remarks": "rule_set_357" + "remarks": "rule_set_354" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events When Executables Are Run As Another User", - "remarks": "rule_set_357" + "remarks": "rule_set_354" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_suid_auid_privilege_function", - "remarks": "rule_set_357" + "remarks": "rule_set_354" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events When Executables Are Run As Another User", - "remarks": "rule_set_357" + "remarks": "rule_set_354" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_sudo_log_events", - "remarks": "rule_set_358" + "remarks": "rule_set_355" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to perform maintenance activities", - "remarks": "rule_set_358" + "remarks": "rule_set_355" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_sudo_log_events", - "remarks": "rule_set_358" + "remarks": "rule_set_355" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to perform maintenance activities", - "remarks": "rule_set_358" + "remarks": "rule_set_355" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_adjtimex", - "remarks": "rule_set_359" + "remarks": "rule_set_356" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through adjtimex", - "remarks": "rule_set_359" + "remarks": "rule_set_356" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_adjtimex", - "remarks": "rule_set_359" + "remarks": "rule_set_356" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through adjtimex", - "remarks": "rule_set_359" + "remarks": "rule_set_356" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_settimeofday", - "remarks": "rule_set_360" + "remarks": "rule_set_357" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through settimeofday", - "remarks": "rule_set_360" + "remarks": "rule_set_357" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_settimeofday", - "remarks": "rule_set_360" + "remarks": "rule_set_357" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through settimeofday", - "remarks": "rule_set_360" + "remarks": "rule_set_357" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_clock_settime", - "remarks": "rule_set_361" + "remarks": "rule_set_358" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through clock_settime", - "remarks": "rule_set_361" + "remarks": "rule_set_358" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_clock_settime", - "remarks": "rule_set_361" + "remarks": "rule_set_358" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through clock_settime", - "remarks": "rule_set_361" + "remarks": "rule_set_358" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_watch_localtime", - "remarks": "rule_set_362" + "remarks": "rule_set_359" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter the localtime File", - "remarks": "rule_set_362" + "remarks": "rule_set_359" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_watch_localtime", - "remarks": "rule_set_362" + "remarks": "rule_set_359" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter the localtime File", - "remarks": "rule_set_362" + "remarks": "rule_set_359" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_setdomainname", - "remarks": "rule_set_363" + "remarks": "rule_set_360" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - setdomainname", - "remarks": "rule_set_363" + "remarks": "rule_set_360" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_setdomainname", - "remarks": "rule_set_363" + "remarks": "rule_set_360" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - setdomainname", - "remarks": "rule_set_363" + "remarks": "rule_set_360" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_sethostname", - "remarks": "rule_set_364" + "remarks": "rule_set_361" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - sethostname", - "remarks": "rule_set_364" + "remarks": "rule_set_361" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_sethostname", - "remarks": "rule_set_364" + "remarks": "rule_set_361" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - sethostname", - "remarks": "rule_set_364" + "remarks": "rule_set_361" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_issue", - "remarks": "rule_set_365" + "remarks": "rule_set_362" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/issue", - "remarks": "rule_set_365" + "remarks": "rule_set_362" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_issue", - "remarks": "rule_set_365" + "remarks": "rule_set_362" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/issue", - "remarks": "rule_set_365" + "remarks": "rule_set_362" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_issue_net", - "remarks": "rule_set_366" + "remarks": "rule_set_363" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/issue.net", - "remarks": "rule_set_366" + "remarks": "rule_set_363" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_issue_net", - "remarks": "rule_set_366" + "remarks": "rule_set_363" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/issue.net", - "remarks": "rule_set_366" + "remarks": "rule_set_363" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_hosts", - "remarks": "rule_set_367" + "remarks": "rule_set_364" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/hosts", - "remarks": "rule_set_367" + "remarks": "rule_set_364" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_hosts", - "remarks": "rule_set_367" + "remarks": "rule_set_364" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/hosts", - "remarks": "rule_set_367" + "remarks": "rule_set_364" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_hostname_file", - "remarks": "rule_set_368" + "remarks": "rule_set_365" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/hostname", - "remarks": "rule_set_368" + "remarks": "rule_set_365" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_hostname_file", - "remarks": "rule_set_368" + "remarks": "rule_set_365" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/hostname", - "remarks": "rule_set_368" + "remarks": "rule_set_365" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_sysconfig_network", - "remarks": "rule_set_369" + "remarks": "rule_set_366" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/sysconfig/network", - "remarks": "rule_set_369" + "remarks": "rule_set_366" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_sysconfig_network", - "remarks": "rule_set_369" + "remarks": "rule_set_366" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/sysconfig/network", - "remarks": "rule_set_369" + "remarks": "rule_set_366" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_networkmanager_system_connections", - "remarks": "rule_set_370" + "remarks": "rule_set_367" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/system-connections/", - "remarks": "rule_set_370" + "remarks": "rule_set_367" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_networkmanager_system_connections", - "remarks": "rule_set_370" + "remarks": "rule_set_367" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/system-connections/", - "remarks": "rule_set_370" + "remarks": "rule_set_367" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_networkmanager", - "remarks": "rule_set_371" + "remarks": "rule_set_368" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/", - "remarks": "rule_set_371" + "remarks": "rule_set_368" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_networkmanager", - "remarks": "rule_set_371" + "remarks": "rule_set_368" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/", - "remarks": "rule_set_371" + "remarks": "rule_set_368" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands", - "remarks": "rule_set_372" + "remarks": "rule_set_369" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands", - "remarks": "rule_set_372" + "remarks": "rule_set_369" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands", - "remarks": "rule_set_372" + "remarks": "rule_set_369" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands", - "remarks": "rule_set_372" + "remarks": "rule_set_369" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_creat", - "remarks": "rule_set_373" + "remarks": "rule_set_370" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - creat", - "remarks": "rule_set_373" + "remarks": "rule_set_370" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_creat", - "remarks": "rule_set_373" + "remarks": "rule_set_370" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - creat", - "remarks": "rule_set_373" + "remarks": "rule_set_370" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_ftruncate", - "remarks": "rule_set_374" + "remarks": "rule_set_371" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - ftruncate", - "remarks": "rule_set_374" + "remarks": "rule_set_371" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_ftruncate", - "remarks": "rule_set_374" + "remarks": "rule_set_371" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - ftruncate", - "remarks": "rule_set_374" + "remarks": "rule_set_371" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_open", - "remarks": "rule_set_375" + "remarks": "rule_set_372" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - open", - "remarks": "rule_set_375" + "remarks": "rule_set_372" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_open", - "remarks": "rule_set_375" + "remarks": "rule_set_372" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - open", - "remarks": "rule_set_375" + "remarks": "rule_set_372" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_openat", - "remarks": "rule_set_376" + "remarks": "rule_set_373" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - openat", - "remarks": "rule_set_376" + "remarks": "rule_set_373" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_openat", - "remarks": "rule_set_376" + "remarks": "rule_set_373" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - openat", - "remarks": "rule_set_376" + "remarks": "rule_set_373" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_truncate", - "remarks": "rule_set_377" + "remarks": "rule_set_374" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - truncate", - "remarks": "rule_set_377" + "remarks": "rule_set_374" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_truncate", - "remarks": "rule_set_377" + "remarks": "rule_set_374" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - truncate", - "remarks": "rule_set_377" + "remarks": "rule_set_374" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_group", - "remarks": "rule_set_378" + "remarks": "rule_set_375" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/group", - "remarks": "rule_set_378" + "remarks": "rule_set_375" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_group", - "remarks": "rule_set_378" + "remarks": "rule_set_375" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/group", - "remarks": "rule_set_378" + "remarks": "rule_set_375" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_passwd", - "remarks": "rule_set_379" + "remarks": "rule_set_376" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/passwd", - "remarks": "rule_set_379" + "remarks": "rule_set_376" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_passwd", - "remarks": "rule_set_379" + "remarks": "rule_set_376" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/passwd", - "remarks": "rule_set_379" + "remarks": "rule_set_376" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_gshadow", - "remarks": "rule_set_380" + "remarks": "rule_set_377" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/gshadow", - "remarks": "rule_set_380" + "remarks": "rule_set_377" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_gshadow", - "remarks": "rule_set_380" + "remarks": "rule_set_377" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/gshadow", - "remarks": "rule_set_380" + "remarks": "rule_set_377" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_shadow", - "remarks": "rule_set_381" + "remarks": "rule_set_378" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/shadow", - "remarks": "rule_set_381" + "remarks": "rule_set_378" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_shadow", - "remarks": "rule_set_381" + "remarks": "rule_set_378" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/shadow", - "remarks": "rule_set_381" + "remarks": "rule_set_378" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_opasswd", - "remarks": "rule_set_382" + "remarks": "rule_set_379" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", - "remarks": "rule_set_382" + "remarks": "rule_set_379" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_opasswd", - "remarks": "rule_set_382" + "remarks": "rule_set_379" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", - "remarks": "rule_set_382" + "remarks": "rule_set_379" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_nsswitch_conf", - "remarks": "rule_set_383" + "remarks": "rule_set_380" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/nsswitch.conf", - "remarks": "rule_set_383" + "remarks": "rule_set_380" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_nsswitch_conf", - "remarks": "rule_set_383" + "remarks": "rule_set_380" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/nsswitch.conf", - "remarks": "rule_set_383" + "remarks": "rule_set_380" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_pam_conf", - "remarks": "rule_set_384" + "remarks": "rule_set_381" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/pam.conf", - "remarks": "rule_set_384" + "remarks": "rule_set_381" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_pam_conf", - "remarks": "rule_set_384" + "remarks": "rule_set_381" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/pam.conf", - "remarks": "rule_set_384" + "remarks": "rule_set_381" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_pamd", - "remarks": "rule_set_385" + "remarks": "rule_set_382" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/pam.d/", - "remarks": "rule_set_385" + "remarks": "rule_set_382" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_pamd", - "remarks": "rule_set_385" + "remarks": "rule_set_382" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/pam.d/", - "remarks": "rule_set_385" + "remarks": "rule_set_382" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chmod", - "remarks": "rule_set_386" + "remarks": "rule_set_383" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", - "remarks": "rule_set_386" + "remarks": "rule_set_383" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chmod", - "remarks": "rule_set_386" + "remarks": "rule_set_383" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", - "remarks": "rule_set_386" + "remarks": "rule_set_383" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmod", - "remarks": "rule_set_387" + "remarks": "rule_set_384" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmod", - "remarks": "rule_set_387" + "remarks": "rule_set_384" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmod", - "remarks": "rule_set_387" + "remarks": "rule_set_384" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmod", - "remarks": "rule_set_387" + "remarks": "rule_set_384" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat", - "remarks": "rule_set_388" + "remarks": "rule_set_385" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat", - "remarks": "rule_set_388" + "remarks": "rule_set_385" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat", - "remarks": "rule_set_388" + "remarks": "rule_set_385" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat", - "remarks": "rule_set_388" + "remarks": "rule_set_385" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat2", - "remarks": "rule_set_389" + "remarks": "rule_set_386" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat2", - "remarks": "rule_set_389" + "remarks": "rule_set_386" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat2", - "remarks": "rule_set_389" + "remarks": "rule_set_386" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat2", - "remarks": "rule_set_389" + "remarks": "rule_set_386" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chown", - "remarks": "rule_set_390" + "remarks": "rule_set_387" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chown", - "remarks": "rule_set_390" + "remarks": "rule_set_387" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chown", - "remarks": "rule_set_390" + "remarks": "rule_set_387" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chown", - "remarks": "rule_set_390" + "remarks": "rule_set_387" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchown", - "remarks": "rule_set_391" + "remarks": "rule_set_388" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchown", - "remarks": "rule_set_391" + "remarks": "rule_set_388" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchown", - "remarks": "rule_set_391" + "remarks": "rule_set_388" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchown", - "remarks": "rule_set_391" + "remarks": "rule_set_388" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchownat", - "remarks": "rule_set_392" + "remarks": "rule_set_389" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchownat", - "remarks": "rule_set_392" + "remarks": "rule_set_389" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchownat", - "remarks": "rule_set_392" + "remarks": "rule_set_389" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchownat", - "remarks": "rule_set_392" + "remarks": "rule_set_389" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lchown", - "remarks": "rule_set_393" + "remarks": "rule_set_390" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lchown", - "remarks": "rule_set_393" + "remarks": "rule_set_390" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lchown", - "remarks": "rule_set_393" + "remarks": "rule_set_390" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lchown", - "remarks": "rule_set_393" + "remarks": "rule_set_390" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fremovexattr", - "remarks": "rule_set_394" + "remarks": "rule_set_391" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fremovexattr", - "remarks": "rule_set_394" + "remarks": "rule_set_391" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fremovexattr", - "remarks": "rule_set_394" + "remarks": "rule_set_391" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fremovexattr", - "remarks": "rule_set_394" + "remarks": "rule_set_391" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fsetxattr", - "remarks": "rule_set_395" + "remarks": "rule_set_392" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fsetxattr", - "remarks": "rule_set_395" + "remarks": "rule_set_392" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fsetxattr", - "remarks": "rule_set_395" + "remarks": "rule_set_392" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fsetxattr", - "remarks": "rule_set_395" + "remarks": "rule_set_392" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lremovexattr", - "remarks": "rule_set_396" + "remarks": "rule_set_393" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lremovexattr", - "remarks": "rule_set_396" + "remarks": "rule_set_393" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lremovexattr", - "remarks": "rule_set_396" + "remarks": "rule_set_393" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lremovexattr", - "remarks": "rule_set_396" + "remarks": "rule_set_393" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lsetxattr", - "remarks": "rule_set_397" + "remarks": "rule_set_394" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lsetxattr", - "remarks": "rule_set_397" + "remarks": "rule_set_394" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lsetxattr", - "remarks": "rule_set_397" + "remarks": "rule_set_394" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lsetxattr", - "remarks": "rule_set_397" + "remarks": "rule_set_394" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_removexattr", - "remarks": "rule_set_398" + "remarks": "rule_set_395" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - removexattr", - "remarks": "rule_set_398" + "remarks": "rule_set_395" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_removexattr", - "remarks": "rule_set_398" + "remarks": "rule_set_395" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - removexattr", - "remarks": "rule_set_398" + "remarks": "rule_set_395" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_setxattr", - "remarks": "rule_set_399" + "remarks": "rule_set_396" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - setxattr", - "remarks": "rule_set_399" + "remarks": "rule_set_396" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_setxattr", - "remarks": "rule_set_399" + "remarks": "rule_set_396" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - setxattr", - "remarks": "rule_set_399" + "remarks": "rule_set_396" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_media_export", - "remarks": "rule_set_400" + "remarks": "rule_set_397" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Exporting to Media (successful)", - "remarks": "rule_set_400" + "remarks": "rule_set_397" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_media_export", - "remarks": "rule_set_400" + "remarks": "rule_set_397" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Exporting to Media (successful)", - "remarks": "rule_set_400" + "remarks": "rule_set_397" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_utmp", - "remarks": "rule_set_401" + "remarks": "rule_set_398" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information utmp", - "remarks": "rule_set_401" + "remarks": "rule_set_398" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_utmp", - "remarks": "rule_set_401" + "remarks": "rule_set_398" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information utmp", - "remarks": "rule_set_401" + "remarks": "rule_set_398" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_btmp", - "remarks": "rule_set_402" + "remarks": "rule_set_399" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information btmp", - "remarks": "rule_set_402" + "remarks": "rule_set_399" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_btmp", - "remarks": "rule_set_402" + "remarks": "rule_set_399" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information btmp", - "remarks": "rule_set_402" + "remarks": "rule_set_399" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_wtmp", - "remarks": "rule_set_403" + "remarks": "rule_set_400" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", - "remarks": "rule_set_403" + "remarks": "rule_set_400" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_wtmp", - "remarks": "rule_set_403" + "remarks": "rule_set_400" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", - "remarks": "rule_set_403" + "remarks": "rule_set_400" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_faillock", - "remarks": "rule_set_404" + "remarks": "rule_set_401" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - faillock", - "remarks": "rule_set_404" + "remarks": "rule_set_401" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_faillock", - "remarks": "rule_set_404" + "remarks": "rule_set_401" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - faillock", - "remarks": "rule_set_404" + "remarks": "rule_set_401" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_lastlog", - "remarks": "rule_set_405" + "remarks": "rule_set_402" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - lastlog", - "remarks": "rule_set_405" + "remarks": "rule_set_402" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_lastlog", - "remarks": "rule_set_405" + "remarks": "rule_set_402" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - lastlog", - "remarks": "rule_set_405" + "remarks": "rule_set_402" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlink", - "remarks": "rule_set_406" + "remarks": "rule_set_403" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlink", - "remarks": "rule_set_406" + "remarks": "rule_set_403" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlink", - "remarks": "rule_set_406" + "remarks": "rule_set_403" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlink", - "remarks": "rule_set_406" + "remarks": "rule_set_403" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlinkat", - "remarks": "rule_set_407" + "remarks": "rule_set_404" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlinkat", - "remarks": "rule_set_407" + "remarks": "rule_set_404" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlinkat", - "remarks": "rule_set_407" + "remarks": "rule_set_404" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlinkat", - "remarks": "rule_set_407" + "remarks": "rule_set_404" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rename", - "remarks": "rule_set_408" + "remarks": "rule_set_405" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rename", - "remarks": "rule_set_408" + "remarks": "rule_set_405" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rename", - "remarks": "rule_set_408" + "remarks": "rule_set_405" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rename", - "remarks": "rule_set_408" + "remarks": "rule_set_405" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat", - "remarks": "rule_set_409" + "remarks": "rule_set_406" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat", - "remarks": "rule_set_409" + "remarks": "rule_set_406" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat", - "remarks": "rule_set_409" + "remarks": "rule_set_406" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat", - "remarks": "rule_set_409" + "remarks": "rule_set_406" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat2", - "remarks": "rule_set_410" + "remarks": "rule_set_407" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat2", - "remarks": "rule_set_410" + "remarks": "rule_set_407" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat2", - "remarks": "rule_set_410" + "remarks": "rule_set_407" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat2", - "remarks": "rule_set_410" + "remarks": "rule_set_407" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_etc_selinux", - "remarks": "rule_set_411" + "remarks": "rule_set_408" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls (/etc/selinux)", - "remarks": "rule_set_411" + "remarks": "rule_set_408" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_etc_selinux", - "remarks": "rule_set_411" + "remarks": "rule_set_408" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls (/etc/selinux)", - "remarks": "rule_set_411" + "remarks": "rule_set_408" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_usr_share", - "remarks": "rule_set_412" + "remarks": "rule_set_409" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls in usr/share", - "remarks": "rule_set_412" + "remarks": "rule_set_409" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_usr_share", - "remarks": "rule_set_412" + "remarks": "rule_set_409" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls in usr/share", - "remarks": "rule_set_412" + "remarks": "rule_set_409" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chcon", - "remarks": "rule_set_413" + "remarks": "rule_set_410" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chcon", - "remarks": "rule_set_413" + "remarks": "rule_set_410" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chcon", - "remarks": "rule_set_413" + "remarks": "rule_set_410" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chcon", - "remarks": "rule_set_413" + "remarks": "rule_set_410" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_setfacl", - "remarks": "rule_set_414" + "remarks": "rule_set_411" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run setfacl", - "remarks": "rule_set_414" + "remarks": "rule_set_411" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_setfacl", - "remarks": "rule_set_414" + "remarks": "rule_set_411" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run setfacl", - "remarks": "rule_set_414" + "remarks": "rule_set_411" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chacl", - "remarks": "rule_set_415" + "remarks": "rule_set_412" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chacl", - "remarks": "rule_set_415" + "remarks": "rule_set_412" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chacl", - "remarks": "rule_set_415" + "remarks": "rule_set_412" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chacl", - "remarks": "rule_set_415" + "remarks": "rule_set_412" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_usermod", - "remarks": "rule_set_416" + "remarks": "rule_set_413" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - usermod", - "remarks": "rule_set_416" + "remarks": "rule_set_413" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_usermod", - "remarks": "rule_set_416" + "remarks": "rule_set_413" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - usermod", - "remarks": "rule_set_416" + "remarks": "rule_set_413" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_kmod", - "remarks": "rule_set_417" + "remarks": "rule_set_414" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - kmod", - "remarks": "rule_set_417" + "remarks": "rule_set_414" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_kmod", - "remarks": "rule_set_417" + "remarks": "rule_set_414" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - kmod", - "remarks": "rule_set_417" + "remarks": "rule_set_414" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_init", - "remarks": "rule_set_418" + "remarks": "rule_set_415" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading - init_module", - "remarks": "rule_set_418" + "remarks": "rule_set_415" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_init", - "remarks": "rule_set_418" + "remarks": "rule_set_415" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading - init_module", - "remarks": "rule_set_418" + "remarks": "rule_set_415" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_finit", - "remarks": "rule_set_419" + "remarks": "rule_set_416" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - finit_module", - "remarks": "rule_set_419" + "remarks": "rule_set_416" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_finit", - "remarks": "rule_set_419" + "remarks": "rule_set_416" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - finit_module", - "remarks": "rule_set_419" + "remarks": "rule_set_416" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_delete", - "remarks": "rule_set_420" + "remarks": "rule_set_417" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Unloading - delete_module", - "remarks": "rule_set_420" + "remarks": "rule_set_417" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_delete", - "remarks": "rule_set_420" + "remarks": "rule_set_417" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Unloading - delete_module", - "remarks": "rule_set_420" + "remarks": "rule_set_417" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_query", - "remarks": "rule_set_421" + "remarks": "rule_set_418" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - query_module", - "remarks": "rule_set_421" + "remarks": "rule_set_418" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_query", - "remarks": "rule_set_421" + "remarks": "rule_set_418" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - query_module", - "remarks": "rule_set_421" + "remarks": "rule_set_418" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_continue_loading", - "remarks": "rule_set_422" + "remarks": "rule_set_419" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Audit Configuration is Loaded Regardless of Errors", - "remarks": "rule_set_422" + "remarks": "rule_set_419" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_continue_loading", - "remarks": "rule_set_422" + "remarks": "rule_set_419" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Audit Configuration is Loaded Regardless of Errors", - "remarks": "rule_set_422" + "remarks": "rule_set_419" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_immutable", - "remarks": "rule_set_423" + "remarks": "rule_set_420" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Make the auditd Configuration Immutable", - "remarks": "rule_set_423" + "remarks": "rule_set_420" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_immutable", - "remarks": "rule_set_423" + "remarks": "rule_set_420" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Make the auditd Configuration Immutable", - "remarks": "rule_set_423" + "remarks": "rule_set_420" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_var_log_audit", - "remarks": "rule_set_424" + "remarks": "rule_set_421" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0750 or Less Permissive", - "remarks": "rule_set_424" + "remarks": "rule_set_421" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_var_log_audit", - "remarks": "rule_set_424" + "remarks": "rule_set_421" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0750 or Less Permissive", - "remarks": "rule_set_424" + "remarks": "rule_set_421" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_var_log_audit", - "remarks": "rule_set_425" + "remarks": "rule_set_422" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0640 or Less Permissive", - "remarks": "rule_set_425" + "remarks": "rule_set_422" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_var_log_audit", - "remarks": "rule_set_425" + "remarks": "rule_set_422" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0640 or Less Permissive", - "remarks": "rule_set_425" + "remarks": "rule_set_422" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_var_log_audit_stig", - "remarks": "rule_set_426" + "remarks": "rule_set_423" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Owned By Root", - "remarks": "rule_set_426" + "remarks": "rule_set_423" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_var_log_audit_stig", - "remarks": "rule_set_426" + "remarks": "rule_set_423" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Owned By Root", - "remarks": "rule_set_426" + "remarks": "rule_set_423" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_group_ownership_var_log_audit", - "remarks": "rule_set_427" + "remarks": "rule_set_424" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Group Owned By Root", - "remarks": "rule_set_427" + "remarks": "rule_set_424" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_group_ownership_var_log_audit", - "remarks": "rule_set_427" + "remarks": "rule_set_424" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Group Owned By Root", - "remarks": "rule_set_427" + "remarks": "rule_set_424" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_audit_configuration", - "remarks": "rule_set_428" + "remarks": "rule_set_425" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Permissions are 640 or More Restrictive", - "remarks": "rule_set_428" + "remarks": "rule_set_425" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_audit_configuration", - "remarks": "rule_set_428" + "remarks": "rule_set_425" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Permissions are 640 or More Restrictive", - "remarks": "rule_set_428" + "remarks": "rule_set_425" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_audit_configuration", - "remarks": "rule_set_429" + "remarks": "rule_set_426" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Must Be Owned By Root", - "remarks": "rule_set_429" + "remarks": "rule_set_426" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_audit_configuration", - "remarks": "rule_set_429" + "remarks": "rule_set_426" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Must Be Owned By Root", - "remarks": "rule_set_429" + "remarks": "rule_set_426" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_audit_configuration", - "remarks": "rule_set_430" + "remarks": "rule_set_427" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Must Be Owned By Group root", - "remarks": "rule_set_430" + "remarks": "rule_set_427" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_audit_configuration", - "remarks": "rule_set_430" + "remarks": "rule_set_427" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Must Be Owned By Group root", - "remarks": "rule_set_430" + "remarks": "rule_set_427" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_audit_binaries", - "remarks": "rule_set_431" + "remarks": "rule_set_428" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools Have Mode 0755 or less", - "remarks": "rule_set_431" + "remarks": "rule_set_428" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_audit_binaries", - "remarks": "rule_set_431" + "remarks": "rule_set_428" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools Have Mode 0755 or less", - "remarks": "rule_set_431" + "remarks": "rule_set_428" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_audit_binaries", - "remarks": "rule_set_432" + "remarks": "rule_set_429" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools are owned by root", - "remarks": "rule_set_432" + "remarks": "rule_set_429" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_audit_binaries", - "remarks": "rule_set_432" + "remarks": "rule_set_429" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools are owned by root", - "remarks": "rule_set_432" + "remarks": "rule_set_429" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_audit_binaries", - "remarks": "rule_set_433" + "remarks": "rule_set_430" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools are owned by group root", - "remarks": "rule_set_433" + "remarks": "rule_set_430" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_audit_binaries", - "remarks": "rule_set_433" + "remarks": "rule_set_430" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools are owned by group root", - "remarks": "rule_set_433" + "remarks": "rule_set_430" } ], "control-implementations": [ { - "uuid": "a4602f16-ecab-4b67-b063-f816a429ddf0", + "uuid": "50cc5ed7-04fb-4617-a437-a23b43d7b6b1", "source": "trestle://profiles/rhel10-cis_rhel10-l2_workstation/profile.json", "description": "Control implementation for cis_workstation_l2", "props": [ @@ -25001,7 +24877,7 @@ ], "implemented-requirements": [ { - "uuid": "e4f80499-a95e-4d98-8365-2e790e23bc5a", + "uuid": "6781c969-55e3-4c9a-976a-5ecd1e765c30", "control-id": "cis_rhel10_1-1.1.6", "description": "No notes for control-id 1.1.1.6.", "props": [ @@ -25018,7 +24894,7 @@ ] }, { - "uuid": "c9470cc2-f721-444e-888a-ed69b4e774e3", + "uuid": "35229d8a-a254-41ee-a7ea-087eaf3250c1", "control-id": "cis_rhel10_1-1.1.7", "description": "No notes for control-id 1.1.1.7.", "props": [ @@ -25035,7 +24911,7 @@ ] }, { - "uuid": "49047d60-7cd7-48dd-93f1-17baed5a272c", + "uuid": "dea4ffca-c179-4df6-b6b2-2bb88c67dad7", "control-id": "cis_rhel10_1-1.1.8", "description": "No notes for control-id 1.1.1.8.", "props": [ @@ -25052,7 +24928,7 @@ ] }, { - "uuid": "0fb4a557-fd2c-4ea2-8416-20c2e0b95c46", + "uuid": "62d2f837-306f-4232-aebd-7e5a04745427", "control-id": "cis_rhel10_1-1.1.9", "description": "No notes for control-id 1.1.1.9.", "props": [ @@ -25069,7 +24945,7 @@ ] }, { - "uuid": "da5e9d55-ec94-4981-aff2-401fcdccb9b4", + "uuid": "00ee30a1-70ce-459b-83a0-c66a14c9bc65", "control-id": "cis_rhel10_1-1.1.10", "description": "No notes for control-id 1.1.1.10.", "props": [ @@ -25086,7 +24962,7 @@ ] }, { - "uuid": "a24fe861-efc7-4526-b5e3-66e887997140", + "uuid": "a6908d13-8ba0-4add-8edb-8b1769b2452a", "control-id": "cis_rhel10_1-1.2.3.1", "description": "No notes for control-id 1.1.2.3.1.", "props": [ @@ -25103,7 +24979,7 @@ ] }, { - "uuid": "82170942-fadd-481f-9beb-ec0aa9f48259", + "uuid": "56885c78-cef3-4711-b5c0-c254c3ad7431", "control-id": "cis_rhel10_1-1.2.4.1", "description": "No notes for control-id 1.1.2.4.1.", "props": [ @@ -25120,7 +24996,7 @@ ] }, { - "uuid": "e2b3049e-974f-475f-9324-b16469db5867", + "uuid": "d4a8b281-ef5b-4f2e-aeb7-60c63edc499d", "control-id": "cis_rhel10_1-1.2.5.1", "description": "No notes for control-id 1.1.2.5.1.", "props": [ @@ -25137,7 +25013,7 @@ ] }, { - "uuid": "bac5c77e-f4f0-46c7-ab00-0592e7694520", + "uuid": "687e91ea-d1c4-4530-afc8-0b11f5a6779e", "control-id": "cis_rhel10_1-1.2.6.1", "description": "No notes for control-id 1.1.2.6.1.", "props": [ @@ -25154,7 +25030,7 @@ ] }, { - "uuid": "7cf67e15-7e77-4659-b0b6-6ed669f5c445", + "uuid": "dcddfd8a-b3c8-41a7-ad53-7fa09bdbe1a1", "control-id": "cis_rhel10_1-1.2.7.1", "description": "No notes for control-id 1.1.2.7.1.", "props": [ @@ -25171,7 +25047,7 @@ ] }, { - "uuid": "6a5747aa-2e76-4e3d-9a68-784443159793", + "uuid": "397cea8f-c856-4b4e-8f3d-9a0f6004c5a3", "control-id": "cis_rhel10_1-2.1.3", "description": "The description for control-id cis_rhel10_1-2.1.3.", "props": [ @@ -25184,7 +25060,7 @@ ] }, { - "uuid": "cbb71c30-fb46-4d64-985a-4472c4e8c24c", + "uuid": "5645367e-6b61-4544-aa88-e214d599cafb", "control-id": "cis_rhel10_1-2.1.5", "description": "No notes for control-id 1.2.1.5.", "props": [ @@ -25201,7 +25077,7 @@ ] }, { - "uuid": "4f21559a-60db-44c3-a762-0e56a94b4499", + "uuid": "2b0e6ccc-f1c6-44dd-b0d0-9981c3e84d69", "control-id": "cis_rhel10_1-3.1.5", "description": "No notes for control-id 1.3.1.5.", "props": [ @@ -25218,7 +25094,7 @@ ] }, { - "uuid": "5ba225bd-59c2-462a-9215-f712f9872f0d", + "uuid": "256338c1-d64d-4046-8da1-dcf1b9234fd9", "control-id": "cis_rhel10_1-3.1.6", "description": "The description for control-id cis_rhel10_1-3.1.6.", "props": [ @@ -25231,7 +25107,7 @@ ] }, { - "uuid": "555e700b-39a3-4d73-a073-f15111d55628", + "uuid": "c0686f61-84cd-4bcd-ad41-b74d18d5c3bf", "control-id": "cis_rhel10_1-5.3", "description": "No notes for control-id 1.5.3.", "props": [ @@ -25248,7 +25124,7 @@ ] }, { - "uuid": "a510b047-50b6-470c-9fa4-6644bdd88efa", + "uuid": "219737d6-2626-433c-b05d-d1e9bb51b26e", "control-id": "cis_rhel10_1-8.4", "description": "No notes for control-id 1.8.4.", "props": [ @@ -25270,7 +25146,7 @@ ] }, { - "uuid": "30b48f7c-a213-4cc8-8018-f8f73c2e40e4", + "uuid": "f1b5d1d6-5503-4d69-94d2-5c37822cc871", "control-id": "cis_rhel10_1-8.6", "description": "No notes for control-id 1.8.6.", "props": [ @@ -25287,7 +25163,7 @@ ] }, { - "uuid": "db41fa10-ddcd-4348-8385-6c37b1cbceee", + "uuid": "d0c2d742-e6f5-42e0-af8f-817586ed7b0a", "control-id": "cis_rhel10_2-1.1", "description": "No notes for control-id 2.1.1.", "props": [ @@ -25304,7 +25180,7 @@ ] }, { - "uuid": "aa0b52c3-92e1-4d31-befc-7dc53f346917", + "uuid": "634e43aa-529a-4246-8be9-a5cba6033609", "control-id": "cis_rhel10_2-1.2", "description": "No notes for control-id 2.1.2.", "props": [ @@ -25321,7 +25197,7 @@ ] }, { - "uuid": "5e024517-28be-41cf-9a44-9e45d0c27550", + "uuid": "38d6771b-aa31-41bb-b2e2-dfc5e1edb15e", "control-id": "cis_rhel10_2-1.3", "description": "No notes for control-id 2.1.3.", "props": [ @@ -25338,7 +25214,7 @@ ] }, { - "uuid": "2f36aed2-cdca-4d05-8fc0-ca834d936607", + "uuid": "6cf7ce72-7397-49e3-9d6e-8b19126ef09a", "control-id": "cis_rhel10_2-2.2", "description": "No notes for control-id 2.2.2.", "props": [ @@ -25355,7 +25231,7 @@ ] }, { - "uuid": "22266e66-8399-415a-9976-deea84192677", + "uuid": "8c2480ed-cc9e-4b02-a049-00a0dbc16ec9", "control-id": "cis_rhel10_3-1.3", "description": "No notes for control-id 3.1.3.", "props": [ @@ -25372,7 +25248,7 @@ ] }, { - "uuid": "5ec29aa6-8c11-4910-9294-7b62b6fdf1f5", + "uuid": "c48610e9-323a-4fed-ac54-cd9af3abfdc6", "control-id": "cis_rhel10_5-2.4", "description": "No notes for control-id 5.2.4.", "props": [ @@ -25389,7 +25265,7 @@ ] }, { - "uuid": "43db7671-9c03-47d2-8db3-84e44ea6ccd6", + "uuid": "3374835a-f828-4ba0-950e-495184beba4a", "control-id": "cis_rhel10_5-3.2.1.3", "description": "No notes for control-id 5.3.2.1.3.", "props": [ @@ -25406,7 +25282,7 @@ ] }, { - "uuid": "506a0779-4544-42ba-8310-26092354c12a", + "uuid": "2e0d4c0d-29a4-4d2f-9cfc-442ecaaa9f27", "control-id": "cis_rhel10_5-4.1.2", "description": "No notes for control-id 5.4.1.2.", "props": [ @@ -25428,7 +25304,7 @@ ] }, { - "uuid": "021095b8-e3f3-47c5-8a79-720be652ae90", + "uuid": "28887e77-56af-4c9d-a223-2dbdc63502b5", "control-id": "cis_rhel10_5-4.3.1", "description": "No notes for control-id 5.4.3.1.", "props": [ @@ -25445,7 +25321,7 @@ ] }, { - "uuid": "45048120-0309-446e-9215-d6056756d1c7", + "uuid": "40501af0-d50f-40ac-ad23-c86ee9455110", "control-id": "cis_rhel10_6-3.1.1", "description": "No notes for control-id 6.3.1.1.", "props": [ @@ -25467,7 +25343,7 @@ ] }, { - "uuid": "3d0e2e77-0de8-4194-9d00-6f5945e469e8", + "uuid": "1c3ab742-7c9d-4ea6-a148-93b9ea28fe59", "control-id": "cis_rhel10_6-3.1.2", "description": "No notes for control-id 6.3.1.2.", "props": [ @@ -25484,7 +25360,7 @@ ] }, { - "uuid": "5eebd6ca-2f2c-4f87-a7bd-e50d38470ecb", + "uuid": "737e177a-d642-4b2c-9c50-143a1ddab453", "control-id": "cis_rhel10_6-3.1.3", "description": "No notes for control-id 6.3.1.3.", "props": [ @@ -25501,7 +25377,7 @@ ] }, { - "uuid": "06b0243b-6874-41be-94d1-a8e3427bb574", + "uuid": "865a506f-9274-40ba-b79d-a9a9e3952a69", "control-id": "cis_rhel10_6-3.1.4", "description": "No notes for control-id 6.3.1.4.", "props": [ @@ -25518,7 +25394,7 @@ ] }, { - "uuid": "062e7986-983b-4291-bc38-a4ac71243590", + "uuid": "166b71f6-1d82-49cd-b1ad-49d857944fd1", "control-id": "cis_rhel10_6-3.2.1", "description": "No notes for control-id 6.3.2.1.", "props": [ @@ -25535,7 +25411,7 @@ ] }, { - "uuid": "c17962b4-2a9e-447d-86a0-cf0a25794964", + "uuid": "f6ef956a-3270-436b-ab66-8db2fec5398e", "control-id": "cis_rhel10_6-3.2.2", "description": "No notes for control-id 6.3.2.2.", "props": [ @@ -25552,7 +25428,7 @@ ] }, { - "uuid": "b26ff364-4042-418f-9f43-c33dcb98855a", + "uuid": "bb1e3c1e-0a53-4547-9ce8-b6389527b5ad", "control-id": "cis_rhel10_6-3.2.3", "description": "No notes for control-id 6.3.2.3.", "props": [ @@ -25574,7 +25450,7 @@ ] }, { - "uuid": "c8d78435-0167-4c6e-ac51-302284d8142b", + "uuid": "af4a4583-db2e-4667-81ce-f1e319dcf776", "control-id": "cis_rhel10_6-3.2.4", "description": "No notes for control-id 6.3.2.4.", "props": [ @@ -25596,7 +25472,7 @@ ] }, { - "uuid": "c448bbd9-4d7a-4330-a64d-c81115119972", + "uuid": "a6185942-4e95-4111-9d29-32c323178ac5", "control-id": "cis_rhel10_6-3.3.1", "description": "No notes for control-id 6.3.3.1.", "props": [ @@ -25613,7 +25489,7 @@ ] }, { - "uuid": "f3427d97-5637-4b82-a590-dfd8342bf734", + "uuid": "0c416dd3-676e-4f4d-98b1-22ac0b964a1e", "control-id": "cis_rhel10_6-3.3.2", "description": "No notes for control-id 6.3.3.2.", "props": [ @@ -25630,7 +25506,7 @@ ] }, { - "uuid": "e2b63233-52c6-4451-897b-8fdb0fe57d05", + "uuid": "97f6485f-1614-4a58-839a-c28008832a90", "control-id": "cis_rhel10_6-3.3.3", "description": "No notes for control-id 6.3.3.3.", "props": [ @@ -25647,7 +25523,7 @@ ] }, { - "uuid": "6c26be23-3de8-4908-affe-a12ca8282aee", + "uuid": "020fca9c-3153-40d2-9fbb-e10201de9c78", "control-id": "cis_rhel10_6-3.3.4", "description": "No notes for control-id 6.3.3.4.", "props": [ @@ -25679,7 +25555,7 @@ ] }, { - "uuid": "81bd7f69-78e3-40e9-8c30-ed47b52e35ad", + "uuid": "e69a6ca6-87d6-4836-98dd-580a5a302581", "control-id": "cis_rhel10_6-3.3.5", "description": "No notes for control-id 6.3.3.5.", "props": [ @@ -25701,7 +25577,7 @@ ] }, { - "uuid": "496936a6-b7a5-4342-9822-0e73e76e3eb9", + "uuid": "1229866d-0433-48a8-ae51-fc9ae2b4fbf0", "control-id": "cis_rhel10_6-3.3.6", "description": "No notes for control-id 6.3.3.6.", "props": [ @@ -25723,7 +25599,7 @@ ] }, { - "uuid": "8d45ef5a-7e05-431b-984c-e1a9d009ebd0", + "uuid": "7dd21029-e5b3-4b71-bc8e-829a0465cd94", "control-id": "cis_rhel10_6-3.3.7", "description": "No notes for control-id 6.3.3.7.", "props": [ @@ -25745,7 +25621,7 @@ ] }, { - "uuid": "f4a21544-6674-4280-8b62-30241d500d87", + "uuid": "c278a892-a7ca-4ffd-999b-5b07e85a557b", "control-id": "cis_rhel10_6-3.3.8", "description": "No notes for control-id 6.3.3.8.", "props": [ @@ -25767,7 +25643,7 @@ ] }, { - "uuid": "99094d71-ecaa-400e-8659-14e3fc6faa17", + "uuid": "593800b9-dd9f-4f59-bb40-12df28b2e6f9", "control-id": "cis_rhel10_6-3.3.9", "description": "No notes for control-id 6.3.3.9.", "props": [ @@ -25784,7 +25660,7 @@ ] }, { - "uuid": "f862cb93-f85e-46c0-a4f0-b7fe806fadd8", + "uuid": "1afee28e-5022-4579-9156-efc7b22de378", "control-id": "cis_rhel10_6-3.3.10", "description": "No notes for control-id 6.3.3.10.", "props": [ @@ -25801,7 +25677,7 @@ ] }, { - "uuid": "ad029bec-226b-4545-9269-d6fe9e15b8d3", + "uuid": "16cce4ed-433c-4ee6-9e4a-f422a72ca283", "control-id": "cis_rhel10_6-3.3.11", "description": "No notes for control-id 6.3.3.11.", "props": [ @@ -25838,7 +25714,7 @@ ] }, { - "uuid": "6e87826f-e85e-42ed-84c3-5152546660ab", + "uuid": "ace4e770-97c5-4d01-81db-2e0da4db5d22", "control-id": "cis_rhel10_6-3.3.12", "description": "No notes for control-id 6.3.3.12.", "props": [ @@ -25855,7 +25731,7 @@ ] }, { - "uuid": "03b69f2f-a3ed-47bb-9794-e06d08022b0e", + "uuid": "2f718235-e5e6-4550-8dda-bd710afd808e", "control-id": "cis_rhel10_6-3.3.13", "description": "No notes for control-id 6.3.3.13.", "props": [ @@ -25872,7 +25748,7 @@ ] }, { - "uuid": "15771ff8-5778-40dc-8e80-58db9c97eb1c", + "uuid": "7a907355-1b36-4fee-b7bf-eae07d480575", "control-id": "cis_rhel10_6-3.3.14", "description": "No notes for control-id 6.3.3.14.", "props": [ @@ -25894,7 +25770,7 @@ ] }, { - "uuid": "a6c49192-d978-4738-906b-1e0cbcbac352", + "uuid": "aa2000df-ad5a-4072-b95d-242acafd8503", "control-id": "cis_rhel10_6-3.3.15", "description": "No notes for control-id 6.3.3.15.", "props": [ @@ -25911,7 +25787,7 @@ ] }, { - "uuid": "0701ffe1-6d94-4fe3-b4a2-293215013d54", + "uuid": "dbded92f-2637-4c96-bf5d-2df106884ccf", "control-id": "cis_rhel10_6-3.3.16", "description": "No notes for control-id 6.3.3.16.", "props": [ @@ -25928,7 +25804,7 @@ ] }, { - "uuid": "52f66fff-0798-4758-9761-9c410b38e2a8", + "uuid": "afeed469-a179-4c7e-b4ff-c45f1bedaa2e", "control-id": "cis_rhel10_6-3.3.17", "description": "No notes for control-id 6.3.3.17.", "props": [ @@ -25950,7 +25826,7 @@ ] }, { - "uuid": "e6d0acc1-6f7b-43eb-873f-bcd76cfcb9ba", + "uuid": "b8da60b9-9461-4780-aea2-13514d8a5222", "control-id": "cis_rhel10_6-3.3.18", "description": "No notes for control-id 6.3.3.18.", "props": [ @@ -25982,7 +25858,7 @@ ] }, { - "uuid": "dbfd317b-36ce-4b3a-aad9-cb3118e2782f", + "uuid": "158c9183-a218-40e3-ac6d-c4ee30ec2f92", "control-id": "cis_rhel10_6-3.3.19", "description": "No notes for control-id 6.3.3.19.", "props": [ @@ -26014,7 +25890,7 @@ ] }, { - "uuid": "9efe5f6b-3364-421a-8e89-d0df6e77fcb7", + "uuid": "05ce9458-84e4-4379-b342-5a2a405ecfb9", "control-id": "cis_rhel10_6-3.3.20", "description": "No notes for control-id 6.3.3.20.", "props": [ @@ -26056,7 +25932,7 @@ ] }, { - "uuid": "b4dc7cff-7974-45e4-94b9-57500142b092", + "uuid": "afca8c52-4e17-4710-b570-c6a066e2627b", "control-id": "cis_rhel10_6-3.3.21", "description": "No notes for control-id 6.3.3.21.", "props": [ @@ -26073,7 +25949,7 @@ ] }, { - "uuid": "48567539-f194-4a6b-97d4-9e79b3c29aa5", + "uuid": "b647e004-4064-470b-81d1-9fb626e6c6cd", "control-id": "cis_rhel10_6-3.3.22", "description": "No notes for control-id 6.3.3.22.", "props": [ @@ -26100,7 +25976,7 @@ ] }, { - "uuid": "834db63d-db05-452b-ade6-63ffc8e91ea3", + "uuid": "a801cb15-d16e-40fd-bd2d-98e7a853b9bb", "control-id": "cis_rhel10_6-3.3.23", "description": "No notes for control-id 6.3.3.23.", "props": [ @@ -26122,7 +25998,7 @@ ] }, { - "uuid": "464d1cc3-ef9e-4814-b530-ba6d34e89c96", + "uuid": "77728150-b40c-4992-b285-45509193e5ca", "control-id": "cis_rhel10_6-3.3.24", "description": "No notes for control-id 6.3.3.24.", "props": [ @@ -26144,7 +26020,7 @@ ] }, { - "uuid": "1f906692-7c85-4a2f-a681-f283c8096244", + "uuid": "a9d2fc64-0a11-4f07-925a-1c72487a2c6c", "control-id": "cis_rhel10_6-3.3.25", "description": "No notes for control-id 6.3.3.25.", "props": [ @@ -26171,7 +26047,7 @@ ] }, { - "uuid": "c6d08ebd-aa01-47f5-abae-1beb0c682c59", + "uuid": "d0ff44b5-fd56-4d37-b2f1-e4e2bef6d892", "control-id": "cis_rhel10_6-3.3.26", "description": "No notes for control-id 6.3.3.26.", "props": [ @@ -26193,7 +26069,7 @@ ] }, { - "uuid": "5f484424-b49b-4f4c-b2ef-87d2251d1d85", + "uuid": "c55bae35-f5f0-4083-958a-a526096c2dee", "control-id": "cis_rhel10_6-3.3.27", "description": "No notes for control-id 6.3.3.27.", "props": [ @@ -26210,7 +26086,7 @@ ] }, { - "uuid": "d4e0a0e8-a911-49ed-9c03-08512ee331e2", + "uuid": "28c064ed-fc80-4b54-95a4-a43ea98995e3", "control-id": "cis_rhel10_6-3.3.28", "description": "No notes for control-id 6.3.3.28.", "props": [ @@ -26227,7 +26103,7 @@ ] }, { - "uuid": "6de424f6-3e86-46a1-9e62-6122b084f35c", + "uuid": "0c33aac6-7315-4d56-b56e-6b9ee8cf8f95", "control-id": "cis_rhel10_6-3.3.29", "description": "No notes for control-id 6.3.3.29.", "props": [ @@ -26244,7 +26120,7 @@ ] }, { - "uuid": "7ab879e3-a818-4f41-820b-bb7e4c9561f9", + "uuid": "aeb20c11-7562-4283-8fdf-9a28d467966b", "control-id": "cis_rhel10_6-3.3.30", "description": "No notes for control-id 6.3.3.30.", "props": [ @@ -26261,7 +26137,7 @@ ] }, { - "uuid": "bdc71c80-cddb-4049-b482-d705c65930f9", + "uuid": "ed237671-70f3-4064-8fcf-8d00afa61ad3", "control-id": "cis_rhel10_6-3.3.31", "description": "No notes for control-id 6.3.3.31.", "props": [ @@ -26278,7 +26154,7 @@ ] }, { - "uuid": "375f2687-2497-4bd9-bf32-3967e174e713", + "uuid": "b6d478d6-2138-40d0-9db2-942aed787860", "control-id": "cis_rhel10_6-3.3.32", "description": "No notes for control-id 6.3.3.32.", "props": [ @@ -26300,7 +26176,7 @@ ] }, { - "uuid": "949e4df7-e628-416a-9a94-d8b8a2a4770c", + "uuid": "8c8a53ba-3799-47be-8edc-17c9985a0665", "control-id": "cis_rhel10_6-3.3.33", "description": "No notes for control-id 6.3.3.33.", "props": [ @@ -26317,7 +26193,7 @@ ] }, { - "uuid": "519f5723-cff6-4286-b81a-fdd5c222fc8e", + "uuid": "c522a239-132d-4617-a7b0-876e6df3a228", "control-id": "cis_rhel10_6-3.3.34", "description": "No notes for control-id 6.3.3.34.", "props": [ @@ -26334,7 +26210,7 @@ ] }, { - "uuid": "95b06cb2-552b-49c0-a0fc-fbfb20389ce8", + "uuid": "de0aebad-d028-47f3-88e7-e8e6e979cab6", "control-id": "cis_rhel10_6-3.3.35", "description": "No notes for control-id 6.3.3.35.", "props": [ @@ -26351,7 +26227,7 @@ ] }, { - "uuid": "ab075133-9b12-45c4-8e00-8f74377e5859", + "uuid": "c258fab0-ea39-4210-85e7-23a6123ffd40", "control-id": "cis_rhel10_6-3.3.36", "description": "No notes for control-id 6.3.3.36.", "props": [ @@ -26368,7 +26244,7 @@ ] }, { - "uuid": "5c8d9cee-8339-4d32-835e-f100165c7b43", + "uuid": "d3c6e3b5-bfce-438a-ad9d-64b33a317177", "control-id": "cis_rhel10_6-3.3.37", "description": "The description for control-id cis_rhel10_6-3.3.37.", "props": [ @@ -26381,7 +26257,7 @@ ] }, { - "uuid": "d382de2d-e074-4a98-b978-5edd8a50f5af", + "uuid": "d79e920e-8463-410d-b51d-f979f9773778", "control-id": "cis_rhel10_6-3.4.1", "description": "No notes for control-id 6.3.4.1.", "props": [ @@ -26398,7 +26274,7 @@ ] }, { - "uuid": "224e6bf0-6ad7-46fd-be2b-ddbca025f42f", + "uuid": "7a436e02-815d-4bde-b322-8cf39be008b8", "control-id": "cis_rhel10_6-3.4.2", "description": "No notes for control-id 6.3.4.2.", "props": [ @@ -26415,7 +26291,7 @@ ] }, { - "uuid": "6fe1137a-1b43-45cf-9eef-5f1d13433299", + "uuid": "8dab5699-e5c5-499b-b185-4de34946bce1", "control-id": "cis_rhel10_6-3.4.3", "description": "No notes for control-id 6.3.4.3.", "props": [ @@ -26432,7 +26308,7 @@ ] }, { - "uuid": "b9833bea-a9a5-4ff5-9084-e64cb5edd6e5", + "uuid": "13a2c29e-f082-412f-baa8-d6d22729b919", "control-id": "cis_rhel10_6-3.4.4", "description": "No notes for control-id 6.3.4.4.", "props": [ @@ -26449,7 +26325,7 @@ ] }, { - "uuid": "d4baec87-3d1e-4914-a1c9-fa9d829c7a9c", + "uuid": "095a892c-9124-4ef1-866a-6d4ef38afe5f", "control-id": "cis_rhel10_6-3.4.5", "description": "No notes for control-id 6.3.4.5.", "props": [ @@ -26466,7 +26342,7 @@ ] }, { - "uuid": "70ac4eb5-835c-4a87-9c73-a70fe8926ee3", + "uuid": "dde90d89-2f98-46a0-a8a8-6ae5db781de4", "control-id": "cis_rhel10_6-3.4.6", "description": "No notes for control-id 6.3.4.6.", "props": [ @@ -26483,7 +26359,7 @@ ] }, { - "uuid": "260bed97-c9a3-4113-8a7f-3c0311de0759", + "uuid": "83b95bec-940a-48e0-ac94-85561b35b182", "control-id": "cis_rhel10_6-3.4.7", "description": "No notes for control-id 6.3.4.7.", "props": [ @@ -26500,7 +26376,7 @@ ] }, { - "uuid": "20c92318-cee0-4d5d-ae37-d2d7b150d3bb", + "uuid": "3a0fb95e-c1e0-4449-a70c-f2acb63aac5c", "control-id": "cis_rhel10_6-3.4.8", "description": "No notes for control-id 6.3.4.8.", "props": [ @@ -26517,7 +26393,7 @@ ] }, { - "uuid": "6afa3ae6-ddf4-4656-8811-5748197a0781", + "uuid": "6876e8ef-820d-4b9f-9ea5-a013688c6810", "control-id": "cis_rhel10_6-3.4.9", "description": "No notes for control-id 6.3.4.9.", "props": [ @@ -26534,7 +26410,7 @@ ] }, { - "uuid": "67beebd3-ab7b-4937-b2e0-21682775d967", + "uuid": "68276fa9-06e1-4fb3-a661-f40aa9753c3d", "control-id": "cis_rhel10_6-3.4.10", "description": "No notes for control-id 6.3.4.10.", "props": [ @@ -26551,7 +26427,7 @@ ] }, { - "uuid": "e619279a-8b82-462a-a9fc-f066b02eabc7", + "uuid": "6273d44d-0f33-480e-bf53-5937fd34dbd0", "control-id": "reload_dconf_db", "description": "This is a helper rule to reload Dconf database correctly.", "props": [ @@ -26568,7 +26444,7 @@ ] }, { - "uuid": "d578b535-a55f-48b2-b6f7-bdfcfbca6aae", + "uuid": "b8607932-816d-418c-a046-3540eddeec46", "control-id": "cis_rhel10_1-1.1.1", "description": "No notes for control-id 1.1.1.1.", "props": [ @@ -26585,7 +26461,7 @@ ] }, { - "uuid": "56143f5d-c76a-4c5c-b008-4b1d47d1cd2d", + "uuid": "3512e7e3-5ec1-4c16-bf8c-577609cef78f", "control-id": "cis_rhel10_1-1.1.2", "description": "No notes for control-id 1.1.1.2.", "props": [ @@ -26602,7 +26478,7 @@ ] }, { - "uuid": "fefe1821-b04c-4c94-82ed-7f4dd59b1e84", + "uuid": "645b7db8-6ae4-4fae-9750-4c01014296d1", "control-id": "cis_rhel10_1-1.1.3", "description": "No notes for control-id 1.1.1.3.", "props": [ @@ -26619,7 +26495,7 @@ ] }, { - "uuid": "32b55505-e86f-4ae9-b608-e731ce17cee6", + "uuid": "d64b6055-7ef1-44a4-a48e-3f1863c513ad", "control-id": "cis_rhel10_1-1.1.4", "description": "No notes for control-id 1.1.1.4.", "props": [ @@ -26636,7 +26512,7 @@ ] }, { - "uuid": "1f346d0e-6b2f-426a-8478-27a8518e07c8", + "uuid": "32527028-7b49-4f4f-8486-23b5df0eae67", "control-id": "cis_rhel10_1-1.1.5", "description": "No notes for control-id 1.1.1.5.", "props": [ @@ -26653,7 +26529,7 @@ ] }, { - "uuid": "1325ec9f-e5ec-4b9c-acde-a411390cd151", + "uuid": "36bdff02-236f-4fe7-9e7a-7b06ceb5adf4", "control-id": "cis_rhel10_1-1.1.11", "description": "The description for control-id cis_rhel10_1-1.1.11.", "props": [ @@ -26666,7 +26542,7 @@ ] }, { - "uuid": "a6f71657-97b9-4582-91fb-5fed9029802e", + "uuid": "d035c004-ea74-48ce-b09d-210724d73397", "control-id": "cis_rhel10_1-1.2.1.1", "description": "No notes for control-id 1.1.2.1.1.", "props": [ @@ -26683,7 +26559,7 @@ ] }, { - "uuid": "7489fa4e-775b-4458-b0b1-04b9dd1f8fbf", + "uuid": "db6117b0-5306-49a1-966a-30b108f1534f", "control-id": "cis_rhel10_1-1.2.1.2", "description": "No notes for control-id 1.1.2.1.2.", "props": [ @@ -26700,7 +26576,7 @@ ] }, { - "uuid": "449b1560-e9d4-46c0-9116-565a5c2df0aa", + "uuid": "44aa54fa-9af1-4561-a303-a5736c4d24e9", "control-id": "cis_rhel10_1-1.2.1.3", "description": "No notes for control-id 1.1.2.1.3.", "props": [ @@ -26717,7 +26593,7 @@ ] }, { - "uuid": "9cc2b2a6-ee7b-40a4-9a7d-f69b71358cda", + "uuid": "7170ccb9-a280-4770-b938-24a0a7057b3f", "control-id": "cis_rhel10_1-1.2.1.4", "description": "No notes for control-id 1.1.2.1.4.", "props": [ @@ -26734,7 +26610,7 @@ ] }, { - "uuid": "c2c10a67-b642-4922-89ee-4c96a0134bdd", + "uuid": "1eedbd43-a172-4775-b87c-f2208506d3c4", "control-id": "cis_rhel10_1-1.2.2.1", "description": "No notes for control-id 1.1.2.2.1.", "props": [ @@ -26751,7 +26627,7 @@ ] }, { - "uuid": "3038208d-b066-4bed-afd6-43f8f049676a", + "uuid": "66337eed-39d3-4b39-b269-fbe76bd7fcc5", "control-id": "cis_rhel10_1-1.2.2.2", "description": "No notes for control-id 1.1.2.2.2.", "props": [ @@ -26768,7 +26644,7 @@ ] }, { - "uuid": "b3e7d39a-6fa0-49a2-89d2-e5a80f29e640", + "uuid": "91b466b9-96d7-444b-97aa-c6e47ec6fa67", "control-id": "cis_rhel10_1-1.2.2.3", "description": "No notes for control-id 1.1.2.2.3.", "props": [ @@ -26785,7 +26661,7 @@ ] }, { - "uuid": "e4c1703d-7ed9-42ab-a94e-13040e758be9", + "uuid": "967c9518-9588-459a-a962-05bead6c7d88", "control-id": "cis_rhel10_1-1.2.2.4", "description": "No notes for control-id 1.1.2.2.4.", "props": [ @@ -26802,7 +26678,7 @@ ] }, { - "uuid": "9bb5aeb3-8254-4c8c-bab2-3c397e86e6b1", + "uuid": "b6f62acf-5cd7-4dea-9596-a72267cee3ab", "control-id": "cis_rhel10_1-1.2.3.2", "description": "No notes for control-id 1.1.2.3.2.", "props": [ @@ -26819,7 +26695,7 @@ ] }, { - "uuid": "48bd21f7-c54c-462c-89d3-23a1952f2976", + "uuid": "f9c0de99-1d6f-4668-abcf-6eaf7d10a86e", "control-id": "cis_rhel10_1-1.2.3.3", "description": "No notes for control-id 1.1.2.3.3.", "props": [ @@ -26836,7 +26712,7 @@ ] }, { - "uuid": "b0ca96d3-647b-46dd-8d7e-be46af58096d", + "uuid": "6f356ef5-4e00-4629-a855-d56bbc7d63ab", "control-id": "cis_rhel10_1-1.2.4.2", "description": "No notes for control-id 1.1.2.4.2.", "props": [ @@ -26853,7 +26729,7 @@ ] }, { - "uuid": "f393d415-2286-4c93-a786-da643be6629a", + "uuid": "03567dc6-7b13-4326-970a-bb1ab035dbf9", "control-id": "cis_rhel10_1-1.2.4.3", "description": "No notes for control-id 1.1.2.4.3.", "props": [ @@ -26870,7 +26746,7 @@ ] }, { - "uuid": "35132d65-2cb0-4fff-befc-de951b2daec2", + "uuid": "05cc198c-5dd6-4871-8e06-59f7c9942315", "control-id": "cis_rhel10_1-1.2.5.2", "description": "No notes for control-id 1.1.2.5.2.", "props": [ @@ -26887,7 +26763,7 @@ ] }, { - "uuid": "a67e677e-c509-43fb-ab77-38586ce02f93", + "uuid": "9f884da0-db12-457f-9f49-fc009d834f41", "control-id": "cis_rhel10_1-1.2.5.3", "description": "No notes for control-id 1.1.2.5.3.", "props": [ @@ -26904,7 +26780,7 @@ ] }, { - "uuid": "db57fa10-59eb-4233-96b1-702ce0cd5332", + "uuid": "ab3c73d4-2f05-4b63-b920-1f46fd2f70e0", "control-id": "cis_rhel10_1-1.2.5.4", "description": "No notes for control-id 1.1.2.5.4.", "props": [ @@ -26921,7 +26797,7 @@ ] }, { - "uuid": "ab020cf7-8f05-4f78-8091-c5b35862a669", + "uuid": "3285c1f5-a179-458c-a789-9060ae5e73ac", "control-id": "cis_rhel10_1-1.2.6.2", "description": "No notes for control-id 1.1.2.6.2.", "props": [ @@ -26938,7 +26814,7 @@ ] }, { - "uuid": "dee38499-20c9-42a8-8c15-621f4ef1d284", + "uuid": "1a2f4729-6d51-4013-acb4-62aabe485bf3", "control-id": "cis_rhel10_1-1.2.6.3", "description": "No notes for control-id 1.1.2.6.3.", "props": [ @@ -26955,7 +26831,7 @@ ] }, { - "uuid": "a5e03954-c7ef-45c5-bff9-d248d07e30dc", + "uuid": "8585cfde-5b28-4d7b-a28b-15b100a96bec", "control-id": "cis_rhel10_1-1.2.6.4", "description": "No notes for control-id 1.1.2.6.4.", "props": [ @@ -26972,7 +26848,7 @@ ] }, { - "uuid": "5966ea59-6b89-4b21-9e90-9816f0c5b2b3", + "uuid": "46f9c532-8f46-4aa2-9275-91fca68fcf7e", "control-id": "cis_rhel10_1-1.2.7.2", "description": "No notes for control-id 1.1.2.7.2.", "props": [ @@ -26989,7 +26865,7 @@ ] }, { - "uuid": "19cb1562-cba1-42c0-91e4-402ef05ac09a", + "uuid": "ed0b325d-91b1-432d-ba5c-008e05fa081e", "control-id": "cis_rhel10_1-1.2.7.3", "description": "No notes for control-id 1.1.2.7.3.", "props": [ @@ -27006,7 +26882,7 @@ ] }, { - "uuid": "8f99affd-3ae1-4b27-8f62-55dd01288546", + "uuid": "ca5d4d89-261d-4d56-a948-535de3a04717", "control-id": "cis_rhel10_1-1.2.7.4", "description": "No notes for control-id 1.1.2.7.4.", "props": [ @@ -27023,7 +26899,7 @@ ] }, { - "uuid": "5c91408a-657f-4fac-a40e-c38a9e0ee777", + "uuid": "99a29264-113d-4156-ad9e-ed566e5635f5", "control-id": "cis_rhel10_1-2.1.1", "description": "The description for control-id cis_rhel10_1-2.1.1.", "props": [ @@ -27036,7 +26912,7 @@ ] }, { - "uuid": "23180616-0737-472b-ab4d-26ccc8155aad", + "uuid": "116a0ad3-da64-462e-9751-0353c6b7964a", "control-id": "cis_rhel10_1-2.1.2", "description": "No notes for control-id 1.2.1.2.", "props": [ @@ -27053,7 +26929,7 @@ ] }, { - "uuid": "52b445b3-b424-41bf-8e54-072bbcf04dc7", + "uuid": "6fc95db2-ced5-48f7-8fcf-b7762992ec19", "control-id": "cis_rhel10_1-2.1.4", "description": "The description for control-id cis_rhel10_1-2.1.4.", "props": [ @@ -27066,7 +26942,7 @@ ] }, { - "uuid": "8968a844-97f7-40bc-8f13-adc40f0929a9", + "uuid": "5fad4a9d-3d2c-4f3b-a612-caaa60dfd947", "control-id": "cis_rhel10_1-2.2.1", "description": "The description for control-id cis_rhel10_1-2.2.1.", "props": [ @@ -27079,7 +26955,7 @@ ] }, { - "uuid": "f1b80087-1568-4d6e-8371-e9bfcd695910", + "uuid": "dafee920-e1a8-45b7-acbc-0f5ffca8bd85", "control-id": "cis_rhel10_1-3.1.1", "description": "No notes for control-id 1.3.1.1.", "props": [ @@ -27096,7 +26972,7 @@ ] }, { - "uuid": "c2e40b5c-800b-4734-aeb1-3a04be038109", + "uuid": "b8a13b0a-e6e1-42c4-81c9-e677b659e9a7", "control-id": "cis_rhel10_1-3.1.2", "description": "No notes for control-id 1.3.1.2.", "props": [ @@ -27113,7 +26989,7 @@ ] }, { - "uuid": "db69c5bc-6791-4e9c-a7fc-878b186f3071", + "uuid": "9503bcb7-37b0-439e-a800-7e014fe6cfd6", "control-id": "cis_rhel10_1-3.1.3", "description": "No notes for control-id 1.3.1.3.", "props": [ @@ -27130,7 +27006,7 @@ ] }, { - "uuid": "df01f9f9-66a5-462b-a066-3d0c947be7c8", + "uuid": "ac9cf5a8-db67-48c6-b37b-72d2091275fa", "control-id": "cis_rhel10_1-3.1.4", "description": "No notes for control-id 1.3.1.4.", "props": [ @@ -27147,7 +27023,7 @@ ] }, { - "uuid": "a2f224db-8105-4fb7-a94a-c2b14439e509", + "uuid": "a1d046b2-9d12-46bd-b278-934c1952e77f", "control-id": "cis_rhel10_1-3.1.7", "description": "No notes for control-id 1.3.1.7.", "props": [ @@ -27164,7 +27040,7 @@ ] }, { - "uuid": "8df4588d-7870-4f7a-b55d-a015959078bf", + "uuid": "aeb472b9-2d0f-4e3c-a88e-c0eeecd72862", "control-id": "cis_rhel10_1-4.1", "description": "There is no automated remediation for this rule and this is intentional.\nMore details in the rule description.", "props": [ @@ -27181,50 +27057,34 @@ ] }, { - "uuid": "f18b947d-31c5-4ed5-b188-37c07ede6f28", + "uuid": "bf245feb-8195-4cfd-9412-b2a18fb3514e", "control-id": "cis_rhel10_1-4.2", - "description": "The description for control-id cis_rhel10_1-4.2.", + "description": "This requirement demands a deeper review of the rules.", "props": [ { "name": "implementation-status", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "alternative", - "remarks": "This requirement demands a deeper review of the rules." - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_grub2_cfg" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_grub2_cfg" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_grub2_cfg" + "value": "implemented" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_user_cfg" + "value": "file_permissions_boot_grub2" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_user_cfg" + "value": "file_owner_boot_grub2" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_user_cfg" + "value": "file_groupowner_boot_grub2" } ] }, { - "uuid": "c02e23c1-a07c-4dbf-8686-b0093a059900", + "uuid": "76ad537f-4670-46f9-80e5-f628214402b0", "control-id": "cis_rhel10_1-5.1", "description": "No notes for control-id 1.5.1.", "props": [ @@ -27241,7 +27101,7 @@ ] }, { - "uuid": "3ae3ef0b-75f2-4f7b-b3ae-d5ed614887a7", + "uuid": "67908623-e80d-41ec-aef0-baa73563d76b", "control-id": "cis_rhel10_1-5.2", "description": "No notes for control-id 1.5.2.", "props": [ @@ -27258,7 +27118,7 @@ ] }, { - "uuid": "e77c180d-be05-4587-8054-fa527b7bbd7b", + "uuid": "eb66556d-ff67-4de9-a846-ce6cd261635b", "control-id": "cis_rhel10_1-5.4", "description": "No notes for control-id 1.5.4.", "props": [ @@ -27275,7 +27135,7 @@ ] }, { - "uuid": "876c85f5-fa11-43e4-a885-db9dd6a58901", + "uuid": "efdadaae-286a-47b2-ae37-b63acf58ddcb", "control-id": "cis_rhel10_1-5.5", "description": "No notes for control-id 1.5.5.", "props": [ @@ -27292,7 +27152,7 @@ ] }, { - "uuid": "ee8b56ed-3d1c-466c-bf93-fa17a76f82ea", + "uuid": "e79abf28-8663-42d0-8b05-369df3767857", "control-id": "cis_rhel10_1-5.6", "description": "No notes for control-id 1.5.6.", "props": [ @@ -27309,7 +27169,7 @@ ] }, { - "uuid": "cdff5438-b07d-4fdd-b779-56b64b93a61a", + "uuid": "8f9e0dc1-07b9-479f-ad14-84fd3817d6fc", "control-id": "cis_rhel10_1-5.7", "description": "No notes for control-id 1.5.7.", "props": [ @@ -27326,7 +27186,7 @@ ] }, { - "uuid": "0df89489-41d5-4ae3-b8fa-24ef96aa7384", + "uuid": "6ff43c09-907d-484a-8b15-543733fe82fa", "control-id": "cis_rhel10_1-5.8", "description": "Address Space Layout Randomization (ASLR)", "props": [ @@ -27343,7 +27203,7 @@ ] }, { - "uuid": "1e77770f-6399-4b17-be22-737fe6cb1e84", + "uuid": "a611c2ac-dbed-49ee-8703-27a019cfa988", "control-id": "cis_rhel10_1-5.9", "description": "No notes for control-id 1.5.9.", "props": [ @@ -27360,7 +27220,7 @@ ] }, { - "uuid": "eccacc6d-b775-428b-8468-49b0777c3b0a", + "uuid": "cbf119aa-50f4-498f-a250-f2e4a7261571", "control-id": "cis_rhel10_1-5.10", "description": "No notes for control-id 1.5.10.", "props": [ @@ -27377,7 +27237,7 @@ ] }, { - "uuid": "a1fdc236-aef8-421a-b44e-1dfca1d29d29", + "uuid": "48aa4d3e-f08e-4a5a-85f0-0a6d35699fb6", "control-id": "cis_rhel10_1-6.1", "description": "No notes for control-id 1.6.1.", "props": [ @@ -27394,7 +27254,7 @@ ] }, { - "uuid": "b65d8bf6-3ab2-4d06-9bb8-57fdc02c8d46", + "uuid": "556d6a40-d1e5-4836-b5ca-b03a759e8e40", "control-id": "cis_rhel10_1-6.2", "description": "No notes for control-id 1.6.2.", "props": [ @@ -27411,7 +27271,7 @@ ] }, { - "uuid": "6e78a439-4524-41a0-8ad1-30658c351f78", + "uuid": "a5be29ba-3d89-4013-b67e-170ef04a3324", "control-id": "cis_rhel10_1-6.3", "description": "No notes for control-id 1.6.3.", "props": [ @@ -27428,7 +27288,7 @@ ] }, { - "uuid": "f7aad69c-f82c-4cf0-98e3-c8e98d2c21fd", + "uuid": "2cce4738-7021-41c2-91d1-62c9052521e1", "control-id": "cis_rhel10_1-6.4", "description": "No notes for control-id 1.6.4.", "props": [ @@ -27445,7 +27305,7 @@ ] }, { - "uuid": "f433c8af-96a9-4d37-8a68-6d462627feb3", + "uuid": "56424d58-148e-408f-95ba-75f8ee3e429a", "control-id": "cis_rhel10_1-7.1", "description": "No notes for control-id 1.7.1.", "props": [ @@ -27462,7 +27322,7 @@ ] }, { - "uuid": "cd3cb7e2-4e6d-4d3d-9acf-8e86c81b117d", + "uuid": "96b6a8d0-8587-4410-9b9f-83c0eae9581e", "control-id": "cis_rhel10_1-7.2", "description": "No notes for control-id 1.7.2.", "props": [ @@ -27479,7 +27339,7 @@ ] }, { - "uuid": "c17cdf1c-9cd0-49b5-9195-33b969b8a938", + "uuid": "0ade1eb5-5abf-45cd-bcc2-756a12cf3dbb", "control-id": "cis_rhel10_1-7.3", "description": "No notes for control-id 1.7.3.", "props": [ @@ -27496,7 +27356,7 @@ ] }, { - "uuid": "e56ca2ac-aed6-417e-aedb-85aa5afed96b", + "uuid": "c515f7b4-6357-475e-9ac6-938a83e7d8dc", "control-id": "cis_rhel10_1-7.4", "description": "No notes for control-id 1.7.4.", "props": [ @@ -27523,7 +27383,7 @@ ] }, { - "uuid": "70eda709-af65-4497-a914-6ce9a0fa01e5", + "uuid": "b9cef290-2024-42cf-936f-021ed5b0fab2", "control-id": "cis_rhel10_1-7.5", "description": "No notes for control-id 1.7.5.", "props": [ @@ -27550,7 +27410,7 @@ ] }, { - "uuid": "63de36e0-7dc9-4ffb-aad6-b46a1de665b6", + "uuid": "ca623175-592b-4d3a-b5c4-3eaca9b8c264", "control-id": "cis_rhel10_1-7.6", "description": "No notes for control-id 1.7.6.", "props": [ @@ -27577,7 +27437,7 @@ ] }, { - "uuid": "13054499-8a32-4f97-b557-cea3512d6346", + "uuid": "d9e7f2d0-480a-4989-99c0-7b4e2b04c265", "control-id": "cis_rhel10_1-8.1", "description": "No notes for control-id 1.8.1.", "props": [ @@ -27599,7 +27459,7 @@ ] }, { - "uuid": "3000c66c-e3ec-46c5-9682-c5a6da5b02ab", + "uuid": "921cbcb7-c635-4a13-9f1c-ec29482cace5", "control-id": "cis_rhel10_1-8.2", "description": "No notes for control-id 1.8.2.", "props": [ @@ -27616,7 +27476,7 @@ ] }, { - "uuid": "c78bbe4f-9c4c-4679-bb67-00075f476fd1", + "uuid": "270c2ad4-7d9a-4af2-a137-2ef08a3f059a", "control-id": "cis_rhel10_1-8.3", "description": "No notes for control-id 1.8.3.", "props": [ @@ -27648,7 +27508,7 @@ ] }, { - "uuid": "4023271d-5365-4834-95c3-ffe87fae236f", + "uuid": "ee99c155-a56c-4b14-a859-aa34a22f5f63", "control-id": "cis_rhel10_1-8.5", "description": "No notes for control-id 1.8.5.", "props": [ @@ -27665,7 +27525,7 @@ ] }, { - "uuid": "2b7fb50f-3dd2-42b7-90c4-b2c9a28cf94e", + "uuid": "dc9c886d-1a94-4368-a6d1-49161bd4e5c0", "control-id": "cis_rhel10_2-1.4", "description": "No notes for control-id 2.1.4.", "props": [ @@ -27682,7 +27542,7 @@ ] }, { - "uuid": "6fbef111-85fd-4e80-a75e-5e82e90de8c1", + "uuid": "4834bbee-895e-46a2-8114-20d60fd9c53c", "control-id": "cis_rhel10_2-1.5", "description": "No notes for control-id 2.1.5.", "props": [ @@ -27699,7 +27559,7 @@ ] }, { - "uuid": "50ce5c10-8f7e-4655-b0fe-3de9af6ecde7", + "uuid": "d1613b1c-4828-48ee-9d1e-f2756616fb0e", "control-id": "cis_rhel10_2-1.6", "description": "No notes for control-id 2.1.6.", "props": [ @@ -27716,7 +27576,7 @@ ] }, { - "uuid": "56a633c7-f3a9-4763-9ada-b181734fe58c", + "uuid": "12d1252a-a8b6-4fcc-b12a-50ff715d3c5c", "control-id": "cis_rhel10_2-1.7", "description": "No notes for control-id 2.1.7.", "props": [ @@ -27733,7 +27593,7 @@ ] }, { - "uuid": "d4a45e18-9dee-4d9f-bfa2-1779d3f2dad1", + "uuid": "27f0b16d-8c20-448f-a7c1-ee5613ce5f55", "control-id": "cis_rhel10_2-1.8", "description": "No notes for control-id 2.1.8.", "props": [ @@ -27755,7 +27615,7 @@ ] }, { - "uuid": "ef5c2172-8772-48b4-8bb9-c8a66670a15f", + "uuid": "a822abb9-bc3a-494e-b36d-bc971b0426af", "control-id": "cis_rhel10_2-1.9", "description": "Many of the libvirt packages used by Enterprise Linux virtualization are dependent on the\nnfs-utils package.", "props": [ @@ -27772,7 +27632,7 @@ ] }, { - "uuid": "a064096a-7727-4a1a-b78f-49b16b825e1c", + "uuid": "f7e1bd38-7fd5-40cd-bc2b-2233c697a0a1", "control-id": "cis_rhel10_2-1.11", "description": "Many of the libvirt packages used by Enterprise Linux virtualization, and the nfs-utils\npackage used for The Network File System (NFS), are dependent on the rpcbind package.", "props": [ @@ -27789,7 +27649,7 @@ ] }, { - "uuid": "91fe766f-7568-4769-859e-a23a8e69210c", + "uuid": "54d2eb9c-9b12-4af4-a2ef-b865e24edf98", "control-id": "cis_rhel10_2-1.12", "description": "No notes for control-id 2.1.12.", "props": [ @@ -27806,7 +27666,7 @@ ] }, { - "uuid": "1f85a3b6-9753-4579-ae70-d2f47810993e", + "uuid": "40b7d655-6955-4551-9b61-d2b165126fdb", "control-id": "cis_rhel10_2-1.13", "description": "No notes for control-id 2.1.13.", "props": [ @@ -27823,7 +27683,7 @@ ] }, { - "uuid": "1aa6181f-d7d6-4876-b839-e90528d2e7ed", + "uuid": "6b68c255-ae66-44f8-8408-126ed8572b19", "control-id": "cis_rhel10_2-1.14", "description": "No notes for control-id 2.1.14.", "props": [ @@ -27840,7 +27700,7 @@ ] }, { - "uuid": "afbc3849-df6e-4be9-b2d8-0b2858a84d17", + "uuid": "64c58d58-e716-45b3-8c9c-90efd2566fcd", "control-id": "cis_rhel10_2-1.15", "description": "No notes for control-id 2.1.15.", "props": [ @@ -27857,7 +27717,7 @@ ] }, { - "uuid": "e28a238f-0f10-4381-a427-2db5a59796a3", + "uuid": "b17a3148-9020-47fe-a05e-0e487e74af5b", "control-id": "cis_rhel10_2-1.16", "description": "No notes for control-id 2.1.16.", "props": [ @@ -27874,7 +27734,7 @@ ] }, { - "uuid": "d9d67cea-2af3-4381-8808-3de1306ec96d", + "uuid": "e67b0dfd-50be-4993-93e1-1b2092439f09", "control-id": "cis_rhel10_2-1.17", "description": "No notes for control-id 2.1.17.", "props": [ @@ -27891,7 +27751,7 @@ ] }, { - "uuid": "0e3e2815-02c3-43cb-8115-1999ec69c172", + "uuid": "f653e35e-5ea2-4e24-a43d-cf75a833be4d", "control-id": "cis_rhel10_2-1.18", "description": "No notes for control-id 2.1.18.", "props": [ @@ -27913,7 +27773,7 @@ ] }, { - "uuid": "b835b4f1-8969-420c-a3e2-188189c7c706", + "uuid": "9ea764c0-d4ff-485e-bbd0-98ab3a7a62ec", "control-id": "cis_rhel10_2-1.21", "description": "No notes for control-id 2.1.21.", "props": [ @@ -27935,7 +27795,7 @@ ] }, { - "uuid": "be3d7651-5010-4975-a791-c6db7f3ea5bc", + "uuid": "bac26d77-e066-40b2-a140-49581058745a", "control-id": "cis_rhel10_2-1.22", "description": "The description for control-id cis_rhel10_2-1.22.", "props": [ @@ -27948,7 +27808,7 @@ ] }, { - "uuid": "febbcb51-033b-4cde-8300-f4e8453bd037", + "uuid": "b336aaa3-2728-4975-94a6-2c4d76ad6c22", "control-id": "cis_rhel10_2-2.1", "description": "No notes for control-id 2.2.1.", "props": [ @@ -27965,7 +27825,7 @@ ] }, { - "uuid": "39601738-f7b8-4a16-a3c9-f1b79b8f6941", + "uuid": "780e9c93-971f-4a64-a3f2-10a6aa8047b9", "control-id": "cis_rhel10_2-2.3", "description": "No notes for control-id 2.2.3.", "props": [ @@ -27982,7 +27842,7 @@ ] }, { - "uuid": "91e960ac-44c0-4e73-b39b-c9481af34c8b", + "uuid": "47a4f1a1-cd17-4396-abb1-b0084b6ddbcf", "control-id": "cis_rhel10_2-2.4", "description": "No notes for control-id 2.2.4.", "props": [ @@ -27999,7 +27859,7 @@ ] }, { - "uuid": "773862e6-0e1e-4c6c-ba22-7842bd072844", + "uuid": "e722401f-7409-4f6a-820c-4ba794852a7f", "control-id": "cis_rhel10_2-3.1", "description": "No notes for control-id 2.3.1.", "props": [ @@ -28011,7 +27871,7 @@ ] }, { - "uuid": "8f39cf80-da6e-4448-ac80-9d6fdb21613b", + "uuid": "33e9e9a6-543d-4914-97ff-3c20424491f8", "control-id": "cis_rhel10_2-3.2", "description": "No notes for control-id 2.3.2.", "props": [ @@ -28028,7 +27888,7 @@ ] }, { - "uuid": "d671e71a-301b-4a66-8ff5-cdfad003877f", + "uuid": "50f6715b-4472-4eda-8865-0628fc9a7fcb", "control-id": "cis_rhel10_2-3.3", "description": "No notes for control-id 2.3.3.", "props": [ @@ -28045,7 +27905,7 @@ ] }, { - "uuid": "c6d522b7-4eba-4c04-bc04-af482b260a93", + "uuid": "d17335ad-6034-4167-9e56-daed8d34fe7d", "control-id": "cis_rhel10_2-4.1.1", "description": "No notes for control-id 2.4.1.1.", "props": [ @@ -28067,7 +27927,7 @@ ] }, { - "uuid": "5903942b-3116-4fca-bfe8-83de52e5a10d", + "uuid": "12d1b27b-42f8-41a1-9de1-b5fd5dcf21be", "control-id": "cis_rhel10_2-4.1.2", "description": "No notes for control-id 2.4.1.2.", "props": [ @@ -28094,7 +27954,7 @@ ] }, { - "uuid": "788ec50d-3eb8-43b8-a180-243898b12ba8", + "uuid": "93c36de9-2073-4d79-8792-e023c9c3820e", "control-id": "cis_rhel10_2-4.1.3", "description": "No notes for control-id 2.4.1.3.", "props": [ @@ -28121,7 +27981,7 @@ ] }, { - "uuid": "861b3c20-0cf0-40c7-92c1-46530002fe76", + "uuid": "6b83a50c-fb4d-4bde-896b-0dddbc1eb667", "control-id": "cis_rhel10_2-4.1.4", "description": "No notes for control-id 2.4.1.4.", "props": [ @@ -28148,7 +28008,7 @@ ] }, { - "uuid": "62ee4166-256a-4b92-abda-5c82fd9ae706", + "uuid": "c451b018-4a71-4601-b4ed-af87cf119a85", "control-id": "cis_rhel10_2-4.1.5", "description": "No notes for control-id 2.4.1.5.", "props": [ @@ -28175,7 +28035,7 @@ ] }, { - "uuid": "5f69852d-9592-4ea5-a162-af056a5d8da7", + "uuid": "0b68dc31-487f-40aa-8f2d-791a7cad21d3", "control-id": "cis_rhel10_2-4.1.6", "description": "No notes for control-id 2.4.1.6.", "props": [ @@ -28202,7 +28062,7 @@ ] }, { - "uuid": "a96f7be7-4866-4fa4-96ef-29e9757b5300", + "uuid": "2fd2603d-e025-43ad-ba90-0516c295e47a", "control-id": "cis_rhel10_2-4.1.7", "description": "No notes for control-id 2.4.1.7.", "props": [ @@ -28229,7 +28089,7 @@ ] }, { - "uuid": "f30a244b-4269-4bad-9e73-5104b5ca784e", + "uuid": "2d791b0d-9155-4e4a-8bf5-80aa53395559", "control-id": "cis_rhel10_2-4.1.8", "description": "No notes for control-id 2.4.1.8.", "props": [ @@ -28256,7 +28116,7 @@ ] }, { - "uuid": "f18398f2-39a4-45d1-b01e-77b3d4c8d704", + "uuid": "c8a45069-606f-4100-8b87-090884acdb1f", "control-id": "cis_rhel10_2-4.1.9", "description": "No notes for control-id 2.4.1.9.", "props": [ @@ -28293,7 +28153,7 @@ ] }, { - "uuid": "a6694be6-1bae-4304-a1d6-04c97b69584d", + "uuid": "2ef6ef29-b853-4fbe-8115-6ba0cb695b5f", "control-id": "cis_rhel10_2-4.2.1", "description": "No notes for control-id 2.4.2.1.", "props": [ @@ -28330,7 +28190,7 @@ ] }, { - "uuid": "00611ea7-1471-4ea9-a86c-49fda125b286", + "uuid": "c70258ff-5a60-4d52-9a14-b924b52f85f6", "control-id": "cis_rhel10_3-1.1", "description": "The description for control-id cis_rhel10_3-1.1.", "props": [ @@ -28343,7 +28203,7 @@ ] }, { - "uuid": "78c8a2bd-8898-4dbd-8558-d53f07b7b8b3", + "uuid": "7046ebef-0de9-4ba1-8f66-773c18ed9552", "control-id": "cis_rhel10_3-2.1", "description": "No notes for control-id 3.2.1.", "props": [ @@ -28360,7 +28220,7 @@ ] }, { - "uuid": "e3f54e55-41e1-4036-bee1-9552e05c04aa", + "uuid": "f464adb0-12cd-425d-96ac-71d9dad8c583", "control-id": "cis_rhel10_3-2.2", "description": "No notes for control-id 3.2.2.", "props": [ @@ -28377,7 +28237,7 @@ ] }, { - "uuid": "b0b464ae-5a1a-4bb6-9a0d-98e4fc2cd1ee", + "uuid": "6dce253c-f4d5-465b-a00d-2786ad32a892", "control-id": "cis_rhel10_3-2.3", "description": "No notes for control-id 3.2.3.", "props": [ @@ -28394,7 +28254,7 @@ ] }, { - "uuid": "6eb3db07-baee-46bd-a948-086fbeae29cb", + "uuid": "5e3354da-cf98-4168-8332-0be1df5f809e", "control-id": "cis_rhel10_3-2.4", "description": "No notes for control-id 3.2.4.", "props": [ @@ -28411,7 +28271,7 @@ ] }, { - "uuid": "e1d04823-bbcf-4e0d-a299-346bdb29432c", + "uuid": "a2f1aadb-1dd8-441f-83de-5b2750774352", "control-id": "cis_rhel10_3-2.5", "description": "No notes for control-id 3.2.5.", "props": [ @@ -28428,7 +28288,7 @@ ] }, { - "uuid": "7ca71025-b50e-47ff-8d20-520954c25f8a", + "uuid": "fdf4e24a-7fbd-40af-ab88-e7e93d75dbfc", "control-id": "cis_rhel10_3-2.6", "description": "No notes for control-id 3.2.6.", "props": [ @@ -28445,7 +28305,7 @@ ] }, { - "uuid": "32b7ae60-71e5-4cd9-b1e1-17eafd8f53a7", + "uuid": "a85e1417-a7d3-4e62-bac1-f5076772a086", "control-id": "cis_rhel10_3-3.1.1", "description": "No notes for control-id 3.3.1.1.", "props": [ @@ -28462,7 +28322,7 @@ ] }, { - "uuid": "e2524015-3c51-47c6-81f1-868af3ed91fe", + "uuid": "73cf2fec-61b1-4499-aa2b-6fc4ac52270a", "control-id": "cis_rhel10_3-3.1.2", "description": "No notes for control-id 3.3.1.2.", "props": [ @@ -28479,7 +28339,7 @@ ] }, { - "uuid": "bd06864b-66ff-460d-b534-d74c52a23f22", + "uuid": "8f3d62d2-48a6-4a3c-a1fc-b5458a6e87da", "control-id": "cis_rhel10_3-3.1.3", "description": "No notes for control-id 3.3.1.3.", "props": [ @@ -28496,7 +28356,7 @@ ] }, { - "uuid": "cdf72708-67a1-4a54-8b45-cb2f4fb54e8c", + "uuid": "31e5506e-70fc-471c-93c3-ee1492416727", "control-id": "cis_rhel10_3-3.1.4", "description": "No notes for control-id 3.3.1.4.", "props": [ @@ -28513,7 +28373,7 @@ ] }, { - "uuid": "5567f60c-fbde-4c9d-b041-25e650448b01", + "uuid": "d42cd9a4-4345-4366-9d81-d865d99e31f2", "control-id": "cis_rhel10_3-3.1.5", "description": "No notes for control-id 3.3.1.5.", "props": [ @@ -28530,7 +28390,7 @@ ] }, { - "uuid": "ee09bbf7-9f19-4bca-b7fe-97e33444a5f2", + "uuid": "c6331412-4a0e-4746-9ae6-6081160c30ee", "control-id": "cis_rhel10_3-3.1.6", "description": "No notes for control-id 3.3.1.6.", "props": [ @@ -28547,7 +28407,7 @@ ] }, { - "uuid": "34b186d6-6055-47f2-9bb1-62239286974e", + "uuid": "1249404d-630b-4881-a5c5-ba5a0752f84c", "control-id": "cis_rhel10_3-3.1.7", "description": "No notes for control-id 3.3.1.7.", "props": [ @@ -28564,7 +28424,7 @@ ] }, { - "uuid": "2b696d4e-dc62-4383-8d54-84dece2151f9", + "uuid": "6cbea849-4d16-497c-b4ab-1e3b2c5f2612", "control-id": "cis_rhel10_3-3.1.8", "description": "No notes for control-id 3.3.1.8.", "props": [ @@ -28581,7 +28441,7 @@ ] }, { - "uuid": "f7918535-b9fb-45cd-b37c-0ff0a270c6d0", + "uuid": "ddc8f0a3-abac-40be-a567-fe2362d33986", "control-id": "cis_rhel10_3-3.1.9", "description": "No notes for control-id 3.3.1.9.", "props": [ @@ -28598,7 +28458,7 @@ ] }, { - "uuid": "8a6a38e0-0978-40b7-a334-9de7557a6f22", + "uuid": "8902f2a2-741b-43e2-97fb-4c73bbdda6a8", "control-id": "cis_rhel10_3-3.1.10", "description": "No notes for control-id 3.3.1.10.", "props": [ @@ -28615,7 +28475,7 @@ ] }, { - "uuid": "cf89e686-6b0f-45f1-ac05-7378bca76dbb", + "uuid": "b5648b00-fd11-4e91-b5f9-5df7cc961bb0", "control-id": "cis_rhel10_3-3.1.11", "description": "No notes for control-id 3.3.1.11.", "props": [ @@ -28632,7 +28492,7 @@ ] }, { - "uuid": "4d6aadcf-5737-4431-8dea-f559fc9887b1", + "uuid": "1805e321-339b-4331-ae57-d57c3b7b753f", "control-id": "cis_rhel10_3-3.1.12", "description": "No notes for control-id 3.3.1.12.", "props": [ @@ -28649,7 +28509,7 @@ ] }, { - "uuid": "294e8d2d-43fc-4924-a815-0cfadf1162c6", + "uuid": "0ed7680c-9ecc-4e20-ba02-c1accdde77e1", "control-id": "cis_rhel10_3-3.1.13", "description": "No notes for control-id 3.3.1.13.", "props": [ @@ -28666,7 +28526,7 @@ ] }, { - "uuid": "a2bf5427-944c-4e55-806f-d7cd3f25a784", + "uuid": "912f82e1-0e80-4ecf-817c-2f2aaf34d702", "control-id": "cis_rhel10_3-3.1.14", "description": "No notes for control-id 3.3.1.14.", "props": [ @@ -28683,7 +28543,7 @@ ] }, { - "uuid": "66c924d8-c70c-4665-ba9b-2df7fa53862e", + "uuid": "5e6d6896-e99b-4551-87d4-c1490614e21f", "control-id": "cis_rhel10_3-3.1.15", "description": "No notes for control-id 3.3.1.15.", "props": [ @@ -28700,7 +28560,7 @@ ] }, { - "uuid": "02c33ba6-2cbb-4513-94ef-9fcd8a8ce14e", + "uuid": "448ebe15-42e2-4541-a406-6242bb474119", "control-id": "cis_rhel10_3-3.1.16", "description": "No notes for control-id 3.3.1.16.", "props": [ @@ -28717,7 +28577,7 @@ ] }, { - "uuid": "801a11aa-2f84-45af-aba3-43e051bccccd", + "uuid": "0cfc8e7b-59b7-47ff-bca3-e24fb5211dbc", "control-id": "cis_rhel10_3-3.1.17", "description": "No notes for control-id 3.3.1.17.", "props": [ @@ -28734,7 +28594,7 @@ ] }, { - "uuid": "7bffb410-98b0-44bb-969d-62b3d89682f5", + "uuid": "642ba508-3a1a-49a3-b577-7ff6622ab7ca", "control-id": "cis_rhel10_3-3.1.18", "description": "No notes for control-id 3.3.1.18.", "props": [ @@ -28751,7 +28611,7 @@ ] }, { - "uuid": "d92a3fc1-afb2-4668-9a69-0f0b449c5c9a", + "uuid": "3f6347d2-ec7a-41ad-8494-6304c33e251b", "control-id": "cis_rhel10_3-3.2.1", "description": "No notes for control-id 3.3.2.1.", "props": [ @@ -28768,7 +28628,7 @@ ] }, { - "uuid": "2998399a-44d0-42de-a25c-2fba1015749e", + "uuid": "bd2a20b1-fa70-4e17-8dce-47f50874a8f0", "control-id": "cis_rhel10_3-3.2.2", "description": "No notes for control-id 3.3.2.2.", "props": [ @@ -28785,7 +28645,7 @@ ] }, { - "uuid": "17829e7b-d193-4c8c-ac92-7b0b3ffce696", + "uuid": "75491daa-83f7-4187-9f7e-bac9e285b691", "control-id": "cis_rhel10_3-3.2.3", "description": "No notes for control-id 3.3.2.3.", "props": [ @@ -28802,7 +28662,7 @@ ] }, { - "uuid": "c5c6997b-818b-4a6d-aa6d-bad2772528cf", + "uuid": "a05f63ae-bef1-40d7-88d3-46d7b19bd42f", "control-id": "cis_rhel10_3-3.2.4", "description": "No notes for control-id 3.3.2.4.", "props": [ @@ -28819,7 +28679,7 @@ ] }, { - "uuid": "4362d2b3-c37a-4927-949d-ad9148af8e4f", + "uuid": "4a6f958d-67e7-4794-99e5-dd32c5fd92c8", "control-id": "cis_rhel10_3-3.2.5", "description": "No notes for control-id 3.3.2.5.", "props": [ @@ -28836,7 +28696,7 @@ ] }, { - "uuid": "9c3a7a38-0be8-45e7-8cce-284405fff6d9", + "uuid": "0e92531c-33a9-4e79-82c3-ed34591cd74e", "control-id": "cis_rhel10_3-3.2.6", "description": "No notes for control-id 3.3.2.6.", "props": [ @@ -28853,7 +28713,7 @@ ] }, { - "uuid": "092ef4a5-09aa-4428-b8e5-9740f737552a", + "uuid": "be4c282c-4627-4f31-b187-d708d6d9a2c7", "control-id": "cis_rhel10_3-3.2.7", "description": "No notes for control-id 3.3.2.7.", "props": [ @@ -28870,7 +28730,7 @@ ] }, { - "uuid": "010dfc26-bbfd-41c4-80b1-8cf1f0a8c84a", + "uuid": "9eaefd9c-fc27-406c-9f3d-b2d35df2bbe4", "control-id": "cis_rhel10_3-3.2.8", "description": "No notes for control-id 3.3.2.8.", "props": [ @@ -28887,7 +28747,7 @@ ] }, { - "uuid": "8344b692-358f-4d4a-b374-3d5f8923be0a", + "uuid": "c35ed3d8-5fd2-465c-a6fd-32e80a06a304", "control-id": "cis_rhel10_4-1.1", "description": "No notes for control-id 4.1.1.", "props": [ @@ -28904,7 +28764,7 @@ ] }, { - "uuid": "01dde9ce-8c74-4529-8236-d3101a29d0a8", + "uuid": "76b7171e-7209-4c5a-a761-1004a74c07fb", "control-id": "cis_rhel10_4-1.2", "description": "No notes for control-id 4.1.2.", "props": [ @@ -28921,7 +28781,7 @@ ] }, { - "uuid": "55b383a7-5e22-49e1-9a2e-59071b92bc39", + "uuid": "1b8af979-6b3d-4b52-8bea-d0d1ec155474", "control-id": "cis_rhel10_4-1.3", "description": "No notes for control-id 4.1.3.", "props": [ @@ -28938,7 +28798,7 @@ ] }, { - "uuid": "bf8602e7-0288-477e-906c-e1a43134b9f7", + "uuid": "556efc34-807e-4562-b8dd-57d654c25307", "control-id": "cis_rhel10_4-1.4", "description": "The description for control-id cis_rhel10_4-1.4.", "props": [ @@ -28951,7 +28811,7 @@ ] }, { - "uuid": "564cf034-caf2-490b-aaab-42a728e10b7f", + "uuid": "5167d454-d25a-4f9e-b0e1-a9ea936d614b", "control-id": "cis_rhel10_4-1.5", "description": "Firewalld in Red Hat Enterprise Linux 10 accepts loopback traffic by default.", "props": [ @@ -28968,7 +28828,7 @@ ] }, { - "uuid": "556c6468-1fd1-4ad8-880c-be8fdcb9dca8", + "uuid": "140af224-a739-4442-8d12-0ae723e3ce57", "control-id": "cis_rhel10_4-1.6", "description": "The description for control-id cis_rhel10_4-1.6.", "props": [ @@ -28981,7 +28841,7 @@ ] }, { - "uuid": "b7e0958b-b616-4ac1-aaa4-90998e6b4779", + "uuid": "a4275de8-db52-48b7-b1c3-c202c306c8d1", "control-id": "cis_rhel10_4-1.7", "description": "The description for control-id cis_rhel10_4-1.7.", "props": [ @@ -28994,7 +28854,7 @@ ] }, { - "uuid": "c5dc073d-4f77-41b7-92ad-ac7a8d20a236", + "uuid": "2ab7e4f6-2f4a-49fe-a2da-98e0afb6db25", "control-id": "cis_rhel10_5-1.1", "description": "No notes for control-id 5.1.1.", "props": [ @@ -29051,7 +28911,7 @@ ] }, { - "uuid": "bcac9f22-3be5-41d0-834a-faf0a1f63936", + "uuid": "febe992f-5cc9-42e5-ac60-5a1f42a32f7f", "control-id": "cis_rhel10_5-1.2", "description": "No notes for control-id 5.1.2.", "props": [ @@ -29078,7 +28938,7 @@ ] }, { - "uuid": "896ed5ee-37da-4146-98db-7d6d70b1a6ef", + "uuid": "7bfeb139-8aa8-4814-ba85-2ddc4e562407", "control-id": "cis_rhel10_5-1.3", "description": "No notes for control-id 5.1.3.", "props": [ @@ -29105,7 +28965,7 @@ ] }, { - "uuid": "3f0e0f45-d404-44e5-93b8-cdf7ab10ed0e", + "uuid": "3366ec70-005d-4947-9866-c0ddd7d6fd74", "control-id": "cis_rhel10_5-1.4", "description": "No notes for control-id 5.1.4.", "props": [ @@ -29122,7 +28982,7 @@ ] }, { - "uuid": "9b015121-23b4-4db6-8403-a934fca0d60e", + "uuid": "ebba799c-022c-40a3-aa46-5d1284227f7a", "control-id": "cis_rhel10_5-1.5", "description": "No notes for control-id 5.1.5.", "props": [ @@ -29139,7 +28999,7 @@ ] }, { - "uuid": "08a8c797-42d0-4564-b8b0-56b118281490", + "uuid": "9f1502dc-b06f-4245-b02e-469514c5c651", "control-id": "cis_rhel10_5-1.6", "description": "No notes for control-id 5.1.6.", "props": [ @@ -29156,7 +29016,7 @@ ] }, { - "uuid": "a74bbc88-7fef-417e-a78c-1d6af2a2a698", + "uuid": "ed67ec09-2512-43b7-871e-9aedfffa192f", "control-id": "cis_rhel10_5-1.7", "description": "The requirement gives an example of 45 seconds, but is flexible about the values. It is only\nnecessary to ensure there is a timeout configured in alignment to the site policy.", "props": [ @@ -29178,7 +29038,7 @@ ] }, { - "uuid": "9771abf7-43cc-4189-9f13-a1d9c622d5a5", + "uuid": "e137aaf5-e5d7-454d-b27e-03c1ce530032", "control-id": "cis_rhel10_5-1.8", "description": "No notes for control-id 5.1.8.", "props": [ @@ -29195,7 +29055,7 @@ ] }, { - "uuid": "8e5535a7-96a4-4e3c-9efb-62a1dfd71e1d", + "uuid": "a5aa48c6-847a-4f2a-9be9-6c37f113eb27", "control-id": "cis_rhel10_5-1.9", "description": "No notes for control-id 5.1.9.", "props": [ @@ -29212,7 +29072,7 @@ ] }, { - "uuid": "48f4b734-6967-41f1-ba80-5487ddf8b673", + "uuid": "a8503a5e-b530-47da-b222-ac8068d15ad8", "control-id": "cis_rhel10_5-1.10", "description": "No notes for control-id 5.1.10.", "props": [ @@ -29229,7 +29089,7 @@ ] }, { - "uuid": "6d9b8b33-df93-4d97-aeb8-cfa2cc3133f7", + "uuid": "21149e8f-1afd-4da1-91fd-69ab59f83b1b", "control-id": "cis_rhel10_5-1.11", "description": "No notes for control-id 5.1.11.", "props": [ @@ -29246,7 +29106,7 @@ ] }, { - "uuid": "7786a4a1-137a-4fcc-956e-215e9fbdfdf5", + "uuid": "8ac07007-6104-4cb6-85de-2eebcd28e4f0", "control-id": "cis_rhel10_5-1.12", "description": "The description for control-id cis_rhel10_5-1.12.", "props": [ @@ -29264,7 +29124,7 @@ ] }, { - "uuid": "0345b159-9bc9-4035-b8e6-8e5543c7cbca", + "uuid": "e04d5659-a544-40c8-989c-c84385e44228", "control-id": "cis_rhel10_5-1.13", "description": "No notes for control-id 5.1.13.", "props": [ @@ -29281,7 +29141,7 @@ ] }, { - "uuid": "818c736c-533c-47ad-b7d7-656d39d518c8", + "uuid": "d8c4b841-6447-4cc2-9495-f87a32c36307", "control-id": "cis_rhel10_5-1.14", "description": "The CIS benchmark is not opinionated about which loglevel is selected here. Here, this\nprofile uses VERBOSE by default, as it allows for the capture of login and logout activity\nas well as key fingerprints.", "props": [ @@ -29298,7 +29158,7 @@ ] }, { - "uuid": "faca41cd-15e1-475e-8bf8-c441d3604336", + "uuid": "6ff4e5ea-da5a-4efa-b036-c8c5d3d15697", "control-id": "cis_rhel10_5-1.15", "description": "No notes for control-id 5.1.15.", "props": [ @@ -29315,7 +29175,7 @@ ] }, { - "uuid": "418939ae-1041-48e9-b39f-9718e9822b22", + "uuid": "1a559af8-b41a-419e-83c5-1cb6f7303269", "control-id": "cis_rhel10_5-1.16", "description": "No notes for control-id 5.1.16.", "props": [ @@ -29332,7 +29192,7 @@ ] }, { - "uuid": "b62f7159-06c9-4474-901d-51c4ca841906", + "uuid": "3e404ffe-e77e-44d8-bc8a-ba6fabc3ec6c", "control-id": "cis_rhel10_5-1.17", "description": "No notes for control-id 5.1.17.", "props": [ @@ -29349,7 +29209,7 @@ ] }, { - "uuid": "a28c9119-3537-417e-9737-76436afcaabc", + "uuid": "cb84a3d2-7ccf-44ee-9de9-146c11932164", "control-id": "cis_rhel10_5-1.18", "description": "No notes for control-id 5.1.18.", "props": [ @@ -29366,7 +29226,7 @@ ] }, { - "uuid": "3275b084-0ae3-454b-be1d-f55a7e9892dd", + "uuid": "be8a5ca9-1af5-4a60-8201-fe0d27b5acd6", "control-id": "cis_rhel10_5-1.19", "description": "No notes for control-id 5.1.19.", "props": [ @@ -29383,7 +29243,7 @@ ] }, { - "uuid": "5f07a563-6b3c-4afa-a632-7174b8c87148", + "uuid": "2b386adf-536d-4a8f-a3a6-80c3abfc3314", "control-id": "cis_rhel10_5-1.20", "description": "No notes for control-id 5.1.20.", "props": [ @@ -29400,7 +29260,7 @@ ] }, { - "uuid": "09de3f6f-0d98-4d3b-bb91-986be2e4ecd0", + "uuid": "1ec5bb82-ce4f-4a74-94c7-0a2139fbdcee", "control-id": "cis_rhel10_5-1.21", "description": "No notes for control-id 5.1.21.", "props": [ @@ -29417,7 +29277,7 @@ ] }, { - "uuid": "1f9202ab-b60f-4456-9264-a876f9561b94", + "uuid": "fb76ee3d-d3d5-42f7-87bd-aa1c586d2fea", "control-id": "cis_rhel10_5-1.22", "description": "No notes for control-id 5.1.22.", "props": [ @@ -29434,7 +29294,7 @@ ] }, { - "uuid": "cc656ce5-3e92-42b5-b529-c53ca0537f47", + "uuid": "918e2955-340c-4a32-9a88-d126ad927df6", "control-id": "cis_rhel10_5-2.1", "description": "No notes for control-id 5.2.1.", "props": [ @@ -29451,7 +29311,7 @@ ] }, { - "uuid": "6dfd89c0-8c0c-4cff-b087-4b5f9cb3232c", + "uuid": "d33c5929-fbb1-4ef9-bca0-2e3efe3617ca", "control-id": "cis_rhel10_5-2.2", "description": "No notes for control-id 5.2.2.", "props": [ @@ -29468,7 +29328,7 @@ ] }, { - "uuid": "609a8491-2f4e-4b84-b467-65563e0a7f43", + "uuid": "738e964c-4522-4e55-bc77-01885ca0a3b1", "control-id": "cis_rhel10_5-2.3", "description": "No notes for control-id 5.2.3.", "props": [ @@ -29485,7 +29345,7 @@ ] }, { - "uuid": "09d2ddab-b3d9-4530-8ac2-f1ca4b4cc174", + "uuid": "8e0d1390-6897-415d-aac7-85bed6eb40ac", "control-id": "cis_rhel10_5-2.5", "description": "No notes for control-id 5.2.5.", "props": [ @@ -29502,7 +29362,7 @@ ] }, { - "uuid": "719fea07-f06e-4460-8b1d-c097db2abcf5", + "uuid": "7db6fb51-5175-4220-af2a-b6f36e21b984", "control-id": "cis_rhel10_5-2.6", "description": "No notes for control-id 5.2.6.", "props": [ @@ -29519,7 +29379,7 @@ ] }, { - "uuid": "b50eee7f-4432-40b7-bf90-ad0715196b49", + "uuid": "79d188c1-359e-4f5d-9bba-0b1eeff37a6c", "control-id": "cis_rhel10_5-2.7", "description": "Members of \"wheel\" or GID 0 groups are checked by default if the group option is not set for\npam_wheel.so module. The recommendation states the group should be empty to reinforce the\nuse of \"sudo\" for privileged access. Therefore, members of these groups should be manually\nchecked or a different group should be informed.", "props": [ @@ -29541,7 +29401,7 @@ ] }, { - "uuid": "53cd9993-36ae-4feb-892a-1aebad96d9b2", + "uuid": "6a8ef557-8061-4cb1-8479-49ac86234646", "control-id": "cis_rhel10_5-3.1.1", "description": "This requirement is hard to be automated without any specific requirement. The policy even\nstates that provided commands are examples, other custom settings might be in place and the\nsettings might be different depending on site policies. The other rules will already make\nsure there is a correct autheselect profile regardless of the existing settings. It is\nnecessary to better discuss with CIS Community.", "props": [ @@ -29553,7 +29413,7 @@ ] }, { - "uuid": "ea5cae8f-f530-4017-b0ed-32aceb198acd", + "uuid": "ee27b9ee-b4a1-4b16-96fa-6136c548b2d6", "control-id": "cis_rhel10_5-3.1.2", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.1.", "props": [ @@ -29575,7 +29435,7 @@ ] }, { - "uuid": "eba589e7-7248-472e-a453-12b5117f59e8", + "uuid": "9a019f64-7e07-4dfa-96f4-91e2d971dc07", "control-id": "cis_rhel10_5-3.1.3", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.2.", "props": [ @@ -29602,7 +29462,7 @@ ] }, { - "uuid": "976aa39a-c64e-4e51-a30e-832262dc9b65", + "uuid": "445bac5e-57fb-4356-bb57-cc474ce5d89f", "control-id": "cis_rhel10_5-3.1.4", "description": "The module is properly enabled by the rules mentioned in related_rules.\nRequirements in 5.3.2.3 use these rules.", "props": [ @@ -29614,7 +29474,7 @@ ] }, { - "uuid": "c04d6a03-dc34-4b6d-9d25-4c7e84ef04ad", + "uuid": "2710fb15-76d4-4292-acf9-be020f33d886", "control-id": "cis_rhel10_5-3.1.5", "description": "No notes for control-id 5.3.1.5.", "props": [ @@ -29631,7 +29491,7 @@ ] }, { - "uuid": "7f6df422-f36a-4e70-a975-30ec52f7f9db", + "uuid": "c194923b-dcd3-4606-98bf-613878cb205c", "control-id": "cis_rhel10_5-3.2.1.1", "description": "No notes for control-id 5.3.2.1.1.", "props": [ @@ -29648,7 +29508,7 @@ ] }, { - "uuid": "938da631-5f2a-47f0-a423-accc22ff288d", + "uuid": "65c9d0af-01a1-4ac1-85b4-e7adfc70cf30", "control-id": "cis_rhel10_5-3.2.1.2", "description": "The policy also accepts value 0, which means the locked accounts should be manually unlocked\nby an administrator. However, it also mentions that using value 0 can facilitate a DoS\nattack to legitimate users.", "props": [ @@ -29665,7 +29525,7 @@ ] }, { - "uuid": "5e688bf1-e783-41c2-8846-bdf86f8a4f3d", + "uuid": "54054595-177f-4901-87fc-c04398a2cb7b", "control-id": "cis_rhel10_5-3.2.2.1", "description": "No notes for control-id 5.3.2.2.1.", "props": [ @@ -29682,7 +29542,7 @@ ] }, { - "uuid": "0ea718e4-9813-4e19-b574-e1b0d06d7ef9", + "uuid": "1d78d199-dbe6-427f-99bd-dd3fdbc34947", "control-id": "cis_rhel10_5-3.2.2.2", "description": "No notes for control-id 5.3.2.2.2.", "props": [ @@ -29699,7 +29559,7 @@ ] }, { - "uuid": "ea6c1262-daa3-4b23-84a9-8a33ecc322f7", + "uuid": "4335a419-7e80-470a-8d74-ac7b898a1b34", "control-id": "cis_rhel10_5-3.2.2.3", "description": "This requirement is expected to be manual. However, in previous versions of the policy\nit was already automated the configuration of \"minclass\" option. This posture was kept for\nRHEL 10 in this new version. Rules related to other options are informed in related_rules.\nIn short, minclass=4 alone can achieve the same result achieved by the combination of the\nother 4 options mentioned in the policy.", "props": [ @@ -29716,7 +29576,7 @@ ] }, { - "uuid": "b9f36f9e-0f8f-4119-a31d-44a9ef224d12", + "uuid": "40cbdd1f-afe2-451d-b0fc-7fab86afb77d", "control-id": "cis_rhel10_5-3.2.2.4", "description": "No notes for control-id 5.3.2.2.4.", "props": [ @@ -29733,7 +29593,7 @@ ] }, { - "uuid": "d91fbfd9-eedb-406b-8598-91c6ff153972", + "uuid": "8e129e1f-cd8f-4d56-8d92-5abdfc23fe38", "control-id": "cis_rhel10_5-3.2.2.5", "description": "No notes for control-id 5.3.2.2.5.", "props": [ @@ -29750,7 +29610,7 @@ ] }, { - "uuid": "51f45d7a-ca4f-4456-af83-953527184180", + "uuid": "7c8bc5ea-20c9-4411-81ae-d81cc1aeb9bf", "control-id": "cis_rhel10_5-3.2.2.6", "description": "No notes for control-id 5.3.2.2.6.", "props": [ @@ -29767,7 +29627,7 @@ ] }, { - "uuid": "7a8606fd-7ced-497a-b693-0ae2e6491351", + "uuid": "2bee01ee-001b-4b55-9e13-70aa2e8e14f2", "control-id": "cis_rhel10_5-3.2.2.7", "description": "No notes for control-id 5.3.2.2.7.", "props": [ @@ -29784,7 +29644,7 @@ ] }, { - "uuid": "b53e8caa-55f4-4f46-9168-cf56a3568340", + "uuid": "641ece25-9c0a-496f-9f99-22769724b2b2", "control-id": "cis_rhel10_5-3.2.3.1", "description": "Although mentioned in the section 5.3.3.3, there is no explicit requirement to configure\nretry option of pam_pwhistory. If come in the future, the rule accounts_password_pam_retry\ncan be used.", "props": [ @@ -29806,7 +29666,7 @@ ] }, { - "uuid": "4e21b88f-42a4-4301-a324-1a7e576daf34", + "uuid": "04413aa8-ee0b-429f-bac9-adcce81a0eb4", "control-id": "cis_rhel10_5-3.2.3.2", "description": "No notes for control-id 5.3.2.3.2.", "props": [ @@ -29823,7 +29683,7 @@ ] }, { - "uuid": "74ae5f99-ed10-4d9b-a85a-c9c7975171fb", + "uuid": "35aea363-8d63-4db7-bd95-491b28c45ad5", "control-id": "cis_rhel10_5-3.2.3.3", "description": "In RHEL 10 pam_pwhistory is enabled via authselect feature, as required in 5.3.1.4. The\nfeature automatically set \"use_authok\" option. In any case, we don't have a rule to check\nthis option specifically.", "props": [ @@ -29840,7 +29700,7 @@ ] }, { - "uuid": "4fd525f8-4d9b-4cec-ad17-5a2923d9bfc0", + "uuid": "a17fbff7-cb50-4a21-aca8-f977fe8dce6b", "control-id": "cis_rhel10_5-3.2.4.1", "description": "The rule more specifically used in this requirement also satify the requirement 5.3.1.5.", "props": [ @@ -29857,7 +29717,7 @@ ] }, { - "uuid": "28f7f2df-97e3-4632-af88-4c8cd75ac269", + "uuid": "e09c167d-ce4e-4877-9e55-0022fb138d81", "control-id": "cis_rhel10_5-3.2.4.2", "description": "Usage of pam_unix.so module together with \"remember\" option is deprecated and is not\nrecommended by this policy. Instead, it should be used remember option of pam_pwhistory\nmodule, as required in 5.3.2.3.1. See here for more details about pam_unix.so:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1778929", "props": [ @@ -29874,7 +29734,7 @@ ] }, { - "uuid": "69d64109-a1a6-4535-9b59-3160a376d27b", + "uuid": "01d27012-6778-40b6-8b07-c3d93fba7446", "control-id": "cis_rhel10_5-3.2.4.3", "description": "Changes in logindefs mentioned in this requirement are more specifically covered by 5.4.1.4", "props": [ @@ -29896,7 +29756,7 @@ ] }, { - "uuid": "95319ad7-e143-4ef8-902e-ad03da798760", + "uuid": "e1ec20b9-53c2-4536-b3dd-2d67cdedf2b2", "control-id": "cis_rhel10_5-3.2.4.4", "description": "In RHEL 10 pam_unix is enabled by default in all authselect profiles already with the\nuse_authtok option set. In any case, we don't have a rule to check this option specifically,\nlike in 5.3.2.3.3.", "props": [ @@ -29913,7 +29773,7 @@ ] }, { - "uuid": "681a24c5-6e8b-4507-b9dc-2089d765183b", + "uuid": "c5e17d38-528e-4744-a7f2-df209b8f1ddb", "control-id": "cis_rhel10_5-4.1.1", "description": "No notes for control-id 5.4.1.1.", "props": [ @@ -29935,7 +29795,7 @@ ] }, { - "uuid": "355b7ae6-cd4a-4c81-ac5e-836237e94be1", + "uuid": "27d855eb-9ced-44a1-9faa-622c73dc521f", "control-id": "cis_rhel10_5-4.1.3", "description": "No notes for control-id 5.4.1.3.", "props": [ @@ -29957,7 +29817,7 @@ ] }, { - "uuid": "f10a0f6a-4e68-497a-b1c6-6b6b07a2671c", + "uuid": "20abaa69-c4d6-43e5-b041-487c7a9f0c2a", "control-id": "cis_rhel10_5-4.1.4", "description": "There's a \"new\" set of options in /etc/login.defs file to define the number of iterations\nperformed during the hashing process.", "props": [ @@ -29979,7 +29839,7 @@ ] }, { - "uuid": "3ee389d1-f3bb-49f4-8a59-427bd77b4c16", + "uuid": "01815bfb-fbc5-44f8-b175-540059cd1cae", "control-id": "cis_rhel10_5-4.1.5", "description": "No notes for control-id 5.4.1.5.", "props": [ @@ -30001,7 +29861,7 @@ ] }, { - "uuid": "b4172eba-94fa-496b-bb83-cc588de469bc", + "uuid": "781d3640-abbc-496f-b154-52b6d783eccc", "control-id": "cis_rhel10_5-4.1.6", "description": "No notes for control-id 5.4.1.6.", "props": [ @@ -30018,7 +29878,7 @@ ] }, { - "uuid": "560723ce-6250-4630-ad88-f4e7bf184451", + "uuid": "0bcb2d33-08bf-49e0-bd59-f70509c26d69", "control-id": "cis_rhel10_5-4.2.1", "description": "No notes for control-id 5.4.2.1.", "props": [ @@ -30035,7 +29895,7 @@ ] }, { - "uuid": "808fe174-f7fe-4325-ae9f-e545871bee2a", + "uuid": "a4ee1870-c15d-4043-ad99-981de7d74276", "control-id": "cis_rhel10_5-4.2.2", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -30052,7 +29912,7 @@ ] }, { - "uuid": "c5d54357-80c0-49a1-a07e-2a786522715c", + "uuid": "26ae19da-02eb-4e22-85e8-7d8cbda3e4f6", "control-id": "cis_rhel10_5-4.2.3", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -30069,7 +29929,7 @@ ] }, { - "uuid": "22387d4b-d9bb-4957-bcdd-45ce22a6c2a3", + "uuid": "099fe80a-55f6-48f4-8017-482fd9e59de1", "control-id": "cis_rhel10_5-4.2.4", "description": "No notes for control-id 5.4.2.4.", "props": [ @@ -30086,7 +29946,7 @@ ] }, { - "uuid": "d8ac4680-0eea-4136-a9bf-05e657820cb0", + "uuid": "21efed03-3232-4b63-be76-87f93a1f1626", "control-id": "cis_rhel10_5-4.2.5", "description": "No notes for control-id 5.4.2.5.", "props": [ @@ -30108,7 +29968,7 @@ ] }, { - "uuid": "9f8d396f-769e-4017-bedb-03d9a5a7622a", + "uuid": "2f7e74ce-a2f8-4d1b-bd6b-20deac88451e", "control-id": "cis_rhel10_5-4.2.6", "description": "No notes for control-id 5.4.2.6.", "props": [ @@ -30125,7 +29985,7 @@ ] }, { - "uuid": "41b2633a-8740-4e69-8281-e412901c910e", + "uuid": "40ed643c-20e2-4a27-b57e-cdc444f1868f", "control-id": "cis_rhel10_5-4.2.7", "description": "No notes for control-id 5.4.2.7.", "props": [ @@ -30147,7 +30007,7 @@ ] }, { - "uuid": "73383f79-58a0-485e-a236-17aae23e6a07", + "uuid": "db20a067-62ae-42b1-ad1b-05ef9d37f12a", "control-id": "cis_rhel10_5-4.2.8", "description": "No notes for control-id 5.4.2.8.", "props": [ @@ -30164,7 +30024,7 @@ ] }, { - "uuid": "04fd9396-db32-446c-a643-cea273e288ed", + "uuid": "48755e1b-0283-4f18-a52b-1a5793cb5210", "control-id": "cis_rhel10_5-4.3.2", "description": "No notes for control-id 5.4.3.2.", "props": [ @@ -30181,7 +30041,7 @@ ] }, { - "uuid": "39fa24cb-e0c0-41dc-b165-84277321c868", + "uuid": "88304a58-476a-43df-8619-bad67a53d980", "control-id": "cis_rhel10_5-4.3.3", "description": "No notes for control-id 5.4.3.3.", "props": [ @@ -30208,7 +30068,7 @@ ] }, { - "uuid": "2f7cb420-1cc1-4af3-96cb-859cacdaf6b8", + "uuid": "9f6ff4ff-c948-4af9-bcb7-0372ad90eb5c", "control-id": "cis_rhel10_6-1.1", "description": "No notes for control-id 6.1.1.", "props": [ @@ -30230,7 +30090,7 @@ ] }, { - "uuid": "f19c95cd-4fd8-4352-8f93-6f92e67dab88", + "uuid": "52d2d0c8-138e-4bb7-a4c4-85b0624a4a68", "control-id": "cis_rhel10_6-1.2", "description": "No notes for control-id 6.1.2.", "props": [ @@ -30247,7 +30107,7 @@ ] }, { - "uuid": "3133599d-eb5b-4ec0-9e75-48034f67037f", + "uuid": "59969dba-1481-49e8-be2a-99ab7569123e", "control-id": "cis_rhel10_6-1.3", "description": "No notes for control-id 6.1.3.", "props": [ @@ -30264,7 +30124,7 @@ ] }, { - "uuid": "b8bf6469-bbe4-47a1-bed8-dc8bd7ed938d", + "uuid": "39111e42-3d27-400d-a6f4-36013274265e", "control-id": "cis_rhel10_6-2.1.1", "description": "No notes for control-id 6.2.1.1.", "props": [ @@ -30281,7 +30141,7 @@ ] }, { - "uuid": "2b4f4c2f-ca9f-4577-b3eb-3ceab4234cce", + "uuid": "d5b767b4-201a-42db-adec-f728431e8786", "control-id": "cis_rhel10_6-2.1.2", "description": "The description for control-id cis_rhel10_6-2.1.2.", "props": [ @@ -30294,7 +30154,7 @@ ] }, { - "uuid": "8881dfac-d2ef-4208-97af-a8a90e796efd", + "uuid": "23b0f4ff-0e87-4d4b-b7e4-1ee001b2c98d", "control-id": "cis_rhel10_6-2.1.3", "description": "The description for control-id cis_rhel10_6-2.1.3.", "props": [ @@ -30307,7 +30167,7 @@ ] }, { - "uuid": "b46901d8-bd1c-4f74-98e5-e4a76a0ed2e3", + "uuid": "1f144250-869a-4724-ad12-78bf4240691e", "control-id": "cis_rhel10_6-2.1.4", "description": "No notes for control-id 6.2.1.4.", "props": [ @@ -30324,7 +30184,7 @@ ] }, { - "uuid": "fc1bd4a4-e2a6-45ef-b50d-329b0eb0f25f", + "uuid": "a54adbd4-ee3a-45e8-99b1-e9064f822836", "control-id": "cis_rhel10_6-2.2.1.1", "description": "No notes for control-id 6.2.2.1.1.", "props": [ @@ -30341,7 +30201,7 @@ ] }, { - "uuid": "1abe7547-a912-4db1-9b5b-2ba9590d0a81", + "uuid": "274113e0-e166-4e75-81ae-635d619f3204", "control-id": "cis_rhel10_6-2.2.1.2", "description": "The description for control-id cis_rhel10_6-2.2.1.2.", "props": [ @@ -30354,7 +30214,7 @@ ] }, { - "uuid": "77e3904f-1cf0-4dc1-bc2c-466c650691cd", + "uuid": "4b24b5ff-7a8c-435e-8e77-4c9beda44428", "control-id": "cis_rhel10_6-2.2.1.3", "description": "No notes for control-id 6.2.2.1.3.", "props": [ @@ -30371,7 +30231,7 @@ ] }, { - "uuid": "b3e15f81-f80f-4e23-98b9-3f9493c50851", + "uuid": "0f695da0-74ce-4a0c-ac9b-95c2580418c8", "control-id": "cis_rhel10_6-2.2.1.4", "description": "No notes for control-id 6.2.2.1.4.", "props": [ @@ -30388,7 +30248,7 @@ ] }, { - "uuid": "df491a36-e5b3-4ea0-bea9-2fc61b9528da", + "uuid": "dad81d12-6ab3-4e10-931b-569d95081010", "control-id": "cis_rhel10_6-2.2.2", "description": "No notes for control-id 6.2.2.2.", "props": [ @@ -30405,7 +30265,7 @@ ] }, { - "uuid": "7fdc6ef4-c229-4127-89d0-9b12406a3fdb", + "uuid": "d06af5f1-3ea7-4383-a8f5-1d4bc8ba5d57", "control-id": "cis_rhel10_6-2.2.3", "description": "No notes for control-id 6.2.2.3.", "props": [ @@ -30422,7 +30282,7 @@ ] }, { - "uuid": "f2a5e5ae-8ad1-4040-9da3-66b48e4499ba", + "uuid": "92c4ec60-e0d3-4ec7-b55c-d0d918cc1016", "control-id": "cis_rhel10_6-2.2.4", "description": "No notes for control-id 6.2.2.4.", "props": [ @@ -30439,7 +30299,7 @@ ] }, { - "uuid": "9dc688d3-87bc-47f2-8fb8-6af21954aa54", + "uuid": "899a703b-a289-403a-bf23-2a6f5fa587d3", "control-id": "cis_rhel10_6-2.3.1", "description": "No notes for control-id 6.2.3.1.", "props": [ @@ -30451,7 +30311,7 @@ ] }, { - "uuid": "3163c1d1-0bb1-480e-ba34-15bf09c812ed", + "uuid": "e6070973-26d9-4b07-ab28-1fda0505327e", "control-id": "cis_rhel10_6-2.3.2", "description": "No notes for control-id 6.2.3.2.", "props": [ @@ -30463,7 +30323,7 @@ ] }, { - "uuid": "d707c7ba-deb5-4cda-8417-522b820cd1fb", + "uuid": "8b0c6cca-df1f-4b06-9b8f-d8fdefd43db4", "control-id": "cis_rhel10_6-2.3.3", "description": "No notes for control-id 6.2.3.3.", "props": [ @@ -30475,7 +30335,7 @@ ] }, { - "uuid": "38178095-4cda-4109-93e8-d92178296b37", + "uuid": "4a1fc61d-6fb8-4225-8191-c11d679a3ec0", "control-id": "cis_rhel10_6-2.3.4", "description": "No notes for control-id 6.2.3.4.", "props": [ @@ -30487,7 +30347,7 @@ ] }, { - "uuid": "ca896a4e-808b-4489-9877-abb6bc650d42", + "uuid": "705487f5-5fe6-4280-b443-3bfa6f8cb7f2", "control-id": "cis_rhel10_6-2.3.5", "description": "The description for control-id cis_rhel10_6-2.3.5.", "props": [ @@ -30500,7 +30360,7 @@ ] }, { - "uuid": "d8a8ef01-b45c-4d33-b977-3cd6af09728a", + "uuid": "b795354c-04c4-4e73-bc98-a1f9f74cb1e9", "control-id": "cis_rhel10_6-2.3.6", "description": "The description for control-id cis_rhel10_6-2.3.6.", "props": [ @@ -30513,7 +30373,7 @@ ] }, { - "uuid": "1de49351-a50a-4c0a-9a43-a5a8fbebc95e", + "uuid": "1c15a0df-b0d0-4890-b932-97fd31293a74", "control-id": "cis_rhel10_6-2.3.7", "description": "No notes for control-id 6.2.3.7.", "props": [ @@ -30525,7 +30385,7 @@ ] }, { - "uuid": "2a1597a6-ee19-40fe-98c4-7d8ae89d6bd3", + "uuid": "856196b5-26ea-4f52-adeb-9102967ac8ab", "control-id": "cis_rhel10_6-2.3.8", "description": "The description for control-id cis_rhel10_6-2.3.8.", "props": [ @@ -30538,7 +30398,7 @@ ] }, { - "uuid": "562a5415-2eaf-42dd-be63-6406e7f3e229", + "uuid": "c04bd5eb-5750-4ce5-9398-c39006b81daa", "control-id": "cis_rhel10_6-2.4.1", "description": "It is not harmful to run these rules even if rsyslog is not installed or active.", "props": [ @@ -30565,7 +30425,7 @@ ] }, { - "uuid": "8dc2b797-b7ab-4d3d-8710-4e306ea02800", + "uuid": "fca79de6-efea-4cdf-9bcf-904c6b6eaf48", "control-id": "cis_rhel10_7-1.1", "description": "No notes for control-id 7.1.1.", "props": [ @@ -30592,7 +30452,7 @@ ] }, { - "uuid": "476a4226-6f97-4ebe-b0eb-19328c192115", + "uuid": "092b600e-8de1-4315-891a-975e09054d8e", "control-id": "cis_rhel10_7-1.2", "description": "No notes for control-id 7.1.2.", "props": [ @@ -30619,7 +30479,7 @@ ] }, { - "uuid": "4e1a49fb-7fe1-4772-9a9f-68ced777cafe", + "uuid": "d4b1c756-2329-4e88-880b-5aded55fbd4a", "control-id": "cis_rhel10_7-1.3", "description": "No notes for control-id 7.1.3.", "props": [ @@ -30646,7 +30506,7 @@ ] }, { - "uuid": "4e13afd5-6d15-41c0-ab6d-1777820bfe07", + "uuid": "9bf5c518-986c-4815-a59b-3241c6eabc37", "control-id": "cis_rhel10_7-1.4", "description": "No notes for control-id 7.1.4.", "props": [ @@ -30673,7 +30533,7 @@ ] }, { - "uuid": "0ca783b1-45f8-416d-aef8-27e7a3fef294", + "uuid": "51f777b0-8b3c-4b6a-90dd-5c0ef73cf4a7", "control-id": "cis_rhel10_7-1.5", "description": "No notes for control-id 7.1.5.", "props": [ @@ -30700,7 +30560,7 @@ ] }, { - "uuid": "d11acd7b-548b-4660-a857-d6a9b63f06e3", + "uuid": "32528373-5d98-45fd-b115-524c51d4d30c", "control-id": "cis_rhel10_7-1.6", "description": "No notes for control-id 7.1.6.", "props": [ @@ -30727,7 +30587,7 @@ ] }, { - "uuid": "384277fe-97f0-4598-8dfb-ca4ee40b9095", + "uuid": "bccef2a4-37ae-46e3-9324-04c87cefd9a5", "control-id": "cis_rhel10_7-1.7", "description": "No notes for control-id 7.1.7.", "props": [ @@ -30754,7 +30614,7 @@ ] }, { - "uuid": "43e8b15f-b383-499b-9330-3e7f38c0308f", + "uuid": "ff30cb9f-dba6-48d4-83a2-fde55d4f9d86", "control-id": "cis_rhel10_7-1.8", "description": "No notes for control-id 7.1.8.", "props": [ @@ -30781,7 +30641,7 @@ ] }, { - "uuid": "96f8146b-1703-4f2c-beef-06f9d438d76c", + "uuid": "1c13ccde-434b-46f8-bd41-5cccac085d56", "control-id": "cis_rhel10_7-1.9", "description": "No notes for control-id 7.1.9.", "props": [ @@ -30808,7 +30668,7 @@ ] }, { - "uuid": "21edcfff-26e8-4603-97fc-e3fcffe01319", + "uuid": "62a1087e-b7dc-4f03-9339-05fb07dc5b5c", "control-id": "cis_rhel10_7-1.10", "description": "No notes for control-id 7.1.10.", "props": [ @@ -30850,7 +30710,7 @@ ] }, { - "uuid": "d315f019-0dcd-4ada-af85-364cae524085", + "uuid": "442cd96b-86db-4613-9bd7-b02d79688dc4", "control-id": "cis_rhel10_7-1.11", "description": "No notes for control-id 7.1.11.", "props": [ @@ -30872,7 +30732,7 @@ ] }, { - "uuid": "bcfb9b7e-775e-4887-a61b-7f31dba0a964", + "uuid": "331515c9-dc98-40a4-823b-7c8e9ad33da7", "control-id": "cis_rhel10_7-1.12", "description": "No notes for control-id 7.1.12.", "props": [ @@ -30894,7 +30754,7 @@ ] }, { - "uuid": "4b2a1990-a520-40ba-bd86-19e58c261c89", + "uuid": "ade5baa1-08de-48a7-b868-e7988d061349", "control-id": "cis_rhel10_7-1.13", "description": "The description for control-id cis_rhel10_7-1.13.", "props": [ @@ -30907,7 +30767,7 @@ ] }, { - "uuid": "c74b01c7-955e-488f-aaea-ef21ecdb1142", + "uuid": "dc30f5ae-00a5-4985-a5d8-2e5ac2c9b05a", "control-id": "cis_rhel10_7-2.1", "description": "No notes for control-id 7.2.1.", "props": [ @@ -30924,7 +30784,7 @@ ] }, { - "uuid": "bc529ac4-ee31-4a81-b7f1-64d44612f097", + "uuid": "319a00d9-26b2-4af8-9c68-aa6d4e151d38", "control-id": "cis_rhel10_7-2.2", "description": "No notes for control-id 7.2.2.", "props": [ @@ -30941,7 +30801,7 @@ ] }, { - "uuid": "6c2d829a-6af5-4af7-b032-0879b4931001", + "uuid": "8fea36c2-d9ee-4615-8891-ef1276ca9035", "control-id": "cis_rhel10_7-2.3", "description": "No notes for control-id 7.2.3.", "props": [ @@ -30958,7 +30818,7 @@ ] }, { - "uuid": "4222bc40-594b-4d98-9798-c50beef0d6a4", + "uuid": "ea3cb9fd-742f-4d3e-8da6-5e4fff577449", "control-id": "cis_rhel10_7-2.4", "description": "No notes for control-id 7.2.4.", "props": [ @@ -30975,7 +30835,7 @@ ] }, { - "uuid": "fdbc8df3-ed20-49c1-8813-96187b2f893a", + "uuid": "98629d12-344e-4ecc-bce5-83aec68ffa1c", "control-id": "cis_rhel10_7-2.5", "description": "No notes for control-id 7.2.5.", "props": [ @@ -30992,7 +30852,7 @@ ] }, { - "uuid": "85dff96f-f915-4ca0-98d6-78bfc6dddb50", + "uuid": "25c477b6-1778-494b-86bc-95e6f0814e85", "control-id": "cis_rhel10_7-2.6", "description": "No notes for control-id 7.2.6.", "props": [ @@ -31009,7 +30869,7 @@ ] }, { - "uuid": "7ee00f90-a340-4a6c-bcdb-6d2ce2893d89", + "uuid": "f0b11e21-fb7c-46ea-a5fe-37ae3b51cd84", "control-id": "cis_rhel10_7-2.7", "description": "No notes for control-id 7.2.7.", "props": [ @@ -31026,7 +30886,7 @@ ] }, { - "uuid": "f2aa243d-0389-4825-9831-106377d7e415", + "uuid": "8dc3bf56-a948-455f-b898-b73e666270d8", "control-id": "cis_rhel10_7-2.8", "description": "No notes for control-id 7.2.8.", "props": [ @@ -31053,7 +30913,7 @@ ] }, { - "uuid": "a6416d0e-deac-4a92-aa03-bda7671f61d2", + "uuid": "1903814c-2478-4438-a90b-bb2c468f066b", "control-id": "cis_rhel10_7-2.9", "description": "No notes for control-id 7.2.9.", "props": [ From 1bc9f0661d238353c9a1b1a2c802cc03ef707f3f Mon Sep 17 00:00:00 2001 From: runner Date: Wed, 17 Dec 2025 09:47:35 +0000 Subject: [PATCH 3/4] Automatic updates from complyscribe --- .../component-definition.json | 1008 ++++++------- .../component-definition.json | 984 ++++++------ .../component-definition.json | 1328 ++++++++--------- .../component-definition.json | 1308 ++++++++-------- 4 files changed, 2314 insertions(+), 2314 deletions(-) diff --git a/component-definitions/rhel10/rhel10-cis_rhel10-l1_server/component-definition.json b/component-definitions/rhel10/rhel10-cis_rhel10-l1_server/component-definition.json index 2b2225c6..fa6d835b 100644 --- a/component-definitions/rhel10/rhel10-cis_rhel10-l1_server/component-definition.json +++ b/component-definitions/rhel10/rhel10-cis_rhel10-l1_server/component-definition.json @@ -3,8 +3,8 @@ "uuid": "c4be1cdf-5566-4add-81ec-694b72fc0910", "metadata": { "title": "Component definition for rhel10", - "last-modified": "2025-12-16T14:23:42.279477+00:00", - "version": "3.4", + "last-modified": "2025-12-17T09:48:57.052147+00:00", + "version": "3.5", "oscal-version": "1.1.3" }, "components": [ @@ -4919,7 +4919,7 @@ ], "control-implementations": [ { - "uuid": "356260a3-c428-4a67-9676-2622578bebc6", + "uuid": "f43b2c5b-94a5-42e7-94be-f891f4b1aec0", "source": "trestle://profiles/rhel10-cis_rhel10-l1_server/profile.json", "description": "Control implementation for cis_server_l1", "props": [ @@ -5275,7 +5275,7 @@ ], "implemented-requirements": [ { - "uuid": "388544ee-a187-4052-92a0-400980a75d8b", + "uuid": "1da965d2-b5dc-4362-963a-7a3cf2bd99f7", "control-id": "reload_dconf_db", "description": "This is a helper rule to reload Dconf database correctly.", "props": [ @@ -5292,7 +5292,7 @@ ] }, { - "uuid": "e8e63d26-5b85-43c4-a1a9-9993694ca094", + "uuid": "72a9c0a7-db03-4500-b03c-35948217a954", "control-id": "cis_rhel10_1-1.1.1", "description": "No notes for control-id 1.1.1.1.", "props": [ @@ -5309,7 +5309,7 @@ ] }, { - "uuid": "67fdf00b-b506-4c91-8dd6-8086ba777cbd", + "uuid": "ede88973-0e1b-45d7-8305-d7f4a6c70add", "control-id": "cis_rhel10_1-1.1.2", "description": "No notes for control-id 1.1.1.2.", "props": [ @@ -5326,7 +5326,7 @@ ] }, { - "uuid": "c3839665-a13b-48bf-9270-4878bfcceeae", + "uuid": "6013541e-c90f-4437-9179-5f52f31b32e9", "control-id": "cis_rhel10_1-1.1.3", "description": "No notes for control-id 1.1.1.3.", "props": [ @@ -5343,7 +5343,7 @@ ] }, { - "uuid": "910389f0-855f-418b-9efa-b4575358d7c7", + "uuid": "87552488-957e-4835-9e2f-f769678fe636", "control-id": "cis_rhel10_1-1.1.4", "description": "No notes for control-id 1.1.1.4.", "props": [ @@ -5360,7 +5360,7 @@ ] }, { - "uuid": "33726d00-2782-4633-8bbf-a22ab0cba600", + "uuid": "c2ff2541-2bc4-483b-a219-fae33aff6b45", "control-id": "cis_rhel10_1-1.1.5", "description": "No notes for control-id 1.1.1.5.", "props": [ @@ -5377,7 +5377,7 @@ ] }, { - "uuid": "6b414ec2-a3cf-40ba-8dab-3c344688bf13", + "uuid": "7d8a1718-3471-4232-ab70-f1e4674e0e78", "control-id": "cis_rhel10_1-1.1.9", "description": "No notes for control-id 1.1.1.9.", "props": [ @@ -5394,7 +5394,7 @@ ] }, { - "uuid": "bda9532f-26de-466a-9c94-cb9786151030", + "uuid": "a8a64ea5-5f4a-48cc-a070-e426952f6aa5", "control-id": "cis_rhel10_1-1.1.10", "description": "No notes for control-id 1.1.1.10.", "props": [ @@ -5411,7 +5411,7 @@ ] }, { - "uuid": "93e9f95c-c0d2-4095-a94f-a1d96ddfb0ba", + "uuid": "9fed43ca-f481-47ff-952f-5e73e2ac108c", "control-id": "cis_rhel10_1-1.1.11", "description": "The description for control-id cis_rhel10_1-1.1.11.", "props": [ @@ -5424,7 +5424,7 @@ ] }, { - "uuid": "a7816c53-09cf-45e5-96e2-a3f61137b198", + "uuid": "5d6f332b-8e4d-48f2-bfcf-8397311195f0", "control-id": "cis_rhel10_1-1.2.1.1", "description": "No notes for control-id 1.1.2.1.1.", "props": [ @@ -5441,7 +5441,7 @@ ] }, { - "uuid": "24ce37f2-372f-45c7-b801-398b04b50c39", + "uuid": "dc66ad30-d6ac-47d4-9212-5883ec62db88", "control-id": "cis_rhel10_1-1.2.1.2", "description": "No notes for control-id 1.1.2.1.2.", "props": [ @@ -5458,7 +5458,7 @@ ] }, { - "uuid": "a7c6603e-c6b1-4014-96f6-ba92303cef78", + "uuid": "634def42-00a2-4acd-b831-607042f64353", "control-id": "cis_rhel10_1-1.2.1.3", "description": "No notes for control-id 1.1.2.1.3.", "props": [ @@ -5475,7 +5475,7 @@ ] }, { - "uuid": "35b2e32c-18c3-48c3-81e8-3dec7372db1f", + "uuid": "0a326b0a-96f1-4f7a-9eb4-5512970eccfa", "control-id": "cis_rhel10_1-1.2.1.4", "description": "No notes for control-id 1.1.2.1.4.", "props": [ @@ -5492,7 +5492,7 @@ ] }, { - "uuid": "6b857466-7c68-4b1c-a333-ac1bf0879fef", + "uuid": "ac6e8987-eb86-4cdc-8905-c5d1c781a9e6", "control-id": "cis_rhel10_1-1.2.2.1", "description": "No notes for control-id 1.1.2.2.1.", "props": [ @@ -5509,7 +5509,7 @@ ] }, { - "uuid": "c3176d7c-52d9-43a6-98b2-e46f7715b7af", + "uuid": "690d0385-ecb1-4392-83be-a7eab21303af", "control-id": "cis_rhel10_1-1.2.2.2", "description": "No notes for control-id 1.1.2.2.2.", "props": [ @@ -5526,7 +5526,7 @@ ] }, { - "uuid": "cc97f7e3-ec12-4603-ac1b-633a3f575707", + "uuid": "6b48f8c4-3d5a-4912-98e3-551c699426bd", "control-id": "cis_rhel10_1-1.2.2.3", "description": "No notes for control-id 1.1.2.2.3.", "props": [ @@ -5543,7 +5543,7 @@ ] }, { - "uuid": "4ae79b72-5815-4d10-90f3-610c80c4b757", + "uuid": "d9bf5243-5259-4a1a-a0ef-f74d11d5056d", "control-id": "cis_rhel10_1-1.2.2.4", "description": "No notes for control-id 1.1.2.2.4.", "props": [ @@ -5560,7 +5560,7 @@ ] }, { - "uuid": "00a8ae9e-cc7e-473b-83b0-6bc2f7b2ec18", + "uuid": "039bed01-c496-443e-9c75-9e5eec36da26", "control-id": "cis_rhel10_1-1.2.3.2", "description": "No notes for control-id 1.1.2.3.2.", "props": [ @@ -5577,7 +5577,7 @@ ] }, { - "uuid": "bbd29c2e-d539-424b-95d3-bde65f2417cb", + "uuid": "5f6391e9-23ac-47e2-afcb-8ab1b2ae40c8", "control-id": "cis_rhel10_1-1.2.3.3", "description": "No notes for control-id 1.1.2.3.3.", "props": [ @@ -5594,7 +5594,7 @@ ] }, { - "uuid": "c02108f3-55c0-40ea-b5d2-a45dbba02adc", + "uuid": "eb62ad01-5d79-4075-a871-2d4ead56222c", "control-id": "cis_rhel10_1-1.2.4.2", "description": "No notes for control-id 1.1.2.4.2.", "props": [ @@ -5611,7 +5611,7 @@ ] }, { - "uuid": "860a55a5-1785-420b-a6d8-3137232412a4", + "uuid": "4bf0eea2-6d39-41e7-b8ed-0dce2e88deaa", "control-id": "cis_rhel10_1-1.2.4.3", "description": "No notes for control-id 1.1.2.4.3.", "props": [ @@ -5628,7 +5628,7 @@ ] }, { - "uuid": "812df0e3-f8bf-42d1-8beb-aaf3e6005f68", + "uuid": "e4a0ae38-ac58-4df3-9799-327e534e5140", "control-id": "cis_rhel10_1-1.2.5.2", "description": "No notes for control-id 1.1.2.5.2.", "props": [ @@ -5645,7 +5645,7 @@ ] }, { - "uuid": "4c283db6-b12b-4cc5-ab06-2bdcd73e71d1", + "uuid": "391a644e-f228-4576-8371-e2ca217bddfb", "control-id": "cis_rhel10_1-1.2.5.3", "description": "No notes for control-id 1.1.2.5.3.", "props": [ @@ -5662,7 +5662,7 @@ ] }, { - "uuid": "f26b489d-2b52-42fd-871d-b4dcfb9ce162", + "uuid": "7bc83934-ec10-4a50-9b98-9c154a679850", "control-id": "cis_rhel10_1-1.2.5.4", "description": "No notes for control-id 1.1.2.5.4.", "props": [ @@ -5679,7 +5679,7 @@ ] }, { - "uuid": "5dacc330-385c-48a9-85d5-4d7255d07c83", + "uuid": "3c2cf6d1-d365-4f7c-91a3-9c4866ac5666", "control-id": "cis_rhel10_1-1.2.6.2", "description": "No notes for control-id 1.1.2.6.2.", "props": [ @@ -5696,7 +5696,7 @@ ] }, { - "uuid": "ba62493f-fe0d-4f26-a517-be13845fec7b", + "uuid": "f591fcc4-4b91-4d8f-8d7d-434eb3e92626", "control-id": "cis_rhel10_1-1.2.6.3", "description": "No notes for control-id 1.1.2.6.3.", "props": [ @@ -5713,7 +5713,7 @@ ] }, { - "uuid": "0cc92c43-8a93-4cdf-b14b-73fb17ec8bf6", + "uuid": "2f1431d0-3b16-4a61-9694-67990742522b", "control-id": "cis_rhel10_1-1.2.6.4", "description": "No notes for control-id 1.1.2.6.4.", "props": [ @@ -5730,7 +5730,7 @@ ] }, { - "uuid": "ac499f4e-c5e6-4e9b-bb59-7cefb9c8e67a", + "uuid": "f4e837ec-9e3c-47c2-b3a7-0e68bfd5edfe", "control-id": "cis_rhel10_1-1.2.7.2", "description": "No notes for control-id 1.1.2.7.2.", "props": [ @@ -5747,7 +5747,7 @@ ] }, { - "uuid": "41d02b9f-4e7c-45c5-b8ce-55b843a2eb5d", + "uuid": "8ff32690-1ede-4957-a5cc-04cc5d4eff16", "control-id": "cis_rhel10_1-1.2.7.3", "description": "No notes for control-id 1.1.2.7.3.", "props": [ @@ -5764,7 +5764,7 @@ ] }, { - "uuid": "7bbfbab2-b74d-4c41-993d-4f3ef54617ab", + "uuid": "6c3895ae-2320-48eb-983e-619519eea874", "control-id": "cis_rhel10_1-1.2.7.4", "description": "No notes for control-id 1.1.2.7.4.", "props": [ @@ -5781,7 +5781,7 @@ ] }, { - "uuid": "82d1d7fb-bace-4287-b37d-15fceeb3af6d", + "uuid": "991757cc-ecc1-4de1-a7c6-24ce09c7bf87", "control-id": "cis_rhel10_1-2.1.1", "description": "The description for control-id cis_rhel10_1-2.1.1.", "props": [ @@ -5794,7 +5794,7 @@ ] }, { - "uuid": "ddd5adcd-f3e6-4ac5-b3bb-798d17332a7d", + "uuid": "55d5bc43-e74a-4208-8a4e-1c2f69c2189c", "control-id": "cis_rhel10_1-2.1.2", "description": "No notes for control-id 1.2.1.2.", "props": [ @@ -5811,7 +5811,7 @@ ] }, { - "uuid": "b3370d8e-947d-4aea-98e0-d9a90eec738c", + "uuid": "6b92e353-5bda-4508-adab-59902e1a4cde", "control-id": "cis_rhel10_1-2.1.4", "description": "The description for control-id cis_rhel10_1-2.1.4.", "props": [ @@ -5824,7 +5824,7 @@ ] }, { - "uuid": "398c1cff-cb5c-49d7-a279-1b8af7b4292f", + "uuid": "dce71782-a55a-4089-872b-0a8d689a2ba3", "control-id": "cis_rhel10_1-2.2.1", "description": "The description for control-id cis_rhel10_1-2.2.1.", "props": [ @@ -5837,7 +5837,7 @@ ] }, { - "uuid": "4171352a-f253-4867-ab35-6e0ff45b4687", + "uuid": "f181b855-e4cd-40a8-841c-1181d111399c", "control-id": "cis_rhel10_1-3.1.1", "description": "No notes for control-id 1.3.1.1.", "props": [ @@ -5854,7 +5854,7 @@ ] }, { - "uuid": "72a1ed15-caf9-464e-9c44-25579b1e7c37", + "uuid": "12688fea-c41e-4269-a698-35686cb03bdc", "control-id": "cis_rhel10_1-3.1.2", "description": "No notes for control-id 1.3.1.2.", "props": [ @@ -5871,7 +5871,7 @@ ] }, { - "uuid": "c095ed70-9a9d-4b98-b8ce-fd88f4460f2c", + "uuid": "a547ee5c-6309-4f0b-8958-73bdfbb88e97", "control-id": "cis_rhel10_1-3.1.3", "description": "No notes for control-id 1.3.1.3.", "props": [ @@ -5888,7 +5888,7 @@ ] }, { - "uuid": "e54ba40c-e04e-4ae0-9191-b3fdff01639c", + "uuid": "4dcfc9a8-ca63-46c2-aa64-fec1378c472a", "control-id": "cis_rhel10_1-3.1.4", "description": "No notes for control-id 1.3.1.4.", "props": [ @@ -5905,7 +5905,7 @@ ] }, { - "uuid": "d839dfc7-98c8-4397-9386-7148d27bccfa", + "uuid": "3189cf7b-390c-4073-a6b5-02f876898130", "control-id": "cis_rhel10_1-3.1.7", "description": "No notes for control-id 1.3.1.7.", "props": [ @@ -5922,7 +5922,7 @@ ] }, { - "uuid": "4c079c59-b0a1-427c-916a-89d7a07c81a0", + "uuid": "e0fc2bb3-ae56-44b2-b202-2af18e53828d", "control-id": "cis_rhel10_1-3.1.8", "description": "No notes for control-id 1.3.1.8.", "props": [ @@ -5939,7 +5939,7 @@ ] }, { - "uuid": "b9d35fcd-bb7b-462e-a2d8-305f0f4843fa", + "uuid": "2fcae95a-cae0-49b1-952b-4da67adf7bbe", "control-id": "cis_rhel10_1-4.1", "description": "There is no automated remediation for this rule and this is intentional.\nMore details in the rule description.", "props": [ @@ -5956,7 +5956,7 @@ ] }, { - "uuid": "bfe10ab9-8d9b-4b16-a663-30ef4f39dec4", + "uuid": "52e3223a-ba07-4474-bdbd-90d4c4316ef8", "control-id": "cis_rhel10_1-4.2", "description": "This requirement demands a deeper review of the rules.", "props": [ @@ -5983,7 +5983,7 @@ ] }, { - "uuid": "0c348e0c-2613-4f3a-a258-6299b4f3a1ad", + "uuid": "f62c50a2-cc56-44a3-916a-c31d0cbfae45", "control-id": "cis_rhel10_1-5.1", "description": "No notes for control-id 1.5.1.", "props": [ @@ -6000,7 +6000,7 @@ ] }, { - "uuid": "3e1f8226-5781-4b77-8c66-924d7520aedc", + "uuid": "0e502345-fabc-4ace-a437-06671bc01ede", "control-id": "cis_rhel10_1-5.2", "description": "No notes for control-id 1.5.2.", "props": [ @@ -6017,7 +6017,7 @@ ] }, { - "uuid": "457cc563-d28d-4aca-adba-a375880d1160", + "uuid": "7274f85b-c98d-4afe-9540-6809d36bb2f4", "control-id": "cis_rhel10_1-5.4", "description": "No notes for control-id 1.5.4.", "props": [ @@ -6034,7 +6034,7 @@ ] }, { - "uuid": "40e4a5ac-e0a8-4098-a049-aaa2d8338b0d", + "uuid": "307d7de5-e0ed-4fc9-961c-18b119245b12", "control-id": "cis_rhel10_1-5.5", "description": "No notes for control-id 1.5.5.", "props": [ @@ -6051,7 +6051,7 @@ ] }, { - "uuid": "0073de50-41f2-4c14-afb5-97d4e0b28986", + "uuid": "447b8edb-6696-4830-b573-0124c8cf718c", "control-id": "cis_rhel10_1-5.6", "description": "No notes for control-id 1.5.6.", "props": [ @@ -6068,7 +6068,7 @@ ] }, { - "uuid": "f4661a67-55f0-46e8-8103-5344f783c52b", + "uuid": "2815ae42-e365-4e29-9e0b-4494d7407f69", "control-id": "cis_rhel10_1-5.7", "description": "No notes for control-id 1.5.7.", "props": [ @@ -6085,7 +6085,7 @@ ] }, { - "uuid": "faae7515-df28-4910-b6ef-76725ebd1c71", + "uuid": "9383e922-4468-489e-9cd7-a97b781106e2", "control-id": "cis_rhel10_1-5.8", "description": "Address Space Layout Randomization (ASLR)", "props": [ @@ -6102,7 +6102,7 @@ ] }, { - "uuid": "e5ba7832-f057-4e99-845d-e59f443eb87a", + "uuid": "00a67e09-05e4-4364-8dca-2ddec68682e5", "control-id": "cis_rhel10_1-5.9", "description": "No notes for control-id 1.5.9.", "props": [ @@ -6119,7 +6119,7 @@ ] }, { - "uuid": "fd017745-5c66-4f3f-80d2-8004a986e81a", + "uuid": "06a05410-d62f-4885-b07e-5c675d6315cd", "control-id": "cis_rhel10_1-5.10", "description": "No notes for control-id 1.5.10.", "props": [ @@ -6136,7 +6136,7 @@ ] }, { - "uuid": "2253b9c6-b6f8-45b2-8d99-b9382be99cb5", + "uuid": "7ae329d3-d7d4-4899-ba61-58854af5d96a", "control-id": "cis_rhel10_1-6.1", "description": "No notes for control-id 1.6.1.", "props": [ @@ -6153,7 +6153,7 @@ ] }, { - "uuid": "15f2de88-3559-4469-ae5e-62472f757246", + "uuid": "6dde4838-4a6a-478f-8f9c-6e615606d40c", "control-id": "cis_rhel10_1-6.2", "description": "No notes for control-id 1.6.2.", "props": [ @@ -6170,7 +6170,7 @@ ] }, { - "uuid": "1e3a9bcf-e8ff-4fd5-bd0e-bd22e93b1f1c", + "uuid": "5e922942-04e6-45da-8b06-b368242cb463", "control-id": "cis_rhel10_1-6.3", "description": "No notes for control-id 1.6.3.", "props": [ @@ -6187,7 +6187,7 @@ ] }, { - "uuid": "dbc9042d-43d3-40b3-baad-e637f11be495", + "uuid": "ffaa3bdb-c530-4f43-bb2b-58a77f3998a9", "control-id": "cis_rhel10_1-6.4", "description": "No notes for control-id 1.6.4.", "props": [ @@ -6204,7 +6204,7 @@ ] }, { - "uuid": "888bada3-35cd-43de-bb60-7a0b6b0b6a4a", + "uuid": "b86b0c42-9a1e-4aae-be83-3d6ef394debc", "control-id": "cis_rhel10_1-7.1", "description": "No notes for control-id 1.7.1.", "props": [ @@ -6221,7 +6221,7 @@ ] }, { - "uuid": "71ef93e6-f387-4ade-bb17-af730058dd23", + "uuid": "1f553020-0ada-49ad-afe2-15ff3037a5ec", "control-id": "cis_rhel10_1-7.2", "description": "No notes for control-id 1.7.2.", "props": [ @@ -6238,7 +6238,7 @@ ] }, { - "uuid": "d7e06c71-4889-458d-aa1f-7af078bfacd0", + "uuid": "67596de1-ee97-41e5-bcef-a8760f67c596", "control-id": "cis_rhel10_1-7.3", "description": "No notes for control-id 1.7.3.", "props": [ @@ -6255,7 +6255,7 @@ ] }, { - "uuid": "db1f061c-e4aa-4733-a4b5-739a69dde8d7", + "uuid": "7daa331a-bebd-4ba3-84b2-3f1cd23c638e", "control-id": "cis_rhel10_1-7.4", "description": "No notes for control-id 1.7.4.", "props": [ @@ -6282,7 +6282,7 @@ ] }, { - "uuid": "d9b3e81b-b3db-4f46-93f1-ea58416de345", + "uuid": "bac2b680-2649-4a1a-9638-956ee7c9f3f0", "control-id": "cis_rhel10_1-7.5", "description": "No notes for control-id 1.7.5.", "props": [ @@ -6309,7 +6309,7 @@ ] }, { - "uuid": "fad3fee5-f0ba-4c12-86bc-8ffd7b475c6b", + "uuid": "f46226da-30c1-4f20-968c-dc2443252c26", "control-id": "cis_rhel10_1-7.6", "description": "No notes for control-id 1.7.6.", "props": [ @@ -6336,7 +6336,7 @@ ] }, { - "uuid": "b07a586f-a730-463a-8c8b-3152a4a1e8f0", + "uuid": "edd3a1d0-8edc-4db1-80cc-5e8ca363f122", "control-id": "cis_rhel10_1-8.1", "description": "No notes for control-id 1.8.1.", "props": [ @@ -6358,7 +6358,7 @@ ] }, { - "uuid": "fb5ad880-2de7-4ae8-ad4c-9e33c1febb51", + "uuid": "97d2cfda-4188-48cf-a8bb-f57f2f6f55fa", "control-id": "cis_rhel10_1-8.2", "description": "No notes for control-id 1.8.2.", "props": [ @@ -6375,7 +6375,7 @@ ] }, { - "uuid": "a1c88411-caf7-41d5-8f57-90cbc1ea621a", + "uuid": "1e4552f9-8768-4073-8256-d13165f1e341", "control-id": "cis_rhel10_1-8.3", "description": "No notes for control-id 1.8.3.", "props": [ @@ -6407,7 +6407,7 @@ ] }, { - "uuid": "dc9d0e50-17fd-4bc7-8b3d-5bf1c9c13422", + "uuid": "16362634-4445-4697-99a6-f10bfd99ee0f", "control-id": "cis_rhel10_1-8.4", "description": "No notes for control-id 1.8.4.", "props": [ @@ -6429,7 +6429,7 @@ ] }, { - "uuid": "34389a20-1a5e-41c7-9471-c9462c802419", + "uuid": "64bbb61e-14a1-4547-8f72-19d93bfd5442", "control-id": "cis_rhel10_1-8.5", "description": "No notes for control-id 1.8.5.", "props": [ @@ -6446,7 +6446,7 @@ ] }, { - "uuid": "66fe0573-eb44-4263-b86d-0a1c92e5e5f5", + "uuid": "3bd5b75d-2fc1-47de-b616-83d6bdc8b950", "control-id": "cis_rhel10_2-1.1", "description": "No notes for control-id 2.1.1.", "props": [ @@ -6463,7 +6463,7 @@ ] }, { - "uuid": "04d06d52-e8d0-4665-8470-d1ef4b86bcc3", + "uuid": "36df0e3d-34ad-4e6c-820d-0ed9acf270d9", "control-id": "cis_rhel10_2-1.2", "description": "No notes for control-id 2.1.2.", "props": [ @@ -6480,7 +6480,7 @@ ] }, { - "uuid": "f0d16a8e-c581-4e9f-9c2c-0252c08703fd", + "uuid": "3c2cbca7-864e-411c-84a9-173edaadf6ae", "control-id": "cis_rhel10_2-1.4", "description": "No notes for control-id 2.1.4.", "props": [ @@ -6497,7 +6497,7 @@ ] }, { - "uuid": "47cb7e23-8253-48b6-bda4-63b4ea3993c2", + "uuid": "6284158e-f072-43c9-8c25-3695e786c2d4", "control-id": "cis_rhel10_2-1.5", "description": "No notes for control-id 2.1.5.", "props": [ @@ -6514,7 +6514,7 @@ ] }, { - "uuid": "c9e6f8f8-3671-40c2-a486-040c7b6d6a75", + "uuid": "417d792a-8721-4512-9e62-481a2dcf27ae", "control-id": "cis_rhel10_2-1.6", "description": "No notes for control-id 2.1.6.", "props": [ @@ -6531,7 +6531,7 @@ ] }, { - "uuid": "90f47501-346f-4301-baa1-7a61215dff9d", + "uuid": "29b2271b-6586-4427-910a-3c40f6cf3368", "control-id": "cis_rhel10_2-1.7", "description": "No notes for control-id 2.1.7.", "props": [ @@ -6548,7 +6548,7 @@ ] }, { - "uuid": "40d213d7-adbb-4709-99b0-e5723f5a7041", + "uuid": "c120f9c3-eb41-4e6d-8b46-fec09cfb1dfa", "control-id": "cis_rhel10_2-1.8", "description": "No notes for control-id 2.1.8.", "props": [ @@ -6570,7 +6570,7 @@ ] }, { - "uuid": "99d13344-941f-415f-92e3-012e16dd9f6f", + "uuid": "e8c4cfe2-eb19-40c6-8af7-6792ab234d41", "control-id": "cis_rhel10_2-1.9", "description": "Many of the libvirt packages used by Enterprise Linux virtualization are dependent on the\nnfs-utils package.", "props": [ @@ -6587,7 +6587,7 @@ ] }, { - "uuid": "f622a392-069b-4fc9-9e53-0b5e5d6db8c7", + "uuid": "24ee3b18-a6e9-459a-ac2c-26ee947b43b8", "control-id": "cis_rhel10_2-1.10", "description": "No notes for control-id 2.1.10.", "props": [ @@ -6604,7 +6604,7 @@ ] }, { - "uuid": "e7aa8076-e509-44f0-acd0-89ac0c29d9c8", + "uuid": "6f3c8893-7983-42f8-af6e-a9413a0d36ba", "control-id": "cis_rhel10_2-1.11", "description": "Many of the libvirt packages used by Enterprise Linux virtualization, and the nfs-utils\npackage used for The Network File System (NFS), are dependent on the rpcbind package.", "props": [ @@ -6621,7 +6621,7 @@ ] }, { - "uuid": "9fe9ffc7-630e-4c07-abff-6c8129cc640a", + "uuid": "e5fe5fcc-bd27-4efe-8400-1cf4989f3c69", "control-id": "cis_rhel10_2-1.12", "description": "No notes for control-id 2.1.12.", "props": [ @@ -6638,7 +6638,7 @@ ] }, { - "uuid": "8b116f9b-e59f-4a5f-811c-4b20ae94ef13", + "uuid": "62c9cd5f-5d39-452d-8c10-5a494519823b", "control-id": "cis_rhel10_2-1.13", "description": "No notes for control-id 2.1.13.", "props": [ @@ -6655,7 +6655,7 @@ ] }, { - "uuid": "7db8183a-4013-4dab-9b5d-bc27a09e7736", + "uuid": "18e9b006-b3b3-48f5-9d77-44a3b021128f", "control-id": "cis_rhel10_2-1.14", "description": "No notes for control-id 2.1.14.", "props": [ @@ -6672,7 +6672,7 @@ ] }, { - "uuid": "461d5878-714b-4299-914b-1108e60ba441", + "uuid": "bc54f059-5500-40d8-b249-fe9b1551bff4", "control-id": "cis_rhel10_2-1.15", "description": "No notes for control-id 2.1.15.", "props": [ @@ -6689,7 +6689,7 @@ ] }, { - "uuid": "2f04b0e6-47c6-44cc-960a-0231a997e3a0", + "uuid": "378f2476-ca92-44f4-91a5-2cabf1f210e5", "control-id": "cis_rhel10_2-1.16", "description": "No notes for control-id 2.1.16.", "props": [ @@ -6706,7 +6706,7 @@ ] }, { - "uuid": "69226607-c32d-46c3-b0de-4d7c4e845c8e", + "uuid": "3ac214cc-c5f3-46f7-8683-698c9bddcf96", "control-id": "cis_rhel10_2-1.17", "description": "No notes for control-id 2.1.17.", "props": [ @@ -6723,7 +6723,7 @@ ] }, { - "uuid": "4f8d48d5-0db4-4d98-99cd-f48188e04cdf", + "uuid": "82568e4c-6ef0-4fc6-b294-8b7bf42726f4", "control-id": "cis_rhel10_2-1.18", "description": "No notes for control-id 2.1.18.", "props": [ @@ -6745,7 +6745,7 @@ ] }, { - "uuid": "77a7b77e-114c-412b-b2d5-eb3ced37688f", + "uuid": "eb8a0855-7a28-479c-b5de-123091af2128", "control-id": "cis_rhel10_2-1.21", "description": "No notes for control-id 2.1.21.", "props": [ @@ -6767,7 +6767,7 @@ ] }, { - "uuid": "03795316-fd5d-4b63-951e-a88b3dd30b18", + "uuid": "87ef29a7-f6a7-4df0-9f0f-749b8d76fee9", "control-id": "cis_rhel10_2-1.22", "description": "The description for control-id cis_rhel10_2-1.22.", "props": [ @@ -6780,7 +6780,7 @@ ] }, { - "uuid": "e86b5037-9615-4ce4-b3bd-5fbdc8fc8a68", + "uuid": "5965cfe6-25cd-41d9-bb1a-164e919d1cfb", "control-id": "cis_rhel10_2-2.1", "description": "No notes for control-id 2.2.1.", "props": [ @@ -6797,7 +6797,7 @@ ] }, { - "uuid": "a9d8fbf0-f157-43a4-a941-da3b353f8e90", + "uuid": "13cd9fd0-c510-4d7b-b399-b49ba3b0717c", "control-id": "cis_rhel10_2-2.3", "description": "No notes for control-id 2.2.3.", "props": [ @@ -6814,7 +6814,7 @@ ] }, { - "uuid": "feb9989e-2623-4c1a-b7b1-84268d37f83e", + "uuid": "41193112-38bf-45ed-83ce-da7198f6da1a", "control-id": "cis_rhel10_2-2.4", "description": "No notes for control-id 2.2.4.", "props": [ @@ -6831,7 +6831,7 @@ ] }, { - "uuid": "f6787671-f828-4162-806e-7a7611e8a462", + "uuid": "5e504565-948b-4aa1-8094-db02a8805e10", "control-id": "cis_rhel10_2-3.1", "description": "No notes for control-id 2.3.1.", "props": [ @@ -6843,7 +6843,7 @@ ] }, { - "uuid": "134f8fbe-1521-4d88-b21b-26b1d31cd021", + "uuid": "66cc6239-2977-402e-92ff-b39dbc676693", "control-id": "cis_rhel10_2-3.2", "description": "No notes for control-id 2.3.2.", "props": [ @@ -6860,7 +6860,7 @@ ] }, { - "uuid": "f2b8b983-5145-4f82-8b5a-def2a0acc5a8", + "uuid": "49bbd807-da2e-465e-b1dd-21326a056875", "control-id": "cis_rhel10_2-3.3", "description": "No notes for control-id 2.3.3.", "props": [ @@ -6877,7 +6877,7 @@ ] }, { - "uuid": "aa3f428b-0f89-416c-88e2-b6e9c2adbaa1", + "uuid": "d9f340c9-5496-41f7-a20a-20860488ebec", "control-id": "cis_rhel10_2-4.1.1", "description": "No notes for control-id 2.4.1.1.", "props": [ @@ -6899,7 +6899,7 @@ ] }, { - "uuid": "7f137844-c2e4-4c02-9bad-04e71bfb531b", + "uuid": "120dc823-c3b3-4375-8be1-d71ec99e4fd7", "control-id": "cis_rhel10_2-4.1.2", "description": "No notes for control-id 2.4.1.2.", "props": [ @@ -6926,7 +6926,7 @@ ] }, { - "uuid": "7ae9da68-69ed-48d7-9d93-b14ebc6bcaf1", + "uuid": "aa7321e1-b646-48c7-bb4b-4d0f1095c6f4", "control-id": "cis_rhel10_2-4.1.3", "description": "No notes for control-id 2.4.1.3.", "props": [ @@ -6953,7 +6953,7 @@ ] }, { - "uuid": "bd59ddd1-27b0-41cc-89a7-499e1f0426d3", + "uuid": "7f6dca8c-3eba-4f29-a80b-5b9308f0f459", "control-id": "cis_rhel10_2-4.1.4", "description": "No notes for control-id 2.4.1.4.", "props": [ @@ -6980,7 +6980,7 @@ ] }, { - "uuid": "2f8886d3-3186-4347-b95f-08329f4e1866", + "uuid": "9c9edda2-e2f7-4de9-b093-172a749de37f", "control-id": "cis_rhel10_2-4.1.5", "description": "No notes for control-id 2.4.1.5.", "props": [ @@ -7007,7 +7007,7 @@ ] }, { - "uuid": "2a430a9d-a9b1-4224-9984-7746bb7a509b", + "uuid": "06ecfc66-69d8-4ee9-bc88-bcd9c53d8902", "control-id": "cis_rhel10_2-4.1.6", "description": "No notes for control-id 2.4.1.6.", "props": [ @@ -7034,7 +7034,7 @@ ] }, { - "uuid": "297b27a9-9c71-46ca-ba04-9f34f3fcf261", + "uuid": "1460b39b-51f1-4492-840e-23c5a2f45ea6", "control-id": "cis_rhel10_2-4.1.7", "description": "No notes for control-id 2.4.1.7.", "props": [ @@ -7061,7 +7061,7 @@ ] }, { - "uuid": "4e1f2433-1e04-42eb-848b-8e653f9b80fc", + "uuid": "21dd38c1-7124-4e15-98f2-242ebd185241", "control-id": "cis_rhel10_2-4.1.8", "description": "No notes for control-id 2.4.1.8.", "props": [ @@ -7088,7 +7088,7 @@ ] }, { - "uuid": "44c886cf-09de-4a68-8e9b-e8d4e1de75e8", + "uuid": "e99eb034-100b-4a6b-8cc2-5c61fb2cbc71", "control-id": "cis_rhel10_2-4.1.9", "description": "No notes for control-id 2.4.1.9.", "props": [ @@ -7125,7 +7125,7 @@ ] }, { - "uuid": "17e4fc1d-8a15-4525-87e4-5630982d3e5d", + "uuid": "23106f78-3916-4a16-9661-fecf56de9162", "control-id": "cis_rhel10_2-4.2.1", "description": "No notes for control-id 2.4.2.1.", "props": [ @@ -7162,7 +7162,7 @@ ] }, { - "uuid": "afccf092-cc74-4a0c-856e-0f3b445c7fb8", + "uuid": "a1139b7f-7e21-4106-a7e5-e06bc554c447", "control-id": "cis_rhel10_3-1.1", "description": "The description for control-id cis_rhel10_3-1.1.", "props": [ @@ -7175,7 +7175,7 @@ ] }, { - "uuid": "0abc0275-5d7d-4bf7-9b71-7d6039494fb8", + "uuid": "f9564e3b-191c-492c-93cd-a468098ad13d", "control-id": "cis_rhel10_3-1.2", "description": "No notes for control-id 3.1.2.", "props": [ @@ -7192,7 +7192,7 @@ ] }, { - "uuid": "ed619ce7-f9ca-4b5d-8804-022c1d70da48", + "uuid": "7285acd7-24ca-4d38-9bf6-82a056bb9d6c", "control-id": "cis_rhel10_3-1.3", "description": "No notes for control-id 3.1.3.", "props": [ @@ -7209,7 +7209,7 @@ ] }, { - "uuid": "da61d0d6-2603-4a80-b8b7-9f4bc4acc44d", + "uuid": "a2634a66-4b35-4496-9940-83692783d4ef", "control-id": "cis_rhel10_3-2.1", "description": "No notes for control-id 3.2.1.", "props": [ @@ -7226,7 +7226,7 @@ ] }, { - "uuid": "4285049d-e74a-487c-a5e1-05fed3d99cf5", + "uuid": "d6696b9f-f515-4125-a994-cc2c2c641308", "control-id": "cis_rhel10_3-2.2", "description": "No notes for control-id 3.2.2.", "props": [ @@ -7243,7 +7243,7 @@ ] }, { - "uuid": "ac12d307-6a92-4f36-a49f-81de2759f1ab", + "uuid": "7633cc2a-78f4-42ad-8f6a-306f123e43dc", "control-id": "cis_rhel10_3-2.3", "description": "No notes for control-id 3.2.3.", "props": [ @@ -7260,7 +7260,7 @@ ] }, { - "uuid": "8aa8b503-06f0-4379-b392-e89926a9b53d", + "uuid": "1fb9f434-b54c-43a0-aaa3-6d7378e51706", "control-id": "cis_rhel10_3-2.4", "description": "No notes for control-id 3.2.4.", "props": [ @@ -7277,7 +7277,7 @@ ] }, { - "uuid": "f3ca3dab-85b5-4dcd-a790-f1ff0e1351da", + "uuid": "5d4c99aa-7924-4044-ae98-91281b380d32", "control-id": "cis_rhel10_3-2.5", "description": "No notes for control-id 3.2.5.", "props": [ @@ -7294,7 +7294,7 @@ ] }, { - "uuid": "12dfd300-9869-4f12-bfc7-b545210554a5", + "uuid": "4e1b00de-9fc7-4267-84c2-a09d20ab8a59", "control-id": "cis_rhel10_3-2.6", "description": "No notes for control-id 3.2.6.", "props": [ @@ -7311,7 +7311,7 @@ ] }, { - "uuid": "5e77413e-fde0-46b7-9fe9-a62b4acc2a51", + "uuid": "a60c09a7-aece-4304-b371-bdaec13f278d", "control-id": "cis_rhel10_3-3.1.2", "description": "No notes for control-id 3.3.1.2.", "props": [ @@ -7328,7 +7328,7 @@ ] }, { - "uuid": "7fc1646d-b798-46e2-91d0-37f12dfd1640", + "uuid": "59e16672-9e29-4359-af8e-3b1644d35996", "control-id": "cis_rhel10_3-3.1.3", "description": "No notes for control-id 3.3.1.3.", "props": [ @@ -7345,7 +7345,7 @@ ] }, { - "uuid": "e176b280-ad36-4a23-9c01-905357781347", + "uuid": "38c96e9d-a040-4035-8acc-71a22bddf3c5", "control-id": "cis_rhel10_3-3.1.4", "description": "No notes for control-id 3.3.1.4.", "props": [ @@ -7362,7 +7362,7 @@ ] }, { - "uuid": "23814b96-7cbe-40dd-a3ed-fb1646d1af11", + "uuid": "8b777583-3a06-4ffc-b85c-7669bf12b4d8", "control-id": "cis_rhel10_3-3.1.5", "description": "No notes for control-id 3.3.1.5.", "props": [ @@ -7379,7 +7379,7 @@ ] }, { - "uuid": "527011d5-cc18-4fef-ac93-cca4a142e9aa", + "uuid": "1a7a934a-f3bd-4686-9353-621f0fbc70f7", "control-id": "cis_rhel10_3-3.1.6", "description": "No notes for control-id 3.3.1.6.", "props": [ @@ -7396,7 +7396,7 @@ ] }, { - "uuid": "b56b175b-30bc-4e74-bd23-cd6c2ef3cd50", + "uuid": "9f551fb5-210b-4c09-a4d6-94539943cdc8", "control-id": "cis_rhel10_3-3.1.7", "description": "No notes for control-id 3.3.1.7.", "props": [ @@ -7413,7 +7413,7 @@ ] }, { - "uuid": "126353f1-ab10-4bf6-9ec6-9d9eabf752ca", + "uuid": "2b853312-5838-4f97-a74d-8135ea052d94", "control-id": "cis_rhel10_3-3.1.8", "description": "No notes for control-id 3.3.1.8.", "props": [ @@ -7430,7 +7430,7 @@ ] }, { - "uuid": "f7f47aed-b7f0-467a-b6a5-9107b4f59510", + "uuid": "e6682fa5-26de-45b8-a25b-1aaa23889dd3", "control-id": "cis_rhel10_3-3.1.9", "description": "No notes for control-id 3.3.1.9.", "props": [ @@ -7447,7 +7447,7 @@ ] }, { - "uuid": "0c5cb778-3a2f-4720-a9d2-8e4f3fff29a8", + "uuid": "5fa1b71a-585c-48ff-90d0-68978409cb21", "control-id": "cis_rhel10_3-3.1.10", "description": "No notes for control-id 3.3.1.10.", "props": [ @@ -7464,7 +7464,7 @@ ] }, { - "uuid": "74eae240-8a69-4bf5-98d7-714b3f0f1bdc", + "uuid": "fba54b4f-9e1e-4116-bbe0-3feb7915d923", "control-id": "cis_rhel10_3-3.1.11", "description": "No notes for control-id 3.3.1.11.", "props": [ @@ -7481,7 +7481,7 @@ ] }, { - "uuid": "30b05051-8951-4f04-ae08-f0a75da1ad24", + "uuid": "2e1dc80d-ff4d-4e09-a7fb-b099b0362e1b", "control-id": "cis_rhel10_3-3.1.12", "description": "No notes for control-id 3.3.1.12.", "props": [ @@ -7498,7 +7498,7 @@ ] }, { - "uuid": "2628373d-1abf-4367-a3e0-ff3cb581a609", + "uuid": "35333647-4fc7-4f78-b548-3752439f6726", "control-id": "cis_rhel10_3-3.1.13", "description": "No notes for control-id 3.3.1.13.", "props": [ @@ -7515,7 +7515,7 @@ ] }, { - "uuid": "ba70026c-7e9d-4fcc-8bfa-5f597b15efa3", + "uuid": "21ba9f7c-2d84-4ed1-97e1-57cbbeb4c995", "control-id": "cis_rhel10_3-3.1.14", "description": "No notes for control-id 3.3.1.14.", "props": [ @@ -7532,7 +7532,7 @@ ] }, { - "uuid": "a8e3557f-f420-4dde-8c7b-ec954d32f36b", + "uuid": "7c5f7268-3593-4afd-8348-a2ee3caad771", "control-id": "cis_rhel10_3-3.1.15", "description": "No notes for control-id 3.3.1.15.", "props": [ @@ -7549,7 +7549,7 @@ ] }, { - "uuid": "8236ff4f-dae2-4995-83c3-87789c3abecc", + "uuid": "2e0e9981-f6f1-4b62-8623-dd036b54e0ee", "control-id": "cis_rhel10_3-3.1.16", "description": "No notes for control-id 3.3.1.16.", "props": [ @@ -7566,7 +7566,7 @@ ] }, { - "uuid": "156b21c0-86cc-4689-82ad-dd3bef8c224a", + "uuid": "cfc2747b-d0ec-4eea-909e-fe6be68f49ce", "control-id": "cis_rhel10_3-3.1.17", "description": "No notes for control-id 3.3.1.17.", "props": [ @@ -7583,7 +7583,7 @@ ] }, { - "uuid": "35b5fcb5-e662-439c-a260-0df2c01578f6", + "uuid": "4ebf7b69-46e8-4e89-b417-fae96e8fc35a", "control-id": "cis_rhel10_3-3.1.18", "description": "No notes for control-id 3.3.1.18.", "props": [ @@ -7600,7 +7600,7 @@ ] }, { - "uuid": "e0fdb702-b6f4-44c7-8994-3dfaa4ec989e", + "uuid": "d3b0aca0-8925-4cdd-9506-9c30cb056514", "control-id": "cis_rhel10_3-3.2.1", "description": "No notes for control-id 3.3.2.1.", "props": [ @@ -7617,7 +7617,7 @@ ] }, { - "uuid": "6467da9a-8ea4-4109-b523-ad1f22efe524", + "uuid": "6787d78b-f59d-4566-a5b7-da39e2657f58", "control-id": "cis_rhel10_3-3.2.2", "description": "No notes for control-id 3.3.2.2.", "props": [ @@ -7634,7 +7634,7 @@ ] }, { - "uuid": "a2a7f2bf-c627-43d5-9cfb-4b9ea5e161e1", + "uuid": "7565acb3-935c-44c4-84fb-8dfe0a4c1444", "control-id": "cis_rhel10_3-3.2.3", "description": "No notes for control-id 3.3.2.3.", "props": [ @@ -7651,7 +7651,7 @@ ] }, { - "uuid": "982f760b-846f-4852-aacb-c6bae29357bc", + "uuid": "8551eabd-1d9a-4eda-a6a1-bcfb551a9b92", "control-id": "cis_rhel10_3-3.2.4", "description": "No notes for control-id 3.3.2.4.", "props": [ @@ -7668,7 +7668,7 @@ ] }, { - "uuid": "f83ef81e-21b6-4245-a887-2ed1cfef4f35", + "uuid": "380c1338-1ed5-41e4-8ccd-96efed5421d8", "control-id": "cis_rhel10_3-3.2.5", "description": "No notes for control-id 3.3.2.5.", "props": [ @@ -7685,7 +7685,7 @@ ] }, { - "uuid": "d61de53d-ad4c-48cc-b297-2aa473f8ae26", + "uuid": "bf94b030-64af-4d20-8f87-3fdb8004d9c6", "control-id": "cis_rhel10_3-3.2.6", "description": "No notes for control-id 3.3.2.6.", "props": [ @@ -7702,7 +7702,7 @@ ] }, { - "uuid": "65c78fbf-9e0b-459e-b0ac-6e207b623e57", + "uuid": "8e00d1c6-001b-4fbb-9702-c218572622d8", "control-id": "cis_rhel10_3-3.2.7", "description": "No notes for control-id 3.3.2.7.", "props": [ @@ -7719,7 +7719,7 @@ ] }, { - "uuid": "bf4bff06-14e0-4163-98dd-8ce6fc53f276", + "uuid": "383fefd1-ce8e-4317-a5b8-4b9808fec8b7", "control-id": "cis_rhel10_3-3.2.8", "description": "No notes for control-id 3.3.2.8.", "props": [ @@ -7736,7 +7736,7 @@ ] }, { - "uuid": "b6347250-781c-42b3-898e-2103ff2b1935", + "uuid": "dc7091f0-bfea-49d7-a0b6-b2dd6f2d2ded", "control-id": "cis_rhel10_4-1.1", "description": "No notes for control-id 4.1.1.", "props": [ @@ -7753,7 +7753,7 @@ ] }, { - "uuid": "69f49501-6416-4d9d-95f0-6a3027541563", + "uuid": "441482b2-83f7-4db9-b244-8feb3f401995", "control-id": "cis_rhel10_4-1.2", "description": "No notes for control-id 4.1.2.", "props": [ @@ -7770,7 +7770,7 @@ ] }, { - "uuid": "8b2ad0dd-f2ae-423b-a66e-9ec09b1f0cf1", + "uuid": "df9f3044-52ab-420c-88ef-3b3c5b872a51", "control-id": "cis_rhel10_4-1.3", "description": "No notes for control-id 4.1.3.", "props": [ @@ -7787,7 +7787,7 @@ ] }, { - "uuid": "62a35717-dcbc-415c-95cb-c4ae9d1df6a0", + "uuid": "5391344c-2153-4b4c-9ac7-96c133030a80", "control-id": "cis_rhel10_4-1.4", "description": "The description for control-id cis_rhel10_4-1.4.", "props": [ @@ -7795,12 +7795,12 @@ "name": "implementation-status", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "alternative", - "remarks": "No notes for control-id 4.1.4." + "remarks": "There is not an easy way to do this for only active zones using OVAL.\nFor now, there are are no rules for this control." } ] }, { - "uuid": "9d25b960-8152-476e-9a4d-eea59d8a680d", + "uuid": "f7d90c88-8334-4685-b2a7-6697a7cb4e97", "control-id": "cis_rhel10_4-1.5", "description": "Firewalld in Red Hat Enterprise Linux 10 accepts loopback traffic by default.", "props": [ @@ -7817,7 +7817,7 @@ ] }, { - "uuid": "9728a489-9585-441d-a2b6-8e915927cec8", + "uuid": "471e64b0-43b1-45d8-9f60-ffbce03d142d", "control-id": "cis_rhel10_4-1.6", "description": "The description for control-id cis_rhel10_4-1.6.", "props": [ @@ -7830,7 +7830,7 @@ ] }, { - "uuid": "116d114c-7162-4f43-aa60-7cb945ad2341", + "uuid": "2008c433-3e7b-4c0c-a903-83acf2203689", "control-id": "cis_rhel10_4-1.7", "description": "The description for control-id cis_rhel10_4-1.7.", "props": [ @@ -7843,7 +7843,7 @@ ] }, { - "uuid": "15333ba2-de76-4d07-891e-5a258c9f03b7", + "uuid": "bea953b8-7ce1-4ce0-bcb9-d33ae69a09e7", "control-id": "cis_rhel10_5-1.1", "description": "No notes for control-id 5.1.1.", "props": [ @@ -7900,7 +7900,7 @@ ] }, { - "uuid": "6e7888ea-41dd-44fc-a7f5-e940918f7208", + "uuid": "792dd725-193b-4f0a-aa80-13e928ba7dcb", "control-id": "cis_rhel10_5-1.2", "description": "No notes for control-id 5.1.2.", "props": [ @@ -7927,7 +7927,7 @@ ] }, { - "uuid": "9f36d5d0-c7ad-4619-aeb2-ce1f7b4e855e", + "uuid": "bae8416a-87cf-40a5-8a43-b7a8daa40f76", "control-id": "cis_rhel10_5-1.3", "description": "No notes for control-id 5.1.3.", "props": [ @@ -7954,7 +7954,7 @@ ] }, { - "uuid": "f3e6eab9-aaea-47ef-a4ab-8f29c87678f8", + "uuid": "835f7248-dd36-46ae-abe1-31cab367da2b", "control-id": "cis_rhel10_5-1.4", "description": "No notes for control-id 5.1.4.", "props": [ @@ -7971,7 +7971,7 @@ ] }, { - "uuid": "4a3b48b7-1f08-4e3d-8e86-146ccda330d5", + "uuid": "bbb41595-52a0-41f6-8f07-9f9b8fc27015", "control-id": "cis_rhel10_5-1.5", "description": "No notes for control-id 5.1.5.", "props": [ @@ -7988,7 +7988,7 @@ ] }, { - "uuid": "408000e9-8641-4f66-a567-17512e189cfe", + "uuid": "1a644334-4eef-430f-97d6-79efab2875e5", "control-id": "cis_rhel10_5-1.6", "description": "No notes for control-id 5.1.6.", "props": [ @@ -8005,7 +8005,7 @@ ] }, { - "uuid": "c3c92841-1f90-41c9-b5bc-50682360af10", + "uuid": "374ab1e1-c7b2-41df-8cd6-1f6d9bf9410e", "control-id": "cis_rhel10_5-1.7", "description": "The requirement gives an example of 45 seconds, but is flexible about the values. It is only\nnecessary to ensure there is a timeout configured in alignment to the site policy.", "props": [ @@ -8027,7 +8027,7 @@ ] }, { - "uuid": "7dba8344-db53-4557-9236-251d0edf9475", + "uuid": "ba4b7b2b-1725-45a2-ade7-a421c78d77b6", "control-id": "cis_rhel10_5-1.10", "description": "No notes for control-id 5.1.10.", "props": [ @@ -8044,7 +8044,7 @@ ] }, { - "uuid": "9d42da60-fc87-4cb4-bc98-ba205e88c0e5", + "uuid": "642d4738-c469-4678-9787-8cd88b3c8e6e", "control-id": "cis_rhel10_5-1.11", "description": "No notes for control-id 5.1.11.", "props": [ @@ -8061,7 +8061,7 @@ ] }, { - "uuid": "f202a44c-8caa-4c58-a9ce-0c793eabf9fd", + "uuid": "0d47ed0c-8b7e-4e46-bc3b-39b57ec5d6ea", "control-id": "cis_rhel10_5-1.12", "description": "The description for control-id cis_rhel10_5-1.12.", "props": [ @@ -8079,7 +8079,7 @@ ] }, { - "uuid": "f58e61a0-cbb8-4e90-a853-75395a71dcfb", + "uuid": "fd845ece-a6e6-4e52-9f4d-3cc514008f4c", "control-id": "cis_rhel10_5-1.13", "description": "No notes for control-id 5.1.13.", "props": [ @@ -8096,7 +8096,7 @@ ] }, { - "uuid": "8ce7005f-0387-4d22-ab5f-2c92aa478348", + "uuid": "eff8457e-cea9-422a-b8a3-d1f85435f03f", "control-id": "cis_rhel10_5-1.14", "description": "The CIS benchmark is not opinionated about which loglevel is selected here. Here, this\nprofile uses VERBOSE by default, as it allows for the capture of login and logout activity\nas well as key fingerprints.", "props": [ @@ -8113,7 +8113,7 @@ ] }, { - "uuid": "aa370f52-ff80-487e-a8d9-3c82ea17cb33", + "uuid": "8b349148-9791-4953-8278-105108521224", "control-id": "cis_rhel10_5-1.15", "description": "No notes for control-id 5.1.15.", "props": [ @@ -8130,7 +8130,7 @@ ] }, { - "uuid": "295f7477-34f7-4942-8c6a-bd14619b9b7b", + "uuid": "e48611c9-3e94-4b14-b3ef-673fbcec8258", "control-id": "cis_rhel10_5-1.16", "description": "No notes for control-id 5.1.16.", "props": [ @@ -8147,7 +8147,7 @@ ] }, { - "uuid": "ee97000b-80c0-4a5d-b240-3cdb44ca1035", + "uuid": "c1e168ba-75ab-4ed3-b603-a39dd6f8858c", "control-id": "cis_rhel10_5-1.17", "description": "No notes for control-id 5.1.17.", "props": [ @@ -8164,7 +8164,7 @@ ] }, { - "uuid": "6ddad821-9df8-4255-93ce-393d5baac4a2", + "uuid": "aa37c0fc-45d8-4e2e-bbcc-0f8dbdfcae8d", "control-id": "cis_rhel10_5-1.18", "description": "No notes for control-id 5.1.18.", "props": [ @@ -8181,7 +8181,7 @@ ] }, { - "uuid": "32e2847e-2ae2-4533-a4df-3fa222661eb0", + "uuid": "f3204b0d-5b55-4f6e-ad5a-9fbdb9a5db40", "control-id": "cis_rhel10_5-1.19", "description": "No notes for control-id 5.1.19.", "props": [ @@ -8198,7 +8198,7 @@ ] }, { - "uuid": "55788b77-2062-4a3d-88a6-efe268872207", + "uuid": "274f0763-b506-48d6-8d96-ae6b503ab5b1", "control-id": "cis_rhel10_5-1.20", "description": "No notes for control-id 5.1.20.", "props": [ @@ -8215,7 +8215,7 @@ ] }, { - "uuid": "b0b867d4-e060-4b38-8d0e-4ff2c98a8832", + "uuid": "828cdd80-97f2-461d-8056-7d62e05a0aa1", "control-id": "cis_rhel10_5-1.21", "description": "No notes for control-id 5.1.21.", "props": [ @@ -8232,7 +8232,7 @@ ] }, { - "uuid": "e65b4ef3-c3b2-456c-b914-0eb7355aa2d4", + "uuid": "59669e25-8282-4553-91c5-c29f31be79b7", "control-id": "cis_rhel10_5-1.22", "description": "No notes for control-id 5.1.22.", "props": [ @@ -8249,7 +8249,7 @@ ] }, { - "uuid": "18764f97-774a-48b1-b544-a5ea1eaef837", + "uuid": "8a8330c6-feb2-439e-941d-aeb299331422", "control-id": "cis_rhel10_5-2.1", "description": "No notes for control-id 5.2.1.", "props": [ @@ -8266,7 +8266,7 @@ ] }, { - "uuid": "fcd0e9de-1467-4f52-8534-efea174735d6", + "uuid": "592ffa86-89ee-4e43-ac03-81ee93409f7f", "control-id": "cis_rhel10_5-2.2", "description": "No notes for control-id 5.2.2.", "props": [ @@ -8283,7 +8283,7 @@ ] }, { - "uuid": "e8ee7485-47d9-4934-9320-ff3bd673e683", + "uuid": "3f84c97e-6712-462f-94b1-adfa7c3aeccb", "control-id": "cis_rhel10_5-2.3", "description": "No notes for control-id 5.2.3.", "props": [ @@ -8300,7 +8300,7 @@ ] }, { - "uuid": "16cb26d8-da6a-4331-b018-2416c143d689", + "uuid": "8455df5f-2d1b-4210-88cf-603992dee8d0", "control-id": "cis_rhel10_5-2.5", "description": "No notes for control-id 5.2.5.", "props": [ @@ -8317,7 +8317,7 @@ ] }, { - "uuid": "9566af2a-5c2b-4b09-9b1a-6a9a89e696de", + "uuid": "5341e967-f1c2-427c-aa8d-ecc09360f46e", "control-id": "cis_rhel10_5-2.6", "description": "No notes for control-id 5.2.6.", "props": [ @@ -8334,7 +8334,7 @@ ] }, { - "uuid": "18e62a2a-0b49-4474-a7b2-a115b8cf3476", + "uuid": "40f76ae8-b5ac-4c6d-9864-57b8268929c0", "control-id": "cis_rhel10_5-2.7", "description": "Members of \"wheel\" or GID 0 groups are checked by default if the group option is not set for\npam_wheel.so module. The recommendation states the group should be empty to reinforce the\nuse of \"sudo\" for privileged access. Therefore, members of these groups should be manually\nchecked or a different group should be informed.", "props": [ @@ -8356,7 +8356,7 @@ ] }, { - "uuid": "8522dac7-020e-42f1-94f1-912afd7d1503", + "uuid": "64e46386-4ef2-4cc5-abe1-79f1821105fd", "control-id": "cis_rhel10_5-3.1.1", "description": "This requirement is hard to be automated without any specific requirement. The policy even\nstates that provided commands are examples, other custom settings might be in place and the\nsettings might be different depending on site policies. The other rules will already make\nsure there is a correct autheselect profile regardless of the existing settings. It is\nnecessary to better discuss with CIS Community.", "props": [ @@ -8368,7 +8368,7 @@ ] }, { - "uuid": "594b8552-d6e6-4ee0-959d-93543f5fe0e0", + "uuid": "3f6df11d-27b9-439d-9205-fa916b6a17f2", "control-id": "cis_rhel10_5-3.1.2", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.1.", "props": [ @@ -8390,7 +8390,7 @@ ] }, { - "uuid": "c882d2fb-59f4-49c1-bf1f-eb55a7f11957", + "uuid": "59e78db2-e92f-4792-942c-9513f935d429", "control-id": "cis_rhel10_5-3.1.3", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.2.", "props": [ @@ -8417,7 +8417,7 @@ ] }, { - "uuid": "eb602132-2902-46bd-ae09-b25917f36e34", + "uuid": "074ef879-3704-4b91-9f22-406783eff878", "control-id": "cis_rhel10_5-3.1.4", "description": "The module is properly enabled by the rules mentioned in related_rules.\nRequirements in 5.3.2.3 use these rules.", "props": [ @@ -8429,7 +8429,7 @@ ] }, { - "uuid": "9316892c-8008-4b0a-9b59-1bc07a708543", + "uuid": "1c5feabd-3c11-4e79-a5fa-3f16a6de0b92", "control-id": "cis_rhel10_5-3.1.5", "description": "No notes for control-id 5.3.1.5.", "props": [ @@ -8446,7 +8446,7 @@ ] }, { - "uuid": "fe1a633f-1705-4549-981f-6fdfa68f4cde", + "uuid": "934b1900-13c8-49c8-97d9-77884e829abf", "control-id": "cis_rhel10_5-3.2.1.1", "description": "No notes for control-id 5.3.2.1.1.", "props": [ @@ -8463,7 +8463,7 @@ ] }, { - "uuid": "402e6f1c-ef76-4a63-937f-66a5c6a57a3c", + "uuid": "a4da05f8-b609-4922-a5aa-3d2826c2c650", "control-id": "cis_rhel10_5-3.2.1.2", "description": "The policy also accepts value 0, which means the locked accounts should be manually unlocked\nby an administrator. However, it also mentions that using value 0 can facilitate a DoS\nattack to legitimate users.", "props": [ @@ -8480,7 +8480,7 @@ ] }, { - "uuid": "d99b3c0e-0074-4eb1-b985-7ed78fbb2f7b", + "uuid": "87ebde82-044a-4a22-a25a-99b9b3c5b58d", "control-id": "cis_rhel10_5-3.2.2.1", "description": "No notes for control-id 5.3.2.2.1.", "props": [ @@ -8497,7 +8497,7 @@ ] }, { - "uuid": "499be254-f2d5-4c53-b03e-8446fc297acd", + "uuid": "15e156d0-1db4-45b2-b233-2022a9860fd8", "control-id": "cis_rhel10_5-3.2.2.2", "description": "No notes for control-id 5.3.2.2.2.", "props": [ @@ -8514,7 +8514,7 @@ ] }, { - "uuid": "bd875a20-96c6-4ea1-b338-2b6d800c89ed", + "uuid": "514952c8-a5d5-42e4-8fd0-f9f24f518e37", "control-id": "cis_rhel10_5-3.2.2.3", "description": "This requirement is expected to be manual. However, in previous versions of the policy\nit was already automated the configuration of \"minclass\" option. This posture was kept for\nRHEL 10 in this new version. Rules related to other options are informed in related_rules.\nIn short, minclass=4 alone can achieve the same result achieved by the combination of the\nother 4 options mentioned in the policy.", "props": [ @@ -8531,7 +8531,7 @@ ] }, { - "uuid": "512c76b9-b1b8-4033-9d59-2cb077c76f4a", + "uuid": "149b88d5-2ee4-4228-9cc1-780e34f994b4", "control-id": "cis_rhel10_5-3.2.2.4", "description": "No notes for control-id 5.3.2.2.4.", "props": [ @@ -8548,7 +8548,7 @@ ] }, { - "uuid": "46231670-2f6f-4345-82d2-45132d42c457", + "uuid": "d5e0f4aa-3b9e-46be-b869-909ce3fc5534", "control-id": "cis_rhel10_5-3.2.2.5", "description": "No notes for control-id 5.3.2.2.5.", "props": [ @@ -8565,7 +8565,7 @@ ] }, { - "uuid": "18d7d5fb-af93-4c38-9c64-4636b21a5b2b", + "uuid": "a1d6ee4f-aa08-427b-895d-bde8dc1b594c", "control-id": "cis_rhel10_5-3.2.2.6", "description": "No notes for control-id 5.3.2.2.6.", "props": [ @@ -8582,7 +8582,7 @@ ] }, { - "uuid": "c3f7c35a-a858-449c-ae0f-3683ad3babae", + "uuid": "c9d3883c-5208-4ef2-b996-45dee904716d", "control-id": "cis_rhel10_5-3.2.2.7", "description": "No notes for control-id 5.3.2.2.7.", "props": [ @@ -8599,7 +8599,7 @@ ] }, { - "uuid": "162d6558-e318-45e4-887a-4c161a8adee4", + "uuid": "8eac0729-e552-46e9-a780-096b49fc81c5", "control-id": "cis_rhel10_5-3.2.3.1", "description": "Although mentioned in the section 5.3.3.3, there is no explicit requirement to configure\nretry option of pam_pwhistory. If come in the future, the rule accounts_password_pam_retry\ncan be used.", "props": [ @@ -8621,7 +8621,7 @@ ] }, { - "uuid": "baa3cce9-a808-4fcb-8c34-e3e0ec61b5f7", + "uuid": "87b29fd6-7439-491b-b251-0c0ff492b619", "control-id": "cis_rhel10_5-3.2.3.2", "description": "No notes for control-id 5.3.2.3.2.", "props": [ @@ -8638,7 +8638,7 @@ ] }, { - "uuid": "ac92e725-b8f1-4f7c-a5e3-8f2821308488", + "uuid": "af472ab5-2e3b-401d-86e2-4afb2f05e0fa", "control-id": "cis_rhel10_5-3.2.3.3", "description": "In RHEL 10 pam_pwhistory is enabled via authselect feature, as required in 5.3.1.4. The\nfeature automatically set \"use_authok\" option. In any case, we don't have a rule to check\nthis option specifically.", "props": [ @@ -8655,7 +8655,7 @@ ] }, { - "uuid": "842cba91-e640-421a-b72b-cd2d4d3ffb50", + "uuid": "0693c6aa-d76e-4f92-ad65-1a2c31603ff5", "control-id": "cis_rhel10_5-3.2.4.1", "description": "The rule more specifically used in this requirement also satify the requirement 5.3.1.5.", "props": [ @@ -8672,7 +8672,7 @@ ] }, { - "uuid": "876abec7-37d5-438e-9ebc-6ad51fbc5ffe", + "uuid": "a3b5e311-ff4e-4a1a-bb4e-84d7ea872013", "control-id": "cis_rhel10_5-3.2.4.2", "description": "Usage of pam_unix.so module together with \"remember\" option is deprecated and is not\nrecommended by this policy. Instead, it should be used remember option of pam_pwhistory\nmodule, as required in 5.3.2.3.1. See here for more details about pam_unix.so:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1778929", "props": [ @@ -8689,7 +8689,7 @@ ] }, { - "uuid": "7d226e7d-bd9e-425f-941e-31d7d2596219", + "uuid": "d5040386-62a1-4871-8a75-c908b28b858b", "control-id": "cis_rhel10_5-3.2.4.3", "description": "Changes in logindefs mentioned in this requirement are more specifically covered by 5.4.1.4", "props": [ @@ -8711,7 +8711,7 @@ ] }, { - "uuid": "94c2f725-22e8-4eda-91c5-cb1826ee23ba", + "uuid": "73e3cbc1-4a7d-425b-9f98-a758cf4fcf9f", "control-id": "cis_rhel10_5-3.2.4.4", "description": "In RHEL 10 pam_unix is enabled by default in all authselect profiles already with the\nuse_authtok option set. In any case, we don't have a rule to check this option specifically,\nlike in 5.3.2.3.3.", "props": [ @@ -8728,7 +8728,7 @@ ] }, { - "uuid": "81f7fba7-bc52-4127-b539-4fea4c93a10a", + "uuid": "b2bd6696-e376-44d8-a2df-560f7cdccb0d", "control-id": "cis_rhel10_5-4.1.1", "description": "No notes for control-id 5.4.1.1.", "props": [ @@ -8750,7 +8750,7 @@ ] }, { - "uuid": "5bcbe00f-8ef0-4f2f-9df4-01ffbf466a10", + "uuid": "a09018f2-c888-4c49-8433-caf68aa0ab2e", "control-id": "cis_rhel10_5-4.1.3", "description": "No notes for control-id 5.4.1.3.", "props": [ @@ -8772,7 +8772,7 @@ ] }, { - "uuid": "4d003681-2067-42f5-9341-430c7631c0c7", + "uuid": "724f57f0-2639-459b-bdbd-38eb480bd83a", "control-id": "cis_rhel10_5-4.1.4", "description": "There's a \"new\" set of options in /etc/login.defs file to define the number of iterations\nperformed during the hashing process.", "props": [ @@ -8794,7 +8794,7 @@ ] }, { - "uuid": "8ac52c1a-ba58-4028-97a3-e081837b4fd6", + "uuid": "6338f465-2bdc-4cd7-861a-12fd06c36fc8", "control-id": "cis_rhel10_5-4.1.5", "description": "No notes for control-id 5.4.1.5.", "props": [ @@ -8816,7 +8816,7 @@ ] }, { - "uuid": "dbdc7b03-2c3e-4222-86ec-7448651cebcc", + "uuid": "c4d3c10c-d351-40b5-b969-a65af353fe3f", "control-id": "cis_rhel10_5-4.1.6", "description": "No notes for control-id 5.4.1.6.", "props": [ @@ -8833,7 +8833,7 @@ ] }, { - "uuid": "0db09bb4-c09c-416b-af67-1777585558a5", + "uuid": "b65949c9-7316-421f-b671-614152b30011", "control-id": "cis_rhel10_5-4.2.1", "description": "No notes for control-id 5.4.2.1.", "props": [ @@ -8850,7 +8850,7 @@ ] }, { - "uuid": "8d7f71c0-9dc1-468d-83b2-be3ebda12da3", + "uuid": "8ecee370-fb00-4c13-b332-243046e3d291", "control-id": "cis_rhel10_5-4.2.2", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -8867,7 +8867,7 @@ ] }, { - "uuid": "c99054c7-e391-48b9-89f5-22f1192f56c8", + "uuid": "7f05eb63-32a5-4480-8ff0-06fe9fb78ad9", "control-id": "cis_rhel10_5-4.2.3", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -8884,7 +8884,7 @@ ] }, { - "uuid": "6b2a8cf8-fc0a-435b-b1de-45f1132cd578", + "uuid": "85ff8400-c171-4937-8e42-2395f384f520", "control-id": "cis_rhel10_5-4.2.4", "description": "No notes for control-id 5.4.2.4.", "props": [ @@ -8901,7 +8901,7 @@ ] }, { - "uuid": "5391ca5e-99ba-4f64-b76e-03ad0dbe9d67", + "uuid": "dc19c1fa-c21d-4d84-b356-944e6945569f", "control-id": "cis_rhel10_5-4.2.5", "description": "No notes for control-id 5.4.2.5.", "props": [ @@ -8923,7 +8923,7 @@ ] }, { - "uuid": "1df12c24-1c37-48d8-ba7c-7e1fcdaf0e9e", + "uuid": "ef5af83f-7fb4-4068-9e5b-91683617046b", "control-id": "cis_rhel10_5-4.2.6", "description": "No notes for control-id 5.4.2.6.", "props": [ @@ -8940,7 +8940,7 @@ ] }, { - "uuid": "7bb95116-ce9d-4789-83d7-6897f954e735", + "uuid": "fbce1357-9300-430d-ba3c-57a365a0ee20", "control-id": "cis_rhel10_5-4.2.7", "description": "No notes for control-id 5.4.2.7.", "props": [ @@ -8962,7 +8962,7 @@ ] }, { - "uuid": "abd4c6f0-5967-47c9-b1f8-b53725d4494a", + "uuid": "8f0a8564-b090-41d4-b86e-27c427451fca", "control-id": "cis_rhel10_5-4.2.8", "description": "No notes for control-id 5.4.2.8.", "props": [ @@ -8979,7 +8979,7 @@ ] }, { - "uuid": "e2f21bd4-c31f-4596-8a6c-58bf4c95eaab", + "uuid": "314b8d68-6420-440f-b4ca-3e2c5b74f33e", "control-id": "cis_rhel10_5-4.3.2", "description": "No notes for control-id 5.4.3.2.", "props": [ @@ -8996,7 +8996,7 @@ ] }, { - "uuid": "0591708d-d73c-4ef2-bc61-18d59c869357", + "uuid": "9c9be71d-517a-4ea3-907a-a89b64532157", "control-id": "cis_rhel10_5-4.3.3", "description": "No notes for control-id 5.4.3.3.", "props": [ @@ -9023,7 +9023,7 @@ ] }, { - "uuid": "c3a1d6f9-f2af-473a-b8e5-c649f86271e7", + "uuid": "0de4d8f8-cee5-42bd-bece-9fd1c9781bda", "control-id": "cis_rhel10_6-1.1", "description": "No notes for control-id 6.1.1.", "props": [ @@ -9045,7 +9045,7 @@ ] }, { - "uuid": "55d844e3-3a4f-4066-a509-ea1e8eacecfd", + "uuid": "9f1f2521-a9d3-4b7e-b78b-1d96d30d4c72", "control-id": "cis_rhel10_6-1.2", "description": "No notes for control-id 6.1.2.", "props": [ @@ -9062,7 +9062,7 @@ ] }, { - "uuid": "6c871e03-0194-47cd-8366-ee02e2673ea5", + "uuid": "0d175fa4-755d-4edf-9878-29008d13260e", "control-id": "cis_rhel10_6-1.3", "description": "No notes for control-id 6.1.3.", "props": [ @@ -9079,7 +9079,7 @@ ] }, { - "uuid": "b86e9a65-00c5-4f56-9c18-c9c5a6c7cf3b", + "uuid": "37533e7a-3458-4a8b-934f-56ff5fc1fa5f", "control-id": "cis_rhel10_6-2.1.1", "description": "No notes for control-id 6.2.1.1.", "props": [ @@ -9096,7 +9096,7 @@ ] }, { - "uuid": "9e860c32-5428-4b58-aeac-7c2d5f774183", + "uuid": "699b2ab1-e1cf-42b7-9702-971731828a13", "control-id": "cis_rhel10_6-2.1.2", "description": "The description for control-id cis_rhel10_6-2.1.2.", "props": [ @@ -9109,7 +9109,7 @@ ] }, { - "uuid": "824cebdc-b090-4099-b0f3-e3ec122e0b45", + "uuid": "fcb0f5ee-4fce-4804-b4c0-f5705a9adf4c", "control-id": "cis_rhel10_6-2.1.3", "description": "The description for control-id cis_rhel10_6-2.1.3.", "props": [ @@ -9122,7 +9122,7 @@ ] }, { - "uuid": "d6d10397-80b2-422d-b738-9011d2e8c9f1", + "uuid": "b93568df-8907-41ab-9693-c8ba8c40b6ef", "control-id": "cis_rhel10_6-2.1.4", "description": "No notes for control-id 6.2.1.4.", "props": [ @@ -9139,7 +9139,7 @@ ] }, { - "uuid": "60a38ef9-6b0f-4896-89b9-d7b42dfa4bb3", + "uuid": "35fcffa5-0830-45e8-a7cf-a8a4c0a041d3", "control-id": "cis_rhel10_6-2.2.1.1", "description": "No notes for control-id 6.2.2.1.1.", "props": [ @@ -9156,7 +9156,7 @@ ] }, { - "uuid": "aa602fab-c2fd-4cbd-b058-6f2a4841c768", + "uuid": "48c6a085-e8ed-4025-8915-df23c9056db5", "control-id": "cis_rhel10_6-2.2.1.2", "description": "The description for control-id cis_rhel10_6-2.2.1.2.", "props": [ @@ -9169,7 +9169,7 @@ ] }, { - "uuid": "7ba4a96c-900d-48ed-bbac-e9fc35ce29df", + "uuid": "a5a3afd4-cd7b-452b-907a-86b7e77b876e", "control-id": "cis_rhel10_6-2.2.1.3", "description": "No notes for control-id 6.2.2.1.3.", "props": [ @@ -9186,7 +9186,7 @@ ] }, { - "uuid": "18c6b7d2-0141-418e-8bd7-b5aeabe14e25", + "uuid": "6b7dac15-a52d-49e8-ac81-0e755d0943cb", "control-id": "cis_rhel10_6-2.2.1.4", "description": "No notes for control-id 6.2.2.1.4.", "props": [ @@ -9203,7 +9203,7 @@ ] }, { - "uuid": "94812067-5b21-4ee8-a989-7619a2b49a52", + "uuid": "3cf344c5-bdf9-40a7-a588-7d3ac0be4e1a", "control-id": "cis_rhel10_6-2.2.2", "description": "No notes for control-id 6.2.2.2.", "props": [ @@ -9220,7 +9220,7 @@ ] }, { - "uuid": "9b9b9452-af59-4499-a857-853bf65d3ccb", + "uuid": "e46ac01a-f56b-406a-8415-d796b369d30e", "control-id": "cis_rhel10_6-2.2.3", "description": "No notes for control-id 6.2.2.3.", "props": [ @@ -9237,7 +9237,7 @@ ] }, { - "uuid": "4d287fc9-0680-4b3b-bd9e-e32e51ad407a", + "uuid": "0282d197-e276-40d9-94ba-7094fbe2471d", "control-id": "cis_rhel10_6-2.2.4", "description": "No notes for control-id 6.2.2.4.", "props": [ @@ -9254,7 +9254,7 @@ ] }, { - "uuid": "421db28b-4750-4809-a893-2427e2204403", + "uuid": "3062d8a7-a9a6-4865-9c43-44c85c775dd3", "control-id": "cis_rhel10_6-2.3.1", "description": "No notes for control-id 6.2.3.1.", "props": [ @@ -9266,7 +9266,7 @@ ] }, { - "uuid": "16fc6f2d-3502-4c15-ba9f-a0dedabc1628", + "uuid": "965a8a96-379b-49c9-aa2c-fd98143c90c5", "control-id": "cis_rhel10_6-2.3.2", "description": "No notes for control-id 6.2.3.2.", "props": [ @@ -9278,7 +9278,7 @@ ] }, { - "uuid": "08dc8521-c2e9-43b7-8a0d-7385b158d23a", + "uuid": "58bd4603-259e-4d69-b014-620f75aa1de7", "control-id": "cis_rhel10_6-2.3.3", "description": "No notes for control-id 6.2.3.3.", "props": [ @@ -9290,7 +9290,7 @@ ] }, { - "uuid": "57fc34ea-47aa-4d60-97b8-543e556b57c7", + "uuid": "01028ab5-be1d-4aa9-a895-1fe3bea44919", "control-id": "cis_rhel10_6-2.3.4", "description": "No notes for control-id 6.2.3.4.", "props": [ @@ -9302,7 +9302,7 @@ ] }, { - "uuid": "2005e298-a23c-4654-9dbe-f96c80f74adc", + "uuid": "8649ee5c-bce7-4c5c-99a1-1fa2b4d41a14", "control-id": "cis_rhel10_6-2.3.5", "description": "The description for control-id cis_rhel10_6-2.3.5.", "props": [ @@ -9315,7 +9315,7 @@ ] }, { - "uuid": "12c6b463-49e8-4a92-a60f-1b5cdae2012c", + "uuid": "62766904-6681-4b88-8a08-f39a058987cb", "control-id": "cis_rhel10_6-2.3.6", "description": "The description for control-id cis_rhel10_6-2.3.6.", "props": [ @@ -9328,7 +9328,7 @@ ] }, { - "uuid": "4075908b-58bb-4c9e-b341-6134e3973b23", + "uuid": "46f1649b-87af-4968-aa50-3921e6d5aa0c", "control-id": "cis_rhel10_6-2.3.7", "description": "No notes for control-id 6.2.3.7.", "props": [ @@ -9340,7 +9340,7 @@ ] }, { - "uuid": "d6151adf-4a13-4660-b1c0-f9b9f554f2bf", + "uuid": "8b800f28-a37e-480d-b327-0a383406a383", "control-id": "cis_rhel10_6-2.3.8", "description": "The description for control-id cis_rhel10_6-2.3.8.", "props": [ @@ -9353,7 +9353,7 @@ ] }, { - "uuid": "0852b040-02f7-4933-b43f-b2777dd46102", + "uuid": "5fd931aa-49bb-459d-a2d8-3e09b8f9bd1f", "control-id": "cis_rhel10_6-2.4.1", "description": "It is not harmful to run these rules even if rsyslog is not installed or active.", "props": [ @@ -9380,7 +9380,7 @@ ] }, { - "uuid": "41c12088-091d-499c-9a28-b5beec2223f3", + "uuid": "649b611d-6872-4a43-b9c4-c43e58b83ccf", "control-id": "cis_rhel10_7-1.1", "description": "No notes for control-id 7.1.1.", "props": [ @@ -9407,7 +9407,7 @@ ] }, { - "uuid": "26375bc5-331b-4d78-8223-b83ff86fe861", + "uuid": "465ab414-5bd8-46de-87a3-818fd050fe86", "control-id": "cis_rhel10_7-1.2", "description": "No notes for control-id 7.1.2.", "props": [ @@ -9434,7 +9434,7 @@ ] }, { - "uuid": "0e8ab58c-415f-4aa9-802e-6ed4239dcbfe", + "uuid": "647c055f-87a2-44fc-a0f8-1a46359732a6", "control-id": "cis_rhel10_7-1.3", "description": "No notes for control-id 7.1.3.", "props": [ @@ -9461,7 +9461,7 @@ ] }, { - "uuid": "501f618e-1ea6-49fe-be86-48aabe95d7eb", + "uuid": "a719a274-872f-4902-bf6b-4eea19a0317c", "control-id": "cis_rhel10_7-1.4", "description": "No notes for control-id 7.1.4.", "props": [ @@ -9488,7 +9488,7 @@ ] }, { - "uuid": "65a15dac-37c6-4f8c-a47f-37ed3adff2c9", + "uuid": "7f79385a-f891-4299-ad22-7abb9ad44432", "control-id": "cis_rhel10_7-1.5", "description": "No notes for control-id 7.1.5.", "props": [ @@ -9515,7 +9515,7 @@ ] }, { - "uuid": "d169c510-c4ab-4314-96c0-e08be2046821", + "uuid": "909163e6-80dc-489e-b3fc-5b9aaa898d5f", "control-id": "cis_rhel10_7-1.6", "description": "No notes for control-id 7.1.6.", "props": [ @@ -9542,7 +9542,7 @@ ] }, { - "uuid": "ebf4ba50-6c2f-4884-b501-b73a241e9e87", + "uuid": "8aa0ff6b-4aea-4e97-8915-3852c24a50e0", "control-id": "cis_rhel10_7-1.7", "description": "No notes for control-id 7.1.7.", "props": [ @@ -9569,7 +9569,7 @@ ] }, { - "uuid": "b85377e6-5da0-4b1c-b593-d2c5a5f65bd2", + "uuid": "71cf21cf-35b0-4686-be98-eaaf37163aaa", "control-id": "cis_rhel10_7-1.8", "description": "No notes for control-id 7.1.8.", "props": [ @@ -9596,7 +9596,7 @@ ] }, { - "uuid": "c658559d-3f10-4903-86da-7b18c81c1a1f", + "uuid": "4b5ca264-b102-4803-90be-9186f06c66d9", "control-id": "cis_rhel10_7-1.9", "description": "No notes for control-id 7.1.9.", "props": [ @@ -9623,7 +9623,7 @@ ] }, { - "uuid": "f8653c62-5f01-40a9-bca9-a6420dfdc0c3", + "uuid": "99ee21ce-6acd-43d6-9163-9ce1481338e7", "control-id": "cis_rhel10_7-1.10", "description": "No notes for control-id 7.1.10.", "props": [ @@ -9665,7 +9665,7 @@ ] }, { - "uuid": "cd142a01-4567-4ec3-92e8-18805fcd5777", + "uuid": "e5c1fa3e-b15c-4988-8565-299612301f6d", "control-id": "cis_rhel10_7-1.11", "description": "No notes for control-id 7.1.11.", "props": [ @@ -9687,7 +9687,7 @@ ] }, { - "uuid": "3e70bce2-a756-427d-a015-2cf980e92eeb", + "uuid": "8acfeee9-b9e1-4a7d-ade5-bf3270eb6f31", "control-id": "cis_rhel10_7-1.12", "description": "No notes for control-id 7.1.12.", "props": [ @@ -9709,7 +9709,7 @@ ] }, { - "uuid": "156223ca-8515-4859-90d6-b3c083b5f64c", + "uuid": "c74092b6-95c2-466d-820a-45f9e50a472d", "control-id": "cis_rhel10_7-1.13", "description": "The description for control-id cis_rhel10_7-1.13.", "props": [ @@ -9722,7 +9722,7 @@ ] }, { - "uuid": "44c302aa-4377-4952-97c7-f87bf9818872", + "uuid": "a98e0a68-bb36-451f-a634-1aafa67f39a8", "control-id": "cis_rhel10_7-2.1", "description": "No notes for control-id 7.2.1.", "props": [ @@ -9739,7 +9739,7 @@ ] }, { - "uuid": "e863356d-4cef-4859-989b-f91f25cc6041", + "uuid": "440f2c71-77f7-4dcf-acae-d286ebd763d4", "control-id": "cis_rhel10_7-2.2", "description": "No notes for control-id 7.2.2.", "props": [ @@ -9756,7 +9756,7 @@ ] }, { - "uuid": "2472174c-04c6-4bba-a27a-32fcf71939a2", + "uuid": "1634920c-4a44-4abe-944a-8d24f1b1ecb0", "control-id": "cis_rhel10_7-2.3", "description": "No notes for control-id 7.2.3.", "props": [ @@ -9773,7 +9773,7 @@ ] }, { - "uuid": "bdb37d2b-42a4-441f-97ff-51f0d92315b8", + "uuid": "14c7a83d-415c-4b22-8fd6-724d75fce2e7", "control-id": "cis_rhel10_7-2.4", "description": "No notes for control-id 7.2.4.", "props": [ @@ -9790,7 +9790,7 @@ ] }, { - "uuid": "efba5d5c-8cde-4b91-a162-c7d6620d513d", + "uuid": "209ad33c-9e9b-4b8d-838f-439dd4b6e620", "control-id": "cis_rhel10_7-2.5", "description": "No notes for control-id 7.2.5.", "props": [ @@ -9807,7 +9807,7 @@ ] }, { - "uuid": "53f5213d-bad2-40e8-8567-db3874798a94", + "uuid": "45acef36-1cb4-42fc-93a5-354e13d65c88", "control-id": "cis_rhel10_7-2.6", "description": "No notes for control-id 7.2.6.", "props": [ @@ -9824,7 +9824,7 @@ ] }, { - "uuid": "e28058da-90ec-4d05-b0e7-9dbbc850708f", + "uuid": "1918c54b-03ff-458d-a297-bcf9fce862d5", "control-id": "cis_rhel10_7-2.7", "description": "No notes for control-id 7.2.7.", "props": [ @@ -9841,7 +9841,7 @@ ] }, { - "uuid": "1b609c56-51bf-4e6b-b089-bbee2a84c9b7", + "uuid": "010607f1-a0fc-4544-a08b-ea7718b61377", "control-id": "cis_rhel10_7-2.8", "description": "No notes for control-id 7.2.8.", "props": [ @@ -9868,7 +9868,7 @@ ] }, { - "uuid": "1f3cb636-413d-4fb5-b85f-c4cae1a0f028", + "uuid": "4bfd384b-b5c5-4ff4-ba7c-40427274534a", "control-id": "cis_rhel10_7-2.9", "description": "No notes for control-id 7.2.9.", "props": [ @@ -18710,7 +18710,7 @@ ], "control-implementations": [ { - "uuid": "de06d380-12b2-42bc-a6e3-3cd8d2fdc0a4", + "uuid": "f3ac2c1e-e229-4c23-89bd-830eb50ee650", "source": "trestle://profiles/rhel10-cis_rhel10-l1_server/profile.json", "description": "Control implementation for cis_server_l1", "props": [ @@ -19066,7 +19066,7 @@ ], "implemented-requirements": [ { - "uuid": "e0644fd6-e756-496c-889f-8200600f2eb8", + "uuid": "98f0bc67-acbf-4e3c-9079-fdeb32100031", "control-id": "reload_dconf_db", "description": "This is a helper rule to reload Dconf database correctly.", "props": [ @@ -19083,7 +19083,7 @@ ] }, { - "uuid": "2d4691a4-2ebe-4570-8a85-b25afeedfcc4", + "uuid": "478ecade-2db9-4bc2-960c-b6ec8cf1d3f9", "control-id": "cis_rhel10_1-1.1.1", "description": "No notes for control-id 1.1.1.1.", "props": [ @@ -19100,7 +19100,7 @@ ] }, { - "uuid": "50d833e6-4593-42b2-b5ae-1d1bf5e0f34e", + "uuid": "c9d68520-56f7-49eb-916f-37c3b19d3f63", "control-id": "cis_rhel10_1-1.1.2", "description": "No notes for control-id 1.1.1.2.", "props": [ @@ -19117,7 +19117,7 @@ ] }, { - "uuid": "1475923f-1cda-4f2d-9f48-041874fb022b", + "uuid": "492f2949-31da-45e6-a24a-8015203f5ce4", "control-id": "cis_rhel10_1-1.1.3", "description": "No notes for control-id 1.1.1.3.", "props": [ @@ -19134,7 +19134,7 @@ ] }, { - "uuid": "f32f0093-5cea-4f02-8cb7-fe6ef0dceff7", + "uuid": "f7e57b58-7ace-41a9-b233-4c87375eede5", "control-id": "cis_rhel10_1-1.1.4", "description": "No notes for control-id 1.1.1.4.", "props": [ @@ -19151,7 +19151,7 @@ ] }, { - "uuid": "9b7f253c-02d8-4c56-80f5-add9ef59ca5e", + "uuid": "25ace639-fe0d-44e9-b9ab-cc016eeee843", "control-id": "cis_rhel10_1-1.1.5", "description": "No notes for control-id 1.1.1.5.", "props": [ @@ -19168,7 +19168,7 @@ ] }, { - "uuid": "dff677d5-40a3-4a96-bb76-da3a0eea29b7", + "uuid": "c6866d93-573e-462a-a55c-5d5081890d31", "control-id": "cis_rhel10_1-1.1.9", "description": "No notes for control-id 1.1.1.9.", "props": [ @@ -19185,7 +19185,7 @@ ] }, { - "uuid": "7496ebd2-52fe-4176-990a-814f1c8f052a", + "uuid": "0b5c9b86-1b6e-411f-a047-1015e2d86249", "control-id": "cis_rhel10_1-1.1.10", "description": "No notes for control-id 1.1.1.10.", "props": [ @@ -19202,7 +19202,7 @@ ] }, { - "uuid": "1499f114-59ff-4e01-81fb-069e626a3a91", + "uuid": "f6814b0e-86c7-454f-8e8b-8b356e32c77d", "control-id": "cis_rhel10_1-1.1.11", "description": "The description for control-id cis_rhel10_1-1.1.11.", "props": [ @@ -19215,7 +19215,7 @@ ] }, { - "uuid": "a9930806-b43b-4474-9e87-98fba2abef0d", + "uuid": "56b8672a-35a7-4484-961b-224a57a846d8", "control-id": "cis_rhel10_1-1.2.1.1", "description": "No notes for control-id 1.1.2.1.1.", "props": [ @@ -19232,7 +19232,7 @@ ] }, { - "uuid": "1271a269-93b6-414c-89a4-b8a2a44d67a8", + "uuid": "26e12209-b8dc-4bf9-b4cd-f0b80e126d82", "control-id": "cis_rhel10_1-1.2.1.2", "description": "No notes for control-id 1.1.2.1.2.", "props": [ @@ -19249,7 +19249,7 @@ ] }, { - "uuid": "98b961c2-4f69-4bd0-bf2a-205dcdbf003a", + "uuid": "0efabbab-6a08-484d-9f4a-c6de586a7743", "control-id": "cis_rhel10_1-1.2.1.3", "description": "No notes for control-id 1.1.2.1.3.", "props": [ @@ -19266,7 +19266,7 @@ ] }, { - "uuid": "1225589b-4b12-426e-b60e-ef1c44311c13", + "uuid": "5ea8a491-1144-4387-ba74-4b389f90dfb7", "control-id": "cis_rhel10_1-1.2.1.4", "description": "No notes for control-id 1.1.2.1.4.", "props": [ @@ -19283,7 +19283,7 @@ ] }, { - "uuid": "7170805e-cec4-4ba8-83de-9de8ace84986", + "uuid": "cdb0157a-28a4-4f16-9d1c-e7b8f9850823", "control-id": "cis_rhel10_1-1.2.2.1", "description": "No notes for control-id 1.1.2.2.1.", "props": [ @@ -19300,7 +19300,7 @@ ] }, { - "uuid": "d2e33c25-7f03-4ab6-876a-6dd618264665", + "uuid": "f6b879c1-ebcb-4a70-9b4b-51e8daeac559", "control-id": "cis_rhel10_1-1.2.2.2", "description": "No notes for control-id 1.1.2.2.2.", "props": [ @@ -19317,7 +19317,7 @@ ] }, { - "uuid": "7b0cfeeb-d5d4-479f-9d42-ea10c0500b49", + "uuid": "3fdd46fc-2bfc-4110-a889-b8209f9f962a", "control-id": "cis_rhel10_1-1.2.2.3", "description": "No notes for control-id 1.1.2.2.3.", "props": [ @@ -19334,7 +19334,7 @@ ] }, { - "uuid": "2e17471a-1de3-4497-8b18-96e0101c2cef", + "uuid": "71feb535-b1d2-4a05-b014-6f0d45886e9d", "control-id": "cis_rhel10_1-1.2.2.4", "description": "No notes for control-id 1.1.2.2.4.", "props": [ @@ -19351,7 +19351,7 @@ ] }, { - "uuid": "4e1dbcaf-9978-4007-9f5b-5fa1c6260ce7", + "uuid": "bef3fd00-b07e-451a-a590-0a1ada9c83e5", "control-id": "cis_rhel10_1-1.2.3.2", "description": "No notes for control-id 1.1.2.3.2.", "props": [ @@ -19368,7 +19368,7 @@ ] }, { - "uuid": "27e0065e-f1a7-470a-8278-ee4f5d2065ee", + "uuid": "2cea4b5a-2ea1-4dfe-858d-563db9ef204d", "control-id": "cis_rhel10_1-1.2.3.3", "description": "No notes for control-id 1.1.2.3.3.", "props": [ @@ -19385,7 +19385,7 @@ ] }, { - "uuid": "c0fb0b3d-c1f5-4627-8d91-576a05d9be44", + "uuid": "81c40182-3aa6-43fb-8828-bb94dec73a7b", "control-id": "cis_rhel10_1-1.2.4.2", "description": "No notes for control-id 1.1.2.4.2.", "props": [ @@ -19402,7 +19402,7 @@ ] }, { - "uuid": "7a1632b0-912a-4179-883a-0a36c19946d9", + "uuid": "7b1d79be-1481-4cd9-b974-1ca718a9390b", "control-id": "cis_rhel10_1-1.2.4.3", "description": "No notes for control-id 1.1.2.4.3.", "props": [ @@ -19419,7 +19419,7 @@ ] }, { - "uuid": "92736eb6-fa81-42c0-a908-fc69069441f7", + "uuid": "e30efd3e-4c01-4240-9bf3-990fe99d4e5a", "control-id": "cis_rhel10_1-1.2.5.2", "description": "No notes for control-id 1.1.2.5.2.", "props": [ @@ -19436,7 +19436,7 @@ ] }, { - "uuid": "69c765c7-db67-4f66-bbc6-42805181c26c", + "uuid": "91dc2358-ce73-45b3-8a87-a4c6c5eb430f", "control-id": "cis_rhel10_1-1.2.5.3", "description": "No notes for control-id 1.1.2.5.3.", "props": [ @@ -19453,7 +19453,7 @@ ] }, { - "uuid": "bdb380c6-01a7-415a-b517-89f794729ce1", + "uuid": "a552ef3c-3d08-43f1-8cab-3dda49d7c951", "control-id": "cis_rhel10_1-1.2.5.4", "description": "No notes for control-id 1.1.2.5.4.", "props": [ @@ -19470,7 +19470,7 @@ ] }, { - "uuid": "7a15ad37-de6a-44ea-8042-10e506f7b1a3", + "uuid": "ff44ad46-327a-4a12-bf8d-040d24cd6f3b", "control-id": "cis_rhel10_1-1.2.6.2", "description": "No notes for control-id 1.1.2.6.2.", "props": [ @@ -19487,7 +19487,7 @@ ] }, { - "uuid": "da6a2bc7-9f47-4da1-a824-8a9bb2c2d4e5", + "uuid": "2a1163f9-be42-42a8-bafd-7632fa8e2ab2", "control-id": "cis_rhel10_1-1.2.6.3", "description": "No notes for control-id 1.1.2.6.3.", "props": [ @@ -19504,7 +19504,7 @@ ] }, { - "uuid": "32c9fe90-4b1a-4dbe-916b-f2b75b2037f8", + "uuid": "e0552467-8621-429c-bfd6-7acae4894b16", "control-id": "cis_rhel10_1-1.2.6.4", "description": "No notes for control-id 1.1.2.6.4.", "props": [ @@ -19521,7 +19521,7 @@ ] }, { - "uuid": "95b58745-dc06-4ac5-b41d-567e7114a7d7", + "uuid": "d7529979-ad50-4f45-8389-6eb7ba1f5317", "control-id": "cis_rhel10_1-1.2.7.2", "description": "No notes for control-id 1.1.2.7.2.", "props": [ @@ -19538,7 +19538,7 @@ ] }, { - "uuid": "b20633fe-8df3-44c1-83fd-0f6b27ab39c8", + "uuid": "56882756-9dba-475f-84b0-9b5010266dff", "control-id": "cis_rhel10_1-1.2.7.3", "description": "No notes for control-id 1.1.2.7.3.", "props": [ @@ -19555,7 +19555,7 @@ ] }, { - "uuid": "8ca53ddf-413b-45ad-b90b-2ef1de49b4c7", + "uuid": "96612212-66cf-4cb2-81d4-da6c1dbb01c4", "control-id": "cis_rhel10_1-1.2.7.4", "description": "No notes for control-id 1.1.2.7.4.", "props": [ @@ -19572,7 +19572,7 @@ ] }, { - "uuid": "e7451821-5df1-4dba-8da6-5d7bbe4d7422", + "uuid": "7df508d5-b0f2-4587-9e46-90204a95476a", "control-id": "cis_rhel10_1-2.1.1", "description": "The description for control-id cis_rhel10_1-2.1.1.", "props": [ @@ -19585,7 +19585,7 @@ ] }, { - "uuid": "bb7516a5-4bbe-44fd-bc95-ce245e0208d3", + "uuid": "4a58e8c7-70f5-476e-a8dc-509e5109d527", "control-id": "cis_rhel10_1-2.1.2", "description": "No notes for control-id 1.2.1.2.", "props": [ @@ -19602,7 +19602,7 @@ ] }, { - "uuid": "7704c5f7-da9a-40b2-ba15-581068578cab", + "uuid": "ec4d5f00-baba-4387-a441-f81c3f409803", "control-id": "cis_rhel10_1-2.1.4", "description": "The description for control-id cis_rhel10_1-2.1.4.", "props": [ @@ -19615,7 +19615,7 @@ ] }, { - "uuid": "be47ce2c-5aef-4389-96aa-3cccdbcedceb", + "uuid": "ee122bca-4c8b-46af-9db7-531638dff4e7", "control-id": "cis_rhel10_1-2.2.1", "description": "The description for control-id cis_rhel10_1-2.2.1.", "props": [ @@ -19628,7 +19628,7 @@ ] }, { - "uuid": "339c2466-8590-4d1e-883b-4ec60a5b0c41", + "uuid": "5a27cf61-8c97-4365-9c51-0f3be29b2c44", "control-id": "cis_rhel10_1-3.1.1", "description": "No notes for control-id 1.3.1.1.", "props": [ @@ -19645,7 +19645,7 @@ ] }, { - "uuid": "7814718d-7488-4d2f-b3fc-58f7f97f4155", + "uuid": "9a13b136-4d33-421e-a1c3-63e0fe525c17", "control-id": "cis_rhel10_1-3.1.2", "description": "No notes for control-id 1.3.1.2.", "props": [ @@ -19662,7 +19662,7 @@ ] }, { - "uuid": "cbf60465-b4cf-45b2-88b3-6070817e6c4b", + "uuid": "7ea91733-b582-4106-a742-a816cfc35673", "control-id": "cis_rhel10_1-3.1.3", "description": "No notes for control-id 1.3.1.3.", "props": [ @@ -19679,7 +19679,7 @@ ] }, { - "uuid": "4a59f922-597e-429f-896f-adeefdabd384", + "uuid": "a7d2d661-ead2-4481-94c6-e68a43528105", "control-id": "cis_rhel10_1-3.1.4", "description": "No notes for control-id 1.3.1.4.", "props": [ @@ -19696,7 +19696,7 @@ ] }, { - "uuid": "2367e376-4471-4583-86e4-8d9c60a1fd74", + "uuid": "2e657b12-d4d2-41c7-be52-d60908391d52", "control-id": "cis_rhel10_1-3.1.7", "description": "No notes for control-id 1.3.1.7.", "props": [ @@ -19713,7 +19713,7 @@ ] }, { - "uuid": "607d6c90-e5ec-45af-a163-320dbe08afe8", + "uuid": "54593676-a28d-40ea-882c-c440b3315c81", "control-id": "cis_rhel10_1-3.1.8", "description": "No notes for control-id 1.3.1.8.", "props": [ @@ -19730,7 +19730,7 @@ ] }, { - "uuid": "a5c742a1-5bd9-4332-8184-d4b287838bd6", + "uuid": "7c11396a-2e15-4d51-92c6-4065564c0a65", "control-id": "cis_rhel10_1-4.1", "description": "There is no automated remediation for this rule and this is intentional.\nMore details in the rule description.", "props": [ @@ -19747,7 +19747,7 @@ ] }, { - "uuid": "9b6595f2-a662-4536-9d01-4d1a39ec69e0", + "uuid": "d0d38111-1215-4360-84da-da13ed44d07d", "control-id": "cis_rhel10_1-4.2", "description": "This requirement demands a deeper review of the rules.", "props": [ @@ -19774,7 +19774,7 @@ ] }, { - "uuid": "e5c122b9-debb-43e4-92bb-17e05d8e17ab", + "uuid": "69973712-65de-4676-a261-0620cc481ba9", "control-id": "cis_rhel10_1-5.1", "description": "No notes for control-id 1.5.1.", "props": [ @@ -19791,7 +19791,7 @@ ] }, { - "uuid": "257de634-1bd7-41d0-84c1-89d3b26255db", + "uuid": "f2752436-e8c3-47b3-97bb-91d77c1c4c90", "control-id": "cis_rhel10_1-5.2", "description": "No notes for control-id 1.5.2.", "props": [ @@ -19808,7 +19808,7 @@ ] }, { - "uuid": "53929584-42b6-4085-b05a-0ca8519618e0", + "uuid": "da1c437d-d18d-4aea-920e-04395eb05080", "control-id": "cis_rhel10_1-5.4", "description": "No notes for control-id 1.5.4.", "props": [ @@ -19825,7 +19825,7 @@ ] }, { - "uuid": "7dbf4cc2-3e8a-4da0-90e6-2fa1a807bae5", + "uuid": "f2cafcbc-1240-425d-b431-05fc63ac48b2", "control-id": "cis_rhel10_1-5.5", "description": "No notes for control-id 1.5.5.", "props": [ @@ -19842,7 +19842,7 @@ ] }, { - "uuid": "d4cee18b-de4b-45d0-8286-519ce0620545", + "uuid": "24bc5e19-30a8-4865-832a-efb57290237f", "control-id": "cis_rhel10_1-5.6", "description": "No notes for control-id 1.5.6.", "props": [ @@ -19859,7 +19859,7 @@ ] }, { - "uuid": "ee7c1089-4033-45f1-b1f6-5205a90adc31", + "uuid": "c3c97db4-102c-491a-a169-5f46085209c9", "control-id": "cis_rhel10_1-5.7", "description": "No notes for control-id 1.5.7.", "props": [ @@ -19876,7 +19876,7 @@ ] }, { - "uuid": "db6ce4f3-1cce-4893-a248-8069ad5e7520", + "uuid": "a84a0a85-4be1-42ad-b980-2cee7ddbcd70", "control-id": "cis_rhel10_1-5.8", "description": "Address Space Layout Randomization (ASLR)", "props": [ @@ -19893,7 +19893,7 @@ ] }, { - "uuid": "eab3df81-1416-4912-92a0-570baf59e742", + "uuid": "49844577-08ab-4f34-932c-d0a2bcca2a21", "control-id": "cis_rhel10_1-5.9", "description": "No notes for control-id 1.5.9.", "props": [ @@ -19910,7 +19910,7 @@ ] }, { - "uuid": "336341b3-0400-4ff2-b524-5cb32ed1a24d", + "uuid": "4b73948d-3e7a-4d76-bb74-929f1a4c6154", "control-id": "cis_rhel10_1-5.10", "description": "No notes for control-id 1.5.10.", "props": [ @@ -19927,7 +19927,7 @@ ] }, { - "uuid": "63be3c8d-7206-4cdf-9e18-9731a110459b", + "uuid": "9ac3df5e-dcf2-436a-a34d-3ec90cea555c", "control-id": "cis_rhel10_1-6.1", "description": "No notes for control-id 1.6.1.", "props": [ @@ -19944,7 +19944,7 @@ ] }, { - "uuid": "1ed262c4-0a7b-497b-9858-ecbd827a5a23", + "uuid": "3a643756-115c-44ed-9e3c-b559663c61c1", "control-id": "cis_rhel10_1-6.2", "description": "No notes for control-id 1.6.2.", "props": [ @@ -19961,7 +19961,7 @@ ] }, { - "uuid": "4bf4209c-4bf6-4d21-affe-b975b7ac5a00", + "uuid": "a25f688e-c293-4ce8-b2fe-279a43506dbd", "control-id": "cis_rhel10_1-6.3", "description": "No notes for control-id 1.6.3.", "props": [ @@ -19978,7 +19978,7 @@ ] }, { - "uuid": "61644c34-45a3-4283-80c7-0eca5e985502", + "uuid": "67958b8d-fc6f-496e-a4a9-ab333c20c674", "control-id": "cis_rhel10_1-6.4", "description": "No notes for control-id 1.6.4.", "props": [ @@ -19995,7 +19995,7 @@ ] }, { - "uuid": "0b125a57-ab43-4abf-855d-06e7d14d610a", + "uuid": "67d7d903-6ca5-4727-986b-544bb84c44f7", "control-id": "cis_rhel10_1-7.1", "description": "No notes for control-id 1.7.1.", "props": [ @@ -20012,7 +20012,7 @@ ] }, { - "uuid": "d6d637e1-9a41-4989-ad59-4593ea7fe088", + "uuid": "0dc543d8-1798-493d-8719-576d8d4c586f", "control-id": "cis_rhel10_1-7.2", "description": "No notes for control-id 1.7.2.", "props": [ @@ -20029,7 +20029,7 @@ ] }, { - "uuid": "546a3a08-58a3-487e-a48a-f5058acbbf45", + "uuid": "860c9456-7481-40cc-b704-96f328d775eb", "control-id": "cis_rhel10_1-7.3", "description": "No notes for control-id 1.7.3.", "props": [ @@ -20046,7 +20046,7 @@ ] }, { - "uuid": "bde63055-b481-4f4c-9dc0-153e000f6ccb", + "uuid": "94d49814-cbe8-43be-b5d5-67de1b99a64e", "control-id": "cis_rhel10_1-7.4", "description": "No notes for control-id 1.7.4.", "props": [ @@ -20073,7 +20073,7 @@ ] }, { - "uuid": "d1a12ebd-c484-4869-9cf7-5593d6cb2ac8", + "uuid": "77b28103-e2ab-484a-8f92-21919d6bb5ec", "control-id": "cis_rhel10_1-7.5", "description": "No notes for control-id 1.7.5.", "props": [ @@ -20100,7 +20100,7 @@ ] }, { - "uuid": "6f1e396b-c04f-4e39-be4d-2e2d989674cc", + "uuid": "4c6502b8-3825-4935-bc91-e440029e119c", "control-id": "cis_rhel10_1-7.6", "description": "No notes for control-id 1.7.6.", "props": [ @@ -20127,7 +20127,7 @@ ] }, { - "uuid": "36e73ebc-0525-40c4-9164-ca39382e87d9", + "uuid": "89431794-e274-450c-8f15-2157e030ad2a", "control-id": "cis_rhel10_1-8.1", "description": "No notes for control-id 1.8.1.", "props": [ @@ -20149,7 +20149,7 @@ ] }, { - "uuid": "bd2ffe24-d70c-44ef-b783-359804788d52", + "uuid": "340cc296-3118-4d5e-a043-8117048debe2", "control-id": "cis_rhel10_1-8.2", "description": "No notes for control-id 1.8.2.", "props": [ @@ -20166,7 +20166,7 @@ ] }, { - "uuid": "e6c715af-e53a-4c8f-ad57-6c1f15e52748", + "uuid": "ec298996-f9e5-4ea4-afce-a4911d454567", "control-id": "cis_rhel10_1-8.3", "description": "No notes for control-id 1.8.3.", "props": [ @@ -20198,7 +20198,7 @@ ] }, { - "uuid": "6f6073b0-d154-4424-be2d-ddb4dfe78ff8", + "uuid": "4ca59c9b-de27-4caa-a875-2c656766b816", "control-id": "cis_rhel10_1-8.4", "description": "No notes for control-id 1.8.4.", "props": [ @@ -20220,7 +20220,7 @@ ] }, { - "uuid": "c115fdfb-8606-4dd3-b190-409a244c970a", + "uuid": "0f6057c8-86bd-44a9-a320-6abc2a78b989", "control-id": "cis_rhel10_1-8.5", "description": "No notes for control-id 1.8.5.", "props": [ @@ -20237,7 +20237,7 @@ ] }, { - "uuid": "57362281-536b-466e-84e7-e6178694c0c2", + "uuid": "e43723b4-6e92-4b89-a8bd-7ff57cfef7c7", "control-id": "cis_rhel10_2-1.1", "description": "No notes for control-id 2.1.1.", "props": [ @@ -20254,7 +20254,7 @@ ] }, { - "uuid": "475016e6-4eed-475a-a60a-6aad828fbca2", + "uuid": "cdfab7ed-05c4-4a20-b091-b931596f12ef", "control-id": "cis_rhel10_2-1.2", "description": "No notes for control-id 2.1.2.", "props": [ @@ -20271,7 +20271,7 @@ ] }, { - "uuid": "316f13ee-4ebd-4fc6-8ed4-4b0072c523c1", + "uuid": "cfd51a84-6110-4a0d-a4be-66bcdb069b66", "control-id": "cis_rhel10_2-1.4", "description": "No notes for control-id 2.1.4.", "props": [ @@ -20288,7 +20288,7 @@ ] }, { - "uuid": "1bb74861-1e99-4838-b303-2c3aa6251864", + "uuid": "f5a43375-c1dc-40a5-82df-e47eb53ac764", "control-id": "cis_rhel10_2-1.5", "description": "No notes for control-id 2.1.5.", "props": [ @@ -20305,7 +20305,7 @@ ] }, { - "uuid": "e57ab1c5-0a35-45b4-a183-518116723096", + "uuid": "eb540af6-866e-4323-9950-a9307827f5a4", "control-id": "cis_rhel10_2-1.6", "description": "No notes for control-id 2.1.6.", "props": [ @@ -20322,7 +20322,7 @@ ] }, { - "uuid": "a8bb4f24-660f-48d4-b9c6-ce4152256678", + "uuid": "7860459c-f361-4103-8ec1-515aeca7452d", "control-id": "cis_rhel10_2-1.7", "description": "No notes for control-id 2.1.7.", "props": [ @@ -20339,7 +20339,7 @@ ] }, { - "uuid": "6dc8c9d4-ab50-4425-9727-0c55a911bd00", + "uuid": "6c690fa9-4acd-4e44-94b4-30c1ed555ee6", "control-id": "cis_rhel10_2-1.8", "description": "No notes for control-id 2.1.8.", "props": [ @@ -20361,7 +20361,7 @@ ] }, { - "uuid": "007bcd6f-d3fe-4575-bea6-b33ed5857e90", + "uuid": "b9f14cb5-7cbe-483f-8561-ba0da484ba15", "control-id": "cis_rhel10_2-1.9", "description": "Many of the libvirt packages used by Enterprise Linux virtualization are dependent on the\nnfs-utils package.", "props": [ @@ -20378,7 +20378,7 @@ ] }, { - "uuid": "bddc1aba-4149-4727-a065-a60ddf637878", + "uuid": "3c8e3a0d-9cb1-4c4d-ad30-da562b8cbe24", "control-id": "cis_rhel10_2-1.10", "description": "No notes for control-id 2.1.10.", "props": [ @@ -20395,7 +20395,7 @@ ] }, { - "uuid": "9192a082-f5a9-41cc-95a0-181e8d5f1aa3", + "uuid": "305592f7-7b5d-40e0-9142-cd4b9198041e", "control-id": "cis_rhel10_2-1.11", "description": "Many of the libvirt packages used by Enterprise Linux virtualization, and the nfs-utils\npackage used for The Network File System (NFS), are dependent on the rpcbind package.", "props": [ @@ -20412,7 +20412,7 @@ ] }, { - "uuid": "93294cfd-437b-4c0c-9c4d-7c3e206a784b", + "uuid": "b8e307ef-ec80-4855-b22f-8f9422f2b7fe", "control-id": "cis_rhel10_2-1.12", "description": "No notes for control-id 2.1.12.", "props": [ @@ -20429,7 +20429,7 @@ ] }, { - "uuid": "aef734bf-d419-40de-9858-3a41635fda97", + "uuid": "f0610c01-1614-4631-8295-a31d8ec75ada", "control-id": "cis_rhel10_2-1.13", "description": "No notes for control-id 2.1.13.", "props": [ @@ -20446,7 +20446,7 @@ ] }, { - "uuid": "57d1d1d1-25ef-450a-9e43-f24accdd902a", + "uuid": "ff3d489e-d364-408d-8b63-7181ef1c6c27", "control-id": "cis_rhel10_2-1.14", "description": "No notes for control-id 2.1.14.", "props": [ @@ -20463,7 +20463,7 @@ ] }, { - "uuid": "c1a30dd6-2a6f-46be-8f68-55b11c41d328", + "uuid": "76e18e95-d464-432c-933d-9c62a1e6e161", "control-id": "cis_rhel10_2-1.15", "description": "No notes for control-id 2.1.15.", "props": [ @@ -20480,7 +20480,7 @@ ] }, { - "uuid": "1e70e1aa-07f5-4ffc-b028-1f32b6d79822", + "uuid": "e212d280-8b7d-4851-82cf-1e1e4f020475", "control-id": "cis_rhel10_2-1.16", "description": "No notes for control-id 2.1.16.", "props": [ @@ -20497,7 +20497,7 @@ ] }, { - "uuid": "71930045-1f43-4125-940a-86901df15361", + "uuid": "1d160fbe-12bf-4c77-b918-b0b4d1f0f566", "control-id": "cis_rhel10_2-1.17", "description": "No notes for control-id 2.1.17.", "props": [ @@ -20514,7 +20514,7 @@ ] }, { - "uuid": "ce38e5b1-292f-4c92-9237-4856864603b1", + "uuid": "cf12d2ec-265f-49a2-b6b4-7b667f4e2ae8", "control-id": "cis_rhel10_2-1.18", "description": "No notes for control-id 2.1.18.", "props": [ @@ -20536,7 +20536,7 @@ ] }, { - "uuid": "289872b2-8cb1-4030-8a7d-702be3db4a6e", + "uuid": "b1e3ead8-9b4f-47b0-ab6b-b0578d917f31", "control-id": "cis_rhel10_2-1.21", "description": "No notes for control-id 2.1.21.", "props": [ @@ -20558,7 +20558,7 @@ ] }, { - "uuid": "c8825ed7-63f7-4d9c-b7aa-af3aff8bf730", + "uuid": "b49bec56-64f9-4251-895e-a3a03663dc1d", "control-id": "cis_rhel10_2-1.22", "description": "The description for control-id cis_rhel10_2-1.22.", "props": [ @@ -20571,7 +20571,7 @@ ] }, { - "uuid": "5c60580b-a706-4694-b449-4f604066efb1", + "uuid": "6c5d2139-61fb-4772-8f08-6b263af3c992", "control-id": "cis_rhel10_2-2.1", "description": "No notes for control-id 2.2.1.", "props": [ @@ -20588,7 +20588,7 @@ ] }, { - "uuid": "b5d99a58-57a3-4fa7-8faf-9ae766c3c7ea", + "uuid": "4102704f-13ff-441f-9293-def5a29b4a39", "control-id": "cis_rhel10_2-2.3", "description": "No notes for control-id 2.2.3.", "props": [ @@ -20605,7 +20605,7 @@ ] }, { - "uuid": "8885ded7-5802-491a-96db-2edcd3c43050", + "uuid": "5986d3a4-9832-4ee6-a3d9-60b5196c2d5a", "control-id": "cis_rhel10_2-2.4", "description": "No notes for control-id 2.2.4.", "props": [ @@ -20622,7 +20622,7 @@ ] }, { - "uuid": "b8da7847-cb9c-46fa-9e15-42b855bd3c73", + "uuid": "b970cb26-e645-4bdb-a7e3-7980e7f96776", "control-id": "cis_rhel10_2-3.1", "description": "No notes for control-id 2.3.1.", "props": [ @@ -20634,7 +20634,7 @@ ] }, { - "uuid": "8b904c28-9588-4399-a591-de870723c35e", + "uuid": "afc2bd91-3a5d-4b7f-ba3e-ce3a8a2a10fa", "control-id": "cis_rhel10_2-3.2", "description": "No notes for control-id 2.3.2.", "props": [ @@ -20651,7 +20651,7 @@ ] }, { - "uuid": "d40e15ca-500b-42d3-8bd7-bdba1e2cb752", + "uuid": "140044bc-540c-481f-a212-8d9b543c3218", "control-id": "cis_rhel10_2-3.3", "description": "No notes for control-id 2.3.3.", "props": [ @@ -20668,7 +20668,7 @@ ] }, { - "uuid": "88b41aa3-6913-4647-97be-167487a92d74", + "uuid": "e799b36d-568b-4f96-a66d-193145086503", "control-id": "cis_rhel10_2-4.1.1", "description": "No notes for control-id 2.4.1.1.", "props": [ @@ -20690,7 +20690,7 @@ ] }, { - "uuid": "f51ff7c5-f66a-41e0-9409-9658075426c6", + "uuid": "7c3ba555-9061-4387-b71d-98d200f63596", "control-id": "cis_rhel10_2-4.1.2", "description": "No notes for control-id 2.4.1.2.", "props": [ @@ -20717,7 +20717,7 @@ ] }, { - "uuid": "7f704e2f-7851-4702-8861-4ee2cd6c8e54", + "uuid": "d6342619-a495-4b57-a0e3-ec7ec709d5b3", "control-id": "cis_rhel10_2-4.1.3", "description": "No notes for control-id 2.4.1.3.", "props": [ @@ -20744,7 +20744,7 @@ ] }, { - "uuid": "f88345cc-a482-445a-9b9c-ea440de3ce59", + "uuid": "8c48163e-2f17-46e1-95b8-08735955c0b9", "control-id": "cis_rhel10_2-4.1.4", "description": "No notes for control-id 2.4.1.4.", "props": [ @@ -20771,7 +20771,7 @@ ] }, { - "uuid": "60a5c797-0dd3-426d-aca0-7c4f57e7aa2c", + "uuid": "d94363e2-7241-4a96-a5fd-3ff43c2c24ff", "control-id": "cis_rhel10_2-4.1.5", "description": "No notes for control-id 2.4.1.5.", "props": [ @@ -20798,7 +20798,7 @@ ] }, { - "uuid": "eda75803-28dd-46fb-a9f1-ca96a75fa03b", + "uuid": "3c67389a-1a80-4014-a4ac-bb3512226103", "control-id": "cis_rhel10_2-4.1.6", "description": "No notes for control-id 2.4.1.6.", "props": [ @@ -20825,7 +20825,7 @@ ] }, { - "uuid": "61e40d95-697c-4445-8059-6b030f620597", + "uuid": "8b991405-f7a5-4aff-afd9-12cacb367bd7", "control-id": "cis_rhel10_2-4.1.7", "description": "No notes for control-id 2.4.1.7.", "props": [ @@ -20852,7 +20852,7 @@ ] }, { - "uuid": "8e0fb71a-426f-4f2a-bfc0-fb08e1bbd25d", + "uuid": "24c40120-4ce5-4e21-882f-73fb5b76aa72", "control-id": "cis_rhel10_2-4.1.8", "description": "No notes for control-id 2.4.1.8.", "props": [ @@ -20879,7 +20879,7 @@ ] }, { - "uuid": "fdf75499-ec90-4c8b-a998-8d849fc255ac", + "uuid": "eacbe871-c212-4ef4-8456-497baac7a9ef", "control-id": "cis_rhel10_2-4.1.9", "description": "No notes for control-id 2.4.1.9.", "props": [ @@ -20916,7 +20916,7 @@ ] }, { - "uuid": "7fa94ee3-0877-4c3e-afe0-42761f7f7ac2", + "uuid": "98e2416c-2453-49f3-8fb1-80ae915373be", "control-id": "cis_rhel10_2-4.2.1", "description": "No notes for control-id 2.4.2.1.", "props": [ @@ -20953,7 +20953,7 @@ ] }, { - "uuid": "89f9763b-f781-439a-9000-e4f4f5ef4578", + "uuid": "1102779e-7dbc-4cf8-988f-bc48121576e9", "control-id": "cis_rhel10_3-1.1", "description": "The description for control-id cis_rhel10_3-1.1.", "props": [ @@ -20966,7 +20966,7 @@ ] }, { - "uuid": "92382c6b-a274-4f0e-9dc9-11e6b5e9f437", + "uuid": "3c15a76b-9ea7-49f0-b18c-036d9eaa2aa6", "control-id": "cis_rhel10_3-1.2", "description": "No notes for control-id 3.1.2.", "props": [ @@ -20983,7 +20983,7 @@ ] }, { - "uuid": "2a622125-6f78-432b-9223-2e48b2ddcff7", + "uuid": "ca53c3dc-b745-4477-89c9-bcb669d52ff5", "control-id": "cis_rhel10_3-1.3", "description": "No notes for control-id 3.1.3.", "props": [ @@ -21000,7 +21000,7 @@ ] }, { - "uuid": "20e7fd9b-1b80-412d-a07f-1bc070ca4881", + "uuid": "1b58f56f-1bdb-41ef-8e46-0c1b57f2a5b8", "control-id": "cis_rhel10_3-2.1", "description": "No notes for control-id 3.2.1.", "props": [ @@ -21017,7 +21017,7 @@ ] }, { - "uuid": "7ad41751-9db4-4c8e-9d6e-4194b2d1783e", + "uuid": "533dea96-8e1a-48f2-b4a6-c511f453ab16", "control-id": "cis_rhel10_3-2.2", "description": "No notes for control-id 3.2.2.", "props": [ @@ -21034,7 +21034,7 @@ ] }, { - "uuid": "e2202c95-82b0-4038-9a71-f0b00701155c", + "uuid": "e3f95caf-24ec-4df0-8868-5c6d88b2af1b", "control-id": "cis_rhel10_3-2.3", "description": "No notes for control-id 3.2.3.", "props": [ @@ -21051,7 +21051,7 @@ ] }, { - "uuid": "d6fdff2d-18cb-40c6-b3e2-9f3fcfd04396", + "uuid": "07a64e35-d9c8-40fa-a630-c8d4787f9cb5", "control-id": "cis_rhel10_3-2.4", "description": "No notes for control-id 3.2.4.", "props": [ @@ -21068,7 +21068,7 @@ ] }, { - "uuid": "4d4991a7-36be-4bec-8b3e-d1061e930c45", + "uuid": "7b740002-b942-4fbd-a8e4-ea59a60245ee", "control-id": "cis_rhel10_3-2.5", "description": "No notes for control-id 3.2.5.", "props": [ @@ -21085,7 +21085,7 @@ ] }, { - "uuid": "c4fb1d15-2940-49d3-b2ec-35743953ebc7", + "uuid": "40985f96-51b2-4add-8579-131f932e5cd4", "control-id": "cis_rhel10_3-2.6", "description": "No notes for control-id 3.2.6.", "props": [ @@ -21102,7 +21102,7 @@ ] }, { - "uuid": "5c014dba-0756-423f-a92b-253895f96f37", + "uuid": "46ae1353-32c4-4019-9546-8469ffd6de50", "control-id": "cis_rhel10_3-3.1.2", "description": "No notes for control-id 3.3.1.2.", "props": [ @@ -21119,7 +21119,7 @@ ] }, { - "uuid": "cbf16e66-a3b9-4c9c-b8a2-8a23320e59c1", + "uuid": "3fa60f5a-1774-4627-812b-94f6ba0b8e8b", "control-id": "cis_rhel10_3-3.1.3", "description": "No notes for control-id 3.3.1.3.", "props": [ @@ -21136,7 +21136,7 @@ ] }, { - "uuid": "24f9cd5e-c754-4385-ab4a-92bd09828577", + "uuid": "fe0e1a18-a641-41b8-9981-66b8ae85380c", "control-id": "cis_rhel10_3-3.1.4", "description": "No notes for control-id 3.3.1.4.", "props": [ @@ -21153,7 +21153,7 @@ ] }, { - "uuid": "5f3936fb-8cae-4251-a549-05779fd6f44e", + "uuid": "87e2e034-d748-4dcc-b82d-b7151297a61f", "control-id": "cis_rhel10_3-3.1.5", "description": "No notes for control-id 3.3.1.5.", "props": [ @@ -21170,7 +21170,7 @@ ] }, { - "uuid": "d3444d43-9f18-4738-895a-22d8df61879c", + "uuid": "bd41c77e-750b-4501-b1bd-e8d8b51d9e3b", "control-id": "cis_rhel10_3-3.1.6", "description": "No notes for control-id 3.3.1.6.", "props": [ @@ -21187,7 +21187,7 @@ ] }, { - "uuid": "8da2a299-9446-487e-ba8e-0dc643cdbf0f", + "uuid": "ebd7c24e-bf6a-437e-8600-e25927a90e75", "control-id": "cis_rhel10_3-3.1.7", "description": "No notes for control-id 3.3.1.7.", "props": [ @@ -21204,7 +21204,7 @@ ] }, { - "uuid": "f3ced6a7-bd61-4884-9fb8-66a0911df5f0", + "uuid": "904bc205-d9a3-4884-8e52-dc6ee29525b2", "control-id": "cis_rhel10_3-3.1.8", "description": "No notes for control-id 3.3.1.8.", "props": [ @@ -21221,7 +21221,7 @@ ] }, { - "uuid": "27d9ff48-dfc4-4d51-b32c-89541a347504", + "uuid": "d7e4a3e9-139f-4e1e-a03f-b8c85acd7961", "control-id": "cis_rhel10_3-3.1.9", "description": "No notes for control-id 3.3.1.9.", "props": [ @@ -21238,7 +21238,7 @@ ] }, { - "uuid": "c95e9b7e-10c8-47f5-99e2-915f6b678abe", + "uuid": "d9eb80af-c199-4c23-90f1-04cf1500f7b3", "control-id": "cis_rhel10_3-3.1.10", "description": "No notes for control-id 3.3.1.10.", "props": [ @@ -21255,7 +21255,7 @@ ] }, { - "uuid": "97c287a4-836b-41a7-b3ef-e9e47571b1c4", + "uuid": "ccb7fa8e-7b5d-4657-82ac-b8b03ea0c828", "control-id": "cis_rhel10_3-3.1.11", "description": "No notes for control-id 3.3.1.11.", "props": [ @@ -21272,7 +21272,7 @@ ] }, { - "uuid": "11de9864-bace-49ae-95eb-0152c6f31604", + "uuid": "2de3c8b2-879f-4d45-976d-525894f1483f", "control-id": "cis_rhel10_3-3.1.12", "description": "No notes for control-id 3.3.1.12.", "props": [ @@ -21289,7 +21289,7 @@ ] }, { - "uuid": "160d8716-4efa-4434-96a3-60df923b2893", + "uuid": "5431bb09-273a-4886-a1a9-0ea8a11d1483", "control-id": "cis_rhel10_3-3.1.13", "description": "No notes for control-id 3.3.1.13.", "props": [ @@ -21306,7 +21306,7 @@ ] }, { - "uuid": "978fb66d-485c-4a00-bf0c-20849cd599c1", + "uuid": "bb6f5369-1e17-4c6a-a958-0d6229b3f218", "control-id": "cis_rhel10_3-3.1.14", "description": "No notes for control-id 3.3.1.14.", "props": [ @@ -21323,7 +21323,7 @@ ] }, { - "uuid": "14246fb0-488e-45ad-aa66-357f8b6876a7", + "uuid": "1359e58b-1386-4d11-a4ab-996dce4dd6fb", "control-id": "cis_rhel10_3-3.1.15", "description": "No notes for control-id 3.3.1.15.", "props": [ @@ -21340,7 +21340,7 @@ ] }, { - "uuid": "0c0e4409-2c8c-4fc9-9de1-6453b6853156", + "uuid": "58ad30e7-7363-4cf4-93df-d28da6932391", "control-id": "cis_rhel10_3-3.1.16", "description": "No notes for control-id 3.3.1.16.", "props": [ @@ -21357,7 +21357,7 @@ ] }, { - "uuid": "043a429c-53f2-4dcb-a274-d21578d2783f", + "uuid": "a35b5319-b8da-4058-8698-e5c59c2bb222", "control-id": "cis_rhel10_3-3.1.17", "description": "No notes for control-id 3.3.1.17.", "props": [ @@ -21374,7 +21374,7 @@ ] }, { - "uuid": "9171eb19-8e72-47c3-94d3-ee95c25d9437", + "uuid": "2de3e703-0571-4ec4-905e-12625adfc784", "control-id": "cis_rhel10_3-3.1.18", "description": "No notes for control-id 3.3.1.18.", "props": [ @@ -21391,7 +21391,7 @@ ] }, { - "uuid": "ebf5f6d4-ba35-4357-91e2-3b7c1a5d4873", + "uuid": "ed4fd7ef-ed70-474d-b131-3e6b402f79f2", "control-id": "cis_rhel10_3-3.2.1", "description": "No notes for control-id 3.3.2.1.", "props": [ @@ -21408,7 +21408,7 @@ ] }, { - "uuid": "9f56f3ad-5fd2-47ab-8517-be705388b1ac", + "uuid": "46fa30c5-08e9-4fd3-b6eb-55c381a866e6", "control-id": "cis_rhel10_3-3.2.2", "description": "No notes for control-id 3.3.2.2.", "props": [ @@ -21425,7 +21425,7 @@ ] }, { - "uuid": "cf72dc84-0541-4066-907e-08a85f5ca9a4", + "uuid": "2e8137ad-2d5f-4ad6-9061-4b7ae6c55c12", "control-id": "cis_rhel10_3-3.2.3", "description": "No notes for control-id 3.3.2.3.", "props": [ @@ -21442,7 +21442,7 @@ ] }, { - "uuid": "5bb5a7e4-589c-40a0-a17d-a70eaa22308b", + "uuid": "eed89b9b-fe1f-469e-89a9-9731e824c581", "control-id": "cis_rhel10_3-3.2.4", "description": "No notes for control-id 3.3.2.4.", "props": [ @@ -21459,7 +21459,7 @@ ] }, { - "uuid": "90d752d1-eac0-4d8e-90c0-d150b830132e", + "uuid": "0b10c174-ad24-4a30-a91f-6421d7c8fece", "control-id": "cis_rhel10_3-3.2.5", "description": "No notes for control-id 3.3.2.5.", "props": [ @@ -21476,7 +21476,7 @@ ] }, { - "uuid": "3c20ebcd-cd10-442f-b8a3-9e4458f35a57", + "uuid": "f136d758-4fc8-492a-8165-50d6e9aa9502", "control-id": "cis_rhel10_3-3.2.6", "description": "No notes for control-id 3.3.2.6.", "props": [ @@ -21493,7 +21493,7 @@ ] }, { - "uuid": "480eaa3d-70b5-4818-9545-5735a1289bd1", + "uuid": "4fd4abb9-b531-45b2-b91d-70d362f7e00e", "control-id": "cis_rhel10_3-3.2.7", "description": "No notes for control-id 3.3.2.7.", "props": [ @@ -21510,7 +21510,7 @@ ] }, { - "uuid": "11a4d271-0629-4d39-bbac-c36def284848", + "uuid": "51b41b6f-1859-496c-bd6e-295fd8c5a63a", "control-id": "cis_rhel10_3-3.2.8", "description": "No notes for control-id 3.3.2.8.", "props": [ @@ -21527,7 +21527,7 @@ ] }, { - "uuid": "b9f2a898-1621-4d1e-9ca1-a7f55ec60093", + "uuid": "c51de2ac-e704-42c5-9650-c9037743b512", "control-id": "cis_rhel10_4-1.1", "description": "No notes for control-id 4.1.1.", "props": [ @@ -21544,7 +21544,7 @@ ] }, { - "uuid": "3deef625-f5f5-4323-bf5d-49f7d1cfac7f", + "uuid": "87888254-b907-4540-83c2-ce80012ee6a1", "control-id": "cis_rhel10_4-1.2", "description": "No notes for control-id 4.1.2.", "props": [ @@ -21561,7 +21561,7 @@ ] }, { - "uuid": "b0a1e312-49d4-4f88-bdbd-60975eacb13c", + "uuid": "7baa016e-5594-49df-bb7b-be7349ae4258", "control-id": "cis_rhel10_4-1.3", "description": "No notes for control-id 4.1.3.", "props": [ @@ -21578,7 +21578,7 @@ ] }, { - "uuid": "3f25c8d4-293f-4ed8-99d8-0dca23556b0c", + "uuid": "917da962-1a13-49f0-8a82-95196f582032", "control-id": "cis_rhel10_4-1.4", "description": "The description for control-id cis_rhel10_4-1.4.", "props": [ @@ -21586,12 +21586,12 @@ "name": "implementation-status", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "alternative", - "remarks": "No notes for control-id 4.1.4." + "remarks": "There is not an easy way to do this for only active zones using OVAL.\nFor now, there are are no rules for this control." } ] }, { - "uuid": "9531cb25-1faa-4269-a3c1-c6f0b7b02637", + "uuid": "66412846-e1d4-4c9d-941d-b7243fd19339", "control-id": "cis_rhel10_4-1.5", "description": "Firewalld in Red Hat Enterprise Linux 10 accepts loopback traffic by default.", "props": [ @@ -21608,7 +21608,7 @@ ] }, { - "uuid": "407c1ca3-cdde-49b6-b779-b4224e0830ba", + "uuid": "524178ec-3870-476a-a097-643213793052", "control-id": "cis_rhel10_4-1.6", "description": "The description for control-id cis_rhel10_4-1.6.", "props": [ @@ -21621,7 +21621,7 @@ ] }, { - "uuid": "a59ca4db-e700-4ffc-b0d7-83bc8268ad26", + "uuid": "1bfe5579-2a97-4ae6-ac97-a4d8f23bf530", "control-id": "cis_rhel10_4-1.7", "description": "The description for control-id cis_rhel10_4-1.7.", "props": [ @@ -21634,7 +21634,7 @@ ] }, { - "uuid": "0e80c25f-7ff8-4572-823e-3b293063475b", + "uuid": "d86d5ef5-63fb-44e8-a736-6bd273f4e2df", "control-id": "cis_rhel10_5-1.1", "description": "No notes for control-id 5.1.1.", "props": [ @@ -21691,7 +21691,7 @@ ] }, { - "uuid": "b93e5b61-99c2-434f-9b9e-b8c9aa09d9b7", + "uuid": "b5321694-9518-4d19-bc80-28747e1777d9", "control-id": "cis_rhel10_5-1.2", "description": "No notes for control-id 5.1.2.", "props": [ @@ -21718,7 +21718,7 @@ ] }, { - "uuid": "bcf02df2-bd07-4740-8407-7ba9f4056752", + "uuid": "76ce892d-6de9-440c-a342-149e94f0090b", "control-id": "cis_rhel10_5-1.3", "description": "No notes for control-id 5.1.3.", "props": [ @@ -21745,7 +21745,7 @@ ] }, { - "uuid": "e4b030e0-620f-490b-a4dd-a3cc712c7e5c", + "uuid": "044ad670-51d2-49ec-9d8c-6fc102dd310e", "control-id": "cis_rhel10_5-1.4", "description": "No notes for control-id 5.1.4.", "props": [ @@ -21762,7 +21762,7 @@ ] }, { - "uuid": "20d283ca-d71e-4b5f-92ce-0599d9aeec19", + "uuid": "1dfcdf4c-dc24-40d4-9249-da223b71c93c", "control-id": "cis_rhel10_5-1.5", "description": "No notes for control-id 5.1.5.", "props": [ @@ -21779,7 +21779,7 @@ ] }, { - "uuid": "c02bab24-ec34-4043-bb45-5a9e36d1bd9f", + "uuid": "35480c5f-5fc6-4759-b2c0-32006772392d", "control-id": "cis_rhel10_5-1.6", "description": "No notes for control-id 5.1.6.", "props": [ @@ -21796,7 +21796,7 @@ ] }, { - "uuid": "cb8ed38f-7b23-4d29-8740-f9b7e44d36ba", + "uuid": "115a2303-2c36-4bb5-af4b-94f092e0bb30", "control-id": "cis_rhel10_5-1.7", "description": "The requirement gives an example of 45 seconds, but is flexible about the values. It is only\nnecessary to ensure there is a timeout configured in alignment to the site policy.", "props": [ @@ -21818,7 +21818,7 @@ ] }, { - "uuid": "55859729-c1a0-4812-bcac-c271e53c0777", + "uuid": "d1562db2-81de-45c0-ba6e-00084e611ab9", "control-id": "cis_rhel10_5-1.10", "description": "No notes for control-id 5.1.10.", "props": [ @@ -21835,7 +21835,7 @@ ] }, { - "uuid": "890714d4-23a7-4cac-9fc9-f1e114518f66", + "uuid": "0d59b748-560b-4f0b-82ac-1772dea2b23c", "control-id": "cis_rhel10_5-1.11", "description": "No notes for control-id 5.1.11.", "props": [ @@ -21852,7 +21852,7 @@ ] }, { - "uuid": "b371510c-be42-400f-82ec-2b713dcabaff", + "uuid": "e01f83a6-1448-4892-a750-342143287cb8", "control-id": "cis_rhel10_5-1.12", "description": "The description for control-id cis_rhel10_5-1.12.", "props": [ @@ -21870,7 +21870,7 @@ ] }, { - "uuid": "6a98d847-f2de-41a5-b6b2-ebf6c22adf05", + "uuid": "50eb8931-8ba3-4744-be41-d8810099859a", "control-id": "cis_rhel10_5-1.13", "description": "No notes for control-id 5.1.13.", "props": [ @@ -21887,7 +21887,7 @@ ] }, { - "uuid": "30318c33-9e53-484e-bfea-7ffdc03a1b5e", + "uuid": "0347eeb8-effd-44d5-977e-4aaf9c395f14", "control-id": "cis_rhel10_5-1.14", "description": "The CIS benchmark is not opinionated about which loglevel is selected here. Here, this\nprofile uses VERBOSE by default, as it allows for the capture of login and logout activity\nas well as key fingerprints.", "props": [ @@ -21904,7 +21904,7 @@ ] }, { - "uuid": "5f044176-3359-4379-a4a7-af538e353d1b", + "uuid": "f0058375-f598-46a0-a7c3-e50042413a7a", "control-id": "cis_rhel10_5-1.15", "description": "No notes for control-id 5.1.15.", "props": [ @@ -21921,7 +21921,7 @@ ] }, { - "uuid": "d9d0b035-28a4-4f07-9190-8591cbdc67e2", + "uuid": "8a343c7c-10b0-41ba-a783-b115c813ef72", "control-id": "cis_rhel10_5-1.16", "description": "No notes for control-id 5.1.16.", "props": [ @@ -21938,7 +21938,7 @@ ] }, { - "uuid": "09871388-0b2b-45c4-9236-fd93245ac343", + "uuid": "dd719fb3-a9ce-4f4c-8af0-76a85d1feac1", "control-id": "cis_rhel10_5-1.17", "description": "No notes for control-id 5.1.17.", "props": [ @@ -21955,7 +21955,7 @@ ] }, { - "uuid": "dae45c70-1f37-4a0b-87af-a3f7ddcff3d8", + "uuid": "c63b5b9e-e60f-4f61-95e1-c61c01175208", "control-id": "cis_rhel10_5-1.18", "description": "No notes for control-id 5.1.18.", "props": [ @@ -21972,7 +21972,7 @@ ] }, { - "uuid": "7c6eb858-6948-4558-97cf-a1b17d4f84d4", + "uuid": "3a13b1a4-f0fc-40e6-a309-f158262738eb", "control-id": "cis_rhel10_5-1.19", "description": "No notes for control-id 5.1.19.", "props": [ @@ -21989,7 +21989,7 @@ ] }, { - "uuid": "5aa6acdb-5845-4d9d-b5e4-10a54efeb5ff", + "uuid": "98c14e54-6a73-44fe-9823-469863291829", "control-id": "cis_rhel10_5-1.20", "description": "No notes for control-id 5.1.20.", "props": [ @@ -22006,7 +22006,7 @@ ] }, { - "uuid": "76b2a34c-b29d-4a10-bf94-402e153326e7", + "uuid": "210ca035-ec9a-483d-94d0-0809f8edb4d1", "control-id": "cis_rhel10_5-1.21", "description": "No notes for control-id 5.1.21.", "props": [ @@ -22023,7 +22023,7 @@ ] }, { - "uuid": "f970b274-bf1d-443c-9af9-214c6c5767cc", + "uuid": "bb567608-5a41-4a7a-b750-12de15fd3c9f", "control-id": "cis_rhel10_5-1.22", "description": "No notes for control-id 5.1.22.", "props": [ @@ -22040,7 +22040,7 @@ ] }, { - "uuid": "6170f9e7-a166-4f69-b4fd-6af7de1be389", + "uuid": "d7bdffde-78ff-41f3-990f-37ff73fd9806", "control-id": "cis_rhel10_5-2.1", "description": "No notes for control-id 5.2.1.", "props": [ @@ -22057,7 +22057,7 @@ ] }, { - "uuid": "12893dc2-19a3-48b9-93f8-3ea0adbdfd22", + "uuid": "2893ea0e-3798-4da2-a5fe-e6bae67f7b6f", "control-id": "cis_rhel10_5-2.2", "description": "No notes for control-id 5.2.2.", "props": [ @@ -22074,7 +22074,7 @@ ] }, { - "uuid": "6535f6f8-966b-4335-8926-f725c0fc8067", + "uuid": "876eab91-d1c2-41f2-b4e4-fa4964e77846", "control-id": "cis_rhel10_5-2.3", "description": "No notes for control-id 5.2.3.", "props": [ @@ -22091,7 +22091,7 @@ ] }, { - "uuid": "cae55350-8046-43bf-bf70-6307e7d20a1c", + "uuid": "5e34a9c1-ec77-49ac-9aa7-0ce7ce235cd2", "control-id": "cis_rhel10_5-2.5", "description": "No notes for control-id 5.2.5.", "props": [ @@ -22108,7 +22108,7 @@ ] }, { - "uuid": "cf136e13-a607-4d50-b210-bf80407b4bd5", + "uuid": "9698d9d3-c2f1-486f-8d39-39d26b997b5e", "control-id": "cis_rhel10_5-2.6", "description": "No notes for control-id 5.2.6.", "props": [ @@ -22125,7 +22125,7 @@ ] }, { - "uuid": "952e3974-22cd-4d39-837e-43b5a9496ac8", + "uuid": "5d00fad0-7b02-4fb0-9015-6bf39bf86e14", "control-id": "cis_rhel10_5-2.7", "description": "Members of \"wheel\" or GID 0 groups are checked by default if the group option is not set for\npam_wheel.so module. The recommendation states the group should be empty to reinforce the\nuse of \"sudo\" for privileged access. Therefore, members of these groups should be manually\nchecked or a different group should be informed.", "props": [ @@ -22147,7 +22147,7 @@ ] }, { - "uuid": "b5447a4d-1bf6-4c67-87f4-c3ba61421d87", + "uuid": "ebd949ce-002e-493a-8ac6-21d8cfdafdec", "control-id": "cis_rhel10_5-3.1.1", "description": "This requirement is hard to be automated without any specific requirement. The policy even\nstates that provided commands are examples, other custom settings might be in place and the\nsettings might be different depending on site policies. The other rules will already make\nsure there is a correct autheselect profile regardless of the existing settings. It is\nnecessary to better discuss with CIS Community.", "props": [ @@ -22159,7 +22159,7 @@ ] }, { - "uuid": "56429137-1eef-4b1b-b74b-46533fa0643f", + "uuid": "a608bed0-2657-4a6d-9a63-18ae98691238", "control-id": "cis_rhel10_5-3.1.2", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.1.", "props": [ @@ -22181,7 +22181,7 @@ ] }, { - "uuid": "577246ca-e53c-4a75-9b80-5d1697811c00", + "uuid": "9787f74d-71c5-4f2a-a8d8-9fd875a745f6", "control-id": "cis_rhel10_5-3.1.3", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.2.", "props": [ @@ -22208,7 +22208,7 @@ ] }, { - "uuid": "986a0b2a-6ce5-41bd-b0ba-cd8df0c9207b", + "uuid": "3ed4cb55-c101-43e9-a24a-1b23aa210b3c", "control-id": "cis_rhel10_5-3.1.4", "description": "The module is properly enabled by the rules mentioned in related_rules.\nRequirements in 5.3.2.3 use these rules.", "props": [ @@ -22220,7 +22220,7 @@ ] }, { - "uuid": "a01b6a27-1a2b-4599-93b1-c42df1da47a3", + "uuid": "360a13ea-c74f-4866-86bf-b33cb74c9dbc", "control-id": "cis_rhel10_5-3.1.5", "description": "No notes for control-id 5.3.1.5.", "props": [ @@ -22237,7 +22237,7 @@ ] }, { - "uuid": "4b2a9d27-6e40-48d9-acd9-2e1379645938", + "uuid": "18d6fe14-1427-4559-a171-659ca1af0c60", "control-id": "cis_rhel10_5-3.2.1.1", "description": "No notes for control-id 5.3.2.1.1.", "props": [ @@ -22254,7 +22254,7 @@ ] }, { - "uuid": "22091387-6ac2-4981-b16e-70429468e84f", + "uuid": "06ff6753-fc6c-4c00-8d30-493312deb3b5", "control-id": "cis_rhel10_5-3.2.1.2", "description": "The policy also accepts value 0, which means the locked accounts should be manually unlocked\nby an administrator. However, it also mentions that using value 0 can facilitate a DoS\nattack to legitimate users.", "props": [ @@ -22271,7 +22271,7 @@ ] }, { - "uuid": "84c8f442-676d-484c-9ca3-01a16cf88a8f", + "uuid": "506b95c3-09bb-44ae-b318-bedabed7c801", "control-id": "cis_rhel10_5-3.2.2.1", "description": "No notes for control-id 5.3.2.2.1.", "props": [ @@ -22288,7 +22288,7 @@ ] }, { - "uuid": "0f68ba60-df1e-4da4-a850-ecb09692f8b7", + "uuid": "bea2bf54-c67f-47c6-be87-e0a6671f4cff", "control-id": "cis_rhel10_5-3.2.2.2", "description": "No notes for control-id 5.3.2.2.2.", "props": [ @@ -22305,7 +22305,7 @@ ] }, { - "uuid": "d9c567a6-460a-43fc-b5be-b744f09121b1", + "uuid": "d4c14004-572d-4d70-b409-5c9825ed9498", "control-id": "cis_rhel10_5-3.2.2.3", "description": "This requirement is expected to be manual. However, in previous versions of the policy\nit was already automated the configuration of \"minclass\" option. This posture was kept for\nRHEL 10 in this new version. Rules related to other options are informed in related_rules.\nIn short, minclass=4 alone can achieve the same result achieved by the combination of the\nother 4 options mentioned in the policy.", "props": [ @@ -22322,7 +22322,7 @@ ] }, { - "uuid": "cd4b28e5-427a-44b5-831d-e1d89e7321e4", + "uuid": "4a44b60f-b479-431a-863a-afd8d4a67785", "control-id": "cis_rhel10_5-3.2.2.4", "description": "No notes for control-id 5.3.2.2.4.", "props": [ @@ -22339,7 +22339,7 @@ ] }, { - "uuid": "12a36002-7e20-4ce5-806a-07de0d867416", + "uuid": "d23e7982-9451-49fc-b352-d668f74f62ad", "control-id": "cis_rhel10_5-3.2.2.5", "description": "No notes for control-id 5.3.2.2.5.", "props": [ @@ -22356,7 +22356,7 @@ ] }, { - "uuid": "2c60c98e-4245-4e8c-94e7-fc4343b315e8", + "uuid": "d05431d6-8600-4b79-b2a9-27a06474abb3", "control-id": "cis_rhel10_5-3.2.2.6", "description": "No notes for control-id 5.3.2.2.6.", "props": [ @@ -22373,7 +22373,7 @@ ] }, { - "uuid": "9328aacf-5e0c-4bb9-9b81-23732916b2bb", + "uuid": "8c7e042b-9cbe-4e8c-82dd-e2f4d272f0e5", "control-id": "cis_rhel10_5-3.2.2.7", "description": "No notes for control-id 5.3.2.2.7.", "props": [ @@ -22390,7 +22390,7 @@ ] }, { - "uuid": "183dd778-4139-4413-9430-c7ba5aaa946e", + "uuid": "5c77855e-d67a-4f4f-a644-a6473cefa92f", "control-id": "cis_rhel10_5-3.2.3.1", "description": "Although mentioned in the section 5.3.3.3, there is no explicit requirement to configure\nretry option of pam_pwhistory. If come in the future, the rule accounts_password_pam_retry\ncan be used.", "props": [ @@ -22412,7 +22412,7 @@ ] }, { - "uuid": "0afd25a5-cc27-467c-87c5-e2491904074e", + "uuid": "b512a6b3-e0a9-4bff-b55a-bf97c895057c", "control-id": "cis_rhel10_5-3.2.3.2", "description": "No notes for control-id 5.3.2.3.2.", "props": [ @@ -22429,7 +22429,7 @@ ] }, { - "uuid": "604f486b-4977-4878-9f89-8272903904eb", + "uuid": "baa18be1-d7c0-423c-8829-8daaa63a4a70", "control-id": "cis_rhel10_5-3.2.3.3", "description": "In RHEL 10 pam_pwhistory is enabled via authselect feature, as required in 5.3.1.4. The\nfeature automatically set \"use_authok\" option. In any case, we don't have a rule to check\nthis option specifically.", "props": [ @@ -22446,7 +22446,7 @@ ] }, { - "uuid": "d5816249-813c-41a9-841d-068a12e9346b", + "uuid": "48a3cb56-ccf6-40b4-a962-751ad070fe2f", "control-id": "cis_rhel10_5-3.2.4.1", "description": "The rule more specifically used in this requirement also satify the requirement 5.3.1.5.", "props": [ @@ -22463,7 +22463,7 @@ ] }, { - "uuid": "4993d67d-d28b-4059-a939-95215498c3f5", + "uuid": "4877034a-e71c-4ffe-9027-cc97ef9478d8", "control-id": "cis_rhel10_5-3.2.4.2", "description": "Usage of pam_unix.so module together with \"remember\" option is deprecated and is not\nrecommended by this policy. Instead, it should be used remember option of pam_pwhistory\nmodule, as required in 5.3.2.3.1. See here for more details about pam_unix.so:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1778929", "props": [ @@ -22480,7 +22480,7 @@ ] }, { - "uuid": "e5c3f579-93c4-4dd5-8324-9637aa4ed321", + "uuid": "8166969d-ca41-497a-b406-6e41b973ea37", "control-id": "cis_rhel10_5-3.2.4.3", "description": "Changes in logindefs mentioned in this requirement are more specifically covered by 5.4.1.4", "props": [ @@ -22502,7 +22502,7 @@ ] }, { - "uuid": "74275483-83cc-411c-bf6a-b2ddff329866", + "uuid": "afded8e5-c740-4aeb-9014-71a196832175", "control-id": "cis_rhel10_5-3.2.4.4", "description": "In RHEL 10 pam_unix is enabled by default in all authselect profiles already with the\nuse_authtok option set. In any case, we don't have a rule to check this option specifically,\nlike in 5.3.2.3.3.", "props": [ @@ -22519,7 +22519,7 @@ ] }, { - "uuid": "d033fe64-bc56-4d3a-a33f-74e08e700c2d", + "uuid": "19f25445-537b-4972-91f5-0696d113a950", "control-id": "cis_rhel10_5-4.1.1", "description": "No notes for control-id 5.4.1.1.", "props": [ @@ -22541,7 +22541,7 @@ ] }, { - "uuid": "72807adb-40ff-4be9-9f2a-a563147962d1", + "uuid": "3d71905f-24c4-452c-b51c-c2ddc7c892a9", "control-id": "cis_rhel10_5-4.1.3", "description": "No notes for control-id 5.4.1.3.", "props": [ @@ -22563,7 +22563,7 @@ ] }, { - "uuid": "ddd0e7dd-cfef-4722-b45b-decb6773ad74", + "uuid": "871cb23e-ee07-4719-a1a6-4c126993b76f", "control-id": "cis_rhel10_5-4.1.4", "description": "There's a \"new\" set of options in /etc/login.defs file to define the number of iterations\nperformed during the hashing process.", "props": [ @@ -22585,7 +22585,7 @@ ] }, { - "uuid": "cd4f8b50-e158-4263-87c8-a5f4d04d7da1", + "uuid": "bd4a9f23-cea1-4a58-9d01-45ff51b976e2", "control-id": "cis_rhel10_5-4.1.5", "description": "No notes for control-id 5.4.1.5.", "props": [ @@ -22607,7 +22607,7 @@ ] }, { - "uuid": "0d63f069-fe74-4132-a9fb-35ee4a4ae849", + "uuid": "268d6911-13d6-4481-8ff6-06f4b1c0e02c", "control-id": "cis_rhel10_5-4.1.6", "description": "No notes for control-id 5.4.1.6.", "props": [ @@ -22624,7 +22624,7 @@ ] }, { - "uuid": "496ad51f-74d0-4140-a24d-f2c50632ac1c", + "uuid": "2abfbe95-c89a-4303-b0c4-67a36d68008f", "control-id": "cis_rhel10_5-4.2.1", "description": "No notes for control-id 5.4.2.1.", "props": [ @@ -22641,7 +22641,7 @@ ] }, { - "uuid": "d469e102-656a-4f3f-be1c-b0c33d9529f9", + "uuid": "a42cdea5-4d7c-46d0-bf0c-4d35ae71c126", "control-id": "cis_rhel10_5-4.2.2", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -22658,7 +22658,7 @@ ] }, { - "uuid": "c2c1f20b-33f1-4e9e-ae4c-5c54cf0971b2", + "uuid": "d136a7dc-a69c-4dd7-9627-53633d0e1f00", "control-id": "cis_rhel10_5-4.2.3", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -22675,7 +22675,7 @@ ] }, { - "uuid": "efedbb47-89c1-4b8a-92e2-2b737eb365c5", + "uuid": "056fe021-c2fc-4ed9-b283-48c467850947", "control-id": "cis_rhel10_5-4.2.4", "description": "No notes for control-id 5.4.2.4.", "props": [ @@ -22692,7 +22692,7 @@ ] }, { - "uuid": "60387fe4-b861-4ae1-a1f3-8db48981bb28", + "uuid": "60b08a6b-6669-4514-8830-71bb57f35030", "control-id": "cis_rhel10_5-4.2.5", "description": "No notes for control-id 5.4.2.5.", "props": [ @@ -22714,7 +22714,7 @@ ] }, { - "uuid": "2c721dad-1a9d-4192-90ad-b3c80dc22cb6", + "uuid": "0862eec2-9a8c-4d85-a886-0eae634b8557", "control-id": "cis_rhel10_5-4.2.6", "description": "No notes for control-id 5.4.2.6.", "props": [ @@ -22731,7 +22731,7 @@ ] }, { - "uuid": "f3afb684-56d5-488c-a4be-23fb5eb53e8c", + "uuid": "edcae66b-5355-46f9-8f16-2ce0eb3f57a7", "control-id": "cis_rhel10_5-4.2.7", "description": "No notes for control-id 5.4.2.7.", "props": [ @@ -22753,7 +22753,7 @@ ] }, { - "uuid": "84c58555-c8bf-4b11-b4d4-5a13df248e33", + "uuid": "0e60ad09-36fd-4ab2-b102-b6d41d279d43", "control-id": "cis_rhel10_5-4.2.8", "description": "No notes for control-id 5.4.2.8.", "props": [ @@ -22770,7 +22770,7 @@ ] }, { - "uuid": "3cb8ee64-4598-4dae-95b6-05db99590392", + "uuid": "08b3ae90-1911-45cd-9ec3-897c37d420ce", "control-id": "cis_rhel10_5-4.3.2", "description": "No notes for control-id 5.4.3.2.", "props": [ @@ -22787,7 +22787,7 @@ ] }, { - "uuid": "4b574dcf-127a-496b-8f52-53804bd6f6fd", + "uuid": "4e904cb1-ee0f-45b8-9705-96d65f41ac77", "control-id": "cis_rhel10_5-4.3.3", "description": "No notes for control-id 5.4.3.3.", "props": [ @@ -22814,7 +22814,7 @@ ] }, { - "uuid": "e2477431-6d76-4113-9c80-8c091a647447", + "uuid": "63d44344-222d-4431-bf4e-db5e45de35b9", "control-id": "cis_rhel10_6-1.1", "description": "No notes for control-id 6.1.1.", "props": [ @@ -22836,7 +22836,7 @@ ] }, { - "uuid": "10dcbb3f-659a-45d4-8bed-6b4bed4a7b5f", + "uuid": "f8d0b97e-50cc-4160-8ad5-750f552fb563", "control-id": "cis_rhel10_6-1.2", "description": "No notes for control-id 6.1.2.", "props": [ @@ -22853,7 +22853,7 @@ ] }, { - "uuid": "f7c4df0f-bba6-4f19-afca-cb00dc245517", + "uuid": "233372a2-cace-4ada-9115-97e58b83f31d", "control-id": "cis_rhel10_6-1.3", "description": "No notes for control-id 6.1.3.", "props": [ @@ -22870,7 +22870,7 @@ ] }, { - "uuid": "ef4b4946-c342-4af4-b3b0-5d1cb3640338", + "uuid": "3d017d4a-f617-43f9-a106-636f91f5170f", "control-id": "cis_rhel10_6-2.1.1", "description": "No notes for control-id 6.2.1.1.", "props": [ @@ -22887,7 +22887,7 @@ ] }, { - "uuid": "20a9e70e-5b0f-4a66-b13f-add9aa341ca8", + "uuid": "fbe7cfb6-3b9f-4048-aa01-8d835dc03ef9", "control-id": "cis_rhel10_6-2.1.2", "description": "The description for control-id cis_rhel10_6-2.1.2.", "props": [ @@ -22900,7 +22900,7 @@ ] }, { - "uuid": "1c92ff70-696e-4b17-a3c3-83190425a332", + "uuid": "e3f31a2f-0c70-4ec8-ae05-5ce8ebe82244", "control-id": "cis_rhel10_6-2.1.3", "description": "The description for control-id cis_rhel10_6-2.1.3.", "props": [ @@ -22913,7 +22913,7 @@ ] }, { - "uuid": "3c448ead-7adc-4ee4-b22e-fa0545c4d0bd", + "uuid": "0604bba3-1170-46f6-aba0-bcc84651ecdf", "control-id": "cis_rhel10_6-2.1.4", "description": "No notes for control-id 6.2.1.4.", "props": [ @@ -22930,7 +22930,7 @@ ] }, { - "uuid": "f8420f90-bef9-4282-9920-a2fef37a3cca", + "uuid": "c9170ee7-a17e-4d85-9684-d4157bdaabb8", "control-id": "cis_rhel10_6-2.2.1.1", "description": "No notes for control-id 6.2.2.1.1.", "props": [ @@ -22947,7 +22947,7 @@ ] }, { - "uuid": "daca446d-af89-4e54-8dc8-07994e1933b9", + "uuid": "c5a0bd06-756b-4c42-a8b8-3fc696b80330", "control-id": "cis_rhel10_6-2.2.1.2", "description": "The description for control-id cis_rhel10_6-2.2.1.2.", "props": [ @@ -22960,7 +22960,7 @@ ] }, { - "uuid": "3d4b605f-3a02-463b-82c5-34796f1f111e", + "uuid": "e040f7f7-ddfe-4a79-911d-fd3bfef8d667", "control-id": "cis_rhel10_6-2.2.1.3", "description": "No notes for control-id 6.2.2.1.3.", "props": [ @@ -22977,7 +22977,7 @@ ] }, { - "uuid": "28f79b6d-e9c4-49de-a7be-9dcaaf0b2ac5", + "uuid": "5f0b8372-e58d-4270-a86a-d15d8e0fe5c4", "control-id": "cis_rhel10_6-2.2.1.4", "description": "No notes for control-id 6.2.2.1.4.", "props": [ @@ -22994,7 +22994,7 @@ ] }, { - "uuid": "6dff8260-22fc-456c-8060-58d5bfa93c77", + "uuid": "7ae73fcc-5bdf-4bbd-b993-ff2a751efa9b", "control-id": "cis_rhel10_6-2.2.2", "description": "No notes for control-id 6.2.2.2.", "props": [ @@ -23011,7 +23011,7 @@ ] }, { - "uuid": "bac0f21f-ce40-4a12-8693-7d399be06fcf", + "uuid": "199aca39-21b2-488d-9b80-21bf4b44e943", "control-id": "cis_rhel10_6-2.2.3", "description": "No notes for control-id 6.2.2.3.", "props": [ @@ -23028,7 +23028,7 @@ ] }, { - "uuid": "adf32cde-a079-4814-b25a-e69d2367cb5c", + "uuid": "8393a699-19fc-4d91-81d1-e3051c01ae3c", "control-id": "cis_rhel10_6-2.2.4", "description": "No notes for control-id 6.2.2.4.", "props": [ @@ -23045,7 +23045,7 @@ ] }, { - "uuid": "46e74858-5c09-4260-88e9-d2060c3e48db", + "uuid": "57052ad8-000f-4797-8d1f-3014454ab978", "control-id": "cis_rhel10_6-2.3.1", "description": "No notes for control-id 6.2.3.1.", "props": [ @@ -23057,7 +23057,7 @@ ] }, { - "uuid": "6e9a5939-58c6-45fa-a3a1-86733c1e0fb9", + "uuid": "fac5658a-c2b6-4bfc-a3ab-912416234950", "control-id": "cis_rhel10_6-2.3.2", "description": "No notes for control-id 6.2.3.2.", "props": [ @@ -23069,7 +23069,7 @@ ] }, { - "uuid": "80cbb1e7-cf93-482d-9a9e-1e66958ec6b1", + "uuid": "ea814f8d-5f81-4f8e-94de-8466aba2c876", "control-id": "cis_rhel10_6-2.3.3", "description": "No notes for control-id 6.2.3.3.", "props": [ @@ -23081,7 +23081,7 @@ ] }, { - "uuid": "213616c8-37ab-4281-8220-bb8a9415bd41", + "uuid": "37422cdb-7709-4009-a7b4-565ad6cbfddc", "control-id": "cis_rhel10_6-2.3.4", "description": "No notes for control-id 6.2.3.4.", "props": [ @@ -23093,7 +23093,7 @@ ] }, { - "uuid": "71249c7b-2b2f-4ff7-81f1-86b1174d3aba", + "uuid": "babc7ed6-f03e-47d1-b3f6-6652c5dc6f03", "control-id": "cis_rhel10_6-2.3.5", "description": "The description for control-id cis_rhel10_6-2.3.5.", "props": [ @@ -23106,7 +23106,7 @@ ] }, { - "uuid": "9ceb9341-bbe9-4a2e-85ff-e3de9b331aed", + "uuid": "45255bef-e510-4119-90c4-c062a6e2dc7d", "control-id": "cis_rhel10_6-2.3.6", "description": "The description for control-id cis_rhel10_6-2.3.6.", "props": [ @@ -23119,7 +23119,7 @@ ] }, { - "uuid": "55e3623b-ae9e-455e-a90d-abcb3f2a5e53", + "uuid": "f9e1fc2e-2240-4a79-8164-7664856d5298", "control-id": "cis_rhel10_6-2.3.7", "description": "No notes for control-id 6.2.3.7.", "props": [ @@ -23131,7 +23131,7 @@ ] }, { - "uuid": "3b7dc316-aa0c-41cd-8411-c38625c15052", + "uuid": "5298dd16-cef8-4019-8e24-edb0e21980b3", "control-id": "cis_rhel10_6-2.3.8", "description": "The description for control-id cis_rhel10_6-2.3.8.", "props": [ @@ -23144,7 +23144,7 @@ ] }, { - "uuid": "144d1985-4625-47e7-9f98-94cb2ae49632", + "uuid": "05530ffa-4ea3-497c-a243-e1eb550a4fa1", "control-id": "cis_rhel10_6-2.4.1", "description": "It is not harmful to run these rules even if rsyslog is not installed or active.", "props": [ @@ -23171,7 +23171,7 @@ ] }, { - "uuid": "31b6f4c1-ba15-4e54-9275-655ef7535ca4", + "uuid": "62aaf6a3-dafe-49b4-b123-becafd68c18c", "control-id": "cis_rhel10_7-1.1", "description": "No notes for control-id 7.1.1.", "props": [ @@ -23198,7 +23198,7 @@ ] }, { - "uuid": "584cc035-e958-4a6b-a959-d63a1accdcd1", + "uuid": "8989da26-3c6f-44de-a8c7-d6e10d41f31f", "control-id": "cis_rhel10_7-1.2", "description": "No notes for control-id 7.1.2.", "props": [ @@ -23225,7 +23225,7 @@ ] }, { - "uuid": "cbeda095-20bf-4a72-af9d-ccc1878ecf2a", + "uuid": "7e6cbf46-f0ba-49bf-a75a-16a946166163", "control-id": "cis_rhel10_7-1.3", "description": "No notes for control-id 7.1.3.", "props": [ @@ -23252,7 +23252,7 @@ ] }, { - "uuid": "3cf12a29-2646-4965-8107-b1701e9d890e", + "uuid": "3d75b0ee-bf8a-4e1c-96cc-fe3c1766aad3", "control-id": "cis_rhel10_7-1.4", "description": "No notes for control-id 7.1.4.", "props": [ @@ -23279,7 +23279,7 @@ ] }, { - "uuid": "00c8757e-519b-4525-8ee6-75aab3351349", + "uuid": "a9678204-5266-4bdd-a6ab-a649d0b1fd86", "control-id": "cis_rhel10_7-1.5", "description": "No notes for control-id 7.1.5.", "props": [ @@ -23306,7 +23306,7 @@ ] }, { - "uuid": "e0ed6315-50bf-4802-9723-e1c84ddaaf33", + "uuid": "e6aaefc4-2fbf-48c2-8458-8ff0ddf4715c", "control-id": "cis_rhel10_7-1.6", "description": "No notes for control-id 7.1.6.", "props": [ @@ -23333,7 +23333,7 @@ ] }, { - "uuid": "e21d7527-fe46-421b-942e-9135d2a5f7ae", + "uuid": "b147d08f-3209-4bbc-9ef2-7addc1b29b17", "control-id": "cis_rhel10_7-1.7", "description": "No notes for control-id 7.1.7.", "props": [ @@ -23360,7 +23360,7 @@ ] }, { - "uuid": "e3a2d15c-e9da-47f3-9728-286a6c518228", + "uuid": "f4aca3c2-2319-4454-b162-6e4a069aef12", "control-id": "cis_rhel10_7-1.8", "description": "No notes for control-id 7.1.8.", "props": [ @@ -23387,7 +23387,7 @@ ] }, { - "uuid": "628f5c98-753f-43d3-9cf8-84e4c5a47025", + "uuid": "ecc3299c-9410-4036-8ec4-fdb229f50628", "control-id": "cis_rhel10_7-1.9", "description": "No notes for control-id 7.1.9.", "props": [ @@ -23414,7 +23414,7 @@ ] }, { - "uuid": "5628edd7-c09b-4406-acdb-a9f8d96d995e", + "uuid": "6ac046df-ee0f-40f2-b328-d52aa9033bcc", "control-id": "cis_rhel10_7-1.10", "description": "No notes for control-id 7.1.10.", "props": [ @@ -23456,7 +23456,7 @@ ] }, { - "uuid": "72c3a603-8827-4955-acbd-fe09f9ef57f6", + "uuid": "5c4756aa-446e-4a38-8be5-2ba70f3cbd8e", "control-id": "cis_rhel10_7-1.11", "description": "No notes for control-id 7.1.11.", "props": [ @@ -23478,7 +23478,7 @@ ] }, { - "uuid": "4f7ff5fc-1af8-4fc0-8cea-380ec7289a36", + "uuid": "53cbc30d-22a9-4522-a1ac-8f55ecf95b3f", "control-id": "cis_rhel10_7-1.12", "description": "No notes for control-id 7.1.12.", "props": [ @@ -23500,7 +23500,7 @@ ] }, { - "uuid": "04e510c8-dce2-4513-8697-00bbf6d16b57", + "uuid": "e642ba3e-1304-4cc2-8df0-abc3e138e34d", "control-id": "cis_rhel10_7-1.13", "description": "The description for control-id cis_rhel10_7-1.13.", "props": [ @@ -23513,7 +23513,7 @@ ] }, { - "uuid": "2e425146-190b-480f-a43c-df844caba328", + "uuid": "9886d88b-776b-4f3f-9339-93ec2764744b", "control-id": "cis_rhel10_7-2.1", "description": "No notes for control-id 7.2.1.", "props": [ @@ -23530,7 +23530,7 @@ ] }, { - "uuid": "12195ac6-3262-415b-a717-582a77deb9d3", + "uuid": "361a1583-2d95-41b0-9151-0037f797e355", "control-id": "cis_rhel10_7-2.2", "description": "No notes for control-id 7.2.2.", "props": [ @@ -23547,7 +23547,7 @@ ] }, { - "uuid": "81c6ef09-f41f-4027-8f7b-f50fe896159d", + "uuid": "1a26f564-e8db-4549-ac3e-c143a0ced972", "control-id": "cis_rhel10_7-2.3", "description": "No notes for control-id 7.2.3.", "props": [ @@ -23564,7 +23564,7 @@ ] }, { - "uuid": "d93ea99f-11f2-4fe8-a064-719fe1e99452", + "uuid": "f5d0f325-487b-42dd-92b0-f6bb062144b2", "control-id": "cis_rhel10_7-2.4", "description": "No notes for control-id 7.2.4.", "props": [ @@ -23581,7 +23581,7 @@ ] }, { - "uuid": "0db1a388-835b-44cb-a70b-f0ccb7a329d2", + "uuid": "064c3782-343f-4e0b-a94f-841ef36c19f8", "control-id": "cis_rhel10_7-2.5", "description": "No notes for control-id 7.2.5.", "props": [ @@ -23598,7 +23598,7 @@ ] }, { - "uuid": "621a77a0-25ff-4908-b6a9-86f996d301d3", + "uuid": "f36e4b8a-27c9-4e7e-9623-baf1e77ad1af", "control-id": "cis_rhel10_7-2.6", "description": "No notes for control-id 7.2.6.", "props": [ @@ -23615,7 +23615,7 @@ ] }, { - "uuid": "678dac1a-fe57-496b-a963-86e6acf5b9dd", + "uuid": "33802a9a-1819-4c0a-b698-00683f79ed67", "control-id": "cis_rhel10_7-2.7", "description": "No notes for control-id 7.2.7.", "props": [ @@ -23632,7 +23632,7 @@ ] }, { - "uuid": "191d32e8-6bc8-477d-9fa2-fdbfa939c4cf", + "uuid": "e372e2c6-696f-436e-85ad-f90ca048c2a7", "control-id": "cis_rhel10_7-2.8", "description": "No notes for control-id 7.2.8.", "props": [ @@ -23659,7 +23659,7 @@ ] }, { - "uuid": "73a88634-d5bb-4e3a-b92a-400a3fce94af", + "uuid": "dfc8ce5a-aee3-4831-be7b-cc25cc19fcb3", "control-id": "cis_rhel10_7-2.9", "description": "No notes for control-id 7.2.9.", "props": [ diff --git a/component-definitions/rhel10/rhel10-cis_rhel10-l1_workstation/component-definition.json b/component-definitions/rhel10/rhel10-cis_rhel10-l1_workstation/component-definition.json index 18df1a97..006b500c 100644 --- a/component-definitions/rhel10/rhel10-cis_rhel10-l1_workstation/component-definition.json +++ b/component-definitions/rhel10/rhel10-cis_rhel10-l1_workstation/component-definition.json @@ -3,8 +3,8 @@ "uuid": "f215e0d6-22bf-45fa-955c-4bc760e0ee55", "metadata": { "title": "Component definition for rhel10", - "last-modified": "2025-12-16T14:24:37.340065+00:00", - "version": "3.4", + "last-modified": "2025-12-17T09:49:49.063362+00:00", + "version": "3.5", "oscal-version": "1.1.3" }, "components": [ @@ -4835,7 +4835,7 @@ ], "control-implementations": [ { - "uuid": "5a765db4-82e7-4ddc-bb2e-d1d95d55886f", + "uuid": "b029238d-3efa-4596-8215-c9e1b76b84d4", "source": "trestle://profiles/rhel10-cis_rhel10-l1_workstation/profile.json", "description": "Control implementation for cis_workstation_l1", "props": [ @@ -5191,7 +5191,7 @@ ], "implemented-requirements": [ { - "uuid": "c760fec0-d681-4b6c-8d82-b207651c5fe8", + "uuid": "9ad19306-d700-4d62-bf57-f287fcf460a9", "control-id": "reload_dconf_db", "description": "This is a helper rule to reload Dconf database correctly.", "props": [ @@ -5208,7 +5208,7 @@ ] }, { - "uuid": "9ed6436f-b782-466b-bd9c-0be53df2bd54", + "uuid": "489f72e9-41ac-48c6-a513-5f8ff1db29a7", "control-id": "cis_rhel10_1-1.1.1", "description": "No notes for control-id 1.1.1.1.", "props": [ @@ -5225,7 +5225,7 @@ ] }, { - "uuid": "2db5931f-fbd6-4228-b893-7e2c0c2ed35b", + "uuid": "da9d551b-6404-430e-bb6e-5b99ea68a26c", "control-id": "cis_rhel10_1-1.1.2", "description": "No notes for control-id 1.1.1.2.", "props": [ @@ -5242,7 +5242,7 @@ ] }, { - "uuid": "89f2c746-0f33-44d6-a6fb-025c61595366", + "uuid": "9ff5ec21-2a48-4164-aaab-b9fb884a4634", "control-id": "cis_rhel10_1-1.1.3", "description": "No notes for control-id 1.1.1.3.", "props": [ @@ -5259,7 +5259,7 @@ ] }, { - "uuid": "5e20083f-34de-4a50-a9f6-c6d71a138547", + "uuid": "9129bb74-81b5-4488-b0ae-1167f2909060", "control-id": "cis_rhel10_1-1.1.4", "description": "No notes for control-id 1.1.1.4.", "props": [ @@ -5276,7 +5276,7 @@ ] }, { - "uuid": "5620132e-9d45-42ee-904b-78fc3a28a27c", + "uuid": "fe9dc8e0-ff81-44ae-a8d9-007f87b97d74", "control-id": "cis_rhel10_1-1.1.5", "description": "No notes for control-id 1.1.1.5.", "props": [ @@ -5293,7 +5293,7 @@ ] }, { - "uuid": "10cb795f-02d3-48e2-a66f-0fd141d90239", + "uuid": "502edba8-397e-4c01-a115-d401913210ed", "control-id": "cis_rhel10_1-1.1.11", "description": "The description for control-id cis_rhel10_1-1.1.11.", "props": [ @@ -5306,7 +5306,7 @@ ] }, { - "uuid": "2bfb9afd-73cc-4eab-9fc3-9046d1cbd5e4", + "uuid": "1f334f5b-ee3d-4ddb-aa59-0a85618ea5f8", "control-id": "cis_rhel10_1-1.2.1.1", "description": "No notes for control-id 1.1.2.1.1.", "props": [ @@ -5323,7 +5323,7 @@ ] }, { - "uuid": "527fecab-7dee-44ab-931a-883c559ab09c", + "uuid": "4004e995-a2db-4891-9e6b-fdb446aa23dd", "control-id": "cis_rhel10_1-1.2.1.2", "description": "No notes for control-id 1.1.2.1.2.", "props": [ @@ -5340,7 +5340,7 @@ ] }, { - "uuid": "48ba7630-29aa-464d-b18d-a479dc51e303", + "uuid": "8a573300-40b4-4c02-926e-e43c71503905", "control-id": "cis_rhel10_1-1.2.1.3", "description": "No notes for control-id 1.1.2.1.3.", "props": [ @@ -5357,7 +5357,7 @@ ] }, { - "uuid": "8aa5ba16-a36a-4906-a792-adcd9d3f9c37", + "uuid": "1d702e74-5158-40cc-a978-3380c16331e2", "control-id": "cis_rhel10_1-1.2.1.4", "description": "No notes for control-id 1.1.2.1.4.", "props": [ @@ -5374,7 +5374,7 @@ ] }, { - "uuid": "f5622b98-8c2d-4c7d-9aff-303564541cb9", + "uuid": "eb3505be-3f2a-4133-88f4-78cc9e39fd46", "control-id": "cis_rhel10_1-1.2.2.1", "description": "No notes for control-id 1.1.2.2.1.", "props": [ @@ -5391,7 +5391,7 @@ ] }, { - "uuid": "0769d9ac-f214-4358-80bd-528ef425589d", + "uuid": "f253a9d9-e712-4702-81ea-0a05af586959", "control-id": "cis_rhel10_1-1.2.2.2", "description": "No notes for control-id 1.1.2.2.2.", "props": [ @@ -5408,7 +5408,7 @@ ] }, { - "uuid": "cead1752-2070-458a-bb42-80cb1ebe2e04", + "uuid": "2a403bce-0f88-41b5-a659-336ba8b4fdfd", "control-id": "cis_rhel10_1-1.2.2.3", "description": "No notes for control-id 1.1.2.2.3.", "props": [ @@ -5425,7 +5425,7 @@ ] }, { - "uuid": "80489b89-ab26-4fbd-bf32-eebc9d1e9998", + "uuid": "b84135ab-3a97-4b8d-98eb-bd54204d8526", "control-id": "cis_rhel10_1-1.2.2.4", "description": "No notes for control-id 1.1.2.2.4.", "props": [ @@ -5442,7 +5442,7 @@ ] }, { - "uuid": "73e0ec4e-6a82-4496-9386-f74347bdaf96", + "uuid": "8b81d301-187b-45c3-aa7c-07ebcd9b60ca", "control-id": "cis_rhel10_1-1.2.3.2", "description": "No notes for control-id 1.1.2.3.2.", "props": [ @@ -5459,7 +5459,7 @@ ] }, { - "uuid": "90cb9c1c-a3e5-4fea-8df7-713f81932322", + "uuid": "90aef432-962f-4b0e-948d-a7463396ac09", "control-id": "cis_rhel10_1-1.2.3.3", "description": "No notes for control-id 1.1.2.3.3.", "props": [ @@ -5476,7 +5476,7 @@ ] }, { - "uuid": "c10b0ff7-4d66-4cb9-b4a1-ef9451599966", + "uuid": "e3c8e268-00aa-4c61-bc65-c8259cffea87", "control-id": "cis_rhel10_1-1.2.4.2", "description": "No notes for control-id 1.1.2.4.2.", "props": [ @@ -5493,7 +5493,7 @@ ] }, { - "uuid": "65d8c72e-3a36-4320-96dd-137d02f56937", + "uuid": "4b7ee016-f5a4-473b-9f9b-c68e7553d535", "control-id": "cis_rhel10_1-1.2.4.3", "description": "No notes for control-id 1.1.2.4.3.", "props": [ @@ -5510,7 +5510,7 @@ ] }, { - "uuid": "008e798c-c63d-490f-90f1-c1d51de3ca20", + "uuid": "f3d2592d-9f87-46ad-8edd-df3aae88174d", "control-id": "cis_rhel10_1-1.2.5.2", "description": "No notes for control-id 1.1.2.5.2.", "props": [ @@ -5527,7 +5527,7 @@ ] }, { - "uuid": "f14563a3-45f1-4af7-947a-a85a885258d1", + "uuid": "92350613-b0ba-4023-9a25-b51c69d99b30", "control-id": "cis_rhel10_1-1.2.5.3", "description": "No notes for control-id 1.1.2.5.3.", "props": [ @@ -5544,7 +5544,7 @@ ] }, { - "uuid": "29da86f8-b2bc-4e6b-8929-b38bd7378028", + "uuid": "ccdbe9c1-4071-48a3-bc71-c7392c08bf77", "control-id": "cis_rhel10_1-1.2.5.4", "description": "No notes for control-id 1.1.2.5.4.", "props": [ @@ -5561,7 +5561,7 @@ ] }, { - "uuid": "28c6ee1e-2cba-448c-bb99-f8ca552ea92e", + "uuid": "65800d30-c5a1-4093-8bb1-e30507e5d3ca", "control-id": "cis_rhel10_1-1.2.6.2", "description": "No notes for control-id 1.1.2.6.2.", "props": [ @@ -5578,7 +5578,7 @@ ] }, { - "uuid": "79fb21aa-df8d-4cdf-821b-c9595b802b34", + "uuid": "b052dd62-1dd6-4f49-b013-5e90b9357218", "control-id": "cis_rhel10_1-1.2.6.3", "description": "No notes for control-id 1.1.2.6.3.", "props": [ @@ -5595,7 +5595,7 @@ ] }, { - "uuid": "894b0cae-843d-47e9-90b4-8cd94aeb273b", + "uuid": "97aea8de-3612-4801-9c70-99abc4ef864b", "control-id": "cis_rhel10_1-1.2.6.4", "description": "No notes for control-id 1.1.2.6.4.", "props": [ @@ -5612,7 +5612,7 @@ ] }, { - "uuid": "0ee82deb-e281-4b38-9917-66012ee7f1d2", + "uuid": "54a1e84b-def8-4858-b1a2-e78d330a1635", "control-id": "cis_rhel10_1-1.2.7.2", "description": "No notes for control-id 1.1.2.7.2.", "props": [ @@ -5629,7 +5629,7 @@ ] }, { - "uuid": "58209cd7-060c-4ac4-82da-f3b7d8ab9e4e", + "uuid": "d6f23560-dd11-466a-ac7f-34f125bd374f", "control-id": "cis_rhel10_1-1.2.7.3", "description": "No notes for control-id 1.1.2.7.3.", "props": [ @@ -5646,7 +5646,7 @@ ] }, { - "uuid": "50ab3e4a-b0ab-4af3-bb40-2db93f23ea64", + "uuid": "dcf9cc15-2742-4583-b267-4c41be82118a", "control-id": "cis_rhel10_1-1.2.7.4", "description": "No notes for control-id 1.1.2.7.4.", "props": [ @@ -5663,7 +5663,7 @@ ] }, { - "uuid": "d458c0ad-d385-4caf-95b9-337459eadd73", + "uuid": "99f990e8-6904-41e0-ae76-f2b31d4ba07a", "control-id": "cis_rhel10_1-2.1.1", "description": "The description for control-id cis_rhel10_1-2.1.1.", "props": [ @@ -5676,7 +5676,7 @@ ] }, { - "uuid": "c77d0645-dc33-4a9f-b7dc-f0e4a67d9bbf", + "uuid": "59934cbe-1d20-427c-a1e7-a5561f2b7848", "control-id": "cis_rhel10_1-2.1.2", "description": "No notes for control-id 1.2.1.2.", "props": [ @@ -5693,7 +5693,7 @@ ] }, { - "uuid": "60f91bdd-df50-435b-8734-584eb1e35d98", + "uuid": "914e8918-ae50-4548-815e-0a1c2a740f2c", "control-id": "cis_rhel10_1-2.1.4", "description": "The description for control-id cis_rhel10_1-2.1.4.", "props": [ @@ -5706,7 +5706,7 @@ ] }, { - "uuid": "8adfaec8-a077-4bfd-8e01-9d9653251235", + "uuid": "509c8a66-c2d6-4976-83b0-180a066f7218", "control-id": "cis_rhel10_1-2.2.1", "description": "The description for control-id cis_rhel10_1-2.2.1.", "props": [ @@ -5719,7 +5719,7 @@ ] }, { - "uuid": "09d996ae-51f4-4f1e-941c-a2a44cc67f94", + "uuid": "8c361f1a-987e-4027-a19f-161e519d76d6", "control-id": "cis_rhel10_1-3.1.1", "description": "No notes for control-id 1.3.1.1.", "props": [ @@ -5736,7 +5736,7 @@ ] }, { - "uuid": "ba7f0101-cbe3-4845-b404-921b86340e4c", + "uuid": "4813fc13-ad79-4816-9936-36ac3565db8c", "control-id": "cis_rhel10_1-3.1.2", "description": "No notes for control-id 1.3.1.2.", "props": [ @@ -5753,7 +5753,7 @@ ] }, { - "uuid": "0c2e7294-8281-4751-9170-75d8b448a932", + "uuid": "bb71f338-2e32-4d09-ac6c-66e94c70e974", "control-id": "cis_rhel10_1-3.1.3", "description": "No notes for control-id 1.3.1.3.", "props": [ @@ -5770,7 +5770,7 @@ ] }, { - "uuid": "7eb36cef-af9e-4d03-afbe-0d5d39b36a91", + "uuid": "df80b61f-27b1-406b-9ca8-a5b7deb99b32", "control-id": "cis_rhel10_1-3.1.4", "description": "No notes for control-id 1.3.1.4.", "props": [ @@ -5787,7 +5787,7 @@ ] }, { - "uuid": "76a12724-62ed-4e64-b8d9-4b2d682ff420", + "uuid": "c93f5c5d-c302-4645-a5ad-addfdf217d5f", "control-id": "cis_rhel10_1-3.1.7", "description": "No notes for control-id 1.3.1.7.", "props": [ @@ -5804,7 +5804,7 @@ ] }, { - "uuid": "5515b10b-0b7c-47ce-be3f-da36feb78775", + "uuid": "30aba0c4-62d4-4cdd-a31e-67f4b87f5edd", "control-id": "cis_rhel10_1-4.1", "description": "There is no automated remediation for this rule and this is intentional.\nMore details in the rule description.", "props": [ @@ -5821,7 +5821,7 @@ ] }, { - "uuid": "240cfd85-496a-476b-8e42-2f8ab377b0d1", + "uuid": "65593862-b124-4703-97ec-fbe9544fc9b6", "control-id": "cis_rhel10_1-4.2", "description": "This requirement demands a deeper review of the rules.", "props": [ @@ -5848,7 +5848,7 @@ ] }, { - "uuid": "335254d3-4a73-47ea-9cc5-2a8e37f2e555", + "uuid": "f5d1d3b9-4ed5-426d-bff0-5f93e782b794", "control-id": "cis_rhel10_1-5.1", "description": "No notes for control-id 1.5.1.", "props": [ @@ -5865,7 +5865,7 @@ ] }, { - "uuid": "56bc9b04-b1bc-4550-b2d7-bffacb9f1649", + "uuid": "150f91b0-4f59-465c-98e6-d9d40ab212ea", "control-id": "cis_rhel10_1-5.2", "description": "No notes for control-id 1.5.2.", "props": [ @@ -5882,7 +5882,7 @@ ] }, { - "uuid": "4ea10553-a1ed-4ac5-a931-81d350ce5921", + "uuid": "95e11ba9-9a8b-4a3a-97ec-0348b76430a0", "control-id": "cis_rhel10_1-5.4", "description": "No notes for control-id 1.5.4.", "props": [ @@ -5899,7 +5899,7 @@ ] }, { - "uuid": "b25361f4-1707-445b-b07f-2806eecef6a4", + "uuid": "837ccd37-58cb-43fe-b02a-e2ca015644b9", "control-id": "cis_rhel10_1-5.5", "description": "No notes for control-id 1.5.5.", "props": [ @@ -5916,7 +5916,7 @@ ] }, { - "uuid": "8fd5a661-d150-4449-b2d0-4249771bfb54", + "uuid": "750c29c8-c1c3-473f-9efb-860188d85f21", "control-id": "cis_rhel10_1-5.6", "description": "No notes for control-id 1.5.6.", "props": [ @@ -5933,7 +5933,7 @@ ] }, { - "uuid": "a81d32e2-7317-49f9-bbc7-b1a50a3ae612", + "uuid": "864a5e3d-76a3-4964-9642-8ab4e9284fba", "control-id": "cis_rhel10_1-5.7", "description": "No notes for control-id 1.5.7.", "props": [ @@ -5950,7 +5950,7 @@ ] }, { - "uuid": "39076e5c-b03c-409d-9cf2-0fa55320c59a", + "uuid": "3a3dd4f4-b01b-406e-a1ee-d0f05624e340", "control-id": "cis_rhel10_1-5.8", "description": "Address Space Layout Randomization (ASLR)", "props": [ @@ -5967,7 +5967,7 @@ ] }, { - "uuid": "fa14e101-ed45-4a68-8136-d2c7e1e31344", + "uuid": "1b899a6d-7626-4af3-8faa-629df7de5f3c", "control-id": "cis_rhel10_1-5.9", "description": "No notes for control-id 1.5.9.", "props": [ @@ -5984,7 +5984,7 @@ ] }, { - "uuid": "0fafdb4b-1692-4777-98e0-1a13574d8371", + "uuid": "469be95d-eaa4-4687-9456-baf1710e5eef", "control-id": "cis_rhel10_1-5.10", "description": "No notes for control-id 1.5.10.", "props": [ @@ -6001,7 +6001,7 @@ ] }, { - "uuid": "c21b3244-092e-4914-bd43-1116937878e6", + "uuid": "69198e9e-0131-4be5-9435-3bdcc5b22648", "control-id": "cis_rhel10_1-6.1", "description": "No notes for control-id 1.6.1.", "props": [ @@ -6018,7 +6018,7 @@ ] }, { - "uuid": "20f2ece5-1984-496f-bbea-78412eab19ea", + "uuid": "d9838986-b4bd-4f8a-8cda-8cadcd4b1bd0", "control-id": "cis_rhel10_1-6.2", "description": "No notes for control-id 1.6.2.", "props": [ @@ -6035,7 +6035,7 @@ ] }, { - "uuid": "08a5f775-94fd-497b-9bda-4ff5e3415945", + "uuid": "693900ce-e02f-462d-9920-b4d16a75f0ba", "control-id": "cis_rhel10_1-6.3", "description": "No notes for control-id 1.6.3.", "props": [ @@ -6052,7 +6052,7 @@ ] }, { - "uuid": "ff4dd3f2-b88a-4f76-8f24-2127f17b943e", + "uuid": "57b2c8e3-a852-4604-9315-9e177626f12d", "control-id": "cis_rhel10_1-6.4", "description": "No notes for control-id 1.6.4.", "props": [ @@ -6069,7 +6069,7 @@ ] }, { - "uuid": "a56c78c7-5492-4709-b43a-fcd6c57b8130", + "uuid": "09c5560b-73c4-4430-ab9e-95a80251b5c4", "control-id": "cis_rhel10_1-7.1", "description": "No notes for control-id 1.7.1.", "props": [ @@ -6086,7 +6086,7 @@ ] }, { - "uuid": "e29afa07-ea3a-4ce9-b174-9ef1a98551fd", + "uuid": "0090fa9b-40ac-4b80-af50-0796dcee9d38", "control-id": "cis_rhel10_1-7.2", "description": "No notes for control-id 1.7.2.", "props": [ @@ -6103,7 +6103,7 @@ ] }, { - "uuid": "47f7165c-7ec1-46f3-8448-62d921da8635", + "uuid": "9e66e776-e43d-4d96-b3e8-4908f6ff2ab2", "control-id": "cis_rhel10_1-7.3", "description": "No notes for control-id 1.7.3.", "props": [ @@ -6120,7 +6120,7 @@ ] }, { - "uuid": "ec6094f3-5767-4f4f-8764-c41e8778e3ea", + "uuid": "d316c7bc-df08-48dd-84c7-3cc09622350d", "control-id": "cis_rhel10_1-7.4", "description": "No notes for control-id 1.7.4.", "props": [ @@ -6147,7 +6147,7 @@ ] }, { - "uuid": "eedf800a-c95b-4097-b825-c7cfd4eaba23", + "uuid": "3a1460ea-f103-4e80-a72f-e373c0e0ec37", "control-id": "cis_rhel10_1-7.5", "description": "No notes for control-id 1.7.5.", "props": [ @@ -6174,7 +6174,7 @@ ] }, { - "uuid": "db413a7a-9047-4a1e-a13b-5e01c9d281fe", + "uuid": "64d97c56-767d-4d54-af70-e0f7c75bd156", "control-id": "cis_rhel10_1-7.6", "description": "No notes for control-id 1.7.6.", "props": [ @@ -6201,7 +6201,7 @@ ] }, { - "uuid": "d48c64cc-64c4-46c7-8f0c-2140172fc8b3", + "uuid": "dae48f23-e189-4dcb-a012-3d02ebd88abc", "control-id": "cis_rhel10_1-8.1", "description": "No notes for control-id 1.8.1.", "props": [ @@ -6223,7 +6223,7 @@ ] }, { - "uuid": "c0c2047a-ae7d-49e7-a795-62b62ebc9235", + "uuid": "6192bf9a-a3d5-4d71-a75b-ae44041998d6", "control-id": "cis_rhel10_1-8.2", "description": "No notes for control-id 1.8.2.", "props": [ @@ -6240,7 +6240,7 @@ ] }, { - "uuid": "9e6cde23-82f7-4ce7-a491-edefba210ee3", + "uuid": "a9043180-be84-46b0-b951-cdab361439c0", "control-id": "cis_rhel10_1-8.3", "description": "No notes for control-id 1.8.3.", "props": [ @@ -6272,7 +6272,7 @@ ] }, { - "uuid": "60abe28f-0bf7-4e65-ad01-fb7115a44088", + "uuid": "8d1773d9-3166-4ecd-b557-e19ccb49d5af", "control-id": "cis_rhel10_1-8.5", "description": "No notes for control-id 1.8.5.", "props": [ @@ -6289,7 +6289,7 @@ ] }, { - "uuid": "7ee5f706-373d-40f9-94c1-e63db319e5de", + "uuid": "a5079e84-3610-4575-b885-02680317c513", "control-id": "cis_rhel10_2-1.4", "description": "No notes for control-id 2.1.4.", "props": [ @@ -6306,7 +6306,7 @@ ] }, { - "uuid": "772b0fd2-fbfe-4d4c-a3cd-0ac8d0965952", + "uuid": "3650d56f-5cdb-4a81-b366-928267495995", "control-id": "cis_rhel10_2-1.5", "description": "No notes for control-id 2.1.5.", "props": [ @@ -6323,7 +6323,7 @@ ] }, { - "uuid": "d72ea8ff-e47e-4785-8fa1-87d8b1e2b076", + "uuid": "265e6d3b-7bef-4282-ad5e-bdc3653ce294", "control-id": "cis_rhel10_2-1.6", "description": "No notes for control-id 2.1.6.", "props": [ @@ -6340,7 +6340,7 @@ ] }, { - "uuid": "45d2ba70-2b58-41f1-a910-d028cb6f7df8", + "uuid": "281df587-bcff-4294-95e6-04bdf38f3463", "control-id": "cis_rhel10_2-1.7", "description": "No notes for control-id 2.1.7.", "props": [ @@ -6357,7 +6357,7 @@ ] }, { - "uuid": "d81862b0-bc52-44a3-a488-2cdb31085b57", + "uuid": "a92334ee-b535-48d0-ab38-92d9817fee11", "control-id": "cis_rhel10_2-1.8", "description": "No notes for control-id 2.1.8.", "props": [ @@ -6379,7 +6379,7 @@ ] }, { - "uuid": "71a7a28b-5743-4a81-9f70-763daae26821", + "uuid": "fa76e796-b331-46f3-bd58-3008f959edb9", "control-id": "cis_rhel10_2-1.9", "description": "Many of the libvirt packages used by Enterprise Linux virtualization are dependent on the\nnfs-utils package.", "props": [ @@ -6396,7 +6396,7 @@ ] }, { - "uuid": "ad758ddc-52ce-4a79-8937-107ab6ae9f24", + "uuid": "8128e671-a612-4007-b207-c27228fc3f48", "control-id": "cis_rhel10_2-1.11", "description": "Many of the libvirt packages used by Enterprise Linux virtualization, and the nfs-utils\npackage used for The Network File System (NFS), are dependent on the rpcbind package.", "props": [ @@ -6413,7 +6413,7 @@ ] }, { - "uuid": "1fb28f7d-55ed-4ae8-89fe-98a99688c02d", + "uuid": "8cb70d97-3d9b-4731-9506-034636334f54", "control-id": "cis_rhel10_2-1.12", "description": "No notes for control-id 2.1.12.", "props": [ @@ -6430,7 +6430,7 @@ ] }, { - "uuid": "1e06fca1-788a-4600-af3f-bbc560347e55", + "uuid": "ed00fac7-8b80-4ba7-b710-13d60018a954", "control-id": "cis_rhel10_2-1.13", "description": "No notes for control-id 2.1.13.", "props": [ @@ -6447,7 +6447,7 @@ ] }, { - "uuid": "bf02a792-cc9c-4046-ab96-fae0938b0697", + "uuid": "ea6eee82-9def-4d14-87a7-c88f3e7a3423", "control-id": "cis_rhel10_2-1.14", "description": "No notes for control-id 2.1.14.", "props": [ @@ -6464,7 +6464,7 @@ ] }, { - "uuid": "c5186875-5609-47a6-9278-a6975b999cc0", + "uuid": "655d8951-c890-4d4e-9d5f-e95b8ccb413e", "control-id": "cis_rhel10_2-1.15", "description": "No notes for control-id 2.1.15.", "props": [ @@ -6481,7 +6481,7 @@ ] }, { - "uuid": "0427f7fa-8105-4b46-9da7-cc758b8192d2", + "uuid": "18c6aa46-238f-4836-a415-c9106876be6d", "control-id": "cis_rhel10_2-1.16", "description": "No notes for control-id 2.1.16.", "props": [ @@ -6498,7 +6498,7 @@ ] }, { - "uuid": "5ea25a22-8da4-4668-b765-b3de2ccf6388", + "uuid": "033241b6-647c-41ad-843c-40b7d1b2ed6b", "control-id": "cis_rhel10_2-1.17", "description": "No notes for control-id 2.1.17.", "props": [ @@ -6515,7 +6515,7 @@ ] }, { - "uuid": "cbe18da4-3b1f-4f62-af35-791a47c3be1a", + "uuid": "04d99192-d54c-4d67-848e-8e0474b26c47", "control-id": "cis_rhel10_2-1.18", "description": "No notes for control-id 2.1.18.", "props": [ @@ -6537,7 +6537,7 @@ ] }, { - "uuid": "d684fbf4-67f4-4ffe-aa05-c7979d2cc07f", + "uuid": "9a38a9ab-3db8-4214-8e14-ab6b9e6e830c", "control-id": "cis_rhel10_2-1.21", "description": "No notes for control-id 2.1.21.", "props": [ @@ -6559,7 +6559,7 @@ ] }, { - "uuid": "a66d40a1-4f58-4fc0-84f6-d0f3a69e2c8a", + "uuid": "f5ef1639-0d4d-4a96-b77b-9bb5f078b3f1", "control-id": "cis_rhel10_2-1.22", "description": "The description for control-id cis_rhel10_2-1.22.", "props": [ @@ -6572,7 +6572,7 @@ ] }, { - "uuid": "b67dabdf-afa3-45e9-a469-3d546d3520e6", + "uuid": "86beac66-73fd-428f-9d58-e4c627287f5c", "control-id": "cis_rhel10_2-2.1", "description": "No notes for control-id 2.2.1.", "props": [ @@ -6589,7 +6589,7 @@ ] }, { - "uuid": "49e79094-7dd5-4353-85de-b76fc40f2b3b", + "uuid": "6257d647-ec01-4e01-b3a5-165895d52b1f", "control-id": "cis_rhel10_2-2.3", "description": "No notes for control-id 2.2.3.", "props": [ @@ -6606,7 +6606,7 @@ ] }, { - "uuid": "7d4363e7-9e9f-4fdd-a2ac-e689c824bd4a", + "uuid": "f9c435f4-6469-4bbf-abe6-7ca27331ba4c", "control-id": "cis_rhel10_2-2.4", "description": "No notes for control-id 2.2.4.", "props": [ @@ -6623,7 +6623,7 @@ ] }, { - "uuid": "0ab85355-1282-496b-b5cf-1ce7f7fae105", + "uuid": "9a2192a3-5d9b-4026-ad22-41148e938503", "control-id": "cis_rhel10_2-3.1", "description": "No notes for control-id 2.3.1.", "props": [ @@ -6635,7 +6635,7 @@ ] }, { - "uuid": "ea90c118-52f1-45b4-a29d-fd2e44492a40", + "uuid": "daaef24a-4e67-4533-b92e-5605bd4bd121", "control-id": "cis_rhel10_2-3.2", "description": "No notes for control-id 2.3.2.", "props": [ @@ -6652,7 +6652,7 @@ ] }, { - "uuid": "d9e41fdb-21f6-43f4-a065-0ac2a0ee216f", + "uuid": "cbaed93b-d133-4f24-8c57-c79692171960", "control-id": "cis_rhel10_2-3.3", "description": "No notes for control-id 2.3.3.", "props": [ @@ -6669,7 +6669,7 @@ ] }, { - "uuid": "53bdf171-6d53-4d53-9794-77f8180d07e5", + "uuid": "f5e4e4e4-6f83-4467-b080-d926cacb6922", "control-id": "cis_rhel10_2-4.1.1", "description": "No notes for control-id 2.4.1.1.", "props": [ @@ -6691,7 +6691,7 @@ ] }, { - "uuid": "b64c8d1e-d7e3-40b5-93f2-0ad3a536b840", + "uuid": "aeb6e4be-fabc-42fb-aee1-b00173d80153", "control-id": "cis_rhel10_2-4.1.2", "description": "No notes for control-id 2.4.1.2.", "props": [ @@ -6718,7 +6718,7 @@ ] }, { - "uuid": "3ccef414-b964-401a-b0df-f46ab41ca33b", + "uuid": "8bc3cd81-a312-46ed-ace1-bd0de62363d0", "control-id": "cis_rhel10_2-4.1.3", "description": "No notes for control-id 2.4.1.3.", "props": [ @@ -6745,7 +6745,7 @@ ] }, { - "uuid": "f4d78ba3-ca83-42bc-bf6d-6f0b6b863ba8", + "uuid": "78ded343-350d-434e-b6a5-e56704257a1c", "control-id": "cis_rhel10_2-4.1.4", "description": "No notes for control-id 2.4.1.4.", "props": [ @@ -6772,7 +6772,7 @@ ] }, { - "uuid": "ae52b6ab-f532-4092-a043-72109ac6ab23", + "uuid": "41d410d8-07b1-4080-b8f5-7dcad910bcbb", "control-id": "cis_rhel10_2-4.1.5", "description": "No notes for control-id 2.4.1.5.", "props": [ @@ -6799,7 +6799,7 @@ ] }, { - "uuid": "55f0e4ae-7fde-45cb-b69c-e8ecf70b1467", + "uuid": "fe0d86c8-722d-4d42-8f61-d1b6f7852f18", "control-id": "cis_rhel10_2-4.1.6", "description": "No notes for control-id 2.4.1.6.", "props": [ @@ -6826,7 +6826,7 @@ ] }, { - "uuid": "a7735eb8-a39f-4f7f-a554-94a89c2e6cfa", + "uuid": "94fcd369-0a62-420c-ace9-d4ec6fcc238b", "control-id": "cis_rhel10_2-4.1.7", "description": "No notes for control-id 2.4.1.7.", "props": [ @@ -6853,7 +6853,7 @@ ] }, { - "uuid": "be58af0a-8645-4fe0-a50b-40ac65a0d1a1", + "uuid": "eb5f1bfd-92f7-4625-997d-55c27bd13e7d", "control-id": "cis_rhel10_2-4.1.8", "description": "No notes for control-id 2.4.1.8.", "props": [ @@ -6880,7 +6880,7 @@ ] }, { - "uuid": "94b1ae73-0c57-435d-af60-44289b45d1d8", + "uuid": "662d508a-9a4a-4032-b110-8f2e17d8e978", "control-id": "cis_rhel10_2-4.1.9", "description": "No notes for control-id 2.4.1.9.", "props": [ @@ -6917,7 +6917,7 @@ ] }, { - "uuid": "b58b995e-427f-4f74-ac43-61c3f5e1b12f", + "uuid": "084bb709-d4e2-4656-9e31-49cf2a161d30", "control-id": "cis_rhel10_2-4.2.1", "description": "No notes for control-id 2.4.2.1.", "props": [ @@ -6954,7 +6954,7 @@ ] }, { - "uuid": "64ac4d40-2aa0-44e5-be24-27a8cb230de1", + "uuid": "3defa44b-2458-4b48-b73a-3f65e081af43", "control-id": "cis_rhel10_3-1.1", "description": "The description for control-id cis_rhel10_3-1.1.", "props": [ @@ -6967,7 +6967,7 @@ ] }, { - "uuid": "089bbfd9-c08c-40c4-aaa0-9cfb4c53a581", + "uuid": "92016b32-2493-4f66-93aa-dcc3d20366ad", "control-id": "cis_rhel10_3-2.1", "description": "No notes for control-id 3.2.1.", "props": [ @@ -6984,7 +6984,7 @@ ] }, { - "uuid": "d4e519d0-af7d-4e18-a5f0-ed61107999c0", + "uuid": "35629d72-be88-4643-b966-5fd5342149af", "control-id": "cis_rhel10_3-2.2", "description": "No notes for control-id 3.2.2.", "props": [ @@ -7001,7 +7001,7 @@ ] }, { - "uuid": "969cabd7-4d32-4669-b739-88eb58ad0b1d", + "uuid": "7dbab098-f782-4c2c-a20a-84f16ef709b6", "control-id": "cis_rhel10_3-2.3", "description": "No notes for control-id 3.2.3.", "props": [ @@ -7018,7 +7018,7 @@ ] }, { - "uuid": "d0302680-dbdf-4700-b573-f9f728874215", + "uuid": "97d7c8fc-e9b6-4dbd-bbb3-942e4871c165", "control-id": "cis_rhel10_3-2.4", "description": "No notes for control-id 3.2.4.", "props": [ @@ -7035,7 +7035,7 @@ ] }, { - "uuid": "29b7049c-ec6c-4f0a-8a44-dfaa28dd5657", + "uuid": "37c08f01-7267-417c-8aee-30320c8f4e71", "control-id": "cis_rhel10_3-2.5", "description": "No notes for control-id 3.2.5.", "props": [ @@ -7052,7 +7052,7 @@ ] }, { - "uuid": "fa063f6b-e4f7-49a0-b1c3-76b1d56235a9", + "uuid": "efb92464-f4b8-4577-923c-b1ddf8c3f45c", "control-id": "cis_rhel10_3-2.6", "description": "No notes for control-id 3.2.6.", "props": [ @@ -7069,7 +7069,7 @@ ] }, { - "uuid": "0318ab80-9d85-4ec7-9be1-8da7de41181e", + "uuid": "25eaa037-9e07-4a04-968a-1e23cf701915", "control-id": "cis_rhel10_3-3.1.1", "description": "No notes for control-id 3.3.1.1.", "props": [ @@ -7086,7 +7086,7 @@ ] }, { - "uuid": "4f5a1daf-5309-43f3-82dc-886eb7362fa6", + "uuid": "1c9efc39-3f62-4bb0-a767-0520034bad56", "control-id": "cis_rhel10_3-3.1.2", "description": "No notes for control-id 3.3.1.2.", "props": [ @@ -7103,7 +7103,7 @@ ] }, { - "uuid": "a8993be7-a4f6-4182-971e-21db6dfc3fcd", + "uuid": "cff7efa2-b281-4328-af28-59d9688ba3c5", "control-id": "cis_rhel10_3-3.1.3", "description": "No notes for control-id 3.3.1.3.", "props": [ @@ -7120,7 +7120,7 @@ ] }, { - "uuid": "aafc92f4-0e58-48bd-bfd3-17ee597b47d0", + "uuid": "b9b29d8d-953e-4427-82be-2144f2945e72", "control-id": "cis_rhel10_3-3.1.4", "description": "No notes for control-id 3.3.1.4.", "props": [ @@ -7137,7 +7137,7 @@ ] }, { - "uuid": "87fab19d-d4c1-4c49-8647-4d65a54f5dad", + "uuid": "a1805fb9-7b7b-4b4e-88da-54f8375a9d74", "control-id": "cis_rhel10_3-3.1.5", "description": "No notes for control-id 3.3.1.5.", "props": [ @@ -7154,7 +7154,7 @@ ] }, { - "uuid": "ddc3a71f-3d02-4b89-8c40-1aae9e0a7c7e", + "uuid": "1c11e147-52dd-4f37-ac91-da843cbaa6a9", "control-id": "cis_rhel10_3-3.1.6", "description": "No notes for control-id 3.3.1.6.", "props": [ @@ -7171,7 +7171,7 @@ ] }, { - "uuid": "c0b775b2-bc7e-4448-a206-2c1e2891c819", + "uuid": "a1e587d9-8ffa-4d6e-bc67-ec3b5007bfea", "control-id": "cis_rhel10_3-3.1.7", "description": "No notes for control-id 3.3.1.7.", "props": [ @@ -7188,7 +7188,7 @@ ] }, { - "uuid": "6e1700a6-3214-419d-82fa-c75247d508f9", + "uuid": "4b2f8ab1-ee3a-4137-8eb2-02de325102eb", "control-id": "cis_rhel10_3-3.1.8", "description": "No notes for control-id 3.3.1.8.", "props": [ @@ -7205,7 +7205,7 @@ ] }, { - "uuid": "e3b8c8a3-7cd4-4390-9d72-b54e7fd21243", + "uuid": "a92bf683-788f-4874-b041-2c0e54fc7889", "control-id": "cis_rhel10_3-3.1.9", "description": "No notes for control-id 3.3.1.9.", "props": [ @@ -7222,7 +7222,7 @@ ] }, { - "uuid": "8002f4b8-9bcd-40ca-9bfb-7ac2fa23757f", + "uuid": "20d82643-184b-4964-ad43-9631298308e6", "control-id": "cis_rhel10_3-3.1.10", "description": "No notes for control-id 3.3.1.10.", "props": [ @@ -7239,7 +7239,7 @@ ] }, { - "uuid": "28176ae2-76b8-45da-b4ac-04dfd212cb50", + "uuid": "418a7273-57ea-4f46-b44d-6f5e295be75d", "control-id": "cis_rhel10_3-3.1.11", "description": "No notes for control-id 3.3.1.11.", "props": [ @@ -7256,7 +7256,7 @@ ] }, { - "uuid": "340912ee-0da2-4720-a354-1a58203e7f5d", + "uuid": "2cdb59bf-cea2-45c4-9a6d-8c0946c675a6", "control-id": "cis_rhel10_3-3.1.12", "description": "No notes for control-id 3.3.1.12.", "props": [ @@ -7273,7 +7273,7 @@ ] }, { - "uuid": "7a3de473-9883-4101-bbce-dfa3d496f843", + "uuid": "37b4a0fb-dca4-4654-800f-c4e98d2817e6", "control-id": "cis_rhel10_3-3.1.13", "description": "No notes for control-id 3.3.1.13.", "props": [ @@ -7290,7 +7290,7 @@ ] }, { - "uuid": "2aa1fa53-5ff7-4593-8659-b5846f94f18b", + "uuid": "2798f1f1-1d87-49eb-ab2e-6740e5968595", "control-id": "cis_rhel10_3-3.1.14", "description": "No notes for control-id 3.3.1.14.", "props": [ @@ -7307,7 +7307,7 @@ ] }, { - "uuid": "405f87df-3c2b-4a36-978b-b04436d644a5", + "uuid": "c8c5c3fb-4a99-4f9e-9f49-b8b686b93810", "control-id": "cis_rhel10_3-3.1.15", "description": "No notes for control-id 3.3.1.15.", "props": [ @@ -7324,7 +7324,7 @@ ] }, { - "uuid": "a95ccd1f-8812-4209-8649-e5fbda304a2d", + "uuid": "97461dca-c98d-4ab1-9b05-4f1279999858", "control-id": "cis_rhel10_3-3.1.16", "description": "No notes for control-id 3.3.1.16.", "props": [ @@ -7341,7 +7341,7 @@ ] }, { - "uuid": "84c929c1-7e4c-4662-8e69-c1cfbf45ae29", + "uuid": "54253eda-99c2-4154-96b4-8209e75b7a90", "control-id": "cis_rhel10_3-3.1.17", "description": "No notes for control-id 3.3.1.17.", "props": [ @@ -7358,7 +7358,7 @@ ] }, { - "uuid": "d9d2db6a-7602-4d3c-8ab7-6ebb2a0bdce3", + "uuid": "fa6cb605-e505-4bf2-bbf3-7cd7491c7217", "control-id": "cis_rhel10_3-3.1.18", "description": "No notes for control-id 3.3.1.18.", "props": [ @@ -7375,7 +7375,7 @@ ] }, { - "uuid": "99dad840-8958-4185-a138-45f8cb903430", + "uuid": "5f5c05e0-a50a-4d1a-bc03-0e9f6f7170ce", "control-id": "cis_rhel10_3-3.2.1", "description": "No notes for control-id 3.3.2.1.", "props": [ @@ -7392,7 +7392,7 @@ ] }, { - "uuid": "a81b9f38-3102-4aef-b7de-a9a2fc6a6438", + "uuid": "0253ec42-fbcd-4cb2-ace3-c375884acfe0", "control-id": "cis_rhel10_3-3.2.2", "description": "No notes for control-id 3.3.2.2.", "props": [ @@ -7409,7 +7409,7 @@ ] }, { - "uuid": "43882fe5-874b-4bfc-b749-7c835c752a4a", + "uuid": "b18973d4-3476-4155-8a41-07de21bcf1ed", "control-id": "cis_rhel10_3-3.2.3", "description": "No notes for control-id 3.3.2.3.", "props": [ @@ -7426,7 +7426,7 @@ ] }, { - "uuid": "4e41f7b7-bb6e-4b8e-b459-51d65ef16dab", + "uuid": "c5e75b61-da94-4032-9f8c-ba9a9af57046", "control-id": "cis_rhel10_3-3.2.4", "description": "No notes for control-id 3.3.2.4.", "props": [ @@ -7443,7 +7443,7 @@ ] }, { - "uuid": "d660b3c2-c139-407e-91e0-90531d4cc623", + "uuid": "1511892b-5ed1-4998-93d4-4c867f6906f7", "control-id": "cis_rhel10_3-3.2.5", "description": "No notes for control-id 3.3.2.5.", "props": [ @@ -7460,7 +7460,7 @@ ] }, { - "uuid": "733c2500-a255-4c49-9a16-7e8f4f8167e7", + "uuid": "86b4f878-3d9c-4c72-b028-a27369adf2c8", "control-id": "cis_rhel10_3-3.2.6", "description": "No notes for control-id 3.3.2.6.", "props": [ @@ -7477,7 +7477,7 @@ ] }, { - "uuid": "3ab5bf1f-eb1b-44ce-8afe-ed6f80ad8ecf", + "uuid": "2c2da550-f3a5-44a6-bf46-729ed6b1bf66", "control-id": "cis_rhel10_3-3.2.7", "description": "No notes for control-id 3.3.2.7.", "props": [ @@ -7494,7 +7494,7 @@ ] }, { - "uuid": "65848952-b31f-4a10-a408-129d1f904f7a", + "uuid": "7d44c3b9-b1e5-4ae9-a83a-1a21043b331c", "control-id": "cis_rhel10_3-3.2.8", "description": "No notes for control-id 3.3.2.8.", "props": [ @@ -7511,7 +7511,7 @@ ] }, { - "uuid": "e960287e-c076-42d2-9c2d-846c4d9e488e", + "uuid": "7b2b4146-ce6b-4d26-ad41-9f51aa590058", "control-id": "cis_rhel10_4-1.1", "description": "No notes for control-id 4.1.1.", "props": [ @@ -7528,7 +7528,7 @@ ] }, { - "uuid": "8a27595c-d58a-46e3-98c2-c715b9a3143a", + "uuid": "66945764-2086-48b5-91f5-680626ec1ed1", "control-id": "cis_rhel10_4-1.2", "description": "No notes for control-id 4.1.2.", "props": [ @@ -7545,7 +7545,7 @@ ] }, { - "uuid": "3720244a-20c4-4684-b198-13dc85fd862d", + "uuid": "903ffd8e-667c-4317-a919-e3add1a1e059", "control-id": "cis_rhel10_4-1.3", "description": "No notes for control-id 4.1.3.", "props": [ @@ -7562,7 +7562,7 @@ ] }, { - "uuid": "92688ae5-b5af-4ba5-af62-11f3e0173105", + "uuid": "adf38a8f-d898-4516-b995-0aa6dc18590e", "control-id": "cis_rhel10_4-1.4", "description": "The description for control-id cis_rhel10_4-1.4.", "props": [ @@ -7570,12 +7570,12 @@ "name": "implementation-status", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "alternative", - "remarks": "No notes for control-id 4.1.4." + "remarks": "There is not an easy way to do this for only active zones using OVAL.\nFor now, there are are no rules for this control." } ] }, { - "uuid": "1cc6be8b-0fa7-4c12-9e06-1d0f64cfa573", + "uuid": "2d865a0f-a2da-4f5d-9165-bb72aed13513", "control-id": "cis_rhel10_4-1.5", "description": "Firewalld in Red Hat Enterprise Linux 10 accepts loopback traffic by default.", "props": [ @@ -7592,7 +7592,7 @@ ] }, { - "uuid": "27d9653a-106e-45d8-be77-b324fb3953ef", + "uuid": "52583cc6-c391-4c8f-bdc4-15e1517a52af", "control-id": "cis_rhel10_4-1.6", "description": "The description for control-id cis_rhel10_4-1.6.", "props": [ @@ -7605,7 +7605,7 @@ ] }, { - "uuid": "6eac22c9-9885-44f9-b058-b29f91b0c62e", + "uuid": "cb6541a5-213d-4bea-95b7-cb3e2dd9f5a2", "control-id": "cis_rhel10_4-1.7", "description": "The description for control-id cis_rhel10_4-1.7.", "props": [ @@ -7618,7 +7618,7 @@ ] }, { - "uuid": "44800ea3-0121-496a-920c-ff505fbf1111", + "uuid": "2219e9c8-9be5-4bef-ad94-748b4fe55920", "control-id": "cis_rhel10_5-1.1", "description": "No notes for control-id 5.1.1.", "props": [ @@ -7675,7 +7675,7 @@ ] }, { - "uuid": "5f4ae7a4-d19d-4b73-b19c-fb686ccd6dfe", + "uuid": "81883721-036e-436b-9b05-adb3ca394a28", "control-id": "cis_rhel10_5-1.2", "description": "No notes for control-id 5.1.2.", "props": [ @@ -7702,7 +7702,7 @@ ] }, { - "uuid": "5a0bc3d9-3551-4370-9d6f-ad489a3b0726", + "uuid": "576100bf-4c68-4a94-8908-a2d2606cbabb", "control-id": "cis_rhel10_5-1.3", "description": "No notes for control-id 5.1.3.", "props": [ @@ -7729,7 +7729,7 @@ ] }, { - "uuid": "96a4f4be-f1a9-426f-80fe-aa18a284a1be", + "uuid": "10608536-a0bc-4f3d-a7bb-fccf8be233f5", "control-id": "cis_rhel10_5-1.4", "description": "No notes for control-id 5.1.4.", "props": [ @@ -7746,7 +7746,7 @@ ] }, { - "uuid": "989b6a64-3fc4-46b4-a3db-e603ab1f0d57", + "uuid": "83fb981c-74dd-43b3-a5a3-f4a7f264cbff", "control-id": "cis_rhel10_5-1.5", "description": "No notes for control-id 5.1.5.", "props": [ @@ -7763,7 +7763,7 @@ ] }, { - "uuid": "4aea6544-7fa7-4546-bd11-bf7a69ab6c8f", + "uuid": "c13b7b6a-30fc-440c-9b35-4d9b5832f9d9", "control-id": "cis_rhel10_5-1.6", "description": "No notes for control-id 5.1.6.", "props": [ @@ -7780,7 +7780,7 @@ ] }, { - "uuid": "afaace13-bb66-4913-bbd8-efd2e59a8305", + "uuid": "cee8d752-dafc-47a5-97cc-41938a55a05b", "control-id": "cis_rhel10_5-1.7", "description": "The requirement gives an example of 45 seconds, but is flexible about the values. It is only\nnecessary to ensure there is a timeout configured in alignment to the site policy.", "props": [ @@ -7802,7 +7802,7 @@ ] }, { - "uuid": "9c64e1f3-3459-44e4-8865-9f5678511624", + "uuid": "e203c9c5-bf3f-47c3-bcec-49d9ca74a6a3", "control-id": "cis_rhel10_5-1.8", "description": "No notes for control-id 5.1.8.", "props": [ @@ -7819,7 +7819,7 @@ ] }, { - "uuid": "64f26303-ff2e-402c-ae19-5314a6e501d8", + "uuid": "327262bf-c432-4011-890d-08e6712d3204", "control-id": "cis_rhel10_5-1.9", "description": "No notes for control-id 5.1.9.", "props": [ @@ -7836,7 +7836,7 @@ ] }, { - "uuid": "46260662-90e3-4161-ba54-213a71c37144", + "uuid": "85046a6b-65e4-4d6f-a9a0-309e74339a84", "control-id": "cis_rhel10_5-1.10", "description": "No notes for control-id 5.1.10.", "props": [ @@ -7853,7 +7853,7 @@ ] }, { - "uuid": "53129f50-3cf8-4656-b767-bf25c05feddd", + "uuid": "ea410163-aa82-4fa3-bdfd-372e68c01369", "control-id": "cis_rhel10_5-1.11", "description": "No notes for control-id 5.1.11.", "props": [ @@ -7870,7 +7870,7 @@ ] }, { - "uuid": "63fdf47f-9fd7-4e2a-b4f0-adacbec7751d", + "uuid": "a827dd31-ebb7-4e47-9f8c-f477bbfe0043", "control-id": "cis_rhel10_5-1.12", "description": "The description for control-id cis_rhel10_5-1.12.", "props": [ @@ -7888,7 +7888,7 @@ ] }, { - "uuid": "8b9d81bd-7c04-4c45-850e-4069a7d3c3fa", + "uuid": "bb5a6848-18ed-49e0-b025-dd804b726e3a", "control-id": "cis_rhel10_5-1.13", "description": "No notes for control-id 5.1.13.", "props": [ @@ -7905,7 +7905,7 @@ ] }, { - "uuid": "c729ca9a-cbb6-4b3b-913e-f170951ce26b", + "uuid": "c5cdbcd0-808a-4ba0-961c-7baefba83711", "control-id": "cis_rhel10_5-1.14", "description": "The CIS benchmark is not opinionated about which loglevel is selected here. Here, this\nprofile uses VERBOSE by default, as it allows for the capture of login and logout activity\nas well as key fingerprints.", "props": [ @@ -7922,7 +7922,7 @@ ] }, { - "uuid": "372e2981-f10f-4c5e-bbd9-2c9b287b0fd0", + "uuid": "692bc72f-b74a-4bad-b5f3-5e60ba0b5d0d", "control-id": "cis_rhel10_5-1.15", "description": "No notes for control-id 5.1.15.", "props": [ @@ -7939,7 +7939,7 @@ ] }, { - "uuid": "6f8bdd3d-feec-41ea-8724-6c31465079f1", + "uuid": "42c3d5ca-d871-4c00-aae8-59484bacd335", "control-id": "cis_rhel10_5-1.16", "description": "No notes for control-id 5.1.16.", "props": [ @@ -7956,7 +7956,7 @@ ] }, { - "uuid": "993f9834-ea17-41a9-8593-61db7d75c0c3", + "uuid": "fdd6b1e5-1bba-49e0-aff2-31fd904a7c40", "control-id": "cis_rhel10_5-1.17", "description": "No notes for control-id 5.1.17.", "props": [ @@ -7973,7 +7973,7 @@ ] }, { - "uuid": "0709cc57-f2ed-4cbf-8888-b991490633d8", + "uuid": "21bbd92f-5695-4dbf-bed8-e60277505aff", "control-id": "cis_rhel10_5-1.18", "description": "No notes for control-id 5.1.18.", "props": [ @@ -7990,7 +7990,7 @@ ] }, { - "uuid": "0e8b50c1-9b80-431d-bda6-c8a97c765c93", + "uuid": "7bd9ca60-99a2-480c-84dd-0fe9f624522b", "control-id": "cis_rhel10_5-1.19", "description": "No notes for control-id 5.1.19.", "props": [ @@ -8007,7 +8007,7 @@ ] }, { - "uuid": "305f399a-5af1-44f5-a54a-01db4a7e8071", + "uuid": "11991111-5c59-4eb5-b5ab-3000c6448e83", "control-id": "cis_rhel10_5-1.20", "description": "No notes for control-id 5.1.20.", "props": [ @@ -8024,7 +8024,7 @@ ] }, { - "uuid": "4f467cc8-d014-4e7e-8240-a064ec98bc0e", + "uuid": "70196ca1-8674-4813-90c5-0bcc18afe963", "control-id": "cis_rhel10_5-1.21", "description": "No notes for control-id 5.1.21.", "props": [ @@ -8041,7 +8041,7 @@ ] }, { - "uuid": "c188dc4a-a14f-44f6-ba94-7dde7bbabb3e", + "uuid": "fa1a11de-82c4-4438-b092-368af676367b", "control-id": "cis_rhel10_5-1.22", "description": "No notes for control-id 5.1.22.", "props": [ @@ -8058,7 +8058,7 @@ ] }, { - "uuid": "60baff01-c438-40fd-a0c1-f1bd21567fb0", + "uuid": "ce314eb1-4a84-4505-8b25-5ce03ce4d947", "control-id": "cis_rhel10_5-2.1", "description": "No notes for control-id 5.2.1.", "props": [ @@ -8075,7 +8075,7 @@ ] }, { - "uuid": "7c37a490-f922-4f91-b82c-175a1695a54c", + "uuid": "aa2c0142-812f-4881-99dc-cd501e1d2946", "control-id": "cis_rhel10_5-2.2", "description": "No notes for control-id 5.2.2.", "props": [ @@ -8092,7 +8092,7 @@ ] }, { - "uuid": "3d6d601a-eb61-4452-8611-88304400a54a", + "uuid": "29890b50-02f1-4db1-885c-cc9792e10680", "control-id": "cis_rhel10_5-2.3", "description": "No notes for control-id 5.2.3.", "props": [ @@ -8109,7 +8109,7 @@ ] }, { - "uuid": "2ca04635-5ef8-46b1-917a-88fa71e75e03", + "uuid": "088e7430-03eb-40d5-8bd3-4ab8904e5169", "control-id": "cis_rhel10_5-2.5", "description": "No notes for control-id 5.2.5.", "props": [ @@ -8126,7 +8126,7 @@ ] }, { - "uuid": "9e6e6167-ac1c-46f3-8647-93a9dabafcb0", + "uuid": "83e5a4f9-bb6a-40e8-8453-ca088b0b7e9a", "control-id": "cis_rhel10_5-2.6", "description": "No notes for control-id 5.2.6.", "props": [ @@ -8143,7 +8143,7 @@ ] }, { - "uuid": "f68f4e02-f915-4f27-a17b-c6b1aeb26f02", + "uuid": "d4669426-665f-44ef-a2f0-364464f0f102", "control-id": "cis_rhel10_5-2.7", "description": "Members of \"wheel\" or GID 0 groups are checked by default if the group option is not set for\npam_wheel.so module. The recommendation states the group should be empty to reinforce the\nuse of \"sudo\" for privileged access. Therefore, members of these groups should be manually\nchecked or a different group should be informed.", "props": [ @@ -8165,7 +8165,7 @@ ] }, { - "uuid": "1de9433e-d370-4d80-8828-aefbc59685e6", + "uuid": "8b1071b3-4ac2-4355-b6f2-61f3dc6c1ebc", "control-id": "cis_rhel10_5-3.1.1", "description": "This requirement is hard to be automated without any specific requirement. The policy even\nstates that provided commands are examples, other custom settings might be in place and the\nsettings might be different depending on site policies. The other rules will already make\nsure there is a correct autheselect profile regardless of the existing settings. It is\nnecessary to better discuss with CIS Community.", "props": [ @@ -8177,7 +8177,7 @@ ] }, { - "uuid": "d6186d40-5ece-46c1-a3b3-e6ee6581e22e", + "uuid": "b1a67b61-a6d9-4a97-96db-1bda54e98d6f", "control-id": "cis_rhel10_5-3.1.2", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.1.", "props": [ @@ -8199,7 +8199,7 @@ ] }, { - "uuid": "67ee8beb-d8dc-4c46-a1df-fd87629ce08e", + "uuid": "69691ef7-c2db-41f5-9cf5-a0766548f131", "control-id": "cis_rhel10_5-3.1.3", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.2.", "props": [ @@ -8226,7 +8226,7 @@ ] }, { - "uuid": "ccb13884-e718-44fc-be58-9216d0dc47e3", + "uuid": "e499b0a8-f2e8-4896-807e-d48b60ae4e3f", "control-id": "cis_rhel10_5-3.1.4", "description": "The module is properly enabled by the rules mentioned in related_rules.\nRequirements in 5.3.2.3 use these rules.", "props": [ @@ -8238,7 +8238,7 @@ ] }, { - "uuid": "1c8b02a0-7e09-4f55-ac1d-6da73de9ed09", + "uuid": "a8391b69-c011-47fb-977d-3863b74d2932", "control-id": "cis_rhel10_5-3.1.5", "description": "No notes for control-id 5.3.1.5.", "props": [ @@ -8255,7 +8255,7 @@ ] }, { - "uuid": "c575b8ac-35ce-489f-8340-e64d45f2713d", + "uuid": "0c07dfe1-6a4c-440a-a115-632b6b24b72a", "control-id": "cis_rhel10_5-3.2.1.1", "description": "No notes for control-id 5.3.2.1.1.", "props": [ @@ -8272,7 +8272,7 @@ ] }, { - "uuid": "b71b2654-61ad-4599-a98f-e6d916e5abc2", + "uuid": "9be194fe-c542-4bd7-8d63-84bbe6e611ef", "control-id": "cis_rhel10_5-3.2.1.2", "description": "The policy also accepts value 0, which means the locked accounts should be manually unlocked\nby an administrator. However, it also mentions that using value 0 can facilitate a DoS\nattack to legitimate users.", "props": [ @@ -8289,7 +8289,7 @@ ] }, { - "uuid": "dd52272b-75cf-46ce-aa89-1a1925cdf8bb", + "uuid": "c744cc32-79b6-44b5-abab-8201710c334d", "control-id": "cis_rhel10_5-3.2.2.1", "description": "No notes for control-id 5.3.2.2.1.", "props": [ @@ -8306,7 +8306,7 @@ ] }, { - "uuid": "9dfb8383-2d2f-4707-8d1d-bc66a54f8434", + "uuid": "7b07f998-305d-4638-a5da-bba3d5260869", "control-id": "cis_rhel10_5-3.2.2.2", "description": "No notes for control-id 5.3.2.2.2.", "props": [ @@ -8323,7 +8323,7 @@ ] }, { - "uuid": "eb267708-0176-4027-ae73-d02758475011", + "uuid": "d54c2837-851d-4b18-b20e-f0a8b9299e63", "control-id": "cis_rhel10_5-3.2.2.3", "description": "This requirement is expected to be manual. However, in previous versions of the policy\nit was already automated the configuration of \"minclass\" option. This posture was kept for\nRHEL 10 in this new version. Rules related to other options are informed in related_rules.\nIn short, minclass=4 alone can achieve the same result achieved by the combination of the\nother 4 options mentioned in the policy.", "props": [ @@ -8340,7 +8340,7 @@ ] }, { - "uuid": "c3d02e89-5240-4a00-8ab9-911e4d71a178", + "uuid": "f71f746c-debe-498b-baaf-692a6e45e264", "control-id": "cis_rhel10_5-3.2.2.4", "description": "No notes for control-id 5.3.2.2.4.", "props": [ @@ -8357,7 +8357,7 @@ ] }, { - "uuid": "d648028d-d9a6-4bf1-9442-487ea98dfeec", + "uuid": "37919992-647a-4627-9a5c-7e52c346e4a0", "control-id": "cis_rhel10_5-3.2.2.5", "description": "No notes for control-id 5.3.2.2.5.", "props": [ @@ -8374,7 +8374,7 @@ ] }, { - "uuid": "0b757feb-1102-491a-81d6-a931f872baf6", + "uuid": "7ec82898-6f15-4845-ad7a-5756e9e7b50e", "control-id": "cis_rhel10_5-3.2.2.6", "description": "No notes for control-id 5.3.2.2.6.", "props": [ @@ -8391,7 +8391,7 @@ ] }, { - "uuid": "b5b540fb-0da7-4928-848a-c16ee84ac4e0", + "uuid": "d24d763e-ea64-48b0-a805-385314757fda", "control-id": "cis_rhel10_5-3.2.2.7", "description": "No notes for control-id 5.3.2.2.7.", "props": [ @@ -8408,7 +8408,7 @@ ] }, { - "uuid": "51dbe97b-f05f-4740-b21a-253555f1ebdd", + "uuid": "4905a0bf-4b9d-486b-ab67-1eb2fc2b634f", "control-id": "cis_rhel10_5-3.2.3.1", "description": "Although mentioned in the section 5.3.3.3, there is no explicit requirement to configure\nretry option of pam_pwhistory. If come in the future, the rule accounts_password_pam_retry\ncan be used.", "props": [ @@ -8430,7 +8430,7 @@ ] }, { - "uuid": "06747217-8a36-4069-b3b3-5adf9d6f6783", + "uuid": "21dff016-f1a3-433e-a64f-5e31327e59a9", "control-id": "cis_rhel10_5-3.2.3.2", "description": "No notes for control-id 5.3.2.3.2.", "props": [ @@ -8447,7 +8447,7 @@ ] }, { - "uuid": "f8077494-3b19-4f88-910f-6fc8d59514fb", + "uuid": "ee680ffc-0054-48ce-8d33-c1d4a8e5fdab", "control-id": "cis_rhel10_5-3.2.3.3", "description": "In RHEL 10 pam_pwhistory is enabled via authselect feature, as required in 5.3.1.4. The\nfeature automatically set \"use_authok\" option. In any case, we don't have a rule to check\nthis option specifically.", "props": [ @@ -8464,7 +8464,7 @@ ] }, { - "uuid": "c2f6d536-6fc3-46fb-9b5a-af79fb32571e", + "uuid": "51ed6157-1d89-4835-9bdf-2c539a771796", "control-id": "cis_rhel10_5-3.2.4.1", "description": "The rule more specifically used in this requirement also satify the requirement 5.3.1.5.", "props": [ @@ -8481,7 +8481,7 @@ ] }, { - "uuid": "71b8388b-73a0-49a7-9466-9d2eeaaa8a23", + "uuid": "f9e9fb8e-1fbd-4864-b0f5-f94fa716e67d", "control-id": "cis_rhel10_5-3.2.4.2", "description": "Usage of pam_unix.so module together with \"remember\" option is deprecated and is not\nrecommended by this policy. Instead, it should be used remember option of pam_pwhistory\nmodule, as required in 5.3.2.3.1. See here for more details about pam_unix.so:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1778929", "props": [ @@ -8498,7 +8498,7 @@ ] }, { - "uuid": "b89a9a2b-e169-42cb-aeee-ed2707b39737", + "uuid": "2b7cc86e-45d0-4bb1-a8ef-7e7bef6db2af", "control-id": "cis_rhel10_5-3.2.4.3", "description": "Changes in logindefs mentioned in this requirement are more specifically covered by 5.4.1.4", "props": [ @@ -8520,7 +8520,7 @@ ] }, { - "uuid": "af8af702-c388-42ea-b861-8b77c75d0590", + "uuid": "4e5296da-293b-4530-bfa3-9a4e67e13dc4", "control-id": "cis_rhel10_5-3.2.4.4", "description": "In RHEL 10 pam_unix is enabled by default in all authselect profiles already with the\nuse_authtok option set. In any case, we don't have a rule to check this option specifically,\nlike in 5.3.2.3.3.", "props": [ @@ -8537,7 +8537,7 @@ ] }, { - "uuid": "5464d4f7-08e8-48bb-a19e-b1a5e3ea0ce5", + "uuid": "6457d5cb-1d2b-4711-b05d-ab5dfff5ec8e", "control-id": "cis_rhel10_5-4.1.1", "description": "No notes for control-id 5.4.1.1.", "props": [ @@ -8559,7 +8559,7 @@ ] }, { - "uuid": "4a6eacd2-e9e0-48ee-94a2-5c646ce21622", + "uuid": "438db027-e785-4b91-8f67-4193ddbbcdce", "control-id": "cis_rhel10_5-4.1.3", "description": "No notes for control-id 5.4.1.3.", "props": [ @@ -8581,7 +8581,7 @@ ] }, { - "uuid": "9d0fc62a-a610-4575-a3ac-f7ac54ee417d", + "uuid": "e926e69b-19ba-4373-9858-4e16d9c73850", "control-id": "cis_rhel10_5-4.1.4", "description": "There's a \"new\" set of options in /etc/login.defs file to define the number of iterations\nperformed during the hashing process.", "props": [ @@ -8603,7 +8603,7 @@ ] }, { - "uuid": "61fb2beb-04fa-4cb7-b893-45c0717b63bc", + "uuid": "efb53747-9fcb-428d-8bab-44ce2453a274", "control-id": "cis_rhel10_5-4.1.5", "description": "No notes for control-id 5.4.1.5.", "props": [ @@ -8625,7 +8625,7 @@ ] }, { - "uuid": "862532d9-e236-40c8-b5af-0b77201632ea", + "uuid": "ff6788a5-5098-45d0-95e3-eeee957980fc", "control-id": "cis_rhel10_5-4.1.6", "description": "No notes for control-id 5.4.1.6.", "props": [ @@ -8642,7 +8642,7 @@ ] }, { - "uuid": "daa5dfa5-389d-469a-9469-cb65d4e5accd", + "uuid": "5de0b308-307f-4510-8332-68895d4a76de", "control-id": "cis_rhel10_5-4.2.1", "description": "No notes for control-id 5.4.2.1.", "props": [ @@ -8659,7 +8659,7 @@ ] }, { - "uuid": "16a96444-86e5-4414-ad1a-ccc57eedb745", + "uuid": "8d9ba9d5-ef5e-433f-97f2-69397d72f641", "control-id": "cis_rhel10_5-4.2.2", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -8676,7 +8676,7 @@ ] }, { - "uuid": "5f1ba698-1e6c-4723-a540-da3fd9392a32", + "uuid": "b6583a81-b5c2-4937-a08f-a55e23fdfa0f", "control-id": "cis_rhel10_5-4.2.3", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -8693,7 +8693,7 @@ ] }, { - "uuid": "9fca5964-4ec0-413a-89f7-a3a416637400", + "uuid": "43812602-92ae-4b96-b01d-20fec457fc34", "control-id": "cis_rhel10_5-4.2.4", "description": "No notes for control-id 5.4.2.4.", "props": [ @@ -8710,7 +8710,7 @@ ] }, { - "uuid": "b0b8b99c-d943-483c-a54b-1a60dedbaa81", + "uuid": "6446fd90-031b-4fdb-8182-cfcd7fb2ca5d", "control-id": "cis_rhel10_5-4.2.5", "description": "No notes for control-id 5.4.2.5.", "props": [ @@ -8732,7 +8732,7 @@ ] }, { - "uuid": "7a9b012a-725b-435f-9573-8ef6df7b85a5", + "uuid": "ed4c578b-c5fb-4085-8f6e-45632e0ebe6e", "control-id": "cis_rhel10_5-4.2.6", "description": "No notes for control-id 5.4.2.6.", "props": [ @@ -8749,7 +8749,7 @@ ] }, { - "uuid": "696143d4-4573-4b1b-9650-504585215c50", + "uuid": "741301bb-45b5-4cf6-a278-d31ca2c8e763", "control-id": "cis_rhel10_5-4.2.7", "description": "No notes for control-id 5.4.2.7.", "props": [ @@ -8771,7 +8771,7 @@ ] }, { - "uuid": "a8b8ca8d-75ef-4df0-9a0a-3a0251572462", + "uuid": "7f958c43-f153-4232-b0eb-031429d33f22", "control-id": "cis_rhel10_5-4.2.8", "description": "No notes for control-id 5.4.2.8.", "props": [ @@ -8788,7 +8788,7 @@ ] }, { - "uuid": "e9225339-6069-433b-bd48-4d1dff035998", + "uuid": "b67701a7-e6e8-401d-bfa0-27778082e727", "control-id": "cis_rhel10_5-4.3.2", "description": "No notes for control-id 5.4.3.2.", "props": [ @@ -8805,7 +8805,7 @@ ] }, { - "uuid": "384cca33-bc4f-4450-a8cd-1e020a892983", + "uuid": "0a741c75-9329-4a4d-a663-8204a7da59ea", "control-id": "cis_rhel10_5-4.3.3", "description": "No notes for control-id 5.4.3.3.", "props": [ @@ -8832,7 +8832,7 @@ ] }, { - "uuid": "d624cf65-aabb-4f9d-a92a-36fd3a7b8b4f", + "uuid": "877c852f-77c8-420b-9708-64736c2601d0", "control-id": "cis_rhel10_6-1.1", "description": "No notes for control-id 6.1.1.", "props": [ @@ -8854,7 +8854,7 @@ ] }, { - "uuid": "5ae67b38-1a62-4116-8586-15c974f5c6a4", + "uuid": "9a47c3e6-fc25-4d35-a174-05677a9f4846", "control-id": "cis_rhel10_6-1.2", "description": "No notes for control-id 6.1.2.", "props": [ @@ -8871,7 +8871,7 @@ ] }, { - "uuid": "9774691a-0c52-425b-8b74-7f3130c343db", + "uuid": "c699ff26-e7e5-4acf-a69b-3dbf144c8084", "control-id": "cis_rhel10_6-1.3", "description": "No notes for control-id 6.1.3.", "props": [ @@ -8888,7 +8888,7 @@ ] }, { - "uuid": "3c53ca89-607b-4ebb-88b1-7806b526ee33", + "uuid": "685f7db8-f345-4613-9e17-49f0d2dd9101", "control-id": "cis_rhel10_6-2.1.1", "description": "No notes for control-id 6.2.1.1.", "props": [ @@ -8905,7 +8905,7 @@ ] }, { - "uuid": "599121ab-6d8d-4e14-b433-363d3551f6a9", + "uuid": "9d31c1df-87d3-408b-ada7-fb25c07e29a7", "control-id": "cis_rhel10_6-2.1.2", "description": "The description for control-id cis_rhel10_6-2.1.2.", "props": [ @@ -8918,7 +8918,7 @@ ] }, { - "uuid": "34d89a31-5062-4279-99f6-d24212b1ed90", + "uuid": "bfcf2aff-9e0e-40ae-a488-b68bf0d16361", "control-id": "cis_rhel10_6-2.1.3", "description": "The description for control-id cis_rhel10_6-2.1.3.", "props": [ @@ -8931,7 +8931,7 @@ ] }, { - "uuid": "2a4f68f4-039b-43bb-9b5c-1d6927088101", + "uuid": "8a34e2fc-063d-4a8c-a514-e8f0e7434695", "control-id": "cis_rhel10_6-2.1.4", "description": "No notes for control-id 6.2.1.4.", "props": [ @@ -8948,7 +8948,7 @@ ] }, { - "uuid": "646a77e7-45a0-4355-9539-863f8f098638", + "uuid": "da1b83ec-fb7e-4d4b-972b-1638e7929a68", "control-id": "cis_rhel10_6-2.2.1.1", "description": "No notes for control-id 6.2.2.1.1.", "props": [ @@ -8965,7 +8965,7 @@ ] }, { - "uuid": "930e6cfb-be67-4120-9062-342a8fd37d80", + "uuid": "77aa15f2-87e6-4402-b230-2a006be8fab2", "control-id": "cis_rhel10_6-2.2.1.2", "description": "The description for control-id cis_rhel10_6-2.2.1.2.", "props": [ @@ -8978,7 +8978,7 @@ ] }, { - "uuid": "a9ad43f1-63a7-4651-89b2-75719525bb9d", + "uuid": "6357e3fe-0a6e-4659-a6f0-3823aa808eb0", "control-id": "cis_rhel10_6-2.2.1.3", "description": "No notes for control-id 6.2.2.1.3.", "props": [ @@ -8995,7 +8995,7 @@ ] }, { - "uuid": "ca7d2adf-34ea-4843-ac7f-cac992d3ce0c", + "uuid": "45213e87-fbc3-4fac-8da0-f3cbd39e88c1", "control-id": "cis_rhel10_6-2.2.1.4", "description": "No notes for control-id 6.2.2.1.4.", "props": [ @@ -9012,7 +9012,7 @@ ] }, { - "uuid": "8105de85-ff95-4c15-bda7-48e6ecf14816", + "uuid": "14b5550e-39e7-4e4e-94eb-7f031eccbb27", "control-id": "cis_rhel10_6-2.2.2", "description": "No notes for control-id 6.2.2.2.", "props": [ @@ -9029,7 +9029,7 @@ ] }, { - "uuid": "37437526-cd83-484f-9fdb-93c791595643", + "uuid": "93344c38-2410-4473-8431-655d8248d985", "control-id": "cis_rhel10_6-2.2.3", "description": "No notes for control-id 6.2.2.3.", "props": [ @@ -9046,7 +9046,7 @@ ] }, { - "uuid": "d325f91f-3d9e-4de7-b8d4-8150d5e5e1fd", + "uuid": "15b72932-0b70-434d-8d70-503f1c1e284a", "control-id": "cis_rhel10_6-2.2.4", "description": "No notes for control-id 6.2.2.4.", "props": [ @@ -9063,7 +9063,7 @@ ] }, { - "uuid": "15a52b06-917c-454a-aa1a-710b3b8171cb", + "uuid": "1e3d9e1c-a81e-4c09-9170-2128ca558b8c", "control-id": "cis_rhel10_6-2.3.1", "description": "No notes for control-id 6.2.3.1.", "props": [ @@ -9075,7 +9075,7 @@ ] }, { - "uuid": "3c2866f9-c51d-423e-9ee2-d643b97382ec", + "uuid": "74e34f95-72f9-48b1-afa8-b2ac629b64f8", "control-id": "cis_rhel10_6-2.3.2", "description": "No notes for control-id 6.2.3.2.", "props": [ @@ -9087,7 +9087,7 @@ ] }, { - "uuid": "5e8f3e70-b8eb-42a2-9874-e7a4e4235b02", + "uuid": "a8ce2e12-f6fb-4aa4-b120-ead6c835b628", "control-id": "cis_rhel10_6-2.3.3", "description": "No notes for control-id 6.2.3.3.", "props": [ @@ -9099,7 +9099,7 @@ ] }, { - "uuid": "e27d0677-9fbf-4073-a182-4bddd3e6ee12", + "uuid": "7159f98f-8f61-4812-aed7-6e7c3392fd9b", "control-id": "cis_rhel10_6-2.3.4", "description": "No notes for control-id 6.2.3.4.", "props": [ @@ -9111,7 +9111,7 @@ ] }, { - "uuid": "3fd76439-4dcf-4674-b11e-50374789dcc2", + "uuid": "cc93c737-672d-4452-bc56-f27713de709c", "control-id": "cis_rhel10_6-2.3.5", "description": "The description for control-id cis_rhel10_6-2.3.5.", "props": [ @@ -9124,7 +9124,7 @@ ] }, { - "uuid": "30ae0e9c-8912-49d1-97d1-985f93e0258d", + "uuid": "e4fe326e-a11a-44ae-89df-632b311b26cd", "control-id": "cis_rhel10_6-2.3.6", "description": "The description for control-id cis_rhel10_6-2.3.6.", "props": [ @@ -9137,7 +9137,7 @@ ] }, { - "uuid": "c16c2abd-bcb4-4a39-ae07-c05cf5080c94", + "uuid": "0f9db0c3-4532-4fd7-b705-f4d3625a6109", "control-id": "cis_rhel10_6-2.3.7", "description": "No notes for control-id 6.2.3.7.", "props": [ @@ -9149,7 +9149,7 @@ ] }, { - "uuid": "c6cf33a4-7873-4ee2-abda-210679d9ebd9", + "uuid": "32fc4bc1-5b26-416f-854d-38976b76330e", "control-id": "cis_rhel10_6-2.3.8", "description": "The description for control-id cis_rhel10_6-2.3.8.", "props": [ @@ -9162,7 +9162,7 @@ ] }, { - "uuid": "c42caa3c-9074-4bfb-b3c9-dad18aeabd39", + "uuid": "d6509c22-8762-442b-ac26-19eaa27cba13", "control-id": "cis_rhel10_6-2.4.1", "description": "It is not harmful to run these rules even if rsyslog is not installed or active.", "props": [ @@ -9189,7 +9189,7 @@ ] }, { - "uuid": "c792f3de-9713-4853-ba43-c8711dc674d8", + "uuid": "653e4fb9-46c3-44e8-96b5-9b8e652be5a6", "control-id": "cis_rhel10_7-1.1", "description": "No notes for control-id 7.1.1.", "props": [ @@ -9216,7 +9216,7 @@ ] }, { - "uuid": "79a7e5c6-c588-44c0-8f39-e1363ee85140", + "uuid": "6320fe27-3972-4872-abff-8dc9bbf74b05", "control-id": "cis_rhel10_7-1.2", "description": "No notes for control-id 7.1.2.", "props": [ @@ -9243,7 +9243,7 @@ ] }, { - "uuid": "db530ad5-9fad-4bc4-8c75-453a3fdce73c", + "uuid": "dcbc6950-fd41-4a40-b2cc-802763ede2e1", "control-id": "cis_rhel10_7-1.3", "description": "No notes for control-id 7.1.3.", "props": [ @@ -9270,7 +9270,7 @@ ] }, { - "uuid": "95f0f15d-e383-4e64-accc-c90ae7de3080", + "uuid": "688ca61b-d8d3-4f95-a130-a213873c50ed", "control-id": "cis_rhel10_7-1.4", "description": "No notes for control-id 7.1.4.", "props": [ @@ -9297,7 +9297,7 @@ ] }, { - "uuid": "5f741792-f423-484f-9cfc-f12875a54a55", + "uuid": "11e6006c-393b-4170-8eef-432dc8ca9923", "control-id": "cis_rhel10_7-1.5", "description": "No notes for control-id 7.1.5.", "props": [ @@ -9324,7 +9324,7 @@ ] }, { - "uuid": "3ec6d8f5-fbfa-462c-b3d5-90d7593a7404", + "uuid": "90a73143-5291-4a55-b0f0-1ac1a52f2009", "control-id": "cis_rhel10_7-1.6", "description": "No notes for control-id 7.1.6.", "props": [ @@ -9351,7 +9351,7 @@ ] }, { - "uuid": "a8daa933-5765-47ee-a9c5-8dd8a3d0ce72", + "uuid": "6fb4d85d-0ce2-401b-8d10-bcd319fe03e5", "control-id": "cis_rhel10_7-1.7", "description": "No notes for control-id 7.1.7.", "props": [ @@ -9378,7 +9378,7 @@ ] }, { - "uuid": "980d31c4-7a44-45c3-8f36-d51c13bad8fb", + "uuid": "a6672987-fd79-4710-b8bf-4ba61b56eb67", "control-id": "cis_rhel10_7-1.8", "description": "No notes for control-id 7.1.8.", "props": [ @@ -9405,7 +9405,7 @@ ] }, { - "uuid": "bfd4a6a6-d507-470e-8582-c8030d428e72", + "uuid": "213c5eab-9e7b-453a-b19f-c68b6056a324", "control-id": "cis_rhel10_7-1.9", "description": "No notes for control-id 7.1.9.", "props": [ @@ -9432,7 +9432,7 @@ ] }, { - "uuid": "407a4836-7155-421f-9a46-bc0fc0386585", + "uuid": "357b3317-381c-4f37-8e2e-137ddc1722b9", "control-id": "cis_rhel10_7-1.10", "description": "No notes for control-id 7.1.10.", "props": [ @@ -9474,7 +9474,7 @@ ] }, { - "uuid": "eb4b8b1c-5139-4d36-b1cd-e7828d4cd0ce", + "uuid": "4244a08f-93b8-4a9d-ab7e-cf6820d28bbc", "control-id": "cis_rhel10_7-1.11", "description": "No notes for control-id 7.1.11.", "props": [ @@ -9496,7 +9496,7 @@ ] }, { - "uuid": "9631301a-2a15-4565-bdd3-03ae51b5df1f", + "uuid": "94bfcf06-3ea1-4712-ad97-8c36536b7387", "control-id": "cis_rhel10_7-1.12", "description": "No notes for control-id 7.1.12.", "props": [ @@ -9518,7 +9518,7 @@ ] }, { - "uuid": "1d9128ed-5522-4f66-9b76-be593b14713b", + "uuid": "2ac82131-4614-4e83-85f2-dd58d25501f1", "control-id": "cis_rhel10_7-1.13", "description": "The description for control-id cis_rhel10_7-1.13.", "props": [ @@ -9531,7 +9531,7 @@ ] }, { - "uuid": "9e2fdb87-8506-4fa6-95bf-99a7899b3cea", + "uuid": "d520c2db-f6a0-4009-8e22-c52a0edcffb6", "control-id": "cis_rhel10_7-2.1", "description": "No notes for control-id 7.2.1.", "props": [ @@ -9548,7 +9548,7 @@ ] }, { - "uuid": "800ae2da-c3a0-4ce6-9fff-48ee9b46b8c6", + "uuid": "1ce969ff-7a35-4261-b832-e727f5a4bb32", "control-id": "cis_rhel10_7-2.2", "description": "No notes for control-id 7.2.2.", "props": [ @@ -9565,7 +9565,7 @@ ] }, { - "uuid": "e2575045-b1dc-4210-8a16-7ad18a253dbd", + "uuid": "d2dde22d-4f6f-490d-abff-f9088acec7b5", "control-id": "cis_rhel10_7-2.3", "description": "No notes for control-id 7.2.3.", "props": [ @@ -9582,7 +9582,7 @@ ] }, { - "uuid": "7ce737c5-b1f1-4ab8-b5b0-223d3e9ecdb6", + "uuid": "85eeb3d9-d68d-4411-bc78-fed35f5ff821", "control-id": "cis_rhel10_7-2.4", "description": "No notes for control-id 7.2.4.", "props": [ @@ -9599,7 +9599,7 @@ ] }, { - "uuid": "f0fe2d68-5d44-4f16-9ad8-8177b77add96", + "uuid": "9b956a74-a639-4ae8-bd39-05afb84a0f21", "control-id": "cis_rhel10_7-2.5", "description": "No notes for control-id 7.2.5.", "props": [ @@ -9616,7 +9616,7 @@ ] }, { - "uuid": "24758ee0-ee88-4967-9fb6-051494062ca4", + "uuid": "74ef3508-3729-46e4-94e1-34f0b82d7619", "control-id": "cis_rhel10_7-2.6", "description": "No notes for control-id 7.2.6.", "props": [ @@ -9633,7 +9633,7 @@ ] }, { - "uuid": "6479df70-9508-48ff-a751-d4ff8921b778", + "uuid": "3c584a11-13b6-4b5f-80cf-cbe04e183dc5", "control-id": "cis_rhel10_7-2.7", "description": "No notes for control-id 7.2.7.", "props": [ @@ -9650,7 +9650,7 @@ ] }, { - "uuid": "b4be79c9-e614-4890-91ca-4af9acff4c0f", + "uuid": "ef8b1209-02c0-411a-9db5-43ca02917b69", "control-id": "cis_rhel10_7-2.8", "description": "No notes for control-id 7.2.8.", "props": [ @@ -9677,7 +9677,7 @@ ] }, { - "uuid": "8fa671b1-3e1c-4a68-b52b-5ac1e07a01d1", + "uuid": "0f48b107-26be-42e3-a9dc-183bd684df73", "control-id": "cis_rhel10_7-2.9", "description": "No notes for control-id 7.2.9.", "props": [ @@ -18351,7 +18351,7 @@ ], "control-implementations": [ { - "uuid": "3d5efc8f-c6cd-4073-ad5b-53f2e4219499", + "uuid": "ebee22c1-0d03-4c73-886d-8c5f5abbfbe1", "source": "trestle://profiles/rhel10-cis_rhel10-l1_workstation/profile.json", "description": "Control implementation for cis_workstation_l1", "props": [ @@ -18707,7 +18707,7 @@ ], "implemented-requirements": [ { - "uuid": "898c386e-3965-499d-a7e2-ff7c31eca3e4", + "uuid": "0b7652e2-5098-4a6d-bbdb-31b0d3ff0eb7", "control-id": "reload_dconf_db", "description": "This is a helper rule to reload Dconf database correctly.", "props": [ @@ -18724,7 +18724,7 @@ ] }, { - "uuid": "c1d97a35-b498-4c50-bedd-d0ed09bb8e9a", + "uuid": "b1826270-3bf6-4a1b-b0e1-88e4ea7fe3bd", "control-id": "cis_rhel10_1-1.1.1", "description": "No notes for control-id 1.1.1.1.", "props": [ @@ -18741,7 +18741,7 @@ ] }, { - "uuid": "653f784e-7f7c-4c33-9b65-f201f0cfffc4", + "uuid": "ecf123ba-7a7e-4020-9aee-db497a643184", "control-id": "cis_rhel10_1-1.1.2", "description": "No notes for control-id 1.1.1.2.", "props": [ @@ -18758,7 +18758,7 @@ ] }, { - "uuid": "7d844cc8-c218-4735-a234-06cdd9ab6afb", + "uuid": "a29c6a54-2cb8-4d71-9e44-88278528a3da", "control-id": "cis_rhel10_1-1.1.3", "description": "No notes for control-id 1.1.1.3.", "props": [ @@ -18775,7 +18775,7 @@ ] }, { - "uuid": "f7971d88-5335-4786-b195-6ad22ace81b0", + "uuid": "67f355f0-ed18-4424-afed-bdd95efac372", "control-id": "cis_rhel10_1-1.1.4", "description": "No notes for control-id 1.1.1.4.", "props": [ @@ -18792,7 +18792,7 @@ ] }, { - "uuid": "413aef0e-16b3-4802-8659-90a658abb079", + "uuid": "1eca06ce-689a-4bbd-8740-ee44a98a97e7", "control-id": "cis_rhel10_1-1.1.5", "description": "No notes for control-id 1.1.1.5.", "props": [ @@ -18809,7 +18809,7 @@ ] }, { - "uuid": "f995d1c1-4b97-47c7-bf54-27483f75df2c", + "uuid": "5cc5161c-5227-4021-a0bd-6f83c038124a", "control-id": "cis_rhel10_1-1.1.11", "description": "The description for control-id cis_rhel10_1-1.1.11.", "props": [ @@ -18822,7 +18822,7 @@ ] }, { - "uuid": "e0f863b5-f434-4a6e-9218-1215e98c6767", + "uuid": "e3c39b07-fedf-45ae-84a7-260382a755a7", "control-id": "cis_rhel10_1-1.2.1.1", "description": "No notes for control-id 1.1.2.1.1.", "props": [ @@ -18839,7 +18839,7 @@ ] }, { - "uuid": "cdf43cf3-2d0a-49cd-9875-30caf3993fde", + "uuid": "c7feb2e7-f071-43d2-971a-74bd38627aa4", "control-id": "cis_rhel10_1-1.2.1.2", "description": "No notes for control-id 1.1.2.1.2.", "props": [ @@ -18856,7 +18856,7 @@ ] }, { - "uuid": "d643c3ec-c3fd-4996-9c14-41c8d1ea76d9", + "uuid": "754f68bf-3110-4d46-a823-9137de41c6d8", "control-id": "cis_rhel10_1-1.2.1.3", "description": "No notes for control-id 1.1.2.1.3.", "props": [ @@ -18873,7 +18873,7 @@ ] }, { - "uuid": "e8de70d9-0579-4654-8100-133ef5bff7f9", + "uuid": "7f37219f-9ad7-467e-9dae-ea98f8986622", "control-id": "cis_rhel10_1-1.2.1.4", "description": "No notes for control-id 1.1.2.1.4.", "props": [ @@ -18890,7 +18890,7 @@ ] }, { - "uuid": "1664395d-a6ed-4a15-9eb4-7fe5ac16b6a4", + "uuid": "cfa947b5-5281-418d-9042-513819b7bb88", "control-id": "cis_rhel10_1-1.2.2.1", "description": "No notes for control-id 1.1.2.2.1.", "props": [ @@ -18907,7 +18907,7 @@ ] }, { - "uuid": "05e43442-9bd3-48bb-b98f-db24b37ec711", + "uuid": "2584307f-4ec4-405c-a949-953532d7c777", "control-id": "cis_rhel10_1-1.2.2.2", "description": "No notes for control-id 1.1.2.2.2.", "props": [ @@ -18924,7 +18924,7 @@ ] }, { - "uuid": "675e847a-c64f-4976-b8d0-b06f0ca5e376", + "uuid": "ccc5e569-edf4-4a6e-b27b-7ba06f97b20d", "control-id": "cis_rhel10_1-1.2.2.3", "description": "No notes for control-id 1.1.2.2.3.", "props": [ @@ -18941,7 +18941,7 @@ ] }, { - "uuid": "815cbcdb-43d3-4f4e-af7d-8043b1a45a9d", + "uuid": "39af04d4-1679-4e4c-8215-94b0663a9535", "control-id": "cis_rhel10_1-1.2.2.4", "description": "No notes for control-id 1.1.2.2.4.", "props": [ @@ -18958,7 +18958,7 @@ ] }, { - "uuid": "5263f9e3-32c0-4737-9b64-9dc04932c9ad", + "uuid": "aaf628af-53c1-4a8e-a35b-f5f1abdadd1d", "control-id": "cis_rhel10_1-1.2.3.2", "description": "No notes for control-id 1.1.2.3.2.", "props": [ @@ -18975,7 +18975,7 @@ ] }, { - "uuid": "ca647138-67d5-4cfa-89f6-8646f4cc17c4", + "uuid": "bf3218d2-bc65-4f2b-824d-a968be97d31e", "control-id": "cis_rhel10_1-1.2.3.3", "description": "No notes for control-id 1.1.2.3.3.", "props": [ @@ -18992,7 +18992,7 @@ ] }, { - "uuid": "22248678-a40d-40a8-b496-b9a4648556c5", + "uuid": "9f76ee6c-82eb-45fd-9abd-7f1e114cc129", "control-id": "cis_rhel10_1-1.2.4.2", "description": "No notes for control-id 1.1.2.4.2.", "props": [ @@ -19009,7 +19009,7 @@ ] }, { - "uuid": "e3fddaf6-c641-43ab-ba17-0ffbe0b5db32", + "uuid": "90560900-88a8-43fd-9052-4d804cd1810a", "control-id": "cis_rhel10_1-1.2.4.3", "description": "No notes for control-id 1.1.2.4.3.", "props": [ @@ -19026,7 +19026,7 @@ ] }, { - "uuid": "8f2ade2b-cab4-4259-a76b-c3f4f81fb299", + "uuid": "557ce22f-b666-4995-8ff5-ceb549b9de95", "control-id": "cis_rhel10_1-1.2.5.2", "description": "No notes for control-id 1.1.2.5.2.", "props": [ @@ -19043,7 +19043,7 @@ ] }, { - "uuid": "7e688149-ea8c-46e1-b5ef-c01c6f700af5", + "uuid": "8f86d45f-28b5-47dc-8b02-19b24d67be7f", "control-id": "cis_rhel10_1-1.2.5.3", "description": "No notes for control-id 1.1.2.5.3.", "props": [ @@ -19060,7 +19060,7 @@ ] }, { - "uuid": "41339b3f-8276-465e-9be6-748cdc1b617a", + "uuid": "83359ef3-e2a6-41a6-9ab0-8f042c57bea1", "control-id": "cis_rhel10_1-1.2.5.4", "description": "No notes for control-id 1.1.2.5.4.", "props": [ @@ -19077,7 +19077,7 @@ ] }, { - "uuid": "b34ce75b-d366-49ca-8397-e069e6790a74", + "uuid": "778114f5-9771-4032-8f8a-8893358af895", "control-id": "cis_rhel10_1-1.2.6.2", "description": "No notes for control-id 1.1.2.6.2.", "props": [ @@ -19094,7 +19094,7 @@ ] }, { - "uuid": "6c3b7072-0fe0-40d7-85a9-c3655afa36c4", + "uuid": "a2f033ee-227b-47b5-9bc8-87393a37a823", "control-id": "cis_rhel10_1-1.2.6.3", "description": "No notes for control-id 1.1.2.6.3.", "props": [ @@ -19111,7 +19111,7 @@ ] }, { - "uuid": "098fa54a-8501-4b95-bb8d-ec18ca207247", + "uuid": "6888b448-cc16-4355-aba0-88b131f23023", "control-id": "cis_rhel10_1-1.2.6.4", "description": "No notes for control-id 1.1.2.6.4.", "props": [ @@ -19128,7 +19128,7 @@ ] }, { - "uuid": "a74d7772-911b-4cf6-ac72-f280a060dae3", + "uuid": "04f09c07-f39c-461c-b79f-1cc85e3ed497", "control-id": "cis_rhel10_1-1.2.7.2", "description": "No notes for control-id 1.1.2.7.2.", "props": [ @@ -19145,7 +19145,7 @@ ] }, { - "uuid": "379873b1-0de8-406c-9fd0-4082fec22cbd", + "uuid": "698f6c6a-b429-42ca-bc37-bf2e6c270fc1", "control-id": "cis_rhel10_1-1.2.7.3", "description": "No notes for control-id 1.1.2.7.3.", "props": [ @@ -19162,7 +19162,7 @@ ] }, { - "uuid": "d68bd0df-6065-4e8d-85e0-640f7f2a8c01", + "uuid": "0a7af1be-2309-4b9e-b87b-2bcd8f0a9b39", "control-id": "cis_rhel10_1-1.2.7.4", "description": "No notes for control-id 1.1.2.7.4.", "props": [ @@ -19179,7 +19179,7 @@ ] }, { - "uuid": "501630ba-2870-4d2d-9c17-db4542bd4a61", + "uuid": "ad5c228f-16ba-4df1-9870-42bb6e9e0859", "control-id": "cis_rhel10_1-2.1.1", "description": "The description for control-id cis_rhel10_1-2.1.1.", "props": [ @@ -19192,7 +19192,7 @@ ] }, { - "uuid": "81ddb19c-aaef-4b59-bacd-f0e120e97375", + "uuid": "e413e9c8-cd00-47d2-9ad8-b6b06e10a8b6", "control-id": "cis_rhel10_1-2.1.2", "description": "No notes for control-id 1.2.1.2.", "props": [ @@ -19209,7 +19209,7 @@ ] }, { - "uuid": "68ae7104-307b-46c3-8304-d992ef517f35", + "uuid": "0e013d7f-bd72-4805-a99a-5108c95658f8", "control-id": "cis_rhel10_1-2.1.4", "description": "The description for control-id cis_rhel10_1-2.1.4.", "props": [ @@ -19222,7 +19222,7 @@ ] }, { - "uuid": "47a1d15a-b2c0-4e61-8870-daf9c32affa6", + "uuid": "75f07384-47cb-45e3-94c0-17d90a3d4f9a", "control-id": "cis_rhel10_1-2.2.1", "description": "The description for control-id cis_rhel10_1-2.2.1.", "props": [ @@ -19235,7 +19235,7 @@ ] }, { - "uuid": "b2fa7453-1d72-49ad-8511-4854bae17992", + "uuid": "59146a7f-e285-4b7a-95df-e97e2e56e76a", "control-id": "cis_rhel10_1-3.1.1", "description": "No notes for control-id 1.3.1.1.", "props": [ @@ -19252,7 +19252,7 @@ ] }, { - "uuid": "5d520881-9553-46b3-9db9-966b5d0d5916", + "uuid": "ea587aff-6e99-492e-ba9a-e90a7d7858eb", "control-id": "cis_rhel10_1-3.1.2", "description": "No notes for control-id 1.3.1.2.", "props": [ @@ -19269,7 +19269,7 @@ ] }, { - "uuid": "375d627e-d90d-4290-82e6-b1936935511b", + "uuid": "23e3428e-3842-4d21-8922-01aa1f04d811", "control-id": "cis_rhel10_1-3.1.3", "description": "No notes for control-id 1.3.1.3.", "props": [ @@ -19286,7 +19286,7 @@ ] }, { - "uuid": "da4f09eb-5736-4c3a-b1d2-134ed0fddefc", + "uuid": "e11d1265-9302-4be5-b260-e29367abc785", "control-id": "cis_rhel10_1-3.1.4", "description": "No notes for control-id 1.3.1.4.", "props": [ @@ -19303,7 +19303,7 @@ ] }, { - "uuid": "9461a964-91a3-4b67-91af-f2e78da28e4e", + "uuid": "795484f7-9d41-4c9d-9ee6-73fff343afe8", "control-id": "cis_rhel10_1-3.1.7", "description": "No notes for control-id 1.3.1.7.", "props": [ @@ -19320,7 +19320,7 @@ ] }, { - "uuid": "826d03ce-bb5c-428c-887f-33febafb0832", + "uuid": "9fbb6969-7b28-4e8a-99ac-a4de9df9532b", "control-id": "cis_rhel10_1-4.1", "description": "There is no automated remediation for this rule and this is intentional.\nMore details in the rule description.", "props": [ @@ -19337,7 +19337,7 @@ ] }, { - "uuid": "3c4355fd-e3bc-4076-8a8f-d11ce42e6757", + "uuid": "4f77510e-bd66-48c5-87c4-c5175a8b3266", "control-id": "cis_rhel10_1-4.2", "description": "This requirement demands a deeper review of the rules.", "props": [ @@ -19364,7 +19364,7 @@ ] }, { - "uuid": "eada87f1-5872-44ca-b122-9c7534b39af0", + "uuid": "f954467b-8235-4b98-8e6c-f6fb3c005265", "control-id": "cis_rhel10_1-5.1", "description": "No notes for control-id 1.5.1.", "props": [ @@ -19381,7 +19381,7 @@ ] }, { - "uuid": "f25cb726-ff61-4fb1-a812-7821ef35112c", + "uuid": "e76b398a-4b08-4775-b466-017c34ad9078", "control-id": "cis_rhel10_1-5.2", "description": "No notes for control-id 1.5.2.", "props": [ @@ -19398,7 +19398,7 @@ ] }, { - "uuid": "ee55162b-4db9-494d-8cf5-4970d25ed5a9", + "uuid": "82cf8c2b-8b5e-40e7-a9d2-357d79fa4b2e", "control-id": "cis_rhel10_1-5.4", "description": "No notes for control-id 1.5.4.", "props": [ @@ -19415,7 +19415,7 @@ ] }, { - "uuid": "c5d21c73-83b6-44bf-b98d-e6fc49de2a7c", + "uuid": "595bc4c9-35fc-43be-86b2-fa7940c810c9", "control-id": "cis_rhel10_1-5.5", "description": "No notes for control-id 1.5.5.", "props": [ @@ -19432,7 +19432,7 @@ ] }, { - "uuid": "abf4062f-5dff-4100-ac1e-4cba11a1b882", + "uuid": "be94c7f5-b28f-487b-bb4a-0804986acaa0", "control-id": "cis_rhel10_1-5.6", "description": "No notes for control-id 1.5.6.", "props": [ @@ -19449,7 +19449,7 @@ ] }, { - "uuid": "c6707d72-daf1-413d-9277-38ee92c134f7", + "uuid": "0d502d1d-72cc-4c06-9f81-50bc6de84e12", "control-id": "cis_rhel10_1-5.7", "description": "No notes for control-id 1.5.7.", "props": [ @@ -19466,7 +19466,7 @@ ] }, { - "uuid": "f4029b0c-bbf5-4727-93e7-0ffe7b18e4f2", + "uuid": "18249eb3-4ed7-4350-8666-a077102a65fd", "control-id": "cis_rhel10_1-5.8", "description": "Address Space Layout Randomization (ASLR)", "props": [ @@ -19483,7 +19483,7 @@ ] }, { - "uuid": "d657bf76-968d-4655-a2ab-9d9a46a9600a", + "uuid": "9e0b78e8-6a55-446d-8c87-40a65a67ebdb", "control-id": "cis_rhel10_1-5.9", "description": "No notes for control-id 1.5.9.", "props": [ @@ -19500,7 +19500,7 @@ ] }, { - "uuid": "c8551fe9-de59-4d3c-a88a-1f231a69f15c", + "uuid": "2054e0bf-457d-46c4-a3ed-210f076ee427", "control-id": "cis_rhel10_1-5.10", "description": "No notes for control-id 1.5.10.", "props": [ @@ -19517,7 +19517,7 @@ ] }, { - "uuid": "d4eaee1c-8a79-48e6-b82b-fbdfac5a8907", + "uuid": "326bf934-204b-4a7c-acd4-c19fd11149d5", "control-id": "cis_rhel10_1-6.1", "description": "No notes for control-id 1.6.1.", "props": [ @@ -19534,7 +19534,7 @@ ] }, { - "uuid": "b78c8f80-5e5e-476d-923b-762cda5c37c6", + "uuid": "0ff97595-adc1-4d26-9b70-18291cee6c36", "control-id": "cis_rhel10_1-6.2", "description": "No notes for control-id 1.6.2.", "props": [ @@ -19551,7 +19551,7 @@ ] }, { - "uuid": "fc2b57bf-36a3-424d-bb8b-03a1457be843", + "uuid": "70388748-c5fb-4550-a54f-fcc8976883e5", "control-id": "cis_rhel10_1-6.3", "description": "No notes for control-id 1.6.3.", "props": [ @@ -19568,7 +19568,7 @@ ] }, { - "uuid": "8a6f9cd7-0255-4e2a-9982-81594fa8b26b", + "uuid": "2210ba4f-0e58-45b9-b49f-1ab82036b19e", "control-id": "cis_rhel10_1-6.4", "description": "No notes for control-id 1.6.4.", "props": [ @@ -19585,7 +19585,7 @@ ] }, { - "uuid": "b05a4108-b66a-4623-bcc3-a6a54c8ba92f", + "uuid": "92148e52-9b97-4db1-a181-935d0159063b", "control-id": "cis_rhel10_1-7.1", "description": "No notes for control-id 1.7.1.", "props": [ @@ -19602,7 +19602,7 @@ ] }, { - "uuid": "6c0c6a48-40ea-4f66-96a1-a95d4599b483", + "uuid": "cf2da8dc-b532-446c-8b71-433a19c5ee4b", "control-id": "cis_rhel10_1-7.2", "description": "No notes for control-id 1.7.2.", "props": [ @@ -19619,7 +19619,7 @@ ] }, { - "uuid": "d5fadc64-05f0-471b-bbaa-57dbac30860c", + "uuid": "fbaea53b-dada-440d-9ebf-be1211838fdb", "control-id": "cis_rhel10_1-7.3", "description": "No notes for control-id 1.7.3.", "props": [ @@ -19636,7 +19636,7 @@ ] }, { - "uuid": "701e4a7d-af37-46cb-a776-b98ddd5802d0", + "uuid": "9c352c2c-49a5-442f-ae51-b732680e7c6f", "control-id": "cis_rhel10_1-7.4", "description": "No notes for control-id 1.7.4.", "props": [ @@ -19663,7 +19663,7 @@ ] }, { - "uuid": "9d4cc1f9-79a2-427d-a95f-48ca74d0e24f", + "uuid": "e1fc227e-8416-4ca0-ae2f-d6e230f7b922", "control-id": "cis_rhel10_1-7.5", "description": "No notes for control-id 1.7.5.", "props": [ @@ -19690,7 +19690,7 @@ ] }, { - "uuid": "103e8b1d-50e5-484d-9c43-f347a85008e4", + "uuid": "e7dec518-9721-4034-81e5-c94079166939", "control-id": "cis_rhel10_1-7.6", "description": "No notes for control-id 1.7.6.", "props": [ @@ -19717,7 +19717,7 @@ ] }, { - "uuid": "42faed53-9503-4ec9-aaaa-f789ae45d0a6", + "uuid": "01daf2d2-d7a6-4be5-941a-aef27a6998a2", "control-id": "cis_rhel10_1-8.1", "description": "No notes for control-id 1.8.1.", "props": [ @@ -19739,7 +19739,7 @@ ] }, { - "uuid": "069acf82-b902-4e97-9f73-0c8a2e2fad91", + "uuid": "e8caae00-8268-42ac-b8b3-4f4954658f32", "control-id": "cis_rhel10_1-8.2", "description": "No notes for control-id 1.8.2.", "props": [ @@ -19756,7 +19756,7 @@ ] }, { - "uuid": "66ebd94f-c852-4747-908a-0a40e6299bd3", + "uuid": "e8d5028a-93e3-4690-80d4-43c26f5570b8", "control-id": "cis_rhel10_1-8.3", "description": "No notes for control-id 1.8.3.", "props": [ @@ -19788,7 +19788,7 @@ ] }, { - "uuid": "a7a3f93c-4b6e-434a-927e-20eed7d5387b", + "uuid": "37dcf00f-7faa-4e8e-a306-8efbefc81e2f", "control-id": "cis_rhel10_1-8.5", "description": "No notes for control-id 1.8.5.", "props": [ @@ -19805,7 +19805,7 @@ ] }, { - "uuid": "a0ed5195-970b-42d2-ac8f-23e4389f4028", + "uuid": "f04f2332-dd63-4ac9-816f-a4de595a95ad", "control-id": "cis_rhel10_2-1.4", "description": "No notes for control-id 2.1.4.", "props": [ @@ -19822,7 +19822,7 @@ ] }, { - "uuid": "097e516f-e613-4b33-bbba-51f82e26e1ed", + "uuid": "4833abdc-24d0-4570-a6c5-d5111769d249", "control-id": "cis_rhel10_2-1.5", "description": "No notes for control-id 2.1.5.", "props": [ @@ -19839,7 +19839,7 @@ ] }, { - "uuid": "059d3aca-84c6-4a36-b11b-5f8c57701026", + "uuid": "3c4da067-c459-4b5d-82be-5526ea9f180e", "control-id": "cis_rhel10_2-1.6", "description": "No notes for control-id 2.1.6.", "props": [ @@ -19856,7 +19856,7 @@ ] }, { - "uuid": "ee5df02f-57f3-4ac2-94de-f4e0d6f20583", + "uuid": "bef221b2-2403-4e4d-a0cd-dc06cbb9a80b", "control-id": "cis_rhel10_2-1.7", "description": "No notes for control-id 2.1.7.", "props": [ @@ -19873,7 +19873,7 @@ ] }, { - "uuid": "1dd4b5e7-96e9-46aa-97f7-c46321ae036c", + "uuid": "fb66c049-9f4d-4103-8e0a-2c2ec7cfbe61", "control-id": "cis_rhel10_2-1.8", "description": "No notes for control-id 2.1.8.", "props": [ @@ -19895,7 +19895,7 @@ ] }, { - "uuid": "defc7a81-689d-4db2-843d-89db6f58d0a1", + "uuid": "755e6d9c-63a7-4c84-bdbc-e4871d3bdecc", "control-id": "cis_rhel10_2-1.9", "description": "Many of the libvirt packages used by Enterprise Linux virtualization are dependent on the\nnfs-utils package.", "props": [ @@ -19912,7 +19912,7 @@ ] }, { - "uuid": "a842834a-c2c0-47a2-8a76-c20bb46b4337", + "uuid": "60ac3864-a93a-4d79-82ab-4bd87e23b549", "control-id": "cis_rhel10_2-1.11", "description": "Many of the libvirt packages used by Enterprise Linux virtualization, and the nfs-utils\npackage used for The Network File System (NFS), are dependent on the rpcbind package.", "props": [ @@ -19929,7 +19929,7 @@ ] }, { - "uuid": "130db960-f51c-4f90-8d4c-7b68464a8278", + "uuid": "96297856-fcf4-4f5d-9b7c-13db230de741", "control-id": "cis_rhel10_2-1.12", "description": "No notes for control-id 2.1.12.", "props": [ @@ -19946,7 +19946,7 @@ ] }, { - "uuid": "f6c06bee-c752-4ad6-ac4b-dcae71e93e64", + "uuid": "c553bd1d-95b1-47ab-817a-87648e6474dc", "control-id": "cis_rhel10_2-1.13", "description": "No notes for control-id 2.1.13.", "props": [ @@ -19963,7 +19963,7 @@ ] }, { - "uuid": "c2889ce9-7997-4399-9fc3-afebf0c45fbf", + "uuid": "03aaf6ce-16a0-42ef-8453-40fd8ad75ef7", "control-id": "cis_rhel10_2-1.14", "description": "No notes for control-id 2.1.14.", "props": [ @@ -19980,7 +19980,7 @@ ] }, { - "uuid": "fdec0ff9-67dd-4451-857c-7d94c4f90635", + "uuid": "5c878884-bbcd-4571-883c-5fa61a5ee5ba", "control-id": "cis_rhel10_2-1.15", "description": "No notes for control-id 2.1.15.", "props": [ @@ -19997,7 +19997,7 @@ ] }, { - "uuid": "854ef393-ed32-4af1-bacd-1bd3efa31425", + "uuid": "ae4bd9bc-4749-4b8b-ae7f-a173de26e12c", "control-id": "cis_rhel10_2-1.16", "description": "No notes for control-id 2.1.16.", "props": [ @@ -20014,7 +20014,7 @@ ] }, { - "uuid": "ef336b1f-4a40-4a44-bc78-ed4379ce5b70", + "uuid": "ca9ecd9c-2c91-4741-a329-d61188e39699", "control-id": "cis_rhel10_2-1.17", "description": "No notes for control-id 2.1.17.", "props": [ @@ -20031,7 +20031,7 @@ ] }, { - "uuid": "4368176c-f53f-4bc0-bfcc-5826ce5150c2", + "uuid": "b0fde936-1d08-47e9-8d14-1d91b89f05e3", "control-id": "cis_rhel10_2-1.18", "description": "No notes for control-id 2.1.18.", "props": [ @@ -20053,7 +20053,7 @@ ] }, { - "uuid": "6b2e8c11-2f12-4aaf-968b-7b753de0e14d", + "uuid": "6fd8ef4c-44c6-40fe-b8df-24bb9d82e938", "control-id": "cis_rhel10_2-1.21", "description": "No notes for control-id 2.1.21.", "props": [ @@ -20075,7 +20075,7 @@ ] }, { - "uuid": "411f33fd-1e50-4b30-bfc9-f55c681a5a1f", + "uuid": "bd93de8f-8945-4d39-bec5-73c94ce51455", "control-id": "cis_rhel10_2-1.22", "description": "The description for control-id cis_rhel10_2-1.22.", "props": [ @@ -20088,7 +20088,7 @@ ] }, { - "uuid": "a3139ca4-f329-4a41-9232-1a520e9f7794", + "uuid": "8dce80e3-aa27-471d-8e17-90ec2d2fc040", "control-id": "cis_rhel10_2-2.1", "description": "No notes for control-id 2.2.1.", "props": [ @@ -20105,7 +20105,7 @@ ] }, { - "uuid": "9a127e5d-96a4-4023-96a2-9f355dd924ab", + "uuid": "320942ca-e2b4-4e49-aad2-bd4fe5ea547a", "control-id": "cis_rhel10_2-2.3", "description": "No notes for control-id 2.2.3.", "props": [ @@ -20122,7 +20122,7 @@ ] }, { - "uuid": "0f283a48-da4b-4716-8dc6-173a31f0d251", + "uuid": "1dade881-0b2d-4954-8d26-e922491e19ca", "control-id": "cis_rhel10_2-2.4", "description": "No notes for control-id 2.2.4.", "props": [ @@ -20139,7 +20139,7 @@ ] }, { - "uuid": "e9a2ad33-ed23-472e-bcd0-84a9c13f1039", + "uuid": "101f7529-3b3f-434e-9123-dbc2f19215f0", "control-id": "cis_rhel10_2-3.1", "description": "No notes for control-id 2.3.1.", "props": [ @@ -20151,7 +20151,7 @@ ] }, { - "uuid": "e74199aa-917b-400c-9c53-603971a0245c", + "uuid": "a6c3b6f2-efff-47f2-9d4e-8da26dd142d2", "control-id": "cis_rhel10_2-3.2", "description": "No notes for control-id 2.3.2.", "props": [ @@ -20168,7 +20168,7 @@ ] }, { - "uuid": "e8ee41ef-1e12-4d45-b8b0-9df1c2422684", + "uuid": "069f34a2-8b80-4dd3-8991-7c39602a8738", "control-id": "cis_rhel10_2-3.3", "description": "No notes for control-id 2.3.3.", "props": [ @@ -20185,7 +20185,7 @@ ] }, { - "uuid": "9e6d5ebc-2014-4616-b2fd-6117b0d93688", + "uuid": "dad498d1-d23c-4c64-b4a8-19b74d108549", "control-id": "cis_rhel10_2-4.1.1", "description": "No notes for control-id 2.4.1.1.", "props": [ @@ -20207,7 +20207,7 @@ ] }, { - "uuid": "ac1d66b6-72ab-47f1-878c-6463b4af7b5b", + "uuid": "5ac3151e-c3bc-4187-bfba-e3baec9ec323", "control-id": "cis_rhel10_2-4.1.2", "description": "No notes for control-id 2.4.1.2.", "props": [ @@ -20234,7 +20234,7 @@ ] }, { - "uuid": "dcc340fe-4fa2-4c08-a0ee-649197b5a0a4", + "uuid": "a0a76670-475d-4f56-96e1-6872dbc3cb20", "control-id": "cis_rhel10_2-4.1.3", "description": "No notes for control-id 2.4.1.3.", "props": [ @@ -20261,7 +20261,7 @@ ] }, { - "uuid": "c64b7ee8-06ac-4c05-8e0a-c2528bf9763c", + "uuid": "b37f0f26-f287-40ed-a75d-5fb2682bdff8", "control-id": "cis_rhel10_2-4.1.4", "description": "No notes for control-id 2.4.1.4.", "props": [ @@ -20288,7 +20288,7 @@ ] }, { - "uuid": "60dca3dc-3b39-456f-a255-f60f4a2f3f70", + "uuid": "94b8f9a1-ff0f-4d93-b30a-e9c5046d0cf0", "control-id": "cis_rhel10_2-4.1.5", "description": "No notes for control-id 2.4.1.5.", "props": [ @@ -20315,7 +20315,7 @@ ] }, { - "uuid": "c4829ff5-cbc6-4490-8291-5db6d94a709c", + "uuid": "c86852df-fab6-4115-8226-0135f01af63e", "control-id": "cis_rhel10_2-4.1.6", "description": "No notes for control-id 2.4.1.6.", "props": [ @@ -20342,7 +20342,7 @@ ] }, { - "uuid": "ff7e1cf3-dfb3-436e-bc01-7e90d485cba6", + "uuid": "de5c01c9-c668-4819-84ad-8eb5bd935b6e", "control-id": "cis_rhel10_2-4.1.7", "description": "No notes for control-id 2.4.1.7.", "props": [ @@ -20369,7 +20369,7 @@ ] }, { - "uuid": "1be62c1a-a850-47c1-959a-a52c764cf767", + "uuid": "e272f3d4-c4f4-4615-8040-6f72126e0229", "control-id": "cis_rhel10_2-4.1.8", "description": "No notes for control-id 2.4.1.8.", "props": [ @@ -20396,7 +20396,7 @@ ] }, { - "uuid": "25873000-6ee7-48bb-82ff-1ae55580b793", + "uuid": "4e788d55-0af6-49bc-b2b1-30136fa43a03", "control-id": "cis_rhel10_2-4.1.9", "description": "No notes for control-id 2.4.1.9.", "props": [ @@ -20433,7 +20433,7 @@ ] }, { - "uuid": "f2921c3f-0289-41d4-885d-a49f6cea59d8", + "uuid": "b91712d4-a297-4b52-9906-e96cc5a108c3", "control-id": "cis_rhel10_2-4.2.1", "description": "No notes for control-id 2.4.2.1.", "props": [ @@ -20470,7 +20470,7 @@ ] }, { - "uuid": "b43023cc-fc1b-4bc9-aacc-9474c8ebd193", + "uuid": "68c2dcce-b73d-43aa-8333-c133bb74008f", "control-id": "cis_rhel10_3-1.1", "description": "The description for control-id cis_rhel10_3-1.1.", "props": [ @@ -20483,7 +20483,7 @@ ] }, { - "uuid": "04d42112-563a-42f7-80dc-f84c74faea85", + "uuid": "edf2b954-658b-447e-b3dc-9fc7ffafd3f3", "control-id": "cis_rhel10_3-2.1", "description": "No notes for control-id 3.2.1.", "props": [ @@ -20500,7 +20500,7 @@ ] }, { - "uuid": "8c324452-13b9-4f93-8609-cd3249a2dc12", + "uuid": "c4502c71-e566-460e-a888-8b6b03e8ddf5", "control-id": "cis_rhel10_3-2.2", "description": "No notes for control-id 3.2.2.", "props": [ @@ -20517,7 +20517,7 @@ ] }, { - "uuid": "67f6b7d8-1465-4cfa-90b3-b555f659bc66", + "uuid": "cdced84c-7a22-4686-a926-035308a28464", "control-id": "cis_rhel10_3-2.3", "description": "No notes for control-id 3.2.3.", "props": [ @@ -20534,7 +20534,7 @@ ] }, { - "uuid": "700c0291-90f2-4f67-8f69-09843641a7d9", + "uuid": "36745ce1-f467-4dad-bfd5-48f1d222b2be", "control-id": "cis_rhel10_3-2.4", "description": "No notes for control-id 3.2.4.", "props": [ @@ -20551,7 +20551,7 @@ ] }, { - "uuid": "ef360d6e-3841-47cb-94aa-10fd5b4fc244", + "uuid": "326ec632-e1ad-4b6b-b568-bb2a664d225e", "control-id": "cis_rhel10_3-2.5", "description": "No notes for control-id 3.2.5.", "props": [ @@ -20568,7 +20568,7 @@ ] }, { - "uuid": "e9ebae38-1aaa-4991-9272-d99a28a641c7", + "uuid": "bc994203-c466-41d0-ac6c-75b1e52cd02e", "control-id": "cis_rhel10_3-2.6", "description": "No notes for control-id 3.2.6.", "props": [ @@ -20585,7 +20585,7 @@ ] }, { - "uuid": "8f155474-1e5c-480a-978a-7b6c7d4c1cb8", + "uuid": "ec6f0205-e61e-4905-95ed-c4dc621501c4", "control-id": "cis_rhel10_3-3.1.1", "description": "No notes for control-id 3.3.1.1.", "props": [ @@ -20602,7 +20602,7 @@ ] }, { - "uuid": "9df0c18f-0f5f-479e-bbcb-ca8287f4ed73", + "uuid": "33108f53-0b60-4f17-a078-65ab307de7c0", "control-id": "cis_rhel10_3-3.1.2", "description": "No notes for control-id 3.3.1.2.", "props": [ @@ -20619,7 +20619,7 @@ ] }, { - "uuid": "f6675a54-4881-42bf-8082-78276bada2a1", + "uuid": "08e6618c-8ce5-4db2-bd47-d48f274cb7a3", "control-id": "cis_rhel10_3-3.1.3", "description": "No notes for control-id 3.3.1.3.", "props": [ @@ -20636,7 +20636,7 @@ ] }, { - "uuid": "7d7d1cc3-f196-46aa-bdb3-42fb2af71228", + "uuid": "2a32a69c-a61c-41be-8895-c53bc6e2bed2", "control-id": "cis_rhel10_3-3.1.4", "description": "No notes for control-id 3.3.1.4.", "props": [ @@ -20653,7 +20653,7 @@ ] }, { - "uuid": "34c3bf24-a823-421b-91ec-6e24dc237a28", + "uuid": "005d9772-6b83-475c-a661-781f04866a88", "control-id": "cis_rhel10_3-3.1.5", "description": "No notes for control-id 3.3.1.5.", "props": [ @@ -20670,7 +20670,7 @@ ] }, { - "uuid": "061c0b03-47e7-4e29-8cb2-4fbd7a98fb54", + "uuid": "64021523-aa40-459b-a188-01ef7aa07848", "control-id": "cis_rhel10_3-3.1.6", "description": "No notes for control-id 3.3.1.6.", "props": [ @@ -20687,7 +20687,7 @@ ] }, { - "uuid": "229105c4-d371-41f1-9816-5de748645bf6", + "uuid": "fc9f0bad-37fb-4cb9-ba1e-5354775ae3c8", "control-id": "cis_rhel10_3-3.1.7", "description": "No notes for control-id 3.3.1.7.", "props": [ @@ -20704,7 +20704,7 @@ ] }, { - "uuid": "c9734563-9611-43e3-b0fa-a65b1dc01df2", + "uuid": "f11efb8e-6d8d-44b7-8d5d-c72a73c5dc9c", "control-id": "cis_rhel10_3-3.1.8", "description": "No notes for control-id 3.3.1.8.", "props": [ @@ -20721,7 +20721,7 @@ ] }, { - "uuid": "70c47c0c-5ba5-4473-80f9-f82264619695", + "uuid": "67c729d4-1a9d-421c-a2f6-48f197a31c6b", "control-id": "cis_rhel10_3-3.1.9", "description": "No notes for control-id 3.3.1.9.", "props": [ @@ -20738,7 +20738,7 @@ ] }, { - "uuid": "e080c966-a366-492e-8004-1473e7e3a2e8", + "uuid": "c035b550-2e1b-45ca-99a7-95d22962836e", "control-id": "cis_rhel10_3-3.1.10", "description": "No notes for control-id 3.3.1.10.", "props": [ @@ -20755,7 +20755,7 @@ ] }, { - "uuid": "04ec1903-0b8c-4cfa-9137-3a3881fa9ef4", + "uuid": "9c8ddf45-f169-41ce-bbff-74e4922801c3", "control-id": "cis_rhel10_3-3.1.11", "description": "No notes for control-id 3.3.1.11.", "props": [ @@ -20772,7 +20772,7 @@ ] }, { - "uuid": "bee4f8ab-3e68-43c4-8321-5cb1e477d46b", + "uuid": "38be95c2-1051-477a-b1b6-4d27877d055b", "control-id": "cis_rhel10_3-3.1.12", "description": "No notes for control-id 3.3.1.12.", "props": [ @@ -20789,7 +20789,7 @@ ] }, { - "uuid": "de9f79d8-65c8-4d27-9e26-6aa1928384af", + "uuid": "288288fc-95a6-453f-ac72-1a3d54c2e3c6", "control-id": "cis_rhel10_3-3.1.13", "description": "No notes for control-id 3.3.1.13.", "props": [ @@ -20806,7 +20806,7 @@ ] }, { - "uuid": "b8a18433-9fc8-4743-baa3-2668d488cf7c", + "uuid": "40857b3f-6f27-4adc-b770-5d3d379b9d5b", "control-id": "cis_rhel10_3-3.1.14", "description": "No notes for control-id 3.3.1.14.", "props": [ @@ -20823,7 +20823,7 @@ ] }, { - "uuid": "88dd0316-32ad-4030-91ba-105cb5cd2aad", + "uuid": "a8dbe686-7f0d-4588-b886-3869c9e7de6c", "control-id": "cis_rhel10_3-3.1.15", "description": "No notes for control-id 3.3.1.15.", "props": [ @@ -20840,7 +20840,7 @@ ] }, { - "uuid": "10a5adff-f55a-44b1-95d8-db7c5bbe1b80", + "uuid": "e42c93fd-731e-4aa3-835b-e2fc69f48d0e", "control-id": "cis_rhel10_3-3.1.16", "description": "No notes for control-id 3.3.1.16.", "props": [ @@ -20857,7 +20857,7 @@ ] }, { - "uuid": "41466824-7684-4c4d-9794-7a363a22c3c1", + "uuid": "78b3cdbd-eb34-47fa-b49c-519d81d223ec", "control-id": "cis_rhel10_3-3.1.17", "description": "No notes for control-id 3.3.1.17.", "props": [ @@ -20874,7 +20874,7 @@ ] }, { - "uuid": "ce4d650b-2b53-4bea-a399-4839b016a4ef", + "uuid": "14504616-697e-44bb-8677-1a0621007294", "control-id": "cis_rhel10_3-3.1.18", "description": "No notes for control-id 3.3.1.18.", "props": [ @@ -20891,7 +20891,7 @@ ] }, { - "uuid": "85953144-46ad-4527-847f-706d53b7bd7c", + "uuid": "f4c3040f-74bf-4595-8731-a0c5b1869bff", "control-id": "cis_rhel10_3-3.2.1", "description": "No notes for control-id 3.3.2.1.", "props": [ @@ -20908,7 +20908,7 @@ ] }, { - "uuid": "ec5d1e0d-dc70-4121-a029-3850d4ed67b7", + "uuid": "ac862856-d611-49d5-9ca1-c096c87677b4", "control-id": "cis_rhel10_3-3.2.2", "description": "No notes for control-id 3.3.2.2.", "props": [ @@ -20925,7 +20925,7 @@ ] }, { - "uuid": "afa3a5b2-b34b-4b49-9086-369285aa32df", + "uuid": "6db94fe6-8e6d-4171-9894-c184b3f0f80f", "control-id": "cis_rhel10_3-3.2.3", "description": "No notes for control-id 3.3.2.3.", "props": [ @@ -20942,7 +20942,7 @@ ] }, { - "uuid": "997c5f5a-2558-43d9-a4cf-2918e6ae29e9", + "uuid": "a15789b7-e95a-4b42-a93a-5f4058bce1ee", "control-id": "cis_rhel10_3-3.2.4", "description": "No notes for control-id 3.3.2.4.", "props": [ @@ -20959,7 +20959,7 @@ ] }, { - "uuid": "81ac8855-f02e-473d-afe7-8b665576102a", + "uuid": "167a50d6-468a-4050-8910-88f578f4fc8a", "control-id": "cis_rhel10_3-3.2.5", "description": "No notes for control-id 3.3.2.5.", "props": [ @@ -20976,7 +20976,7 @@ ] }, { - "uuid": "1d93f0f7-8464-4768-a62f-5f7b3e22907c", + "uuid": "5078e423-5bd5-403b-a850-c973fa19ac7f", "control-id": "cis_rhel10_3-3.2.6", "description": "No notes for control-id 3.3.2.6.", "props": [ @@ -20993,7 +20993,7 @@ ] }, { - "uuid": "212968f2-863b-4b59-a4d6-9ca34695b32b", + "uuid": "38e87f04-3a27-4618-bf17-793e712746ca", "control-id": "cis_rhel10_3-3.2.7", "description": "No notes for control-id 3.3.2.7.", "props": [ @@ -21010,7 +21010,7 @@ ] }, { - "uuid": "7c162364-0696-45fa-be88-096de9b5a0e9", + "uuid": "4d7f12e0-b52f-465a-a9f0-2d2e90eae04b", "control-id": "cis_rhel10_3-3.2.8", "description": "No notes for control-id 3.3.2.8.", "props": [ @@ -21027,7 +21027,7 @@ ] }, { - "uuid": "31542171-b419-4089-b6c1-67cee6db2aaf", + "uuid": "ea8a166b-b178-409f-ab40-0fb3b8100d1d", "control-id": "cis_rhel10_4-1.1", "description": "No notes for control-id 4.1.1.", "props": [ @@ -21044,7 +21044,7 @@ ] }, { - "uuid": "4d7099ce-afaa-41a7-af7d-cf7238dbde23", + "uuid": "ad51a099-a1c1-472a-95dd-ef5521f893b1", "control-id": "cis_rhel10_4-1.2", "description": "No notes for control-id 4.1.2.", "props": [ @@ -21061,7 +21061,7 @@ ] }, { - "uuid": "49ae3aac-7bf4-4326-b4d0-55ab885ba806", + "uuid": "247c7555-a949-4b0b-a02e-80e49a5a5c95", "control-id": "cis_rhel10_4-1.3", "description": "No notes for control-id 4.1.3.", "props": [ @@ -21078,7 +21078,7 @@ ] }, { - "uuid": "2d4b54b5-7c2d-44e1-a4c7-48c45b6c4ab3", + "uuid": "5750819e-f5bd-427c-905f-b4d9a4027c1f", "control-id": "cis_rhel10_4-1.4", "description": "The description for control-id cis_rhel10_4-1.4.", "props": [ @@ -21086,12 +21086,12 @@ "name": "implementation-status", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "alternative", - "remarks": "No notes for control-id 4.1.4." + "remarks": "There is not an easy way to do this for only active zones using OVAL.\nFor now, there are are no rules for this control." } ] }, { - "uuid": "8c062afe-dfe9-4a85-8486-17b6d5ddb699", + "uuid": "52c20668-28d4-4d32-862f-89e7a9d32ebc", "control-id": "cis_rhel10_4-1.5", "description": "Firewalld in Red Hat Enterprise Linux 10 accepts loopback traffic by default.", "props": [ @@ -21108,7 +21108,7 @@ ] }, { - "uuid": "178b083f-9b89-431d-be70-1efb67e851a9", + "uuid": "e87ca923-3dd8-4a97-adbb-07a8781650b5", "control-id": "cis_rhel10_4-1.6", "description": "The description for control-id cis_rhel10_4-1.6.", "props": [ @@ -21121,7 +21121,7 @@ ] }, { - "uuid": "94cce221-9329-442f-8386-b57eed88e70f", + "uuid": "d84354ec-e7b8-4e96-a68e-e612853f92a2", "control-id": "cis_rhel10_4-1.7", "description": "The description for control-id cis_rhel10_4-1.7.", "props": [ @@ -21134,7 +21134,7 @@ ] }, { - "uuid": "ddb9675a-a890-46a1-be2a-2ba89f142ae4", + "uuid": "aee1d4bc-5586-43a2-8145-46d6b768d4be", "control-id": "cis_rhel10_5-1.1", "description": "No notes for control-id 5.1.1.", "props": [ @@ -21191,7 +21191,7 @@ ] }, { - "uuid": "4ee92508-9a67-46e6-ad96-dd1224f9430b", + "uuid": "c1721ea4-98e8-4f13-b741-aef991e4c806", "control-id": "cis_rhel10_5-1.2", "description": "No notes for control-id 5.1.2.", "props": [ @@ -21218,7 +21218,7 @@ ] }, { - "uuid": "2801d089-2ec9-46ce-b6ea-ce550167f6e1", + "uuid": "e98f5870-619d-47cc-9f0c-7233d3f2481f", "control-id": "cis_rhel10_5-1.3", "description": "No notes for control-id 5.1.3.", "props": [ @@ -21245,7 +21245,7 @@ ] }, { - "uuid": "c451d056-34a3-4426-9e34-32dc2b36f8e6", + "uuid": "fca1f36b-f546-4099-8f24-3dd17e1e5759", "control-id": "cis_rhel10_5-1.4", "description": "No notes for control-id 5.1.4.", "props": [ @@ -21262,7 +21262,7 @@ ] }, { - "uuid": "e934ae07-560a-4df6-aa64-a3b13969a5b1", + "uuid": "f8b5bcac-1f3b-4f8d-889e-d33601f2ca11", "control-id": "cis_rhel10_5-1.5", "description": "No notes for control-id 5.1.5.", "props": [ @@ -21279,7 +21279,7 @@ ] }, { - "uuid": "576b49b6-7ce1-4ff3-a92d-d531a927bd53", + "uuid": "9847a31c-cc5c-4cf0-88a1-7512e1e57fc5", "control-id": "cis_rhel10_5-1.6", "description": "No notes for control-id 5.1.6.", "props": [ @@ -21296,7 +21296,7 @@ ] }, { - "uuid": "18748217-8ff1-42c1-bc4b-613ec6eddb87", + "uuid": "06210efb-039f-4b03-bc53-c6b5a78d574c", "control-id": "cis_rhel10_5-1.7", "description": "The requirement gives an example of 45 seconds, but is flexible about the values. It is only\nnecessary to ensure there is a timeout configured in alignment to the site policy.", "props": [ @@ -21318,7 +21318,7 @@ ] }, { - "uuid": "ec808b05-1a2e-4a8b-a2b8-358292f4f59b", + "uuid": "1a6eb553-f204-4afb-920d-eea67d13c389", "control-id": "cis_rhel10_5-1.8", "description": "No notes for control-id 5.1.8.", "props": [ @@ -21335,7 +21335,7 @@ ] }, { - "uuid": "bfecdbda-5bf7-41d4-9b90-e27dd6a3ac7a", + "uuid": "80a49b2a-3f75-45c9-aa9e-c6a6888c265a", "control-id": "cis_rhel10_5-1.9", "description": "No notes for control-id 5.1.9.", "props": [ @@ -21352,7 +21352,7 @@ ] }, { - "uuid": "3f1b79b7-efca-44a3-ad4a-4dcf493b5143", + "uuid": "aede351c-8aa3-447f-a7e7-35ed3239ed68", "control-id": "cis_rhel10_5-1.10", "description": "No notes for control-id 5.1.10.", "props": [ @@ -21369,7 +21369,7 @@ ] }, { - "uuid": "4aa242e8-7e92-46ff-977f-87cc6e48db22", + "uuid": "e7fad58c-9957-4f8f-8fa3-6b0103143605", "control-id": "cis_rhel10_5-1.11", "description": "No notes for control-id 5.1.11.", "props": [ @@ -21386,7 +21386,7 @@ ] }, { - "uuid": "2c675924-c1cf-4358-8879-8828bd6c9740", + "uuid": "67f6b3b4-000d-43c6-af21-e62fa69e3166", "control-id": "cis_rhel10_5-1.12", "description": "The description for control-id cis_rhel10_5-1.12.", "props": [ @@ -21404,7 +21404,7 @@ ] }, { - "uuid": "2cf5cf3d-d417-4274-880c-f0e010097a92", + "uuid": "27fe78b5-6a14-4058-ab55-1152f9806eb8", "control-id": "cis_rhel10_5-1.13", "description": "No notes for control-id 5.1.13.", "props": [ @@ -21421,7 +21421,7 @@ ] }, { - "uuid": "84f38a4a-7f70-41eb-affd-033a2b1825c2", + "uuid": "fd35568c-26fd-45bf-b534-f8a28751707f", "control-id": "cis_rhel10_5-1.14", "description": "The CIS benchmark is not opinionated about which loglevel is selected here. Here, this\nprofile uses VERBOSE by default, as it allows for the capture of login and logout activity\nas well as key fingerprints.", "props": [ @@ -21438,7 +21438,7 @@ ] }, { - "uuid": "fe9e3755-e872-4321-bd8e-ae1195ac0ff3", + "uuid": "1bc64887-1c12-47b4-8bf3-1fbaeede881a", "control-id": "cis_rhel10_5-1.15", "description": "No notes for control-id 5.1.15.", "props": [ @@ -21455,7 +21455,7 @@ ] }, { - "uuid": "45ed5415-0a51-49f6-bdb2-2ba0fd543de9", + "uuid": "125a40df-eaa5-4a84-b02e-6c71feb16ce2", "control-id": "cis_rhel10_5-1.16", "description": "No notes for control-id 5.1.16.", "props": [ @@ -21472,7 +21472,7 @@ ] }, { - "uuid": "49fd91dc-4311-41f9-91ce-1be42243253c", + "uuid": "639e04e4-8797-4972-92dc-2379e907ab31", "control-id": "cis_rhel10_5-1.17", "description": "No notes for control-id 5.1.17.", "props": [ @@ -21489,7 +21489,7 @@ ] }, { - "uuid": "fc437f66-3170-43b6-9a9c-5d1955f787ab", + "uuid": "3806468f-2aae-4f2c-a2c9-3015daf91781", "control-id": "cis_rhel10_5-1.18", "description": "No notes for control-id 5.1.18.", "props": [ @@ -21506,7 +21506,7 @@ ] }, { - "uuid": "d858f785-dbb8-4acd-b908-07249266b86b", + "uuid": "e5b24c46-abd1-42be-96e5-43530985649b", "control-id": "cis_rhel10_5-1.19", "description": "No notes for control-id 5.1.19.", "props": [ @@ -21523,7 +21523,7 @@ ] }, { - "uuid": "af9c9f7f-4db0-46e8-8545-ba4ab4220c06", + "uuid": "26922d3d-899a-461a-abaa-62e56784b979", "control-id": "cis_rhel10_5-1.20", "description": "No notes for control-id 5.1.20.", "props": [ @@ -21540,7 +21540,7 @@ ] }, { - "uuid": "d6371655-55b5-4c1b-b36b-0066225ede20", + "uuid": "2330f9a2-20a4-4198-9106-337ccf6f5791", "control-id": "cis_rhel10_5-1.21", "description": "No notes for control-id 5.1.21.", "props": [ @@ -21557,7 +21557,7 @@ ] }, { - "uuid": "1773c6b9-b2ae-4662-afc9-fa6871f16ee6", + "uuid": "2b3d8b58-cc8e-422e-b9e4-97a776ae4193", "control-id": "cis_rhel10_5-1.22", "description": "No notes for control-id 5.1.22.", "props": [ @@ -21574,7 +21574,7 @@ ] }, { - "uuid": "e12087dd-ee7c-4737-acfa-6715fef016fd", + "uuid": "b24fefe3-af86-4898-a45b-f642a7232ed1", "control-id": "cis_rhel10_5-2.1", "description": "No notes for control-id 5.2.1.", "props": [ @@ -21591,7 +21591,7 @@ ] }, { - "uuid": "b72136cb-239d-4834-b43e-5e27e8575abf", + "uuid": "a07be9c4-125e-4f94-bd64-2feeab143ecb", "control-id": "cis_rhel10_5-2.2", "description": "No notes for control-id 5.2.2.", "props": [ @@ -21608,7 +21608,7 @@ ] }, { - "uuid": "b9b0c845-1bba-4281-a307-43932549b270", + "uuid": "cc372dd3-0630-493a-bc5c-af90f0cc92ac", "control-id": "cis_rhel10_5-2.3", "description": "No notes for control-id 5.2.3.", "props": [ @@ -21625,7 +21625,7 @@ ] }, { - "uuid": "77d76e88-a81b-4994-ac31-5428d8d8f084", + "uuid": "eaa7cfdc-b996-49d6-a66c-ff6d99dce849", "control-id": "cis_rhel10_5-2.5", "description": "No notes for control-id 5.2.5.", "props": [ @@ -21642,7 +21642,7 @@ ] }, { - "uuid": "f9cdfeeb-5643-4b29-b475-5a33da0e0050", + "uuid": "c9476e2a-c58e-42ef-aa22-e1691aa4863e", "control-id": "cis_rhel10_5-2.6", "description": "No notes for control-id 5.2.6.", "props": [ @@ -21659,7 +21659,7 @@ ] }, { - "uuid": "552a63b7-9208-4a03-a1d3-ae77bfb90979", + "uuid": "377c988a-3440-4ad6-b410-12f9d89434cc", "control-id": "cis_rhel10_5-2.7", "description": "Members of \"wheel\" or GID 0 groups are checked by default if the group option is not set for\npam_wheel.so module. The recommendation states the group should be empty to reinforce the\nuse of \"sudo\" for privileged access. Therefore, members of these groups should be manually\nchecked or a different group should be informed.", "props": [ @@ -21681,7 +21681,7 @@ ] }, { - "uuid": "f80a088e-4039-4210-ad1a-86e8ee734329", + "uuid": "e93a2216-2ad9-47db-a275-dd3bccd2c167", "control-id": "cis_rhel10_5-3.1.1", "description": "This requirement is hard to be automated without any specific requirement. The policy even\nstates that provided commands are examples, other custom settings might be in place and the\nsettings might be different depending on site policies. The other rules will already make\nsure there is a correct autheselect profile regardless of the existing settings. It is\nnecessary to better discuss with CIS Community.", "props": [ @@ -21693,7 +21693,7 @@ ] }, { - "uuid": "8fc2fb9d-8058-46fb-a494-c2f29ac31439", + "uuid": "cb1219be-27be-4a5b-baaa-3e73234a0321", "control-id": "cis_rhel10_5-3.1.2", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.1.", "props": [ @@ -21715,7 +21715,7 @@ ] }, { - "uuid": "18f07ca1-056a-4f60-aa46-523acb30077c", + "uuid": "dac58b24-0373-4b45-aea8-75913da01bc9", "control-id": "cis_rhel10_5-3.1.3", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.2.", "props": [ @@ -21742,7 +21742,7 @@ ] }, { - "uuid": "931bc09b-e8c3-42d2-9e91-42e0552a3a97", + "uuid": "7f3291f1-479d-45b2-b01c-806bd19d0859", "control-id": "cis_rhel10_5-3.1.4", "description": "The module is properly enabled by the rules mentioned in related_rules.\nRequirements in 5.3.2.3 use these rules.", "props": [ @@ -21754,7 +21754,7 @@ ] }, { - "uuid": "b93855a9-cc64-4ad3-84e1-2cc3e204a548", + "uuid": "385f44a1-34e1-4d82-806e-6f1c1932422c", "control-id": "cis_rhel10_5-3.1.5", "description": "No notes for control-id 5.3.1.5.", "props": [ @@ -21771,7 +21771,7 @@ ] }, { - "uuid": "046395d6-8cc6-44bf-a55a-c09c701cba52", + "uuid": "ad5876b5-f47d-4ca4-b4a2-1f2779744e10", "control-id": "cis_rhel10_5-3.2.1.1", "description": "No notes for control-id 5.3.2.1.1.", "props": [ @@ -21788,7 +21788,7 @@ ] }, { - "uuid": "7354f71e-d522-4f4c-8c3a-993edaa17734", + "uuid": "549ac367-5ab1-403a-8ae8-c98c13a91375", "control-id": "cis_rhel10_5-3.2.1.2", "description": "The policy also accepts value 0, which means the locked accounts should be manually unlocked\nby an administrator. However, it also mentions that using value 0 can facilitate a DoS\nattack to legitimate users.", "props": [ @@ -21805,7 +21805,7 @@ ] }, { - "uuid": "949fd5c1-7a5d-401e-99d5-957522e81c55", + "uuid": "d1fe1e61-5b7a-485f-8057-8556a1530a43", "control-id": "cis_rhel10_5-3.2.2.1", "description": "No notes for control-id 5.3.2.2.1.", "props": [ @@ -21822,7 +21822,7 @@ ] }, { - "uuid": "f766dd68-0d4b-450c-a1e9-e6d498598cf9", + "uuid": "e385112e-9b91-4751-8bb7-64191d02db64", "control-id": "cis_rhel10_5-3.2.2.2", "description": "No notes for control-id 5.3.2.2.2.", "props": [ @@ -21839,7 +21839,7 @@ ] }, { - "uuid": "651c4ae1-b241-4083-b627-363109593f82", + "uuid": "cad0866e-eda5-49d6-9770-3625e9d4ac42", "control-id": "cis_rhel10_5-3.2.2.3", "description": "This requirement is expected to be manual. However, in previous versions of the policy\nit was already automated the configuration of \"minclass\" option. This posture was kept for\nRHEL 10 in this new version. Rules related to other options are informed in related_rules.\nIn short, minclass=4 alone can achieve the same result achieved by the combination of the\nother 4 options mentioned in the policy.", "props": [ @@ -21856,7 +21856,7 @@ ] }, { - "uuid": "9f4ecb30-1f93-4d78-976f-6e0d37014bb9", + "uuid": "ab3ad3b9-78ad-4e85-94fc-3680e9d31d3d", "control-id": "cis_rhel10_5-3.2.2.4", "description": "No notes for control-id 5.3.2.2.4.", "props": [ @@ -21873,7 +21873,7 @@ ] }, { - "uuid": "7b89821c-ea37-4e27-9251-92eb95b492da", + "uuid": "28a80e4b-f0db-44e9-ba2b-64f0de48c34d", "control-id": "cis_rhel10_5-3.2.2.5", "description": "No notes for control-id 5.3.2.2.5.", "props": [ @@ -21890,7 +21890,7 @@ ] }, { - "uuid": "35dcc171-93cb-4aa5-bcf6-d8eec20a8457", + "uuid": "fa670a51-718c-42e7-be7f-7eccdd07129b", "control-id": "cis_rhel10_5-3.2.2.6", "description": "No notes for control-id 5.3.2.2.6.", "props": [ @@ -21907,7 +21907,7 @@ ] }, { - "uuid": "0352b7a5-8293-4d8b-8cc7-cb9579f57eab", + "uuid": "d56e2646-d393-4675-ad22-6c1ad64cfe0a", "control-id": "cis_rhel10_5-3.2.2.7", "description": "No notes for control-id 5.3.2.2.7.", "props": [ @@ -21924,7 +21924,7 @@ ] }, { - "uuid": "893beb77-b0a7-478f-88b6-eea7cea3a5bd", + "uuid": "a160e200-c1c9-4ba2-bc30-fbf299270df4", "control-id": "cis_rhel10_5-3.2.3.1", "description": "Although mentioned in the section 5.3.3.3, there is no explicit requirement to configure\nretry option of pam_pwhistory. If come in the future, the rule accounts_password_pam_retry\ncan be used.", "props": [ @@ -21946,7 +21946,7 @@ ] }, { - "uuid": "1b04bee0-31cf-4103-8d04-780d7eb78315", + "uuid": "1ca506fd-d405-4d09-afcb-0b1f56e88fff", "control-id": "cis_rhel10_5-3.2.3.2", "description": "No notes for control-id 5.3.2.3.2.", "props": [ @@ -21963,7 +21963,7 @@ ] }, { - "uuid": "b6b2ecf2-46c1-4710-8024-7e2a1a0b9c11", + "uuid": "40718795-d28c-4ca9-ad34-fd7875759cbb", "control-id": "cis_rhel10_5-3.2.3.3", "description": "In RHEL 10 pam_pwhistory is enabled via authselect feature, as required in 5.3.1.4. The\nfeature automatically set \"use_authok\" option. In any case, we don't have a rule to check\nthis option specifically.", "props": [ @@ -21980,7 +21980,7 @@ ] }, { - "uuid": "50635af7-9bfa-44f4-aee7-6b7e4c5872e8", + "uuid": "77e78a55-dfdb-46d7-a93d-c6714601e2f6", "control-id": "cis_rhel10_5-3.2.4.1", "description": "The rule more specifically used in this requirement also satify the requirement 5.3.1.5.", "props": [ @@ -21997,7 +21997,7 @@ ] }, { - "uuid": "9c034d3a-ed2b-4c25-b625-abdbc21d8cea", + "uuid": "60b49144-8820-460c-97be-7b11c3129398", "control-id": "cis_rhel10_5-3.2.4.2", "description": "Usage of pam_unix.so module together with \"remember\" option is deprecated and is not\nrecommended by this policy. Instead, it should be used remember option of pam_pwhistory\nmodule, as required in 5.3.2.3.1. See here for more details about pam_unix.so:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1778929", "props": [ @@ -22014,7 +22014,7 @@ ] }, { - "uuid": "c2c57974-90cd-47dd-b8fa-cb281d740205", + "uuid": "d064631a-0dbb-40b9-9db9-f8537a3f41b5", "control-id": "cis_rhel10_5-3.2.4.3", "description": "Changes in logindefs mentioned in this requirement are more specifically covered by 5.4.1.4", "props": [ @@ -22036,7 +22036,7 @@ ] }, { - "uuid": "0f2ff70f-ff56-49a3-bb23-2d306f140f73", + "uuid": "45401ade-9cfc-4c04-9f7f-183bd56430fc", "control-id": "cis_rhel10_5-3.2.4.4", "description": "In RHEL 10 pam_unix is enabled by default in all authselect profiles already with the\nuse_authtok option set. In any case, we don't have a rule to check this option specifically,\nlike in 5.3.2.3.3.", "props": [ @@ -22053,7 +22053,7 @@ ] }, { - "uuid": "78abe432-f147-465c-bc6f-e1b8c5336135", + "uuid": "de92633f-6976-4267-b537-1d9e9714701b", "control-id": "cis_rhel10_5-4.1.1", "description": "No notes for control-id 5.4.1.1.", "props": [ @@ -22075,7 +22075,7 @@ ] }, { - "uuid": "23aa4e09-e890-49bf-a8b6-ac3f3dcb2935", + "uuid": "7c71dc15-cbd2-4b88-a197-c171272b039c", "control-id": "cis_rhel10_5-4.1.3", "description": "No notes for control-id 5.4.1.3.", "props": [ @@ -22097,7 +22097,7 @@ ] }, { - "uuid": "401cd63d-8bef-41c9-9d90-a5c33425a8a7", + "uuid": "a42c6352-b38f-4cab-aca6-995310e5224c", "control-id": "cis_rhel10_5-4.1.4", "description": "There's a \"new\" set of options in /etc/login.defs file to define the number of iterations\nperformed during the hashing process.", "props": [ @@ -22119,7 +22119,7 @@ ] }, { - "uuid": "db046713-c701-4765-b173-7c50e1501c01", + "uuid": "1d482823-0aee-46e9-a2e1-8406f90d6a5c", "control-id": "cis_rhel10_5-4.1.5", "description": "No notes for control-id 5.4.1.5.", "props": [ @@ -22141,7 +22141,7 @@ ] }, { - "uuid": "9df1589b-839e-4730-b3de-a6c0bb2967f2", + "uuid": "a54f46d6-5021-49d0-84e4-f151695f6009", "control-id": "cis_rhel10_5-4.1.6", "description": "No notes for control-id 5.4.1.6.", "props": [ @@ -22158,7 +22158,7 @@ ] }, { - "uuid": "39b926c9-1d91-4b6e-a563-ddc685c48a0e", + "uuid": "dbfa0276-d543-4ae1-b737-b68a96527af1", "control-id": "cis_rhel10_5-4.2.1", "description": "No notes for control-id 5.4.2.1.", "props": [ @@ -22175,7 +22175,7 @@ ] }, { - "uuid": "b2313a35-92a7-4d0b-82a0-da52aabebb48", + "uuid": "fbcb989e-c694-4e73-afa7-b62192ae20ff", "control-id": "cis_rhel10_5-4.2.2", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -22192,7 +22192,7 @@ ] }, { - "uuid": "35dd2df7-7e07-43c7-8892-30152649a23a", + "uuid": "5b1f4f50-52a1-493d-b782-26f696e45271", "control-id": "cis_rhel10_5-4.2.3", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -22209,7 +22209,7 @@ ] }, { - "uuid": "f5d26e70-3fee-411e-8b84-e0aa48ada1c9", + "uuid": "c90c3eaf-cebb-4204-a064-f2ef92017a00", "control-id": "cis_rhel10_5-4.2.4", "description": "No notes for control-id 5.4.2.4.", "props": [ @@ -22226,7 +22226,7 @@ ] }, { - "uuid": "0c830eb5-572f-4c06-80fb-b789f364d4be", + "uuid": "3c8e7ab9-ccc7-43aa-89f4-8c327b4777ad", "control-id": "cis_rhel10_5-4.2.5", "description": "No notes for control-id 5.4.2.5.", "props": [ @@ -22248,7 +22248,7 @@ ] }, { - "uuid": "9e4b9223-da06-47a8-b394-4dd18e92c3c2", + "uuid": "5a212ba4-9182-44d5-a725-bd52b1d160cf", "control-id": "cis_rhel10_5-4.2.6", "description": "No notes for control-id 5.4.2.6.", "props": [ @@ -22265,7 +22265,7 @@ ] }, { - "uuid": "84ace3bd-93be-42eb-a306-bd732edee53d", + "uuid": "08c05480-4b18-41ae-8c27-b77f7d1f021e", "control-id": "cis_rhel10_5-4.2.7", "description": "No notes for control-id 5.4.2.7.", "props": [ @@ -22287,7 +22287,7 @@ ] }, { - "uuid": "08404bb1-b9fb-491c-a715-337b2e2acc8e", + "uuid": "6ca3d001-5761-432e-a573-3472b688e828", "control-id": "cis_rhel10_5-4.2.8", "description": "No notes for control-id 5.4.2.8.", "props": [ @@ -22304,7 +22304,7 @@ ] }, { - "uuid": "cf82a37e-d44b-4b76-a5bf-dbf8f83ff4d4", + "uuid": "280dd212-eb54-4310-b7e4-3aca5bd9ffa5", "control-id": "cis_rhel10_5-4.3.2", "description": "No notes for control-id 5.4.3.2.", "props": [ @@ -22321,7 +22321,7 @@ ] }, { - "uuid": "1eec331d-48a0-45e8-b195-28f53ee19b59", + "uuid": "df9345b8-327d-4569-8ba2-8db20b8f90a2", "control-id": "cis_rhel10_5-4.3.3", "description": "No notes for control-id 5.4.3.3.", "props": [ @@ -22348,7 +22348,7 @@ ] }, { - "uuid": "2e9fa417-014c-4099-8146-ffe209b702c3", + "uuid": "27653769-55d7-4bb6-8a84-35b1122aa35e", "control-id": "cis_rhel10_6-1.1", "description": "No notes for control-id 6.1.1.", "props": [ @@ -22370,7 +22370,7 @@ ] }, { - "uuid": "0c6ea3bd-c76a-40ad-9ad0-ff35be031a7b", + "uuid": "e89026f9-589c-4d8a-8cb4-f50e1d9c578a", "control-id": "cis_rhel10_6-1.2", "description": "No notes for control-id 6.1.2.", "props": [ @@ -22387,7 +22387,7 @@ ] }, { - "uuid": "39cf5493-331f-4ba1-ab21-712c0254a19d", + "uuid": "28876aec-b1b9-4d7a-adac-2e0ca2131302", "control-id": "cis_rhel10_6-1.3", "description": "No notes for control-id 6.1.3.", "props": [ @@ -22404,7 +22404,7 @@ ] }, { - "uuid": "7cbed2fb-13c2-4c64-864a-04746285ef19", + "uuid": "857d9eae-2512-4251-be45-108f788621d8", "control-id": "cis_rhel10_6-2.1.1", "description": "No notes for control-id 6.2.1.1.", "props": [ @@ -22421,7 +22421,7 @@ ] }, { - "uuid": "25796ecf-2cb8-4863-9c14-fcf66cca9f41", + "uuid": "667a5915-3953-4352-b4dc-26e317981517", "control-id": "cis_rhel10_6-2.1.2", "description": "The description for control-id cis_rhel10_6-2.1.2.", "props": [ @@ -22434,7 +22434,7 @@ ] }, { - "uuid": "a28bc7eb-48f7-4343-b758-67678b41938e", + "uuid": "397f8c49-db0e-4e4b-ae88-99020dae000a", "control-id": "cis_rhel10_6-2.1.3", "description": "The description for control-id cis_rhel10_6-2.1.3.", "props": [ @@ -22447,7 +22447,7 @@ ] }, { - "uuid": "cbe24133-b1c3-46c6-9b4c-91a0d02c0184", + "uuid": "e3f479a4-bfbf-4903-9a51-68db50d27a54", "control-id": "cis_rhel10_6-2.1.4", "description": "No notes for control-id 6.2.1.4.", "props": [ @@ -22464,7 +22464,7 @@ ] }, { - "uuid": "3e5b8b19-24c6-405f-b5d9-e1dcdd7c7114", + "uuid": "7aa7ef61-c389-47b2-bde6-4d8bf5de5446", "control-id": "cis_rhel10_6-2.2.1.1", "description": "No notes for control-id 6.2.2.1.1.", "props": [ @@ -22481,7 +22481,7 @@ ] }, { - "uuid": "ee8d6286-1555-418d-a1db-fa02b345488c", + "uuid": "e63cdbae-8853-4866-9ee3-94f12fe1b8d7", "control-id": "cis_rhel10_6-2.2.1.2", "description": "The description for control-id cis_rhel10_6-2.2.1.2.", "props": [ @@ -22494,7 +22494,7 @@ ] }, { - "uuid": "ba96b376-4a9b-438b-9bf7-97c8a5b0dbe0", + "uuid": "541ca697-c33f-4475-9473-2c1aeec74945", "control-id": "cis_rhel10_6-2.2.1.3", "description": "No notes for control-id 6.2.2.1.3.", "props": [ @@ -22511,7 +22511,7 @@ ] }, { - "uuid": "fbd7c728-e45e-4aeb-b667-2c35abc3cb5b", + "uuid": "ccc27a1f-856b-487b-9954-aa26a066ae21", "control-id": "cis_rhel10_6-2.2.1.4", "description": "No notes for control-id 6.2.2.1.4.", "props": [ @@ -22528,7 +22528,7 @@ ] }, { - "uuid": "47543f1e-db1b-4006-bfd9-4f659810740c", + "uuid": "342d9d05-c0bb-4a89-aafe-5d5d1a119dd4", "control-id": "cis_rhel10_6-2.2.2", "description": "No notes for control-id 6.2.2.2.", "props": [ @@ -22545,7 +22545,7 @@ ] }, { - "uuid": "2c44c54c-489e-4b7c-baf6-8c4ad94a3228", + "uuid": "7f82d54b-45eb-46ac-b4a4-90fa23a3aeab", "control-id": "cis_rhel10_6-2.2.3", "description": "No notes for control-id 6.2.2.3.", "props": [ @@ -22562,7 +22562,7 @@ ] }, { - "uuid": "504b3d25-f670-4992-978a-ab4f34746033", + "uuid": "87d213be-3c02-42f0-9861-141683b3a7fa", "control-id": "cis_rhel10_6-2.2.4", "description": "No notes for control-id 6.2.2.4.", "props": [ @@ -22579,7 +22579,7 @@ ] }, { - "uuid": "e88f9437-82c1-4c55-be38-1d546e700dd5", + "uuid": "99f85b6b-4622-4f03-be28-b043effecef2", "control-id": "cis_rhel10_6-2.3.1", "description": "No notes for control-id 6.2.3.1.", "props": [ @@ -22591,7 +22591,7 @@ ] }, { - "uuid": "11796fd6-0f4c-47b0-adf0-d9962df3efa2", + "uuid": "4c5c55dc-bd5b-4011-b791-bc9761ac9305", "control-id": "cis_rhel10_6-2.3.2", "description": "No notes for control-id 6.2.3.2.", "props": [ @@ -22603,7 +22603,7 @@ ] }, { - "uuid": "f20c149a-b571-4527-83b3-5fbc7032b48d", + "uuid": "4db41c6b-4ced-43d7-ba7a-9f4d8477ff4e", "control-id": "cis_rhel10_6-2.3.3", "description": "No notes for control-id 6.2.3.3.", "props": [ @@ -22615,7 +22615,7 @@ ] }, { - "uuid": "1be8a33b-cd4f-4221-a1db-ded158d631fc", + "uuid": "9831d5e4-00cb-44b5-8743-b3782c743cbe", "control-id": "cis_rhel10_6-2.3.4", "description": "No notes for control-id 6.2.3.4.", "props": [ @@ -22627,7 +22627,7 @@ ] }, { - "uuid": "991bdf10-7ede-405e-ad0e-4317ee1c1b34", + "uuid": "14bd89c3-4d08-49cb-bffc-1ed703c4b3aa", "control-id": "cis_rhel10_6-2.3.5", "description": "The description for control-id cis_rhel10_6-2.3.5.", "props": [ @@ -22640,7 +22640,7 @@ ] }, { - "uuid": "d4cf194e-ea5a-421c-84cb-a5a707c9c806", + "uuid": "387eecd4-1a4f-4fc3-b92b-1ec915cdac46", "control-id": "cis_rhel10_6-2.3.6", "description": "The description for control-id cis_rhel10_6-2.3.6.", "props": [ @@ -22653,7 +22653,7 @@ ] }, { - "uuid": "f7bc783e-c1a3-41c0-90f0-d41efe7dc6d5", + "uuid": "8b6e0b2b-1e7e-49bf-bd12-62be54fa2f28", "control-id": "cis_rhel10_6-2.3.7", "description": "No notes for control-id 6.2.3.7.", "props": [ @@ -22665,7 +22665,7 @@ ] }, { - "uuid": "01520fed-f6da-4194-ba6e-c1b6a61646dd", + "uuid": "742ca32c-4234-4bdd-8866-1a6b2813944e", "control-id": "cis_rhel10_6-2.3.8", "description": "The description for control-id cis_rhel10_6-2.3.8.", "props": [ @@ -22678,7 +22678,7 @@ ] }, { - "uuid": "4e6d8538-04f2-4c85-a94a-6a80c37cf562", + "uuid": "ee2c62bc-d963-4448-9544-86bf09fd3369", "control-id": "cis_rhel10_6-2.4.1", "description": "It is not harmful to run these rules even if rsyslog is not installed or active.", "props": [ @@ -22705,7 +22705,7 @@ ] }, { - "uuid": "b95a70df-647c-40f1-9ec0-66acefc4eb00", + "uuid": "ed2bcfac-e582-462f-a958-96bd821620f9", "control-id": "cis_rhel10_7-1.1", "description": "No notes for control-id 7.1.1.", "props": [ @@ -22732,7 +22732,7 @@ ] }, { - "uuid": "fc085476-8ce9-4c1c-9bf5-96d8453c25b9", + "uuid": "9431b259-be8b-4416-b0f3-325a6f497a38", "control-id": "cis_rhel10_7-1.2", "description": "No notes for control-id 7.1.2.", "props": [ @@ -22759,7 +22759,7 @@ ] }, { - "uuid": "66058ad6-de29-4e2a-9e35-f4b85404f04f", + "uuid": "9bcd08ef-0429-4fbb-9dd0-19f6f1b8cfd0", "control-id": "cis_rhel10_7-1.3", "description": "No notes for control-id 7.1.3.", "props": [ @@ -22786,7 +22786,7 @@ ] }, { - "uuid": "dd3227c6-b4ef-4c75-ac9b-d5215bc15aef", + "uuid": "95111c28-3a94-4d14-9323-ca6981a49e29", "control-id": "cis_rhel10_7-1.4", "description": "No notes for control-id 7.1.4.", "props": [ @@ -22813,7 +22813,7 @@ ] }, { - "uuid": "e38d5f03-0cce-476f-a887-9640b2c6706c", + "uuid": "3cad9e08-dd08-4fa5-84c0-3e8c58214bb6", "control-id": "cis_rhel10_7-1.5", "description": "No notes for control-id 7.1.5.", "props": [ @@ -22840,7 +22840,7 @@ ] }, { - "uuid": "f5aa120c-3271-4bfe-b99a-1c9135605744", + "uuid": "ff2ee8db-0bc7-4c13-af05-d3bbde386ef1", "control-id": "cis_rhel10_7-1.6", "description": "No notes for control-id 7.1.6.", "props": [ @@ -22867,7 +22867,7 @@ ] }, { - "uuid": "b99e7640-8099-4567-bcbb-350d31273441", + "uuid": "92d302b5-7a76-413e-a4b5-36be67fb75ce", "control-id": "cis_rhel10_7-1.7", "description": "No notes for control-id 7.1.7.", "props": [ @@ -22894,7 +22894,7 @@ ] }, { - "uuid": "f63c0b11-757f-4fc0-91b8-42c3bf5c379c", + "uuid": "ef4aa3a5-50b0-4c62-b3ee-91c5628ea76d", "control-id": "cis_rhel10_7-1.8", "description": "No notes for control-id 7.1.8.", "props": [ @@ -22921,7 +22921,7 @@ ] }, { - "uuid": "38010076-b140-4da2-8db8-fd4d5095a72e", + "uuid": "579a2a03-0e69-4c5d-8031-fde2c24e4f01", "control-id": "cis_rhel10_7-1.9", "description": "No notes for control-id 7.1.9.", "props": [ @@ -22948,7 +22948,7 @@ ] }, { - "uuid": "9f077d96-e3df-46be-9a02-7d8ceafeff74", + "uuid": "bae54861-da1c-4088-9958-2300290619f5", "control-id": "cis_rhel10_7-1.10", "description": "No notes for control-id 7.1.10.", "props": [ @@ -22990,7 +22990,7 @@ ] }, { - "uuid": "40b9c64e-e1d8-4394-b3a3-1264087dcfbb", + "uuid": "6a4d2318-020b-43cd-b034-602923d25bd3", "control-id": "cis_rhel10_7-1.11", "description": "No notes for control-id 7.1.11.", "props": [ @@ -23012,7 +23012,7 @@ ] }, { - "uuid": "9518b664-218c-4d67-83d4-fd688a9bd653", + "uuid": "d211b6a5-c27c-423a-a75a-c35476ea417b", "control-id": "cis_rhel10_7-1.12", "description": "No notes for control-id 7.1.12.", "props": [ @@ -23034,7 +23034,7 @@ ] }, { - "uuid": "90b7c3eb-d27f-4f01-8427-6427b66d3074", + "uuid": "80f5553d-56c0-4e78-874a-0580ca049293", "control-id": "cis_rhel10_7-1.13", "description": "The description for control-id cis_rhel10_7-1.13.", "props": [ @@ -23047,7 +23047,7 @@ ] }, { - "uuid": "d13b9893-fb1b-4daa-a837-ad21c88fe44d", + "uuid": "ac8f03af-dfaf-47c5-8d0a-146d6946545b", "control-id": "cis_rhel10_7-2.1", "description": "No notes for control-id 7.2.1.", "props": [ @@ -23064,7 +23064,7 @@ ] }, { - "uuid": "2045b7dd-9ca0-497f-8783-843e6cb2b71b", + "uuid": "19b7ff52-a2b3-4afd-bc68-2ed7a3d18383", "control-id": "cis_rhel10_7-2.2", "description": "No notes for control-id 7.2.2.", "props": [ @@ -23081,7 +23081,7 @@ ] }, { - "uuid": "a45ab45d-19bc-4f04-a015-8e93800b7edb", + "uuid": "33c50e13-22a5-43c0-8c29-f402b78e24ac", "control-id": "cis_rhel10_7-2.3", "description": "No notes for control-id 7.2.3.", "props": [ @@ -23098,7 +23098,7 @@ ] }, { - "uuid": "868ce46f-1ded-4099-adec-a372d78412a7", + "uuid": "0c5408ef-f7c6-4310-accc-c8cfd8b398af", "control-id": "cis_rhel10_7-2.4", "description": "No notes for control-id 7.2.4.", "props": [ @@ -23115,7 +23115,7 @@ ] }, { - "uuid": "685727b9-a654-43e4-b4b2-1891a01c9c59", + "uuid": "5fa38e01-a792-421b-a9d8-f5b74ce4043d", "control-id": "cis_rhel10_7-2.5", "description": "No notes for control-id 7.2.5.", "props": [ @@ -23132,7 +23132,7 @@ ] }, { - "uuid": "a8385910-7bd8-4703-802e-6493db1fdebb", + "uuid": "f0029bf1-7590-4f75-8977-4946d5654fa0", "control-id": "cis_rhel10_7-2.6", "description": "No notes for control-id 7.2.6.", "props": [ @@ -23149,7 +23149,7 @@ ] }, { - "uuid": "36a33440-0b43-4d01-8153-05e1866f3869", + "uuid": "8c737fbe-0bfc-4ea6-8f19-05096c3f9a07", "control-id": "cis_rhel10_7-2.7", "description": "No notes for control-id 7.2.7.", "props": [ @@ -23166,7 +23166,7 @@ ] }, { - "uuid": "9e134818-f940-49fb-8cb0-9f881adbd818", + "uuid": "c44d014d-efe7-4b6c-94d4-210145cf88d9", "control-id": "cis_rhel10_7-2.8", "description": "No notes for control-id 7.2.8.", "props": [ @@ -23193,7 +23193,7 @@ ] }, { - "uuid": "9fbab687-18ee-49f7-81b8-813fa4224825", + "uuid": "0e064569-4716-4048-9374-6c5875522cac", "control-id": "cis_rhel10_7-2.9", "description": "No notes for control-id 7.2.9.", "props": [ diff --git a/component-definitions/rhel10/rhel10-cis_rhel10-l2_server/component-definition.json b/component-definitions/rhel10/rhel10-cis_rhel10-l2_server/component-definition.json index a9629ec2..7d9e67f3 100644 --- a/component-definitions/rhel10/rhel10-cis_rhel10-l2_server/component-definition.json +++ b/component-definitions/rhel10/rhel10-cis_rhel10-l2_server/component-definition.json @@ -3,8 +3,8 @@ "uuid": "6531a0d9-efde-405d-ba52-aab8178414c4", "metadata": { "title": "Component definition for rhel10", - "last-modified": "2025-12-16T14:22:47.573359+00:00", - "version": "4.7", + "last-modified": "2025-12-17T09:48:04.486986+00:00", + "version": "4.8", "oscal-version": "1.1.3" }, "components": [ @@ -6455,7 +6455,7 @@ ], "control-implementations": [ { - "uuid": "55f4d08a-8a9c-4e53-890b-42c74a77beb1", + "uuid": "5dc80808-3787-4762-b690-c04ffe527ae3", "source": "trestle://profiles/rhel10-cis_rhel10-l2_server/profile.json", "description": "Control implementation for cis", "props": [ @@ -6871,7 +6871,7 @@ ], "implemented-requirements": [ { - "uuid": "d66ed932-f9ba-4494-b151-56dcfcd3e6cc", + "uuid": "6ebf6bb8-9cf2-486d-b311-ffaf0ca66bb3", "control-id": "cis_rhel10_1-1.1.6", "description": "No notes for control-id 1.1.1.6.", "props": [ @@ -6888,7 +6888,7 @@ ] }, { - "uuid": "bae443c2-b7e5-4feb-b4b7-2a43ea07647b", + "uuid": "5e031e2a-d4f5-48eb-bbaa-b482b7adce29", "control-id": "cis_rhel10_1-1.1.7", "description": "No notes for control-id 1.1.1.7.", "props": [ @@ -6905,7 +6905,7 @@ ] }, { - "uuid": "2f1343f3-cd1a-4d1f-b812-fa2f31908827", + "uuid": "99e6c657-0712-47f6-86dd-68a7a81654e7", "control-id": "cis_rhel10_1-1.1.8", "description": "No notes for control-id 1.1.1.8.", "props": [ @@ -6922,7 +6922,7 @@ ] }, { - "uuid": "add0234a-6670-427a-8a24-16e7d2ab32ba", + "uuid": "fc37dc3c-1912-4b0f-83f2-d361f5b0f9de", "control-id": "cis_rhel10_1-1.2.3.1", "description": "No notes for control-id 1.1.2.3.1.", "props": [ @@ -6939,7 +6939,7 @@ ] }, { - "uuid": "839326a4-6ddd-4f44-97e9-d1f6650e1e09", + "uuid": "c7373377-9cf4-4b78-b3e1-34901d047ed9", "control-id": "cis_rhel10_1-1.2.4.1", "description": "No notes for control-id 1.1.2.4.1.", "props": [ @@ -6956,7 +6956,7 @@ ] }, { - "uuid": "31cc8015-c7bf-40f6-a27d-a687517ff3a3", + "uuid": "799a3be7-42cd-4709-bb7d-f7d9ec5800f1", "control-id": "cis_rhel10_1-1.2.5.1", "description": "No notes for control-id 1.1.2.5.1.", "props": [ @@ -6973,7 +6973,7 @@ ] }, { - "uuid": "cbd31c66-21ca-43eb-a408-75ace21512e6", + "uuid": "a0f2b6f6-5f24-4e7e-af2d-29b133da59c6", "control-id": "cis_rhel10_1-1.2.6.1", "description": "No notes for control-id 1.1.2.6.1.", "props": [ @@ -6990,7 +6990,7 @@ ] }, { - "uuid": "b5bb6d95-fae7-4b37-8a76-e7cf9576cd14", + "uuid": "2ba4eee8-72ae-4313-9987-2aef9e34ba0b", "control-id": "cis_rhel10_1-1.2.7.1", "description": "No notes for control-id 1.1.2.7.1.", "props": [ @@ -7007,7 +7007,7 @@ ] }, { - "uuid": "3a64d1f5-e788-40b8-a14d-6f6bc2eb7b06", + "uuid": "2246b80c-1ace-4536-8c81-a93d1fce45d1", "control-id": "cis_rhel10_1-2.1.3", "description": "The description for control-id cis_rhel10_1-2.1.3.", "props": [ @@ -7020,7 +7020,7 @@ ] }, { - "uuid": "5a67fdd2-347f-4a1a-93c2-3bcea0fc4366", + "uuid": "6df4ec60-e8d6-4fe5-93e6-88a1a6324cb5", "control-id": "cis_rhel10_1-2.1.5", "description": "No notes for control-id 1.2.1.5.", "props": [ @@ -7037,7 +7037,7 @@ ] }, { - "uuid": "44e4122a-bcbf-41b5-ad43-da3a11cddb64", + "uuid": "9e393661-085a-4845-a836-e56561cbd221", "control-id": "cis_rhel10_1-3.1.5", "description": "No notes for control-id 1.3.1.5.", "props": [ @@ -7054,7 +7054,7 @@ ] }, { - "uuid": "1d20e693-0930-483f-9f56-03752b32e0c3", + "uuid": "a02b435a-3411-490f-8789-d598f7022eb3", "control-id": "cis_rhel10_1-3.1.6", "description": "The description for control-id cis_rhel10_1-3.1.6.", "props": [ @@ -7067,7 +7067,7 @@ ] }, { - "uuid": "3244f97d-7f35-4df1-9663-17bd69078f52", + "uuid": "486866ea-bf8c-4372-a3c7-b99fc375ed41", "control-id": "cis_rhel10_1-5.3", "description": "No notes for control-id 1.5.3.", "props": [ @@ -7084,7 +7084,7 @@ ] }, { - "uuid": "b52745ea-60d9-4d47-a2d7-f2e567da5e03", + "uuid": "d703d1c3-ec46-439e-85d2-11a88a66193e", "control-id": "cis_rhel10_1-8.6", "description": "No notes for control-id 1.8.6.", "props": [ @@ -7101,7 +7101,7 @@ ] }, { - "uuid": "898679ac-9d31-4389-ad9f-538847497c84", + "uuid": "e689e827-602b-4e9d-b312-87450d9cfcd7", "control-id": "cis_rhel10_2-1.3", "description": "No notes for control-id 2.1.3.", "props": [ @@ -7118,7 +7118,7 @@ ] }, { - "uuid": "cabf3423-9424-49ea-82fb-4e8ccb21676e", + "uuid": "cb70603d-9160-436e-bf36-62177c96ab63", "control-id": "cis_rhel10_2-1.19", "description": "No notes for control-id 2.1.19.", "props": [ @@ -7135,7 +7135,7 @@ ] }, { - "uuid": "7d0a585d-afd5-4000-b3db-a735e0410e94", + "uuid": "ea1302d0-6160-48e4-bf4a-4d9e4847c640", "control-id": "cis_rhel10_2-1.20", "description": "No notes for control-id 2.1.20.", "props": [ @@ -7152,7 +7152,7 @@ ] }, { - "uuid": "c0a69749-a082-455d-a67b-be6244d8c524", + "uuid": "64757f84-53d6-4cf4-9afe-4883d844cff8", "control-id": "cis_rhel10_2-2.2", "description": "No notes for control-id 2.2.2.", "props": [ @@ -7169,7 +7169,7 @@ ] }, { - "uuid": "3c3b3e70-6706-4151-9d54-b638d136af50", + "uuid": "109412d1-bfdc-437a-b00d-347e23decaa8", "control-id": "cis_rhel10_3-3.1.1", "description": "No notes for control-id 3.3.1.1.", "props": [ @@ -7186,7 +7186,7 @@ ] }, { - "uuid": "ec6f3c95-393b-42ba-8531-954d8a0c0a5e", + "uuid": "ece57cde-bee1-4e91-92e8-46ef9bc145d1", "control-id": "cis_rhel10_5-1.8", "description": "No notes for control-id 5.1.8.", "props": [ @@ -7203,7 +7203,7 @@ ] }, { - "uuid": "42e524de-2365-49fc-ab8b-2ece694f1565", + "uuid": "a3651929-6dc3-460a-908f-80a68a708e9e", "control-id": "cis_rhel10_5-1.9", "description": "No notes for control-id 5.1.9.", "props": [ @@ -7220,7 +7220,7 @@ ] }, { - "uuid": "b6c8daa7-86de-4dc8-a999-4dc3decb9f62", + "uuid": "1ffa3640-6755-4c01-8465-f6ef109be889", "control-id": "cis_rhel10_5-2.4", "description": "No notes for control-id 5.2.4.", "props": [ @@ -7237,7 +7237,7 @@ ] }, { - "uuid": "01754491-b572-44da-8fac-ee52c8e382a3", + "uuid": "c4997f3e-8839-49a7-a91f-be4bc6e475a3", "control-id": "cis_rhel10_5-3.2.1.3", "description": "No notes for control-id 5.3.2.1.3.", "props": [ @@ -7254,7 +7254,7 @@ ] }, { - "uuid": "e00bc5f9-053e-4726-a876-4126bce86ccc", + "uuid": "503dac2a-5a13-48e6-b61b-def73933f428", "control-id": "cis_rhel10_5-4.1.2", "description": "No notes for control-id 5.4.1.2.", "props": [ @@ -7276,7 +7276,7 @@ ] }, { - "uuid": "381761c9-725d-4f95-9af8-0e9af1a13edf", + "uuid": "419b56a1-c452-4be9-b5f1-52a28e32db25", "control-id": "cis_rhel10_5-4.3.1", "description": "No notes for control-id 5.4.3.1.", "props": [ @@ -7293,7 +7293,7 @@ ] }, { - "uuid": "aa05f5e6-5bd9-41b0-9634-a01ffad23b5a", + "uuid": "3970ac3b-53d5-45a6-aa82-2e6372f02fce", "control-id": "cis_rhel10_6-3.1.1", "description": "No notes for control-id 6.3.1.1.", "props": [ @@ -7315,7 +7315,7 @@ ] }, { - "uuid": "af7ea2eb-4e60-499c-9bcc-6617fdca245a", + "uuid": "4d5ab09d-ac6c-4176-9696-49dea0687179", "control-id": "cis_rhel10_6-3.1.2", "description": "No notes for control-id 6.3.1.2.", "props": [ @@ -7332,7 +7332,7 @@ ] }, { - "uuid": "43272f4b-84e5-4a2e-bae9-06bc571ddb44", + "uuid": "45065e5c-79b0-468b-a224-886247884e56", "control-id": "cis_rhel10_6-3.1.3", "description": "No notes for control-id 6.3.1.3.", "props": [ @@ -7349,7 +7349,7 @@ ] }, { - "uuid": "1aa47ff7-5045-494e-94cc-9e0a38d86b50", + "uuid": "31eaf5c0-5eae-411f-8120-db1586a0c057", "control-id": "cis_rhel10_6-3.1.4", "description": "No notes for control-id 6.3.1.4.", "props": [ @@ -7366,7 +7366,7 @@ ] }, { - "uuid": "39df35bb-e295-4ae1-9b91-c419023071f2", + "uuid": "cc1d32f5-7bf0-434b-9cdb-aeeb2ed273e8", "control-id": "cis_rhel10_6-3.2.1", "description": "No notes for control-id 6.3.2.1.", "props": [ @@ -7383,7 +7383,7 @@ ] }, { - "uuid": "f8d334a7-983b-4e07-8471-c9bb8487bb1a", + "uuid": "dd16fa5a-35b9-404c-8af0-11407cc3dbdc", "control-id": "cis_rhel10_6-3.2.2", "description": "No notes for control-id 6.3.2.2.", "props": [ @@ -7400,7 +7400,7 @@ ] }, { - "uuid": "62bd333e-9dee-4e64-b16c-4d53f9562643", + "uuid": "03ee50b0-6b01-452f-9893-4ba4b9b74ab1", "control-id": "cis_rhel10_6-3.2.3", "description": "No notes for control-id 6.3.2.3.", "props": [ @@ -7422,7 +7422,7 @@ ] }, { - "uuid": "ae19d5fd-4e8f-48f3-8c18-9744ba799d34", + "uuid": "fc0f8b02-42f7-40a6-82e9-82b356b6c9ab", "control-id": "cis_rhel10_6-3.2.4", "description": "No notes for control-id 6.3.2.4.", "props": [ @@ -7444,7 +7444,7 @@ ] }, { - "uuid": "4a2952f3-8b99-4379-873f-ef9104228804", + "uuid": "58804169-d40a-46e3-9dfc-42c38ce73780", "control-id": "cis_rhel10_6-3.3.1", "description": "No notes for control-id 6.3.3.1.", "props": [ @@ -7461,7 +7461,7 @@ ] }, { - "uuid": "b079cc4e-f83f-4605-bc5a-5fbd2fb9fccd", + "uuid": "2bf3d057-5304-4a67-b868-a29e47761528", "control-id": "cis_rhel10_6-3.3.2", "description": "No notes for control-id 6.3.3.2.", "props": [ @@ -7478,7 +7478,7 @@ ] }, { - "uuid": "9ccf5cab-1679-49df-a605-d442b4134cca", + "uuid": "b1d323d8-3d95-4dfc-a736-1879a98ffd14", "control-id": "cis_rhel10_6-3.3.3", "description": "No notes for control-id 6.3.3.3.", "props": [ @@ -7495,7 +7495,7 @@ ] }, { - "uuid": "4533268a-5dbd-4b2c-8d14-aebb14144cc7", + "uuid": "321f11d8-8344-42bb-b33a-8da54cc5184a", "control-id": "cis_rhel10_6-3.3.4", "description": "No notes for control-id 6.3.3.4.", "props": [ @@ -7527,7 +7527,7 @@ ] }, { - "uuid": "f0b6d3a8-6112-4fa8-bd5e-7fdc115e08a6", + "uuid": "0fdd582b-222a-4303-9149-b01a6941678b", "control-id": "cis_rhel10_6-3.3.5", "description": "No notes for control-id 6.3.3.5.", "props": [ @@ -7549,7 +7549,7 @@ ] }, { - "uuid": "26efda73-fd51-46c3-b5a5-22daadba63cc", + "uuid": "a9446762-ec82-4354-9e34-9a57c066c068", "control-id": "cis_rhel10_6-3.3.6", "description": "No notes for control-id 6.3.3.6.", "props": [ @@ -7571,7 +7571,7 @@ ] }, { - "uuid": "2c7d949e-1863-47f9-92b7-d2e51ccbca6b", + "uuid": "5a90fde5-2bf9-4524-a11b-3e497fd38dee", "control-id": "cis_rhel10_6-3.3.7", "description": "No notes for control-id 6.3.3.7.", "props": [ @@ -7593,7 +7593,7 @@ ] }, { - "uuid": "86a694ac-1a5b-4943-a3e1-44cd80a674ba", + "uuid": "a81efdbd-3050-4a13-a894-4f947e7e5ab0", "control-id": "cis_rhel10_6-3.3.8", "description": "No notes for control-id 6.3.3.8.", "props": [ @@ -7615,7 +7615,7 @@ ] }, { - "uuid": "d1a925d6-9fb2-455f-8a81-51c66aa23e20", + "uuid": "4ba464d1-73bc-4b25-aee7-2bda02d52681", "control-id": "cis_rhel10_6-3.3.9", "description": "No notes for control-id 6.3.3.9.", "props": [ @@ -7632,7 +7632,7 @@ ] }, { - "uuid": "d57ed80c-c4dd-46b9-83ac-634e7d292ece", + "uuid": "29d82f04-c5f5-47a7-9a0b-1007c1aa33b4", "control-id": "cis_rhel10_6-3.3.10", "description": "No notes for control-id 6.3.3.10.", "props": [ @@ -7649,7 +7649,7 @@ ] }, { - "uuid": "dffdcccc-4f86-4745-8557-82e11005d582", + "uuid": "6428ccf0-69cb-4991-9e9f-c741ab69d405", "control-id": "cis_rhel10_6-3.3.11", "description": "No notes for control-id 6.3.3.11.", "props": [ @@ -7686,7 +7686,7 @@ ] }, { - "uuid": "f301731c-528f-45fa-bd19-e78ae0400a6d", + "uuid": "a7890719-fe1a-4246-9ba8-a95f5854732b", "control-id": "cis_rhel10_6-3.3.12", "description": "No notes for control-id 6.3.3.12.", "props": [ @@ -7703,7 +7703,7 @@ ] }, { - "uuid": "e696e25d-8a86-4e56-b596-f4f372679404", + "uuid": "89fc5480-a3a1-4a93-b609-0017645065c3", "control-id": "cis_rhel10_6-3.3.13", "description": "No notes for control-id 6.3.3.13.", "props": [ @@ -7720,7 +7720,7 @@ ] }, { - "uuid": "d0eb254f-f805-404c-970e-19f4fc00cfdf", + "uuid": "794112e1-d2da-4f4f-a64d-dcaec2016be1", "control-id": "cis_rhel10_6-3.3.14", "description": "No notes for control-id 6.3.3.14.", "props": [ @@ -7742,7 +7742,7 @@ ] }, { - "uuid": "af341416-d635-415e-8879-18924e56f348", + "uuid": "ae4a20b8-df03-498e-b68a-ca3d0240f1db", "control-id": "cis_rhel10_6-3.3.15", "description": "No notes for control-id 6.3.3.15.", "props": [ @@ -7759,7 +7759,7 @@ ] }, { - "uuid": "7f4eda9c-2950-4805-a5e7-019f8d2eaffd", + "uuid": "903c3a4c-6245-4f17-8aa8-f768568d23ed", "control-id": "cis_rhel10_6-3.3.16", "description": "No notes for control-id 6.3.3.16.", "props": [ @@ -7776,7 +7776,7 @@ ] }, { - "uuid": "62954b84-1c40-4f90-9116-d73c2b0c4730", + "uuid": "35cbd6ba-980b-412f-87b2-babd23bfd0a3", "control-id": "cis_rhel10_6-3.3.17", "description": "No notes for control-id 6.3.3.17.", "props": [ @@ -7798,7 +7798,7 @@ ] }, { - "uuid": "7520725e-14e8-4419-8a87-5ae6dbd9713f", + "uuid": "7626742e-1988-4845-b815-dd53752461b2", "control-id": "cis_rhel10_6-3.3.18", "description": "No notes for control-id 6.3.3.18.", "props": [ @@ -7830,7 +7830,7 @@ ] }, { - "uuid": "901b6672-a57e-401b-bc8b-46c1b029de47", + "uuid": "76ba34d0-c9ac-40bf-bbd5-2d8acc56a434", "control-id": "cis_rhel10_6-3.3.19", "description": "No notes for control-id 6.3.3.19.", "props": [ @@ -7862,7 +7862,7 @@ ] }, { - "uuid": "706a1de5-1c2e-486d-bb66-25c5d3a926dd", + "uuid": "5e2e4049-f3aa-43ff-8dff-710384338c9e", "control-id": "cis_rhel10_6-3.3.20", "description": "No notes for control-id 6.3.3.20.", "props": [ @@ -7904,7 +7904,7 @@ ] }, { - "uuid": "f0c47227-6218-4e46-88d5-be13def1d4d2", + "uuid": "f2d5058e-95e7-40f1-9c1c-f557825be604", "control-id": "cis_rhel10_6-3.3.21", "description": "No notes for control-id 6.3.3.21.", "props": [ @@ -7921,7 +7921,7 @@ ] }, { - "uuid": "712765b2-2808-4b75-92b6-3fdb834fd21a", + "uuid": "5da264b0-25f2-4349-bdd4-68cc789eae72", "control-id": "cis_rhel10_6-3.3.22", "description": "No notes for control-id 6.3.3.22.", "props": [ @@ -7948,7 +7948,7 @@ ] }, { - "uuid": "94666ead-2c62-4fa3-9010-557467ccf4fb", + "uuid": "22a8996e-e2e8-465d-b232-51cc1542886c", "control-id": "cis_rhel10_6-3.3.23", "description": "No notes for control-id 6.3.3.23.", "props": [ @@ -7970,7 +7970,7 @@ ] }, { - "uuid": "6dedd940-50e0-4d3f-a92d-6f13c96e3ca5", + "uuid": "f5e804c0-9205-4bc2-9f37-b412e286a8d5", "control-id": "cis_rhel10_6-3.3.24", "description": "No notes for control-id 6.3.3.24.", "props": [ @@ -7992,7 +7992,7 @@ ] }, { - "uuid": "f0b36f97-7e6a-4e79-9724-b349e208bca4", + "uuid": "0a667de1-0a81-4388-89de-29d8e8b03626", "control-id": "cis_rhel10_6-3.3.25", "description": "No notes for control-id 6.3.3.25.", "props": [ @@ -8019,7 +8019,7 @@ ] }, { - "uuid": "135d5c2e-a38d-40e3-bf74-afce8726742b", + "uuid": "919417ce-224c-4c68-887c-4bea6f10dbbc", "control-id": "cis_rhel10_6-3.3.26", "description": "No notes for control-id 6.3.3.26.", "props": [ @@ -8041,7 +8041,7 @@ ] }, { - "uuid": "53162caa-f084-47ec-bb14-cc85f3cdedd0", + "uuid": "f7cb282e-a3cd-432b-a4eb-a9600c6e8c04", "control-id": "cis_rhel10_6-3.3.27", "description": "No notes for control-id 6.3.3.27.", "props": [ @@ -8058,7 +8058,7 @@ ] }, { - "uuid": "a46f28d2-236c-47c5-9e54-f66c396e88fc", + "uuid": "0cb36b4d-9208-403e-b227-c53753a61c88", "control-id": "cis_rhel10_6-3.3.28", "description": "No notes for control-id 6.3.3.28.", "props": [ @@ -8075,7 +8075,7 @@ ] }, { - "uuid": "dacfa924-79ce-46f8-87bf-93281f525cbd", + "uuid": "fe19440a-8ca1-4f12-86e1-965c7ea97eaa", "control-id": "cis_rhel10_6-3.3.29", "description": "No notes for control-id 6.3.3.29.", "props": [ @@ -8092,7 +8092,7 @@ ] }, { - "uuid": "ff7ade3f-b944-46d0-bb3f-70fbe04dde08", + "uuid": "90d3edaf-ae79-4a1c-82f6-c8445dab59f0", "control-id": "cis_rhel10_6-3.3.30", "description": "No notes for control-id 6.3.3.30.", "props": [ @@ -8109,7 +8109,7 @@ ] }, { - "uuid": "36b6c083-e9f7-4f09-9cd3-f00fb2789c86", + "uuid": "25967116-82b9-4a30-8c15-50e3703620b7", "control-id": "cis_rhel10_6-3.3.31", "description": "No notes for control-id 6.3.3.31.", "props": [ @@ -8126,7 +8126,7 @@ ] }, { - "uuid": "77cd4bed-d8de-499f-84e0-3ac65e484f18", + "uuid": "375da343-4910-464f-8d1e-ac773d7ac5b1", "control-id": "cis_rhel10_6-3.3.32", "description": "No notes for control-id 6.3.3.32.", "props": [ @@ -8148,7 +8148,7 @@ ] }, { - "uuid": "a5b47a99-779a-4459-957e-b155badb1336", + "uuid": "32143bb7-cca5-4cfd-a443-9cb5880d4831", "control-id": "cis_rhel10_6-3.3.33", "description": "No notes for control-id 6.3.3.33.", "props": [ @@ -8165,7 +8165,7 @@ ] }, { - "uuid": "f2697152-79c9-4e56-8f4a-a0246ddbf5d0", + "uuid": "bcc34018-fbd6-469c-b9e1-2914f581cfd5", "control-id": "cis_rhel10_6-3.3.34", "description": "No notes for control-id 6.3.3.34.", "props": [ @@ -8182,7 +8182,7 @@ ] }, { - "uuid": "a9182935-bd71-4668-88b9-015c5ebc2757", + "uuid": "0dd31c8d-7863-434e-b72a-f6beedcc18e0", "control-id": "cis_rhel10_6-3.3.35", "description": "No notes for control-id 6.3.3.35.", "props": [ @@ -8199,7 +8199,7 @@ ] }, { - "uuid": "33167a7d-edcc-4740-b996-fc826ceae17b", + "uuid": "5ff39ce8-57c8-4891-833c-efb4d5035b99", "control-id": "cis_rhel10_6-3.3.36", "description": "No notes for control-id 6.3.3.36.", "props": [ @@ -8216,7 +8216,7 @@ ] }, { - "uuid": "085454d7-666b-49c0-ae18-f92839a38b25", + "uuid": "54f4e3be-e875-4a56-8815-d8a79252f3a9", "control-id": "cis_rhel10_6-3.3.37", "description": "The description for control-id cis_rhel10_6-3.3.37.", "props": [ @@ -8229,7 +8229,7 @@ ] }, { - "uuid": "75679d75-0393-4437-ab4b-2c0b60c2e405", + "uuid": "b651cd4f-e69b-43e7-b009-3b0c8b3e931b", "control-id": "cis_rhel10_6-3.4.1", "description": "No notes for control-id 6.3.4.1.", "props": [ @@ -8246,7 +8246,7 @@ ] }, { - "uuid": "a6654d61-b7df-4f69-91af-5143c6935612", + "uuid": "6fabbe9b-e17a-405c-a43c-5c1dffdd32c3", "control-id": "cis_rhel10_6-3.4.2", "description": "No notes for control-id 6.3.4.2.", "props": [ @@ -8263,7 +8263,7 @@ ] }, { - "uuid": "55348622-a020-4273-90de-f4b416d8c444", + "uuid": "3293dfbc-99f5-42ee-be52-49e9eddb1626", "control-id": "cis_rhel10_6-3.4.3", "description": "No notes for control-id 6.3.4.3.", "props": [ @@ -8280,7 +8280,7 @@ ] }, { - "uuid": "68a39142-33bb-4a2b-ab19-818ee1b4e30e", + "uuid": "4f4ad3be-3c7b-4a38-ad96-89a77d6b7f5c", "control-id": "cis_rhel10_6-3.4.4", "description": "No notes for control-id 6.3.4.4.", "props": [ @@ -8297,7 +8297,7 @@ ] }, { - "uuid": "ed43765e-4b75-463e-b5c5-2ed5bb918c35", + "uuid": "46e53170-2795-4a3e-bc62-ecf71a2d99f0", "control-id": "cis_rhel10_6-3.4.5", "description": "No notes for control-id 6.3.4.5.", "props": [ @@ -8314,7 +8314,7 @@ ] }, { - "uuid": "68ed1c9f-0745-4ce6-85ed-16ab8ed25955", + "uuid": "22c01da0-f80b-4664-bd48-89889e298810", "control-id": "cis_rhel10_6-3.4.6", "description": "No notes for control-id 6.3.4.6.", "props": [ @@ -8331,7 +8331,7 @@ ] }, { - "uuid": "05a96fac-5849-47c4-a45a-1ed912ddac3d", + "uuid": "91d736ba-dc1b-44e8-b1e3-c5f10d76dfa8", "control-id": "cis_rhel10_6-3.4.7", "description": "No notes for control-id 6.3.4.7.", "props": [ @@ -8348,7 +8348,7 @@ ] }, { - "uuid": "15ea10c0-b3b5-4084-b86f-302e863dff7f", + "uuid": "bd124773-2553-4b15-92bd-608cfc475b1a", "control-id": "cis_rhel10_6-3.4.8", "description": "No notes for control-id 6.3.4.8.", "props": [ @@ -8365,7 +8365,7 @@ ] }, { - "uuid": "786ec652-0636-4918-ad68-892dee8c72ca", + "uuid": "392439ab-4b01-465c-b178-4e80629d95dd", "control-id": "cis_rhel10_6-3.4.9", "description": "No notes for control-id 6.3.4.9.", "props": [ @@ -8382,7 +8382,7 @@ ] }, { - "uuid": "15c3b2f2-1ea2-4e3b-a705-40f68e216796", + "uuid": "a654f738-66e3-4607-a652-02ef59af4aac", "control-id": "cis_rhel10_6-3.4.10", "description": "No notes for control-id 6.3.4.10.", "props": [ @@ -8399,7 +8399,7 @@ ] }, { - "uuid": "a0ebe2e9-5a58-4ddd-96ad-82fdc0d2c2a8", + "uuid": "7b3e0a0a-6aad-4801-a201-545fafea0616", "control-id": "reload_dconf_db", "description": "This is a helper rule to reload Dconf database correctly.", "props": [ @@ -8416,7 +8416,7 @@ ] }, { - "uuid": "34ad6a21-53a9-411b-a9a2-d471ab651cbd", + "uuid": "9dbf77d6-108a-4e35-b850-af34634aea11", "control-id": "cis_rhel10_1-1.1.1", "description": "No notes for control-id 1.1.1.1.", "props": [ @@ -8433,7 +8433,7 @@ ] }, { - "uuid": "25958d34-6b19-4fa5-871f-3d289613565e", + "uuid": "935df9cc-ed27-4c38-8ed4-5360ce3ce618", "control-id": "cis_rhel10_1-1.1.2", "description": "No notes for control-id 1.1.1.2.", "props": [ @@ -8450,7 +8450,7 @@ ] }, { - "uuid": "1b468ccd-86e2-401f-bdcc-bb0cbc76fbce", + "uuid": "67fb9381-3170-4168-a4db-d6fe743c50da", "control-id": "cis_rhel10_1-1.1.3", "description": "No notes for control-id 1.1.1.3.", "props": [ @@ -8467,7 +8467,7 @@ ] }, { - "uuid": "5e6f2197-1cf3-4eb3-bceb-42d4f6f3456a", + "uuid": "3317933a-d53c-4b22-b724-4669c8aa40b0", "control-id": "cis_rhel10_1-1.1.4", "description": "No notes for control-id 1.1.1.4.", "props": [ @@ -8484,7 +8484,7 @@ ] }, { - "uuid": "5feea3c1-b04b-4424-819c-295d3fc3ed61", + "uuid": "5193768b-3e7b-4a30-987e-a0f77b89bbff", "control-id": "cis_rhel10_1-1.1.5", "description": "No notes for control-id 1.1.1.5.", "props": [ @@ -8501,7 +8501,7 @@ ] }, { - "uuid": "36df1266-7d3e-4108-94f9-52d6b0472266", + "uuid": "cbca48a0-eeea-4e7f-b892-4efae7b4d886", "control-id": "cis_rhel10_1-1.1.9", "description": "No notes for control-id 1.1.1.9.", "props": [ @@ -8518,7 +8518,7 @@ ] }, { - "uuid": "226aa034-2c6a-4958-989e-b1e770b10cd9", + "uuid": "4786c6af-aeea-4df9-ad98-2bcf5b810aa1", "control-id": "cis_rhel10_1-1.1.10", "description": "No notes for control-id 1.1.1.10.", "props": [ @@ -8535,7 +8535,7 @@ ] }, { - "uuid": "d0e1adcd-8c0f-4e77-bd7d-67c847061341", + "uuid": "09aa44cd-a3cf-4eb6-871a-c8d02d54d574", "control-id": "cis_rhel10_1-1.1.11", "description": "The description for control-id cis_rhel10_1-1.1.11.", "props": [ @@ -8548,7 +8548,7 @@ ] }, { - "uuid": "70d55710-9a00-4c02-8673-67499dab3703", + "uuid": "1039dfde-a299-4d38-8ec7-da3e11bbc8dd", "control-id": "cis_rhel10_1-1.2.1.1", "description": "No notes for control-id 1.1.2.1.1.", "props": [ @@ -8565,7 +8565,7 @@ ] }, { - "uuid": "4a365c20-e4d5-428b-b9c1-7eb840c1e641", + "uuid": "7ce55830-3494-43ad-bdb3-05b0ff8618f0", "control-id": "cis_rhel10_1-1.2.1.2", "description": "No notes for control-id 1.1.2.1.2.", "props": [ @@ -8582,7 +8582,7 @@ ] }, { - "uuid": "60b92bec-e220-4cf0-92f7-91cc1f3caaa5", + "uuid": "cd10b0a5-4b9b-42b3-87f7-545abcecc6ac", "control-id": "cis_rhel10_1-1.2.1.3", "description": "No notes for control-id 1.1.2.1.3.", "props": [ @@ -8599,7 +8599,7 @@ ] }, { - "uuid": "46189723-ba16-4619-bd5b-ec07ad612dee", + "uuid": "9c0dc9c1-1c02-48d7-8bdd-a3bc224136d6", "control-id": "cis_rhel10_1-1.2.1.4", "description": "No notes for control-id 1.1.2.1.4.", "props": [ @@ -8616,7 +8616,7 @@ ] }, { - "uuid": "6dea18ec-8c75-4306-bc9f-fc9b587ae706", + "uuid": "dce4418b-ce1a-4a2f-8319-85aa84307b4a", "control-id": "cis_rhel10_1-1.2.2.1", "description": "No notes for control-id 1.1.2.2.1.", "props": [ @@ -8633,7 +8633,7 @@ ] }, { - "uuid": "3710c764-9ef5-490a-bab6-99196d5ddb70", + "uuid": "75151dff-4bce-465b-bc1e-cc5b805f1b94", "control-id": "cis_rhel10_1-1.2.2.2", "description": "No notes for control-id 1.1.2.2.2.", "props": [ @@ -8650,7 +8650,7 @@ ] }, { - "uuid": "18f2c438-8388-418f-bdf7-f7593753ce5e", + "uuid": "0eb18b5f-1630-4244-aeec-6c7769189929", "control-id": "cis_rhel10_1-1.2.2.3", "description": "No notes for control-id 1.1.2.2.3.", "props": [ @@ -8667,7 +8667,7 @@ ] }, { - "uuid": "1c3fd67f-4eed-4094-8209-86ac9d9addb4", + "uuid": "d49ccd37-a976-4505-884a-bbe4274f4e1c", "control-id": "cis_rhel10_1-1.2.2.4", "description": "No notes for control-id 1.1.2.2.4.", "props": [ @@ -8684,7 +8684,7 @@ ] }, { - "uuid": "d5f77281-32c6-4ff8-9b3d-8c1df86bdf5c", + "uuid": "62b308c8-ea6f-47bc-9998-672fc870ff74", "control-id": "cis_rhel10_1-1.2.3.2", "description": "No notes for control-id 1.1.2.3.2.", "props": [ @@ -8701,7 +8701,7 @@ ] }, { - "uuid": "07bf26ca-3d17-42c9-b959-5eb824eda10e", + "uuid": "0309689c-ca47-4209-a1ce-561f62dc2458", "control-id": "cis_rhel10_1-1.2.3.3", "description": "No notes for control-id 1.1.2.3.3.", "props": [ @@ -8718,7 +8718,7 @@ ] }, { - "uuid": "4cb1b8b5-ecac-42fb-8c48-4324e493243b", + "uuid": "da79d2fe-88ec-4807-a258-f469289c5d48", "control-id": "cis_rhel10_1-1.2.4.2", "description": "No notes for control-id 1.1.2.4.2.", "props": [ @@ -8735,7 +8735,7 @@ ] }, { - "uuid": "610898e1-fff7-48ac-ac78-1ed59f2737a9", + "uuid": "a3c260d2-5505-4bcd-8a7d-0a94d4734fd5", "control-id": "cis_rhel10_1-1.2.4.3", "description": "No notes for control-id 1.1.2.4.3.", "props": [ @@ -8752,7 +8752,7 @@ ] }, { - "uuid": "02116907-5e67-4952-ae16-5c1d9bcc21d5", + "uuid": "0a375bda-e7cf-4e6c-87f0-1b34c89c5132", "control-id": "cis_rhel10_1-1.2.5.2", "description": "No notes for control-id 1.1.2.5.2.", "props": [ @@ -8769,7 +8769,7 @@ ] }, { - "uuid": "dadcc9fd-8473-4062-964a-e10b8c435bf5", + "uuid": "ae79777f-583a-4639-96ba-2fe88544ceea", "control-id": "cis_rhel10_1-1.2.5.3", "description": "No notes for control-id 1.1.2.5.3.", "props": [ @@ -8786,7 +8786,7 @@ ] }, { - "uuid": "b64d9c7e-f87f-4dd7-8f3f-2e7598d3149c", + "uuid": "87ebb2e0-fd9a-4afe-b3ea-1bb76c403523", "control-id": "cis_rhel10_1-1.2.5.4", "description": "No notes for control-id 1.1.2.5.4.", "props": [ @@ -8803,7 +8803,7 @@ ] }, { - "uuid": "e4053e49-8aad-430f-ba18-96b9903c51bf", + "uuid": "7cd5d194-f0d2-4114-86b2-7a1d29e17d10", "control-id": "cis_rhel10_1-1.2.6.2", "description": "No notes for control-id 1.1.2.6.2.", "props": [ @@ -8820,7 +8820,7 @@ ] }, { - "uuid": "91903b25-aa3c-4156-9085-02bc529b52a3", + "uuid": "a32a506f-a90f-4be2-82ea-1ca2ae70687f", "control-id": "cis_rhel10_1-1.2.6.3", "description": "No notes for control-id 1.1.2.6.3.", "props": [ @@ -8837,7 +8837,7 @@ ] }, { - "uuid": "1545a726-692b-4e5b-ae36-5dd55b4bc49f", + "uuid": "812a5fb4-4472-4108-a08b-19eabf6931cc", "control-id": "cis_rhel10_1-1.2.6.4", "description": "No notes for control-id 1.1.2.6.4.", "props": [ @@ -8854,7 +8854,7 @@ ] }, { - "uuid": "bcaf7919-7f6b-4a72-a340-6cd8b5f04f18", + "uuid": "0a83d51f-86c7-4c83-97d7-a27d0017a20a", "control-id": "cis_rhel10_1-1.2.7.2", "description": "No notes for control-id 1.1.2.7.2.", "props": [ @@ -8871,7 +8871,7 @@ ] }, { - "uuid": "107353a2-e7f6-4168-b01a-625bb3f94db8", + "uuid": "a064ce23-0a75-4b9f-9b32-922c7b6a6db3", "control-id": "cis_rhel10_1-1.2.7.3", "description": "No notes for control-id 1.1.2.7.3.", "props": [ @@ -8888,7 +8888,7 @@ ] }, { - "uuid": "f029964d-52b2-4607-9249-814474dd8b7c", + "uuid": "c12b89f4-4569-411b-ba52-beda665fb0bb", "control-id": "cis_rhel10_1-1.2.7.4", "description": "No notes for control-id 1.1.2.7.4.", "props": [ @@ -8905,7 +8905,7 @@ ] }, { - "uuid": "962fe1ee-13c4-4141-bf58-3da7a631bdff", + "uuid": "f2746fd1-e7bc-4148-90a9-34a1363175fd", "control-id": "cis_rhel10_1-2.1.1", "description": "The description for control-id cis_rhel10_1-2.1.1.", "props": [ @@ -8918,7 +8918,7 @@ ] }, { - "uuid": "f73fbaf5-4d9f-44a5-bd23-9947f8c04b71", + "uuid": "40a6989d-b783-43ef-badc-8dec79bacd88", "control-id": "cis_rhel10_1-2.1.2", "description": "No notes for control-id 1.2.1.2.", "props": [ @@ -8935,7 +8935,7 @@ ] }, { - "uuid": "e9c320e8-0b30-42a0-9fd4-88145d5a9251", + "uuid": "3a87f6ea-5e5a-4565-8ba6-a1a9587d63bc", "control-id": "cis_rhel10_1-2.1.4", "description": "The description for control-id cis_rhel10_1-2.1.4.", "props": [ @@ -8948,7 +8948,7 @@ ] }, { - "uuid": "62abbc36-6bd2-4ae3-900b-8859b6cb4dcf", + "uuid": "cfd4c239-9f3a-4e1e-98ac-6bc255672f5b", "control-id": "cis_rhel10_1-2.2.1", "description": "The description for control-id cis_rhel10_1-2.2.1.", "props": [ @@ -8961,7 +8961,7 @@ ] }, { - "uuid": "b50d583b-01c2-4498-9a66-90c0266d98fe", + "uuid": "a82fc45d-0f44-41a6-94e2-6f91e8726e49", "control-id": "cis_rhel10_1-3.1.1", "description": "No notes for control-id 1.3.1.1.", "props": [ @@ -8978,7 +8978,7 @@ ] }, { - "uuid": "06711181-b15c-405f-a856-854e53ea29aa", + "uuid": "330151f2-c81b-46de-a80a-91109f389b86", "control-id": "cis_rhel10_1-3.1.2", "description": "No notes for control-id 1.3.1.2.", "props": [ @@ -8995,7 +8995,7 @@ ] }, { - "uuid": "e407058c-48b5-42be-bb44-5d02be64cba0", + "uuid": "64893c29-7f85-4ce2-9c91-a2b108dbb49b", "control-id": "cis_rhel10_1-3.1.3", "description": "No notes for control-id 1.3.1.3.", "props": [ @@ -9012,7 +9012,7 @@ ] }, { - "uuid": "dcb64910-8ab4-444f-a1fb-48ab99787ab9", + "uuid": "99d903aa-2bf7-4036-b3a4-634a203c6180", "control-id": "cis_rhel10_1-3.1.4", "description": "No notes for control-id 1.3.1.4.", "props": [ @@ -9029,7 +9029,7 @@ ] }, { - "uuid": "db4dbb3b-a410-4cc4-a6d9-a1862df6a163", + "uuid": "1142c644-898a-464c-abff-eca0ac80e9eb", "control-id": "cis_rhel10_1-3.1.7", "description": "No notes for control-id 1.3.1.7.", "props": [ @@ -9046,7 +9046,7 @@ ] }, { - "uuid": "2324fc19-f237-4356-b8b3-75bd2b37aa7a", + "uuid": "2cb30e09-4025-43f5-a4bb-f3e7e9e136ca", "control-id": "cis_rhel10_1-3.1.8", "description": "No notes for control-id 1.3.1.8.", "props": [ @@ -9063,7 +9063,7 @@ ] }, { - "uuid": "6bed18df-6e50-43aa-a65f-304136c2438d", + "uuid": "745d196e-166f-4585-9333-7ef878481410", "control-id": "cis_rhel10_1-4.1", "description": "There is no automated remediation for this rule and this is intentional.\nMore details in the rule description.", "props": [ @@ -9080,7 +9080,7 @@ ] }, { - "uuid": "d2ddc886-7454-467d-b554-1564bd81a5d8", + "uuid": "c49ca919-f3fa-480c-95f8-38a14250f2dd", "control-id": "cis_rhel10_1-4.2", "description": "This requirement demands a deeper review of the rules.", "props": [ @@ -9107,7 +9107,7 @@ ] }, { - "uuid": "7558b121-16bf-42d7-a934-c55af2a7bf7c", + "uuid": "9f865a37-d670-4417-9e44-566ce91e1e64", "control-id": "cis_rhel10_1-5.1", "description": "No notes for control-id 1.5.1.", "props": [ @@ -9124,7 +9124,7 @@ ] }, { - "uuid": "bec88b54-af26-42dc-ab00-0882dd93d415", + "uuid": "a2a2ed7e-ddeb-476a-8827-9c9e6c765d2f", "control-id": "cis_rhel10_1-5.2", "description": "No notes for control-id 1.5.2.", "props": [ @@ -9141,7 +9141,7 @@ ] }, { - "uuid": "f4a69af8-58ef-4a24-8fef-7e78cd38caac", + "uuid": "1d9d2cd5-53ec-4cb0-a25e-80ae56c40ed8", "control-id": "cis_rhel10_1-5.4", "description": "No notes for control-id 1.5.4.", "props": [ @@ -9158,7 +9158,7 @@ ] }, { - "uuid": "504889b2-b40c-4647-a40e-01e8de4246a5", + "uuid": "02d1dd22-7f49-457d-9841-fa91325e9707", "control-id": "cis_rhel10_1-5.5", "description": "No notes for control-id 1.5.5.", "props": [ @@ -9175,7 +9175,7 @@ ] }, { - "uuid": "7ff2013f-1332-4d9d-aa64-e20ce7469c5f", + "uuid": "5a088f67-f316-4649-a257-699686cc424b", "control-id": "cis_rhel10_1-5.6", "description": "No notes for control-id 1.5.6.", "props": [ @@ -9192,7 +9192,7 @@ ] }, { - "uuid": "9457fae5-1bfc-493f-9ead-ba0fa592031f", + "uuid": "5cfa57aa-925a-451a-8cdd-a74f02a2c92e", "control-id": "cis_rhel10_1-5.7", "description": "No notes for control-id 1.5.7.", "props": [ @@ -9209,7 +9209,7 @@ ] }, { - "uuid": "ef4cb2ff-7687-45e7-b1cb-76271d74e6dc", + "uuid": "4940ba55-9083-46aa-9085-d21c15a769a5", "control-id": "cis_rhel10_1-5.8", "description": "Address Space Layout Randomization (ASLR)", "props": [ @@ -9226,7 +9226,7 @@ ] }, { - "uuid": "fd48c183-f35f-4c2c-ac98-9512567e839d", + "uuid": "e9085ea1-cbf6-4f7d-a95a-0b0b063e481d", "control-id": "cis_rhel10_1-5.9", "description": "No notes for control-id 1.5.9.", "props": [ @@ -9243,7 +9243,7 @@ ] }, { - "uuid": "14ff64d6-f741-44f0-a88f-ba6d10d04803", + "uuid": "a1a536c5-f05d-48e4-ad4d-e1e662d75c19", "control-id": "cis_rhel10_1-5.10", "description": "No notes for control-id 1.5.10.", "props": [ @@ -9260,7 +9260,7 @@ ] }, { - "uuid": "ab981fda-48e3-42e4-b883-d746014e859a", + "uuid": "ea2d7f9f-7741-48c8-a06b-c7137f4e8ce0", "control-id": "cis_rhel10_1-6.1", "description": "No notes for control-id 1.6.1.", "props": [ @@ -9277,7 +9277,7 @@ ] }, { - "uuid": "aa0ec1d5-92ca-4c17-a7ab-0ef1a8a214c9", + "uuid": "463fa8ab-d8a7-4533-a57e-a24d292eee34", "control-id": "cis_rhel10_1-6.2", "description": "No notes for control-id 1.6.2.", "props": [ @@ -9294,7 +9294,7 @@ ] }, { - "uuid": "249c9643-8ef6-4c2c-8241-6259925d2576", + "uuid": "00427b94-7446-42d0-ab7f-96957cd09d0c", "control-id": "cis_rhel10_1-6.3", "description": "No notes for control-id 1.6.3.", "props": [ @@ -9311,7 +9311,7 @@ ] }, { - "uuid": "b995ac3a-7b67-4ee8-b4a6-2abb301fad33", + "uuid": "8f8cbb9b-9eb0-4896-9704-aa64547cadbf", "control-id": "cis_rhel10_1-6.4", "description": "No notes for control-id 1.6.4.", "props": [ @@ -9328,7 +9328,7 @@ ] }, { - "uuid": "4d21a23a-19a2-41a2-a1b4-0a68b648a109", + "uuid": "94deb825-e07b-4f38-baa7-beb8d6a6bd53", "control-id": "cis_rhel10_1-7.1", "description": "No notes for control-id 1.7.1.", "props": [ @@ -9345,7 +9345,7 @@ ] }, { - "uuid": "ff3b13f0-8b72-456c-b0e6-52a9ee4df719", + "uuid": "457030e8-41e4-42d8-9c67-45a9049f05b4", "control-id": "cis_rhel10_1-7.2", "description": "No notes for control-id 1.7.2.", "props": [ @@ -9362,7 +9362,7 @@ ] }, { - "uuid": "7c600fe6-1028-4ac8-a941-a8337e933fce", + "uuid": "bef203bd-c3ce-4278-9adf-a71e4610a589", "control-id": "cis_rhel10_1-7.3", "description": "No notes for control-id 1.7.3.", "props": [ @@ -9379,7 +9379,7 @@ ] }, { - "uuid": "23199b5c-848b-4ac6-9eba-b860ca85478b", + "uuid": "dba967f7-9a33-48b0-b0f1-76fb5b7fea1f", "control-id": "cis_rhel10_1-7.4", "description": "No notes for control-id 1.7.4.", "props": [ @@ -9406,7 +9406,7 @@ ] }, { - "uuid": "7b8a52b9-ed95-43ab-8ef8-7469a5c5be38", + "uuid": "268af437-f1a8-454b-a660-d50c43571dde", "control-id": "cis_rhel10_1-7.5", "description": "No notes for control-id 1.7.5.", "props": [ @@ -9433,7 +9433,7 @@ ] }, { - "uuid": "8acce9b7-7961-4bb8-9e2f-3a45b93db0db", + "uuid": "c1f9038a-8714-4ed0-8775-96d720194c96", "control-id": "cis_rhel10_1-7.6", "description": "No notes for control-id 1.7.6.", "props": [ @@ -9460,7 +9460,7 @@ ] }, { - "uuid": "5fa3a2bd-ea68-4e6a-9313-7641d1b2ed06", + "uuid": "a005ac77-9e97-4e3a-abf7-693b8c869983", "control-id": "cis_rhel10_1-8.1", "description": "No notes for control-id 1.8.1.", "props": [ @@ -9482,7 +9482,7 @@ ] }, { - "uuid": "6fd98286-5f6e-47de-b00e-90327a8fc6d0", + "uuid": "52b4e25f-93bc-4782-b529-63830153ae68", "control-id": "cis_rhel10_1-8.2", "description": "No notes for control-id 1.8.2.", "props": [ @@ -9499,7 +9499,7 @@ ] }, { - "uuid": "58d4d17f-58ef-4d29-a295-0f3ce9abd3cc", + "uuid": "7ff7c1cd-91f6-4df0-a81d-39896c952ee4", "control-id": "cis_rhel10_1-8.3", "description": "No notes for control-id 1.8.3.", "props": [ @@ -9531,7 +9531,7 @@ ] }, { - "uuid": "2d3ca499-2c96-4430-b2e1-0af4a3cb80b6", + "uuid": "4e13acbe-5ee9-4abb-b74b-a091b2897376", "control-id": "cis_rhel10_1-8.4", "description": "No notes for control-id 1.8.4.", "props": [ @@ -9553,7 +9553,7 @@ ] }, { - "uuid": "adce03e3-eb16-46f4-89e4-c9d2ef181862", + "uuid": "8d82aeff-00a3-4c4d-b5e9-dfbca6751340", "control-id": "cis_rhel10_1-8.5", "description": "No notes for control-id 1.8.5.", "props": [ @@ -9570,7 +9570,7 @@ ] }, { - "uuid": "92ed797b-b0cf-455f-9344-a9aeb4b51af3", + "uuid": "afa2b490-a586-4b64-9f1c-07fb8b395bfe", "control-id": "cis_rhel10_2-1.1", "description": "No notes for control-id 2.1.1.", "props": [ @@ -9587,7 +9587,7 @@ ] }, { - "uuid": "e939a4d2-914b-4da1-97ac-64228b116d41", + "uuid": "35d75d91-c6e6-4def-9a41-69f54d469d14", "control-id": "cis_rhel10_2-1.2", "description": "No notes for control-id 2.1.2.", "props": [ @@ -9604,7 +9604,7 @@ ] }, { - "uuid": "d7764454-264d-477d-a0c8-517d138195fc", + "uuid": "f12bf0d1-d9d8-43ad-aee3-f493cfa108d4", "control-id": "cis_rhel10_2-1.4", "description": "No notes for control-id 2.1.4.", "props": [ @@ -9621,7 +9621,7 @@ ] }, { - "uuid": "116a3cd3-4885-4a9e-9619-891719e18617", + "uuid": "bce91ef5-ec2e-4c23-b85c-199b4bd9519b", "control-id": "cis_rhel10_2-1.5", "description": "No notes for control-id 2.1.5.", "props": [ @@ -9638,7 +9638,7 @@ ] }, { - "uuid": "719498fc-894f-4364-8bf7-1633eed98908", + "uuid": "ebf5ca33-b6a8-45c3-ac26-e115f48b0c7d", "control-id": "cis_rhel10_2-1.6", "description": "No notes for control-id 2.1.6.", "props": [ @@ -9655,7 +9655,7 @@ ] }, { - "uuid": "fa074af4-2688-4c71-8d96-fa42ba8ba4a1", + "uuid": "69050cd3-cac8-4ac2-978b-9e1043aa100b", "control-id": "cis_rhel10_2-1.7", "description": "No notes for control-id 2.1.7.", "props": [ @@ -9672,7 +9672,7 @@ ] }, { - "uuid": "45d908f8-ee60-4446-a98e-8e2e70b364ba", + "uuid": "7c64a2f8-5a7f-49ae-b142-394815fb2cbf", "control-id": "cis_rhel10_2-1.8", "description": "No notes for control-id 2.1.8.", "props": [ @@ -9694,7 +9694,7 @@ ] }, { - "uuid": "0817601f-cc34-45a0-be73-02c821531ac6", + "uuid": "5f8ec8de-ec20-4aac-9164-a9203cd63467", "control-id": "cis_rhel10_2-1.9", "description": "Many of the libvirt packages used by Enterprise Linux virtualization are dependent on the\nnfs-utils package.", "props": [ @@ -9711,7 +9711,7 @@ ] }, { - "uuid": "d45dd4bc-66f1-4c81-8a61-0ecba9d977e5", + "uuid": "3f01985f-fb69-4ca6-a961-06915f6693b5", "control-id": "cis_rhel10_2-1.10", "description": "No notes for control-id 2.1.10.", "props": [ @@ -9728,7 +9728,7 @@ ] }, { - "uuid": "0d7140c7-4cbf-4aee-9c0d-0c5db278c684", + "uuid": "295b6806-5c27-4431-8200-c1f61de6fdc9", "control-id": "cis_rhel10_2-1.11", "description": "Many of the libvirt packages used by Enterprise Linux virtualization, and the nfs-utils\npackage used for The Network File System (NFS), are dependent on the rpcbind package.", "props": [ @@ -9745,7 +9745,7 @@ ] }, { - "uuid": "2e6cc924-729d-4475-be9b-525eca3c838f", + "uuid": "6ca78d76-fa74-43c9-a273-1646432eb286", "control-id": "cis_rhel10_2-1.12", "description": "No notes for control-id 2.1.12.", "props": [ @@ -9762,7 +9762,7 @@ ] }, { - "uuid": "fab8e75e-b8f2-41cc-bde5-9cbc28e9d45a", + "uuid": "725ea5d0-7f1d-4e89-a782-af2996bcc12a", "control-id": "cis_rhel10_2-1.13", "description": "No notes for control-id 2.1.13.", "props": [ @@ -9779,7 +9779,7 @@ ] }, { - "uuid": "401a3a39-ad3d-4e78-a17a-b73f8b9ef68a", + "uuid": "c400228f-72cd-4ed0-9ff9-ecb141fb9bdf", "control-id": "cis_rhel10_2-1.14", "description": "No notes for control-id 2.1.14.", "props": [ @@ -9796,7 +9796,7 @@ ] }, { - "uuid": "987abf62-a80e-4aee-82f7-4f3f98c4af17", + "uuid": "afa4ed55-dc7d-4b77-b062-c1c96a713f7b", "control-id": "cis_rhel10_2-1.15", "description": "No notes for control-id 2.1.15.", "props": [ @@ -9813,7 +9813,7 @@ ] }, { - "uuid": "7654d645-8a73-4d90-aaba-52bcb9432355", + "uuid": "306767b0-2ee9-441b-8582-ed368b9b6b44", "control-id": "cis_rhel10_2-1.16", "description": "No notes for control-id 2.1.16.", "props": [ @@ -9830,7 +9830,7 @@ ] }, { - "uuid": "3cea5092-a4fe-4411-9610-46674bf7cae6", + "uuid": "bf7443f3-bee7-40e4-9e45-13bc1549595c", "control-id": "cis_rhel10_2-1.17", "description": "No notes for control-id 2.1.17.", "props": [ @@ -9847,7 +9847,7 @@ ] }, { - "uuid": "cada3e39-6cb4-4410-8f78-a1027d97b7b3", + "uuid": "a82da6ef-d915-474c-a5be-301084576543", "control-id": "cis_rhel10_2-1.18", "description": "No notes for control-id 2.1.18.", "props": [ @@ -9869,7 +9869,7 @@ ] }, { - "uuid": "1c6c5c4a-3343-471c-933f-da7133c4e78d", + "uuid": "e8aa92e8-ed3d-40d6-a03d-055f4c45a0ff", "control-id": "cis_rhel10_2-1.21", "description": "No notes for control-id 2.1.21.", "props": [ @@ -9891,7 +9891,7 @@ ] }, { - "uuid": "a4b62bf4-1fa9-4077-aaab-678ff69f424d", + "uuid": "691ef907-74c8-470a-b5d8-87dfbb861923", "control-id": "cis_rhel10_2-1.22", "description": "The description for control-id cis_rhel10_2-1.22.", "props": [ @@ -9904,7 +9904,7 @@ ] }, { - "uuid": "624cbf30-5fd6-4092-8996-5d0650e94b20", + "uuid": "8532751e-2d53-46b2-8522-c3ae42130842", "control-id": "cis_rhel10_2-2.1", "description": "No notes for control-id 2.2.1.", "props": [ @@ -9921,7 +9921,7 @@ ] }, { - "uuid": "ef5edd8e-960e-4fe2-a6fe-f234ddfe52b5", + "uuid": "c06fc6c1-330b-4caf-b574-1f7b20189645", "control-id": "cis_rhel10_2-2.3", "description": "No notes for control-id 2.2.3.", "props": [ @@ -9938,7 +9938,7 @@ ] }, { - "uuid": "848843cb-2f96-4a07-b171-d5c458698521", + "uuid": "507e07da-7ace-49c4-8be6-d36ae68cbc48", "control-id": "cis_rhel10_2-2.4", "description": "No notes for control-id 2.2.4.", "props": [ @@ -9955,7 +9955,7 @@ ] }, { - "uuid": "7353b60f-b2e9-4541-97cb-ce9e47abe6ac", + "uuid": "f08f949a-089b-4ea0-85b0-3dd3c9808eb2", "control-id": "cis_rhel10_2-3.1", "description": "No notes for control-id 2.3.1.", "props": [ @@ -9967,7 +9967,7 @@ ] }, { - "uuid": "54b5dc43-0aa9-42c2-97fb-57014d19f296", + "uuid": "ebe01560-456e-410f-9198-ffc51061854d", "control-id": "cis_rhel10_2-3.2", "description": "No notes for control-id 2.3.2.", "props": [ @@ -9984,7 +9984,7 @@ ] }, { - "uuid": "4271c060-106a-4ae8-ad76-74f2966c880b", + "uuid": "71ce46a0-f6e4-4f34-9bac-05168df6246b", "control-id": "cis_rhel10_2-3.3", "description": "No notes for control-id 2.3.3.", "props": [ @@ -10001,7 +10001,7 @@ ] }, { - "uuid": "7aa7da09-1cc0-45d2-a6d0-56d7c3ceb86b", + "uuid": "5380b00e-a17b-4494-a76b-b2da06f42c5a", "control-id": "cis_rhel10_2-4.1.1", "description": "No notes for control-id 2.4.1.1.", "props": [ @@ -10023,7 +10023,7 @@ ] }, { - "uuid": "eae46244-2716-44c1-a8ad-85bb57fa2a98", + "uuid": "944f5f2a-36ee-4594-8ff3-f4042927551e", "control-id": "cis_rhel10_2-4.1.2", "description": "No notes for control-id 2.4.1.2.", "props": [ @@ -10050,7 +10050,7 @@ ] }, { - "uuid": "1ff76c4a-ebfc-49c3-8c28-efed6a54c793", + "uuid": "e843e5c1-190f-4e67-89cd-4330b75ea526", "control-id": "cis_rhel10_2-4.1.3", "description": "No notes for control-id 2.4.1.3.", "props": [ @@ -10077,7 +10077,7 @@ ] }, { - "uuid": "780ea027-6440-4284-8383-edee3fbd6c3e", + "uuid": "c7364879-48a2-44e9-93e0-b1bbcf108973", "control-id": "cis_rhel10_2-4.1.4", "description": "No notes for control-id 2.4.1.4.", "props": [ @@ -10104,7 +10104,7 @@ ] }, { - "uuid": "17a45829-0044-44fc-8acd-17a864b81a8d", + "uuid": "c851e69a-e26b-4812-81ef-a5298316155e", "control-id": "cis_rhel10_2-4.1.5", "description": "No notes for control-id 2.4.1.5.", "props": [ @@ -10131,7 +10131,7 @@ ] }, { - "uuid": "dc01ed2e-5f52-45fd-910f-2e55b3ffbcf7", + "uuid": "592d37b4-63e2-445f-85e0-5683b3a682b0", "control-id": "cis_rhel10_2-4.1.6", "description": "No notes for control-id 2.4.1.6.", "props": [ @@ -10158,7 +10158,7 @@ ] }, { - "uuid": "1b878181-d63d-45ad-a013-a6cb1a3d15b4", + "uuid": "66a8ce33-9044-41f4-a81a-f37033a331a9", "control-id": "cis_rhel10_2-4.1.7", "description": "No notes for control-id 2.4.1.7.", "props": [ @@ -10185,7 +10185,7 @@ ] }, { - "uuid": "051f5a8f-b64e-41e1-aeaf-07d87cb475ae", + "uuid": "f81e8cff-2c37-4fb0-8238-dc624d18dbb8", "control-id": "cis_rhel10_2-4.1.8", "description": "No notes for control-id 2.4.1.8.", "props": [ @@ -10212,7 +10212,7 @@ ] }, { - "uuid": "e36ad643-176a-4671-9425-72f3fdd3611c", + "uuid": "e180d6c3-7f08-43c7-aa1e-0731a3b0a94d", "control-id": "cis_rhel10_2-4.1.9", "description": "No notes for control-id 2.4.1.9.", "props": [ @@ -10249,7 +10249,7 @@ ] }, { - "uuid": "12c439de-72ee-4467-89da-cfe647183c4f", + "uuid": "a47fa85e-ab38-498b-b080-587a8c46bf72", "control-id": "cis_rhel10_2-4.2.1", "description": "No notes for control-id 2.4.2.1.", "props": [ @@ -10286,7 +10286,7 @@ ] }, { - "uuid": "b12f69a9-0487-4496-8b48-23eb6dfe4999", + "uuid": "169807fb-7244-4d16-8e98-c2dbd2a7d1fd", "control-id": "cis_rhel10_3-1.1", "description": "The description for control-id cis_rhel10_3-1.1.", "props": [ @@ -10299,7 +10299,7 @@ ] }, { - "uuid": "0f61a814-434c-4004-bc9e-3b74323a40b0", + "uuid": "bc8251bc-4cc8-4f5d-be91-d809a88437c5", "control-id": "cis_rhel10_3-1.2", "description": "No notes for control-id 3.1.2.", "props": [ @@ -10316,7 +10316,7 @@ ] }, { - "uuid": "b6cfa7ce-55d3-48c8-80b4-0bbf786ff903", + "uuid": "156a73b9-7a92-4799-b696-4e218dda0506", "control-id": "cis_rhel10_3-1.3", "description": "No notes for control-id 3.1.3.", "props": [ @@ -10333,7 +10333,7 @@ ] }, { - "uuid": "fe17bb30-c1c9-4e75-8eaa-8b678144f2db", + "uuid": "97fa3a42-5066-4786-8b53-cff0d1d774ca", "control-id": "cis_rhel10_3-2.1", "description": "No notes for control-id 3.2.1.", "props": [ @@ -10350,7 +10350,7 @@ ] }, { - "uuid": "f06d241f-5a18-4a52-b8d6-a6be87a4c839", + "uuid": "dc0bfb26-cf7c-445f-af75-b8dbe53748d5", "control-id": "cis_rhel10_3-2.2", "description": "No notes for control-id 3.2.2.", "props": [ @@ -10367,7 +10367,7 @@ ] }, { - "uuid": "f6564e70-ab09-4749-8b24-35450876141d", + "uuid": "fcfd758d-9027-41b4-aee9-967c8385d915", "control-id": "cis_rhel10_3-2.3", "description": "No notes for control-id 3.2.3.", "props": [ @@ -10384,7 +10384,7 @@ ] }, { - "uuid": "7713b0a8-e192-4d7f-99c8-e464d61d2ea4", + "uuid": "0b9e4e27-cf4b-4b45-8f89-e56c30146515", "control-id": "cis_rhel10_3-2.4", "description": "No notes for control-id 3.2.4.", "props": [ @@ -10401,7 +10401,7 @@ ] }, { - "uuid": "aa07ea21-d880-4be1-97ef-6e17081c961e", + "uuid": "3046799c-f49b-4f0f-9b49-e6c7cc555db9", "control-id": "cis_rhel10_3-2.5", "description": "No notes for control-id 3.2.5.", "props": [ @@ -10418,7 +10418,7 @@ ] }, { - "uuid": "f7ec3e05-a8f4-4eab-93d7-ce006d680eb9", + "uuid": "2cbdeec5-4453-4118-a8fa-c5bebd4fccc0", "control-id": "cis_rhel10_3-2.6", "description": "No notes for control-id 3.2.6.", "props": [ @@ -10435,7 +10435,7 @@ ] }, { - "uuid": "3f6bb7cf-3cde-4969-bd43-e8a9571896ea", + "uuid": "f37ed43e-b5b5-4bd8-9848-7e9876765b3f", "control-id": "cis_rhel10_3-3.1.2", "description": "No notes for control-id 3.3.1.2.", "props": [ @@ -10452,7 +10452,7 @@ ] }, { - "uuid": "4aa69b6b-9cb2-4fd0-9eb6-b644ddc48a6d", + "uuid": "891d82be-c871-4b09-b685-20a92577963a", "control-id": "cis_rhel10_3-3.1.3", "description": "No notes for control-id 3.3.1.3.", "props": [ @@ -10469,7 +10469,7 @@ ] }, { - "uuid": "1577a10a-fac7-4103-a46f-6386c43471d6", + "uuid": "7ba380b0-e3bf-4379-a1c5-8a6491f18c48", "control-id": "cis_rhel10_3-3.1.4", "description": "No notes for control-id 3.3.1.4.", "props": [ @@ -10486,7 +10486,7 @@ ] }, { - "uuid": "49c6e6d3-f674-48d1-8f83-7553cdaa6ad9", + "uuid": "36c4021d-cdf5-4c34-b3f9-8b45adb12d00", "control-id": "cis_rhel10_3-3.1.5", "description": "No notes for control-id 3.3.1.5.", "props": [ @@ -10503,7 +10503,7 @@ ] }, { - "uuid": "c3842e3d-fea3-4170-bcc7-55611e586471", + "uuid": "650ab2d2-23ed-4a48-974e-8559c9f552b2", "control-id": "cis_rhel10_3-3.1.6", "description": "No notes for control-id 3.3.1.6.", "props": [ @@ -10520,7 +10520,7 @@ ] }, { - "uuid": "04586302-6e25-4404-9c4b-af4bff42c9e7", + "uuid": "3f62d639-c4da-4a5a-91ee-1c85f1132cf5", "control-id": "cis_rhel10_3-3.1.7", "description": "No notes for control-id 3.3.1.7.", "props": [ @@ -10537,7 +10537,7 @@ ] }, { - "uuid": "9f2ef66f-b173-492f-b8ba-52e31e748447", + "uuid": "fa0f89f7-d0ce-4ef7-8f72-640679ddc36b", "control-id": "cis_rhel10_3-3.1.8", "description": "No notes for control-id 3.3.1.8.", "props": [ @@ -10554,7 +10554,7 @@ ] }, { - "uuid": "47d67b4c-cfdc-49d4-b5e4-725fff768e20", + "uuid": "1d7d1d51-7211-4ad4-aa4e-bc0b4e640b34", "control-id": "cis_rhel10_3-3.1.9", "description": "No notes for control-id 3.3.1.9.", "props": [ @@ -10571,7 +10571,7 @@ ] }, { - "uuid": "9c60a62d-7eec-4084-8522-005794cc3fd7", + "uuid": "4c797be4-9e44-43e7-8803-cda23fb1e81f", "control-id": "cis_rhel10_3-3.1.10", "description": "No notes for control-id 3.3.1.10.", "props": [ @@ -10588,7 +10588,7 @@ ] }, { - "uuid": "f05c0a8c-723c-4653-aaf0-014d6fb86a3a", + "uuid": "fac0a1ce-e2ae-4ec1-be5d-a1ecbc53b1ef", "control-id": "cis_rhel10_3-3.1.11", "description": "No notes for control-id 3.3.1.11.", "props": [ @@ -10605,7 +10605,7 @@ ] }, { - "uuid": "a628a4b6-5b42-4112-8151-5ff13825f970", + "uuid": "54b6bcdf-dad0-4560-9744-284e6b352752", "control-id": "cis_rhel10_3-3.1.12", "description": "No notes for control-id 3.3.1.12.", "props": [ @@ -10622,7 +10622,7 @@ ] }, { - "uuid": "9c43fc43-b68d-42e9-ba44-67d62f08a2f5", + "uuid": "bf1242b4-c504-4738-9e0a-546954b82153", "control-id": "cis_rhel10_3-3.1.13", "description": "No notes for control-id 3.3.1.13.", "props": [ @@ -10639,7 +10639,7 @@ ] }, { - "uuid": "07756683-33a9-424e-983e-1d734f3fdd0d", + "uuid": "3a75cb18-8055-44f1-bf06-fe061f05386f", "control-id": "cis_rhel10_3-3.1.14", "description": "No notes for control-id 3.3.1.14.", "props": [ @@ -10656,7 +10656,7 @@ ] }, { - "uuid": "1407dbbb-23cb-430b-8d26-266c9aa5f1ec", + "uuid": "68bc89cb-0fd6-4685-a982-1180f9c583bf", "control-id": "cis_rhel10_3-3.1.15", "description": "No notes for control-id 3.3.1.15.", "props": [ @@ -10673,7 +10673,7 @@ ] }, { - "uuid": "91231512-fd68-48d8-afd6-2693c25d00a9", + "uuid": "bb63f15c-bdb1-442c-9b68-637374e8af36", "control-id": "cis_rhel10_3-3.1.16", "description": "No notes for control-id 3.3.1.16.", "props": [ @@ -10690,7 +10690,7 @@ ] }, { - "uuid": "96059859-7484-42df-8064-ad106d965895", + "uuid": "c5796f13-6d58-404e-a428-d36f26263058", "control-id": "cis_rhel10_3-3.1.17", "description": "No notes for control-id 3.3.1.17.", "props": [ @@ -10707,7 +10707,7 @@ ] }, { - "uuid": "772e0ae4-4bf0-4303-9131-37220ce18edd", + "uuid": "bbe56ad2-aefd-417e-82cd-c9df9a026e68", "control-id": "cis_rhel10_3-3.1.18", "description": "No notes for control-id 3.3.1.18.", "props": [ @@ -10724,7 +10724,7 @@ ] }, { - "uuid": "35c8c841-1758-4760-8de9-9fb56da68833", + "uuid": "cfc817d4-22e1-479f-93d4-68fa67f30eca", "control-id": "cis_rhel10_3-3.2.1", "description": "No notes for control-id 3.3.2.1.", "props": [ @@ -10741,7 +10741,7 @@ ] }, { - "uuid": "d233a056-0e75-49f3-9341-42537794d5d5", + "uuid": "140c4861-f84f-44bc-87db-1db034b2a435", "control-id": "cis_rhel10_3-3.2.2", "description": "No notes for control-id 3.3.2.2.", "props": [ @@ -10758,7 +10758,7 @@ ] }, { - "uuid": "a977cb55-b827-43c1-8569-bea8fec4679e", + "uuid": "53d0644c-d021-4798-9ead-a2b1e87932a0", "control-id": "cis_rhel10_3-3.2.3", "description": "No notes for control-id 3.3.2.3.", "props": [ @@ -10775,7 +10775,7 @@ ] }, { - "uuid": "7163aca1-bc6c-425c-a4a5-aaa46edd8561", + "uuid": "c8a9bf48-9123-44eb-a33e-1a175acd36a2", "control-id": "cis_rhel10_3-3.2.4", "description": "No notes for control-id 3.3.2.4.", "props": [ @@ -10792,7 +10792,7 @@ ] }, { - "uuid": "2d3bb6d7-a141-4527-9228-50e1e8117a21", + "uuid": "bfcc6228-65ee-4cbd-ada6-c9ae2c76e343", "control-id": "cis_rhel10_3-3.2.5", "description": "No notes for control-id 3.3.2.5.", "props": [ @@ -10809,7 +10809,7 @@ ] }, { - "uuid": "c82724e4-58e7-4248-8358-8bdac73c21c6", + "uuid": "d84d27e5-2b13-43aa-8cbb-43c326ea437d", "control-id": "cis_rhel10_3-3.2.6", "description": "No notes for control-id 3.3.2.6.", "props": [ @@ -10826,7 +10826,7 @@ ] }, { - "uuid": "7ed06b85-4ce8-4632-a226-0bd73df85bc6", + "uuid": "a6723510-b0e9-4a7f-bd73-294948cfde2b", "control-id": "cis_rhel10_3-3.2.7", "description": "No notes for control-id 3.3.2.7.", "props": [ @@ -10843,7 +10843,7 @@ ] }, { - "uuid": "6fb7ab8a-78f1-4da8-9847-2b6de16c5206", + "uuid": "2ae23adf-da20-405f-8337-f156197ad3bd", "control-id": "cis_rhel10_3-3.2.8", "description": "No notes for control-id 3.3.2.8.", "props": [ @@ -10860,7 +10860,7 @@ ] }, { - "uuid": "0dd8c41d-31b1-4030-80a7-5ef0547da074", + "uuid": "fa4f482b-9508-4720-937a-888f7122d40f", "control-id": "cis_rhel10_4-1.1", "description": "No notes for control-id 4.1.1.", "props": [ @@ -10877,7 +10877,7 @@ ] }, { - "uuid": "779b3b93-701d-4e6a-8cd3-c786c4946753", + "uuid": "026bac13-622e-4f92-880e-0dc4c0b439a0", "control-id": "cis_rhel10_4-1.2", "description": "No notes for control-id 4.1.2.", "props": [ @@ -10894,7 +10894,7 @@ ] }, { - "uuid": "47bf942e-eb4f-4257-8bb2-9b0bc7be9227", + "uuid": "d21c1ad0-363e-4346-8c81-e0106fd24b4e", "control-id": "cis_rhel10_4-1.3", "description": "No notes for control-id 4.1.3.", "props": [ @@ -10911,7 +10911,7 @@ ] }, { - "uuid": "d61a71bc-9396-4a2f-bf17-e65052631479", + "uuid": "a2d1fba9-631f-4056-9ab9-7f77077f621e", "control-id": "cis_rhel10_4-1.4", "description": "The description for control-id cis_rhel10_4-1.4.", "props": [ @@ -10919,12 +10919,12 @@ "name": "implementation-status", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "alternative", - "remarks": "No notes for control-id 4.1.4." + "remarks": "There is not an easy way to do this for only active zones using OVAL.\nFor now, there are are no rules for this control." } ] }, { - "uuid": "335fb6c1-b778-4119-9826-7dda1d33ca5b", + "uuid": "3f2cf41a-7f97-418d-9de5-e8d2ebdca587", "control-id": "cis_rhel10_4-1.5", "description": "Firewalld in Red Hat Enterprise Linux 10 accepts loopback traffic by default.", "props": [ @@ -10941,7 +10941,7 @@ ] }, { - "uuid": "83348104-fea2-435a-8add-6debde79a884", + "uuid": "8a54e455-293d-46e4-b986-c613c798a016", "control-id": "cis_rhel10_4-1.6", "description": "The description for control-id cis_rhel10_4-1.6.", "props": [ @@ -10954,7 +10954,7 @@ ] }, { - "uuid": "ba3645f2-43a7-4a7f-930b-8ad3544c6639", + "uuid": "584c8090-a18c-4f00-a1a8-ca9df4910547", "control-id": "cis_rhel10_4-1.7", "description": "The description for control-id cis_rhel10_4-1.7.", "props": [ @@ -10967,7 +10967,7 @@ ] }, { - "uuid": "b0278187-239e-43e6-bde2-8854cb4bb3fc", + "uuid": "d5b4085e-ef9c-4342-a1f5-8968e090519c", "control-id": "cis_rhel10_5-1.1", "description": "No notes for control-id 5.1.1.", "props": [ @@ -11024,7 +11024,7 @@ ] }, { - "uuid": "1a7ba208-3907-45ae-acc8-80f9f111681c", + "uuid": "98de5e63-0036-4346-992e-68e06254f705", "control-id": "cis_rhel10_5-1.2", "description": "No notes for control-id 5.1.2.", "props": [ @@ -11051,7 +11051,7 @@ ] }, { - "uuid": "a037f80f-77bc-4fa4-ba4b-69439b3d5a5f", + "uuid": "4a33c0dd-28c8-46d7-bf1c-74a6a36bf1c9", "control-id": "cis_rhel10_5-1.3", "description": "No notes for control-id 5.1.3.", "props": [ @@ -11078,7 +11078,7 @@ ] }, { - "uuid": "423bde49-4b84-4098-bfe5-772f957efea9", + "uuid": "db98facd-4449-48f4-aa04-d4e22f5c93b8", "control-id": "cis_rhel10_5-1.4", "description": "No notes for control-id 5.1.4.", "props": [ @@ -11095,7 +11095,7 @@ ] }, { - "uuid": "e8f5cdb4-3fd9-41c6-87ed-8e0309b3f202", + "uuid": "3e18ab88-becb-4cdd-8bb4-24089793b6f3", "control-id": "cis_rhel10_5-1.5", "description": "No notes for control-id 5.1.5.", "props": [ @@ -11112,7 +11112,7 @@ ] }, { - "uuid": "87ff263a-3084-442d-a6f1-59026c44351d", + "uuid": "9c1d8c84-bf01-4faa-9002-09076d5a181e", "control-id": "cis_rhel10_5-1.6", "description": "No notes for control-id 5.1.6.", "props": [ @@ -11129,7 +11129,7 @@ ] }, { - "uuid": "1adeef60-bff0-479f-9d44-0ddb69abe1b4", + "uuid": "d7b7fcfc-ed4f-405f-aa2d-523b84384310", "control-id": "cis_rhel10_5-1.7", "description": "The requirement gives an example of 45 seconds, but is flexible about the values. It is only\nnecessary to ensure there is a timeout configured in alignment to the site policy.", "props": [ @@ -11151,7 +11151,7 @@ ] }, { - "uuid": "10a75803-ef5e-4891-9bfb-432ec1c383ba", + "uuid": "555649b9-877a-4b26-9dda-667209a68450", "control-id": "cis_rhel10_5-1.10", "description": "No notes for control-id 5.1.10.", "props": [ @@ -11168,7 +11168,7 @@ ] }, { - "uuid": "f6ca7633-b264-4ccc-a0af-086e1458db70", + "uuid": "f666fae8-41e5-44ce-82a0-bd557b7a1ece", "control-id": "cis_rhel10_5-1.11", "description": "No notes for control-id 5.1.11.", "props": [ @@ -11185,7 +11185,7 @@ ] }, { - "uuid": "05f7d706-b470-4414-899b-c7bcd78f6338", + "uuid": "6a50655f-c11b-477f-a475-1ab2e98c7837", "control-id": "cis_rhel10_5-1.12", "description": "The description for control-id cis_rhel10_5-1.12.", "props": [ @@ -11203,7 +11203,7 @@ ] }, { - "uuid": "a379099f-46cf-47ce-aa5f-5e63a8836a79", + "uuid": "d01ec016-1a23-4f64-980a-49f71a7e1fde", "control-id": "cis_rhel10_5-1.13", "description": "No notes for control-id 5.1.13.", "props": [ @@ -11220,7 +11220,7 @@ ] }, { - "uuid": "5d78bbfc-596c-465d-9462-f26b14a17ceb", + "uuid": "6db9bb26-acc2-47c9-a9b3-91b08b733bce", "control-id": "cis_rhel10_5-1.14", "description": "The CIS benchmark is not opinionated about which loglevel is selected here. Here, this\nprofile uses VERBOSE by default, as it allows for the capture of login and logout activity\nas well as key fingerprints.", "props": [ @@ -11237,7 +11237,7 @@ ] }, { - "uuid": "34ab12dc-7982-41e4-a4af-df783b99e869", + "uuid": "6829448e-23ad-4a5a-833c-7f20b060a873", "control-id": "cis_rhel10_5-1.15", "description": "No notes for control-id 5.1.15.", "props": [ @@ -11254,7 +11254,7 @@ ] }, { - "uuid": "ec921d2f-202d-4288-a5d0-df197b3537aa", + "uuid": "1222996d-2fd1-43f2-ac2c-28bd848beb5e", "control-id": "cis_rhel10_5-1.16", "description": "No notes for control-id 5.1.16.", "props": [ @@ -11271,7 +11271,7 @@ ] }, { - "uuid": "3c13b640-0038-47c5-93ce-c65d75e46a67", + "uuid": "67b9746d-6c75-4f9e-8a16-ca82b32e7b5d", "control-id": "cis_rhel10_5-1.17", "description": "No notes for control-id 5.1.17.", "props": [ @@ -11288,7 +11288,7 @@ ] }, { - "uuid": "e295d990-c27f-48b7-b8f4-6a0053873ab3", + "uuid": "89fcd82b-39fa-4dcd-8854-c080b400974a", "control-id": "cis_rhel10_5-1.18", "description": "No notes for control-id 5.1.18.", "props": [ @@ -11305,7 +11305,7 @@ ] }, { - "uuid": "db99d356-120e-4a4f-bc8d-6f66a8772c0b", + "uuid": "aee5d649-082c-48fc-9297-718321c9e3c6", "control-id": "cis_rhel10_5-1.19", "description": "No notes for control-id 5.1.19.", "props": [ @@ -11322,7 +11322,7 @@ ] }, { - "uuid": "4ebbff45-e336-48cc-8d83-ec2e3b381724", + "uuid": "cedb5260-9fdc-4e36-ab1e-26639f50da8b", "control-id": "cis_rhel10_5-1.20", "description": "No notes for control-id 5.1.20.", "props": [ @@ -11339,7 +11339,7 @@ ] }, { - "uuid": "a9f5d127-fe7e-4a68-8038-f2e258f65e2f", + "uuid": "e3a35d1e-cbed-4c48-8c1a-b6f5ac9ab682", "control-id": "cis_rhel10_5-1.21", "description": "No notes for control-id 5.1.21.", "props": [ @@ -11356,7 +11356,7 @@ ] }, { - "uuid": "175c9492-e870-4ab6-a9d0-20d764e745c8", + "uuid": "bf4697ef-4cbf-4d83-a5f9-3500ec6affd1", "control-id": "cis_rhel10_5-1.22", "description": "No notes for control-id 5.1.22.", "props": [ @@ -11373,7 +11373,7 @@ ] }, { - "uuid": "56c9c9dd-f180-46b8-8085-d7cc79985188", + "uuid": "81d9eef7-0f31-49cf-aa3d-fc857043a5cc", "control-id": "cis_rhel10_5-2.1", "description": "No notes for control-id 5.2.1.", "props": [ @@ -11390,7 +11390,7 @@ ] }, { - "uuid": "33ebc51c-74ae-4691-8dc6-859acd874bd1", + "uuid": "81c3034b-3e3b-41e1-8ca1-558b1a1fe928", "control-id": "cis_rhel10_5-2.2", "description": "No notes for control-id 5.2.2.", "props": [ @@ -11407,7 +11407,7 @@ ] }, { - "uuid": "d3ef39f3-851d-4b71-9ff9-b015ddf42f35", + "uuid": "406c7f15-ec1e-49f7-a517-ac69f0d6ea30", "control-id": "cis_rhel10_5-2.3", "description": "No notes for control-id 5.2.3.", "props": [ @@ -11424,7 +11424,7 @@ ] }, { - "uuid": "9e3b76a3-9893-473d-b7a2-cb1975a4a649", + "uuid": "a1ebb41a-f554-4628-a1ea-931f3cf8a611", "control-id": "cis_rhel10_5-2.5", "description": "No notes for control-id 5.2.5.", "props": [ @@ -11441,7 +11441,7 @@ ] }, { - "uuid": "869cd847-824d-4593-be01-86d09464be88", + "uuid": "5f02b4af-2d53-4c06-8027-ad2e7e11c8f1", "control-id": "cis_rhel10_5-2.6", "description": "No notes for control-id 5.2.6.", "props": [ @@ -11458,7 +11458,7 @@ ] }, { - "uuid": "66fd1d9e-f6ea-4bed-9159-54beaa5f10db", + "uuid": "17e27a35-f4be-46f0-978a-f6277dc7a6bc", "control-id": "cis_rhel10_5-2.7", "description": "Members of \"wheel\" or GID 0 groups are checked by default if the group option is not set for\npam_wheel.so module. The recommendation states the group should be empty to reinforce the\nuse of \"sudo\" for privileged access. Therefore, members of these groups should be manually\nchecked or a different group should be informed.", "props": [ @@ -11480,7 +11480,7 @@ ] }, { - "uuid": "e1073c90-af53-4eaa-8b15-ef52004d5a11", + "uuid": "8433ee76-1555-4f20-b155-03f68735e122", "control-id": "cis_rhel10_5-3.1.1", "description": "This requirement is hard to be automated without any specific requirement. The policy even\nstates that provided commands are examples, other custom settings might be in place and the\nsettings might be different depending on site policies. The other rules will already make\nsure there is a correct autheselect profile regardless of the existing settings. It is\nnecessary to better discuss with CIS Community.", "props": [ @@ -11492,7 +11492,7 @@ ] }, { - "uuid": "b828e176-af35-4577-a005-076279eebd61", + "uuid": "a9505f86-b520-4317-9023-df67272267e0", "control-id": "cis_rhel10_5-3.1.2", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.1.", "props": [ @@ -11514,7 +11514,7 @@ ] }, { - "uuid": "432d8716-f89d-4197-ab95-5c0204047b20", + "uuid": "0468f3d3-fa00-4f75-ba34-072ef05be793", "control-id": "cis_rhel10_5-3.1.3", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.2.", "props": [ @@ -11541,7 +11541,7 @@ ] }, { - "uuid": "b2487b11-dcb2-4774-9d79-9fb29f6c19ac", + "uuid": "d0662761-61c9-4ad2-aec1-b7bcb9ff6da8", "control-id": "cis_rhel10_5-3.1.4", "description": "The module is properly enabled by the rules mentioned in related_rules.\nRequirements in 5.3.2.3 use these rules.", "props": [ @@ -11553,7 +11553,7 @@ ] }, { - "uuid": "4fe4142d-d020-49e5-b3e1-9fa149337e4a", + "uuid": "c45c3394-da10-42c0-89f2-9203101b32c3", "control-id": "cis_rhel10_5-3.1.5", "description": "No notes for control-id 5.3.1.5.", "props": [ @@ -11570,7 +11570,7 @@ ] }, { - "uuid": "05425f37-73dc-4fc1-aa32-362c4d0c654f", + "uuid": "cd143ba9-78a6-4cfb-a685-4c68ceba0ba2", "control-id": "cis_rhel10_5-3.2.1.1", "description": "No notes for control-id 5.3.2.1.1.", "props": [ @@ -11587,7 +11587,7 @@ ] }, { - "uuid": "44dbfffb-9676-4beb-a428-fa7a81fc0e2e", + "uuid": "c17e00aa-da13-4eb7-bf4c-12ec964fb614", "control-id": "cis_rhel10_5-3.2.1.2", "description": "The policy also accepts value 0, which means the locked accounts should be manually unlocked\nby an administrator. However, it also mentions that using value 0 can facilitate a DoS\nattack to legitimate users.", "props": [ @@ -11604,7 +11604,7 @@ ] }, { - "uuid": "68998d85-74d3-4e7a-bd8b-3780b25b2382", + "uuid": "380ad109-f246-4d9f-a865-62b9ddc99b48", "control-id": "cis_rhel10_5-3.2.2.1", "description": "No notes for control-id 5.3.2.2.1.", "props": [ @@ -11621,7 +11621,7 @@ ] }, { - "uuid": "07558737-7a98-4a22-92a6-a3475995e307", + "uuid": "9b24eb80-8373-4695-969c-5e2092952b7b", "control-id": "cis_rhel10_5-3.2.2.2", "description": "No notes for control-id 5.3.2.2.2.", "props": [ @@ -11638,7 +11638,7 @@ ] }, { - "uuid": "7bf956d2-fc40-492a-852d-bf3edb7dd66d", + "uuid": "9ba03abf-34b1-4f94-89d9-8e99c0da3452", "control-id": "cis_rhel10_5-3.2.2.3", "description": "This requirement is expected to be manual. However, in previous versions of the policy\nit was already automated the configuration of \"minclass\" option. This posture was kept for\nRHEL 10 in this new version. Rules related to other options are informed in related_rules.\nIn short, minclass=4 alone can achieve the same result achieved by the combination of the\nother 4 options mentioned in the policy.", "props": [ @@ -11655,7 +11655,7 @@ ] }, { - "uuid": "d685aa9e-c7af-43c9-ae99-54358ee347ed", + "uuid": "a55af814-741f-40df-a7aa-3faa8b767990", "control-id": "cis_rhel10_5-3.2.2.4", "description": "No notes for control-id 5.3.2.2.4.", "props": [ @@ -11672,7 +11672,7 @@ ] }, { - "uuid": "a63736b1-4802-4d9b-8a9f-b2fbb530d86f", + "uuid": "9ffd9f07-469c-44da-8699-4ccce9f0e1af", "control-id": "cis_rhel10_5-3.2.2.5", "description": "No notes for control-id 5.3.2.2.5.", "props": [ @@ -11689,7 +11689,7 @@ ] }, { - "uuid": "681e9ce1-cd67-4b7f-8cf6-9c32073b3ca6", + "uuid": "81fac593-7702-450f-8cf0-ff51c1feb424", "control-id": "cis_rhel10_5-3.2.2.6", "description": "No notes for control-id 5.3.2.2.6.", "props": [ @@ -11706,7 +11706,7 @@ ] }, { - "uuid": "1ddb4d39-6441-45c6-bcea-d4e9e15d859e", + "uuid": "db59aeac-2e98-4a90-be0c-5adf0811e149", "control-id": "cis_rhel10_5-3.2.2.7", "description": "No notes for control-id 5.3.2.2.7.", "props": [ @@ -11723,7 +11723,7 @@ ] }, { - "uuid": "044d8fac-fa04-4afa-b44e-a38159266ef0", + "uuid": "d38effcb-e2d9-4da6-8800-6da6bf68f315", "control-id": "cis_rhel10_5-3.2.3.1", "description": "Although mentioned in the section 5.3.3.3, there is no explicit requirement to configure\nretry option of pam_pwhistory. If come in the future, the rule accounts_password_pam_retry\ncan be used.", "props": [ @@ -11745,7 +11745,7 @@ ] }, { - "uuid": "77313e4d-3e91-408a-bba8-648ec7438cb2", + "uuid": "9a7f717f-3889-4393-8f44-7c76bd59f680", "control-id": "cis_rhel10_5-3.2.3.2", "description": "No notes for control-id 5.3.2.3.2.", "props": [ @@ -11762,7 +11762,7 @@ ] }, { - "uuid": "00dbc305-4939-4454-bb78-f833e8fc21b8", + "uuid": "ee14fb27-0ee2-4eea-bf8f-9f09adbd87c0", "control-id": "cis_rhel10_5-3.2.3.3", "description": "In RHEL 10 pam_pwhistory is enabled via authselect feature, as required in 5.3.1.4. The\nfeature automatically set \"use_authok\" option. In any case, we don't have a rule to check\nthis option specifically.", "props": [ @@ -11779,7 +11779,7 @@ ] }, { - "uuid": "94294d3d-3f88-41ce-9286-37c4e6100147", + "uuid": "64a6adcd-c4e2-4c76-b6fa-53a94e342c93", "control-id": "cis_rhel10_5-3.2.4.1", "description": "The rule more specifically used in this requirement also satify the requirement 5.3.1.5.", "props": [ @@ -11796,7 +11796,7 @@ ] }, { - "uuid": "14cf50b9-ba72-4af5-b9cf-a9c60330ba06", + "uuid": "45212d0e-c115-40ea-b61f-20259bf865c9", "control-id": "cis_rhel10_5-3.2.4.2", "description": "Usage of pam_unix.so module together with \"remember\" option is deprecated and is not\nrecommended by this policy. Instead, it should be used remember option of pam_pwhistory\nmodule, as required in 5.3.2.3.1. See here for more details about pam_unix.so:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1778929", "props": [ @@ -11813,7 +11813,7 @@ ] }, { - "uuid": "a9e2ae10-074b-452e-8928-41223ee74e21", + "uuid": "d4d8e7b5-d95e-4ff5-80b8-4a074a4c77b2", "control-id": "cis_rhel10_5-3.2.4.3", "description": "Changes in logindefs mentioned in this requirement are more specifically covered by 5.4.1.4", "props": [ @@ -11835,7 +11835,7 @@ ] }, { - "uuid": "f327a6b9-5bee-48e2-9527-2da148661515", + "uuid": "c6178f0f-6471-4825-86bb-162367d1db01", "control-id": "cis_rhel10_5-3.2.4.4", "description": "In RHEL 10 pam_unix is enabled by default in all authselect profiles already with the\nuse_authtok option set. In any case, we don't have a rule to check this option specifically,\nlike in 5.3.2.3.3.", "props": [ @@ -11852,7 +11852,7 @@ ] }, { - "uuid": "2a4c377a-9870-4330-9fd9-07591105761a", + "uuid": "2d45a09c-0043-496d-8f04-25d36f6ee467", "control-id": "cis_rhel10_5-4.1.1", "description": "No notes for control-id 5.4.1.1.", "props": [ @@ -11874,7 +11874,7 @@ ] }, { - "uuid": "1a749009-d6a1-42b9-9900-f89ebf605b13", + "uuid": "9f09e11c-95bd-4283-a57f-5a398cdffb80", "control-id": "cis_rhel10_5-4.1.3", "description": "No notes for control-id 5.4.1.3.", "props": [ @@ -11896,7 +11896,7 @@ ] }, { - "uuid": "84e023c5-51c2-4e63-9687-dc6b5f00e358", + "uuid": "14ec3ce7-8af9-4aef-b011-3b73ab325a61", "control-id": "cis_rhel10_5-4.1.4", "description": "There's a \"new\" set of options in /etc/login.defs file to define the number of iterations\nperformed during the hashing process.", "props": [ @@ -11918,7 +11918,7 @@ ] }, { - "uuid": "22db36ee-a78b-4bce-9d6e-fce71b1d0258", + "uuid": "e6ba5638-b7cd-4a8a-9e4f-dd48312acbad", "control-id": "cis_rhel10_5-4.1.5", "description": "No notes for control-id 5.4.1.5.", "props": [ @@ -11940,7 +11940,7 @@ ] }, { - "uuid": "566735f7-d041-4eac-8fea-9b8023881351", + "uuid": "7b348288-896b-458b-946c-b300fee7d7ee", "control-id": "cis_rhel10_5-4.1.6", "description": "No notes for control-id 5.4.1.6.", "props": [ @@ -11957,7 +11957,7 @@ ] }, { - "uuid": "d2235499-f8eb-4c61-9b73-7dfc36da0731", + "uuid": "f448c907-59c1-4777-ad22-ad2f1d25f112", "control-id": "cis_rhel10_5-4.2.1", "description": "No notes for control-id 5.4.2.1.", "props": [ @@ -11974,7 +11974,7 @@ ] }, { - "uuid": "35b7af36-daa3-4022-9ab1-8c85fb2c1a9c", + "uuid": "de0668d9-3530-48f8-98af-4737a6298cc3", "control-id": "cis_rhel10_5-4.2.2", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -11991,7 +11991,7 @@ ] }, { - "uuid": "e0b19090-bbe3-4e05-a804-e67eb89a2b18", + "uuid": "6ec30d78-5282-4fc7-9593-b35e5199e97c", "control-id": "cis_rhel10_5-4.2.3", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -12008,7 +12008,7 @@ ] }, { - "uuid": "5092c32d-5f27-4d54-9f98-30c76507461d", + "uuid": "ff6de686-e28d-481f-bcc4-32d939aa8fe1", "control-id": "cis_rhel10_5-4.2.4", "description": "No notes for control-id 5.4.2.4.", "props": [ @@ -12025,7 +12025,7 @@ ] }, { - "uuid": "aa6bb1c2-0ada-47f6-a55a-b79188f3afdf", + "uuid": "b62b8d41-ef29-4f61-9c4a-6a69bf8dce44", "control-id": "cis_rhel10_5-4.2.5", "description": "No notes for control-id 5.4.2.5.", "props": [ @@ -12047,7 +12047,7 @@ ] }, { - "uuid": "f70822f9-87c8-41ef-80e2-7ecfdaad6dba", + "uuid": "04c78af4-cd4d-481d-8a4e-966c66457c7d", "control-id": "cis_rhel10_5-4.2.6", "description": "No notes for control-id 5.4.2.6.", "props": [ @@ -12064,7 +12064,7 @@ ] }, { - "uuid": "71477e5c-21eb-44ff-a84d-e0a0b242bfa7", + "uuid": "efc49d1b-2a30-4436-af46-f61c7cd35d13", "control-id": "cis_rhel10_5-4.2.7", "description": "No notes for control-id 5.4.2.7.", "props": [ @@ -12086,7 +12086,7 @@ ] }, { - "uuid": "b72fa05b-ddf8-4305-8873-a9f182f7d3c7", + "uuid": "42a6fddc-4c22-4d46-a0dd-57dca05f30bf", "control-id": "cis_rhel10_5-4.2.8", "description": "No notes for control-id 5.4.2.8.", "props": [ @@ -12103,7 +12103,7 @@ ] }, { - "uuid": "3f001eb9-a05f-44f0-8ac3-201f3344e24a", + "uuid": "43498f47-7561-4c22-8f92-f954b31d9dd7", "control-id": "cis_rhel10_5-4.3.2", "description": "No notes for control-id 5.4.3.2.", "props": [ @@ -12120,7 +12120,7 @@ ] }, { - "uuid": "fdfbb3b0-6c34-4d2f-b4d9-df1b3601c9ed", + "uuid": "848e62dc-fa4f-4af2-844f-c90d9307648d", "control-id": "cis_rhel10_5-4.3.3", "description": "No notes for control-id 5.4.3.3.", "props": [ @@ -12147,7 +12147,7 @@ ] }, { - "uuid": "04c26451-d9db-426c-8c33-956209392b55", + "uuid": "c4187101-277c-4e16-9659-fd908a047599", "control-id": "cis_rhel10_6-1.1", "description": "No notes for control-id 6.1.1.", "props": [ @@ -12169,7 +12169,7 @@ ] }, { - "uuid": "63a5abfd-b8fd-48f0-9ada-621214942f46", + "uuid": "8aa3f0ff-f6b9-49c1-87d5-d10336b52da6", "control-id": "cis_rhel10_6-1.2", "description": "No notes for control-id 6.1.2.", "props": [ @@ -12186,7 +12186,7 @@ ] }, { - "uuid": "96bbbdfe-9b60-4f02-90e1-423c89c9bad5", + "uuid": "d97d9a12-69cd-4b56-9f3e-7112c5d535a7", "control-id": "cis_rhel10_6-1.3", "description": "No notes for control-id 6.1.3.", "props": [ @@ -12203,7 +12203,7 @@ ] }, { - "uuid": "adf3678e-6729-43cb-be75-b1b67186795c", + "uuid": "31e38ddd-f2da-4b7e-af4d-aaf8f4197b19", "control-id": "cis_rhel10_6-2.1.1", "description": "No notes for control-id 6.2.1.1.", "props": [ @@ -12220,7 +12220,7 @@ ] }, { - "uuid": "bd42116d-7fcf-4405-abb1-ad9d63338474", + "uuid": "a32abe66-dd6d-40e5-ac84-203c639aa571", "control-id": "cis_rhel10_6-2.1.2", "description": "The description for control-id cis_rhel10_6-2.1.2.", "props": [ @@ -12233,7 +12233,7 @@ ] }, { - "uuid": "448561e5-5405-480e-b19e-b32e88788733", + "uuid": "13af8f51-6453-48e2-a477-42c2bf9882bc", "control-id": "cis_rhel10_6-2.1.3", "description": "The description for control-id cis_rhel10_6-2.1.3.", "props": [ @@ -12246,7 +12246,7 @@ ] }, { - "uuid": "a27937ef-2f04-4190-b918-45aa16328666", + "uuid": "02724586-71c7-4d47-89c6-a50666f03f4e", "control-id": "cis_rhel10_6-2.1.4", "description": "No notes for control-id 6.2.1.4.", "props": [ @@ -12263,7 +12263,7 @@ ] }, { - "uuid": "b82c10bd-6e3f-4df4-9ca9-b59fe012f179", + "uuid": "a40dcf49-e890-4a51-8ed2-fdcf610a9ef1", "control-id": "cis_rhel10_6-2.2.1.1", "description": "No notes for control-id 6.2.2.1.1.", "props": [ @@ -12280,7 +12280,7 @@ ] }, { - "uuid": "0349dc43-dcdf-479d-a622-4d7b22a5bd37", + "uuid": "b2635735-12ad-459d-9363-cc6837834ed9", "control-id": "cis_rhel10_6-2.2.1.2", "description": "The description for control-id cis_rhel10_6-2.2.1.2.", "props": [ @@ -12293,7 +12293,7 @@ ] }, { - "uuid": "699af1ed-f4bf-483d-8e94-93a5ae8f6bac", + "uuid": "c488cb76-46ea-43b5-8f23-8e033334af22", "control-id": "cis_rhel10_6-2.2.1.3", "description": "No notes for control-id 6.2.2.1.3.", "props": [ @@ -12310,7 +12310,7 @@ ] }, { - "uuid": "1972e831-0542-465a-8be3-35c6bb9153a5", + "uuid": "f201fbf0-f11d-4898-acaf-fac5e25a6588", "control-id": "cis_rhel10_6-2.2.1.4", "description": "No notes for control-id 6.2.2.1.4.", "props": [ @@ -12327,7 +12327,7 @@ ] }, { - "uuid": "c2bb166d-c690-4ca0-a789-b907adc83e0b", + "uuid": "cf39d769-6b7b-474d-96cf-d1deb04c743f", "control-id": "cis_rhel10_6-2.2.2", "description": "No notes for control-id 6.2.2.2.", "props": [ @@ -12344,7 +12344,7 @@ ] }, { - "uuid": "4ae399f1-7046-4efb-9c72-5b358bf45250", + "uuid": "08eb4f46-3d2f-4224-9922-771e551ba173", "control-id": "cis_rhel10_6-2.2.3", "description": "No notes for control-id 6.2.2.3.", "props": [ @@ -12361,7 +12361,7 @@ ] }, { - "uuid": "f8c293e9-d866-46b8-8cfa-ced8a31d9606", + "uuid": "7a39d435-24c3-4fa3-8367-ef1b1003145d", "control-id": "cis_rhel10_6-2.2.4", "description": "No notes for control-id 6.2.2.4.", "props": [ @@ -12378,7 +12378,7 @@ ] }, { - "uuid": "b0a42e80-7a96-4337-9f37-66ea686dae94", + "uuid": "0a4b4fc3-c975-45d3-9c23-66ca2a2d652a", "control-id": "cis_rhel10_6-2.3.1", "description": "No notes for control-id 6.2.3.1.", "props": [ @@ -12390,7 +12390,7 @@ ] }, { - "uuid": "33ab8bb1-465c-431a-9d4f-4fb2896ea587", + "uuid": "95c5d94d-a5fe-4fbc-bb7b-11a77349d826", "control-id": "cis_rhel10_6-2.3.2", "description": "No notes for control-id 6.2.3.2.", "props": [ @@ -12402,7 +12402,7 @@ ] }, { - "uuid": "1407ba93-98c2-4a29-9701-cc29f75633bb", + "uuid": "4e1bc584-1c74-4759-aca0-113cdf1f2e39", "control-id": "cis_rhel10_6-2.3.3", "description": "No notes for control-id 6.2.3.3.", "props": [ @@ -12414,7 +12414,7 @@ ] }, { - "uuid": "57d1efb7-2fa8-4b30-ae31-b2809271eef2", + "uuid": "ed292ee8-5999-402e-955d-ee08ef80802c", "control-id": "cis_rhel10_6-2.3.4", "description": "No notes for control-id 6.2.3.4.", "props": [ @@ -12426,7 +12426,7 @@ ] }, { - "uuid": "049a351b-2ad2-4d09-be47-f02543d708d7", + "uuid": "3e7f34f3-0571-4de6-a084-441bf76b70af", "control-id": "cis_rhel10_6-2.3.5", "description": "The description for control-id cis_rhel10_6-2.3.5.", "props": [ @@ -12439,7 +12439,7 @@ ] }, { - "uuid": "335a42f5-835d-44da-8214-eff484b56628", + "uuid": "6e742522-abea-4449-badc-d88e9998fe37", "control-id": "cis_rhel10_6-2.3.6", "description": "The description for control-id cis_rhel10_6-2.3.6.", "props": [ @@ -12452,7 +12452,7 @@ ] }, { - "uuid": "774f4252-1a42-48a5-ae9f-0dd76c892240", + "uuid": "4d17658e-c631-4c5c-a18f-fd7b75f40ffd", "control-id": "cis_rhel10_6-2.3.7", "description": "No notes for control-id 6.2.3.7.", "props": [ @@ -12464,7 +12464,7 @@ ] }, { - "uuid": "290b781d-cea7-4eff-9c17-a456db5196ea", + "uuid": "57ea9385-271c-4dd2-bf97-5a6294652ec8", "control-id": "cis_rhel10_6-2.3.8", "description": "The description for control-id cis_rhel10_6-2.3.8.", "props": [ @@ -12477,7 +12477,7 @@ ] }, { - "uuid": "fff99cec-0419-4431-abfd-d42b2cf12f5f", + "uuid": "a9b701e6-c9ce-4e78-8641-dea53630c8bc", "control-id": "cis_rhel10_6-2.4.1", "description": "It is not harmful to run these rules even if rsyslog is not installed or active.", "props": [ @@ -12504,7 +12504,7 @@ ] }, { - "uuid": "a74be25b-5745-4c4d-9b0b-36906229c5b3", + "uuid": "07bcc97d-a8ae-4835-afcb-89cde44e1d14", "control-id": "cis_rhel10_7-1.1", "description": "No notes for control-id 7.1.1.", "props": [ @@ -12531,7 +12531,7 @@ ] }, { - "uuid": "3067a058-6107-4153-b6a8-0385b1de5e22", + "uuid": "7dd24574-15f9-483c-aea1-aa1c9e478489", "control-id": "cis_rhel10_7-1.2", "description": "No notes for control-id 7.1.2.", "props": [ @@ -12558,7 +12558,7 @@ ] }, { - "uuid": "fbf17046-cc66-4724-badf-e66efcd8ad37", + "uuid": "275a0d77-322f-4871-a14e-f346b4f7ff8e", "control-id": "cis_rhel10_7-1.3", "description": "No notes for control-id 7.1.3.", "props": [ @@ -12585,7 +12585,7 @@ ] }, { - "uuid": "b3e3515e-4b23-4370-8f08-6c5074fd8454", + "uuid": "cb5aa6da-dec0-49b9-9dc3-2f574b4aa7c7", "control-id": "cis_rhel10_7-1.4", "description": "No notes for control-id 7.1.4.", "props": [ @@ -12612,7 +12612,7 @@ ] }, { - "uuid": "71f60ddd-6875-4e01-959f-31412dd277ff", + "uuid": "1217bf29-ef95-42a9-9cf6-9b0e31e0cf1c", "control-id": "cis_rhel10_7-1.5", "description": "No notes for control-id 7.1.5.", "props": [ @@ -12639,7 +12639,7 @@ ] }, { - "uuid": "fb11915f-c4a1-45af-9765-d32f558833ce", + "uuid": "35e04c12-f837-445b-a87a-1bed93715193", "control-id": "cis_rhel10_7-1.6", "description": "No notes for control-id 7.1.6.", "props": [ @@ -12666,7 +12666,7 @@ ] }, { - "uuid": "ae2d1dac-7315-4a07-87c6-01166e2b12eb", + "uuid": "e8bb18fa-fb65-4ad7-84ec-1739a3fbf913", "control-id": "cis_rhel10_7-1.7", "description": "No notes for control-id 7.1.7.", "props": [ @@ -12693,7 +12693,7 @@ ] }, { - "uuid": "be291c14-0746-4cbc-8ec2-5a3a20956e40", + "uuid": "d02ae39a-1f12-4f6e-80a9-8da04ec7b1a5", "control-id": "cis_rhel10_7-1.8", "description": "No notes for control-id 7.1.8.", "props": [ @@ -12720,7 +12720,7 @@ ] }, { - "uuid": "a21c17f6-9758-4bcd-a048-51cbe4840ef1", + "uuid": "1fafda91-ea42-485f-bd4d-1ccca463227e", "control-id": "cis_rhel10_7-1.9", "description": "No notes for control-id 7.1.9.", "props": [ @@ -12747,7 +12747,7 @@ ] }, { - "uuid": "167a43cd-3c3e-4bf3-b650-3e49e288a5ce", + "uuid": "09620294-676a-4ca7-8ac9-c4da2500d30b", "control-id": "cis_rhel10_7-1.10", "description": "No notes for control-id 7.1.10.", "props": [ @@ -12789,7 +12789,7 @@ ] }, { - "uuid": "4d8891cc-cd67-45f1-ad72-07542335a137", + "uuid": "8cd4fbf7-b16f-4223-add5-c2c6f5550eaa", "control-id": "cis_rhel10_7-1.11", "description": "No notes for control-id 7.1.11.", "props": [ @@ -12811,7 +12811,7 @@ ] }, { - "uuid": "2a27a9a2-a011-44b7-b5ee-a1a8a93f5af6", + "uuid": "8573b063-bfe6-445f-9054-5d65bd3af797", "control-id": "cis_rhel10_7-1.12", "description": "No notes for control-id 7.1.12.", "props": [ @@ -12833,7 +12833,7 @@ ] }, { - "uuid": "089c7218-a25a-43ec-8dc9-384d2a0a0d2b", + "uuid": "a549ccbb-3277-4718-bc8b-08a85eb79917", "control-id": "cis_rhel10_7-1.13", "description": "The description for control-id cis_rhel10_7-1.13.", "props": [ @@ -12846,7 +12846,7 @@ ] }, { - "uuid": "8cfd0e33-4661-49eb-b54e-a5d0632794f4", + "uuid": "0dd7677d-d867-4823-a564-765f0531a3c1", "control-id": "cis_rhel10_7-2.1", "description": "No notes for control-id 7.2.1.", "props": [ @@ -12863,7 +12863,7 @@ ] }, { - "uuid": "54906feb-6fd3-4bfc-9732-92e675a1a788", + "uuid": "66384a0a-1dfe-48f9-8190-140c58d223e9", "control-id": "cis_rhel10_7-2.2", "description": "No notes for control-id 7.2.2.", "props": [ @@ -12880,7 +12880,7 @@ ] }, { - "uuid": "78b02b66-658d-40e8-99b5-6488576cc700", + "uuid": "ffbaae4b-490c-4da2-80c7-5f0060708ae8", "control-id": "cis_rhel10_7-2.3", "description": "No notes for control-id 7.2.3.", "props": [ @@ -12897,7 +12897,7 @@ ] }, { - "uuid": "faf799a7-874d-46cb-a65f-5a3517dd2d13", + "uuid": "fbd8273f-7108-41ad-a936-db2d23796c45", "control-id": "cis_rhel10_7-2.4", "description": "No notes for control-id 7.2.4.", "props": [ @@ -12914,7 +12914,7 @@ ] }, { - "uuid": "0604d903-5ded-41f9-a32f-418ecb27c701", + "uuid": "9d98730f-bc46-4795-a544-b0d1cb73adae", "control-id": "cis_rhel10_7-2.5", "description": "No notes for control-id 7.2.5.", "props": [ @@ -12931,7 +12931,7 @@ ] }, { - "uuid": "0e8c5ad7-4023-4dbf-9c40-8f77be8618e3", + "uuid": "f32512d4-2f88-4afd-a61a-b35422a0589b", "control-id": "cis_rhel10_7-2.6", "description": "No notes for control-id 7.2.6.", "props": [ @@ -12948,7 +12948,7 @@ ] }, { - "uuid": "8ca20a41-38db-4590-91ab-085d30fd5f44", + "uuid": "0945f568-7fe9-4616-a26f-3ad40dfa6a4e", "control-id": "cis_rhel10_7-2.7", "description": "No notes for control-id 7.2.7.", "props": [ @@ -12965,7 +12965,7 @@ ] }, { - "uuid": "62ae1c61-a6df-4913-9add-adf127928778", + "uuid": "3a891c04-3690-4bac-976d-670adaabfc82", "control-id": "cis_rhel10_7-2.8", "description": "No notes for control-id 7.2.8.", "props": [ @@ -12992,7 +12992,7 @@ ] }, { - "uuid": "1af28be2-a5e2-4075-b2a2-7702c2841b21", + "uuid": "6e3ed890-bb7d-4db7-b3aa-d60f642e2ba9", "control-id": "cis_rhel10_7-2.9", "description": "No notes for control-id 7.2.9.", "props": [ @@ -24726,7 +24726,7 @@ ], "control-implementations": [ { - "uuid": "9fb00875-f492-49df-860c-1d1da42b9481", + "uuid": "787f523c-3eaa-4382-967b-d91fe0e8bfa5", "source": "trestle://profiles/rhel10-cis_rhel10-l2_server/profile.json", "description": "Control implementation for cis", "props": [ @@ -25142,7 +25142,7 @@ ], "implemented-requirements": [ { - "uuid": "8fcbcd6e-1cab-46e6-a394-c69208293c4a", + "uuid": "1acd65fb-570f-4cf5-b7f2-3fdf1cc7a1f9", "control-id": "cis_rhel10_1-1.1.6", "description": "No notes for control-id 1.1.1.6.", "props": [ @@ -25159,7 +25159,7 @@ ] }, { - "uuid": "d62dbcf8-2cc0-4b6c-b668-db5e430993b9", + "uuid": "45396c6f-c786-423b-a224-72b502ad053a", "control-id": "cis_rhel10_1-1.1.7", "description": "No notes for control-id 1.1.1.7.", "props": [ @@ -25176,7 +25176,7 @@ ] }, { - "uuid": "ca7a05cd-0081-4e01-9780-d1dd170cb484", + "uuid": "578fb9fe-ba89-4b35-8c6c-affcfab67766", "control-id": "cis_rhel10_1-1.1.8", "description": "No notes for control-id 1.1.1.8.", "props": [ @@ -25193,7 +25193,7 @@ ] }, { - "uuid": "1fd99b3e-6ff2-468c-8381-df653c198419", + "uuid": "7da28af2-fbd5-43a2-aa49-26f68756b88f", "control-id": "cis_rhel10_1-1.2.3.1", "description": "No notes for control-id 1.1.2.3.1.", "props": [ @@ -25210,7 +25210,7 @@ ] }, { - "uuid": "c08f63ee-c8ae-487d-ac30-d0d1074e3f16", + "uuid": "3b92f53a-ba65-4de4-8603-17ee3a55d63a", "control-id": "cis_rhel10_1-1.2.4.1", "description": "No notes for control-id 1.1.2.4.1.", "props": [ @@ -25227,7 +25227,7 @@ ] }, { - "uuid": "17413451-67a2-4884-b9e3-ea6abce1ddea", + "uuid": "189136ff-81aa-4303-9f7b-a2ec7c688fc2", "control-id": "cis_rhel10_1-1.2.5.1", "description": "No notes for control-id 1.1.2.5.1.", "props": [ @@ -25244,7 +25244,7 @@ ] }, { - "uuid": "ad1dde29-c436-4610-9722-ed887b11b468", + "uuid": "68a0feee-7844-4044-a63b-cf5f4c848e14", "control-id": "cis_rhel10_1-1.2.6.1", "description": "No notes for control-id 1.1.2.6.1.", "props": [ @@ -25261,7 +25261,7 @@ ] }, { - "uuid": "c00e71b3-e8b4-41b2-93bd-a435114811ca", + "uuid": "fc928fe6-e8e2-484e-8157-efa6ca69df10", "control-id": "cis_rhel10_1-1.2.7.1", "description": "No notes for control-id 1.1.2.7.1.", "props": [ @@ -25278,7 +25278,7 @@ ] }, { - "uuid": "e21500d7-398a-4b4f-b3a0-4714bf62a28a", + "uuid": "33c9b809-834a-4518-bc33-4dc86f71dd3b", "control-id": "cis_rhel10_1-2.1.3", "description": "The description for control-id cis_rhel10_1-2.1.3.", "props": [ @@ -25291,7 +25291,7 @@ ] }, { - "uuid": "2ff1fa11-54e2-465e-a069-8c7b04dbb22d", + "uuid": "fa8a037c-401b-4184-bc71-196ba780e27f", "control-id": "cis_rhel10_1-2.1.5", "description": "No notes for control-id 1.2.1.5.", "props": [ @@ -25308,7 +25308,7 @@ ] }, { - "uuid": "8eae5f37-0064-4587-87b9-81d3e3ffda21", + "uuid": "5fb58a62-9390-4073-a57d-718de99a9146", "control-id": "cis_rhel10_1-3.1.5", "description": "No notes for control-id 1.3.1.5.", "props": [ @@ -25325,7 +25325,7 @@ ] }, { - "uuid": "bcd54a2e-2ea9-4698-912a-ef30ee047bd9", + "uuid": "4b521aea-5c79-4ff9-a9b4-01579b61cb72", "control-id": "cis_rhel10_1-3.1.6", "description": "The description for control-id cis_rhel10_1-3.1.6.", "props": [ @@ -25338,7 +25338,7 @@ ] }, { - "uuid": "e1680c6d-e24c-44ff-bbac-492da55c1c12", + "uuid": "dd56b9e4-c971-465b-9eab-79e481212d8d", "control-id": "cis_rhel10_1-5.3", "description": "No notes for control-id 1.5.3.", "props": [ @@ -25355,7 +25355,7 @@ ] }, { - "uuid": "3ded6faa-31f5-44bc-b342-7a750ae5cee8", + "uuid": "a68757dc-c29b-463f-aa34-86d4d9cdedbc", "control-id": "cis_rhel10_1-8.6", "description": "No notes for control-id 1.8.6.", "props": [ @@ -25372,7 +25372,7 @@ ] }, { - "uuid": "16b6d02d-c86e-4fb6-b7d4-b3da88b4ff22", + "uuid": "bfb69297-33c1-42f2-aab2-d100dd7634b6", "control-id": "cis_rhel10_2-1.3", "description": "No notes for control-id 2.1.3.", "props": [ @@ -25389,7 +25389,7 @@ ] }, { - "uuid": "bcd338c6-3e4b-46b4-8588-d6d2dde824fe", + "uuid": "7a6c9b07-4917-4e62-8ee0-3edcb4c27ccd", "control-id": "cis_rhel10_2-1.19", "description": "No notes for control-id 2.1.19.", "props": [ @@ -25406,7 +25406,7 @@ ] }, { - "uuid": "b6673ead-e1d1-4f79-9eab-c68fb3e06ddb", + "uuid": "70d40a2e-698d-413b-a129-7e87a5e4f6b0", "control-id": "cis_rhel10_2-1.20", "description": "No notes for control-id 2.1.20.", "props": [ @@ -25423,7 +25423,7 @@ ] }, { - "uuid": "909912e0-9fce-4f54-9acc-262163f3cca7", + "uuid": "3d140858-2280-46ae-aa3e-17553698f4f0", "control-id": "cis_rhel10_2-2.2", "description": "No notes for control-id 2.2.2.", "props": [ @@ -25440,7 +25440,7 @@ ] }, { - "uuid": "bb0ed740-b6d3-495f-aaa1-3e634ddfc423", + "uuid": "1104e009-bb89-41b8-aa29-179b417ad271", "control-id": "cis_rhel10_3-3.1.1", "description": "No notes for control-id 3.3.1.1.", "props": [ @@ -25457,7 +25457,7 @@ ] }, { - "uuid": "fc5acfbd-bfc6-4a27-b8a6-d04ed901363c", + "uuid": "8412b4b7-55cc-42ed-ae8c-c7580149b441", "control-id": "cis_rhel10_5-1.8", "description": "No notes for control-id 5.1.8.", "props": [ @@ -25474,7 +25474,7 @@ ] }, { - "uuid": "9b7ecc52-a164-4c23-a0f1-18d95257662e", + "uuid": "c604c9ca-7f7a-4362-87ba-45aca7d2ab17", "control-id": "cis_rhel10_5-1.9", "description": "No notes for control-id 5.1.9.", "props": [ @@ -25491,7 +25491,7 @@ ] }, { - "uuid": "5618b9e5-63d2-47f8-99bc-e1aa5a5e6e50", + "uuid": "a0d2928c-c308-49a4-bdc3-72ffcbfe7dde", "control-id": "cis_rhel10_5-2.4", "description": "No notes for control-id 5.2.4.", "props": [ @@ -25508,7 +25508,7 @@ ] }, { - "uuid": "a74e11c7-5097-4d79-8e8e-6a3586d1d135", + "uuid": "88d300a0-8abf-4033-92b4-fbb18ab39ecd", "control-id": "cis_rhel10_5-3.2.1.3", "description": "No notes for control-id 5.3.2.1.3.", "props": [ @@ -25525,7 +25525,7 @@ ] }, { - "uuid": "177d3823-7358-4e1e-b7e6-0bfafa8693c9", + "uuid": "d93d72dd-9e1c-44c0-b781-271bd6e4d2cb", "control-id": "cis_rhel10_5-4.1.2", "description": "No notes for control-id 5.4.1.2.", "props": [ @@ -25547,7 +25547,7 @@ ] }, { - "uuid": "97be2da8-7b7b-49bf-b0f0-41db0081867c", + "uuid": "83829157-35e3-4027-926e-c65aae6a4463", "control-id": "cis_rhel10_5-4.3.1", "description": "No notes for control-id 5.4.3.1.", "props": [ @@ -25564,7 +25564,7 @@ ] }, { - "uuid": "cec5e254-d76c-4e29-9bf8-113db2682ed0", + "uuid": "1157d036-1a63-4e09-8549-62550a3020eb", "control-id": "cis_rhel10_6-3.1.1", "description": "No notes for control-id 6.3.1.1.", "props": [ @@ -25586,7 +25586,7 @@ ] }, { - "uuid": "8b4bc9aa-c68a-43ce-8c54-b56bb4fecf77", + "uuid": "a3d35b43-79e7-4fd9-b88d-2979eab0a264", "control-id": "cis_rhel10_6-3.1.2", "description": "No notes for control-id 6.3.1.2.", "props": [ @@ -25603,7 +25603,7 @@ ] }, { - "uuid": "8231963c-e710-4941-b48d-6976e7123398", + "uuid": "9721c1e8-608d-4e70-90ee-583d4e002598", "control-id": "cis_rhel10_6-3.1.3", "description": "No notes for control-id 6.3.1.3.", "props": [ @@ -25620,7 +25620,7 @@ ] }, { - "uuid": "aa717eca-500f-45c5-94e5-f5ae71b22913", + "uuid": "37c7d239-f2fb-4982-bb0a-7e396d6c8805", "control-id": "cis_rhel10_6-3.1.4", "description": "No notes for control-id 6.3.1.4.", "props": [ @@ -25637,7 +25637,7 @@ ] }, { - "uuid": "d551b6e5-d1e4-4ecc-9305-0cf811962b08", + "uuid": "02275cd6-40cc-4e43-b81f-fae7addb864f", "control-id": "cis_rhel10_6-3.2.1", "description": "No notes for control-id 6.3.2.1.", "props": [ @@ -25654,7 +25654,7 @@ ] }, { - "uuid": "779ef02d-1b0a-4b3d-a40a-dccd5c156e81", + "uuid": "cf90d8a2-1d85-480d-8218-3f1892d72054", "control-id": "cis_rhel10_6-3.2.2", "description": "No notes for control-id 6.3.2.2.", "props": [ @@ -25671,7 +25671,7 @@ ] }, { - "uuid": "7601f9cb-277a-4075-8888-0fe9edb3b5d0", + "uuid": "d8b8fedb-69af-4284-b60f-350e905b8390", "control-id": "cis_rhel10_6-3.2.3", "description": "No notes for control-id 6.3.2.3.", "props": [ @@ -25693,7 +25693,7 @@ ] }, { - "uuid": "9e256e4b-feb9-47c3-93de-badfe8b36372", + "uuid": "625d11f6-653d-4d77-94c7-ffdda13ff0f5", "control-id": "cis_rhel10_6-3.2.4", "description": "No notes for control-id 6.3.2.4.", "props": [ @@ -25715,7 +25715,7 @@ ] }, { - "uuid": "75e8f551-f73a-4371-a3f7-e496f23c633f", + "uuid": "c39476fa-c8f1-4e74-8b3c-1410b6fb9564", "control-id": "cis_rhel10_6-3.3.1", "description": "No notes for control-id 6.3.3.1.", "props": [ @@ -25732,7 +25732,7 @@ ] }, { - "uuid": "4c53cc66-8853-4fe5-9ab0-0ccd21ff3254", + "uuid": "3c2f8e79-f5b4-42da-aa6b-5acade6ca858", "control-id": "cis_rhel10_6-3.3.2", "description": "No notes for control-id 6.3.3.2.", "props": [ @@ -25749,7 +25749,7 @@ ] }, { - "uuid": "12a0e9ab-6d5c-452d-b859-dfc7f785fc5d", + "uuid": "5c352070-f422-485b-9100-1488320b43d5", "control-id": "cis_rhel10_6-3.3.3", "description": "No notes for control-id 6.3.3.3.", "props": [ @@ -25766,7 +25766,7 @@ ] }, { - "uuid": "f461dcf5-a508-4dc2-b0b9-f92c71119395", + "uuid": "74bfad04-49b4-4ac6-bd39-7596d70a76e6", "control-id": "cis_rhel10_6-3.3.4", "description": "No notes for control-id 6.3.3.4.", "props": [ @@ -25798,7 +25798,7 @@ ] }, { - "uuid": "d5212cd5-3c3e-4572-99d6-222b7ee92af3", + "uuid": "68a4a21d-066e-4b50-bcff-df669a35beca", "control-id": "cis_rhel10_6-3.3.5", "description": "No notes for control-id 6.3.3.5.", "props": [ @@ -25820,7 +25820,7 @@ ] }, { - "uuid": "299ad60b-2a05-47d2-a129-1abe6493a823", + "uuid": "dbd8a62b-3e73-42e8-a0aa-4f81d4ef4ff4", "control-id": "cis_rhel10_6-3.3.6", "description": "No notes for control-id 6.3.3.6.", "props": [ @@ -25842,7 +25842,7 @@ ] }, { - "uuid": "ac76e8b4-9b59-4b4d-9188-eb4e4213d2f4", + "uuid": "2c76efca-c7f9-4ee1-87e5-672e1dcc4682", "control-id": "cis_rhel10_6-3.3.7", "description": "No notes for control-id 6.3.3.7.", "props": [ @@ -25864,7 +25864,7 @@ ] }, { - "uuid": "936d38bf-fe16-40e7-9df7-04587314ea5e", + "uuid": "62565197-e708-4ea9-84ad-eae761a7686e", "control-id": "cis_rhel10_6-3.3.8", "description": "No notes for control-id 6.3.3.8.", "props": [ @@ -25886,7 +25886,7 @@ ] }, { - "uuid": "57c6eba0-7784-463e-93cd-31a26ddc59c2", + "uuid": "c31eca2e-dc2e-419d-887c-5f5547fa67fc", "control-id": "cis_rhel10_6-3.3.9", "description": "No notes for control-id 6.3.3.9.", "props": [ @@ -25903,7 +25903,7 @@ ] }, { - "uuid": "977b5306-7611-435a-9f2d-de9fc1da6980", + "uuid": "91e62039-fd85-45df-9ecb-d3f1134d1cf4", "control-id": "cis_rhel10_6-3.3.10", "description": "No notes for control-id 6.3.3.10.", "props": [ @@ -25920,7 +25920,7 @@ ] }, { - "uuid": "f4040820-92fd-498c-a4b4-f0d0aa68ead1", + "uuid": "a5506cec-5170-4ae7-98e7-12bc2bbfc0cc", "control-id": "cis_rhel10_6-3.3.11", "description": "No notes for control-id 6.3.3.11.", "props": [ @@ -25957,7 +25957,7 @@ ] }, { - "uuid": "be93bb99-77b6-45d8-8beb-b1d9079de5c8", + "uuid": "b151c874-a346-4b8d-91a7-9251702cdd73", "control-id": "cis_rhel10_6-3.3.12", "description": "No notes for control-id 6.3.3.12.", "props": [ @@ -25974,7 +25974,7 @@ ] }, { - "uuid": "df295a78-3ed8-4c11-9526-9e161394815c", + "uuid": "3d80ab0c-fa11-495c-b82c-bf2edfa335f7", "control-id": "cis_rhel10_6-3.3.13", "description": "No notes for control-id 6.3.3.13.", "props": [ @@ -25991,7 +25991,7 @@ ] }, { - "uuid": "b9415a6b-685c-48f8-84dc-322bd53d5b0a", + "uuid": "b2118aae-e71d-499d-897b-9e06353098f2", "control-id": "cis_rhel10_6-3.3.14", "description": "No notes for control-id 6.3.3.14.", "props": [ @@ -26013,7 +26013,7 @@ ] }, { - "uuid": "37c8d4ae-7210-41cf-bec7-e5c327c96192", + "uuid": "0d51b895-c63c-498d-a3a0-0a7306ef9da3", "control-id": "cis_rhel10_6-3.3.15", "description": "No notes for control-id 6.3.3.15.", "props": [ @@ -26030,7 +26030,7 @@ ] }, { - "uuid": "465bd8ca-a5e7-4cfc-ab79-6259b2c80fe9", + "uuid": "78ddd350-7381-4599-93a0-d766fda15ac9", "control-id": "cis_rhel10_6-3.3.16", "description": "No notes for control-id 6.3.3.16.", "props": [ @@ -26047,7 +26047,7 @@ ] }, { - "uuid": "9c06f9e1-f766-4157-9646-90e524e0cb1f", + "uuid": "53941e96-f56b-4ec5-98fb-b7477265d01f", "control-id": "cis_rhel10_6-3.3.17", "description": "No notes for control-id 6.3.3.17.", "props": [ @@ -26069,7 +26069,7 @@ ] }, { - "uuid": "ed5a65b2-838a-4943-ac76-bc18d452eff5", + "uuid": "3c8ea1fb-1080-4819-b30f-6b14c80914d7", "control-id": "cis_rhel10_6-3.3.18", "description": "No notes for control-id 6.3.3.18.", "props": [ @@ -26101,7 +26101,7 @@ ] }, { - "uuid": "3813cb6a-c552-4cc3-9435-3ff1cf974645", + "uuid": "318460b4-7740-441f-b382-e79394afab96", "control-id": "cis_rhel10_6-3.3.19", "description": "No notes for control-id 6.3.3.19.", "props": [ @@ -26133,7 +26133,7 @@ ] }, { - "uuid": "2baab209-4a12-4829-a1bd-6ffb078d6dc3", + "uuid": "79cc4279-d086-4a61-b6d1-fbf154bcbc23", "control-id": "cis_rhel10_6-3.3.20", "description": "No notes for control-id 6.3.3.20.", "props": [ @@ -26175,7 +26175,7 @@ ] }, { - "uuid": "a86c6d4a-a868-4f94-a007-9e0597ac8262", + "uuid": "9e9ede9d-9a4f-414b-9aae-eac4cca1510b", "control-id": "cis_rhel10_6-3.3.21", "description": "No notes for control-id 6.3.3.21.", "props": [ @@ -26192,7 +26192,7 @@ ] }, { - "uuid": "dc2343fa-baff-4cc1-813f-2497f0c17b29", + "uuid": "e585246c-7ac6-46fa-a352-4f6ce08cb9c8", "control-id": "cis_rhel10_6-3.3.22", "description": "No notes for control-id 6.3.3.22.", "props": [ @@ -26219,7 +26219,7 @@ ] }, { - "uuid": "884d7e4d-2e65-4222-9dcb-5b9e10d59e20", + "uuid": "c9cc9d11-e632-4de2-acfb-eb3cb8bd3bf1", "control-id": "cis_rhel10_6-3.3.23", "description": "No notes for control-id 6.3.3.23.", "props": [ @@ -26241,7 +26241,7 @@ ] }, { - "uuid": "f5e8c23b-52e3-42eb-9363-ab41226d3ff6", + "uuid": "8e735904-54a7-44fa-aebb-ff50634a0a48", "control-id": "cis_rhel10_6-3.3.24", "description": "No notes for control-id 6.3.3.24.", "props": [ @@ -26263,7 +26263,7 @@ ] }, { - "uuid": "e6903ebf-52d5-4612-b0a6-4336e74aa945", + "uuid": "8db1936d-92db-40e6-b035-65270b0eeb24", "control-id": "cis_rhel10_6-3.3.25", "description": "No notes for control-id 6.3.3.25.", "props": [ @@ -26290,7 +26290,7 @@ ] }, { - "uuid": "d092ec07-44e6-4de7-9a74-8fd50df931fa", + "uuid": "00f85f4a-e259-4841-a2f4-1198754a83d1", "control-id": "cis_rhel10_6-3.3.26", "description": "No notes for control-id 6.3.3.26.", "props": [ @@ -26312,7 +26312,7 @@ ] }, { - "uuid": "4805c115-570f-46de-984d-7f0c915cd527", + "uuid": "76bd0668-810c-4312-a889-299a306cb50b", "control-id": "cis_rhel10_6-3.3.27", "description": "No notes for control-id 6.3.3.27.", "props": [ @@ -26329,7 +26329,7 @@ ] }, { - "uuid": "0184d814-b283-48bf-9cdc-91e7028fb0b3", + "uuid": "654d1978-9b96-460d-b823-d65f10982e21", "control-id": "cis_rhel10_6-3.3.28", "description": "No notes for control-id 6.3.3.28.", "props": [ @@ -26346,7 +26346,7 @@ ] }, { - "uuid": "7fa29cd9-3a30-41fa-8ef4-4dd268c098f4", + "uuid": "1323641b-2fa8-405a-bedb-1a29245b5191", "control-id": "cis_rhel10_6-3.3.29", "description": "No notes for control-id 6.3.3.29.", "props": [ @@ -26363,7 +26363,7 @@ ] }, { - "uuid": "3b62320d-1c2d-491a-86ea-160b374f04df", + "uuid": "9c4e1d98-db8a-4cc2-83e7-ce1f4c9c1922", "control-id": "cis_rhel10_6-3.3.30", "description": "No notes for control-id 6.3.3.30.", "props": [ @@ -26380,7 +26380,7 @@ ] }, { - "uuid": "9b5fa7cb-01a1-4d98-a832-80fbe8581b1e", + "uuid": "bc254072-663d-498e-99b6-df5e166cf564", "control-id": "cis_rhel10_6-3.3.31", "description": "No notes for control-id 6.3.3.31.", "props": [ @@ -26397,7 +26397,7 @@ ] }, { - "uuid": "b6833371-41fd-4cd1-bacb-bb5dbfd73cfd", + "uuid": "cee04cdd-5a30-4e0a-ba96-62c8770e1cd3", "control-id": "cis_rhel10_6-3.3.32", "description": "No notes for control-id 6.3.3.32.", "props": [ @@ -26419,7 +26419,7 @@ ] }, { - "uuid": "6baacee9-b03d-45d1-a60e-da5edaa46fb2", + "uuid": "8fc91efb-f3e6-4957-95ff-2bd09e584574", "control-id": "cis_rhel10_6-3.3.33", "description": "No notes for control-id 6.3.3.33.", "props": [ @@ -26436,7 +26436,7 @@ ] }, { - "uuid": "4acf6bb9-8a4d-4c39-8a15-721c6aa96f85", + "uuid": "92957107-ccc5-4d61-b755-dca62a0f627d", "control-id": "cis_rhel10_6-3.3.34", "description": "No notes for control-id 6.3.3.34.", "props": [ @@ -26453,7 +26453,7 @@ ] }, { - "uuid": "26f3a024-3a47-485b-8024-d434f5e301a8", + "uuid": "295b3d95-d15f-40f6-bbeb-584fec162cae", "control-id": "cis_rhel10_6-3.3.35", "description": "No notes for control-id 6.3.3.35.", "props": [ @@ -26470,7 +26470,7 @@ ] }, { - "uuid": "fc9393b3-3a2b-447f-8134-5775d2018bc0", + "uuid": "35316e0f-3c1a-4310-a544-fe2b927e6576", "control-id": "cis_rhel10_6-3.3.36", "description": "No notes for control-id 6.3.3.36.", "props": [ @@ -26487,7 +26487,7 @@ ] }, { - "uuid": "1e0522b5-6511-4b72-888a-5a0af21bcff3", + "uuid": "642c5edc-a6b2-455e-9619-f17290f4c693", "control-id": "cis_rhel10_6-3.3.37", "description": "The description for control-id cis_rhel10_6-3.3.37.", "props": [ @@ -26500,7 +26500,7 @@ ] }, { - "uuid": "943c36a5-7df0-4651-a558-dc2db94c3b12", + "uuid": "2683cdf1-d0be-4daa-8a3c-49f7788a8f53", "control-id": "cis_rhel10_6-3.4.1", "description": "No notes for control-id 6.3.4.1.", "props": [ @@ -26517,7 +26517,7 @@ ] }, { - "uuid": "23abe7d9-738e-49c5-a350-5b271024329c", + "uuid": "1d255dc8-7dbc-4f5b-aaf6-b7e39c574b34", "control-id": "cis_rhel10_6-3.4.2", "description": "No notes for control-id 6.3.4.2.", "props": [ @@ -26534,7 +26534,7 @@ ] }, { - "uuid": "c2063889-52ca-4854-90e0-b355481939a4", + "uuid": "87d90385-23a0-4193-af1f-a26c2e085131", "control-id": "cis_rhel10_6-3.4.3", "description": "No notes for control-id 6.3.4.3.", "props": [ @@ -26551,7 +26551,7 @@ ] }, { - "uuid": "98d86418-0861-4fe6-81c4-8058a2e02992", + "uuid": "c680054b-a5f4-4d8c-a520-7c3d7523cbfd", "control-id": "cis_rhel10_6-3.4.4", "description": "No notes for control-id 6.3.4.4.", "props": [ @@ -26568,7 +26568,7 @@ ] }, { - "uuid": "1762af79-7bfd-46db-bff3-38eebf3e22c7", + "uuid": "bd838fc8-51a9-4fb8-ae14-c47a07d9b8de", "control-id": "cis_rhel10_6-3.4.5", "description": "No notes for control-id 6.3.4.5.", "props": [ @@ -26585,7 +26585,7 @@ ] }, { - "uuid": "1aabfb6f-ab78-4efa-9676-c26d51352e1b", + "uuid": "0f4732e3-0a12-4216-ac93-ac1f3a3dfb4a", "control-id": "cis_rhel10_6-3.4.6", "description": "No notes for control-id 6.3.4.6.", "props": [ @@ -26602,7 +26602,7 @@ ] }, { - "uuid": "e1771629-95ab-49e7-95ec-2a1fca4718a2", + "uuid": "c717e4fd-75ff-48d2-aec0-0341d09923b3", "control-id": "cis_rhel10_6-3.4.7", "description": "No notes for control-id 6.3.4.7.", "props": [ @@ -26619,7 +26619,7 @@ ] }, { - "uuid": "f5ed92cf-a681-49fc-b850-bdf19b860f69", + "uuid": "4e832259-ca72-4a05-a886-7ceeb1514b75", "control-id": "cis_rhel10_6-3.4.8", "description": "No notes for control-id 6.3.4.8.", "props": [ @@ -26636,7 +26636,7 @@ ] }, { - "uuid": "0ad7f285-3e62-4149-be36-8c0d6da2565b", + "uuid": "c9c0beea-c01e-415d-9a55-a8737628097c", "control-id": "cis_rhel10_6-3.4.9", "description": "No notes for control-id 6.3.4.9.", "props": [ @@ -26653,7 +26653,7 @@ ] }, { - "uuid": "6550f6c4-c285-4cbc-9176-b3a1ee34a8bb", + "uuid": "ce81cdc5-2a14-4b49-8b19-edd4b770e36e", "control-id": "cis_rhel10_6-3.4.10", "description": "No notes for control-id 6.3.4.10.", "props": [ @@ -26670,7 +26670,7 @@ ] }, { - "uuid": "d08135e0-9689-47fb-9c43-dae8408fe6ac", + "uuid": "48213cbc-cc16-41ad-9490-9c10b12b1bc8", "control-id": "reload_dconf_db", "description": "This is a helper rule to reload Dconf database correctly.", "props": [ @@ -26687,7 +26687,7 @@ ] }, { - "uuid": "1b1198c3-fc46-4436-ab8f-6f9754c7c82e", + "uuid": "d02af640-5d57-49bd-b751-699b8ec3d6ac", "control-id": "cis_rhel10_1-1.1.1", "description": "No notes for control-id 1.1.1.1.", "props": [ @@ -26704,7 +26704,7 @@ ] }, { - "uuid": "36c5d24e-99b7-4e7b-be4b-fb9b5a59122c", + "uuid": "3935f7e8-a631-42cf-a0ee-a7eade0e4c49", "control-id": "cis_rhel10_1-1.1.2", "description": "No notes for control-id 1.1.1.2.", "props": [ @@ -26721,7 +26721,7 @@ ] }, { - "uuid": "db2c8b59-fe7c-4d17-bdf9-2f90473828a2", + "uuid": "504061fa-24ff-4b0b-8173-29da4b053ad7", "control-id": "cis_rhel10_1-1.1.3", "description": "No notes for control-id 1.1.1.3.", "props": [ @@ -26738,7 +26738,7 @@ ] }, { - "uuid": "976b129a-1ea9-439e-bd8a-3c25d7a7ca2f", + "uuid": "263ba465-6292-4089-81ab-69472aabf303", "control-id": "cis_rhel10_1-1.1.4", "description": "No notes for control-id 1.1.1.4.", "props": [ @@ -26755,7 +26755,7 @@ ] }, { - "uuid": "00e63d4a-8baf-4a79-a27e-e01e3745645d", + "uuid": "2dfce83e-7349-4f52-8bba-00aa466ea478", "control-id": "cis_rhel10_1-1.1.5", "description": "No notes for control-id 1.1.1.5.", "props": [ @@ -26772,7 +26772,7 @@ ] }, { - "uuid": "893cea2d-f16e-47e0-8d67-8b025408c6b4", + "uuid": "4b9a543b-100a-4f28-8c68-f11e585c4e45", "control-id": "cis_rhel10_1-1.1.9", "description": "No notes for control-id 1.1.1.9.", "props": [ @@ -26789,7 +26789,7 @@ ] }, { - "uuid": "2bc54c86-dadb-4bc7-bb8e-a11af00a01c1", + "uuid": "a60098c5-39de-4e7e-b30d-703d25c0f81b", "control-id": "cis_rhel10_1-1.1.10", "description": "No notes for control-id 1.1.1.10.", "props": [ @@ -26806,7 +26806,7 @@ ] }, { - "uuid": "c094e08e-5a54-4040-8541-6334265abfc5", + "uuid": "c943d23c-9c32-4e16-b7b2-1c5a46633622", "control-id": "cis_rhel10_1-1.1.11", "description": "The description for control-id cis_rhel10_1-1.1.11.", "props": [ @@ -26819,7 +26819,7 @@ ] }, { - "uuid": "7d1f808a-2d4b-4d85-a7af-57c46fb0e32d", + "uuid": "ecc1ee1c-81d1-49c3-82d8-c0a37376f1d9", "control-id": "cis_rhel10_1-1.2.1.1", "description": "No notes for control-id 1.1.2.1.1.", "props": [ @@ -26836,7 +26836,7 @@ ] }, { - "uuid": "5dc505fa-20da-439d-968d-d031c5b2489a", + "uuid": "191b6b25-e42e-4002-8510-ee2d3c9cc70e", "control-id": "cis_rhel10_1-1.2.1.2", "description": "No notes for control-id 1.1.2.1.2.", "props": [ @@ -26853,7 +26853,7 @@ ] }, { - "uuid": "5a2f2fb1-4167-4ef7-ac31-b9a06c52c89b", + "uuid": "784a67ff-4cdc-4b14-98da-da600a2abdf8", "control-id": "cis_rhel10_1-1.2.1.3", "description": "No notes for control-id 1.1.2.1.3.", "props": [ @@ -26870,7 +26870,7 @@ ] }, { - "uuid": "03a244eb-c7b0-4e25-b43a-3910f3d3eb97", + "uuid": "6bb67fd7-21d2-4231-81eb-0674d483ca43", "control-id": "cis_rhel10_1-1.2.1.4", "description": "No notes for control-id 1.1.2.1.4.", "props": [ @@ -26887,7 +26887,7 @@ ] }, { - "uuid": "fddd0503-3a32-492b-8a33-5a4a3814646e", + "uuid": "d1440ef0-76d8-479b-88f0-5cdfa10c1fac", "control-id": "cis_rhel10_1-1.2.2.1", "description": "No notes for control-id 1.1.2.2.1.", "props": [ @@ -26904,7 +26904,7 @@ ] }, { - "uuid": "00544a39-f70c-49b7-a8ee-294bc69cb153", + "uuid": "7fd88415-eaab-49d4-a709-f45eae1189fa", "control-id": "cis_rhel10_1-1.2.2.2", "description": "No notes for control-id 1.1.2.2.2.", "props": [ @@ -26921,7 +26921,7 @@ ] }, { - "uuid": "c3758d60-a998-43fb-8aae-678834977e2c", + "uuid": "b4f78dd1-7379-435d-b30b-5576f8006429", "control-id": "cis_rhel10_1-1.2.2.3", "description": "No notes for control-id 1.1.2.2.3.", "props": [ @@ -26938,7 +26938,7 @@ ] }, { - "uuid": "581a134e-f316-497e-a2a3-f5e4b5fa6961", + "uuid": "81906c1c-a4dd-495f-ac33-3f3f99c044c9", "control-id": "cis_rhel10_1-1.2.2.4", "description": "No notes for control-id 1.1.2.2.4.", "props": [ @@ -26955,7 +26955,7 @@ ] }, { - "uuid": "9236dae4-bcd8-430b-945a-205b7c0fa0a7", + "uuid": "1205da36-f369-4eb2-94be-513ec1a3676e", "control-id": "cis_rhel10_1-1.2.3.2", "description": "No notes for control-id 1.1.2.3.2.", "props": [ @@ -26972,7 +26972,7 @@ ] }, { - "uuid": "8de34d4c-d341-4566-93b2-c70b7e38028a", + "uuid": "de53786e-61d7-4b3b-b06e-34686e218d66", "control-id": "cis_rhel10_1-1.2.3.3", "description": "No notes for control-id 1.1.2.3.3.", "props": [ @@ -26989,7 +26989,7 @@ ] }, { - "uuid": "597ce154-f5e5-4ea8-9faa-b71251062581", + "uuid": "7bb2cbaf-008e-4e82-8f75-6c863f9d9b3a", "control-id": "cis_rhel10_1-1.2.4.2", "description": "No notes for control-id 1.1.2.4.2.", "props": [ @@ -27006,7 +27006,7 @@ ] }, { - "uuid": "f1a0943c-9787-4d6e-8fec-eecb1d1ce71c", + "uuid": "14257ed6-abb8-4f11-a736-e23bd12bf15b", "control-id": "cis_rhel10_1-1.2.4.3", "description": "No notes for control-id 1.1.2.4.3.", "props": [ @@ -27023,7 +27023,7 @@ ] }, { - "uuid": "abcc2dbb-1eed-41cd-b8d2-1fcdfc9f78cb", + "uuid": "101a20ee-c40e-4e45-bb15-c2a090b2343c", "control-id": "cis_rhel10_1-1.2.5.2", "description": "No notes for control-id 1.1.2.5.2.", "props": [ @@ -27040,7 +27040,7 @@ ] }, { - "uuid": "2650dd02-9d2f-4883-a6f4-dc652ee738ba", + "uuid": "5fae420b-9b40-4bb9-9986-b643e6931e4d", "control-id": "cis_rhel10_1-1.2.5.3", "description": "No notes for control-id 1.1.2.5.3.", "props": [ @@ -27057,7 +27057,7 @@ ] }, { - "uuid": "df49d592-a255-44ae-9c82-9cb9d13295f4", + "uuid": "b3fb1823-b593-4e45-a865-78c9354bedf4", "control-id": "cis_rhel10_1-1.2.5.4", "description": "No notes for control-id 1.1.2.5.4.", "props": [ @@ -27074,7 +27074,7 @@ ] }, { - "uuid": "d24c5ccd-116b-407a-916e-590cdb7a6a57", + "uuid": "3e3741cf-bc69-401e-9193-69dbcb5ab910", "control-id": "cis_rhel10_1-1.2.6.2", "description": "No notes for control-id 1.1.2.6.2.", "props": [ @@ -27091,7 +27091,7 @@ ] }, { - "uuid": "e4a160e8-5e66-4db6-9d19-36adeabfb392", + "uuid": "a4c9a35a-e4f5-42fd-be70-36d3ca0cfb1d", "control-id": "cis_rhel10_1-1.2.6.3", "description": "No notes for control-id 1.1.2.6.3.", "props": [ @@ -27108,7 +27108,7 @@ ] }, { - "uuid": "df041b65-4cfd-4f43-8ddf-25be37cf4466", + "uuid": "1e5e01d4-8788-46cc-8b7d-bde43616001e", "control-id": "cis_rhel10_1-1.2.6.4", "description": "No notes for control-id 1.1.2.6.4.", "props": [ @@ -27125,7 +27125,7 @@ ] }, { - "uuid": "e7d2aae3-4124-4597-bc4c-dd3c6582882e", + "uuid": "0126ee8a-2d31-4e7d-8eeb-594a3db5646e", "control-id": "cis_rhel10_1-1.2.7.2", "description": "No notes for control-id 1.1.2.7.2.", "props": [ @@ -27142,7 +27142,7 @@ ] }, { - "uuid": "51cbd322-b11a-4276-97f2-00d077c8d7b6", + "uuid": "27c6225a-9975-4f0c-b461-155395562526", "control-id": "cis_rhel10_1-1.2.7.3", "description": "No notes for control-id 1.1.2.7.3.", "props": [ @@ -27159,7 +27159,7 @@ ] }, { - "uuid": "0b2354c8-8be6-4c4f-a385-b35bd676f4dc", + "uuid": "a62cd160-11f7-4e68-857c-77d8f9339c17", "control-id": "cis_rhel10_1-1.2.7.4", "description": "No notes for control-id 1.1.2.7.4.", "props": [ @@ -27176,7 +27176,7 @@ ] }, { - "uuid": "d8b6ec98-00aa-4f8b-bcbf-96deb85c05eb", + "uuid": "31795ca9-2d7e-4c20-95df-451c183c3c76", "control-id": "cis_rhel10_1-2.1.1", "description": "The description for control-id cis_rhel10_1-2.1.1.", "props": [ @@ -27189,7 +27189,7 @@ ] }, { - "uuid": "25f488d7-9ea0-471e-b53a-f861770cdfc0", + "uuid": "e350d549-5ee5-4d20-b2ba-8b8c86bd8589", "control-id": "cis_rhel10_1-2.1.2", "description": "No notes for control-id 1.2.1.2.", "props": [ @@ -27206,7 +27206,7 @@ ] }, { - "uuid": "09f36140-7ff3-4f3e-8589-a7a20da6a26b", + "uuid": "b9272316-aa53-4089-a7bb-cc791064225c", "control-id": "cis_rhel10_1-2.1.4", "description": "The description for control-id cis_rhel10_1-2.1.4.", "props": [ @@ -27219,7 +27219,7 @@ ] }, { - "uuid": "530eaf40-ad24-4f3a-b85b-97f5ea6b4858", + "uuid": "c0a46f60-cba4-429b-902f-2095b9dafd30", "control-id": "cis_rhel10_1-2.2.1", "description": "The description for control-id cis_rhel10_1-2.2.1.", "props": [ @@ -27232,7 +27232,7 @@ ] }, { - "uuid": "535ed6b4-2f3e-4a89-baea-ed6455624c37", + "uuid": "d76a12ae-0e15-4d9c-965f-aad08c1a3223", "control-id": "cis_rhel10_1-3.1.1", "description": "No notes for control-id 1.3.1.1.", "props": [ @@ -27249,7 +27249,7 @@ ] }, { - "uuid": "037dd34d-2115-4ced-9acc-a7c3600232e2", + "uuid": "a97d6f33-c2d3-4bef-9bb6-1a55e65adc8e", "control-id": "cis_rhel10_1-3.1.2", "description": "No notes for control-id 1.3.1.2.", "props": [ @@ -27266,7 +27266,7 @@ ] }, { - "uuid": "3fecae7a-7a13-40a9-999c-1e99985e9f0c", + "uuid": "d316a0ba-f483-4b29-8749-5198dc94780f", "control-id": "cis_rhel10_1-3.1.3", "description": "No notes for control-id 1.3.1.3.", "props": [ @@ -27283,7 +27283,7 @@ ] }, { - "uuid": "13c7251c-f3ec-4fc6-bcf5-a6dc5307f4a1", + "uuid": "afd718c7-9cc2-4dfb-a1c4-b27e40074b42", "control-id": "cis_rhel10_1-3.1.4", "description": "No notes for control-id 1.3.1.4.", "props": [ @@ -27300,7 +27300,7 @@ ] }, { - "uuid": "be6f5276-615e-41e0-8634-c08ab166be0b", + "uuid": "91bf33c1-0651-4b5d-8cd4-e668df9297b2", "control-id": "cis_rhel10_1-3.1.7", "description": "No notes for control-id 1.3.1.7.", "props": [ @@ -27317,7 +27317,7 @@ ] }, { - "uuid": "271485ca-6064-4f77-af5e-df68ff8b2112", + "uuid": "10373885-ec79-43e3-bb04-d532b00251fd", "control-id": "cis_rhel10_1-3.1.8", "description": "No notes for control-id 1.3.1.8.", "props": [ @@ -27334,7 +27334,7 @@ ] }, { - "uuid": "4bc6de9a-4dad-4ec4-b828-a8f9d0cb85db", + "uuid": "2854efaa-b00e-4500-b6b7-694ae4b0aafd", "control-id": "cis_rhel10_1-4.1", "description": "There is no automated remediation for this rule and this is intentional.\nMore details in the rule description.", "props": [ @@ -27351,7 +27351,7 @@ ] }, { - "uuid": "640795ce-2bd9-4eed-9882-c18c65b34019", + "uuid": "5ccb125b-5e36-428c-b4dd-3a06786c020f", "control-id": "cis_rhel10_1-4.2", "description": "This requirement demands a deeper review of the rules.", "props": [ @@ -27378,7 +27378,7 @@ ] }, { - "uuid": "61c8a254-df0e-4319-acb1-7a28da1fa0f7", + "uuid": "83355a4b-ab28-419d-91f5-8c9b0ea7ea23", "control-id": "cis_rhel10_1-5.1", "description": "No notes for control-id 1.5.1.", "props": [ @@ -27395,7 +27395,7 @@ ] }, { - "uuid": "63102002-b5b2-43b8-bb93-095bff5340e4", + "uuid": "a832c96b-4844-4529-a7b2-bdbd112d3c8e", "control-id": "cis_rhel10_1-5.2", "description": "No notes for control-id 1.5.2.", "props": [ @@ -27412,7 +27412,7 @@ ] }, { - "uuid": "0303a9f8-bdf1-47f9-a789-13bb250d2f4b", + "uuid": "6eb9ee81-7067-41b6-84cf-0c3f5fa1d617", "control-id": "cis_rhel10_1-5.4", "description": "No notes for control-id 1.5.4.", "props": [ @@ -27429,7 +27429,7 @@ ] }, { - "uuid": "867982a4-02fe-4b28-883a-60d2bfd0a07d", + "uuid": "e03897ad-cfcb-4fb4-a7da-bf3f145af86e", "control-id": "cis_rhel10_1-5.5", "description": "No notes for control-id 1.5.5.", "props": [ @@ -27446,7 +27446,7 @@ ] }, { - "uuid": "92de2069-fcb8-4884-9266-72f64577f79e", + "uuid": "a08853c7-53ef-4ebb-b479-e7b0c8773a11", "control-id": "cis_rhel10_1-5.6", "description": "No notes for control-id 1.5.6.", "props": [ @@ -27463,7 +27463,7 @@ ] }, { - "uuid": "487afe8c-a42f-409b-87a8-15e32175e54a", + "uuid": "e70a32bf-2d63-4638-b376-f74ba8c0d8a4", "control-id": "cis_rhel10_1-5.7", "description": "No notes for control-id 1.5.7.", "props": [ @@ -27480,7 +27480,7 @@ ] }, { - "uuid": "bca55a66-8c10-44e3-87d8-512cf06f4b38", + "uuid": "6003aa3e-4c43-42ad-a922-6e723e3f4706", "control-id": "cis_rhel10_1-5.8", "description": "Address Space Layout Randomization (ASLR)", "props": [ @@ -27497,7 +27497,7 @@ ] }, { - "uuid": "f392ee4c-e810-4c43-a968-47406b741564", + "uuid": "1146f8e9-0489-407e-88be-579059b252c1", "control-id": "cis_rhel10_1-5.9", "description": "No notes for control-id 1.5.9.", "props": [ @@ -27514,7 +27514,7 @@ ] }, { - "uuid": "f6c1d4a2-a49a-41a1-911f-c6474fe004c3", + "uuid": "7e21c6e0-8f96-4425-8701-e49a906662f9", "control-id": "cis_rhel10_1-5.10", "description": "No notes for control-id 1.5.10.", "props": [ @@ -27531,7 +27531,7 @@ ] }, { - "uuid": "4a5af045-0878-4bb2-bea4-def613a82179", + "uuid": "2674a47e-47b4-41e0-ae64-501ccc6cbd09", "control-id": "cis_rhel10_1-6.1", "description": "No notes for control-id 1.6.1.", "props": [ @@ -27548,7 +27548,7 @@ ] }, { - "uuid": "10f0710e-3a93-4f1f-b5a9-e5a6aea3f1db", + "uuid": "a7db3fbc-d064-4858-b9af-32ef28a729da", "control-id": "cis_rhel10_1-6.2", "description": "No notes for control-id 1.6.2.", "props": [ @@ -27565,7 +27565,7 @@ ] }, { - "uuid": "9eb6b6d4-3826-43d2-bcad-6b39e0b0303c", + "uuid": "4b270093-9e8d-4bf1-9a73-7e4380e9f67c", "control-id": "cis_rhel10_1-6.3", "description": "No notes for control-id 1.6.3.", "props": [ @@ -27582,7 +27582,7 @@ ] }, { - "uuid": "d1ffe6db-63e8-4b7b-a252-005ff9b593f7", + "uuid": "1d2762d0-6d12-416e-8318-3b949db5cd86", "control-id": "cis_rhel10_1-6.4", "description": "No notes for control-id 1.6.4.", "props": [ @@ -27599,7 +27599,7 @@ ] }, { - "uuid": "bf16b2bd-27bb-4934-901c-f4ca30235988", + "uuid": "ee24858a-f6d7-4df1-a691-8d6c5c2467de", "control-id": "cis_rhel10_1-7.1", "description": "No notes for control-id 1.7.1.", "props": [ @@ -27616,7 +27616,7 @@ ] }, { - "uuid": "c5d26ee6-9851-4dba-b8bb-8e4158e418eb", + "uuid": "2851f937-ca58-4cd2-bc00-e0e23bce53fa", "control-id": "cis_rhel10_1-7.2", "description": "No notes for control-id 1.7.2.", "props": [ @@ -27633,7 +27633,7 @@ ] }, { - "uuid": "30449dd0-19ce-44c5-a499-30267d9fcbf2", + "uuid": "dc3a050e-b290-415d-b2ff-f6888a489c9d", "control-id": "cis_rhel10_1-7.3", "description": "No notes for control-id 1.7.3.", "props": [ @@ -27650,7 +27650,7 @@ ] }, { - "uuid": "6559a754-f4d2-4fbd-807d-5f2755332764", + "uuid": "c1e7116e-4494-4fb5-958f-ade513b67780", "control-id": "cis_rhel10_1-7.4", "description": "No notes for control-id 1.7.4.", "props": [ @@ -27677,7 +27677,7 @@ ] }, { - "uuid": "5a799427-8286-4bdc-a01e-0ca4b0446e4c", + "uuid": "105adef5-fd92-4d30-9354-734c453d1132", "control-id": "cis_rhel10_1-7.5", "description": "No notes for control-id 1.7.5.", "props": [ @@ -27704,7 +27704,7 @@ ] }, { - "uuid": "c73fb3de-d773-4905-bef8-970b5165fb1a", + "uuid": "0f68f9b5-717f-48f2-bd6e-3e41a26b6b39", "control-id": "cis_rhel10_1-7.6", "description": "No notes for control-id 1.7.6.", "props": [ @@ -27731,7 +27731,7 @@ ] }, { - "uuid": "c072ca2b-ff8e-447d-a342-b9386dcbd3fb", + "uuid": "72730747-a369-4101-9123-4a6038cb4e98", "control-id": "cis_rhel10_1-8.1", "description": "No notes for control-id 1.8.1.", "props": [ @@ -27753,7 +27753,7 @@ ] }, { - "uuid": "47167cb9-a2ca-4d3b-8ebd-d76ef31ee68b", + "uuid": "f6284668-0ea1-4e2c-9f0a-703056cc1b35", "control-id": "cis_rhel10_1-8.2", "description": "No notes for control-id 1.8.2.", "props": [ @@ -27770,7 +27770,7 @@ ] }, { - "uuid": "bc417013-f146-4309-951b-136d900af707", + "uuid": "460811eb-e4f8-4398-8bf4-63346c196a7c", "control-id": "cis_rhel10_1-8.3", "description": "No notes for control-id 1.8.3.", "props": [ @@ -27802,7 +27802,7 @@ ] }, { - "uuid": "412c1ff3-0cbd-43cd-9ce2-999aa73ffd99", + "uuid": "f2e9d0b7-33c1-47b0-bc41-6669edcdd746", "control-id": "cis_rhel10_1-8.4", "description": "No notes for control-id 1.8.4.", "props": [ @@ -27824,7 +27824,7 @@ ] }, { - "uuid": "05fd08a7-775d-41bd-80ca-595b3647b24d", + "uuid": "c2c9b601-7148-4e7a-8707-f46de52d3876", "control-id": "cis_rhel10_1-8.5", "description": "No notes for control-id 1.8.5.", "props": [ @@ -27841,7 +27841,7 @@ ] }, { - "uuid": "55605c33-f9d5-4e9f-8765-f47f7a4f8193", + "uuid": "e7ebc8c8-0f0e-498f-a69e-037acd4e7a07", "control-id": "cis_rhel10_2-1.1", "description": "No notes for control-id 2.1.1.", "props": [ @@ -27858,7 +27858,7 @@ ] }, { - "uuid": "e3cac23b-0bca-42b6-a1dc-c7e38761bd72", + "uuid": "463be1a8-59f0-476e-8b55-5b0c2bb0d6e7", "control-id": "cis_rhel10_2-1.2", "description": "No notes for control-id 2.1.2.", "props": [ @@ -27875,7 +27875,7 @@ ] }, { - "uuid": "731a4b74-fe51-4910-8337-d08b6d0a36e5", + "uuid": "de4bf035-e897-48b0-947f-51038df53c3b", "control-id": "cis_rhel10_2-1.4", "description": "No notes for control-id 2.1.4.", "props": [ @@ -27892,7 +27892,7 @@ ] }, { - "uuid": "5edbb6ab-b666-4193-9430-58f699a5a8db", + "uuid": "791bceec-26f9-4108-82e7-782c19d72f32", "control-id": "cis_rhel10_2-1.5", "description": "No notes for control-id 2.1.5.", "props": [ @@ -27909,7 +27909,7 @@ ] }, { - "uuid": "eb0713b3-ddbb-4a17-934a-f99c651beac2", + "uuid": "572dc4ea-6df0-4f2e-bbd7-8485c50639f8", "control-id": "cis_rhel10_2-1.6", "description": "No notes for control-id 2.1.6.", "props": [ @@ -27926,7 +27926,7 @@ ] }, { - "uuid": "8ae4c8d6-1151-41dd-96dc-e1cf9a0d4286", + "uuid": "82b13012-acbb-485e-ba0a-ca6dd7533c3e", "control-id": "cis_rhel10_2-1.7", "description": "No notes for control-id 2.1.7.", "props": [ @@ -27943,7 +27943,7 @@ ] }, { - "uuid": "ef1c4128-2c47-498c-a3d6-3e0293a88134", + "uuid": "04018695-d36d-44ff-862d-21ec7e092982", "control-id": "cis_rhel10_2-1.8", "description": "No notes for control-id 2.1.8.", "props": [ @@ -27965,7 +27965,7 @@ ] }, { - "uuid": "e5a53b67-0eee-4840-9109-61a94e08b52e", + "uuid": "74f1da4b-3635-4a02-8622-c223d9adfcc0", "control-id": "cis_rhel10_2-1.9", "description": "Many of the libvirt packages used by Enterprise Linux virtualization are dependent on the\nnfs-utils package.", "props": [ @@ -27982,7 +27982,7 @@ ] }, { - "uuid": "ed282758-add8-48c9-bd34-e893f5ed78ca", + "uuid": "5d68a99c-f1c9-4c84-a524-e240e0fe737c", "control-id": "cis_rhel10_2-1.10", "description": "No notes for control-id 2.1.10.", "props": [ @@ -27999,7 +27999,7 @@ ] }, { - "uuid": "49204629-63f5-4487-8fbc-eb7c3715d879", + "uuid": "17bde8b4-ee4a-4257-85a3-4effecc01dc6", "control-id": "cis_rhel10_2-1.11", "description": "Many of the libvirt packages used by Enterprise Linux virtualization, and the nfs-utils\npackage used for The Network File System (NFS), are dependent on the rpcbind package.", "props": [ @@ -28016,7 +28016,7 @@ ] }, { - "uuid": "a5099c6b-4491-4659-ac0e-0104493b47e4", + "uuid": "0e289a0e-30f1-415b-abbf-7716e05e9e9a", "control-id": "cis_rhel10_2-1.12", "description": "No notes for control-id 2.1.12.", "props": [ @@ -28033,7 +28033,7 @@ ] }, { - "uuid": "91ea43f8-4565-419d-a60e-1faa87fe4a8f", + "uuid": "10a6428a-fcc8-4df5-8a6b-552f34931fd7", "control-id": "cis_rhel10_2-1.13", "description": "No notes for control-id 2.1.13.", "props": [ @@ -28050,7 +28050,7 @@ ] }, { - "uuid": "be7cdc19-c936-45ce-b4ff-cd67083dd665", + "uuid": "731c48a5-9e9a-4254-9f90-cba48ccbbf56", "control-id": "cis_rhel10_2-1.14", "description": "No notes for control-id 2.1.14.", "props": [ @@ -28067,7 +28067,7 @@ ] }, { - "uuid": "266c4d2e-f320-4315-826e-bd7fa4638e83", + "uuid": "fe45c391-4f37-4a65-9246-caaa7637ba33", "control-id": "cis_rhel10_2-1.15", "description": "No notes for control-id 2.1.15.", "props": [ @@ -28084,7 +28084,7 @@ ] }, { - "uuid": "36e3ccef-1c84-44c3-b1b2-47a4c0cd6cf9", + "uuid": "958fb8d5-73bf-401c-8f3b-c514c6de5314", "control-id": "cis_rhel10_2-1.16", "description": "No notes for control-id 2.1.16.", "props": [ @@ -28101,7 +28101,7 @@ ] }, { - "uuid": "a10d91d5-a72c-4304-9a53-082ed8f360b6", + "uuid": "e54dfc2d-a364-4bf7-9f4b-ef36f0db8d74", "control-id": "cis_rhel10_2-1.17", "description": "No notes for control-id 2.1.17.", "props": [ @@ -28118,7 +28118,7 @@ ] }, { - "uuid": "5d4eedb9-b6c6-4020-9183-7eba8e3a97cd", + "uuid": "4f9c875a-c331-4232-8282-00f5f4d111c1", "control-id": "cis_rhel10_2-1.18", "description": "No notes for control-id 2.1.18.", "props": [ @@ -28140,7 +28140,7 @@ ] }, { - "uuid": "d5e9daef-b0be-4639-8a8a-e28c6781c570", + "uuid": "68a5e641-3547-4aac-a6fd-a5be7c9d656a", "control-id": "cis_rhel10_2-1.21", "description": "No notes for control-id 2.1.21.", "props": [ @@ -28162,7 +28162,7 @@ ] }, { - "uuid": "277493a8-24e5-46dc-aabb-32c4cb7b5b62", + "uuid": "0aeb0eca-c9ec-4912-87a4-ad8fe8558061", "control-id": "cis_rhel10_2-1.22", "description": "The description for control-id cis_rhel10_2-1.22.", "props": [ @@ -28175,7 +28175,7 @@ ] }, { - "uuid": "0d1cc29a-c7a0-427a-be57-31d62ec1c40f", + "uuid": "9b966199-cdf2-4526-8d07-fa182558ed93", "control-id": "cis_rhel10_2-2.1", "description": "No notes for control-id 2.2.1.", "props": [ @@ -28192,7 +28192,7 @@ ] }, { - "uuid": "6b959ee2-3ba2-4e0f-8aff-410cd4b3add5", + "uuid": "6c817225-22d9-4640-8512-ec72b86b036f", "control-id": "cis_rhel10_2-2.3", "description": "No notes for control-id 2.2.3.", "props": [ @@ -28209,7 +28209,7 @@ ] }, { - "uuid": "64c616c4-f542-4113-a743-f981d470d893", + "uuid": "6a20443a-86b0-4e45-a2ca-1c9565a9a5e7", "control-id": "cis_rhel10_2-2.4", "description": "No notes for control-id 2.2.4.", "props": [ @@ -28226,7 +28226,7 @@ ] }, { - "uuid": "ac2fa6c8-a749-4050-bcb2-b6e4c671504e", + "uuid": "1f68a085-f78f-4469-b7dd-1456ab6849f4", "control-id": "cis_rhel10_2-3.1", "description": "No notes for control-id 2.3.1.", "props": [ @@ -28238,7 +28238,7 @@ ] }, { - "uuid": "03c62476-60f4-4d48-8668-16b1fd0886cb", + "uuid": "07a1a53a-e467-40d7-a418-d03a7176e0d4", "control-id": "cis_rhel10_2-3.2", "description": "No notes for control-id 2.3.2.", "props": [ @@ -28255,7 +28255,7 @@ ] }, { - "uuid": "6fb3cf05-84c1-470f-80bf-c23676b51bbc", + "uuid": "6f3f9645-1509-4725-8ad6-7db6613f0cd6", "control-id": "cis_rhel10_2-3.3", "description": "No notes for control-id 2.3.3.", "props": [ @@ -28272,7 +28272,7 @@ ] }, { - "uuid": "13639621-458a-4de0-8f6a-7a5ef60d6bdd", + "uuid": "fe9608ab-53ec-4f8c-a489-b76886c7a334", "control-id": "cis_rhel10_2-4.1.1", "description": "No notes for control-id 2.4.1.1.", "props": [ @@ -28294,7 +28294,7 @@ ] }, { - "uuid": "c83985d2-8793-4cd0-976e-542807465376", + "uuid": "dcbdfeb2-5817-412d-baad-f6cbce8e07b2", "control-id": "cis_rhel10_2-4.1.2", "description": "No notes for control-id 2.4.1.2.", "props": [ @@ -28321,7 +28321,7 @@ ] }, { - "uuid": "3bb44ada-adc2-4fb8-9d07-b5003a222cbf", + "uuid": "b30811f5-ff8c-4f03-9f08-ecd0419ce122", "control-id": "cis_rhel10_2-4.1.3", "description": "No notes for control-id 2.4.1.3.", "props": [ @@ -28348,7 +28348,7 @@ ] }, { - "uuid": "dd974f9f-e4a7-47fb-a138-add6e57959e5", + "uuid": "cd71425d-caf0-4d83-8a0c-57b3f4295b43", "control-id": "cis_rhel10_2-4.1.4", "description": "No notes for control-id 2.4.1.4.", "props": [ @@ -28375,7 +28375,7 @@ ] }, { - "uuid": "0299f63e-312b-4354-b0ba-568b61f7a210", + "uuid": "df72bfa4-eb90-462a-81ec-353b879d3a5e", "control-id": "cis_rhel10_2-4.1.5", "description": "No notes for control-id 2.4.1.5.", "props": [ @@ -28402,7 +28402,7 @@ ] }, { - "uuid": "3eeba01d-6e06-48ff-baa9-94737aa9b800", + "uuid": "fd0e83a1-5876-4d2a-b7ea-b92271703d8d", "control-id": "cis_rhel10_2-4.1.6", "description": "No notes for control-id 2.4.1.6.", "props": [ @@ -28429,7 +28429,7 @@ ] }, { - "uuid": "a0acdafc-bebb-4abe-8d2d-61157e0dd7dc", + "uuid": "58626afd-d047-4915-b7e9-c2e921be7346", "control-id": "cis_rhel10_2-4.1.7", "description": "No notes for control-id 2.4.1.7.", "props": [ @@ -28456,7 +28456,7 @@ ] }, { - "uuid": "94052cb2-5a79-489a-b444-3097b612d37f", + "uuid": "b90e5f9a-3d24-43b9-a3ac-66ac8b33c204", "control-id": "cis_rhel10_2-4.1.8", "description": "No notes for control-id 2.4.1.8.", "props": [ @@ -28483,7 +28483,7 @@ ] }, { - "uuid": "9a01b8c7-126a-42e7-b47f-405a55ba3c79", + "uuid": "2e2eaf21-11ff-4550-95b9-6d4ddba4929d", "control-id": "cis_rhel10_2-4.1.9", "description": "No notes for control-id 2.4.1.9.", "props": [ @@ -28520,7 +28520,7 @@ ] }, { - "uuid": "20483658-f859-42d0-88f0-5c225b483a6d", + "uuid": "72bc4ab3-1275-4901-8e21-9971745a30b4", "control-id": "cis_rhel10_2-4.2.1", "description": "No notes for control-id 2.4.2.1.", "props": [ @@ -28557,7 +28557,7 @@ ] }, { - "uuid": "b873edba-f3d6-481d-96db-3f77d8f5d4a3", + "uuid": "4aeaa237-eb1d-4087-a1fd-4d7ed7c04c5e", "control-id": "cis_rhel10_3-1.1", "description": "The description for control-id cis_rhel10_3-1.1.", "props": [ @@ -28570,7 +28570,7 @@ ] }, { - "uuid": "5b43caa9-7a0e-4441-83d6-271b13d91422", + "uuid": "2d4ad981-f16e-4ea9-8887-f29567e26e4e", "control-id": "cis_rhel10_3-1.2", "description": "No notes for control-id 3.1.2.", "props": [ @@ -28587,7 +28587,7 @@ ] }, { - "uuid": "bee4e701-d261-4c42-9985-6ffb8eb6c9bf", + "uuid": "62f4b29b-0b51-4c07-9ffc-ae631fe4e9ec", "control-id": "cis_rhel10_3-1.3", "description": "No notes for control-id 3.1.3.", "props": [ @@ -28604,7 +28604,7 @@ ] }, { - "uuid": "310761f2-f3dd-4a03-83b9-30ab2c352927", + "uuid": "de900cdb-4c8b-4be1-b8cd-bb3672bf9f28", "control-id": "cis_rhel10_3-2.1", "description": "No notes for control-id 3.2.1.", "props": [ @@ -28621,7 +28621,7 @@ ] }, { - "uuid": "b2179942-ce87-46df-853b-b42f46e448cf", + "uuid": "037eff27-14f3-4859-93eb-e85506a19239", "control-id": "cis_rhel10_3-2.2", "description": "No notes for control-id 3.2.2.", "props": [ @@ -28638,7 +28638,7 @@ ] }, { - "uuid": "235b0c35-7aa5-4e67-ba02-847bf68acb38", + "uuid": "d82a4a47-edd6-488f-90fe-5838c0e66094", "control-id": "cis_rhel10_3-2.3", "description": "No notes for control-id 3.2.3.", "props": [ @@ -28655,7 +28655,7 @@ ] }, { - "uuid": "4bb1ff39-344f-4b40-9bb9-44eae51af3b5", + "uuid": "2821176c-ecdf-415b-87d9-b1b2dfbb4278", "control-id": "cis_rhel10_3-2.4", "description": "No notes for control-id 3.2.4.", "props": [ @@ -28672,7 +28672,7 @@ ] }, { - "uuid": "4eafdf89-8ca6-44d9-8ee8-6246b54e3ba0", + "uuid": "533227d6-72ef-4f74-93ba-1f477492a0a8", "control-id": "cis_rhel10_3-2.5", "description": "No notes for control-id 3.2.5.", "props": [ @@ -28689,7 +28689,7 @@ ] }, { - "uuid": "638982ce-9d75-4f07-b427-23c39583c965", + "uuid": "bf32f985-95e6-480a-b732-d01e50b19259", "control-id": "cis_rhel10_3-2.6", "description": "No notes for control-id 3.2.6.", "props": [ @@ -28706,7 +28706,7 @@ ] }, { - "uuid": "11e77d16-0357-4f45-a7a3-a144d326af54", + "uuid": "3fd2b960-476a-4ee9-b250-040276c2b1bc", "control-id": "cis_rhel10_3-3.1.2", "description": "No notes for control-id 3.3.1.2.", "props": [ @@ -28723,7 +28723,7 @@ ] }, { - "uuid": "88db2277-e29c-40a6-8e6b-191d6c1e4a68", + "uuid": "79cfca1d-c02d-4945-8555-300ddd10aeae", "control-id": "cis_rhel10_3-3.1.3", "description": "No notes for control-id 3.3.1.3.", "props": [ @@ -28740,7 +28740,7 @@ ] }, { - "uuid": "e5289c5e-7965-47a8-9e23-155223a72bbb", + "uuid": "76934fb7-c5f3-4713-9619-fe6f39a6d5c1", "control-id": "cis_rhel10_3-3.1.4", "description": "No notes for control-id 3.3.1.4.", "props": [ @@ -28757,7 +28757,7 @@ ] }, { - "uuid": "f93fadc3-42b6-457e-a94e-61ce445f0f66", + "uuid": "d8afe9b8-d34c-4bfd-9a8e-e3c66c7bf150", "control-id": "cis_rhel10_3-3.1.5", "description": "No notes for control-id 3.3.1.5.", "props": [ @@ -28774,7 +28774,7 @@ ] }, { - "uuid": "39c5cc3b-6673-4d21-ae87-3e6e5a7b8284", + "uuid": "660fc50e-2429-4b67-a7ac-79c4daa8eddd", "control-id": "cis_rhel10_3-3.1.6", "description": "No notes for control-id 3.3.1.6.", "props": [ @@ -28791,7 +28791,7 @@ ] }, { - "uuid": "3208a26e-2682-4650-bbfe-30bf444504e8", + "uuid": "1428e823-c88f-4772-9b48-e9c5f992f171", "control-id": "cis_rhel10_3-3.1.7", "description": "No notes for control-id 3.3.1.7.", "props": [ @@ -28808,7 +28808,7 @@ ] }, { - "uuid": "b420d8c5-6b98-4fd3-877c-822a620eb71b", + "uuid": "32c37eae-1f22-45f3-aa5f-c789f75e6278", "control-id": "cis_rhel10_3-3.1.8", "description": "No notes for control-id 3.3.1.8.", "props": [ @@ -28825,7 +28825,7 @@ ] }, { - "uuid": "8961a376-1c24-4ce7-9aa8-4498ad88279a", + "uuid": "cb49d63c-24a2-4417-a9a7-9ee30cdec4ef", "control-id": "cis_rhel10_3-3.1.9", "description": "No notes for control-id 3.3.1.9.", "props": [ @@ -28842,7 +28842,7 @@ ] }, { - "uuid": "01505262-b713-47b5-9c6d-5bce79a2c4d4", + "uuid": "20d3ecb3-71fd-449d-b131-5a47d7545c23", "control-id": "cis_rhel10_3-3.1.10", "description": "No notes for control-id 3.3.1.10.", "props": [ @@ -28859,7 +28859,7 @@ ] }, { - "uuid": "5a384e18-77aa-49a6-be09-cac4efe15acb", + "uuid": "a269f751-0a06-4d44-a8e8-6b255c995d75", "control-id": "cis_rhel10_3-3.1.11", "description": "No notes for control-id 3.3.1.11.", "props": [ @@ -28876,7 +28876,7 @@ ] }, { - "uuid": "40cd4ff5-2db1-4491-ad75-4103ce5f0c48", + "uuid": "9adc7cfe-fe05-4bf6-9c11-e9d91bd807df", "control-id": "cis_rhel10_3-3.1.12", "description": "No notes for control-id 3.3.1.12.", "props": [ @@ -28893,7 +28893,7 @@ ] }, { - "uuid": "5bdbc619-75a3-48e3-8d31-846cb8bbd8e7", + "uuid": "c149f6b7-942c-4dde-9e50-f05a96f87be8", "control-id": "cis_rhel10_3-3.1.13", "description": "No notes for control-id 3.3.1.13.", "props": [ @@ -28910,7 +28910,7 @@ ] }, { - "uuid": "f068a0b8-e567-41f1-9020-92ae1b68e5e3", + "uuid": "6f3151f4-70df-4163-91c3-0c132561a9ef", "control-id": "cis_rhel10_3-3.1.14", "description": "No notes for control-id 3.3.1.14.", "props": [ @@ -28927,7 +28927,7 @@ ] }, { - "uuid": "7d637f6f-77a5-4c4c-b9b6-fc59820d84ff", + "uuid": "f183c59f-cbdf-45d0-9c75-fbad4e28c1a3", "control-id": "cis_rhel10_3-3.1.15", "description": "No notes for control-id 3.3.1.15.", "props": [ @@ -28944,7 +28944,7 @@ ] }, { - "uuid": "16eeed6f-6881-4cfe-ae11-120f2d6b28f2", + "uuid": "23ec879a-8523-4112-8ce3-add79ce5db03", "control-id": "cis_rhel10_3-3.1.16", "description": "No notes for control-id 3.3.1.16.", "props": [ @@ -28961,7 +28961,7 @@ ] }, { - "uuid": "fb95c99b-15d4-45ae-8267-a6257a4e925a", + "uuid": "b05a258b-d17b-4ad3-8cf2-47099c17c90f", "control-id": "cis_rhel10_3-3.1.17", "description": "No notes for control-id 3.3.1.17.", "props": [ @@ -28978,7 +28978,7 @@ ] }, { - "uuid": "6db38e08-6715-493c-a0c9-dd92ba1e139b", + "uuid": "d9435a91-9342-4813-987d-7b969266cc5d", "control-id": "cis_rhel10_3-3.1.18", "description": "No notes for control-id 3.3.1.18.", "props": [ @@ -28995,7 +28995,7 @@ ] }, { - "uuid": "69528305-748d-48a6-bcf1-7075654d18b2", + "uuid": "96b80883-7187-4bf7-9450-48846c1e2b7e", "control-id": "cis_rhel10_3-3.2.1", "description": "No notes for control-id 3.3.2.1.", "props": [ @@ -29012,7 +29012,7 @@ ] }, { - "uuid": "ca680376-7746-4953-a678-3f45c372c2f2", + "uuid": "baf8ebe7-ed1b-47a9-9a4b-5bf29a31fc76", "control-id": "cis_rhel10_3-3.2.2", "description": "No notes for control-id 3.3.2.2.", "props": [ @@ -29029,7 +29029,7 @@ ] }, { - "uuid": "517dd33d-440a-4a2e-92d8-5731f10b9ada", + "uuid": "67f094ec-b493-49be-9490-58a712bcaef4", "control-id": "cis_rhel10_3-3.2.3", "description": "No notes for control-id 3.3.2.3.", "props": [ @@ -29046,7 +29046,7 @@ ] }, { - "uuid": "dc647231-9722-4712-b0e3-6b7c4d391bea", + "uuid": "4ca498a3-2a05-4494-ae80-3ce6dcc80a58", "control-id": "cis_rhel10_3-3.2.4", "description": "No notes for control-id 3.3.2.4.", "props": [ @@ -29063,7 +29063,7 @@ ] }, { - "uuid": "d463bbe3-c2e2-443a-b564-9d0d14037898", + "uuid": "a1b79f70-0b53-485d-b902-7a6c8368ef15", "control-id": "cis_rhel10_3-3.2.5", "description": "No notes for control-id 3.3.2.5.", "props": [ @@ -29080,7 +29080,7 @@ ] }, { - "uuid": "4aa6eb54-fb83-4782-a9d8-7075b7f4372c", + "uuid": "68807e60-4a4d-46f8-b2c8-c956d03f0549", "control-id": "cis_rhel10_3-3.2.6", "description": "No notes for control-id 3.3.2.6.", "props": [ @@ -29097,7 +29097,7 @@ ] }, { - "uuid": "3843d048-9c8d-46de-9e29-a418c8c614c6", + "uuid": "a90cb7a7-21cc-46f2-8b52-51ce9b6c3ee2", "control-id": "cis_rhel10_3-3.2.7", "description": "No notes for control-id 3.3.2.7.", "props": [ @@ -29114,7 +29114,7 @@ ] }, { - "uuid": "d5bdef46-fb2f-40e6-b729-e6628572bfa3", + "uuid": "35f8a01d-7e96-41c2-92b1-dd19aad73d73", "control-id": "cis_rhel10_3-3.2.8", "description": "No notes for control-id 3.3.2.8.", "props": [ @@ -29131,7 +29131,7 @@ ] }, { - "uuid": "836da335-0716-4304-b6e8-5510069f69ad", + "uuid": "e90f71b7-5732-410d-9ff4-e1f459ac82eb", "control-id": "cis_rhel10_4-1.1", "description": "No notes for control-id 4.1.1.", "props": [ @@ -29148,7 +29148,7 @@ ] }, { - "uuid": "2b0dbe6a-bba9-44cd-aa2d-da6ccd543206", + "uuid": "8677ced0-112d-4219-b9b0-39d43a88fc86", "control-id": "cis_rhel10_4-1.2", "description": "No notes for control-id 4.1.2.", "props": [ @@ -29165,7 +29165,7 @@ ] }, { - "uuid": "38e23eb8-8da2-4a22-bb74-83f1cf8a21f0", + "uuid": "e28fd3b6-f699-40bd-919a-5c0c79dddacf", "control-id": "cis_rhel10_4-1.3", "description": "No notes for control-id 4.1.3.", "props": [ @@ -29182,7 +29182,7 @@ ] }, { - "uuid": "2ea15ff6-8849-4376-88fd-bc52bc3ba894", + "uuid": "46aca2f1-e608-49a4-90b4-c420d3a215b5", "control-id": "cis_rhel10_4-1.4", "description": "The description for control-id cis_rhel10_4-1.4.", "props": [ @@ -29190,12 +29190,12 @@ "name": "implementation-status", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "alternative", - "remarks": "No notes for control-id 4.1.4." + "remarks": "There is not an easy way to do this for only active zones using OVAL.\nFor now, there are are no rules for this control." } ] }, { - "uuid": "7dbfb93e-c1c9-46d0-b2a5-444f5f930ea7", + "uuid": "fb52e5fb-86d7-4975-9f6a-b2eaf9efe2dc", "control-id": "cis_rhel10_4-1.5", "description": "Firewalld in Red Hat Enterprise Linux 10 accepts loopback traffic by default.", "props": [ @@ -29212,7 +29212,7 @@ ] }, { - "uuid": "d48f1db9-2a07-4f9c-8ac5-592891455e26", + "uuid": "3d7590ea-daa0-4ba2-8fa8-1899f477eb36", "control-id": "cis_rhel10_4-1.6", "description": "The description for control-id cis_rhel10_4-1.6.", "props": [ @@ -29225,7 +29225,7 @@ ] }, { - "uuid": "87ff15d6-e4b1-41d2-bd41-4c8982556ae5", + "uuid": "853b671a-27ac-4c5a-bf8d-af9fb3042d7a", "control-id": "cis_rhel10_4-1.7", "description": "The description for control-id cis_rhel10_4-1.7.", "props": [ @@ -29238,7 +29238,7 @@ ] }, { - "uuid": "33835a41-f232-4c1e-bd71-6f934fb1ed27", + "uuid": "b3849d8a-472e-43a6-8f04-b9a449a0a4f6", "control-id": "cis_rhel10_5-1.1", "description": "No notes for control-id 5.1.1.", "props": [ @@ -29295,7 +29295,7 @@ ] }, { - "uuid": "a5cfdd34-a0f5-47a9-89bc-b5b8fbd629a0", + "uuid": "2832394d-e3fd-4087-a830-5182fe34fc7e", "control-id": "cis_rhel10_5-1.2", "description": "No notes for control-id 5.1.2.", "props": [ @@ -29322,7 +29322,7 @@ ] }, { - "uuid": "f2b403c5-b266-44b5-9101-069df492ffa7", + "uuid": "1ce839bb-d8c5-4c21-9bef-1b60d6a5fe97", "control-id": "cis_rhel10_5-1.3", "description": "No notes for control-id 5.1.3.", "props": [ @@ -29349,7 +29349,7 @@ ] }, { - "uuid": "4dfc732c-b72f-406f-871d-499c5e33dbc0", + "uuid": "50c90f6c-8b0a-4054-8781-fb83df38824f", "control-id": "cis_rhel10_5-1.4", "description": "No notes for control-id 5.1.4.", "props": [ @@ -29366,7 +29366,7 @@ ] }, { - "uuid": "c995c40e-011e-40ee-ac84-102913bb862d", + "uuid": "8f19ac18-9cdf-4ad4-8339-6b376895d6d6", "control-id": "cis_rhel10_5-1.5", "description": "No notes for control-id 5.1.5.", "props": [ @@ -29383,7 +29383,7 @@ ] }, { - "uuid": "18cf1bc0-0899-4ded-9c82-ef6c5d3ea5f8", + "uuid": "316b1733-3cf0-4599-8cc6-9e6fa3abbf4f", "control-id": "cis_rhel10_5-1.6", "description": "No notes for control-id 5.1.6.", "props": [ @@ -29400,7 +29400,7 @@ ] }, { - "uuid": "c5d4b12c-951c-4c15-bf33-f9bc75f47c69", + "uuid": "15825f8d-eade-4a9c-b9a2-78cf1f96183e", "control-id": "cis_rhel10_5-1.7", "description": "The requirement gives an example of 45 seconds, but is flexible about the values. It is only\nnecessary to ensure there is a timeout configured in alignment to the site policy.", "props": [ @@ -29422,7 +29422,7 @@ ] }, { - "uuid": "e01a4457-916c-400c-9ba7-21c005efc418", + "uuid": "0f84f1c2-1b28-4c9b-95f8-4dca899ea5aa", "control-id": "cis_rhel10_5-1.10", "description": "No notes for control-id 5.1.10.", "props": [ @@ -29439,7 +29439,7 @@ ] }, { - "uuid": "4ec56535-c7b1-4df0-b968-a790f3456757", + "uuid": "afabe779-aca4-4086-85ef-d54d78b70576", "control-id": "cis_rhel10_5-1.11", "description": "No notes for control-id 5.1.11.", "props": [ @@ -29456,7 +29456,7 @@ ] }, { - "uuid": "9b606d6a-a3b7-4bfb-a7ce-041c74b692fa", + "uuid": "0f6f90c6-8cef-4dd4-bbfc-4c103d0d07ef", "control-id": "cis_rhel10_5-1.12", "description": "The description for control-id cis_rhel10_5-1.12.", "props": [ @@ -29474,7 +29474,7 @@ ] }, { - "uuid": "d9466438-5e0d-4940-8a0f-cd0f6265baee", + "uuid": "14a5295c-db2c-469f-b6f2-74106721621e", "control-id": "cis_rhel10_5-1.13", "description": "No notes for control-id 5.1.13.", "props": [ @@ -29491,7 +29491,7 @@ ] }, { - "uuid": "54c30adb-f71e-4c31-b659-32b07a72cdd7", + "uuid": "5c1db012-1097-440f-aa05-9ceb5d48fa22", "control-id": "cis_rhel10_5-1.14", "description": "The CIS benchmark is not opinionated about which loglevel is selected here. Here, this\nprofile uses VERBOSE by default, as it allows for the capture of login and logout activity\nas well as key fingerprints.", "props": [ @@ -29508,7 +29508,7 @@ ] }, { - "uuid": "814f555c-43c5-4a0c-8f52-cd91d7451c12", + "uuid": "a59a4d0b-cd39-4685-8f5c-6dbaf881b38e", "control-id": "cis_rhel10_5-1.15", "description": "No notes for control-id 5.1.15.", "props": [ @@ -29525,7 +29525,7 @@ ] }, { - "uuid": "8ff185e6-cf4f-4758-82b9-b8fc15c75ce8", + "uuid": "35432863-0481-4cb1-8365-da7416062b3d", "control-id": "cis_rhel10_5-1.16", "description": "No notes for control-id 5.1.16.", "props": [ @@ -29542,7 +29542,7 @@ ] }, { - "uuid": "870940dc-aa9b-4768-81b9-d51834c1ed07", + "uuid": "0fa070c6-be58-4bde-9668-14b9c0ad3dda", "control-id": "cis_rhel10_5-1.17", "description": "No notes for control-id 5.1.17.", "props": [ @@ -29559,7 +29559,7 @@ ] }, { - "uuid": "b7753880-8b1f-4779-859c-c2208c110073", + "uuid": "8c1c28e5-1d9a-4594-a01c-5cfd90aebe30", "control-id": "cis_rhel10_5-1.18", "description": "No notes for control-id 5.1.18.", "props": [ @@ -29576,7 +29576,7 @@ ] }, { - "uuid": "c3fd421c-2c80-459f-8937-ec936873f26f", + "uuid": "a229c1c8-e91c-432a-876f-322dcd631ace", "control-id": "cis_rhel10_5-1.19", "description": "No notes for control-id 5.1.19.", "props": [ @@ -29593,7 +29593,7 @@ ] }, { - "uuid": "2bf8d547-e4af-4c79-9ae1-42d58a87916c", + "uuid": "c0297fa2-6ce0-4612-838d-cf607aea4d89", "control-id": "cis_rhel10_5-1.20", "description": "No notes for control-id 5.1.20.", "props": [ @@ -29610,7 +29610,7 @@ ] }, { - "uuid": "51f988ee-a690-4c50-9008-4b46aa489c11", + "uuid": "4f77fcbe-abaf-42a7-9ce2-5054c6e024cf", "control-id": "cis_rhel10_5-1.21", "description": "No notes for control-id 5.1.21.", "props": [ @@ -29627,7 +29627,7 @@ ] }, { - "uuid": "c9b3fb80-555a-4534-b83d-bdd3c9b94ee6", + "uuid": "766252eb-288e-4871-ba09-21c75dc0b17e", "control-id": "cis_rhel10_5-1.22", "description": "No notes for control-id 5.1.22.", "props": [ @@ -29644,7 +29644,7 @@ ] }, { - "uuid": "7941e1e3-6450-4bdb-a48d-2869b8aaa662", + "uuid": "4ad61b9e-86e9-4c75-af0e-1d9e682faec1", "control-id": "cis_rhel10_5-2.1", "description": "No notes for control-id 5.2.1.", "props": [ @@ -29661,7 +29661,7 @@ ] }, { - "uuid": "75b0ad5c-1b60-4283-a4b6-53d63a97d635", + "uuid": "0273b380-35b9-48cc-a32d-c6bf7bbb496e", "control-id": "cis_rhel10_5-2.2", "description": "No notes for control-id 5.2.2.", "props": [ @@ -29678,7 +29678,7 @@ ] }, { - "uuid": "94bff4af-f952-4ed8-b7a7-63a13e830b03", + "uuid": "24f47b63-b06f-437c-8cb7-bc3387d78744", "control-id": "cis_rhel10_5-2.3", "description": "No notes for control-id 5.2.3.", "props": [ @@ -29695,7 +29695,7 @@ ] }, { - "uuid": "c75267f0-2220-4832-ae06-27b5b41b31f7", + "uuid": "61adc5c5-b543-4c74-8b49-6e5adedfa862", "control-id": "cis_rhel10_5-2.5", "description": "No notes for control-id 5.2.5.", "props": [ @@ -29712,7 +29712,7 @@ ] }, { - "uuid": "5a52fb87-fadc-40c8-a889-410458f1e940", + "uuid": "ca19c9b9-7298-460e-9089-10638d85b5b8", "control-id": "cis_rhel10_5-2.6", "description": "No notes for control-id 5.2.6.", "props": [ @@ -29729,7 +29729,7 @@ ] }, { - "uuid": "42fe36b6-62a6-4f42-a56e-2b4c674062e4", + "uuid": "a7c7c964-8728-40ab-b9fd-2025f7dca51a", "control-id": "cis_rhel10_5-2.7", "description": "Members of \"wheel\" or GID 0 groups are checked by default if the group option is not set for\npam_wheel.so module. The recommendation states the group should be empty to reinforce the\nuse of \"sudo\" for privileged access. Therefore, members of these groups should be manually\nchecked or a different group should be informed.", "props": [ @@ -29751,7 +29751,7 @@ ] }, { - "uuid": "dd05585b-09c4-4fcd-a96b-a59d20e3c7be", + "uuid": "f6c714d2-29c2-4c52-9f70-2aec8d503ba3", "control-id": "cis_rhel10_5-3.1.1", "description": "This requirement is hard to be automated without any specific requirement. The policy even\nstates that provided commands are examples, other custom settings might be in place and the\nsettings might be different depending on site policies. The other rules will already make\nsure there is a correct autheselect profile regardless of the existing settings. It is\nnecessary to better discuss with CIS Community.", "props": [ @@ -29763,7 +29763,7 @@ ] }, { - "uuid": "12dd8981-e21d-4756-9ad1-b4b7701e3983", + "uuid": "36d7abfd-aefb-4cf7-aab9-2876317dc342", "control-id": "cis_rhel10_5-3.1.2", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.1.", "props": [ @@ -29785,7 +29785,7 @@ ] }, { - "uuid": "c923bc3b-6692-456a-8116-f4cf3e02b780", + "uuid": "50b70568-69ea-4c76-b421-b2144b257ce0", "control-id": "cis_rhel10_5-3.1.3", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.2.", "props": [ @@ -29812,7 +29812,7 @@ ] }, { - "uuid": "66d9c1d9-dd2d-4992-a54e-19c6f0801ab6", + "uuid": "48eaf894-d3d4-476f-b387-0571a83ab563", "control-id": "cis_rhel10_5-3.1.4", "description": "The module is properly enabled by the rules mentioned in related_rules.\nRequirements in 5.3.2.3 use these rules.", "props": [ @@ -29824,7 +29824,7 @@ ] }, { - "uuid": "f4f33e60-68a2-4143-a288-3a0b9406a1ca", + "uuid": "88613868-a418-45e6-b348-cfe36787ce43", "control-id": "cis_rhel10_5-3.1.5", "description": "No notes for control-id 5.3.1.5.", "props": [ @@ -29841,7 +29841,7 @@ ] }, { - "uuid": "efc9216c-2b1c-4175-875c-287ebf78a054", + "uuid": "f24e8194-63d0-4d5a-b443-27b23ddf8470", "control-id": "cis_rhel10_5-3.2.1.1", "description": "No notes for control-id 5.3.2.1.1.", "props": [ @@ -29858,7 +29858,7 @@ ] }, { - "uuid": "2b49bfdf-2067-470c-8948-f172db5368ca", + "uuid": "ace81b1b-0170-4c7b-ba0a-a47268cf331f", "control-id": "cis_rhel10_5-3.2.1.2", "description": "The policy also accepts value 0, which means the locked accounts should be manually unlocked\nby an administrator. However, it also mentions that using value 0 can facilitate a DoS\nattack to legitimate users.", "props": [ @@ -29875,7 +29875,7 @@ ] }, { - "uuid": "91bb299c-b900-4abf-82eb-e24d595df71c", + "uuid": "83db5b5e-49e4-497b-bac4-70b75087ff46", "control-id": "cis_rhel10_5-3.2.2.1", "description": "No notes for control-id 5.3.2.2.1.", "props": [ @@ -29892,7 +29892,7 @@ ] }, { - "uuid": "17e4eea1-ff62-4d6b-a568-cde433eca728", + "uuid": "4b85a269-f993-4d07-808d-557170eef01d", "control-id": "cis_rhel10_5-3.2.2.2", "description": "No notes for control-id 5.3.2.2.2.", "props": [ @@ -29909,7 +29909,7 @@ ] }, { - "uuid": "09c03901-1469-49eb-8862-d18e762c4207", + "uuid": "22a8da99-0d87-4cfa-bfdc-250320bbf665", "control-id": "cis_rhel10_5-3.2.2.3", "description": "This requirement is expected to be manual. However, in previous versions of the policy\nit was already automated the configuration of \"minclass\" option. This posture was kept for\nRHEL 10 in this new version. Rules related to other options are informed in related_rules.\nIn short, minclass=4 alone can achieve the same result achieved by the combination of the\nother 4 options mentioned in the policy.", "props": [ @@ -29926,7 +29926,7 @@ ] }, { - "uuid": "cf42c635-cbfa-46a3-828e-55dd95c2f02d", + "uuid": "a9fbe826-2019-4afa-a82d-1e91c3885d1f", "control-id": "cis_rhel10_5-3.2.2.4", "description": "No notes for control-id 5.3.2.2.4.", "props": [ @@ -29943,7 +29943,7 @@ ] }, { - "uuid": "ef0be797-7d7c-41bf-82d1-25e2966dc3e0", + "uuid": "5597e0f5-737a-4e7b-8a7d-786b3a4db4c5", "control-id": "cis_rhel10_5-3.2.2.5", "description": "No notes for control-id 5.3.2.2.5.", "props": [ @@ -29960,7 +29960,7 @@ ] }, { - "uuid": "b036891e-7a2e-4676-9b0f-05b70e30dd38", + "uuid": "f8134550-f864-46e2-843c-f302b6ef311c", "control-id": "cis_rhel10_5-3.2.2.6", "description": "No notes for control-id 5.3.2.2.6.", "props": [ @@ -29977,7 +29977,7 @@ ] }, { - "uuid": "79d2d4f1-8f12-4a8c-bc66-d1b7dc7589ea", + "uuid": "fef1d1ff-4523-420d-ba88-63f4f77babe2", "control-id": "cis_rhel10_5-3.2.2.7", "description": "No notes for control-id 5.3.2.2.7.", "props": [ @@ -29994,7 +29994,7 @@ ] }, { - "uuid": "bd5bc406-fd84-4f69-9a61-08d170b0e91d", + "uuid": "fbfe452c-6210-4801-8add-12f91f39cb4f", "control-id": "cis_rhel10_5-3.2.3.1", "description": "Although mentioned in the section 5.3.3.3, there is no explicit requirement to configure\nretry option of pam_pwhistory. If come in the future, the rule accounts_password_pam_retry\ncan be used.", "props": [ @@ -30016,7 +30016,7 @@ ] }, { - "uuid": "2a5a127c-caba-4d78-9a1f-74dbf8814c79", + "uuid": "75a8cd1f-a1c3-4a4b-8b98-46db6b3f5362", "control-id": "cis_rhel10_5-3.2.3.2", "description": "No notes for control-id 5.3.2.3.2.", "props": [ @@ -30033,7 +30033,7 @@ ] }, { - "uuid": "060da05e-8e54-4f30-bb58-217e8814351d", + "uuid": "90da8d00-6708-4fa1-892d-981546fc85d1", "control-id": "cis_rhel10_5-3.2.3.3", "description": "In RHEL 10 pam_pwhistory is enabled via authselect feature, as required in 5.3.1.4. The\nfeature automatically set \"use_authok\" option. In any case, we don't have a rule to check\nthis option specifically.", "props": [ @@ -30050,7 +30050,7 @@ ] }, { - "uuid": "5e65591d-4d9c-4264-9222-26c79ff3202a", + "uuid": "e2bcf9ec-ac82-4f28-9db0-0704678cbbf0", "control-id": "cis_rhel10_5-3.2.4.1", "description": "The rule more specifically used in this requirement also satify the requirement 5.3.1.5.", "props": [ @@ -30067,7 +30067,7 @@ ] }, { - "uuid": "7ce1403e-f02e-4a20-9bbb-e9ca85aebcb8", + "uuid": "ee92ca26-7ce5-4c38-be81-bf2e7164b74e", "control-id": "cis_rhel10_5-3.2.4.2", "description": "Usage of pam_unix.so module together with \"remember\" option is deprecated and is not\nrecommended by this policy. Instead, it should be used remember option of pam_pwhistory\nmodule, as required in 5.3.2.3.1. See here for more details about pam_unix.so:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1778929", "props": [ @@ -30084,7 +30084,7 @@ ] }, { - "uuid": "f226b6f3-0ac8-4d25-aeb5-75cd72732da0", + "uuid": "af1f8aa0-fc3c-4bc0-92e1-39dfb59008b8", "control-id": "cis_rhel10_5-3.2.4.3", "description": "Changes in logindefs mentioned in this requirement are more specifically covered by 5.4.1.4", "props": [ @@ -30106,7 +30106,7 @@ ] }, { - "uuid": "d1f503c8-c2de-4ddc-9f6c-248854629772", + "uuid": "619dabb0-95f3-4a11-b2c8-db1d2fc4cc0b", "control-id": "cis_rhel10_5-3.2.4.4", "description": "In RHEL 10 pam_unix is enabled by default in all authselect profiles already with the\nuse_authtok option set. In any case, we don't have a rule to check this option specifically,\nlike in 5.3.2.3.3.", "props": [ @@ -30123,7 +30123,7 @@ ] }, { - "uuid": "3ec271f8-698c-4230-b381-b4dc63370613", + "uuid": "e82c9626-0454-4d49-999e-c10784bd02de", "control-id": "cis_rhel10_5-4.1.1", "description": "No notes for control-id 5.4.1.1.", "props": [ @@ -30145,7 +30145,7 @@ ] }, { - "uuid": "840943b2-7404-4ee7-a598-95ef0501075a", + "uuid": "f1657e7d-595b-4edd-89a9-9d909f47d6f7", "control-id": "cis_rhel10_5-4.1.3", "description": "No notes for control-id 5.4.1.3.", "props": [ @@ -30167,7 +30167,7 @@ ] }, { - "uuid": "2fdfbf31-586d-4861-8507-8a58337ac0ba", + "uuid": "8c29eeb6-8219-407f-9734-7f967046dae9", "control-id": "cis_rhel10_5-4.1.4", "description": "There's a \"new\" set of options in /etc/login.defs file to define the number of iterations\nperformed during the hashing process.", "props": [ @@ -30189,7 +30189,7 @@ ] }, { - "uuid": "cf0e8860-22e5-4981-8606-568d0f49f0e1", + "uuid": "8096f374-42c6-449e-ba83-be657253fd79", "control-id": "cis_rhel10_5-4.1.5", "description": "No notes for control-id 5.4.1.5.", "props": [ @@ -30211,7 +30211,7 @@ ] }, { - "uuid": "550e9d55-4f28-404b-b2ff-f1a10c082efe", + "uuid": "d864fef0-a754-477f-96ca-f2968d34770f", "control-id": "cis_rhel10_5-4.1.6", "description": "No notes for control-id 5.4.1.6.", "props": [ @@ -30228,7 +30228,7 @@ ] }, { - "uuid": "15dc0304-3ab4-41f7-a43f-6176a13329f4", + "uuid": "a00cf6e5-9940-4529-9a76-b2110e0e02fb", "control-id": "cis_rhel10_5-4.2.1", "description": "No notes for control-id 5.4.2.1.", "props": [ @@ -30245,7 +30245,7 @@ ] }, { - "uuid": "0bb3cb33-9a39-47ba-928f-72c5e0511cac", + "uuid": "c150a67a-93c3-400a-ac2b-aa80d198afbf", "control-id": "cis_rhel10_5-4.2.2", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -30262,7 +30262,7 @@ ] }, { - "uuid": "2151b2cc-4fa7-46a7-ba0d-da6331c07472", + "uuid": "8b2061a7-37bd-4e08-9b92-80205e731393", "control-id": "cis_rhel10_5-4.2.3", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -30279,7 +30279,7 @@ ] }, { - "uuid": "379381b0-6f84-4a6c-b96a-bb2af91face0", + "uuid": "2d555684-0b6a-4904-a1ed-516bfa4b943b", "control-id": "cis_rhel10_5-4.2.4", "description": "No notes for control-id 5.4.2.4.", "props": [ @@ -30296,7 +30296,7 @@ ] }, { - "uuid": "be330cb6-120f-4752-8646-2c396a76a664", + "uuid": "cbf3c4e9-f6a2-4dff-aa96-52227b91f405", "control-id": "cis_rhel10_5-4.2.5", "description": "No notes for control-id 5.4.2.5.", "props": [ @@ -30318,7 +30318,7 @@ ] }, { - "uuid": "4e0a993a-f836-43ec-9939-5dd2686e0f79", + "uuid": "d63adca0-7fd8-44be-a458-059a199ad5cb", "control-id": "cis_rhel10_5-4.2.6", "description": "No notes for control-id 5.4.2.6.", "props": [ @@ -30335,7 +30335,7 @@ ] }, { - "uuid": "d466cc62-d265-45af-bf43-86f08c39fc86", + "uuid": "956f61cb-cd5c-4201-81b5-b353c76c7fab", "control-id": "cis_rhel10_5-4.2.7", "description": "No notes for control-id 5.4.2.7.", "props": [ @@ -30357,7 +30357,7 @@ ] }, { - "uuid": "59a5e902-13ef-4add-84d8-cb96e9356225", + "uuid": "5a615492-f08c-4544-8ab8-cc967a410c72", "control-id": "cis_rhel10_5-4.2.8", "description": "No notes for control-id 5.4.2.8.", "props": [ @@ -30374,7 +30374,7 @@ ] }, { - "uuid": "b060783a-d73c-450e-9106-8d67aa188b89", + "uuid": "4c31c946-9c10-49fd-aa6d-bd22e75131cb", "control-id": "cis_rhel10_5-4.3.2", "description": "No notes for control-id 5.4.3.2.", "props": [ @@ -30391,7 +30391,7 @@ ] }, { - "uuid": "f57dba22-cad0-46bc-b9de-2de5903e4a84", + "uuid": "81193401-ce66-4c51-b75a-60df6bf743a2", "control-id": "cis_rhel10_5-4.3.3", "description": "No notes for control-id 5.4.3.3.", "props": [ @@ -30418,7 +30418,7 @@ ] }, { - "uuid": "59766100-b259-4ff4-8a40-9e2ba518ed12", + "uuid": "b4b55b8d-19a8-4c1c-a6d9-12f3bba076a4", "control-id": "cis_rhel10_6-1.1", "description": "No notes for control-id 6.1.1.", "props": [ @@ -30440,7 +30440,7 @@ ] }, { - "uuid": "a9eecb91-e407-4850-8349-11336ab3d288", + "uuid": "436fe0bf-75fb-4bf9-8634-8bcdaabeb88b", "control-id": "cis_rhel10_6-1.2", "description": "No notes for control-id 6.1.2.", "props": [ @@ -30457,7 +30457,7 @@ ] }, { - "uuid": "16248e2c-47a6-4537-a811-803a62a231b1", + "uuid": "b8119162-5026-45fc-b16e-addf85edc8b1", "control-id": "cis_rhel10_6-1.3", "description": "No notes for control-id 6.1.3.", "props": [ @@ -30474,7 +30474,7 @@ ] }, { - "uuid": "3cfb486e-76eb-4eb9-b1c6-398db57c0d38", + "uuid": "9353d7ae-5b68-4811-87fe-03c4a71f5b93", "control-id": "cis_rhel10_6-2.1.1", "description": "No notes for control-id 6.2.1.1.", "props": [ @@ -30491,7 +30491,7 @@ ] }, { - "uuid": "711d6c3e-811c-40ce-be1d-4ea6f2fd53f2", + "uuid": "af10d35f-8a34-4ab3-96f6-77cbf2c39a72", "control-id": "cis_rhel10_6-2.1.2", "description": "The description for control-id cis_rhel10_6-2.1.2.", "props": [ @@ -30504,7 +30504,7 @@ ] }, { - "uuid": "36ccafe1-c9b5-450f-83b9-9c2f2a3b4ec6", + "uuid": "d2f32596-a67c-458f-bb13-3edb82a7b32d", "control-id": "cis_rhel10_6-2.1.3", "description": "The description for control-id cis_rhel10_6-2.1.3.", "props": [ @@ -30517,7 +30517,7 @@ ] }, { - "uuid": "d9ea5ece-8bd9-4437-8fac-d49e2cf527bc", + "uuid": "47de7070-c937-4d83-a61f-e3c901aebef4", "control-id": "cis_rhel10_6-2.1.4", "description": "No notes for control-id 6.2.1.4.", "props": [ @@ -30534,7 +30534,7 @@ ] }, { - "uuid": "048f3219-b3d6-4ff1-824d-6d5e5ca73252", + "uuid": "7cd3fddf-cfe8-4945-884a-0184bbd56c5c", "control-id": "cis_rhel10_6-2.2.1.1", "description": "No notes for control-id 6.2.2.1.1.", "props": [ @@ -30551,7 +30551,7 @@ ] }, { - "uuid": "e179c121-43ad-4705-ad78-bd79350a32f9", + "uuid": "22339091-c764-4650-ad5f-7d565df213b0", "control-id": "cis_rhel10_6-2.2.1.2", "description": "The description for control-id cis_rhel10_6-2.2.1.2.", "props": [ @@ -30564,7 +30564,7 @@ ] }, { - "uuid": "e71ffbf2-7e82-4ac5-a212-7d1219f1b2d6", + "uuid": "7650d323-a1f1-49cd-af46-c53dd326d7aa", "control-id": "cis_rhel10_6-2.2.1.3", "description": "No notes for control-id 6.2.2.1.3.", "props": [ @@ -30581,7 +30581,7 @@ ] }, { - "uuid": "314b5bfb-d3cb-4c9b-86ac-56745e768e96", + "uuid": "a17f2f1b-cefc-4ab9-8c68-c518c2e3a521", "control-id": "cis_rhel10_6-2.2.1.4", "description": "No notes for control-id 6.2.2.1.4.", "props": [ @@ -30598,7 +30598,7 @@ ] }, { - "uuid": "019c1164-f873-43c1-bf13-e2e4d39fae12", + "uuid": "05199ad2-adb7-4ab3-ac6f-2da54e5a7df8", "control-id": "cis_rhel10_6-2.2.2", "description": "No notes for control-id 6.2.2.2.", "props": [ @@ -30615,7 +30615,7 @@ ] }, { - "uuid": "f9cd53ff-15d9-4209-ae20-2c702af684ad", + "uuid": "51365a0e-31bb-417e-a383-39c1ae78ca9d", "control-id": "cis_rhel10_6-2.2.3", "description": "No notes for control-id 6.2.2.3.", "props": [ @@ -30632,7 +30632,7 @@ ] }, { - "uuid": "5663a366-ef4f-41a3-934c-6abfd8c0a17e", + "uuid": "46584ecb-3976-4e51-bfd8-168fffe1e0ef", "control-id": "cis_rhel10_6-2.2.4", "description": "No notes for control-id 6.2.2.4.", "props": [ @@ -30649,7 +30649,7 @@ ] }, { - "uuid": "7c84e327-f5c2-434d-ae9b-338220c0a4fe", + "uuid": "b5d03595-55d4-491f-9f7c-b50797953f9c", "control-id": "cis_rhel10_6-2.3.1", "description": "No notes for control-id 6.2.3.1.", "props": [ @@ -30661,7 +30661,7 @@ ] }, { - "uuid": "054360e4-322e-4915-b20c-c16932d00513", + "uuid": "2b4bb043-c9c2-4052-8db7-ce4547256f9f", "control-id": "cis_rhel10_6-2.3.2", "description": "No notes for control-id 6.2.3.2.", "props": [ @@ -30673,7 +30673,7 @@ ] }, { - "uuid": "64672808-9d6b-4683-b46f-ca5962b62c72", + "uuid": "fabd31b5-f0e2-4da3-850e-ed0f58f9e83f", "control-id": "cis_rhel10_6-2.3.3", "description": "No notes for control-id 6.2.3.3.", "props": [ @@ -30685,7 +30685,7 @@ ] }, { - "uuid": "f61b5656-4a5e-45a6-95b3-f2edcc48c071", + "uuid": "b88e0dc6-5611-4492-a59c-50923e6c0faf", "control-id": "cis_rhel10_6-2.3.4", "description": "No notes for control-id 6.2.3.4.", "props": [ @@ -30697,7 +30697,7 @@ ] }, { - "uuid": "6971dff0-8275-4146-af66-a366bbdb2c42", + "uuid": "b50442db-ee00-4662-ad34-c9c29a2e4fe4", "control-id": "cis_rhel10_6-2.3.5", "description": "The description for control-id cis_rhel10_6-2.3.5.", "props": [ @@ -30710,7 +30710,7 @@ ] }, { - "uuid": "89b9548d-650b-4f25-aff7-a5c6c81bcdf9", + "uuid": "23ab0be0-d567-4da2-9acd-1e6fd03df9ab", "control-id": "cis_rhel10_6-2.3.6", "description": "The description for control-id cis_rhel10_6-2.3.6.", "props": [ @@ -30723,7 +30723,7 @@ ] }, { - "uuid": "8d1376e0-2707-4778-84dd-f16a466226af", + "uuid": "59e4e321-6a90-4518-a3f2-0b63f529ec69", "control-id": "cis_rhel10_6-2.3.7", "description": "No notes for control-id 6.2.3.7.", "props": [ @@ -30735,7 +30735,7 @@ ] }, { - "uuid": "32d4690a-2657-4e7d-bba0-c6143c353e96", + "uuid": "9366178a-5e0c-477f-9650-bcc05319480f", "control-id": "cis_rhel10_6-2.3.8", "description": "The description for control-id cis_rhel10_6-2.3.8.", "props": [ @@ -30748,7 +30748,7 @@ ] }, { - "uuid": "4649bff2-b487-48fe-9064-7320069f9c09", + "uuid": "ef1892b3-5802-4453-b7d3-ab3be38f4700", "control-id": "cis_rhel10_6-2.4.1", "description": "It is not harmful to run these rules even if rsyslog is not installed or active.", "props": [ @@ -30775,7 +30775,7 @@ ] }, { - "uuid": "06bac560-1941-4b8b-a14d-d5f4941463ed", + "uuid": "0f473c94-5451-4b34-82dd-9069f13dbcd5", "control-id": "cis_rhel10_7-1.1", "description": "No notes for control-id 7.1.1.", "props": [ @@ -30802,7 +30802,7 @@ ] }, { - "uuid": "81af5ef6-ab18-4498-b04c-89733f6cbea8", + "uuid": "12b41e57-3373-4008-a9b5-eacb8554c5e5", "control-id": "cis_rhel10_7-1.2", "description": "No notes for control-id 7.1.2.", "props": [ @@ -30829,7 +30829,7 @@ ] }, { - "uuid": "7b7355ec-02a5-4bd1-ab4a-7d91194e0a33", + "uuid": "075eea29-5553-46e0-be51-eb96267b50b7", "control-id": "cis_rhel10_7-1.3", "description": "No notes for control-id 7.1.3.", "props": [ @@ -30856,7 +30856,7 @@ ] }, { - "uuid": "b7de8b0b-5244-4048-86b9-103d09a0f92b", + "uuid": "9cb14ca2-e0bb-4ae4-b840-b13ebe78697a", "control-id": "cis_rhel10_7-1.4", "description": "No notes for control-id 7.1.4.", "props": [ @@ -30883,7 +30883,7 @@ ] }, { - "uuid": "dc9ea67c-e7f4-4e83-abbc-73a6a8276fe8", + "uuid": "2307e987-3888-4015-945f-3e13a2f8339c", "control-id": "cis_rhel10_7-1.5", "description": "No notes for control-id 7.1.5.", "props": [ @@ -30910,7 +30910,7 @@ ] }, { - "uuid": "0541432a-2d8c-4457-8fed-aa6528a045ba", + "uuid": "ef38aa13-8782-46c0-afee-ab7298479f3c", "control-id": "cis_rhel10_7-1.6", "description": "No notes for control-id 7.1.6.", "props": [ @@ -30937,7 +30937,7 @@ ] }, { - "uuid": "78e97b58-3f8d-44bb-baec-76d170890b88", + "uuid": "4be77dc3-5d0a-4c71-aa0b-b352a4695696", "control-id": "cis_rhel10_7-1.7", "description": "No notes for control-id 7.1.7.", "props": [ @@ -30964,7 +30964,7 @@ ] }, { - "uuid": "ce43d873-e206-4667-b7d9-a7fb715aa435", + "uuid": "62d0b919-bf47-4e47-9ac7-5109d30827f4", "control-id": "cis_rhel10_7-1.8", "description": "No notes for control-id 7.1.8.", "props": [ @@ -30991,7 +30991,7 @@ ] }, { - "uuid": "ace4e2f5-c814-4c8c-87f6-71e35d16b71d", + "uuid": "d95b80b9-99dd-46df-9adc-0a656a57b029", "control-id": "cis_rhel10_7-1.9", "description": "No notes for control-id 7.1.9.", "props": [ @@ -31018,7 +31018,7 @@ ] }, { - "uuid": "11a7d589-a2dd-466b-a667-13f1cae1fddb", + "uuid": "1df74b79-32e5-41e0-98e8-f9843f4b3e24", "control-id": "cis_rhel10_7-1.10", "description": "No notes for control-id 7.1.10.", "props": [ @@ -31060,7 +31060,7 @@ ] }, { - "uuid": "c64c16ec-57d2-40d6-9768-208eeb0df199", + "uuid": "97c43e1a-e951-4940-a29f-8f7a3916cec3", "control-id": "cis_rhel10_7-1.11", "description": "No notes for control-id 7.1.11.", "props": [ @@ -31082,7 +31082,7 @@ ] }, { - "uuid": "658ef2ff-6fe4-4b25-8978-09fca32b0cf0", + "uuid": "0f8aa62f-f3ce-4278-b348-33317f038e18", "control-id": "cis_rhel10_7-1.12", "description": "No notes for control-id 7.1.12.", "props": [ @@ -31104,7 +31104,7 @@ ] }, { - "uuid": "0274f837-7da9-43e9-a3d6-66e44a06ae11", + "uuid": "27aab75e-2b47-4582-96e3-8b2bbff6ddaa", "control-id": "cis_rhel10_7-1.13", "description": "The description for control-id cis_rhel10_7-1.13.", "props": [ @@ -31117,7 +31117,7 @@ ] }, { - "uuid": "033c6e38-d10f-48af-9a0d-c7ff6a965e3a", + "uuid": "6825f3f9-3bac-4b0e-b43e-66bb710cb5f4", "control-id": "cis_rhel10_7-2.1", "description": "No notes for control-id 7.2.1.", "props": [ @@ -31134,7 +31134,7 @@ ] }, { - "uuid": "a54d3fb2-6aa9-4e87-b2eb-927414c5bf4b", + "uuid": "bfc9e569-6da4-4990-9e97-575e0981bb98", "control-id": "cis_rhel10_7-2.2", "description": "No notes for control-id 7.2.2.", "props": [ @@ -31151,7 +31151,7 @@ ] }, { - "uuid": "4378dc19-5696-492a-b433-b72c5038555a", + "uuid": "7327d452-fb78-424b-b26f-c5b9981e4d7f", "control-id": "cis_rhel10_7-2.3", "description": "No notes for control-id 7.2.3.", "props": [ @@ -31168,7 +31168,7 @@ ] }, { - "uuid": "e73ca224-ff86-4ba0-923c-6b046ddb5031", + "uuid": "b11d387a-2db6-4fe0-8715-b0da9f498b65", "control-id": "cis_rhel10_7-2.4", "description": "No notes for control-id 7.2.4.", "props": [ @@ -31185,7 +31185,7 @@ ] }, { - "uuid": "3c9b193f-38da-476e-9464-8404119aa5f0", + "uuid": "a142fb6a-8a33-4c45-9c55-0c798ec48e1d", "control-id": "cis_rhel10_7-2.5", "description": "No notes for control-id 7.2.5.", "props": [ @@ -31202,7 +31202,7 @@ ] }, { - "uuid": "d8237234-f062-4346-87c9-8b2dcb021f23", + "uuid": "056dffa0-bee9-4293-b44f-d203d7ebf1cd", "control-id": "cis_rhel10_7-2.6", "description": "No notes for control-id 7.2.6.", "props": [ @@ -31219,7 +31219,7 @@ ] }, { - "uuid": "699a4dc1-b2d8-405d-ab8c-1ff61e04d0bb", + "uuid": "a8b267fd-4199-41c2-b3d6-f7af30d1f05c", "control-id": "cis_rhel10_7-2.7", "description": "No notes for control-id 7.2.7.", "props": [ @@ -31236,7 +31236,7 @@ ] }, { - "uuid": "f5a01062-eb1f-4eeb-ad67-fe3d56c5b565", + "uuid": "e5c16bed-01d5-4899-a5f1-22db3b48ce36", "control-id": "cis_rhel10_7-2.8", "description": "No notes for control-id 7.2.8.", "props": [ @@ -31263,7 +31263,7 @@ ] }, { - "uuid": "5e2fcee2-5743-41dc-a235-aea7c94dd619", + "uuid": "0a75a1d0-0ef2-47c4-8792-ccbbbfac334a", "control-id": "cis_rhel10_7-2.9", "description": "No notes for control-id 7.2.9.", "props": [ diff --git a/component-definitions/rhel10/rhel10-cis_rhel10-l2_workstation/component-definition.json b/component-definitions/rhel10/rhel10-cis_rhel10-l2_workstation/component-definition.json index dff42c4f..c9fa7d05 100644 --- a/component-definitions/rhel10/rhel10-cis_rhel10-l2_workstation/component-definition.json +++ b/component-definitions/rhel10/rhel10-cis_rhel10-l2_workstation/component-definition.json @@ -3,8 +3,8 @@ "uuid": "9025707c-c78d-4c60-a2df-d0a822467a29", "metadata": { "title": "Component definition for rhel10", - "last-modified": "2025-12-16T14:25:38.248613+00:00", - "version": "4.5", + "last-modified": "2025-12-17T09:50:48.295033+00:00", + "version": "4.6", "oscal-version": "1.1.3" }, "components": [ @@ -6395,7 +6395,7 @@ ], "control-implementations": [ { - "uuid": "22877161-51ce-4965-bdeb-0bf1a09336ec", + "uuid": "25ce83ef-165b-4a6a-a875-b3b5a0df64d7", "source": "trestle://profiles/rhel10-cis_rhel10-l2_workstation/profile.json", "description": "Control implementation for cis_workstation_l2", "props": [ @@ -6811,7 +6811,7 @@ ], "implemented-requirements": [ { - "uuid": "d7e4ef30-88a2-408e-8814-32073ec4201e", + "uuid": "49a86ca3-e74b-4482-9f9d-2c58574bcde9", "control-id": "cis_rhel10_1-1.1.6", "description": "No notes for control-id 1.1.1.6.", "props": [ @@ -6828,7 +6828,7 @@ ] }, { - "uuid": "c6d1e083-959c-4883-af13-bca5247fee5c", + "uuid": "44962342-1942-482b-887c-c3055be9f638", "control-id": "cis_rhel10_1-1.1.7", "description": "No notes for control-id 1.1.1.7.", "props": [ @@ -6845,7 +6845,7 @@ ] }, { - "uuid": "55bb9398-e09d-46de-9aeb-3fc6b8dab9c6", + "uuid": "42af95a4-542a-4ca2-8b56-05c77dab8f3b", "control-id": "cis_rhel10_1-1.1.8", "description": "No notes for control-id 1.1.1.8.", "props": [ @@ -6862,7 +6862,7 @@ ] }, { - "uuid": "48fe1698-5fd8-4bf9-bf44-1292d6e281e1", + "uuid": "228e1c91-9e1d-469b-93e7-b03e6e346c98", "control-id": "cis_rhel10_1-1.1.9", "description": "No notes for control-id 1.1.1.9.", "props": [ @@ -6879,7 +6879,7 @@ ] }, { - "uuid": "d18eb161-ec9a-419d-b93a-c57354bdb366", + "uuid": "9df41024-b07a-4dc4-871d-c9043759cf85", "control-id": "cis_rhel10_1-1.1.10", "description": "No notes for control-id 1.1.1.10.", "props": [ @@ -6896,7 +6896,7 @@ ] }, { - "uuid": "93863adf-8471-4089-bebd-ede5ebbaa47e", + "uuid": "004c6f14-6fa4-4068-9efa-f5f52cd46cc7", "control-id": "cis_rhel10_1-1.2.3.1", "description": "No notes for control-id 1.1.2.3.1.", "props": [ @@ -6913,7 +6913,7 @@ ] }, { - "uuid": "39c9a97b-bfe9-42ad-b2da-93290a2cbbcf", + "uuid": "ed4e7cfe-fccb-41f3-a431-b330e29b0f91", "control-id": "cis_rhel10_1-1.2.4.1", "description": "No notes for control-id 1.1.2.4.1.", "props": [ @@ -6930,7 +6930,7 @@ ] }, { - "uuid": "333d7f21-2657-45f9-b689-da11bdc9c754", + "uuid": "80ebe825-e889-4ae1-8ae7-c21498cda05c", "control-id": "cis_rhel10_1-1.2.5.1", "description": "No notes for control-id 1.1.2.5.1.", "props": [ @@ -6947,7 +6947,7 @@ ] }, { - "uuid": "6495b451-6c8b-48cb-bdc9-c36dfcc44007", + "uuid": "e46c72c6-b309-4d5d-ac0a-ccf51ff59f38", "control-id": "cis_rhel10_1-1.2.6.1", "description": "No notes for control-id 1.1.2.6.1.", "props": [ @@ -6964,7 +6964,7 @@ ] }, { - "uuid": "cd1468ac-cc40-4442-bf02-5038b4ace749", + "uuid": "21dd7613-50da-4528-a317-bd095702d9bc", "control-id": "cis_rhel10_1-1.2.7.1", "description": "No notes for control-id 1.1.2.7.1.", "props": [ @@ -6981,7 +6981,7 @@ ] }, { - "uuid": "097f2ad0-9697-4f5e-947b-43d8bdcbbdb2", + "uuid": "30fa1798-cb0f-4be7-a54c-bd326ebeaab7", "control-id": "cis_rhel10_1-2.1.3", "description": "The description for control-id cis_rhel10_1-2.1.3.", "props": [ @@ -6994,7 +6994,7 @@ ] }, { - "uuid": "505f2b2d-2141-47a6-ae09-0d54432b4a17", + "uuid": "45b3e4d5-eccf-4583-879e-d893280e3561", "control-id": "cis_rhel10_1-2.1.5", "description": "No notes for control-id 1.2.1.5.", "props": [ @@ -7011,7 +7011,7 @@ ] }, { - "uuid": "b47c917e-9068-450c-834f-4e243b3d3419", + "uuid": "55208533-0225-411d-a3c4-8b59ad46f41a", "control-id": "cis_rhel10_1-3.1.5", "description": "No notes for control-id 1.3.1.5.", "props": [ @@ -7028,7 +7028,7 @@ ] }, { - "uuid": "be87b259-3ae8-4d6a-be41-0f871e8d3987", + "uuid": "42a2f8f3-a0f5-4543-bf09-9c05d713cddd", "control-id": "cis_rhel10_1-3.1.6", "description": "The description for control-id cis_rhel10_1-3.1.6.", "props": [ @@ -7041,7 +7041,7 @@ ] }, { - "uuid": "ee7c701d-826e-4167-914d-ef5164ad0993", + "uuid": "1d722fd8-4131-4227-9ba0-2cd7ef9fc402", "control-id": "cis_rhel10_1-5.3", "description": "No notes for control-id 1.5.3.", "props": [ @@ -7058,7 +7058,7 @@ ] }, { - "uuid": "2a07d607-9a10-44c3-a67b-24e4ccb78558", + "uuid": "5eed25b5-6cdd-42c9-b5c3-6d0934815ad8", "control-id": "cis_rhel10_1-8.4", "description": "No notes for control-id 1.8.4.", "props": [ @@ -7080,7 +7080,7 @@ ] }, { - "uuid": "e13cba1a-48c3-456b-a0fa-a9ee78487ca0", + "uuid": "b4ab63a9-f14c-47b4-bf89-77fd537376d4", "control-id": "cis_rhel10_1-8.6", "description": "No notes for control-id 1.8.6.", "props": [ @@ -7097,7 +7097,7 @@ ] }, { - "uuid": "69b8ac34-1763-49bb-aaf9-3d2ce021cafd", + "uuid": "979b5069-585e-4b89-9e30-8f997ae5df83", "control-id": "cis_rhel10_2-1.1", "description": "No notes for control-id 2.1.1.", "props": [ @@ -7114,7 +7114,7 @@ ] }, { - "uuid": "36b18fa3-bd91-437b-b3da-42a28bebaa66", + "uuid": "47f0692f-c44d-4c03-b531-393118b793e5", "control-id": "cis_rhel10_2-1.2", "description": "No notes for control-id 2.1.2.", "props": [ @@ -7131,7 +7131,7 @@ ] }, { - "uuid": "bde0482f-565a-4ff9-84dd-470a1fff0709", + "uuid": "0353592b-6af9-4cf3-abcb-30ee493dc9f3", "control-id": "cis_rhel10_2-1.3", "description": "No notes for control-id 2.1.3.", "props": [ @@ -7148,7 +7148,7 @@ ] }, { - "uuid": "f3c95c14-edac-488d-9fb0-ea1d1e2b2ea2", + "uuid": "53b7baf6-34a6-4b9d-a447-352099635755", "control-id": "cis_rhel10_2-2.2", "description": "No notes for control-id 2.2.2.", "props": [ @@ -7165,7 +7165,7 @@ ] }, { - "uuid": "6823a545-01ee-4a36-85a3-356761495dfd", + "uuid": "d7765f65-4c9d-4ec3-972e-745a1652f166", "control-id": "cis_rhel10_3-1.3", "description": "No notes for control-id 3.1.3.", "props": [ @@ -7182,7 +7182,7 @@ ] }, { - "uuid": "fd4ce144-08be-4214-9bd1-0e4322a10fb3", + "uuid": "b4517dba-3486-44b0-960b-afc67e5eae33", "control-id": "cis_rhel10_5-2.4", "description": "No notes for control-id 5.2.4.", "props": [ @@ -7199,7 +7199,7 @@ ] }, { - "uuid": "844cac4f-eb80-4ff9-8f2b-41f0a65033fc", + "uuid": "28dd438d-ccec-4ecc-87f1-89c8133686a7", "control-id": "cis_rhel10_5-3.2.1.3", "description": "No notes for control-id 5.3.2.1.3.", "props": [ @@ -7216,7 +7216,7 @@ ] }, { - "uuid": "86a91c7f-3f66-4cf5-a456-201747dbeeef", + "uuid": "b4765a7e-b45b-4d61-a66c-a207267ddd99", "control-id": "cis_rhel10_5-4.1.2", "description": "No notes for control-id 5.4.1.2.", "props": [ @@ -7238,7 +7238,7 @@ ] }, { - "uuid": "080016ba-6c5e-4e3e-a1d8-05bbc74b35d6", + "uuid": "0424540b-c5e5-4fd2-835c-d4324f3f1d31", "control-id": "cis_rhel10_5-4.3.1", "description": "No notes for control-id 5.4.3.1.", "props": [ @@ -7255,7 +7255,7 @@ ] }, { - "uuid": "462f2092-ecef-4cfd-a7f1-864b0eeb58ba", + "uuid": "7e4be050-8798-4b8a-bf5c-e1f67b56a3ff", "control-id": "cis_rhel10_6-3.1.1", "description": "No notes for control-id 6.3.1.1.", "props": [ @@ -7277,7 +7277,7 @@ ] }, { - "uuid": "65394589-9e33-4687-a70c-ddc22bf1708e", + "uuid": "c530d3d9-fe0f-406a-a48b-2082036a275d", "control-id": "cis_rhel10_6-3.1.2", "description": "No notes for control-id 6.3.1.2.", "props": [ @@ -7294,7 +7294,7 @@ ] }, { - "uuid": "79a8d195-a20b-47d1-bc0f-58c02a6f671d", + "uuid": "7d2b075c-adf0-431c-ae27-63f0e9e1d82a", "control-id": "cis_rhel10_6-3.1.3", "description": "No notes for control-id 6.3.1.3.", "props": [ @@ -7311,7 +7311,7 @@ ] }, { - "uuid": "06149568-76ae-4edb-ab2e-9a0bcb891898", + "uuid": "3c23b24b-18a2-45e6-9da0-f0273bfcabed", "control-id": "cis_rhel10_6-3.1.4", "description": "No notes for control-id 6.3.1.4.", "props": [ @@ -7328,7 +7328,7 @@ ] }, { - "uuid": "6404108b-ff29-4f77-9224-d0bf51869482", + "uuid": "be143a2a-a256-4052-a8bd-c602c9353489", "control-id": "cis_rhel10_6-3.2.1", "description": "No notes for control-id 6.3.2.1.", "props": [ @@ -7345,7 +7345,7 @@ ] }, { - "uuid": "6f164048-c4dd-4083-8efd-2f9875533f60", + "uuid": "7f7500ef-47d7-40cc-891e-400137cdaaba", "control-id": "cis_rhel10_6-3.2.2", "description": "No notes for control-id 6.3.2.2.", "props": [ @@ -7362,7 +7362,7 @@ ] }, { - "uuid": "7aa6fb10-e7f0-4524-bbb8-3e732ebf2229", + "uuid": "71cdb9c2-8dc4-4726-ab9e-5ddbd296ca41", "control-id": "cis_rhel10_6-3.2.3", "description": "No notes for control-id 6.3.2.3.", "props": [ @@ -7384,7 +7384,7 @@ ] }, { - "uuid": "b2a02688-bddf-44c7-9606-0423e27b0ff0", + "uuid": "3c31cf22-533c-4207-8090-3763b336bb0b", "control-id": "cis_rhel10_6-3.2.4", "description": "No notes for control-id 6.3.2.4.", "props": [ @@ -7406,7 +7406,7 @@ ] }, { - "uuid": "75dc7dab-5d88-44a2-988e-5eda5242d284", + "uuid": "5ac0efb6-9b3a-487e-b89f-8d1da284a988", "control-id": "cis_rhel10_6-3.3.1", "description": "No notes for control-id 6.3.3.1.", "props": [ @@ -7423,7 +7423,7 @@ ] }, { - "uuid": "e7ee7890-e00b-45eb-b695-fe8de01e1b3b", + "uuid": "55ceb019-a74d-4b23-b53a-a702ffde953c", "control-id": "cis_rhel10_6-3.3.2", "description": "No notes for control-id 6.3.3.2.", "props": [ @@ -7440,7 +7440,7 @@ ] }, { - "uuid": "04aa7403-4a40-414d-bae1-8c67053631f4", + "uuid": "bf68c4e5-33d0-4a44-acec-498a8d7a0cff", "control-id": "cis_rhel10_6-3.3.3", "description": "No notes for control-id 6.3.3.3.", "props": [ @@ -7457,7 +7457,7 @@ ] }, { - "uuid": "4cbc427d-647c-4627-aa0b-9f016425a554", + "uuid": "6e9fdff1-5957-4910-94bd-c81b1ff8caca", "control-id": "cis_rhel10_6-3.3.4", "description": "No notes for control-id 6.3.3.4.", "props": [ @@ -7489,7 +7489,7 @@ ] }, { - "uuid": "1cefa896-4f10-4cb0-9b5f-3b8b3771c665", + "uuid": "6de39c7d-596d-46d8-a701-812f227e5860", "control-id": "cis_rhel10_6-3.3.5", "description": "No notes for control-id 6.3.3.5.", "props": [ @@ -7511,7 +7511,7 @@ ] }, { - "uuid": "d2d1952f-b454-4d62-a80d-2de805c8de23", + "uuid": "22930124-5efd-47e5-9563-432704824578", "control-id": "cis_rhel10_6-3.3.6", "description": "No notes for control-id 6.3.3.6.", "props": [ @@ -7533,7 +7533,7 @@ ] }, { - "uuid": "1fc826ba-2d53-44b9-a8d0-3de4724615f2", + "uuid": "ae60c4b3-6d69-40c5-9f66-3af943b131c6", "control-id": "cis_rhel10_6-3.3.7", "description": "No notes for control-id 6.3.3.7.", "props": [ @@ -7555,7 +7555,7 @@ ] }, { - "uuid": "b66a6a60-5833-4333-9fb4-0297aabcad30", + "uuid": "06947b17-4bb1-47de-81b1-e598b48d4227", "control-id": "cis_rhel10_6-3.3.8", "description": "No notes for control-id 6.3.3.8.", "props": [ @@ -7577,7 +7577,7 @@ ] }, { - "uuid": "fc065d65-c5dc-42e6-a58f-2cf3366bbb87", + "uuid": "79eb3a61-0066-49e5-9b6d-e8e7713fd76f", "control-id": "cis_rhel10_6-3.3.9", "description": "No notes for control-id 6.3.3.9.", "props": [ @@ -7594,7 +7594,7 @@ ] }, { - "uuid": "c745b8ac-c003-4785-a508-b959d6c293fb", + "uuid": "eb81edf7-8b98-4f3e-b747-c504df2e8664", "control-id": "cis_rhel10_6-3.3.10", "description": "No notes for control-id 6.3.3.10.", "props": [ @@ -7611,7 +7611,7 @@ ] }, { - "uuid": "bf987c36-4209-4455-a38c-ae98c90f2108", + "uuid": "87fc50c1-b0fb-449c-a5a8-dc9427400471", "control-id": "cis_rhel10_6-3.3.11", "description": "No notes for control-id 6.3.3.11.", "props": [ @@ -7648,7 +7648,7 @@ ] }, { - "uuid": "386a548a-2619-4aff-8a22-78e9b1c41795", + "uuid": "f6eccb4e-2584-4ba5-8a36-353377080299", "control-id": "cis_rhel10_6-3.3.12", "description": "No notes for control-id 6.3.3.12.", "props": [ @@ -7665,7 +7665,7 @@ ] }, { - "uuid": "ae809a72-7e75-44ac-9c96-376c58c0bbd5", + "uuid": "1e819c12-723e-423b-86f4-8426f06161fe", "control-id": "cis_rhel10_6-3.3.13", "description": "No notes for control-id 6.3.3.13.", "props": [ @@ -7682,7 +7682,7 @@ ] }, { - "uuid": "600e4237-9429-4ff1-acf1-2661f741acc9", + "uuid": "d9b294dd-b6b9-46b4-88cf-f4ff9f0a5b55", "control-id": "cis_rhel10_6-3.3.14", "description": "No notes for control-id 6.3.3.14.", "props": [ @@ -7704,7 +7704,7 @@ ] }, { - "uuid": "3ecf861a-c555-466f-be55-c83d3ab9121d", + "uuid": "1c8b9752-c691-42ff-8a47-d3229a20d3f0", "control-id": "cis_rhel10_6-3.3.15", "description": "No notes for control-id 6.3.3.15.", "props": [ @@ -7721,7 +7721,7 @@ ] }, { - "uuid": "41679833-b64b-4d6e-996c-bbf344964321", + "uuid": "f9373c88-5e4b-4f9f-bd07-945735007bed", "control-id": "cis_rhel10_6-3.3.16", "description": "No notes for control-id 6.3.3.16.", "props": [ @@ -7738,7 +7738,7 @@ ] }, { - "uuid": "b8fcb021-afc3-44ae-87b3-1b43971ac644", + "uuid": "fc12210e-6b82-487a-96fe-735e80b65cc6", "control-id": "cis_rhel10_6-3.3.17", "description": "No notes for control-id 6.3.3.17.", "props": [ @@ -7760,7 +7760,7 @@ ] }, { - "uuid": "606b4a00-4531-4579-b73c-d794ea276fd9", + "uuid": "19b9decb-843c-4bd4-b931-cea232a9275a", "control-id": "cis_rhel10_6-3.3.18", "description": "No notes for control-id 6.3.3.18.", "props": [ @@ -7792,7 +7792,7 @@ ] }, { - "uuid": "3af6c26b-dc8c-47eb-b0f6-b71ac4f2eafc", + "uuid": "ebb12f8b-415b-4691-85da-6516ec62a21a", "control-id": "cis_rhel10_6-3.3.19", "description": "No notes for control-id 6.3.3.19.", "props": [ @@ -7824,7 +7824,7 @@ ] }, { - "uuid": "016b8c6d-1ffe-4941-a978-63db1147b559", + "uuid": "02a4e94c-094d-40d8-9b1c-643f9fdb063b", "control-id": "cis_rhel10_6-3.3.20", "description": "No notes for control-id 6.3.3.20.", "props": [ @@ -7866,7 +7866,7 @@ ] }, { - "uuid": "0949544c-1aa6-4c55-b92e-f166e1a78674", + "uuid": "896d2f39-3fe2-44b5-ab12-6321db561733", "control-id": "cis_rhel10_6-3.3.21", "description": "No notes for control-id 6.3.3.21.", "props": [ @@ -7883,7 +7883,7 @@ ] }, { - "uuid": "454cb590-992e-4801-8d2c-0c1248b02f05", + "uuid": "272da763-dc37-4b2b-9b04-08fc91fa19ce", "control-id": "cis_rhel10_6-3.3.22", "description": "No notes for control-id 6.3.3.22.", "props": [ @@ -7910,7 +7910,7 @@ ] }, { - "uuid": "4077c889-913f-4829-a955-a4fbf8815f6e", + "uuid": "1d1abc33-c9fe-498a-8081-beb37574df76", "control-id": "cis_rhel10_6-3.3.23", "description": "No notes for control-id 6.3.3.23.", "props": [ @@ -7932,7 +7932,7 @@ ] }, { - "uuid": "4d01138e-f91b-4ea8-bc01-2b7daab130c4", + "uuid": "2d382034-2f0f-42fe-97ad-03fc87a60c91", "control-id": "cis_rhel10_6-3.3.24", "description": "No notes for control-id 6.3.3.24.", "props": [ @@ -7954,7 +7954,7 @@ ] }, { - "uuid": "983f8b0b-3316-46e1-b30a-8fc2228ccb19", + "uuid": "40aca1ce-18be-4dca-92ad-b808af9fec02", "control-id": "cis_rhel10_6-3.3.25", "description": "No notes for control-id 6.3.3.25.", "props": [ @@ -7981,7 +7981,7 @@ ] }, { - "uuid": "23d525e5-f085-4d4d-a673-ca94bc672665", + "uuid": "d98aa571-0b4d-492a-80cc-ea3a65c3e22c", "control-id": "cis_rhel10_6-3.3.26", "description": "No notes for control-id 6.3.3.26.", "props": [ @@ -8003,7 +8003,7 @@ ] }, { - "uuid": "5b5901e5-4423-4c73-a947-fa83c75f9948", + "uuid": "b8e051cb-d15d-465e-b9a4-3b89f4a873d5", "control-id": "cis_rhel10_6-3.3.27", "description": "No notes for control-id 6.3.3.27.", "props": [ @@ -8020,7 +8020,7 @@ ] }, { - "uuid": "c3d26f7a-1630-44de-a53e-83adede5d5bf", + "uuid": "c4aff37c-ddc2-48b6-a9a5-0afea62b54dc", "control-id": "cis_rhel10_6-3.3.28", "description": "No notes for control-id 6.3.3.28.", "props": [ @@ -8037,7 +8037,7 @@ ] }, { - "uuid": "e9a5c29c-502e-42d1-9753-59775c75cdec", + "uuid": "294dfc31-1b6a-46a2-ba7f-b861f5bf88d5", "control-id": "cis_rhel10_6-3.3.29", "description": "No notes for control-id 6.3.3.29.", "props": [ @@ -8054,7 +8054,7 @@ ] }, { - "uuid": "d383c4aa-1997-440e-b285-ceac8af0ced8", + "uuid": "0bd817c8-ddb6-4371-9cca-1880cdc26908", "control-id": "cis_rhel10_6-3.3.30", "description": "No notes for control-id 6.3.3.30.", "props": [ @@ -8071,7 +8071,7 @@ ] }, { - "uuid": "dd1ffadc-ad95-4883-8bed-fbeb78bb871c", + "uuid": "2e45e262-7b9b-4a7b-8347-3ffd52860d34", "control-id": "cis_rhel10_6-3.3.31", "description": "No notes for control-id 6.3.3.31.", "props": [ @@ -8088,7 +8088,7 @@ ] }, { - "uuid": "27906cbd-a29e-43ee-9e66-d52b4a66b332", + "uuid": "976d3b3a-a5d7-4588-8923-d7dcabc117da", "control-id": "cis_rhel10_6-3.3.32", "description": "No notes for control-id 6.3.3.32.", "props": [ @@ -8110,7 +8110,7 @@ ] }, { - "uuid": "71d016c1-a6d4-48b3-b5ef-3ef1b677e58b", + "uuid": "0ffbbcac-84a2-4641-92fc-0f7ec5e32bdc", "control-id": "cis_rhel10_6-3.3.33", "description": "No notes for control-id 6.3.3.33.", "props": [ @@ -8127,7 +8127,7 @@ ] }, { - "uuid": "4ab4132b-0fc4-4e66-b0a1-3b8b8b5acadd", + "uuid": "ec6fd14d-93ec-4e47-be0a-1370c4eb7f54", "control-id": "cis_rhel10_6-3.3.34", "description": "No notes for control-id 6.3.3.34.", "props": [ @@ -8144,7 +8144,7 @@ ] }, { - "uuid": "307f471a-de93-405e-957c-5e641f3058c8", + "uuid": "b57ad6db-52ed-40af-bbf8-067a73bcd7a5", "control-id": "cis_rhel10_6-3.3.35", "description": "No notes for control-id 6.3.3.35.", "props": [ @@ -8161,7 +8161,7 @@ ] }, { - "uuid": "bc7eff4f-3f1d-460e-9d78-2b3b3c92ccd3", + "uuid": "9a07f77e-2b53-4f9a-9274-6190d763a0ef", "control-id": "cis_rhel10_6-3.3.36", "description": "No notes for control-id 6.3.3.36.", "props": [ @@ -8178,7 +8178,7 @@ ] }, { - "uuid": "55ff6a2e-8baa-4582-a117-e27ef6e0c6c7", + "uuid": "a27cf630-866f-4911-a94f-36df562a10cb", "control-id": "cis_rhel10_6-3.3.37", "description": "The description for control-id cis_rhel10_6-3.3.37.", "props": [ @@ -8191,7 +8191,7 @@ ] }, { - "uuid": "f9326180-ea10-42b8-afb9-3226b023e317", + "uuid": "01cceae9-4018-4bfd-82d3-bd078f8036eb", "control-id": "cis_rhel10_6-3.4.1", "description": "No notes for control-id 6.3.4.1.", "props": [ @@ -8208,7 +8208,7 @@ ] }, { - "uuid": "620c4ad4-51fa-4184-a702-3e2079a58b38", + "uuid": "8c2402fe-8919-4112-89e0-a1ae6b2c615a", "control-id": "cis_rhel10_6-3.4.2", "description": "No notes for control-id 6.3.4.2.", "props": [ @@ -8225,7 +8225,7 @@ ] }, { - "uuid": "49e1a1c9-bb9d-41ad-ad0a-b2771638d90e", + "uuid": "18dc1123-a7aa-4cf6-887c-988392fc5635", "control-id": "cis_rhel10_6-3.4.3", "description": "No notes for control-id 6.3.4.3.", "props": [ @@ -8242,7 +8242,7 @@ ] }, { - "uuid": "17efae5f-08c1-42b8-a561-bc1451e882a5", + "uuid": "f236c545-8a8f-48d4-a39b-13d6126f9467", "control-id": "cis_rhel10_6-3.4.4", "description": "No notes for control-id 6.3.4.4.", "props": [ @@ -8259,7 +8259,7 @@ ] }, { - "uuid": "5f2b974b-c63b-4176-94be-58f3b6c99670", + "uuid": "cae3736e-bfdf-4f35-ae94-8453ac125ae8", "control-id": "cis_rhel10_6-3.4.5", "description": "No notes for control-id 6.3.4.5.", "props": [ @@ -8276,7 +8276,7 @@ ] }, { - "uuid": "b48d4a16-7c0c-4033-bcca-5cb14f912fbb", + "uuid": "2ffcf79c-fdb2-41b5-bb94-4de1db07152a", "control-id": "cis_rhel10_6-3.4.6", "description": "No notes for control-id 6.3.4.6.", "props": [ @@ -8293,7 +8293,7 @@ ] }, { - "uuid": "280d0b61-e97b-43d3-9e67-4e70e20eaa29", + "uuid": "a80a2f13-4e0f-446f-b3fc-4edf638e6545", "control-id": "cis_rhel10_6-3.4.7", "description": "No notes for control-id 6.3.4.7.", "props": [ @@ -8310,7 +8310,7 @@ ] }, { - "uuid": "0ba4cafa-4430-4873-88e6-3841ac723def", + "uuid": "85e5c989-963b-4db5-ae99-b55761734356", "control-id": "cis_rhel10_6-3.4.8", "description": "No notes for control-id 6.3.4.8.", "props": [ @@ -8327,7 +8327,7 @@ ] }, { - "uuid": "eefb816b-f701-4be9-a7a8-a07cc7cf19ec", + "uuid": "9c11438d-9e9a-4714-be4c-5a58af7c9cf3", "control-id": "cis_rhel10_6-3.4.9", "description": "No notes for control-id 6.3.4.9.", "props": [ @@ -8344,7 +8344,7 @@ ] }, { - "uuid": "757c3ed5-bd40-4f8b-b0e0-31fd4a0dc55a", + "uuid": "a949cbd5-92d3-428d-93a0-f735cef3c93f", "control-id": "cis_rhel10_6-3.4.10", "description": "No notes for control-id 6.3.4.10.", "props": [ @@ -8361,7 +8361,7 @@ ] }, { - "uuid": "af7b7d8f-5ed2-48e8-b51a-7852aa5f7a1f", + "uuid": "62daf4c0-2b3e-44d7-84d4-331caa156479", "control-id": "reload_dconf_db", "description": "This is a helper rule to reload Dconf database correctly.", "props": [ @@ -8378,7 +8378,7 @@ ] }, { - "uuid": "2480dd48-9d09-4ae8-bbb9-798cbe0132c3", + "uuid": "572c9d89-ee42-4669-ae71-4ba2ebf8133d", "control-id": "cis_rhel10_1-1.1.1", "description": "No notes for control-id 1.1.1.1.", "props": [ @@ -8395,7 +8395,7 @@ ] }, { - "uuid": "afffbafe-9fdd-49e3-8a95-023ede86bd64", + "uuid": "bf94b1e0-090b-420b-b4ee-b0e2e525d901", "control-id": "cis_rhel10_1-1.1.2", "description": "No notes for control-id 1.1.1.2.", "props": [ @@ -8412,7 +8412,7 @@ ] }, { - "uuid": "7f09b83d-a05d-4e36-bbf5-49c8affd957d", + "uuid": "7c216b35-51bb-48e3-bd19-3459806d51af", "control-id": "cis_rhel10_1-1.1.3", "description": "No notes for control-id 1.1.1.3.", "props": [ @@ -8429,7 +8429,7 @@ ] }, { - "uuid": "f2e191e8-8264-46e7-be0d-f8f3c2c5b35d", + "uuid": "d5f20886-ae97-461b-94d8-af0bad28e38b", "control-id": "cis_rhel10_1-1.1.4", "description": "No notes for control-id 1.1.1.4.", "props": [ @@ -8446,7 +8446,7 @@ ] }, { - "uuid": "38fb8401-7408-48b2-94ee-b4c26c2b215b", + "uuid": "f70dcd47-f170-4b3b-8192-3fb4d79a00cc", "control-id": "cis_rhel10_1-1.1.5", "description": "No notes for control-id 1.1.1.5.", "props": [ @@ -8463,7 +8463,7 @@ ] }, { - "uuid": "344e430b-87c6-484c-bcfb-e0f34478b4d9", + "uuid": "f17adee2-eba1-41d2-89c9-d9286d15e432", "control-id": "cis_rhel10_1-1.1.11", "description": "The description for control-id cis_rhel10_1-1.1.11.", "props": [ @@ -8476,7 +8476,7 @@ ] }, { - "uuid": "d7edbcd1-b43d-4585-bbc5-205975ab37d8", + "uuid": "f8e0488e-dd67-48fb-8651-1cd9becc54d0", "control-id": "cis_rhel10_1-1.2.1.1", "description": "No notes for control-id 1.1.2.1.1.", "props": [ @@ -8493,7 +8493,7 @@ ] }, { - "uuid": "d43e4518-efe6-480a-a164-c5d4f1e0e9ff", + "uuid": "ed756735-7576-4558-875e-af873588b044", "control-id": "cis_rhel10_1-1.2.1.2", "description": "No notes for control-id 1.1.2.1.2.", "props": [ @@ -8510,7 +8510,7 @@ ] }, { - "uuid": "4b64934a-55a1-4ce5-bc2c-3567c35c19fa", + "uuid": "7dd48063-192b-427c-b222-49195d2ef825", "control-id": "cis_rhel10_1-1.2.1.3", "description": "No notes for control-id 1.1.2.1.3.", "props": [ @@ -8527,7 +8527,7 @@ ] }, { - "uuid": "da872c54-59e9-4eca-b18b-b702f5d9c9d0", + "uuid": "1bb772ff-4344-4030-a2f7-823140e93063", "control-id": "cis_rhel10_1-1.2.1.4", "description": "No notes for control-id 1.1.2.1.4.", "props": [ @@ -8544,7 +8544,7 @@ ] }, { - "uuid": "80f4d794-c5c6-438e-85a4-217e573ac386", + "uuid": "5dd8d9b5-7eb7-440b-9532-0345934e016b", "control-id": "cis_rhel10_1-1.2.2.1", "description": "No notes for control-id 1.1.2.2.1.", "props": [ @@ -8561,7 +8561,7 @@ ] }, { - "uuid": "fadf0e85-4120-48fe-b832-21eeb369fd50", + "uuid": "399ae027-171f-4955-a9ab-b826d1aec7b7", "control-id": "cis_rhel10_1-1.2.2.2", "description": "No notes for control-id 1.1.2.2.2.", "props": [ @@ -8578,7 +8578,7 @@ ] }, { - "uuid": "9d41054f-31db-4fe4-9b7d-a5f32377ef87", + "uuid": "a09ae928-b08a-4cde-b3a8-ff5a92077634", "control-id": "cis_rhel10_1-1.2.2.3", "description": "No notes for control-id 1.1.2.2.3.", "props": [ @@ -8595,7 +8595,7 @@ ] }, { - "uuid": "6a84d067-6c05-438a-93d0-f170f8eb616c", + "uuid": "5ec226b5-fefa-4fd1-af4a-2be03570ce7c", "control-id": "cis_rhel10_1-1.2.2.4", "description": "No notes for control-id 1.1.2.2.4.", "props": [ @@ -8612,7 +8612,7 @@ ] }, { - "uuid": "1a284e25-91af-4995-8d8e-7f8f1917c7f2", + "uuid": "4fa357a5-9fae-4c5d-b17a-83aafe702c33", "control-id": "cis_rhel10_1-1.2.3.2", "description": "No notes for control-id 1.1.2.3.2.", "props": [ @@ -8629,7 +8629,7 @@ ] }, { - "uuid": "55f1d433-685a-4797-bc44-60576c695617", + "uuid": "6f2d7612-995f-461b-90af-836aee47c2af", "control-id": "cis_rhel10_1-1.2.3.3", "description": "No notes for control-id 1.1.2.3.3.", "props": [ @@ -8646,7 +8646,7 @@ ] }, { - "uuid": "54a2282e-82dc-46f1-b6c0-b8b9647e8c2d", + "uuid": "1ae543ca-5c1c-42c2-be48-3914202cff96", "control-id": "cis_rhel10_1-1.2.4.2", "description": "No notes for control-id 1.1.2.4.2.", "props": [ @@ -8663,7 +8663,7 @@ ] }, { - "uuid": "12628204-a063-4020-9d7d-0a8e570184ea", + "uuid": "46188c4c-2091-4cda-ae11-ac3d7fd36647", "control-id": "cis_rhel10_1-1.2.4.3", "description": "No notes for control-id 1.1.2.4.3.", "props": [ @@ -8680,7 +8680,7 @@ ] }, { - "uuid": "1f382f82-5f08-46c5-af56-c6c7b94f11bb", + "uuid": "ef68aced-3702-4a7e-a454-bd4a09aca910", "control-id": "cis_rhel10_1-1.2.5.2", "description": "No notes for control-id 1.1.2.5.2.", "props": [ @@ -8697,7 +8697,7 @@ ] }, { - "uuid": "c921b663-7dfc-4ac1-95f9-e2061634f004", + "uuid": "92714762-f9fa-442a-ba7e-2d382fc4dcd3", "control-id": "cis_rhel10_1-1.2.5.3", "description": "No notes for control-id 1.1.2.5.3.", "props": [ @@ -8714,7 +8714,7 @@ ] }, { - "uuid": "f5f489a0-e72d-4246-8927-398c06b9a616", + "uuid": "54d24b9c-123c-4cee-adb1-ec8d12c92d8a", "control-id": "cis_rhel10_1-1.2.5.4", "description": "No notes for control-id 1.1.2.5.4.", "props": [ @@ -8731,7 +8731,7 @@ ] }, { - "uuid": "8de33599-794d-4fbd-bf0a-1653d2e1ab2f", + "uuid": "9c97061a-6f62-4aa6-a788-519ae11bed5a", "control-id": "cis_rhel10_1-1.2.6.2", "description": "No notes for control-id 1.1.2.6.2.", "props": [ @@ -8748,7 +8748,7 @@ ] }, { - "uuid": "e214b927-2cdf-4e34-9ab9-3c0bb19ecb7e", + "uuid": "41c77a31-7821-4cdd-8953-ec20c4ff9224", "control-id": "cis_rhel10_1-1.2.6.3", "description": "No notes for control-id 1.1.2.6.3.", "props": [ @@ -8765,7 +8765,7 @@ ] }, { - "uuid": "13a9e059-6fa0-477d-83a7-3ba08b991a96", + "uuid": "fe661a16-9b15-465f-bf14-0a7a84e5b5c2", "control-id": "cis_rhel10_1-1.2.6.4", "description": "No notes for control-id 1.1.2.6.4.", "props": [ @@ -8782,7 +8782,7 @@ ] }, { - "uuid": "490637e4-22fe-4770-a7ae-fb459a9be2de", + "uuid": "1898e1b7-c0b1-489a-b57f-ec85896d47be", "control-id": "cis_rhel10_1-1.2.7.2", "description": "No notes for control-id 1.1.2.7.2.", "props": [ @@ -8799,7 +8799,7 @@ ] }, { - "uuid": "7778b936-950e-4a3e-83a4-4a79f85cc5d4", + "uuid": "84fb9520-b7e3-40c8-8dcc-c902933a3135", "control-id": "cis_rhel10_1-1.2.7.3", "description": "No notes for control-id 1.1.2.7.3.", "props": [ @@ -8816,7 +8816,7 @@ ] }, { - "uuid": "8fcebd0c-be7b-4161-a9fe-606b13ddae01", + "uuid": "39dc5e52-b222-4165-a21c-700ddda2f956", "control-id": "cis_rhel10_1-1.2.7.4", "description": "No notes for control-id 1.1.2.7.4.", "props": [ @@ -8833,7 +8833,7 @@ ] }, { - "uuid": "859df09f-e5a8-49e7-a6da-50825cf077b9", + "uuid": "835d7754-75b0-4d37-8bd7-938f56ca156e", "control-id": "cis_rhel10_1-2.1.1", "description": "The description for control-id cis_rhel10_1-2.1.1.", "props": [ @@ -8846,7 +8846,7 @@ ] }, { - "uuid": "70e045e4-1dc7-41c4-a6c5-e4029f444098", + "uuid": "673ed186-2f8a-4388-b7f3-0fa14d0f9d1a", "control-id": "cis_rhel10_1-2.1.2", "description": "No notes for control-id 1.2.1.2.", "props": [ @@ -8863,7 +8863,7 @@ ] }, { - "uuid": "e1f41f9d-ec2d-48ae-aa3c-3c13174ea4e4", + "uuid": "e9d7946a-2dd7-4bfe-a30f-ccd8ade090fe", "control-id": "cis_rhel10_1-2.1.4", "description": "The description for control-id cis_rhel10_1-2.1.4.", "props": [ @@ -8876,7 +8876,7 @@ ] }, { - "uuid": "fe569375-dec0-4316-b682-a1ff08cc9467", + "uuid": "306a8423-906b-483c-a459-55136b48bcb8", "control-id": "cis_rhel10_1-2.2.1", "description": "The description for control-id cis_rhel10_1-2.2.1.", "props": [ @@ -8889,7 +8889,7 @@ ] }, { - "uuid": "74fc16df-aaeb-4ade-a9d8-f1bf5fb36a39", + "uuid": "c666d69b-8368-4ca2-b192-80001e2c533a", "control-id": "cis_rhel10_1-3.1.1", "description": "No notes for control-id 1.3.1.1.", "props": [ @@ -8906,7 +8906,7 @@ ] }, { - "uuid": "47f7e30a-c54b-4069-a123-f6cc8e102072", + "uuid": "a0dc1d3c-79fd-4461-8d7b-efddbef6dc11", "control-id": "cis_rhel10_1-3.1.2", "description": "No notes for control-id 1.3.1.2.", "props": [ @@ -8923,7 +8923,7 @@ ] }, { - "uuid": "dc5b2b26-b264-4f23-a9bd-02d85a251a4e", + "uuid": "9ea78d8c-3c6a-4499-9778-a78b8dea3216", "control-id": "cis_rhel10_1-3.1.3", "description": "No notes for control-id 1.3.1.3.", "props": [ @@ -8940,7 +8940,7 @@ ] }, { - "uuid": "386d55b5-9fb8-4361-ad9e-d8b3541bb071", + "uuid": "95da6244-1610-4424-8718-f2bbe9799bdb", "control-id": "cis_rhel10_1-3.1.4", "description": "No notes for control-id 1.3.1.4.", "props": [ @@ -8957,7 +8957,7 @@ ] }, { - "uuid": "99901716-541d-4856-9c9b-f200a2fed32f", + "uuid": "8430cd44-ce26-49e2-80ac-5f54ee986963", "control-id": "cis_rhel10_1-3.1.7", "description": "No notes for control-id 1.3.1.7.", "props": [ @@ -8974,7 +8974,7 @@ ] }, { - "uuid": "b24112cc-d320-442d-9f8a-7b267abf1d36", + "uuid": "52b05cd0-cd8b-446a-8ddf-d17859ecffd2", "control-id": "cis_rhel10_1-4.1", "description": "There is no automated remediation for this rule and this is intentional.\nMore details in the rule description.", "props": [ @@ -8991,7 +8991,7 @@ ] }, { - "uuid": "2e388d0a-8b65-4f19-ab18-016c97ae9dd3", + "uuid": "a1ec6e68-59e3-4d8c-8963-39715869cf1d", "control-id": "cis_rhel10_1-4.2", "description": "This requirement demands a deeper review of the rules.", "props": [ @@ -9018,7 +9018,7 @@ ] }, { - "uuid": "dd1f542e-70ff-41b8-b7ce-2929a0bb2ff2", + "uuid": "201d3df0-a097-4f60-a958-614d8df1a9e8", "control-id": "cis_rhel10_1-5.1", "description": "No notes for control-id 1.5.1.", "props": [ @@ -9035,7 +9035,7 @@ ] }, { - "uuid": "c345b10a-c62b-4007-b3e1-b0aecda33f04", + "uuid": "fbaa4f40-d168-42f6-8619-39c37d82b171", "control-id": "cis_rhel10_1-5.2", "description": "No notes for control-id 1.5.2.", "props": [ @@ -9052,7 +9052,7 @@ ] }, { - "uuid": "c672e662-43ba-4a42-a903-f48a86739969", + "uuid": "290dbfbc-909c-443b-bbd4-346d9a90c642", "control-id": "cis_rhel10_1-5.4", "description": "No notes for control-id 1.5.4.", "props": [ @@ -9069,7 +9069,7 @@ ] }, { - "uuid": "5e41801f-d82b-46a2-aa8b-17ded3802cae", + "uuid": "059152ab-b403-4791-a3ab-60c769524099", "control-id": "cis_rhel10_1-5.5", "description": "No notes for control-id 1.5.5.", "props": [ @@ -9086,7 +9086,7 @@ ] }, { - "uuid": "23ca5b3a-78dc-4b0b-a289-84ae5f9ed288", + "uuid": "e008d879-e4fa-4ca6-9165-468965b33f9f", "control-id": "cis_rhel10_1-5.6", "description": "No notes for control-id 1.5.6.", "props": [ @@ -9103,7 +9103,7 @@ ] }, { - "uuid": "2afbcab6-18ef-4d6b-ada1-254ec236bc55", + "uuid": "9d88c915-88b6-4680-b852-82ada0ba6054", "control-id": "cis_rhel10_1-5.7", "description": "No notes for control-id 1.5.7.", "props": [ @@ -9120,7 +9120,7 @@ ] }, { - "uuid": "4c3d766a-3272-4d11-8441-e5f038ce7715", + "uuid": "0ed5188f-6268-46f1-bc8b-6bddc5794052", "control-id": "cis_rhel10_1-5.8", "description": "Address Space Layout Randomization (ASLR)", "props": [ @@ -9137,7 +9137,7 @@ ] }, { - "uuid": "698266f1-eb1d-42be-b8f1-9c8f08ddb0da", + "uuid": "4abbeeeb-a63e-4621-99d7-eb63cd4d31da", "control-id": "cis_rhel10_1-5.9", "description": "No notes for control-id 1.5.9.", "props": [ @@ -9154,7 +9154,7 @@ ] }, { - "uuid": "ceb9a350-d919-41bc-bc36-c177d6919061", + "uuid": "d421dd48-a6c4-44d4-9494-fefc22d87990", "control-id": "cis_rhel10_1-5.10", "description": "No notes for control-id 1.5.10.", "props": [ @@ -9171,7 +9171,7 @@ ] }, { - "uuid": "df61f5b7-ee35-4170-9f30-a65885d62ef2", + "uuid": "6edaabc5-89b5-4f10-a3ca-771fce9d5309", "control-id": "cis_rhel10_1-6.1", "description": "No notes for control-id 1.6.1.", "props": [ @@ -9188,7 +9188,7 @@ ] }, { - "uuid": "42457188-c0f5-4469-9c5e-ec3949e54468", + "uuid": "23f5a20e-d77a-43ba-8b91-98d5e98a12f3", "control-id": "cis_rhel10_1-6.2", "description": "No notes for control-id 1.6.2.", "props": [ @@ -9205,7 +9205,7 @@ ] }, { - "uuid": "1d99da9b-9a9d-4f61-b199-84c3155b9285", + "uuid": "d1ac3972-ad4f-4abb-b55e-d1990d33b1fb", "control-id": "cis_rhel10_1-6.3", "description": "No notes for control-id 1.6.3.", "props": [ @@ -9222,7 +9222,7 @@ ] }, { - "uuid": "bb9edfe3-82ab-4be2-8742-7dbfaa51b4c4", + "uuid": "627ead45-2fdb-410c-8d3d-496d278eac92", "control-id": "cis_rhel10_1-6.4", "description": "No notes for control-id 1.6.4.", "props": [ @@ -9239,7 +9239,7 @@ ] }, { - "uuid": "ef3b7eaf-cb55-430d-8800-993d7806223f", + "uuid": "0d6b586b-4568-4085-98a0-71a3e64cbeed", "control-id": "cis_rhel10_1-7.1", "description": "No notes for control-id 1.7.1.", "props": [ @@ -9256,7 +9256,7 @@ ] }, { - "uuid": "2735a1b0-3cbf-4c1c-8f60-d56a715dda8a", + "uuid": "bc2b011a-708a-435e-9666-b6eba3fa8700", "control-id": "cis_rhel10_1-7.2", "description": "No notes for control-id 1.7.2.", "props": [ @@ -9273,7 +9273,7 @@ ] }, { - "uuid": "5a737ecf-dd74-43ac-8d30-d8b3f5e50f9f", + "uuid": "76f79552-6843-46ad-bc8b-1ec406763265", "control-id": "cis_rhel10_1-7.3", "description": "No notes for control-id 1.7.3.", "props": [ @@ -9290,7 +9290,7 @@ ] }, { - "uuid": "a0a7e176-595f-4a61-9f3c-36944a7d38b0", + "uuid": "10468a4f-4673-4364-85fc-bc007d945c58", "control-id": "cis_rhel10_1-7.4", "description": "No notes for control-id 1.7.4.", "props": [ @@ -9317,7 +9317,7 @@ ] }, { - "uuid": "c707f2a3-2ad5-4013-9c9f-90354ea39aa1", + "uuid": "7d0dd6f8-ecc1-4728-8438-74f92220328c", "control-id": "cis_rhel10_1-7.5", "description": "No notes for control-id 1.7.5.", "props": [ @@ -9344,7 +9344,7 @@ ] }, { - "uuid": "f83fbf37-b24f-4e2d-85e0-db339c3d3e6d", + "uuid": "0005ab24-9fae-4414-afab-13eb2a304e27", "control-id": "cis_rhel10_1-7.6", "description": "No notes for control-id 1.7.6.", "props": [ @@ -9371,7 +9371,7 @@ ] }, { - "uuid": "7b748fb7-89ca-4b07-bc47-140cfefa3427", + "uuid": "15e5810b-3016-4aaf-8b15-2c9819a979a8", "control-id": "cis_rhel10_1-8.1", "description": "No notes for control-id 1.8.1.", "props": [ @@ -9393,7 +9393,7 @@ ] }, { - "uuid": "983e498a-aef7-4044-a060-a1f239d786c5", + "uuid": "5cda20f5-6447-484c-a61f-88ee469065e1", "control-id": "cis_rhel10_1-8.2", "description": "No notes for control-id 1.8.2.", "props": [ @@ -9410,7 +9410,7 @@ ] }, { - "uuid": "b5e78c22-ff97-4cf4-a57e-f3d24045d4e5", + "uuid": "b3e37b44-6bfb-4799-bf3c-8bfd06b4f787", "control-id": "cis_rhel10_1-8.3", "description": "No notes for control-id 1.8.3.", "props": [ @@ -9442,7 +9442,7 @@ ] }, { - "uuid": "33a543a2-8b24-4ae2-bd21-03c1f884bdc9", + "uuid": "45c572e9-9576-4e99-9dde-f361c0ea9d4b", "control-id": "cis_rhel10_1-8.5", "description": "No notes for control-id 1.8.5.", "props": [ @@ -9459,7 +9459,7 @@ ] }, { - "uuid": "1b67be20-6ec2-4de4-8a9e-ac1d4e624284", + "uuid": "8dbc4a18-de0f-461b-b0d5-35ffed7f8bf6", "control-id": "cis_rhel10_2-1.4", "description": "No notes for control-id 2.1.4.", "props": [ @@ -9476,7 +9476,7 @@ ] }, { - "uuid": "4191c52a-0389-41de-8dce-5fac959f814c", + "uuid": "71538235-e66a-4398-9dcc-6b7d4c4a7874", "control-id": "cis_rhel10_2-1.5", "description": "No notes for control-id 2.1.5.", "props": [ @@ -9493,7 +9493,7 @@ ] }, { - "uuid": "a94581ce-12b3-4182-9bb3-98f0fec347f6", + "uuid": "218968c3-03d9-471f-bcce-363ba47facdb", "control-id": "cis_rhel10_2-1.6", "description": "No notes for control-id 2.1.6.", "props": [ @@ -9510,7 +9510,7 @@ ] }, { - "uuid": "1b5dd828-2787-4d96-bbc0-71b83a4099cb", + "uuid": "d23665f8-b32b-4746-ad03-8f6b7a3f223f", "control-id": "cis_rhel10_2-1.7", "description": "No notes for control-id 2.1.7.", "props": [ @@ -9527,7 +9527,7 @@ ] }, { - "uuid": "a41a6682-4397-4c65-873f-30a05c4f13b6", + "uuid": "4239855a-04eb-4f18-b43f-5bbf3439a981", "control-id": "cis_rhel10_2-1.8", "description": "No notes for control-id 2.1.8.", "props": [ @@ -9549,7 +9549,7 @@ ] }, { - "uuid": "01064869-c2bc-420a-9957-657d00f9ad7a", + "uuid": "b6f1cb88-c371-4a8b-9737-14918e1dd20e", "control-id": "cis_rhel10_2-1.9", "description": "Many of the libvirt packages used by Enterprise Linux virtualization are dependent on the\nnfs-utils package.", "props": [ @@ -9566,7 +9566,7 @@ ] }, { - "uuid": "5cbf26bd-de65-45fb-be13-b03e6316f06c", + "uuid": "3c49a46f-1c9c-478e-a3d5-cf7d32b049f3", "control-id": "cis_rhel10_2-1.11", "description": "Many of the libvirt packages used by Enterprise Linux virtualization, and the nfs-utils\npackage used for The Network File System (NFS), are dependent on the rpcbind package.", "props": [ @@ -9583,7 +9583,7 @@ ] }, { - "uuid": "5f5d4442-cad0-45f0-99c9-7d68b37f18c4", + "uuid": "11238bb7-6208-41f5-afff-ac7190854d3b", "control-id": "cis_rhel10_2-1.12", "description": "No notes for control-id 2.1.12.", "props": [ @@ -9600,7 +9600,7 @@ ] }, { - "uuid": "9bd43fea-f878-412f-8734-f5a311c5345b", + "uuid": "d775e034-af85-4708-8e3d-188bcfce4b50", "control-id": "cis_rhel10_2-1.13", "description": "No notes for control-id 2.1.13.", "props": [ @@ -9617,7 +9617,7 @@ ] }, { - "uuid": "2ecdef8f-bc32-4add-8cf4-17f860eea7c7", + "uuid": "4f3a2e47-e33a-4c49-b157-68a919be7d33", "control-id": "cis_rhel10_2-1.14", "description": "No notes for control-id 2.1.14.", "props": [ @@ -9634,7 +9634,7 @@ ] }, { - "uuid": "0799c95e-a023-4abf-9e64-0afac596759b", + "uuid": "7b5a6e3f-e092-4081-b0d7-878e35f4a8a5", "control-id": "cis_rhel10_2-1.15", "description": "No notes for control-id 2.1.15.", "props": [ @@ -9651,7 +9651,7 @@ ] }, { - "uuid": "974e86aa-2c66-4fcd-9ada-284a3bdca9d4", + "uuid": "8c855146-93db-46be-ae11-ae073c00b62d", "control-id": "cis_rhel10_2-1.16", "description": "No notes for control-id 2.1.16.", "props": [ @@ -9668,7 +9668,7 @@ ] }, { - "uuid": "c6d53f0c-291d-4a42-bb85-27e52277dd7c", + "uuid": "8539e11b-c344-4262-bdb3-e7a386f55eb0", "control-id": "cis_rhel10_2-1.17", "description": "No notes for control-id 2.1.17.", "props": [ @@ -9685,7 +9685,7 @@ ] }, { - "uuid": "354b300e-3982-43bf-8676-6c8e8df46652", + "uuid": "1e555669-1734-4b54-a842-2223c2252bbc", "control-id": "cis_rhel10_2-1.18", "description": "No notes for control-id 2.1.18.", "props": [ @@ -9707,7 +9707,7 @@ ] }, { - "uuid": "a0480bc6-c4b1-4cd2-9ac9-e0664662c354", + "uuid": "f3c09d64-e185-4599-8938-25cd4eeec557", "control-id": "cis_rhel10_2-1.21", "description": "No notes for control-id 2.1.21.", "props": [ @@ -9729,7 +9729,7 @@ ] }, { - "uuid": "bd66dcf9-10cd-4bdf-b483-a3a37eb773bd", + "uuid": "ec095925-e917-47a8-98dc-569a4ee3715f", "control-id": "cis_rhel10_2-1.22", "description": "The description for control-id cis_rhel10_2-1.22.", "props": [ @@ -9742,7 +9742,7 @@ ] }, { - "uuid": "3bb334b5-7bff-4bf8-9e72-e4a8da818ef3", + "uuid": "fe89c3f2-c69c-4c38-a2ec-dfe3a1a2ad07", "control-id": "cis_rhel10_2-2.1", "description": "No notes for control-id 2.2.1.", "props": [ @@ -9759,7 +9759,7 @@ ] }, { - "uuid": "6f9ae313-3670-43a9-81fc-76f47f840dad", + "uuid": "89485b86-10c9-4d8f-980f-584be90e7336", "control-id": "cis_rhel10_2-2.3", "description": "No notes for control-id 2.2.3.", "props": [ @@ -9776,7 +9776,7 @@ ] }, { - "uuid": "8d322a7c-86cf-4760-aeea-ed180cfe6757", + "uuid": "74a06aab-31cc-43bf-a450-c8e3f9321b21", "control-id": "cis_rhel10_2-2.4", "description": "No notes for control-id 2.2.4.", "props": [ @@ -9793,7 +9793,7 @@ ] }, { - "uuid": "aaed98ad-60b8-4629-aff5-41e36fad1e08", + "uuid": "07c5af48-29de-4380-b9b9-77dca4873237", "control-id": "cis_rhel10_2-3.1", "description": "No notes for control-id 2.3.1.", "props": [ @@ -9805,7 +9805,7 @@ ] }, { - "uuid": "aa0b1e2b-526f-45d4-baee-b7ca350225f2", + "uuid": "2236a4ce-08a1-41a7-ac69-fc426b985e40", "control-id": "cis_rhel10_2-3.2", "description": "No notes for control-id 2.3.2.", "props": [ @@ -9822,7 +9822,7 @@ ] }, { - "uuid": "56dc51c2-f171-424f-979f-f8a2abdea0bb", + "uuid": "20bc03f0-37f5-4f72-afd0-96b481e2be5c", "control-id": "cis_rhel10_2-3.3", "description": "No notes for control-id 2.3.3.", "props": [ @@ -9839,7 +9839,7 @@ ] }, { - "uuid": "127ee5dd-504f-4174-9189-ca5e4917de4a", + "uuid": "db9cd74a-ef41-4237-b7b9-18cb72d0bad1", "control-id": "cis_rhel10_2-4.1.1", "description": "No notes for control-id 2.4.1.1.", "props": [ @@ -9861,7 +9861,7 @@ ] }, { - "uuid": "e5afe273-24da-47e1-a156-5b488fd08226", + "uuid": "aa8ab8c6-f475-4da7-925d-71e0b5c4cb04", "control-id": "cis_rhel10_2-4.1.2", "description": "No notes for control-id 2.4.1.2.", "props": [ @@ -9888,7 +9888,7 @@ ] }, { - "uuid": "60622171-ab96-4692-bf95-74f53f249089", + "uuid": "fb89b413-f375-44ac-a7f1-97a6906de3b5", "control-id": "cis_rhel10_2-4.1.3", "description": "No notes for control-id 2.4.1.3.", "props": [ @@ -9915,7 +9915,7 @@ ] }, { - "uuid": "0a900fdc-cf42-49db-8c70-16a43561340b", + "uuid": "7e36bceb-c067-4533-8d4b-44cf341ebca1", "control-id": "cis_rhel10_2-4.1.4", "description": "No notes for control-id 2.4.1.4.", "props": [ @@ -9942,7 +9942,7 @@ ] }, { - "uuid": "3f017ccf-48c7-479b-bda0-6b7a8f4a416d", + "uuid": "7b180dde-e762-49ab-ae02-d27bb3f31b59", "control-id": "cis_rhel10_2-4.1.5", "description": "No notes for control-id 2.4.1.5.", "props": [ @@ -9969,7 +9969,7 @@ ] }, { - "uuid": "ce67a59e-7438-4d84-a65c-c73be5014184", + "uuid": "422fc897-c5bf-4f13-a949-05a0a5c57535", "control-id": "cis_rhel10_2-4.1.6", "description": "No notes for control-id 2.4.1.6.", "props": [ @@ -9996,7 +9996,7 @@ ] }, { - "uuid": "2624a793-eb27-4995-837c-8f1bfc2481da", + "uuid": "e2008f48-24a7-4719-862d-3180cc1e7e49", "control-id": "cis_rhel10_2-4.1.7", "description": "No notes for control-id 2.4.1.7.", "props": [ @@ -10023,7 +10023,7 @@ ] }, { - "uuid": "a9c0fdfb-bf07-4695-88ed-c9021819181c", + "uuid": "13312704-524d-4ea7-88c8-a113a5104522", "control-id": "cis_rhel10_2-4.1.8", "description": "No notes for control-id 2.4.1.8.", "props": [ @@ -10050,7 +10050,7 @@ ] }, { - "uuid": "bc48967d-391b-4611-a4fc-40b850652a8a", + "uuid": "60bb4fdb-7e62-4c51-8f36-2b3e3cc281be", "control-id": "cis_rhel10_2-4.1.9", "description": "No notes for control-id 2.4.1.9.", "props": [ @@ -10087,7 +10087,7 @@ ] }, { - "uuid": "d8414852-73ed-4029-ab70-270eb0bef8fd", + "uuid": "2b9f9b26-9313-4505-a5c9-de3002110b76", "control-id": "cis_rhel10_2-4.2.1", "description": "No notes for control-id 2.4.2.1.", "props": [ @@ -10124,7 +10124,7 @@ ] }, { - "uuid": "dda899ab-d3fb-4785-90c2-b10596cf5803", + "uuid": "0c0c10f1-4b6e-41ed-b74c-7dc1985fe7a2", "control-id": "cis_rhel10_3-1.1", "description": "The description for control-id cis_rhel10_3-1.1.", "props": [ @@ -10137,7 +10137,7 @@ ] }, { - "uuid": "6bc9bf70-64df-49e4-a560-9aea7db958b2", + "uuid": "829595e1-0d39-43fd-9038-a8337dd54371", "control-id": "cis_rhel10_3-2.1", "description": "No notes for control-id 3.2.1.", "props": [ @@ -10154,7 +10154,7 @@ ] }, { - "uuid": "db06689e-0139-43db-84a5-b052395bb5c2", + "uuid": "541b5eda-410f-40dd-b25a-4cec3847633b", "control-id": "cis_rhel10_3-2.2", "description": "No notes for control-id 3.2.2.", "props": [ @@ -10171,7 +10171,7 @@ ] }, { - "uuid": "d15053fd-5d61-4e1b-838c-5cb67697f9b0", + "uuid": "41ed4b5a-49e7-4f11-ba17-655713d14c70", "control-id": "cis_rhel10_3-2.3", "description": "No notes for control-id 3.2.3.", "props": [ @@ -10188,7 +10188,7 @@ ] }, { - "uuid": "c8a67bef-061c-4c9b-a5dd-114d3b5b54d9", + "uuid": "4bc08ade-eb4c-49c9-bdf7-4e964c10b62f", "control-id": "cis_rhel10_3-2.4", "description": "No notes for control-id 3.2.4.", "props": [ @@ -10205,7 +10205,7 @@ ] }, { - "uuid": "72a37ccf-43fb-4798-bf32-67eef01c4b73", + "uuid": "37387845-1a6f-45f7-8fe5-a7e797e9f3ee", "control-id": "cis_rhel10_3-2.5", "description": "No notes for control-id 3.2.5.", "props": [ @@ -10222,7 +10222,7 @@ ] }, { - "uuid": "3244e515-49dc-438b-bfc1-b9800a145723", + "uuid": "49921f2d-a19d-44e0-b18c-6bb1ee56cb70", "control-id": "cis_rhel10_3-2.6", "description": "No notes for control-id 3.2.6.", "props": [ @@ -10239,7 +10239,7 @@ ] }, { - "uuid": "c26e2cfa-408f-4232-b870-a409f7d26736", + "uuid": "ad0e43c7-068a-4c17-9457-2778bacbcd79", "control-id": "cis_rhel10_3-3.1.1", "description": "No notes for control-id 3.3.1.1.", "props": [ @@ -10256,7 +10256,7 @@ ] }, { - "uuid": "d5d0541d-3f8c-4f2c-8cb8-6683fdc46eda", + "uuid": "24c94785-b92d-4772-a994-8fcb1ad15586", "control-id": "cis_rhel10_3-3.1.2", "description": "No notes for control-id 3.3.1.2.", "props": [ @@ -10273,7 +10273,7 @@ ] }, { - "uuid": "455c00cd-07e1-45c1-975e-f3ddabcfb1c3", + "uuid": "23fe63f2-485e-42ad-8808-53218cd5bf9e", "control-id": "cis_rhel10_3-3.1.3", "description": "No notes for control-id 3.3.1.3.", "props": [ @@ -10290,7 +10290,7 @@ ] }, { - "uuid": "0c2cf421-6c91-43d1-b21c-708d80b65b33", + "uuid": "5a9a44c5-9694-4989-b274-fc796bb3263e", "control-id": "cis_rhel10_3-3.1.4", "description": "No notes for control-id 3.3.1.4.", "props": [ @@ -10307,7 +10307,7 @@ ] }, { - "uuid": "100fb241-2642-4455-8852-e64cac97fb0a", + "uuid": "474587a8-41d8-436e-9353-fc8dfcebf4e1", "control-id": "cis_rhel10_3-3.1.5", "description": "No notes for control-id 3.3.1.5.", "props": [ @@ -10324,7 +10324,7 @@ ] }, { - "uuid": "1c92e356-73a0-4743-8753-ce0657690716", + "uuid": "aa33007c-f0b9-4824-950e-32427c2bca0f", "control-id": "cis_rhel10_3-3.1.6", "description": "No notes for control-id 3.3.1.6.", "props": [ @@ -10341,7 +10341,7 @@ ] }, { - "uuid": "dcc33b2f-9811-4897-905b-bb9b42f57dca", + "uuid": "4a5a809d-fde3-4a53-b62d-b2a07febec7b", "control-id": "cis_rhel10_3-3.1.7", "description": "No notes for control-id 3.3.1.7.", "props": [ @@ -10358,7 +10358,7 @@ ] }, { - "uuid": "0a8f0dd4-ee72-42ed-a921-ef4e886a8d4b", + "uuid": "354a9cae-7fdb-40ed-9ce4-e9242f04acf4", "control-id": "cis_rhel10_3-3.1.8", "description": "No notes for control-id 3.3.1.8.", "props": [ @@ -10375,7 +10375,7 @@ ] }, { - "uuid": "0f4f7a79-45d5-403f-bca7-07d114b1bf49", + "uuid": "1156adee-c1ac-4df2-a891-4b4b89e3e6a9", "control-id": "cis_rhel10_3-3.1.9", "description": "No notes for control-id 3.3.1.9.", "props": [ @@ -10392,7 +10392,7 @@ ] }, { - "uuid": "2a106ed1-523d-4c47-a02d-6ed7367c4075", + "uuid": "8baa088d-79be-443f-9099-5847f7d49877", "control-id": "cis_rhel10_3-3.1.10", "description": "No notes for control-id 3.3.1.10.", "props": [ @@ -10409,7 +10409,7 @@ ] }, { - "uuid": "3a6692a0-9c5d-4ea2-bad9-bc29d390a638", + "uuid": "798bbecd-dfce-41e4-a8a6-e8205deae670", "control-id": "cis_rhel10_3-3.1.11", "description": "No notes for control-id 3.3.1.11.", "props": [ @@ -10426,7 +10426,7 @@ ] }, { - "uuid": "abd02327-8c76-4fa0-b234-51755e0e7b8b", + "uuid": "bc1ce359-35e2-40ba-bd54-86bb42703684", "control-id": "cis_rhel10_3-3.1.12", "description": "No notes for control-id 3.3.1.12.", "props": [ @@ -10443,7 +10443,7 @@ ] }, { - "uuid": "cc98d830-a8ff-470b-8650-420044025822", + "uuid": "c91dc57c-4d5b-4d49-8d9b-5483f384bb2e", "control-id": "cis_rhel10_3-3.1.13", "description": "No notes for control-id 3.3.1.13.", "props": [ @@ -10460,7 +10460,7 @@ ] }, { - "uuid": "faf7629d-282c-41ea-b5b4-dc4b8ee8304f", + "uuid": "431c31d4-5df8-41ac-a486-61e1ff7782f4", "control-id": "cis_rhel10_3-3.1.14", "description": "No notes for control-id 3.3.1.14.", "props": [ @@ -10477,7 +10477,7 @@ ] }, { - "uuid": "8b2da97c-fcf9-4dff-b178-8315b77a404c", + "uuid": "3d9881f3-162b-4f84-b1ff-1d1aebe7223e", "control-id": "cis_rhel10_3-3.1.15", "description": "No notes for control-id 3.3.1.15.", "props": [ @@ -10494,7 +10494,7 @@ ] }, { - "uuid": "1d761cc0-6a4c-4e30-b085-6777466ea365", + "uuid": "54999dac-1c54-4c50-a92f-80f399075147", "control-id": "cis_rhel10_3-3.1.16", "description": "No notes for control-id 3.3.1.16.", "props": [ @@ -10511,7 +10511,7 @@ ] }, { - "uuid": "57ca0039-20b3-4225-a086-f46f76bacea3", + "uuid": "2ae2b57e-0a76-46ba-8848-54c3a472c8f8", "control-id": "cis_rhel10_3-3.1.17", "description": "No notes for control-id 3.3.1.17.", "props": [ @@ -10528,7 +10528,7 @@ ] }, { - "uuid": "7a7cc576-b81b-47a1-acc8-3ae73e2d4de9", + "uuid": "64d570a0-ab29-4cee-b211-777099f5f71f", "control-id": "cis_rhel10_3-3.1.18", "description": "No notes for control-id 3.3.1.18.", "props": [ @@ -10545,7 +10545,7 @@ ] }, { - "uuid": "c168b239-42d0-4e7c-ac06-0cdde7ab427b", + "uuid": "d9332884-1d32-42c2-887d-f04c17a2a112", "control-id": "cis_rhel10_3-3.2.1", "description": "No notes for control-id 3.3.2.1.", "props": [ @@ -10562,7 +10562,7 @@ ] }, { - "uuid": "baf96b3c-8522-434b-9e2a-58542d740532", + "uuid": "e0eac958-55be-49d4-8c0d-53c306a188c8", "control-id": "cis_rhel10_3-3.2.2", "description": "No notes for control-id 3.3.2.2.", "props": [ @@ -10579,7 +10579,7 @@ ] }, { - "uuid": "acdd050e-749f-4dab-80ac-bf2cf5d55be5", + "uuid": "52ef9242-bb2d-4131-aa1f-45c651811cd1", "control-id": "cis_rhel10_3-3.2.3", "description": "No notes for control-id 3.3.2.3.", "props": [ @@ -10596,7 +10596,7 @@ ] }, { - "uuid": "d858a2e2-da33-4174-a927-ad9849bdb621", + "uuid": "5bb33e2e-690d-47c9-b4cc-b1031082b5a4", "control-id": "cis_rhel10_3-3.2.4", "description": "No notes for control-id 3.3.2.4.", "props": [ @@ -10613,7 +10613,7 @@ ] }, { - "uuid": "c9082c75-44e0-4f11-96a7-d37643c58588", + "uuid": "85c0ba5b-b0b3-48f2-868a-da62681f86f7", "control-id": "cis_rhel10_3-3.2.5", "description": "No notes for control-id 3.3.2.5.", "props": [ @@ -10630,7 +10630,7 @@ ] }, { - "uuid": "1ce59f6c-f15b-4f65-b207-c85aa5798a22", + "uuid": "6bd72684-cc49-476b-a815-4240cca64da8", "control-id": "cis_rhel10_3-3.2.6", "description": "No notes for control-id 3.3.2.6.", "props": [ @@ -10647,7 +10647,7 @@ ] }, { - "uuid": "ff54da19-1f91-4eb9-b6be-d4dddc01e892", + "uuid": "c6b9fde5-cab2-417d-a2f5-cfeb15591da3", "control-id": "cis_rhel10_3-3.2.7", "description": "No notes for control-id 3.3.2.7.", "props": [ @@ -10664,7 +10664,7 @@ ] }, { - "uuid": "c97a9e0a-0803-4cb4-b44b-7f517346eb42", + "uuid": "218d5b09-5fa1-4a8e-9e87-e86ff3f8872c", "control-id": "cis_rhel10_3-3.2.8", "description": "No notes for control-id 3.3.2.8.", "props": [ @@ -10681,7 +10681,7 @@ ] }, { - "uuid": "2cebb099-e8bb-44a4-b4ff-9bfac70b03ba", + "uuid": "9708de64-4399-428c-a310-c30350f92951", "control-id": "cis_rhel10_4-1.1", "description": "No notes for control-id 4.1.1.", "props": [ @@ -10698,7 +10698,7 @@ ] }, { - "uuid": "7a90a779-d38c-4060-9e84-119dc3afc0d7", + "uuid": "ad2d0354-2288-467e-8304-3348b18f81df", "control-id": "cis_rhel10_4-1.2", "description": "No notes for control-id 4.1.2.", "props": [ @@ -10715,7 +10715,7 @@ ] }, { - "uuid": "030a9d99-1b73-4442-90de-9a9a190d3f94", + "uuid": "2d68c580-ce7d-423a-9d5b-dd2aec583b10", "control-id": "cis_rhel10_4-1.3", "description": "No notes for control-id 4.1.3.", "props": [ @@ -10732,7 +10732,7 @@ ] }, { - "uuid": "314440a1-27f3-4731-b5b4-4d4fe9924e12", + "uuid": "0483dc94-ddf6-4e25-a1ec-d79ba0eeb723", "control-id": "cis_rhel10_4-1.4", "description": "The description for control-id cis_rhel10_4-1.4.", "props": [ @@ -10740,12 +10740,12 @@ "name": "implementation-status", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "alternative", - "remarks": "No notes for control-id 4.1.4." + "remarks": "There is not an easy way to do this for only active zones using OVAL.\nFor now, there are are no rules for this control." } ] }, { - "uuid": "5cdb2aad-f5e8-4d7a-826b-15e46657b295", + "uuid": "e9100fe9-5784-4c7a-8773-f75af2a2d04b", "control-id": "cis_rhel10_4-1.5", "description": "Firewalld in Red Hat Enterprise Linux 10 accepts loopback traffic by default.", "props": [ @@ -10762,7 +10762,7 @@ ] }, { - "uuid": "dbb5ad87-b893-4b95-a068-5ed201b930f4", + "uuid": "5e90bac3-dac0-43dc-a926-5076d64a2e61", "control-id": "cis_rhel10_4-1.6", "description": "The description for control-id cis_rhel10_4-1.6.", "props": [ @@ -10775,7 +10775,7 @@ ] }, { - "uuid": "5ea5522c-a6c1-4cd2-b888-3997f658f36d", + "uuid": "c61d8ff8-50b9-468b-b716-283fcde04b6d", "control-id": "cis_rhel10_4-1.7", "description": "The description for control-id cis_rhel10_4-1.7.", "props": [ @@ -10788,7 +10788,7 @@ ] }, { - "uuid": "50e14d14-cfe4-4e68-8560-b337b8db0589", + "uuid": "7cf84bbf-9c16-40bf-aec3-9092083d7449", "control-id": "cis_rhel10_5-1.1", "description": "No notes for control-id 5.1.1.", "props": [ @@ -10845,7 +10845,7 @@ ] }, { - "uuid": "976c8fc9-3974-4abb-8bfa-239b3c6c6f99", + "uuid": "65bf7f3a-29fd-4ce4-ab4d-1892f48d3095", "control-id": "cis_rhel10_5-1.2", "description": "No notes for control-id 5.1.2.", "props": [ @@ -10872,7 +10872,7 @@ ] }, { - "uuid": "ee5cec7b-6a8d-4955-abe7-42b28eadc916", + "uuid": "7e6fc9ad-9ed0-4f68-a3f6-7a0248e4c0c2", "control-id": "cis_rhel10_5-1.3", "description": "No notes for control-id 5.1.3.", "props": [ @@ -10899,7 +10899,7 @@ ] }, { - "uuid": "603d4557-a165-427b-8b04-a11858014498", + "uuid": "fb5fe5b4-a6da-40b0-b74f-e18307e1d794", "control-id": "cis_rhel10_5-1.4", "description": "No notes for control-id 5.1.4.", "props": [ @@ -10916,7 +10916,7 @@ ] }, { - "uuid": "3f198902-65fc-4337-8447-3d0da872dc3c", + "uuid": "6564500f-6386-4fe5-8a64-0288a4853552", "control-id": "cis_rhel10_5-1.5", "description": "No notes for control-id 5.1.5.", "props": [ @@ -10933,7 +10933,7 @@ ] }, { - "uuid": "866734a1-1f99-4f60-8a03-abf0978543b7", + "uuid": "3cbe36cb-7606-437a-a70d-44b880a9c2ed", "control-id": "cis_rhel10_5-1.6", "description": "No notes for control-id 5.1.6.", "props": [ @@ -10950,7 +10950,7 @@ ] }, { - "uuid": "7a3a2dd6-ba13-417c-832c-9156018f7d67", + "uuid": "8342306c-491d-4e78-8113-05082b12a791", "control-id": "cis_rhel10_5-1.7", "description": "The requirement gives an example of 45 seconds, but is flexible about the values. It is only\nnecessary to ensure there is a timeout configured in alignment to the site policy.", "props": [ @@ -10972,7 +10972,7 @@ ] }, { - "uuid": "f21a36b2-6e8f-4463-ae11-ecd08ad8abaf", + "uuid": "925b6a0f-9a98-4691-a161-f59696f12cc1", "control-id": "cis_rhel10_5-1.8", "description": "No notes for control-id 5.1.8.", "props": [ @@ -10989,7 +10989,7 @@ ] }, { - "uuid": "f419dbfd-6feb-42c3-a339-c117758f1656", + "uuid": "603026a1-04b8-45b7-9893-9b3b1517ad51", "control-id": "cis_rhel10_5-1.9", "description": "No notes for control-id 5.1.9.", "props": [ @@ -11006,7 +11006,7 @@ ] }, { - "uuid": "a65bd8bf-1d5c-4b50-9ef5-a9950226eed7", + "uuid": "e151b06a-1b44-41b1-a6e3-94a73d8e2dfe", "control-id": "cis_rhel10_5-1.10", "description": "No notes for control-id 5.1.10.", "props": [ @@ -11023,7 +11023,7 @@ ] }, { - "uuid": "cf36e9c3-18ee-4a6f-9e29-5c6f40a7d158", + "uuid": "788f36d7-774f-4779-bc3c-858d41bc4556", "control-id": "cis_rhel10_5-1.11", "description": "No notes for control-id 5.1.11.", "props": [ @@ -11040,7 +11040,7 @@ ] }, { - "uuid": "794009f2-82f1-45f4-9489-73f624a24798", + "uuid": "feb0dc18-9d85-4a15-9480-092e64e8a0a1", "control-id": "cis_rhel10_5-1.12", "description": "The description for control-id cis_rhel10_5-1.12.", "props": [ @@ -11058,7 +11058,7 @@ ] }, { - "uuid": "c62d7add-14bd-4d29-8145-7900b6e1d54b", + "uuid": "ce088acb-dff2-400b-930d-5afa1a47a4e7", "control-id": "cis_rhel10_5-1.13", "description": "No notes for control-id 5.1.13.", "props": [ @@ -11075,7 +11075,7 @@ ] }, { - "uuid": "9648df6f-2dd8-4cfd-bcff-99f972d2463e", + "uuid": "17748a3f-96b3-4687-8be6-df1f7c9a6853", "control-id": "cis_rhel10_5-1.14", "description": "The CIS benchmark is not opinionated about which loglevel is selected here. Here, this\nprofile uses VERBOSE by default, as it allows for the capture of login and logout activity\nas well as key fingerprints.", "props": [ @@ -11092,7 +11092,7 @@ ] }, { - "uuid": "61095d28-db3f-462d-ae0c-086f560608c3", + "uuid": "f304e851-e8c8-42d9-a226-49ae254aef6a", "control-id": "cis_rhel10_5-1.15", "description": "No notes for control-id 5.1.15.", "props": [ @@ -11109,7 +11109,7 @@ ] }, { - "uuid": "7e3e3e6f-6b9d-453f-83d2-e24f2581b127", + "uuid": "59461bf2-ca43-4acc-a774-2835073c43c5", "control-id": "cis_rhel10_5-1.16", "description": "No notes for control-id 5.1.16.", "props": [ @@ -11126,7 +11126,7 @@ ] }, { - "uuid": "77e2fe82-3384-4a9e-8201-e2ef138ee9b6", + "uuid": "977ff64a-faff-48e4-b049-718f2652fb48", "control-id": "cis_rhel10_5-1.17", "description": "No notes for control-id 5.1.17.", "props": [ @@ -11143,7 +11143,7 @@ ] }, { - "uuid": "e2ab0182-add6-4f26-9621-69a6b7670778", + "uuid": "23b26bed-8d92-42f2-a53b-6e2abcf2163a", "control-id": "cis_rhel10_5-1.18", "description": "No notes for control-id 5.1.18.", "props": [ @@ -11160,7 +11160,7 @@ ] }, { - "uuid": "13f8ec63-ffdf-4ace-b9f6-60e1783305ac", + "uuid": "85a44dc3-4993-4c7c-82a5-05d280ffd6cb", "control-id": "cis_rhel10_5-1.19", "description": "No notes for control-id 5.1.19.", "props": [ @@ -11177,7 +11177,7 @@ ] }, { - "uuid": "f3c83759-d272-419f-85d6-d7b76827cb33", + "uuid": "c5486729-2334-47c5-955c-35e47b8c6b2c", "control-id": "cis_rhel10_5-1.20", "description": "No notes for control-id 5.1.20.", "props": [ @@ -11194,7 +11194,7 @@ ] }, { - "uuid": "f79d275c-a6a6-4c12-84b3-735d9ca74ba2", + "uuid": "852d398d-dd65-4f59-8ebe-e2e440901cf9", "control-id": "cis_rhel10_5-1.21", "description": "No notes for control-id 5.1.21.", "props": [ @@ -11211,7 +11211,7 @@ ] }, { - "uuid": "57af5fd3-b5a8-40c4-8876-d9183088811e", + "uuid": "5b469bf6-c1b3-4fa7-9cd2-ba685eed9658", "control-id": "cis_rhel10_5-1.22", "description": "No notes for control-id 5.1.22.", "props": [ @@ -11228,7 +11228,7 @@ ] }, { - "uuid": "4be1dd17-d105-47f7-8650-532dbe467bb6", + "uuid": "c1fd67cc-23ed-4202-8c03-ec88e10ac4a1", "control-id": "cis_rhel10_5-2.1", "description": "No notes for control-id 5.2.1.", "props": [ @@ -11245,7 +11245,7 @@ ] }, { - "uuid": "1aa20276-deca-451d-a30c-3c8ca86dbc32", + "uuid": "3cc02cce-c371-44b3-bb94-5fd1ab58acbe", "control-id": "cis_rhel10_5-2.2", "description": "No notes for control-id 5.2.2.", "props": [ @@ -11262,7 +11262,7 @@ ] }, { - "uuid": "fba5a714-28d9-4eee-a5f4-517edf2d44a1", + "uuid": "292bac98-f985-47ea-be2b-d4ee16c93682", "control-id": "cis_rhel10_5-2.3", "description": "No notes for control-id 5.2.3.", "props": [ @@ -11279,7 +11279,7 @@ ] }, { - "uuid": "c8a12868-0f31-48d0-b3c3-5e31fd42a9ee", + "uuid": "873ea4fb-2d5f-4b45-ad7d-1248389f9abb", "control-id": "cis_rhel10_5-2.5", "description": "No notes for control-id 5.2.5.", "props": [ @@ -11296,7 +11296,7 @@ ] }, { - "uuid": "07d23d59-7289-49d3-b8c0-41d82a792787", + "uuid": "7e6f5f5a-a9c9-4243-98b5-dd8a1957b20e", "control-id": "cis_rhel10_5-2.6", "description": "No notes for control-id 5.2.6.", "props": [ @@ -11313,7 +11313,7 @@ ] }, { - "uuid": "2fa9b2c4-7561-4018-8ac0-5fa20daf417f", + "uuid": "f810b270-ff2b-4919-a6d7-dd6bd546f074", "control-id": "cis_rhel10_5-2.7", "description": "Members of \"wheel\" or GID 0 groups are checked by default if the group option is not set for\npam_wheel.so module. The recommendation states the group should be empty to reinforce the\nuse of \"sudo\" for privileged access. Therefore, members of these groups should be manually\nchecked or a different group should be informed.", "props": [ @@ -11335,7 +11335,7 @@ ] }, { - "uuid": "e22aa909-19bf-4062-853f-8d830113bf05", + "uuid": "e2dcabea-6b15-40de-ad58-f13203729847", "control-id": "cis_rhel10_5-3.1.1", "description": "This requirement is hard to be automated without any specific requirement. The policy even\nstates that provided commands are examples, other custom settings might be in place and the\nsettings might be different depending on site policies. The other rules will already make\nsure there is a correct autheselect profile regardless of the existing settings. It is\nnecessary to better discuss with CIS Community.", "props": [ @@ -11347,7 +11347,7 @@ ] }, { - "uuid": "183276d6-bc24-4364-b5b9-6193d00b74bd", + "uuid": "619dd679-be02-4b27-9dfc-88cf4f488b60", "control-id": "cis_rhel10_5-3.1.2", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.1.", "props": [ @@ -11369,7 +11369,7 @@ ] }, { - "uuid": "5aa9ef07-d9f6-451c-90c0-162c5875518c", + "uuid": "d1b83676-1747-4ac3-860c-6ab746df5dd1", "control-id": "cis_rhel10_5-3.1.3", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.2.", "props": [ @@ -11396,7 +11396,7 @@ ] }, { - "uuid": "13035521-75ce-40c4-808b-4ce8627afee3", + "uuid": "01381fbd-0249-44b0-98a3-7d1ff73c0367", "control-id": "cis_rhel10_5-3.1.4", "description": "The module is properly enabled by the rules mentioned in related_rules.\nRequirements in 5.3.2.3 use these rules.", "props": [ @@ -11408,7 +11408,7 @@ ] }, { - "uuid": "84141c9a-d450-466b-9a86-bb8dcbba1181", + "uuid": "8ab1a8ce-aa52-4430-8f0e-9300a8ef3357", "control-id": "cis_rhel10_5-3.1.5", "description": "No notes for control-id 5.3.1.5.", "props": [ @@ -11425,7 +11425,7 @@ ] }, { - "uuid": "9d7a6b54-d450-446a-b1fc-7f4496df3891", + "uuid": "6c3a78fd-76c1-4cb6-8bc3-726bcd160a3c", "control-id": "cis_rhel10_5-3.2.1.1", "description": "No notes for control-id 5.3.2.1.1.", "props": [ @@ -11442,7 +11442,7 @@ ] }, { - "uuid": "abef596d-4037-49dd-b701-1d8fdf8a3645", + "uuid": "c0e67ca9-bd32-418d-b7bf-621d20f10ccb", "control-id": "cis_rhel10_5-3.2.1.2", "description": "The policy also accepts value 0, which means the locked accounts should be manually unlocked\nby an administrator. However, it also mentions that using value 0 can facilitate a DoS\nattack to legitimate users.", "props": [ @@ -11459,7 +11459,7 @@ ] }, { - "uuid": "80cdbc14-413d-471c-ab36-4315d21a1fb4", + "uuid": "dd46c931-9060-4c14-abe0-0a42994d5d77", "control-id": "cis_rhel10_5-3.2.2.1", "description": "No notes for control-id 5.3.2.2.1.", "props": [ @@ -11476,7 +11476,7 @@ ] }, { - "uuid": "6963dcef-2892-4491-b11d-c77b21e2f34e", + "uuid": "1471b8f7-9e88-4981-8436-40d1a1bb3813", "control-id": "cis_rhel10_5-3.2.2.2", "description": "No notes for control-id 5.3.2.2.2.", "props": [ @@ -11493,7 +11493,7 @@ ] }, { - "uuid": "e2ed4c06-b750-4d64-9626-e8ed2637bfb9", + "uuid": "a75d7f9c-c9ca-4701-bdc4-e8600dae0aa5", "control-id": "cis_rhel10_5-3.2.2.3", "description": "This requirement is expected to be manual. However, in previous versions of the policy\nit was already automated the configuration of \"minclass\" option. This posture was kept for\nRHEL 10 in this new version. Rules related to other options are informed in related_rules.\nIn short, minclass=4 alone can achieve the same result achieved by the combination of the\nother 4 options mentioned in the policy.", "props": [ @@ -11510,7 +11510,7 @@ ] }, { - "uuid": "ebfccccf-6476-438c-9de8-6b954e2f154c", + "uuid": "f6bb0d94-e2af-4b28-abf3-42b6d55c4ad6", "control-id": "cis_rhel10_5-3.2.2.4", "description": "No notes for control-id 5.3.2.2.4.", "props": [ @@ -11527,7 +11527,7 @@ ] }, { - "uuid": "063006cd-8370-4e13-907c-c1cbe52af107", + "uuid": "2ef22b89-33b6-4483-909b-653533895bb3", "control-id": "cis_rhel10_5-3.2.2.5", "description": "No notes for control-id 5.3.2.2.5.", "props": [ @@ -11544,7 +11544,7 @@ ] }, { - "uuid": "40f09dce-887d-4359-81cd-b18d2dd7391d", + "uuid": "cc5052ab-88a7-406c-8896-893d387de866", "control-id": "cis_rhel10_5-3.2.2.6", "description": "No notes for control-id 5.3.2.2.6.", "props": [ @@ -11561,7 +11561,7 @@ ] }, { - "uuid": "1f376766-1794-42b8-84da-03f0a76c286f", + "uuid": "57c0c82f-d32d-4ea0-8861-1e4aad4e78d0", "control-id": "cis_rhel10_5-3.2.2.7", "description": "No notes for control-id 5.3.2.2.7.", "props": [ @@ -11578,7 +11578,7 @@ ] }, { - "uuid": "002f8a4b-7040-4559-b857-2a14ff87f7b1", + "uuid": "0e8c9f7b-681b-4a4a-868d-ed323303aef5", "control-id": "cis_rhel10_5-3.2.3.1", "description": "Although mentioned in the section 5.3.3.3, there is no explicit requirement to configure\nretry option of pam_pwhistory. If come in the future, the rule accounts_password_pam_retry\ncan be used.", "props": [ @@ -11600,7 +11600,7 @@ ] }, { - "uuid": "8b43a60a-8d2c-4ee7-87bd-54317cb15c5c", + "uuid": "94bb243d-c378-48bb-8ead-23cf88e829ee", "control-id": "cis_rhel10_5-3.2.3.2", "description": "No notes for control-id 5.3.2.3.2.", "props": [ @@ -11617,7 +11617,7 @@ ] }, { - "uuid": "e3916e2d-7266-4333-bc83-1dade19ffef5", + "uuid": "8c0f23b8-ce0f-4ae5-9003-fd61e09954c1", "control-id": "cis_rhel10_5-3.2.3.3", "description": "In RHEL 10 pam_pwhistory is enabled via authselect feature, as required in 5.3.1.4. The\nfeature automatically set \"use_authok\" option. In any case, we don't have a rule to check\nthis option specifically.", "props": [ @@ -11634,7 +11634,7 @@ ] }, { - "uuid": "3e2fc1d8-9b57-48a5-9e35-73403b1fc36c", + "uuid": "c8af4054-dce7-42de-a6c7-44c8bcf255f8", "control-id": "cis_rhel10_5-3.2.4.1", "description": "The rule more specifically used in this requirement also satify the requirement 5.3.1.5.", "props": [ @@ -11651,7 +11651,7 @@ ] }, { - "uuid": "27c86479-301a-4c93-8481-d1b7aefdce90", + "uuid": "2eccf376-d841-4fd2-a594-07743ef81b90", "control-id": "cis_rhel10_5-3.2.4.2", "description": "Usage of pam_unix.so module together with \"remember\" option is deprecated and is not\nrecommended by this policy. Instead, it should be used remember option of pam_pwhistory\nmodule, as required in 5.3.2.3.1. See here for more details about pam_unix.so:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1778929", "props": [ @@ -11668,7 +11668,7 @@ ] }, { - "uuid": "bd23d69c-edaf-47e9-89bb-160c97baf3ac", + "uuid": "1f33435b-2f36-4abd-8ee7-a602b20b40a9", "control-id": "cis_rhel10_5-3.2.4.3", "description": "Changes in logindefs mentioned in this requirement are more specifically covered by 5.4.1.4", "props": [ @@ -11690,7 +11690,7 @@ ] }, { - "uuid": "12bd90a2-805c-464d-bd83-e4ea0cbb3c73", + "uuid": "35da92b2-dfe4-4277-87e3-c0285b6b6a7f", "control-id": "cis_rhel10_5-3.2.4.4", "description": "In RHEL 10 pam_unix is enabled by default in all authselect profiles already with the\nuse_authtok option set. In any case, we don't have a rule to check this option specifically,\nlike in 5.3.2.3.3.", "props": [ @@ -11707,7 +11707,7 @@ ] }, { - "uuid": "fd3e7fdb-4562-4a5e-9d72-eba6cdaabba7", + "uuid": "abfc29ad-6310-49f7-8ce6-87cd08d7dbc2", "control-id": "cis_rhel10_5-4.1.1", "description": "No notes for control-id 5.4.1.1.", "props": [ @@ -11729,7 +11729,7 @@ ] }, { - "uuid": "3f07b0f3-0523-487a-b251-de9bc93d80a3", + "uuid": "87e6a011-391b-4b58-9d15-52393e71e394", "control-id": "cis_rhel10_5-4.1.3", "description": "No notes for control-id 5.4.1.3.", "props": [ @@ -11751,7 +11751,7 @@ ] }, { - "uuid": "a43da28f-7320-41e0-8d64-59b9cb4435a8", + "uuid": "35914859-6f49-4e17-ab71-0752fe74269c", "control-id": "cis_rhel10_5-4.1.4", "description": "There's a \"new\" set of options in /etc/login.defs file to define the number of iterations\nperformed during the hashing process.", "props": [ @@ -11773,7 +11773,7 @@ ] }, { - "uuid": "a072c988-0cc6-46f2-8bd2-64e983e31bd7", + "uuid": "1a1ffa26-8a08-45c4-8077-047f6cbc4500", "control-id": "cis_rhel10_5-4.1.5", "description": "No notes for control-id 5.4.1.5.", "props": [ @@ -11795,7 +11795,7 @@ ] }, { - "uuid": "95a3a86b-98a9-43dd-980f-897348a67391", + "uuid": "48912527-6f79-47e5-b22b-b176c3894716", "control-id": "cis_rhel10_5-4.1.6", "description": "No notes for control-id 5.4.1.6.", "props": [ @@ -11812,7 +11812,7 @@ ] }, { - "uuid": "4da4b083-6b09-4bdd-9714-e8e8ccdb2954", + "uuid": "7d22bb53-9b05-4a7a-b22b-542f93dc2324", "control-id": "cis_rhel10_5-4.2.1", "description": "No notes for control-id 5.4.2.1.", "props": [ @@ -11829,7 +11829,7 @@ ] }, { - "uuid": "7d62c9d9-f919-483a-a705-2a3ebd429052", + "uuid": "66703e71-8d78-4b8a-9305-d5152fd00c45", "control-id": "cis_rhel10_5-4.2.2", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -11846,7 +11846,7 @@ ] }, { - "uuid": "cc38acfc-8692-468c-9e94-bdc0ac553e8f", + "uuid": "2c95bb46-fd46-4ea4-a851-29d5e9bd9470", "control-id": "cis_rhel10_5-4.2.3", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -11863,7 +11863,7 @@ ] }, { - "uuid": "08760203-1f4a-477d-85b5-0340667843f6", + "uuid": "93688d5b-bfa5-493f-abcb-a4dbad28bf5e", "control-id": "cis_rhel10_5-4.2.4", "description": "No notes for control-id 5.4.2.4.", "props": [ @@ -11880,7 +11880,7 @@ ] }, { - "uuid": "5fb18116-435f-4bc2-91a3-785bf781e3c8", + "uuid": "5ab8de8a-79f4-4674-8b22-7edfd8585a94", "control-id": "cis_rhel10_5-4.2.5", "description": "No notes for control-id 5.4.2.5.", "props": [ @@ -11902,7 +11902,7 @@ ] }, { - "uuid": "e9d4b6b4-b8f8-428c-87da-37981175f3ba", + "uuid": "ed6ff38b-4f08-44ef-8c96-a2be1f249209", "control-id": "cis_rhel10_5-4.2.6", "description": "No notes for control-id 5.4.2.6.", "props": [ @@ -11919,7 +11919,7 @@ ] }, { - "uuid": "e2afa0b8-4351-4839-a70b-6d1c74df31f2", + "uuid": "8e9288b4-d4b9-40db-ae97-ba562150ae79", "control-id": "cis_rhel10_5-4.2.7", "description": "No notes for control-id 5.4.2.7.", "props": [ @@ -11941,7 +11941,7 @@ ] }, { - "uuid": "2c84bb01-0cc7-41e3-a8b3-5432750a79aa", + "uuid": "1ee94f31-b758-46f5-85f6-5d98bcc3d3f1", "control-id": "cis_rhel10_5-4.2.8", "description": "No notes for control-id 5.4.2.8.", "props": [ @@ -11958,7 +11958,7 @@ ] }, { - "uuid": "0fbbaab6-e63f-4a36-a18b-370eb4bd2a7e", + "uuid": "936c7870-5ab2-437a-8cef-e8af16f15ecb", "control-id": "cis_rhel10_5-4.3.2", "description": "No notes for control-id 5.4.3.2.", "props": [ @@ -11975,7 +11975,7 @@ ] }, { - "uuid": "957535b5-8a79-466a-8677-227f37706b73", + "uuid": "8259e6c9-cf9d-4835-8edc-2a673e66ad8b", "control-id": "cis_rhel10_5-4.3.3", "description": "No notes for control-id 5.4.3.3.", "props": [ @@ -12002,7 +12002,7 @@ ] }, { - "uuid": "cfde7f3d-9a00-48fc-ae70-2e794adc9002", + "uuid": "7bd2852c-3771-44d5-949f-7332deb20aae", "control-id": "cis_rhel10_6-1.1", "description": "No notes for control-id 6.1.1.", "props": [ @@ -12024,7 +12024,7 @@ ] }, { - "uuid": "93bc5caa-09c9-4ed4-b307-212456c6714c", + "uuid": "f5ba74c4-2cef-4c16-b104-df9e86147cb4", "control-id": "cis_rhel10_6-1.2", "description": "No notes for control-id 6.1.2.", "props": [ @@ -12041,7 +12041,7 @@ ] }, { - "uuid": "6d67b39e-4003-4409-9e04-dfff8e50fd5f", + "uuid": "8456f357-61ab-4dd9-91c2-65723b96c782", "control-id": "cis_rhel10_6-1.3", "description": "No notes for control-id 6.1.3.", "props": [ @@ -12058,7 +12058,7 @@ ] }, { - "uuid": "65e5b6eb-6572-48fa-8445-3270bf4224ee", + "uuid": "c4181c5e-49d9-49c6-a418-26cbe7c4daa1", "control-id": "cis_rhel10_6-2.1.1", "description": "No notes for control-id 6.2.1.1.", "props": [ @@ -12075,7 +12075,7 @@ ] }, { - "uuid": "8626a290-3cea-40d3-a5e5-029edadaf813", + "uuid": "8071bc00-303f-441b-b7e0-f06e855a6e31", "control-id": "cis_rhel10_6-2.1.2", "description": "The description for control-id cis_rhel10_6-2.1.2.", "props": [ @@ -12088,7 +12088,7 @@ ] }, { - "uuid": "47c958e3-888e-4553-aa00-9a6b56d2797b", + "uuid": "b1f6e5ce-9e57-4404-affb-711065ad6b89", "control-id": "cis_rhel10_6-2.1.3", "description": "The description for control-id cis_rhel10_6-2.1.3.", "props": [ @@ -12101,7 +12101,7 @@ ] }, { - "uuid": "bda84d65-59e6-4caf-b627-c234a0428b9c", + "uuid": "890391c0-d8eb-47d3-bdec-cc6ee6f35906", "control-id": "cis_rhel10_6-2.1.4", "description": "No notes for control-id 6.2.1.4.", "props": [ @@ -12118,7 +12118,7 @@ ] }, { - "uuid": "92d4dec2-f04d-4a63-8891-1aac2fc8958c", + "uuid": "5032f6a5-5f2a-4ae6-bfcc-33ec5684ff4c", "control-id": "cis_rhel10_6-2.2.1.1", "description": "No notes for control-id 6.2.2.1.1.", "props": [ @@ -12135,7 +12135,7 @@ ] }, { - "uuid": "03e8f211-0acf-4280-b2ff-23f80d1492f0", + "uuid": "c9acade4-a7fb-470a-962c-89c348b9c5de", "control-id": "cis_rhel10_6-2.2.1.2", "description": "The description for control-id cis_rhel10_6-2.2.1.2.", "props": [ @@ -12148,7 +12148,7 @@ ] }, { - "uuid": "490b085b-82cc-4209-8122-68f4dfa65a5e", + "uuid": "91c8f8eb-1404-4b56-8121-40681188773c", "control-id": "cis_rhel10_6-2.2.1.3", "description": "No notes for control-id 6.2.2.1.3.", "props": [ @@ -12165,7 +12165,7 @@ ] }, { - "uuid": "c6837dd2-f34a-4369-bba8-a0fb1f6ce2c2", + "uuid": "d0dbebcd-381d-4a4a-87f7-a91c7803257f", "control-id": "cis_rhel10_6-2.2.1.4", "description": "No notes for control-id 6.2.2.1.4.", "props": [ @@ -12182,7 +12182,7 @@ ] }, { - "uuid": "71273285-7ad0-491a-9f2e-13b8bf51731b", + "uuid": "f7d313e6-44fc-49c6-9393-925a8d283de4", "control-id": "cis_rhel10_6-2.2.2", "description": "No notes for control-id 6.2.2.2.", "props": [ @@ -12199,7 +12199,7 @@ ] }, { - "uuid": "01352900-0eed-48f0-81ed-9fb76c5f616e", + "uuid": "2d108b8e-b628-47e4-aa84-e3baeb93f91f", "control-id": "cis_rhel10_6-2.2.3", "description": "No notes for control-id 6.2.2.3.", "props": [ @@ -12216,7 +12216,7 @@ ] }, { - "uuid": "2e83fe75-320e-410e-b480-f0dba5751019", + "uuid": "cf63cce9-7329-4315-a2a7-004f373f2920", "control-id": "cis_rhel10_6-2.2.4", "description": "No notes for control-id 6.2.2.4.", "props": [ @@ -12233,7 +12233,7 @@ ] }, { - "uuid": "4e4940cd-6d52-43e4-be6a-9c5ba9fdf7de", + "uuid": "bdd8eec6-b814-4fc3-998f-ef815a28f60b", "control-id": "cis_rhel10_6-2.3.1", "description": "No notes for control-id 6.2.3.1.", "props": [ @@ -12245,7 +12245,7 @@ ] }, { - "uuid": "e101c7d6-85da-409b-9bf6-b27d1bdefe25", + "uuid": "ba98c764-a04d-4875-8fdd-02f027172a95", "control-id": "cis_rhel10_6-2.3.2", "description": "No notes for control-id 6.2.3.2.", "props": [ @@ -12257,7 +12257,7 @@ ] }, { - "uuid": "f3f8c093-a7a5-4981-8ddc-4ddc4c8e4931", + "uuid": "d66aab5b-158f-4c5c-a7da-efea65dad0e9", "control-id": "cis_rhel10_6-2.3.3", "description": "No notes for control-id 6.2.3.3.", "props": [ @@ -12269,7 +12269,7 @@ ] }, { - "uuid": "75453bfc-5538-46d9-a064-0efb737d498d", + "uuid": "dcb84d81-91ea-486a-b5fb-cb01c70707bb", "control-id": "cis_rhel10_6-2.3.4", "description": "No notes for control-id 6.2.3.4.", "props": [ @@ -12281,7 +12281,7 @@ ] }, { - "uuid": "5e7bc7a0-dce7-463f-b651-e1a513ae77c6", + "uuid": "c7e65399-2251-4a74-a0c6-7df6c6ee6a4d", "control-id": "cis_rhel10_6-2.3.5", "description": "The description for control-id cis_rhel10_6-2.3.5.", "props": [ @@ -12294,7 +12294,7 @@ ] }, { - "uuid": "3902a7ba-c2f9-423a-a7f8-d8d2ba02b39f", + "uuid": "cc92eedc-5026-442b-917f-94129ef078dc", "control-id": "cis_rhel10_6-2.3.6", "description": "The description for control-id cis_rhel10_6-2.3.6.", "props": [ @@ -12307,7 +12307,7 @@ ] }, { - "uuid": "2765c91d-6523-4ba6-94d1-9c736d492dff", + "uuid": "656804b5-8db4-4f79-bea3-a6f36eaf1774", "control-id": "cis_rhel10_6-2.3.7", "description": "No notes for control-id 6.2.3.7.", "props": [ @@ -12319,7 +12319,7 @@ ] }, { - "uuid": "894b5f0b-38d7-4491-b7c9-9f1b1b028eec", + "uuid": "2b9f64a7-c854-453e-85c6-19dcc9d73974", "control-id": "cis_rhel10_6-2.3.8", "description": "The description for control-id cis_rhel10_6-2.3.8.", "props": [ @@ -12332,7 +12332,7 @@ ] }, { - "uuid": "4705f6e1-85b9-4754-a3cb-69d4105884ab", + "uuid": "d3dc1e57-1358-4957-a4a9-d9c2f57bccb2", "control-id": "cis_rhel10_6-2.4.1", "description": "It is not harmful to run these rules even if rsyslog is not installed or active.", "props": [ @@ -12359,7 +12359,7 @@ ] }, { - "uuid": "d6c91433-6cda-4448-91ae-9e5d90fe489b", + "uuid": "83b97fe3-17a1-4a53-b51a-f6041047d543", "control-id": "cis_rhel10_7-1.1", "description": "No notes for control-id 7.1.1.", "props": [ @@ -12386,7 +12386,7 @@ ] }, { - "uuid": "6423cb05-ba06-4412-9bfb-5483c0ad635c", + "uuid": "145c5533-3d3e-4cfe-b0f3-845b57f733bc", "control-id": "cis_rhel10_7-1.2", "description": "No notes for control-id 7.1.2.", "props": [ @@ -12413,7 +12413,7 @@ ] }, { - "uuid": "67f09774-982c-40a9-89fd-55c5d150a5d0", + "uuid": "33f198c5-57b1-4e0e-a00b-324cd35679a3", "control-id": "cis_rhel10_7-1.3", "description": "No notes for control-id 7.1.3.", "props": [ @@ -12440,7 +12440,7 @@ ] }, { - "uuid": "17fa2ab3-f688-4b62-8463-a657325b1f0e", + "uuid": "dbd3073e-3771-4ff7-afc2-4e395d194033", "control-id": "cis_rhel10_7-1.4", "description": "No notes for control-id 7.1.4.", "props": [ @@ -12467,7 +12467,7 @@ ] }, { - "uuid": "4150635e-62b5-4bb2-bac7-98810dd95c03", + "uuid": "0a4badb0-d144-4228-a4b6-7a6f1d5da62e", "control-id": "cis_rhel10_7-1.5", "description": "No notes for control-id 7.1.5.", "props": [ @@ -12494,7 +12494,7 @@ ] }, { - "uuid": "c9f3134a-d954-442a-80f0-000108898a1c", + "uuid": "70bedd18-d373-44bf-a484-9afa8bb2d3d2", "control-id": "cis_rhel10_7-1.6", "description": "No notes for control-id 7.1.6.", "props": [ @@ -12521,7 +12521,7 @@ ] }, { - "uuid": "390727a2-b224-4968-84b6-1c7a5cd3c95d", + "uuid": "17647e63-5283-4c18-ac20-6d35d6f4100e", "control-id": "cis_rhel10_7-1.7", "description": "No notes for control-id 7.1.7.", "props": [ @@ -12548,7 +12548,7 @@ ] }, { - "uuid": "3db5445b-96c0-4171-ae3f-d4f54f28643e", + "uuid": "c562d43d-0f8e-4379-92fe-b645a0dd9eb9", "control-id": "cis_rhel10_7-1.8", "description": "No notes for control-id 7.1.8.", "props": [ @@ -12575,7 +12575,7 @@ ] }, { - "uuid": "bd7ce5d9-df63-498d-89b7-88a060628c9a", + "uuid": "d6b27889-313f-493c-8643-52eb8693a6bd", "control-id": "cis_rhel10_7-1.9", "description": "No notes for control-id 7.1.9.", "props": [ @@ -12602,7 +12602,7 @@ ] }, { - "uuid": "c8080373-96df-4afb-9857-740fcc7f539f", + "uuid": "a7e45d70-6808-4170-983c-2d9b47ea4af2", "control-id": "cis_rhel10_7-1.10", "description": "No notes for control-id 7.1.10.", "props": [ @@ -12644,7 +12644,7 @@ ] }, { - "uuid": "8447a0c0-766b-4e76-9195-634b24c98904", + "uuid": "a465e575-8274-431e-9b88-454d4c912531", "control-id": "cis_rhel10_7-1.11", "description": "No notes for control-id 7.1.11.", "props": [ @@ -12666,7 +12666,7 @@ ] }, { - "uuid": "24f44df1-86e0-40c1-bdfe-622b86529d4f", + "uuid": "35f42a27-9fe4-449d-a1a3-c5c45850772e", "control-id": "cis_rhel10_7-1.12", "description": "No notes for control-id 7.1.12.", "props": [ @@ -12688,7 +12688,7 @@ ] }, { - "uuid": "a7753913-88bf-4fb2-b86f-7ece08898b8d", + "uuid": "5e7775a5-429d-4938-afad-cf4c9a6f674e", "control-id": "cis_rhel10_7-1.13", "description": "The description for control-id cis_rhel10_7-1.13.", "props": [ @@ -12701,7 +12701,7 @@ ] }, { - "uuid": "00fc0cc8-360c-436f-be4c-4a8c258ec45f", + "uuid": "b3c532ff-770a-495a-8a4a-05b6f51b2ad2", "control-id": "cis_rhel10_7-2.1", "description": "No notes for control-id 7.2.1.", "props": [ @@ -12718,7 +12718,7 @@ ] }, { - "uuid": "37a6fdd0-815b-4e78-89d2-cbddde222c70", + "uuid": "fd137430-0b28-4264-91ed-88b8e3442852", "control-id": "cis_rhel10_7-2.2", "description": "No notes for control-id 7.2.2.", "props": [ @@ -12735,7 +12735,7 @@ ] }, { - "uuid": "943b662b-9465-433b-815e-f300b62de40b", + "uuid": "e9852d0d-e5e0-457a-95c0-7a1dc1f26ee5", "control-id": "cis_rhel10_7-2.3", "description": "No notes for control-id 7.2.3.", "props": [ @@ -12752,7 +12752,7 @@ ] }, { - "uuid": "18d2d18d-3c89-48a9-bc9e-cf03bf1fc908", + "uuid": "949df42b-021f-473b-9114-0c762bec284c", "control-id": "cis_rhel10_7-2.4", "description": "No notes for control-id 7.2.4.", "props": [ @@ -12769,7 +12769,7 @@ ] }, { - "uuid": "299cb9c5-8738-4612-b148-c5e984e2d33d", + "uuid": "3847b68b-4498-4cd0-a05b-2baa7f46ca5c", "control-id": "cis_rhel10_7-2.5", "description": "No notes for control-id 7.2.5.", "props": [ @@ -12786,7 +12786,7 @@ ] }, { - "uuid": "3d4cd95a-0382-4bf1-8319-7a25d4d94155", + "uuid": "ef403387-d7ec-4335-b615-bbedff5a697b", "control-id": "cis_rhel10_7-2.6", "description": "No notes for control-id 7.2.6.", "props": [ @@ -12803,7 +12803,7 @@ ] }, { - "uuid": "52fc77d5-eea9-4eef-8a9b-7938d7fe8c80", + "uuid": "4f37189c-fb3d-4089-ba5c-8298ed40d8ff", "control-id": "cis_rhel10_7-2.7", "description": "No notes for control-id 7.2.7.", "props": [ @@ -12820,7 +12820,7 @@ ] }, { - "uuid": "cc46c26e-f5b8-49f3-b3a6-0da77c05ce02", + "uuid": "d35441e3-9bec-46ec-a94b-67b68cf08bc1", "control-id": "cis_rhel10_7-2.8", "description": "No notes for control-id 7.2.8.", "props": [ @@ -12847,7 +12847,7 @@ ] }, { - "uuid": "33f10f8c-4701-489d-b6c2-47c6b39ecbfd", + "uuid": "1fd626e7-4b6f-42bc-803e-fe5c74d84a7b", "control-id": "cis_rhel10_7-2.9", "description": "No notes for control-id 7.2.9.", "props": [ @@ -24461,7 +24461,7 @@ ], "control-implementations": [ { - "uuid": "50cc5ed7-04fb-4617-a437-a23b43d7b6b1", + "uuid": "9aadc9ec-9ac5-4734-a21a-e6becafd9a08", "source": "trestle://profiles/rhel10-cis_rhel10-l2_workstation/profile.json", "description": "Control implementation for cis_workstation_l2", "props": [ @@ -24877,7 +24877,7 @@ ], "implemented-requirements": [ { - "uuid": "6781c969-55e3-4c9a-976a-5ecd1e765c30", + "uuid": "588a8f67-fef5-4ab8-ade6-9bafa9219dc5", "control-id": "cis_rhel10_1-1.1.6", "description": "No notes for control-id 1.1.1.6.", "props": [ @@ -24894,7 +24894,7 @@ ] }, { - "uuid": "35229d8a-a254-41ee-a7ea-087eaf3250c1", + "uuid": "5ac7866e-c6fb-4c02-bb78-b9038e208201", "control-id": "cis_rhel10_1-1.1.7", "description": "No notes for control-id 1.1.1.7.", "props": [ @@ -24911,7 +24911,7 @@ ] }, { - "uuid": "dea4ffca-c179-4df6-b6b2-2bb88c67dad7", + "uuid": "e2ae9758-b8e3-4efb-9d69-6e032e6ae44b", "control-id": "cis_rhel10_1-1.1.8", "description": "No notes for control-id 1.1.1.8.", "props": [ @@ -24928,7 +24928,7 @@ ] }, { - "uuid": "62d2f837-306f-4232-aebd-7e5a04745427", + "uuid": "39787b34-85c3-4738-a075-633d4341bd6e", "control-id": "cis_rhel10_1-1.1.9", "description": "No notes for control-id 1.1.1.9.", "props": [ @@ -24945,7 +24945,7 @@ ] }, { - "uuid": "00ee30a1-70ce-459b-83a0-c66a14c9bc65", + "uuid": "74304013-d196-427a-9f4f-f10466a6fd74", "control-id": "cis_rhel10_1-1.1.10", "description": "No notes for control-id 1.1.1.10.", "props": [ @@ -24962,7 +24962,7 @@ ] }, { - "uuid": "a6908d13-8ba0-4add-8edb-8b1769b2452a", + "uuid": "47d73692-6c7b-41f9-8010-a3783e58ccce", "control-id": "cis_rhel10_1-1.2.3.1", "description": "No notes for control-id 1.1.2.3.1.", "props": [ @@ -24979,7 +24979,7 @@ ] }, { - "uuid": "56885c78-cef3-4711-b5c0-c254c3ad7431", + "uuid": "afa556da-8f71-49ab-86b5-da7b50efd2e7", "control-id": "cis_rhel10_1-1.2.4.1", "description": "No notes for control-id 1.1.2.4.1.", "props": [ @@ -24996,7 +24996,7 @@ ] }, { - "uuid": "d4a8b281-ef5b-4f2e-aeb7-60c63edc499d", + "uuid": "b5bc05c5-b1bc-4722-9aee-37ca1382a61d", "control-id": "cis_rhel10_1-1.2.5.1", "description": "No notes for control-id 1.1.2.5.1.", "props": [ @@ -25013,7 +25013,7 @@ ] }, { - "uuid": "687e91ea-d1c4-4530-afc8-0b11f5a6779e", + "uuid": "36744a83-43cd-4b31-8473-2ef99386fa30", "control-id": "cis_rhel10_1-1.2.6.1", "description": "No notes for control-id 1.1.2.6.1.", "props": [ @@ -25030,7 +25030,7 @@ ] }, { - "uuid": "dcddfd8a-b3c8-41a7-ad53-7fa09bdbe1a1", + "uuid": "aee91ed9-bea0-4b08-99a5-e9d83cab02ff", "control-id": "cis_rhel10_1-1.2.7.1", "description": "No notes for control-id 1.1.2.7.1.", "props": [ @@ -25047,7 +25047,7 @@ ] }, { - "uuid": "397cea8f-c856-4b4e-8f3d-9a0f6004c5a3", + "uuid": "2daf5b14-c33a-4d89-8a1f-9a426d3862a5", "control-id": "cis_rhel10_1-2.1.3", "description": "The description for control-id cis_rhel10_1-2.1.3.", "props": [ @@ -25060,7 +25060,7 @@ ] }, { - "uuid": "5645367e-6b61-4544-aa88-e214d599cafb", + "uuid": "c05476f7-48be-4cd2-8002-620f99bc01a3", "control-id": "cis_rhel10_1-2.1.5", "description": "No notes for control-id 1.2.1.5.", "props": [ @@ -25077,7 +25077,7 @@ ] }, { - "uuid": "2b0e6ccc-f1c6-44dd-b0d0-9981c3e84d69", + "uuid": "d91dd197-227d-46e9-83fe-82999396de8c", "control-id": "cis_rhel10_1-3.1.5", "description": "No notes for control-id 1.3.1.5.", "props": [ @@ -25094,7 +25094,7 @@ ] }, { - "uuid": "256338c1-d64d-4046-8da1-dcf1b9234fd9", + "uuid": "c1ba31cc-6e96-4c14-9e3d-a67f2cf63b2e", "control-id": "cis_rhel10_1-3.1.6", "description": "The description for control-id cis_rhel10_1-3.1.6.", "props": [ @@ -25107,7 +25107,7 @@ ] }, { - "uuid": "c0686f61-84cd-4bcd-ad41-b74d18d5c3bf", + "uuid": "2bed0fc8-8358-4db7-9029-f7a6c1457366", "control-id": "cis_rhel10_1-5.3", "description": "No notes for control-id 1.5.3.", "props": [ @@ -25124,7 +25124,7 @@ ] }, { - "uuid": "219737d6-2626-433c-b05d-d1e9bb51b26e", + "uuid": "da624951-a8a3-4999-ad59-66d5c0807471", "control-id": "cis_rhel10_1-8.4", "description": "No notes for control-id 1.8.4.", "props": [ @@ -25146,7 +25146,7 @@ ] }, { - "uuid": "f1b5d1d6-5503-4d69-94d2-5c37822cc871", + "uuid": "f583ca89-2661-4f50-99b4-985c114e19f1", "control-id": "cis_rhel10_1-8.6", "description": "No notes for control-id 1.8.6.", "props": [ @@ -25163,7 +25163,7 @@ ] }, { - "uuid": "d0c2d742-e6f5-42e0-af8f-817586ed7b0a", + "uuid": "20e893aa-7d10-41d5-aea0-251863b3110f", "control-id": "cis_rhel10_2-1.1", "description": "No notes for control-id 2.1.1.", "props": [ @@ -25180,7 +25180,7 @@ ] }, { - "uuid": "634e43aa-529a-4246-8be9-a5cba6033609", + "uuid": "2e3b53e6-192a-4c4a-bb70-0b72926a7e6f", "control-id": "cis_rhel10_2-1.2", "description": "No notes for control-id 2.1.2.", "props": [ @@ -25197,7 +25197,7 @@ ] }, { - "uuid": "38d6771b-aa31-41bb-b2e2-dfc5e1edb15e", + "uuid": "a4154da1-6385-4ab2-9456-67d3b2064ed8", "control-id": "cis_rhel10_2-1.3", "description": "No notes for control-id 2.1.3.", "props": [ @@ -25214,7 +25214,7 @@ ] }, { - "uuid": "6cf7ce72-7397-49e3-9d6e-8b19126ef09a", + "uuid": "90a17122-470b-426e-926f-c06e33606c84", "control-id": "cis_rhel10_2-2.2", "description": "No notes for control-id 2.2.2.", "props": [ @@ -25231,7 +25231,7 @@ ] }, { - "uuid": "8c2480ed-cc9e-4b02-a049-00a0dbc16ec9", + "uuid": "afb46c93-2637-4858-99e2-e6601bd65769", "control-id": "cis_rhel10_3-1.3", "description": "No notes for control-id 3.1.3.", "props": [ @@ -25248,7 +25248,7 @@ ] }, { - "uuid": "c48610e9-323a-4fed-ac54-cd9af3abfdc6", + "uuid": "ec2d54f4-0ef8-4646-a6e2-880227c1ab10", "control-id": "cis_rhel10_5-2.4", "description": "No notes for control-id 5.2.4.", "props": [ @@ -25265,7 +25265,7 @@ ] }, { - "uuid": "3374835a-f828-4ba0-950e-495184beba4a", + "uuid": "b16c4004-d0a6-46d0-b823-b4600a4789bb", "control-id": "cis_rhel10_5-3.2.1.3", "description": "No notes for control-id 5.3.2.1.3.", "props": [ @@ -25282,7 +25282,7 @@ ] }, { - "uuid": "2e0d4c0d-29a4-4d2f-9cfc-442ecaaa9f27", + "uuid": "cae6975e-518b-4fa2-823e-56b29ae1c2b7", "control-id": "cis_rhel10_5-4.1.2", "description": "No notes for control-id 5.4.1.2.", "props": [ @@ -25304,7 +25304,7 @@ ] }, { - "uuid": "28887e77-56af-4c9d-a223-2dbdc63502b5", + "uuid": "4d3f84eb-17e1-444b-9bb4-a89494aaeb50", "control-id": "cis_rhel10_5-4.3.1", "description": "No notes for control-id 5.4.3.1.", "props": [ @@ -25321,7 +25321,7 @@ ] }, { - "uuid": "40501af0-d50f-40ac-ad23-c86ee9455110", + "uuid": "e34180ae-8680-4746-8947-1b204c25ace7", "control-id": "cis_rhel10_6-3.1.1", "description": "No notes for control-id 6.3.1.1.", "props": [ @@ -25343,7 +25343,7 @@ ] }, { - "uuid": "1c3ab742-7c9d-4ea6-a148-93b9ea28fe59", + "uuid": "0389d8af-c140-4249-aa97-91180e214aff", "control-id": "cis_rhel10_6-3.1.2", "description": "No notes for control-id 6.3.1.2.", "props": [ @@ -25360,7 +25360,7 @@ ] }, { - "uuid": "737e177a-d642-4b2c-9c50-143a1ddab453", + "uuid": "969f5ac5-52e0-4066-b899-1225bb44f4b9", "control-id": "cis_rhel10_6-3.1.3", "description": "No notes for control-id 6.3.1.3.", "props": [ @@ -25377,7 +25377,7 @@ ] }, { - "uuid": "865a506f-9274-40ba-b79d-a9a9e3952a69", + "uuid": "1f24b996-c59b-4d90-b058-82e957a1f8ff", "control-id": "cis_rhel10_6-3.1.4", "description": "No notes for control-id 6.3.1.4.", "props": [ @@ -25394,7 +25394,7 @@ ] }, { - "uuid": "166b71f6-1d82-49cd-b1ad-49d857944fd1", + "uuid": "11204d59-de7f-496f-b21c-a9136d4f84d2", "control-id": "cis_rhel10_6-3.2.1", "description": "No notes for control-id 6.3.2.1.", "props": [ @@ -25411,7 +25411,7 @@ ] }, { - "uuid": "f6ef956a-3270-436b-ab66-8db2fec5398e", + "uuid": "a4bd3afc-3731-4c9f-bc6f-b54620659b4b", "control-id": "cis_rhel10_6-3.2.2", "description": "No notes for control-id 6.3.2.2.", "props": [ @@ -25428,7 +25428,7 @@ ] }, { - "uuid": "bb1e3c1e-0a53-4547-9ce8-b6389527b5ad", + "uuid": "f6c730b7-9dd2-4032-8a8d-d145aba8787a", "control-id": "cis_rhel10_6-3.2.3", "description": "No notes for control-id 6.3.2.3.", "props": [ @@ -25450,7 +25450,7 @@ ] }, { - "uuid": "af4a4583-db2e-4667-81ce-f1e319dcf776", + "uuid": "5eed933d-9222-4415-be8b-615564b0f042", "control-id": "cis_rhel10_6-3.2.4", "description": "No notes for control-id 6.3.2.4.", "props": [ @@ -25472,7 +25472,7 @@ ] }, { - "uuid": "a6185942-4e95-4111-9d29-32c323178ac5", + "uuid": "2fbc5be9-22a8-4c62-9c3c-a5545f133f22", "control-id": "cis_rhel10_6-3.3.1", "description": "No notes for control-id 6.3.3.1.", "props": [ @@ -25489,7 +25489,7 @@ ] }, { - "uuid": "0c416dd3-676e-4f4d-98b1-22ac0b964a1e", + "uuid": "5a7d2367-1b69-40e8-acc9-a957a01df8b0", "control-id": "cis_rhel10_6-3.3.2", "description": "No notes for control-id 6.3.3.2.", "props": [ @@ -25506,7 +25506,7 @@ ] }, { - "uuid": "97f6485f-1614-4a58-839a-c28008832a90", + "uuid": "385e8155-b4a0-4ffa-a697-49a3cf047b23", "control-id": "cis_rhel10_6-3.3.3", "description": "No notes for control-id 6.3.3.3.", "props": [ @@ -25523,7 +25523,7 @@ ] }, { - "uuid": "020fca9c-3153-40d2-9fbb-e10201de9c78", + "uuid": "489f18cf-821e-49a7-9550-5c895e5aa2e5", "control-id": "cis_rhel10_6-3.3.4", "description": "No notes for control-id 6.3.3.4.", "props": [ @@ -25555,7 +25555,7 @@ ] }, { - "uuid": "e69a6ca6-87d6-4836-98dd-580a5a302581", + "uuid": "8da70956-7c06-4822-a452-a3bab0e39129", "control-id": "cis_rhel10_6-3.3.5", "description": "No notes for control-id 6.3.3.5.", "props": [ @@ -25577,7 +25577,7 @@ ] }, { - "uuid": "1229866d-0433-48a8-ae51-fc9ae2b4fbf0", + "uuid": "d3acccc1-c0f0-4687-b4b5-5df9398e292d", "control-id": "cis_rhel10_6-3.3.6", "description": "No notes for control-id 6.3.3.6.", "props": [ @@ -25599,7 +25599,7 @@ ] }, { - "uuid": "7dd21029-e5b3-4b71-bc8e-829a0465cd94", + "uuid": "e7c41229-e628-4a3d-8418-c0eb2a1ddba4", "control-id": "cis_rhel10_6-3.3.7", "description": "No notes for control-id 6.3.3.7.", "props": [ @@ -25621,7 +25621,7 @@ ] }, { - "uuid": "c278a892-a7ca-4ffd-999b-5b07e85a557b", + "uuid": "84bb682b-9c11-494a-9747-93583d625b0e", "control-id": "cis_rhel10_6-3.3.8", "description": "No notes for control-id 6.3.3.8.", "props": [ @@ -25643,7 +25643,7 @@ ] }, { - "uuid": "593800b9-dd9f-4f59-bb40-12df28b2e6f9", + "uuid": "78f25ff6-f7a1-4f01-bad7-dbb5b747218b", "control-id": "cis_rhel10_6-3.3.9", "description": "No notes for control-id 6.3.3.9.", "props": [ @@ -25660,7 +25660,7 @@ ] }, { - "uuid": "1afee28e-5022-4579-9156-efc7b22de378", + "uuid": "64e55f26-58a2-4c8f-8528-a5bd33c0f1e8", "control-id": "cis_rhel10_6-3.3.10", "description": "No notes for control-id 6.3.3.10.", "props": [ @@ -25677,7 +25677,7 @@ ] }, { - "uuid": "16cce4ed-433c-4ee6-9e4a-f422a72ca283", + "uuid": "b530f33a-ffe7-4232-93bf-f1cf15392833", "control-id": "cis_rhel10_6-3.3.11", "description": "No notes for control-id 6.3.3.11.", "props": [ @@ -25714,7 +25714,7 @@ ] }, { - "uuid": "ace4e770-97c5-4d01-81db-2e0da4db5d22", + "uuid": "fc33bac9-42d8-43c4-aad5-ddb0c7971a01", "control-id": "cis_rhel10_6-3.3.12", "description": "No notes for control-id 6.3.3.12.", "props": [ @@ -25731,7 +25731,7 @@ ] }, { - "uuid": "2f718235-e5e6-4550-8dda-bd710afd808e", + "uuid": "b7268a2f-ab42-4287-a49d-14a1cd280c30", "control-id": "cis_rhel10_6-3.3.13", "description": "No notes for control-id 6.3.3.13.", "props": [ @@ -25748,7 +25748,7 @@ ] }, { - "uuid": "7a907355-1b36-4fee-b7bf-eae07d480575", + "uuid": "1cfb3cf8-6a95-4636-813f-5c280f321299", "control-id": "cis_rhel10_6-3.3.14", "description": "No notes for control-id 6.3.3.14.", "props": [ @@ -25770,7 +25770,7 @@ ] }, { - "uuid": "aa2000df-ad5a-4072-b95d-242acafd8503", + "uuid": "4d0c5794-e70c-4c44-bd61-022ea6cb0bbe", "control-id": "cis_rhel10_6-3.3.15", "description": "No notes for control-id 6.3.3.15.", "props": [ @@ -25787,7 +25787,7 @@ ] }, { - "uuid": "dbded92f-2637-4c96-bf5d-2df106884ccf", + "uuid": "d7c203df-4735-4f51-99cc-e8f0e463a516", "control-id": "cis_rhel10_6-3.3.16", "description": "No notes for control-id 6.3.3.16.", "props": [ @@ -25804,7 +25804,7 @@ ] }, { - "uuid": "afeed469-a179-4c7e-b4ff-c45f1bedaa2e", + "uuid": "678be193-4f76-41bc-88bb-e869e51cd9c5", "control-id": "cis_rhel10_6-3.3.17", "description": "No notes for control-id 6.3.3.17.", "props": [ @@ -25826,7 +25826,7 @@ ] }, { - "uuid": "b8da60b9-9461-4780-aea2-13514d8a5222", + "uuid": "326a2b22-c442-491f-8765-922db7c41a6c", "control-id": "cis_rhel10_6-3.3.18", "description": "No notes for control-id 6.3.3.18.", "props": [ @@ -25858,7 +25858,7 @@ ] }, { - "uuid": "158c9183-a218-40e3-ac6d-c4ee30ec2f92", + "uuid": "053890d7-2b17-47b6-b886-5af4f3e1a15d", "control-id": "cis_rhel10_6-3.3.19", "description": "No notes for control-id 6.3.3.19.", "props": [ @@ -25890,7 +25890,7 @@ ] }, { - "uuid": "05ce9458-84e4-4379-b342-5a2a405ecfb9", + "uuid": "eb3b4f68-abed-4353-b513-21e21522ac67", "control-id": "cis_rhel10_6-3.3.20", "description": "No notes for control-id 6.3.3.20.", "props": [ @@ -25932,7 +25932,7 @@ ] }, { - "uuid": "afca8c52-4e17-4710-b570-c6a066e2627b", + "uuid": "e9f73a81-3f9d-4c3b-a100-13f02af54b27", "control-id": "cis_rhel10_6-3.3.21", "description": "No notes for control-id 6.3.3.21.", "props": [ @@ -25949,7 +25949,7 @@ ] }, { - "uuid": "b647e004-4064-470b-81d1-9fb626e6c6cd", + "uuid": "c6d9ab72-94a9-4cab-bedb-7fe5526e075a", "control-id": "cis_rhel10_6-3.3.22", "description": "No notes for control-id 6.3.3.22.", "props": [ @@ -25976,7 +25976,7 @@ ] }, { - "uuid": "a801cb15-d16e-40fd-bd2d-98e7a853b9bb", + "uuid": "a21db416-2529-4a22-a49e-a802518ce8ca", "control-id": "cis_rhel10_6-3.3.23", "description": "No notes for control-id 6.3.3.23.", "props": [ @@ -25998,7 +25998,7 @@ ] }, { - "uuid": "77728150-b40c-4992-b285-45509193e5ca", + "uuid": "50f845ee-8c54-4bc4-b161-8a597de7c39e", "control-id": "cis_rhel10_6-3.3.24", "description": "No notes for control-id 6.3.3.24.", "props": [ @@ -26020,7 +26020,7 @@ ] }, { - "uuid": "a9d2fc64-0a11-4f07-925a-1c72487a2c6c", + "uuid": "729749f7-b836-4169-8286-0520e7b3bf2f", "control-id": "cis_rhel10_6-3.3.25", "description": "No notes for control-id 6.3.3.25.", "props": [ @@ -26047,7 +26047,7 @@ ] }, { - "uuid": "d0ff44b5-fd56-4d37-b2f1-e4e2bef6d892", + "uuid": "6c844571-6de1-480c-a926-a36bc2b4111f", "control-id": "cis_rhel10_6-3.3.26", "description": "No notes for control-id 6.3.3.26.", "props": [ @@ -26069,7 +26069,7 @@ ] }, { - "uuid": "c55bae35-f5f0-4083-958a-a526096c2dee", + "uuid": "ff3c959f-04ea-41df-9074-ad2f3c904425", "control-id": "cis_rhel10_6-3.3.27", "description": "No notes for control-id 6.3.3.27.", "props": [ @@ -26086,7 +26086,7 @@ ] }, { - "uuid": "28c064ed-fc80-4b54-95a4-a43ea98995e3", + "uuid": "9050157e-a632-4649-961b-fdd653e5041e", "control-id": "cis_rhel10_6-3.3.28", "description": "No notes for control-id 6.3.3.28.", "props": [ @@ -26103,7 +26103,7 @@ ] }, { - "uuid": "0c33aac6-7315-4d56-b56e-6b9ee8cf8f95", + "uuid": "1c5aebef-15dd-448f-bb60-0977f061cc65", "control-id": "cis_rhel10_6-3.3.29", "description": "No notes for control-id 6.3.3.29.", "props": [ @@ -26120,7 +26120,7 @@ ] }, { - "uuid": "aeb20c11-7562-4283-8fdf-9a28d467966b", + "uuid": "66be89e6-1b05-488c-a5f6-9a66d67098a8", "control-id": "cis_rhel10_6-3.3.30", "description": "No notes for control-id 6.3.3.30.", "props": [ @@ -26137,7 +26137,7 @@ ] }, { - "uuid": "ed237671-70f3-4064-8fcf-8d00afa61ad3", + "uuid": "3259dc07-b947-4bb6-84e1-539c5ca6fa34", "control-id": "cis_rhel10_6-3.3.31", "description": "No notes for control-id 6.3.3.31.", "props": [ @@ -26154,7 +26154,7 @@ ] }, { - "uuid": "b6d478d6-2138-40d0-9db2-942aed787860", + "uuid": "f27dc512-5e45-4f45-ae80-0ee6f77233be", "control-id": "cis_rhel10_6-3.3.32", "description": "No notes for control-id 6.3.3.32.", "props": [ @@ -26176,7 +26176,7 @@ ] }, { - "uuid": "8c8a53ba-3799-47be-8edc-17c9985a0665", + "uuid": "ceaed706-c5e4-48d6-b838-3271b5f3e07b", "control-id": "cis_rhel10_6-3.3.33", "description": "No notes for control-id 6.3.3.33.", "props": [ @@ -26193,7 +26193,7 @@ ] }, { - "uuid": "c522a239-132d-4617-a7b0-876e6df3a228", + "uuid": "b5ffa3b7-aedb-401f-8e4f-c84955e2c255", "control-id": "cis_rhel10_6-3.3.34", "description": "No notes for control-id 6.3.3.34.", "props": [ @@ -26210,7 +26210,7 @@ ] }, { - "uuid": "de0aebad-d028-47f3-88e7-e8e6e979cab6", + "uuid": "1db16953-c64a-41fc-97dc-b454f4f135d8", "control-id": "cis_rhel10_6-3.3.35", "description": "No notes for control-id 6.3.3.35.", "props": [ @@ -26227,7 +26227,7 @@ ] }, { - "uuid": "c258fab0-ea39-4210-85e7-23a6123ffd40", + "uuid": "6cf5c10f-b439-40de-95a7-83346349cd40", "control-id": "cis_rhel10_6-3.3.36", "description": "No notes for control-id 6.3.3.36.", "props": [ @@ -26244,7 +26244,7 @@ ] }, { - "uuid": "d3c6e3b5-bfce-438a-ad9d-64b33a317177", + "uuid": "d490770e-3154-497b-9c0d-e4adc3f13a27", "control-id": "cis_rhel10_6-3.3.37", "description": "The description for control-id cis_rhel10_6-3.3.37.", "props": [ @@ -26257,7 +26257,7 @@ ] }, { - "uuid": "d79e920e-8463-410d-b51d-f979f9773778", + "uuid": "a5cee228-b085-4317-8f41-23b095b2305a", "control-id": "cis_rhel10_6-3.4.1", "description": "No notes for control-id 6.3.4.1.", "props": [ @@ -26274,7 +26274,7 @@ ] }, { - "uuid": "7a436e02-815d-4bde-b322-8cf39be008b8", + "uuid": "22fe5919-f868-475c-961e-33dab318c800", "control-id": "cis_rhel10_6-3.4.2", "description": "No notes for control-id 6.3.4.2.", "props": [ @@ -26291,7 +26291,7 @@ ] }, { - "uuid": "8dab5699-e5c5-499b-b185-4de34946bce1", + "uuid": "f67a5a33-f724-4a82-b5db-289fd945a62a", "control-id": "cis_rhel10_6-3.4.3", "description": "No notes for control-id 6.3.4.3.", "props": [ @@ -26308,7 +26308,7 @@ ] }, { - "uuid": "13a2c29e-f082-412f-baa8-d6d22729b919", + "uuid": "dfa5b83e-1eed-4de8-87a8-7883b8682059", "control-id": "cis_rhel10_6-3.4.4", "description": "No notes for control-id 6.3.4.4.", "props": [ @@ -26325,7 +26325,7 @@ ] }, { - "uuid": "095a892c-9124-4ef1-866a-6d4ef38afe5f", + "uuid": "b49724df-8160-4e4d-bdda-ae147d6cbfdb", "control-id": "cis_rhel10_6-3.4.5", "description": "No notes for control-id 6.3.4.5.", "props": [ @@ -26342,7 +26342,7 @@ ] }, { - "uuid": "dde90d89-2f98-46a0-a8a8-6ae5db781de4", + "uuid": "3d5b1d42-1d7a-44a0-addf-188c5bc86cf3", "control-id": "cis_rhel10_6-3.4.6", "description": "No notes for control-id 6.3.4.6.", "props": [ @@ -26359,7 +26359,7 @@ ] }, { - "uuid": "83b95bec-940a-48e0-ac94-85561b35b182", + "uuid": "5973ac04-4818-4ee8-be80-9b3129cc7a7b", "control-id": "cis_rhel10_6-3.4.7", "description": "No notes for control-id 6.3.4.7.", "props": [ @@ -26376,7 +26376,7 @@ ] }, { - "uuid": "3a0fb95e-c1e0-4449-a70c-f2acb63aac5c", + "uuid": "abf0209d-79a4-4074-a003-bf65a01ee83c", "control-id": "cis_rhel10_6-3.4.8", "description": "No notes for control-id 6.3.4.8.", "props": [ @@ -26393,7 +26393,7 @@ ] }, { - "uuid": "6876e8ef-820d-4b9f-9ea5-a013688c6810", + "uuid": "d33957a8-7b53-4402-a26c-ab608588c994", "control-id": "cis_rhel10_6-3.4.9", "description": "No notes for control-id 6.3.4.9.", "props": [ @@ -26410,7 +26410,7 @@ ] }, { - "uuid": "68276fa9-06e1-4fb3-a661-f40aa9753c3d", + "uuid": "ed452fd6-0908-4774-acdf-18f8e5d0fd29", "control-id": "cis_rhel10_6-3.4.10", "description": "No notes for control-id 6.3.4.10.", "props": [ @@ -26427,7 +26427,7 @@ ] }, { - "uuid": "6273d44d-0f33-480e-bf53-5937fd34dbd0", + "uuid": "3e7e5e34-ce71-4b98-8ae3-0c633fa8baab", "control-id": "reload_dconf_db", "description": "This is a helper rule to reload Dconf database correctly.", "props": [ @@ -26444,7 +26444,7 @@ ] }, { - "uuid": "b8607932-816d-418c-a046-3540eddeec46", + "uuid": "62105a9e-107d-4c16-b3ad-47a37e2e17b3", "control-id": "cis_rhel10_1-1.1.1", "description": "No notes for control-id 1.1.1.1.", "props": [ @@ -26461,7 +26461,7 @@ ] }, { - "uuid": "3512e7e3-5ec1-4c16-bf8c-577609cef78f", + "uuid": "3b1e8847-3c66-437c-9eac-e090a069da7c", "control-id": "cis_rhel10_1-1.1.2", "description": "No notes for control-id 1.1.1.2.", "props": [ @@ -26478,7 +26478,7 @@ ] }, { - "uuid": "645b7db8-6ae4-4fae-9750-4c01014296d1", + "uuid": "c97e8005-3224-4d9d-b70c-220bea1b95d4", "control-id": "cis_rhel10_1-1.1.3", "description": "No notes for control-id 1.1.1.3.", "props": [ @@ -26495,7 +26495,7 @@ ] }, { - "uuid": "d64b6055-7ef1-44a4-a48e-3f1863c513ad", + "uuid": "8d0a63ad-65df-4fd0-bca6-19941f68b948", "control-id": "cis_rhel10_1-1.1.4", "description": "No notes for control-id 1.1.1.4.", "props": [ @@ -26512,7 +26512,7 @@ ] }, { - "uuid": "32527028-7b49-4f4f-8486-23b5df0eae67", + "uuid": "d72e1494-3cbe-4e8c-b178-1a7450e49422", "control-id": "cis_rhel10_1-1.1.5", "description": "No notes for control-id 1.1.1.5.", "props": [ @@ -26529,7 +26529,7 @@ ] }, { - "uuid": "36bdff02-236f-4fe7-9e7a-7b06ceb5adf4", + "uuid": "ea4ea8d1-c0f5-4a03-aabf-5ac87759fb05", "control-id": "cis_rhel10_1-1.1.11", "description": "The description for control-id cis_rhel10_1-1.1.11.", "props": [ @@ -26542,7 +26542,7 @@ ] }, { - "uuid": "d035c004-ea74-48ce-b09d-210724d73397", + "uuid": "b641d851-9d1a-4d1a-8545-ce9fb59402ed", "control-id": "cis_rhel10_1-1.2.1.1", "description": "No notes for control-id 1.1.2.1.1.", "props": [ @@ -26559,7 +26559,7 @@ ] }, { - "uuid": "db6117b0-5306-49a1-966a-30b108f1534f", + "uuid": "a48fbd76-a64d-451b-9be6-0d39db51bb07", "control-id": "cis_rhel10_1-1.2.1.2", "description": "No notes for control-id 1.1.2.1.2.", "props": [ @@ -26576,7 +26576,7 @@ ] }, { - "uuid": "44aa54fa-9af1-4561-a303-a5736c4d24e9", + "uuid": "b323edfb-3e39-4bbb-9adb-d69e272ceca8", "control-id": "cis_rhel10_1-1.2.1.3", "description": "No notes for control-id 1.1.2.1.3.", "props": [ @@ -26593,7 +26593,7 @@ ] }, { - "uuid": "7170ccb9-a280-4770-b938-24a0a7057b3f", + "uuid": "c7f65fe2-4449-4d7c-b5ed-c62ad98e1ea7", "control-id": "cis_rhel10_1-1.2.1.4", "description": "No notes for control-id 1.1.2.1.4.", "props": [ @@ -26610,7 +26610,7 @@ ] }, { - "uuid": "1eedbd43-a172-4775-b87c-f2208506d3c4", + "uuid": "8edb40bb-9421-4102-a49c-07110f59b926", "control-id": "cis_rhel10_1-1.2.2.1", "description": "No notes for control-id 1.1.2.2.1.", "props": [ @@ -26627,7 +26627,7 @@ ] }, { - "uuid": "66337eed-39d3-4b39-b269-fbe76bd7fcc5", + "uuid": "0fa39841-57d1-4300-8ddb-03f6d2caf912", "control-id": "cis_rhel10_1-1.2.2.2", "description": "No notes for control-id 1.1.2.2.2.", "props": [ @@ -26644,7 +26644,7 @@ ] }, { - "uuid": "91b466b9-96d7-444b-97aa-c6e47ec6fa67", + "uuid": "49d8bf5a-9902-46f8-8d92-429891c0d2f9", "control-id": "cis_rhel10_1-1.2.2.3", "description": "No notes for control-id 1.1.2.2.3.", "props": [ @@ -26661,7 +26661,7 @@ ] }, { - "uuid": "967c9518-9588-459a-a962-05bead6c7d88", + "uuid": "ebb77de3-f0bc-4e47-b212-974e33a15af8", "control-id": "cis_rhel10_1-1.2.2.4", "description": "No notes for control-id 1.1.2.2.4.", "props": [ @@ -26678,7 +26678,7 @@ ] }, { - "uuid": "b6f62acf-5cd7-4dea-9596-a72267cee3ab", + "uuid": "55aa831c-9c47-4db9-a8bd-397f3bc52f56", "control-id": "cis_rhel10_1-1.2.3.2", "description": "No notes for control-id 1.1.2.3.2.", "props": [ @@ -26695,7 +26695,7 @@ ] }, { - "uuid": "f9c0de99-1d6f-4668-abcf-6eaf7d10a86e", + "uuid": "99110621-4a15-47c7-904c-fa0f70a18741", "control-id": "cis_rhel10_1-1.2.3.3", "description": "No notes for control-id 1.1.2.3.3.", "props": [ @@ -26712,7 +26712,7 @@ ] }, { - "uuid": "6f356ef5-4e00-4629-a855-d56bbc7d63ab", + "uuid": "83c0e75c-3bbf-441e-af53-6f2bcaec2f0d", "control-id": "cis_rhel10_1-1.2.4.2", "description": "No notes for control-id 1.1.2.4.2.", "props": [ @@ -26729,7 +26729,7 @@ ] }, { - "uuid": "03567dc6-7b13-4326-970a-bb1ab035dbf9", + "uuid": "a1cddfc6-b89b-4548-93db-dee2763ef1e6", "control-id": "cis_rhel10_1-1.2.4.3", "description": "No notes for control-id 1.1.2.4.3.", "props": [ @@ -26746,7 +26746,7 @@ ] }, { - "uuid": "05cc198c-5dd6-4871-8e06-59f7c9942315", + "uuid": "8cb299cb-eb14-41d6-aa92-7988bf9540ca", "control-id": "cis_rhel10_1-1.2.5.2", "description": "No notes for control-id 1.1.2.5.2.", "props": [ @@ -26763,7 +26763,7 @@ ] }, { - "uuid": "9f884da0-db12-457f-9f49-fc009d834f41", + "uuid": "ee8e91d9-5d8c-4a6c-acd8-f9f0af19f599", "control-id": "cis_rhel10_1-1.2.5.3", "description": "No notes for control-id 1.1.2.5.3.", "props": [ @@ -26780,7 +26780,7 @@ ] }, { - "uuid": "ab3c73d4-2f05-4b63-b920-1f46fd2f70e0", + "uuid": "f66cdb95-feb2-4345-8eb0-a1f6716d6de8", "control-id": "cis_rhel10_1-1.2.5.4", "description": "No notes for control-id 1.1.2.5.4.", "props": [ @@ -26797,7 +26797,7 @@ ] }, { - "uuid": "3285c1f5-a179-458c-a789-9060ae5e73ac", + "uuid": "bf355fbe-e5fc-4750-9e1a-532a80d9fc7d", "control-id": "cis_rhel10_1-1.2.6.2", "description": "No notes for control-id 1.1.2.6.2.", "props": [ @@ -26814,7 +26814,7 @@ ] }, { - "uuid": "1a2f4729-6d51-4013-acb4-62aabe485bf3", + "uuid": "a0b78c87-fde1-481a-aff3-dff0d7ee5f0b", "control-id": "cis_rhel10_1-1.2.6.3", "description": "No notes for control-id 1.1.2.6.3.", "props": [ @@ -26831,7 +26831,7 @@ ] }, { - "uuid": "8585cfde-5b28-4d7b-a28b-15b100a96bec", + "uuid": "e5a9e054-93b3-41cd-b054-6703b07c388b", "control-id": "cis_rhel10_1-1.2.6.4", "description": "No notes for control-id 1.1.2.6.4.", "props": [ @@ -26848,7 +26848,7 @@ ] }, { - "uuid": "46f9c532-8f46-4aa2-9275-91fca68fcf7e", + "uuid": "4b5c2872-4288-459e-8f20-639e77e7e4a1", "control-id": "cis_rhel10_1-1.2.7.2", "description": "No notes for control-id 1.1.2.7.2.", "props": [ @@ -26865,7 +26865,7 @@ ] }, { - "uuid": "ed0b325d-91b1-432d-ba5c-008e05fa081e", + "uuid": "3c0dd46f-87ee-40cb-a550-7c335ced28bf", "control-id": "cis_rhel10_1-1.2.7.3", "description": "No notes for control-id 1.1.2.7.3.", "props": [ @@ -26882,7 +26882,7 @@ ] }, { - "uuid": "ca5d4d89-261d-4d56-a948-535de3a04717", + "uuid": "62172131-44d1-43c9-bd0b-1f01fefb56d9", "control-id": "cis_rhel10_1-1.2.7.4", "description": "No notes for control-id 1.1.2.7.4.", "props": [ @@ -26899,7 +26899,7 @@ ] }, { - "uuid": "99a29264-113d-4156-ad9e-ed566e5635f5", + "uuid": "880fbaa0-b498-4db3-bc8c-938fc13c2dc1", "control-id": "cis_rhel10_1-2.1.1", "description": "The description for control-id cis_rhel10_1-2.1.1.", "props": [ @@ -26912,7 +26912,7 @@ ] }, { - "uuid": "116a0ad3-da64-462e-9751-0353c6b7964a", + "uuid": "962b6bb7-4d43-46c6-b9be-13ef77df675c", "control-id": "cis_rhel10_1-2.1.2", "description": "No notes for control-id 1.2.1.2.", "props": [ @@ -26929,7 +26929,7 @@ ] }, { - "uuid": "6fc95db2-ced5-48f7-8fcf-b7762992ec19", + "uuid": "bda5e6df-4ee6-4c61-9256-fdde7222fad1", "control-id": "cis_rhel10_1-2.1.4", "description": "The description for control-id cis_rhel10_1-2.1.4.", "props": [ @@ -26942,7 +26942,7 @@ ] }, { - "uuid": "5fad4a9d-3d2c-4f3b-a612-caaa60dfd947", + "uuid": "3e0f6c34-e7a1-4f7c-84ed-c78005da0148", "control-id": "cis_rhel10_1-2.2.1", "description": "The description for control-id cis_rhel10_1-2.2.1.", "props": [ @@ -26955,7 +26955,7 @@ ] }, { - "uuid": "dafee920-e1a8-45b7-acbc-0f5ffca8bd85", + "uuid": "99bba670-4e80-498a-9f5f-43a0c1ab7497", "control-id": "cis_rhel10_1-3.1.1", "description": "No notes for control-id 1.3.1.1.", "props": [ @@ -26972,7 +26972,7 @@ ] }, { - "uuid": "b8a13b0a-e6e1-42c4-81c9-e677b659e9a7", + "uuid": "6a2f53a1-9faa-46fa-aa77-559e086a76c9", "control-id": "cis_rhel10_1-3.1.2", "description": "No notes for control-id 1.3.1.2.", "props": [ @@ -26989,7 +26989,7 @@ ] }, { - "uuid": "9503bcb7-37b0-439e-a800-7e014fe6cfd6", + "uuid": "7812a670-ec85-494f-af32-f7524ca69ed6", "control-id": "cis_rhel10_1-3.1.3", "description": "No notes for control-id 1.3.1.3.", "props": [ @@ -27006,7 +27006,7 @@ ] }, { - "uuid": "ac9cf5a8-db67-48c6-b37b-72d2091275fa", + "uuid": "871a60a4-4f8a-4e07-ac5e-6b4f89473505", "control-id": "cis_rhel10_1-3.1.4", "description": "No notes for control-id 1.3.1.4.", "props": [ @@ -27023,7 +27023,7 @@ ] }, { - "uuid": "a1d046b2-9d12-46bd-b278-934c1952e77f", + "uuid": "c269c60d-0ebd-498c-8cde-7dd6812ee7b8", "control-id": "cis_rhel10_1-3.1.7", "description": "No notes for control-id 1.3.1.7.", "props": [ @@ -27040,7 +27040,7 @@ ] }, { - "uuid": "aeb472b9-2d0f-4e3c-a88e-c0eeecd72862", + "uuid": "4ed151e6-a909-4282-9932-713c34d7c119", "control-id": "cis_rhel10_1-4.1", "description": "There is no automated remediation for this rule and this is intentional.\nMore details in the rule description.", "props": [ @@ -27057,7 +27057,7 @@ ] }, { - "uuid": "bf245feb-8195-4cfd-9412-b2a18fb3514e", + "uuid": "9cb04d0d-30d2-4ac1-ba17-94cb3a62df7d", "control-id": "cis_rhel10_1-4.2", "description": "This requirement demands a deeper review of the rules.", "props": [ @@ -27084,7 +27084,7 @@ ] }, { - "uuid": "76ad537f-4670-46f9-80e5-f628214402b0", + "uuid": "87962109-3031-48e1-8841-188e9656d2ce", "control-id": "cis_rhel10_1-5.1", "description": "No notes for control-id 1.5.1.", "props": [ @@ -27101,7 +27101,7 @@ ] }, { - "uuid": "67908623-e80d-41ec-aef0-baa73563d76b", + "uuid": "6b728eab-4ce3-48b5-b607-4d2a12fcce4b", "control-id": "cis_rhel10_1-5.2", "description": "No notes for control-id 1.5.2.", "props": [ @@ -27118,7 +27118,7 @@ ] }, { - "uuid": "eb66556d-ff67-4de9-a846-ce6cd261635b", + "uuid": "645ebf1a-8222-4af7-b1a9-532e1c945a94", "control-id": "cis_rhel10_1-5.4", "description": "No notes for control-id 1.5.4.", "props": [ @@ -27135,7 +27135,7 @@ ] }, { - "uuid": "efdadaae-286a-47b2-ae37-b63acf58ddcb", + "uuid": "48178ac2-4433-4fc4-8de3-0a71a51bf51f", "control-id": "cis_rhel10_1-5.5", "description": "No notes for control-id 1.5.5.", "props": [ @@ -27152,7 +27152,7 @@ ] }, { - "uuid": "e79abf28-8663-42d0-8b05-369df3767857", + "uuid": "720e1f4c-d25e-4826-9356-eefe419e7421", "control-id": "cis_rhel10_1-5.6", "description": "No notes for control-id 1.5.6.", "props": [ @@ -27169,7 +27169,7 @@ ] }, { - "uuid": "8f9e0dc1-07b9-479f-ad14-84fd3817d6fc", + "uuid": "bcefd86e-db20-4a35-ad66-3bb953d94bcc", "control-id": "cis_rhel10_1-5.7", "description": "No notes for control-id 1.5.7.", "props": [ @@ -27186,7 +27186,7 @@ ] }, { - "uuid": "6ff43c09-907d-484a-8b15-543733fe82fa", + "uuid": "68121389-5376-420c-9050-5ffb87405998", "control-id": "cis_rhel10_1-5.8", "description": "Address Space Layout Randomization (ASLR)", "props": [ @@ -27203,7 +27203,7 @@ ] }, { - "uuid": "a611c2ac-dbed-49ee-8703-27a019cfa988", + "uuid": "ee0ff6bd-432a-4bb8-939a-b342ac1222a0", "control-id": "cis_rhel10_1-5.9", "description": "No notes for control-id 1.5.9.", "props": [ @@ -27220,7 +27220,7 @@ ] }, { - "uuid": "cbf119aa-50f4-498f-a250-f2e4a7261571", + "uuid": "6902d560-1e0f-488b-87e3-73bb3d5d9d8f", "control-id": "cis_rhel10_1-5.10", "description": "No notes for control-id 1.5.10.", "props": [ @@ -27237,7 +27237,7 @@ ] }, { - "uuid": "48aa4d3e-f08e-4a5a-85f0-0a6d35699fb6", + "uuid": "f8e205e7-348c-4245-9bf6-62af3f22b24a", "control-id": "cis_rhel10_1-6.1", "description": "No notes for control-id 1.6.1.", "props": [ @@ -27254,7 +27254,7 @@ ] }, { - "uuid": "556d6a40-d1e5-4836-b5ca-b03a759e8e40", + "uuid": "7d2ad889-4b1c-425d-8aaf-9f0f8cc0856b", "control-id": "cis_rhel10_1-6.2", "description": "No notes for control-id 1.6.2.", "props": [ @@ -27271,7 +27271,7 @@ ] }, { - "uuid": "a5be29ba-3d89-4013-b67e-170ef04a3324", + "uuid": "90353d3f-18ec-44bd-9d16-426046916927", "control-id": "cis_rhel10_1-6.3", "description": "No notes for control-id 1.6.3.", "props": [ @@ -27288,7 +27288,7 @@ ] }, { - "uuid": "2cce4738-7021-41c2-91d1-62c9052521e1", + "uuid": "17fa20ed-802e-4b9a-94de-fd3e4dfd5278", "control-id": "cis_rhel10_1-6.4", "description": "No notes for control-id 1.6.4.", "props": [ @@ -27305,7 +27305,7 @@ ] }, { - "uuid": "56424d58-148e-408f-95ba-75f8ee3e429a", + "uuid": "180b6e4e-b112-468d-9e15-b1312a927111", "control-id": "cis_rhel10_1-7.1", "description": "No notes for control-id 1.7.1.", "props": [ @@ -27322,7 +27322,7 @@ ] }, { - "uuid": "96b6a8d0-8587-4410-9b9f-83c0eae9581e", + "uuid": "425d2504-af4b-460e-89f3-ef864dc779eb", "control-id": "cis_rhel10_1-7.2", "description": "No notes for control-id 1.7.2.", "props": [ @@ -27339,7 +27339,7 @@ ] }, { - "uuid": "0ade1eb5-5abf-45cd-bcc2-756a12cf3dbb", + "uuid": "8547d74f-1d43-4a61-8252-124da5ba303f", "control-id": "cis_rhel10_1-7.3", "description": "No notes for control-id 1.7.3.", "props": [ @@ -27356,7 +27356,7 @@ ] }, { - "uuid": "c515f7b4-6357-475e-9ac6-938a83e7d8dc", + "uuid": "1dfef124-aac6-4b02-8870-38dce6f72d8d", "control-id": "cis_rhel10_1-7.4", "description": "No notes for control-id 1.7.4.", "props": [ @@ -27383,7 +27383,7 @@ ] }, { - "uuid": "b9cef290-2024-42cf-936f-021ed5b0fab2", + "uuid": "2407155d-beea-4767-980a-4e02ac2bac96", "control-id": "cis_rhel10_1-7.5", "description": "No notes for control-id 1.7.5.", "props": [ @@ -27410,7 +27410,7 @@ ] }, { - "uuid": "ca623175-592b-4d3a-b5c4-3eaca9b8c264", + "uuid": "651d33f5-2aec-4720-aabd-4db404024546", "control-id": "cis_rhel10_1-7.6", "description": "No notes for control-id 1.7.6.", "props": [ @@ -27437,7 +27437,7 @@ ] }, { - "uuid": "d9e7f2d0-480a-4989-99c0-7b4e2b04c265", + "uuid": "f36db36b-b78c-4177-86bc-67b652d891c5", "control-id": "cis_rhel10_1-8.1", "description": "No notes for control-id 1.8.1.", "props": [ @@ -27459,7 +27459,7 @@ ] }, { - "uuid": "921cbcb7-c635-4a13-9f1c-ec29482cace5", + "uuid": "c556ea73-0803-472e-b0f1-12eeb79d4a7e", "control-id": "cis_rhel10_1-8.2", "description": "No notes for control-id 1.8.2.", "props": [ @@ -27476,7 +27476,7 @@ ] }, { - "uuid": "270c2ad4-7d9a-4af2-a137-2ef08a3f059a", + "uuid": "3d03544b-d9d4-4409-91e6-8d49dfea5f36", "control-id": "cis_rhel10_1-8.3", "description": "No notes for control-id 1.8.3.", "props": [ @@ -27508,7 +27508,7 @@ ] }, { - "uuid": "ee99c155-a56c-4b14-a859-aa34a22f5f63", + "uuid": "8879d30f-8f9b-4edd-9c10-4bff53f7c043", "control-id": "cis_rhel10_1-8.5", "description": "No notes for control-id 1.8.5.", "props": [ @@ -27525,7 +27525,7 @@ ] }, { - "uuid": "dc9c886d-1a94-4368-a6d1-49161bd4e5c0", + "uuid": "b12ac19e-dfa4-4bba-aabf-f851a153c111", "control-id": "cis_rhel10_2-1.4", "description": "No notes for control-id 2.1.4.", "props": [ @@ -27542,7 +27542,7 @@ ] }, { - "uuid": "4834bbee-895e-46a2-8114-20d60fd9c53c", + "uuid": "3240773d-356d-4eb2-b624-af805d1b55e2", "control-id": "cis_rhel10_2-1.5", "description": "No notes for control-id 2.1.5.", "props": [ @@ -27559,7 +27559,7 @@ ] }, { - "uuid": "d1613b1c-4828-48ee-9d1e-f2756616fb0e", + "uuid": "54baae01-e3d7-435d-93ef-faa35fe3d12e", "control-id": "cis_rhel10_2-1.6", "description": "No notes for control-id 2.1.6.", "props": [ @@ -27576,7 +27576,7 @@ ] }, { - "uuid": "12d1252a-a8b6-4fcc-b12a-50ff715d3c5c", + "uuid": "9cc206be-76f8-46f2-9899-2b12916e222a", "control-id": "cis_rhel10_2-1.7", "description": "No notes for control-id 2.1.7.", "props": [ @@ -27593,7 +27593,7 @@ ] }, { - "uuid": "27f0b16d-8c20-448f-a7c1-ee5613ce5f55", + "uuid": "fbaa16a8-b147-422a-b1de-9b62b6611497", "control-id": "cis_rhel10_2-1.8", "description": "No notes for control-id 2.1.8.", "props": [ @@ -27615,7 +27615,7 @@ ] }, { - "uuid": "a822abb9-bc3a-494e-b36d-bc971b0426af", + "uuid": "d5c18dce-bdd1-4e3f-a89d-46ba322cac1b", "control-id": "cis_rhel10_2-1.9", "description": "Many of the libvirt packages used by Enterprise Linux virtualization are dependent on the\nnfs-utils package.", "props": [ @@ -27632,7 +27632,7 @@ ] }, { - "uuid": "f7e1bd38-7fd5-40cd-bc2b-2233c697a0a1", + "uuid": "b6f9a890-e7ae-467e-b79c-5d70794dc3a8", "control-id": "cis_rhel10_2-1.11", "description": "Many of the libvirt packages used by Enterprise Linux virtualization, and the nfs-utils\npackage used for The Network File System (NFS), are dependent on the rpcbind package.", "props": [ @@ -27649,7 +27649,7 @@ ] }, { - "uuid": "54d2eb9c-9b12-4af4-a2ef-b865e24edf98", + "uuid": "9983b781-c2af-4298-80d4-796cbf6e3af5", "control-id": "cis_rhel10_2-1.12", "description": "No notes for control-id 2.1.12.", "props": [ @@ -27666,7 +27666,7 @@ ] }, { - "uuid": "40b7d655-6955-4551-9b61-d2b165126fdb", + "uuid": "be421f09-be30-4d54-acb8-a7b01295a361", "control-id": "cis_rhel10_2-1.13", "description": "No notes for control-id 2.1.13.", "props": [ @@ -27683,7 +27683,7 @@ ] }, { - "uuid": "6b68c255-ae66-44f8-8408-126ed8572b19", + "uuid": "e32296c9-b0b0-47e4-a2c5-46e422c5dd68", "control-id": "cis_rhel10_2-1.14", "description": "No notes for control-id 2.1.14.", "props": [ @@ -27700,7 +27700,7 @@ ] }, { - "uuid": "64c58d58-e716-45b3-8c9c-90efd2566fcd", + "uuid": "95cc71b5-e1ec-4cbd-94b4-b9ac3e3de522", "control-id": "cis_rhel10_2-1.15", "description": "No notes for control-id 2.1.15.", "props": [ @@ -27717,7 +27717,7 @@ ] }, { - "uuid": "b17a3148-9020-47fe-a05e-0e487e74af5b", + "uuid": "66995ef2-dd2f-4a6e-89d6-f66d6f3dba7b", "control-id": "cis_rhel10_2-1.16", "description": "No notes for control-id 2.1.16.", "props": [ @@ -27734,7 +27734,7 @@ ] }, { - "uuid": "e67b0dfd-50be-4993-93e1-1b2092439f09", + "uuid": "8a5e278b-b7c8-4825-b7aa-36dab49a92a9", "control-id": "cis_rhel10_2-1.17", "description": "No notes for control-id 2.1.17.", "props": [ @@ -27751,7 +27751,7 @@ ] }, { - "uuid": "f653e35e-5ea2-4e24-a43d-cf75a833be4d", + "uuid": "171325d9-273f-42d0-9550-562a6dfcac79", "control-id": "cis_rhel10_2-1.18", "description": "No notes for control-id 2.1.18.", "props": [ @@ -27773,7 +27773,7 @@ ] }, { - "uuid": "9ea764c0-d4ff-485e-bbd0-98ab3a7a62ec", + "uuid": "6311a807-497d-43bf-b212-c4424c18e166", "control-id": "cis_rhel10_2-1.21", "description": "No notes for control-id 2.1.21.", "props": [ @@ -27795,7 +27795,7 @@ ] }, { - "uuid": "bac26d77-e066-40b2-a140-49581058745a", + "uuid": "f1543389-1b46-403a-b894-b4e16825c260", "control-id": "cis_rhel10_2-1.22", "description": "The description for control-id cis_rhel10_2-1.22.", "props": [ @@ -27808,7 +27808,7 @@ ] }, { - "uuid": "b336aaa3-2728-4975-94a6-2c4d76ad6c22", + "uuid": "1957d29d-3b1d-4018-954f-ea48976f86fd", "control-id": "cis_rhel10_2-2.1", "description": "No notes for control-id 2.2.1.", "props": [ @@ -27825,7 +27825,7 @@ ] }, { - "uuid": "780e9c93-971f-4a64-a3f2-10a6aa8047b9", + "uuid": "f64fa5c4-13cb-4638-a51e-77a294541ad0", "control-id": "cis_rhel10_2-2.3", "description": "No notes for control-id 2.2.3.", "props": [ @@ -27842,7 +27842,7 @@ ] }, { - "uuid": "47a4f1a1-cd17-4396-abb1-b0084b6ddbcf", + "uuid": "0e1455e5-6cc9-4b86-9e01-b5562638ecea", "control-id": "cis_rhel10_2-2.4", "description": "No notes for control-id 2.2.4.", "props": [ @@ -27859,7 +27859,7 @@ ] }, { - "uuid": "e722401f-7409-4f6a-820c-4ba794852a7f", + "uuid": "f7de5f4a-1230-4861-94ac-dffc863fe092", "control-id": "cis_rhel10_2-3.1", "description": "No notes for control-id 2.3.1.", "props": [ @@ -27871,7 +27871,7 @@ ] }, { - "uuid": "33e9e9a6-543d-4914-97ff-3c20424491f8", + "uuid": "f037f090-ba08-44bf-9337-655a38985c7b", "control-id": "cis_rhel10_2-3.2", "description": "No notes for control-id 2.3.2.", "props": [ @@ -27888,7 +27888,7 @@ ] }, { - "uuid": "50f6715b-4472-4eda-8865-0628fc9a7fcb", + "uuid": "895e4214-5831-43c1-86d0-252c85fa4638", "control-id": "cis_rhel10_2-3.3", "description": "No notes for control-id 2.3.3.", "props": [ @@ -27905,7 +27905,7 @@ ] }, { - "uuid": "d17335ad-6034-4167-9e56-daed8d34fe7d", + "uuid": "3ec95881-f7a2-4d67-ba9c-16753793aa97", "control-id": "cis_rhel10_2-4.1.1", "description": "No notes for control-id 2.4.1.1.", "props": [ @@ -27927,7 +27927,7 @@ ] }, { - "uuid": "12d1b27b-42f8-41a1-9de1-b5fd5dcf21be", + "uuid": "bf04687f-12cf-4df0-949e-b86af3a4551e", "control-id": "cis_rhel10_2-4.1.2", "description": "No notes for control-id 2.4.1.2.", "props": [ @@ -27954,7 +27954,7 @@ ] }, { - "uuid": "93c36de9-2073-4d79-8792-e023c9c3820e", + "uuid": "aec49343-b68c-45d7-86c4-39f94cabc6f1", "control-id": "cis_rhel10_2-4.1.3", "description": "No notes for control-id 2.4.1.3.", "props": [ @@ -27981,7 +27981,7 @@ ] }, { - "uuid": "6b83a50c-fb4d-4bde-896b-0dddbc1eb667", + "uuid": "b93e8fc5-aaf3-47ba-9803-c91b09c70792", "control-id": "cis_rhel10_2-4.1.4", "description": "No notes for control-id 2.4.1.4.", "props": [ @@ -28008,7 +28008,7 @@ ] }, { - "uuid": "c451b018-4a71-4601-b4ed-af87cf119a85", + "uuid": "374ed0e0-eb32-422a-8365-446d2edd4ee8", "control-id": "cis_rhel10_2-4.1.5", "description": "No notes for control-id 2.4.1.5.", "props": [ @@ -28035,7 +28035,7 @@ ] }, { - "uuid": "0b68dc31-487f-40aa-8f2d-791a7cad21d3", + "uuid": "f1aa1649-7fa8-4290-b10d-ca55a8a9320a", "control-id": "cis_rhel10_2-4.1.6", "description": "No notes for control-id 2.4.1.6.", "props": [ @@ -28062,7 +28062,7 @@ ] }, { - "uuid": "2fd2603d-e025-43ad-ba90-0516c295e47a", + "uuid": "fe4a3e33-5345-40ab-a8a7-7c415e8b5013", "control-id": "cis_rhel10_2-4.1.7", "description": "No notes for control-id 2.4.1.7.", "props": [ @@ -28089,7 +28089,7 @@ ] }, { - "uuid": "2d791b0d-9155-4e4a-8bf5-80aa53395559", + "uuid": "55a22b17-6825-4210-a306-16344aa196e7", "control-id": "cis_rhel10_2-4.1.8", "description": "No notes for control-id 2.4.1.8.", "props": [ @@ -28116,7 +28116,7 @@ ] }, { - "uuid": "c8a45069-606f-4100-8b87-090884acdb1f", + "uuid": "96d3aad3-98cb-4417-9059-5c29eb6750a0", "control-id": "cis_rhel10_2-4.1.9", "description": "No notes for control-id 2.4.1.9.", "props": [ @@ -28153,7 +28153,7 @@ ] }, { - "uuid": "2ef6ef29-b853-4fbe-8115-6ba0cb695b5f", + "uuid": "38996fd2-5b50-4c36-b331-84a769f679c7", "control-id": "cis_rhel10_2-4.2.1", "description": "No notes for control-id 2.4.2.1.", "props": [ @@ -28190,7 +28190,7 @@ ] }, { - "uuid": "c70258ff-5a60-4d52-9a14-b924b52f85f6", + "uuid": "c3965dae-fc3c-44d2-bcfc-a46cb8879b85", "control-id": "cis_rhel10_3-1.1", "description": "The description for control-id cis_rhel10_3-1.1.", "props": [ @@ -28203,7 +28203,7 @@ ] }, { - "uuid": "7046ebef-0de9-4ba1-8f66-773c18ed9552", + "uuid": "3b4c48da-f5e7-4ca8-b5a2-6bd2bcb9d9d0", "control-id": "cis_rhel10_3-2.1", "description": "No notes for control-id 3.2.1.", "props": [ @@ -28220,7 +28220,7 @@ ] }, { - "uuid": "f464adb0-12cd-425d-96ac-71d9dad8c583", + "uuid": "223c8df7-aaac-4c24-94a2-e04ae288739a", "control-id": "cis_rhel10_3-2.2", "description": "No notes for control-id 3.2.2.", "props": [ @@ -28237,7 +28237,7 @@ ] }, { - "uuid": "6dce253c-f4d5-465b-a00d-2786ad32a892", + "uuid": "92469dff-c395-41d4-a5e6-464fa8d39d71", "control-id": "cis_rhel10_3-2.3", "description": "No notes for control-id 3.2.3.", "props": [ @@ -28254,7 +28254,7 @@ ] }, { - "uuid": "5e3354da-cf98-4168-8332-0be1df5f809e", + "uuid": "6ab47c14-0678-4cb6-8c01-fceb98e5dbbc", "control-id": "cis_rhel10_3-2.4", "description": "No notes for control-id 3.2.4.", "props": [ @@ -28271,7 +28271,7 @@ ] }, { - "uuid": "a2f1aadb-1dd8-441f-83de-5b2750774352", + "uuid": "6afa6e34-781e-441d-8e53-b323f8590b4a", "control-id": "cis_rhel10_3-2.5", "description": "No notes for control-id 3.2.5.", "props": [ @@ -28288,7 +28288,7 @@ ] }, { - "uuid": "fdf4e24a-7fbd-40af-ab88-e7e93d75dbfc", + "uuid": "ec7fd866-e239-4423-b981-bd50b3e8de99", "control-id": "cis_rhel10_3-2.6", "description": "No notes for control-id 3.2.6.", "props": [ @@ -28305,7 +28305,7 @@ ] }, { - "uuid": "a85e1417-a7d3-4e62-bac1-f5076772a086", + "uuid": "2e0e7bfc-e956-4a18-8fe0-997d0e597477", "control-id": "cis_rhel10_3-3.1.1", "description": "No notes for control-id 3.3.1.1.", "props": [ @@ -28322,7 +28322,7 @@ ] }, { - "uuid": "73cf2fec-61b1-4499-aa2b-6fc4ac52270a", + "uuid": "1000d10d-e2b5-41ce-b5a6-9ae266726908", "control-id": "cis_rhel10_3-3.1.2", "description": "No notes for control-id 3.3.1.2.", "props": [ @@ -28339,7 +28339,7 @@ ] }, { - "uuid": "8f3d62d2-48a6-4a3c-a1fc-b5458a6e87da", + "uuid": "95b6928e-19fc-4219-984d-6ac35a17f6fc", "control-id": "cis_rhel10_3-3.1.3", "description": "No notes for control-id 3.3.1.3.", "props": [ @@ -28356,7 +28356,7 @@ ] }, { - "uuid": "31e5506e-70fc-471c-93c3-ee1492416727", + "uuid": "2f6e0517-3b9b-43d5-824c-ce4d71e16991", "control-id": "cis_rhel10_3-3.1.4", "description": "No notes for control-id 3.3.1.4.", "props": [ @@ -28373,7 +28373,7 @@ ] }, { - "uuid": "d42cd9a4-4345-4366-9d81-d865d99e31f2", + "uuid": "4457f7b0-120b-4947-bc33-22b8bfb77134", "control-id": "cis_rhel10_3-3.1.5", "description": "No notes for control-id 3.3.1.5.", "props": [ @@ -28390,7 +28390,7 @@ ] }, { - "uuid": "c6331412-4a0e-4746-9ae6-6081160c30ee", + "uuid": "137eac79-4713-47f1-8d8d-f36b0c224c94", "control-id": "cis_rhel10_3-3.1.6", "description": "No notes for control-id 3.3.1.6.", "props": [ @@ -28407,7 +28407,7 @@ ] }, { - "uuid": "1249404d-630b-4881-a5c5-ba5a0752f84c", + "uuid": "ac7dcca2-967a-426b-8eaf-07d62a3fcde9", "control-id": "cis_rhel10_3-3.1.7", "description": "No notes for control-id 3.3.1.7.", "props": [ @@ -28424,7 +28424,7 @@ ] }, { - "uuid": "6cbea849-4d16-497c-b4ab-1e3b2c5f2612", + "uuid": "ffd77009-9e4e-4a51-9863-03ff1840bf64", "control-id": "cis_rhel10_3-3.1.8", "description": "No notes for control-id 3.3.1.8.", "props": [ @@ -28441,7 +28441,7 @@ ] }, { - "uuid": "ddc8f0a3-abac-40be-a567-fe2362d33986", + "uuid": "dfc7841b-74cc-4a85-ae4a-d123580ec8a3", "control-id": "cis_rhel10_3-3.1.9", "description": "No notes for control-id 3.3.1.9.", "props": [ @@ -28458,7 +28458,7 @@ ] }, { - "uuid": "8902f2a2-741b-43e2-97fb-4c73bbdda6a8", + "uuid": "e88213e2-bc43-4f0d-b81f-7fc2db46b124", "control-id": "cis_rhel10_3-3.1.10", "description": "No notes for control-id 3.3.1.10.", "props": [ @@ -28475,7 +28475,7 @@ ] }, { - "uuid": "b5648b00-fd11-4e91-b5f9-5df7cc961bb0", + "uuid": "e504903c-14ef-4921-9ed0-35ba6ae8bd60", "control-id": "cis_rhel10_3-3.1.11", "description": "No notes for control-id 3.3.1.11.", "props": [ @@ -28492,7 +28492,7 @@ ] }, { - "uuid": "1805e321-339b-4331-ae57-d57c3b7b753f", + "uuid": "438f1f8a-f2b0-463c-af81-daa00730b42b", "control-id": "cis_rhel10_3-3.1.12", "description": "No notes for control-id 3.3.1.12.", "props": [ @@ -28509,7 +28509,7 @@ ] }, { - "uuid": "0ed7680c-9ecc-4e20-ba02-c1accdde77e1", + "uuid": "1fad065d-f33a-42e0-b255-2bc42fbf8ce8", "control-id": "cis_rhel10_3-3.1.13", "description": "No notes for control-id 3.3.1.13.", "props": [ @@ -28526,7 +28526,7 @@ ] }, { - "uuid": "912f82e1-0e80-4ecf-817c-2f2aaf34d702", + "uuid": "1f383c48-9221-40f0-bb5a-0204a93ee0e2", "control-id": "cis_rhel10_3-3.1.14", "description": "No notes for control-id 3.3.1.14.", "props": [ @@ -28543,7 +28543,7 @@ ] }, { - "uuid": "5e6d6896-e99b-4551-87d4-c1490614e21f", + "uuid": "9f070336-052b-43d2-986f-774eed220b0c", "control-id": "cis_rhel10_3-3.1.15", "description": "No notes for control-id 3.3.1.15.", "props": [ @@ -28560,7 +28560,7 @@ ] }, { - "uuid": "448ebe15-42e2-4541-a406-6242bb474119", + "uuid": "53ee709a-66ff-4cc3-8418-f3991ef1c5b9", "control-id": "cis_rhel10_3-3.1.16", "description": "No notes for control-id 3.3.1.16.", "props": [ @@ -28577,7 +28577,7 @@ ] }, { - "uuid": "0cfc8e7b-59b7-47ff-bca3-e24fb5211dbc", + "uuid": "40a61550-7d41-43a3-86be-ac97e8bb3629", "control-id": "cis_rhel10_3-3.1.17", "description": "No notes for control-id 3.3.1.17.", "props": [ @@ -28594,7 +28594,7 @@ ] }, { - "uuid": "642ba508-3a1a-49a3-b577-7ff6622ab7ca", + "uuid": "07e04190-06e6-4ad9-9706-200406ca891f", "control-id": "cis_rhel10_3-3.1.18", "description": "No notes for control-id 3.3.1.18.", "props": [ @@ -28611,7 +28611,7 @@ ] }, { - "uuid": "3f6347d2-ec7a-41ad-8494-6304c33e251b", + "uuid": "c93816d5-e04c-4644-b037-9744c7e974c1", "control-id": "cis_rhel10_3-3.2.1", "description": "No notes for control-id 3.3.2.1.", "props": [ @@ -28628,7 +28628,7 @@ ] }, { - "uuid": "bd2a20b1-fa70-4e17-8dce-47f50874a8f0", + "uuid": "5e41fb2d-192e-47b5-a369-f885d002cfa6", "control-id": "cis_rhel10_3-3.2.2", "description": "No notes for control-id 3.3.2.2.", "props": [ @@ -28645,7 +28645,7 @@ ] }, { - "uuid": "75491daa-83f7-4187-9f7e-bac9e285b691", + "uuid": "5f1456d1-00f2-4503-b8ce-97188aa81344", "control-id": "cis_rhel10_3-3.2.3", "description": "No notes for control-id 3.3.2.3.", "props": [ @@ -28662,7 +28662,7 @@ ] }, { - "uuid": "a05f63ae-bef1-40d7-88d3-46d7b19bd42f", + "uuid": "e6722390-2806-4f59-8892-915d9f76df5a", "control-id": "cis_rhel10_3-3.2.4", "description": "No notes for control-id 3.3.2.4.", "props": [ @@ -28679,7 +28679,7 @@ ] }, { - "uuid": "4a6f958d-67e7-4794-99e5-dd32c5fd92c8", + "uuid": "2f6f9755-11ff-470a-9e54-0ec3a79ad221", "control-id": "cis_rhel10_3-3.2.5", "description": "No notes for control-id 3.3.2.5.", "props": [ @@ -28696,7 +28696,7 @@ ] }, { - "uuid": "0e92531c-33a9-4e79-82c3-ed34591cd74e", + "uuid": "3ed7a8d3-9913-4b9f-ab29-2362b4d23308", "control-id": "cis_rhel10_3-3.2.6", "description": "No notes for control-id 3.3.2.6.", "props": [ @@ -28713,7 +28713,7 @@ ] }, { - "uuid": "be4c282c-4627-4f31-b187-d708d6d9a2c7", + "uuid": "c191fbd5-7f0c-4579-88bd-2dd92f24334f", "control-id": "cis_rhel10_3-3.2.7", "description": "No notes for control-id 3.3.2.7.", "props": [ @@ -28730,7 +28730,7 @@ ] }, { - "uuid": "9eaefd9c-fc27-406c-9f3d-b2d35df2bbe4", + "uuid": "54745b00-0561-4169-9367-084532ddf6be", "control-id": "cis_rhel10_3-3.2.8", "description": "No notes for control-id 3.3.2.8.", "props": [ @@ -28747,7 +28747,7 @@ ] }, { - "uuid": "c35ed3d8-5fd2-465c-a6fd-32e80a06a304", + "uuid": "d9d02770-f1da-485c-9f6d-56a4596cc716", "control-id": "cis_rhel10_4-1.1", "description": "No notes for control-id 4.1.1.", "props": [ @@ -28764,7 +28764,7 @@ ] }, { - "uuid": "76b7171e-7209-4c5a-a761-1004a74c07fb", + "uuid": "58c06e05-ed40-4cfe-9370-0b52702f84a9", "control-id": "cis_rhel10_4-1.2", "description": "No notes for control-id 4.1.2.", "props": [ @@ -28781,7 +28781,7 @@ ] }, { - "uuid": "1b8af979-6b3d-4b52-8bea-d0d1ec155474", + "uuid": "1791b426-32bc-4b56-9db7-64cf797984ce", "control-id": "cis_rhel10_4-1.3", "description": "No notes for control-id 4.1.3.", "props": [ @@ -28798,7 +28798,7 @@ ] }, { - "uuid": "556efc34-807e-4562-b8dd-57d654c25307", + "uuid": "3688befb-5656-4f11-9096-8b6668ac404d", "control-id": "cis_rhel10_4-1.4", "description": "The description for control-id cis_rhel10_4-1.4.", "props": [ @@ -28806,12 +28806,12 @@ "name": "implementation-status", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "alternative", - "remarks": "No notes for control-id 4.1.4." + "remarks": "There is not an easy way to do this for only active zones using OVAL.\nFor now, there are are no rules for this control." } ] }, { - "uuid": "5167d454-d25a-4f9e-b0e1-a9ea936d614b", + "uuid": "fa3051cb-63be-45ec-be6d-10a133900d4b", "control-id": "cis_rhel10_4-1.5", "description": "Firewalld in Red Hat Enterprise Linux 10 accepts loopback traffic by default.", "props": [ @@ -28828,7 +28828,7 @@ ] }, { - "uuid": "140af224-a739-4442-8d12-0ae723e3ce57", + "uuid": "e40df42d-cad8-4a0d-97f4-875cd2c0238e", "control-id": "cis_rhel10_4-1.6", "description": "The description for control-id cis_rhel10_4-1.6.", "props": [ @@ -28841,7 +28841,7 @@ ] }, { - "uuid": "a4275de8-db52-48b7-b1c3-c202c306c8d1", + "uuid": "8b572fb2-5398-441d-b53a-1d820d5276da", "control-id": "cis_rhel10_4-1.7", "description": "The description for control-id cis_rhel10_4-1.7.", "props": [ @@ -28854,7 +28854,7 @@ ] }, { - "uuid": "2ab7e4f6-2f4a-49fe-a2da-98e0afb6db25", + "uuid": "71a61fb0-da6c-4876-8c43-4c0598503ccd", "control-id": "cis_rhel10_5-1.1", "description": "No notes for control-id 5.1.1.", "props": [ @@ -28911,7 +28911,7 @@ ] }, { - "uuid": "febe992f-5cc9-42e5-ac60-5a1f42a32f7f", + "uuid": "518fc976-4214-4ebd-840b-3cf126a24a96", "control-id": "cis_rhel10_5-1.2", "description": "No notes for control-id 5.1.2.", "props": [ @@ -28938,7 +28938,7 @@ ] }, { - "uuid": "7bfeb139-8aa8-4814-ba85-2ddc4e562407", + "uuid": "8e4e07fa-d802-4c2f-b961-831da3f8d067", "control-id": "cis_rhel10_5-1.3", "description": "No notes for control-id 5.1.3.", "props": [ @@ -28965,7 +28965,7 @@ ] }, { - "uuid": "3366ec70-005d-4947-9866-c0ddd7d6fd74", + "uuid": "c4e07d54-9059-458d-a0bd-3fa4e736251e", "control-id": "cis_rhel10_5-1.4", "description": "No notes for control-id 5.1.4.", "props": [ @@ -28982,7 +28982,7 @@ ] }, { - "uuid": "ebba799c-022c-40a3-aa46-5d1284227f7a", + "uuid": "189f4f60-ea02-497d-b9de-18ca320aae11", "control-id": "cis_rhel10_5-1.5", "description": "No notes for control-id 5.1.5.", "props": [ @@ -28999,7 +28999,7 @@ ] }, { - "uuid": "9f1502dc-b06f-4245-b02e-469514c5c651", + "uuid": "a624302d-f842-4be9-a4f3-73fdc6c14835", "control-id": "cis_rhel10_5-1.6", "description": "No notes for control-id 5.1.6.", "props": [ @@ -29016,7 +29016,7 @@ ] }, { - "uuid": "ed67ec09-2512-43b7-871e-9aedfffa192f", + "uuid": "9b7465d7-d35e-4a2f-b949-f0add809af39", "control-id": "cis_rhel10_5-1.7", "description": "The requirement gives an example of 45 seconds, but is flexible about the values. It is only\nnecessary to ensure there is a timeout configured in alignment to the site policy.", "props": [ @@ -29038,7 +29038,7 @@ ] }, { - "uuid": "e137aaf5-e5d7-454d-b27e-03c1ce530032", + "uuid": "3d04a5ca-3c40-4c0e-b1fc-233249d2df4a", "control-id": "cis_rhel10_5-1.8", "description": "No notes for control-id 5.1.8.", "props": [ @@ -29055,7 +29055,7 @@ ] }, { - "uuid": "a5aa48c6-847a-4f2a-9be9-6c37f113eb27", + "uuid": "155d41bf-cd89-436d-838a-67491986bc8c", "control-id": "cis_rhel10_5-1.9", "description": "No notes for control-id 5.1.9.", "props": [ @@ -29072,7 +29072,7 @@ ] }, { - "uuid": "a8503a5e-b530-47da-b222-ac8068d15ad8", + "uuid": "83f878d9-1283-48e7-85c9-f867593a9a20", "control-id": "cis_rhel10_5-1.10", "description": "No notes for control-id 5.1.10.", "props": [ @@ -29089,7 +29089,7 @@ ] }, { - "uuid": "21149e8f-1afd-4da1-91fd-69ab59f83b1b", + "uuid": "4c3e68c1-d2b4-4198-93ac-3eb4a9b01146", "control-id": "cis_rhel10_5-1.11", "description": "No notes for control-id 5.1.11.", "props": [ @@ -29106,7 +29106,7 @@ ] }, { - "uuid": "8ac07007-6104-4cb6-85de-2eebcd28e4f0", + "uuid": "ec585f58-9b48-44f1-a6ab-7a265c0d8907", "control-id": "cis_rhel10_5-1.12", "description": "The description for control-id cis_rhel10_5-1.12.", "props": [ @@ -29124,7 +29124,7 @@ ] }, { - "uuid": "e04d5659-a544-40c8-989c-c84385e44228", + "uuid": "7a70ccad-ebd6-4ee1-babf-f8d4bc2ea950", "control-id": "cis_rhel10_5-1.13", "description": "No notes for control-id 5.1.13.", "props": [ @@ -29141,7 +29141,7 @@ ] }, { - "uuid": "d8c4b841-6447-4cc2-9495-f87a32c36307", + "uuid": "7e9e42da-ff4b-4496-b6bc-443a02680aaa", "control-id": "cis_rhel10_5-1.14", "description": "The CIS benchmark is not opinionated about which loglevel is selected here. Here, this\nprofile uses VERBOSE by default, as it allows for the capture of login and logout activity\nas well as key fingerprints.", "props": [ @@ -29158,7 +29158,7 @@ ] }, { - "uuid": "6ff4e5ea-da5a-4efa-b036-c8c5d3d15697", + "uuid": "7e3d9951-a46d-4daf-af69-ceb2586f1a73", "control-id": "cis_rhel10_5-1.15", "description": "No notes for control-id 5.1.15.", "props": [ @@ -29175,7 +29175,7 @@ ] }, { - "uuid": "1a559af8-b41a-419e-83c5-1cb6f7303269", + "uuid": "7c924b91-cfe0-4a14-b303-25545996a803", "control-id": "cis_rhel10_5-1.16", "description": "No notes for control-id 5.1.16.", "props": [ @@ -29192,7 +29192,7 @@ ] }, { - "uuid": "3e404ffe-e77e-44d8-bc8a-ba6fabc3ec6c", + "uuid": "becc4c3c-450a-4146-8a55-70a33e8fe1f2", "control-id": "cis_rhel10_5-1.17", "description": "No notes for control-id 5.1.17.", "props": [ @@ -29209,7 +29209,7 @@ ] }, { - "uuid": "cb84a3d2-7ccf-44ee-9de9-146c11932164", + "uuid": "9837bd7f-8aa2-4a15-b131-7da36806cad5", "control-id": "cis_rhel10_5-1.18", "description": "No notes for control-id 5.1.18.", "props": [ @@ -29226,7 +29226,7 @@ ] }, { - "uuid": "be8a5ca9-1af5-4a60-8201-fe0d27b5acd6", + "uuid": "685d4967-adba-42ff-b56a-71ddc271274b", "control-id": "cis_rhel10_5-1.19", "description": "No notes for control-id 5.1.19.", "props": [ @@ -29243,7 +29243,7 @@ ] }, { - "uuid": "2b386adf-536d-4a8f-a3a6-80c3abfc3314", + "uuid": "c0d55441-1c68-4632-b73d-2a958af852a4", "control-id": "cis_rhel10_5-1.20", "description": "No notes for control-id 5.1.20.", "props": [ @@ -29260,7 +29260,7 @@ ] }, { - "uuid": "1ec5bb82-ce4f-4a74-94c7-0a2139fbdcee", + "uuid": "ed4717f2-3f92-4bec-a08c-81176df9aca3", "control-id": "cis_rhel10_5-1.21", "description": "No notes for control-id 5.1.21.", "props": [ @@ -29277,7 +29277,7 @@ ] }, { - "uuid": "fb76ee3d-d3d5-42f7-87bd-aa1c586d2fea", + "uuid": "e1fb65fc-2f72-4786-8c05-5f4371bf41c7", "control-id": "cis_rhel10_5-1.22", "description": "No notes for control-id 5.1.22.", "props": [ @@ -29294,7 +29294,7 @@ ] }, { - "uuid": "918e2955-340c-4a32-9a88-d126ad927df6", + "uuid": "965490c1-a6ae-4fd1-a570-7bcef4bc008d", "control-id": "cis_rhel10_5-2.1", "description": "No notes for control-id 5.2.1.", "props": [ @@ -29311,7 +29311,7 @@ ] }, { - "uuid": "d33c5929-fbb1-4ef9-bca0-2e3efe3617ca", + "uuid": "7458a6fb-2283-450f-9eae-374bdcadff3f", "control-id": "cis_rhel10_5-2.2", "description": "No notes for control-id 5.2.2.", "props": [ @@ -29328,7 +29328,7 @@ ] }, { - "uuid": "738e964c-4522-4e55-bc77-01885ca0a3b1", + "uuid": "0476e08f-398e-48ba-8d90-3062816b19c9", "control-id": "cis_rhel10_5-2.3", "description": "No notes for control-id 5.2.3.", "props": [ @@ -29345,7 +29345,7 @@ ] }, { - "uuid": "8e0d1390-6897-415d-aac7-85bed6eb40ac", + "uuid": "d7f3460c-95e4-4b34-8fb3-db1b3c2de806", "control-id": "cis_rhel10_5-2.5", "description": "No notes for control-id 5.2.5.", "props": [ @@ -29362,7 +29362,7 @@ ] }, { - "uuid": "7db6fb51-5175-4220-af2a-b6f36e21b984", + "uuid": "65ab7862-c6fb-4dee-9ad8-138c1e385616", "control-id": "cis_rhel10_5-2.6", "description": "No notes for control-id 5.2.6.", "props": [ @@ -29379,7 +29379,7 @@ ] }, { - "uuid": "79d188c1-359e-4f5d-9bba-0b1eeff37a6c", + "uuid": "2371ee3c-53c8-4bed-90da-a9d092e7f14b", "control-id": "cis_rhel10_5-2.7", "description": "Members of \"wheel\" or GID 0 groups are checked by default if the group option is not set for\npam_wheel.so module. The recommendation states the group should be empty to reinforce the\nuse of \"sudo\" for privileged access. Therefore, members of these groups should be manually\nchecked or a different group should be informed.", "props": [ @@ -29401,7 +29401,7 @@ ] }, { - "uuid": "6a8ef557-8061-4cb1-8479-49ac86234646", + "uuid": "669f6c74-bedc-4214-b457-fcf52d569d34", "control-id": "cis_rhel10_5-3.1.1", "description": "This requirement is hard to be automated without any specific requirement. The policy even\nstates that provided commands are examples, other custom settings might be in place and the\nsettings might be different depending on site policies. The other rules will already make\nsure there is a correct autheselect profile regardless of the existing settings. It is\nnecessary to better discuss with CIS Community.", "props": [ @@ -29413,7 +29413,7 @@ ] }, { - "uuid": "ee27b9ee-b4a1-4b16-96fa-6136c548b2d6", + "uuid": "7be1e4dd-81a9-40ce-8776-f54332c659c0", "control-id": "cis_rhel10_5-3.1.2", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.1.", "props": [ @@ -29435,7 +29435,7 @@ ] }, { - "uuid": "9a019f64-7e07-4dfa-96f4-91e2d971dc07", + "uuid": "e45d4bce-9004-4860-ba6b-08e86fd9667e", "control-id": "cis_rhel10_5-3.1.3", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.2.", "props": [ @@ -29462,7 +29462,7 @@ ] }, { - "uuid": "445bac5e-57fb-4356-bb57-cc474ce5d89f", + "uuid": "6ca5ea59-da56-4fdc-8e47-874be92983c6", "control-id": "cis_rhel10_5-3.1.4", "description": "The module is properly enabled by the rules mentioned in related_rules.\nRequirements in 5.3.2.3 use these rules.", "props": [ @@ -29474,7 +29474,7 @@ ] }, { - "uuid": "2710fb15-76d4-4292-acf9-be020f33d886", + "uuid": "b4a71a92-1054-46f9-ac32-7c6244e3748e", "control-id": "cis_rhel10_5-3.1.5", "description": "No notes for control-id 5.3.1.5.", "props": [ @@ -29491,7 +29491,7 @@ ] }, { - "uuid": "c194923b-dcd3-4606-98bf-613878cb205c", + "uuid": "399aab86-4840-4b7b-9eb1-b25ee04834cb", "control-id": "cis_rhel10_5-3.2.1.1", "description": "No notes for control-id 5.3.2.1.1.", "props": [ @@ -29508,7 +29508,7 @@ ] }, { - "uuid": "65c9d0af-01a1-4ac1-85b4-e7adfc70cf30", + "uuid": "e9105e4e-8eed-439a-85e3-797397e98c47", "control-id": "cis_rhel10_5-3.2.1.2", "description": "The policy also accepts value 0, which means the locked accounts should be manually unlocked\nby an administrator. However, it also mentions that using value 0 can facilitate a DoS\nattack to legitimate users.", "props": [ @@ -29525,7 +29525,7 @@ ] }, { - "uuid": "54054595-177f-4901-87fc-c04398a2cb7b", + "uuid": "7e6bf2fa-f53f-44ec-8247-0f3785635245", "control-id": "cis_rhel10_5-3.2.2.1", "description": "No notes for control-id 5.3.2.2.1.", "props": [ @@ -29542,7 +29542,7 @@ ] }, { - "uuid": "1d78d199-dbe6-427f-99bd-dd3fdbc34947", + "uuid": "bd66a694-86ea-4c34-b52b-617a16781073", "control-id": "cis_rhel10_5-3.2.2.2", "description": "No notes for control-id 5.3.2.2.2.", "props": [ @@ -29559,7 +29559,7 @@ ] }, { - "uuid": "4335a419-7e80-470a-8d74-ac7b898a1b34", + "uuid": "bc08dc4b-298e-49fd-879c-2042f66753ee", "control-id": "cis_rhel10_5-3.2.2.3", "description": "This requirement is expected to be manual. However, in previous versions of the policy\nit was already automated the configuration of \"minclass\" option. This posture was kept for\nRHEL 10 in this new version. Rules related to other options are informed in related_rules.\nIn short, minclass=4 alone can achieve the same result achieved by the combination of the\nother 4 options mentioned in the policy.", "props": [ @@ -29576,7 +29576,7 @@ ] }, { - "uuid": "40cbdd1f-afe2-451d-b0fc-7fab86afb77d", + "uuid": "9b78fae5-44d3-4781-89c0-d0fd3f1008e2", "control-id": "cis_rhel10_5-3.2.2.4", "description": "No notes for control-id 5.3.2.2.4.", "props": [ @@ -29593,7 +29593,7 @@ ] }, { - "uuid": "8e129e1f-cd8f-4d56-8d92-5abdfc23fe38", + "uuid": "b738c137-ca6c-4381-aee9-6b08f2a83f2d", "control-id": "cis_rhel10_5-3.2.2.5", "description": "No notes for control-id 5.3.2.2.5.", "props": [ @@ -29610,7 +29610,7 @@ ] }, { - "uuid": "7c8bc5ea-20c9-4411-81ae-d81cc1aeb9bf", + "uuid": "7aba6418-c05c-44f6-afd1-d399be8bd905", "control-id": "cis_rhel10_5-3.2.2.6", "description": "No notes for control-id 5.3.2.2.6.", "props": [ @@ -29627,7 +29627,7 @@ ] }, { - "uuid": "2bee01ee-001b-4b55-9e13-70aa2e8e14f2", + "uuid": "83a8d3ea-285d-4496-b718-2a11e7829a9d", "control-id": "cis_rhel10_5-3.2.2.7", "description": "No notes for control-id 5.3.2.2.7.", "props": [ @@ -29644,7 +29644,7 @@ ] }, { - "uuid": "641ece25-9c0a-496f-9f99-22769724b2b2", + "uuid": "91be5cfa-bf66-4e4e-bbde-49d45be5d200", "control-id": "cis_rhel10_5-3.2.3.1", "description": "Although mentioned in the section 5.3.3.3, there is no explicit requirement to configure\nretry option of pam_pwhistory. If come in the future, the rule accounts_password_pam_retry\ncan be used.", "props": [ @@ -29666,7 +29666,7 @@ ] }, { - "uuid": "04413aa8-ee0b-429f-bac9-adcce81a0eb4", + "uuid": "ecd878aa-23c0-41fd-a358-1150d2e088a2", "control-id": "cis_rhel10_5-3.2.3.2", "description": "No notes for control-id 5.3.2.3.2.", "props": [ @@ -29683,7 +29683,7 @@ ] }, { - "uuid": "35aea363-8d63-4db7-bd95-491b28c45ad5", + "uuid": "44a29649-5052-45f9-a8cc-b97715507b07", "control-id": "cis_rhel10_5-3.2.3.3", "description": "In RHEL 10 pam_pwhistory is enabled via authselect feature, as required in 5.3.1.4. The\nfeature automatically set \"use_authok\" option. In any case, we don't have a rule to check\nthis option specifically.", "props": [ @@ -29700,7 +29700,7 @@ ] }, { - "uuid": "a17fbff7-cb50-4a21-aca8-f977fe8dce6b", + "uuid": "4804e2db-c156-439c-9313-deaae5db968a", "control-id": "cis_rhel10_5-3.2.4.1", "description": "The rule more specifically used in this requirement also satify the requirement 5.3.1.5.", "props": [ @@ -29717,7 +29717,7 @@ ] }, { - "uuid": "e09c167d-ce4e-4877-9e55-0022fb138d81", + "uuid": "e5d86ebb-940f-4ecd-81fa-e430e85d1fa3", "control-id": "cis_rhel10_5-3.2.4.2", "description": "Usage of pam_unix.so module together with \"remember\" option is deprecated and is not\nrecommended by this policy. Instead, it should be used remember option of pam_pwhistory\nmodule, as required in 5.3.2.3.1. See here for more details about pam_unix.so:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1778929", "props": [ @@ -29734,7 +29734,7 @@ ] }, { - "uuid": "01d27012-6778-40b6-8b07-c3d93fba7446", + "uuid": "8b0ff651-dd13-4fbd-82ef-310c2df0ac43", "control-id": "cis_rhel10_5-3.2.4.3", "description": "Changes in logindefs mentioned in this requirement are more specifically covered by 5.4.1.4", "props": [ @@ -29756,7 +29756,7 @@ ] }, { - "uuid": "e1ec20b9-53c2-4536-b3dd-2d67cdedf2b2", + "uuid": "b92e64f1-ad15-40bf-833a-79941273becf", "control-id": "cis_rhel10_5-3.2.4.4", "description": "In RHEL 10 pam_unix is enabled by default in all authselect profiles already with the\nuse_authtok option set. In any case, we don't have a rule to check this option specifically,\nlike in 5.3.2.3.3.", "props": [ @@ -29773,7 +29773,7 @@ ] }, { - "uuid": "c5e17d38-528e-4744-a7f2-df209b8f1ddb", + "uuid": "4a61ce92-7a1a-4226-be0c-170c7e1b5129", "control-id": "cis_rhel10_5-4.1.1", "description": "No notes for control-id 5.4.1.1.", "props": [ @@ -29795,7 +29795,7 @@ ] }, { - "uuid": "27d855eb-9ced-44a1-9faa-622c73dc521f", + "uuid": "c31eee95-ad9f-45fd-9156-879b030449ea", "control-id": "cis_rhel10_5-4.1.3", "description": "No notes for control-id 5.4.1.3.", "props": [ @@ -29817,7 +29817,7 @@ ] }, { - "uuid": "20abaa69-c4d6-43e5-b041-487c7a9f0c2a", + "uuid": "11b72b15-0f36-483d-91c7-c8abb832aa60", "control-id": "cis_rhel10_5-4.1.4", "description": "There's a \"new\" set of options in /etc/login.defs file to define the number of iterations\nperformed during the hashing process.", "props": [ @@ -29839,7 +29839,7 @@ ] }, { - "uuid": "01815bfb-fbc5-44f8-b175-540059cd1cae", + "uuid": "723d34e2-7523-4747-ab28-2f99028bcb1f", "control-id": "cis_rhel10_5-4.1.5", "description": "No notes for control-id 5.4.1.5.", "props": [ @@ -29861,7 +29861,7 @@ ] }, { - "uuid": "781d3640-abbc-496f-b154-52b6d783eccc", + "uuid": "82eb6c94-3c7c-4731-8a46-160d7ac9fced", "control-id": "cis_rhel10_5-4.1.6", "description": "No notes for control-id 5.4.1.6.", "props": [ @@ -29878,7 +29878,7 @@ ] }, { - "uuid": "0bcb2d33-08bf-49e0-bd59-f70509c26d69", + "uuid": "b0b93689-460e-4ffe-be31-962509e7ce61", "control-id": "cis_rhel10_5-4.2.1", "description": "No notes for control-id 5.4.2.1.", "props": [ @@ -29895,7 +29895,7 @@ ] }, { - "uuid": "a4ee1870-c15d-4043-ad99-981de7d74276", + "uuid": "d228c97c-a3f1-4dbe-888e-14db9172dfea", "control-id": "cis_rhel10_5-4.2.2", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -29912,7 +29912,7 @@ ] }, { - "uuid": "26ae19da-02eb-4e22-85e8-7d8cbda3e4f6", + "uuid": "581c4a56-bbb2-437e-a073-e4b4782aea7c", "control-id": "cis_rhel10_5-4.2.3", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -29929,7 +29929,7 @@ ] }, { - "uuid": "099fe80a-55f6-48f4-8017-482fd9e59de1", + "uuid": "a4eb854a-33be-47b6-b831-02ce31e6ce10", "control-id": "cis_rhel10_5-4.2.4", "description": "No notes for control-id 5.4.2.4.", "props": [ @@ -29946,7 +29946,7 @@ ] }, { - "uuid": "21efed03-3232-4b63-be76-87f93a1f1626", + "uuid": "39af11ac-4884-43d6-b8f0-a4178be923d4", "control-id": "cis_rhel10_5-4.2.5", "description": "No notes for control-id 5.4.2.5.", "props": [ @@ -29968,7 +29968,7 @@ ] }, { - "uuid": "2f7e74ce-a2f8-4d1b-bd6b-20deac88451e", + "uuid": "1cdd0937-43fe-4434-a985-954a6896ee33", "control-id": "cis_rhel10_5-4.2.6", "description": "No notes for control-id 5.4.2.6.", "props": [ @@ -29985,7 +29985,7 @@ ] }, { - "uuid": "40ed643c-20e2-4a27-b57e-cdc444f1868f", + "uuid": "23f7c1ea-c0fb-421a-8101-2ee67e794f87", "control-id": "cis_rhel10_5-4.2.7", "description": "No notes for control-id 5.4.2.7.", "props": [ @@ -30007,7 +30007,7 @@ ] }, { - "uuid": "db20a067-62ae-42b1-ad1b-05ef9d37f12a", + "uuid": "0130ef38-c796-456c-9048-9ea1519dcccf", "control-id": "cis_rhel10_5-4.2.8", "description": "No notes for control-id 5.4.2.8.", "props": [ @@ -30024,7 +30024,7 @@ ] }, { - "uuid": "48755e1b-0283-4f18-a52b-1a5793cb5210", + "uuid": "f75a09d7-23e8-458b-8fd1-a11cc2e7ff16", "control-id": "cis_rhel10_5-4.3.2", "description": "No notes for control-id 5.4.3.2.", "props": [ @@ -30041,7 +30041,7 @@ ] }, { - "uuid": "88304a58-476a-43df-8619-bad67a53d980", + "uuid": "79600bdc-e7f2-4219-8006-49a87ffc40f8", "control-id": "cis_rhel10_5-4.3.3", "description": "No notes for control-id 5.4.3.3.", "props": [ @@ -30068,7 +30068,7 @@ ] }, { - "uuid": "9f6ff4ff-c948-4af9-bcb7-0372ad90eb5c", + "uuid": "248b1a94-df59-45c3-9079-29f7bfce8311", "control-id": "cis_rhel10_6-1.1", "description": "No notes for control-id 6.1.1.", "props": [ @@ -30090,7 +30090,7 @@ ] }, { - "uuid": "52d2d0c8-138e-4bb7-a4c4-85b0624a4a68", + "uuid": "af9cd5d4-5c8a-4a6e-9024-b1c041d80b5a", "control-id": "cis_rhel10_6-1.2", "description": "No notes for control-id 6.1.2.", "props": [ @@ -30107,7 +30107,7 @@ ] }, { - "uuid": "59969dba-1481-49e8-be2a-99ab7569123e", + "uuid": "09be932b-e452-4c8d-bec0-b527876e145e", "control-id": "cis_rhel10_6-1.3", "description": "No notes for control-id 6.1.3.", "props": [ @@ -30124,7 +30124,7 @@ ] }, { - "uuid": "39111e42-3d27-400d-a6f4-36013274265e", + "uuid": "e07d680e-a00b-4440-a37c-62a8479f63b8", "control-id": "cis_rhel10_6-2.1.1", "description": "No notes for control-id 6.2.1.1.", "props": [ @@ -30141,7 +30141,7 @@ ] }, { - "uuid": "d5b767b4-201a-42db-adec-f728431e8786", + "uuid": "36130295-64c7-48d2-98c8-b87c7086cf52", "control-id": "cis_rhel10_6-2.1.2", "description": "The description for control-id cis_rhel10_6-2.1.2.", "props": [ @@ -30154,7 +30154,7 @@ ] }, { - "uuid": "23b0f4ff-0e87-4d4b-b7e4-1ee001b2c98d", + "uuid": "af66f8f1-8c0e-408a-acea-22cc7847416a", "control-id": "cis_rhel10_6-2.1.3", "description": "The description for control-id cis_rhel10_6-2.1.3.", "props": [ @@ -30167,7 +30167,7 @@ ] }, { - "uuid": "1f144250-869a-4724-ad12-78bf4240691e", + "uuid": "396c964d-99da-425b-96c0-53632ae23f19", "control-id": "cis_rhel10_6-2.1.4", "description": "No notes for control-id 6.2.1.4.", "props": [ @@ -30184,7 +30184,7 @@ ] }, { - "uuid": "a54adbd4-ee3a-45e8-99b1-e9064f822836", + "uuid": "fb0cfcc7-5acf-4553-8328-082130d39d89", "control-id": "cis_rhel10_6-2.2.1.1", "description": "No notes for control-id 6.2.2.1.1.", "props": [ @@ -30201,7 +30201,7 @@ ] }, { - "uuid": "274113e0-e166-4e75-81ae-635d619f3204", + "uuid": "fa50c0b4-2494-41b6-b8c5-4230d293f677", "control-id": "cis_rhel10_6-2.2.1.2", "description": "The description for control-id cis_rhel10_6-2.2.1.2.", "props": [ @@ -30214,7 +30214,7 @@ ] }, { - "uuid": "4b24b5ff-7a8c-435e-8e77-4c9beda44428", + "uuid": "85f474ca-d0b2-440e-ac3b-5745aa68fad1", "control-id": "cis_rhel10_6-2.2.1.3", "description": "No notes for control-id 6.2.2.1.3.", "props": [ @@ -30231,7 +30231,7 @@ ] }, { - "uuid": "0f695da0-74ce-4a0c-ac9b-95c2580418c8", + "uuid": "35f60f49-d28c-4342-871c-20a511b6ebf8", "control-id": "cis_rhel10_6-2.2.1.4", "description": "No notes for control-id 6.2.2.1.4.", "props": [ @@ -30248,7 +30248,7 @@ ] }, { - "uuid": "dad81d12-6ab3-4e10-931b-569d95081010", + "uuid": "c9f539c0-ef4f-4b7b-a47d-232fb2c4b85e", "control-id": "cis_rhel10_6-2.2.2", "description": "No notes for control-id 6.2.2.2.", "props": [ @@ -30265,7 +30265,7 @@ ] }, { - "uuid": "d06af5f1-3ea7-4383-a8f5-1d4bc8ba5d57", + "uuid": "d535eed5-7b9b-4eb9-bf0c-ca39e7e03cbd", "control-id": "cis_rhel10_6-2.2.3", "description": "No notes for control-id 6.2.2.3.", "props": [ @@ -30282,7 +30282,7 @@ ] }, { - "uuid": "92c4ec60-e0d3-4ec7-b55c-d0d918cc1016", + "uuid": "997f6ad4-fe85-419a-8fa0-e8804ad9c583", "control-id": "cis_rhel10_6-2.2.4", "description": "No notes for control-id 6.2.2.4.", "props": [ @@ -30299,7 +30299,7 @@ ] }, { - "uuid": "899a703b-a289-403a-bf23-2a6f5fa587d3", + "uuid": "83629f35-a2e8-4981-bd6b-32ddb5476bc1", "control-id": "cis_rhel10_6-2.3.1", "description": "No notes for control-id 6.2.3.1.", "props": [ @@ -30311,7 +30311,7 @@ ] }, { - "uuid": "e6070973-26d9-4b07-ab28-1fda0505327e", + "uuid": "0598c1da-a0db-4b69-8a3e-c61d6ebda037", "control-id": "cis_rhel10_6-2.3.2", "description": "No notes for control-id 6.2.3.2.", "props": [ @@ -30323,7 +30323,7 @@ ] }, { - "uuid": "8b0c6cca-df1f-4b06-9b8f-d8fdefd43db4", + "uuid": "799b70be-4f0a-44b3-a54c-d5572c7f970d", "control-id": "cis_rhel10_6-2.3.3", "description": "No notes for control-id 6.2.3.3.", "props": [ @@ -30335,7 +30335,7 @@ ] }, { - "uuid": "4a1fc61d-6fb8-4225-8191-c11d679a3ec0", + "uuid": "e207d1cc-e868-4b4d-8bdb-0d835f5b63e6", "control-id": "cis_rhel10_6-2.3.4", "description": "No notes for control-id 6.2.3.4.", "props": [ @@ -30347,7 +30347,7 @@ ] }, { - "uuid": "705487f5-5fe6-4280-b443-3bfa6f8cb7f2", + "uuid": "73ac85e5-a30c-4e33-aff3-8a5cb93bb534", "control-id": "cis_rhel10_6-2.3.5", "description": "The description for control-id cis_rhel10_6-2.3.5.", "props": [ @@ -30360,7 +30360,7 @@ ] }, { - "uuid": "b795354c-04c4-4e73-bc98-a1f9f74cb1e9", + "uuid": "4b72d5de-092f-4c37-9438-48a635af1876", "control-id": "cis_rhel10_6-2.3.6", "description": "The description for control-id cis_rhel10_6-2.3.6.", "props": [ @@ -30373,7 +30373,7 @@ ] }, { - "uuid": "1c15a0df-b0d0-4890-b932-97fd31293a74", + "uuid": "8cc1823b-e816-4a6d-92d7-fd5522f399df", "control-id": "cis_rhel10_6-2.3.7", "description": "No notes for control-id 6.2.3.7.", "props": [ @@ -30385,7 +30385,7 @@ ] }, { - "uuid": "856196b5-26ea-4f52-adeb-9102967ac8ab", + "uuid": "74d9a679-7155-418d-a4a0-06e0ec8943be", "control-id": "cis_rhel10_6-2.3.8", "description": "The description for control-id cis_rhel10_6-2.3.8.", "props": [ @@ -30398,7 +30398,7 @@ ] }, { - "uuid": "c04bd5eb-5750-4ce5-9398-c39006b81daa", + "uuid": "1b3c2023-4d57-46c6-99a2-64957ea0e5be", "control-id": "cis_rhel10_6-2.4.1", "description": "It is not harmful to run these rules even if rsyslog is not installed or active.", "props": [ @@ -30425,7 +30425,7 @@ ] }, { - "uuid": "fca79de6-efea-4cdf-9bcf-904c6b6eaf48", + "uuid": "09339fc5-a83d-4db1-b66a-b6958d11d9ad", "control-id": "cis_rhel10_7-1.1", "description": "No notes for control-id 7.1.1.", "props": [ @@ -30452,7 +30452,7 @@ ] }, { - "uuid": "092b600e-8de1-4315-891a-975e09054d8e", + "uuid": "c7edce15-3e0a-4ac0-9e47-f6b3a134b2af", "control-id": "cis_rhel10_7-1.2", "description": "No notes for control-id 7.1.2.", "props": [ @@ -30479,7 +30479,7 @@ ] }, { - "uuid": "d4b1c756-2329-4e88-880b-5aded55fbd4a", + "uuid": "5057515d-a7f4-487b-b398-f71dd95903d1", "control-id": "cis_rhel10_7-1.3", "description": "No notes for control-id 7.1.3.", "props": [ @@ -30506,7 +30506,7 @@ ] }, { - "uuid": "9bf5c518-986c-4815-a59b-3241c6eabc37", + "uuid": "0833bea4-cdf7-46ea-86d1-edb5daaa128b", "control-id": "cis_rhel10_7-1.4", "description": "No notes for control-id 7.1.4.", "props": [ @@ -30533,7 +30533,7 @@ ] }, { - "uuid": "51f777b0-8b3c-4b6a-90dd-5c0ef73cf4a7", + "uuid": "3b8a094e-9934-40eb-912e-14676c11bbe0", "control-id": "cis_rhel10_7-1.5", "description": "No notes for control-id 7.1.5.", "props": [ @@ -30560,7 +30560,7 @@ ] }, { - "uuid": "32528373-5d98-45fd-b115-524c51d4d30c", + "uuid": "143abc49-ea5e-4f6c-85b9-62209b04b15f", "control-id": "cis_rhel10_7-1.6", "description": "No notes for control-id 7.1.6.", "props": [ @@ -30587,7 +30587,7 @@ ] }, { - "uuid": "bccef2a4-37ae-46e3-9324-04c87cefd9a5", + "uuid": "769ef5ee-028c-4604-b68e-b161d88fc9e1", "control-id": "cis_rhel10_7-1.7", "description": "No notes for control-id 7.1.7.", "props": [ @@ -30614,7 +30614,7 @@ ] }, { - "uuid": "ff30cb9f-dba6-48d4-83a2-fde55d4f9d86", + "uuid": "8b79a6fa-a838-457a-9dfe-0dd877caaa60", "control-id": "cis_rhel10_7-1.8", "description": "No notes for control-id 7.1.8.", "props": [ @@ -30641,7 +30641,7 @@ ] }, { - "uuid": "1c13ccde-434b-46f8-bd41-5cccac085d56", + "uuid": "b33fa5f3-2f4d-48ce-a1a5-3a3bd8b10c50", "control-id": "cis_rhel10_7-1.9", "description": "No notes for control-id 7.1.9.", "props": [ @@ -30668,7 +30668,7 @@ ] }, { - "uuid": "62a1087e-b7dc-4f03-9339-05fb07dc5b5c", + "uuid": "512d2da4-1e59-463e-b591-6b5b8ded00ae", "control-id": "cis_rhel10_7-1.10", "description": "No notes for control-id 7.1.10.", "props": [ @@ -30710,7 +30710,7 @@ ] }, { - "uuid": "442cd96b-86db-4613-9bd7-b02d79688dc4", + "uuid": "3d763275-c840-4e3f-baf3-8f46129fdc67", "control-id": "cis_rhel10_7-1.11", "description": "No notes for control-id 7.1.11.", "props": [ @@ -30732,7 +30732,7 @@ ] }, { - "uuid": "331515c9-dc98-40a4-823b-7c8e9ad33da7", + "uuid": "1fd0df53-f904-4e83-88cc-a92432035931", "control-id": "cis_rhel10_7-1.12", "description": "No notes for control-id 7.1.12.", "props": [ @@ -30754,7 +30754,7 @@ ] }, { - "uuid": "ade5baa1-08de-48a7-b868-e7988d061349", + "uuid": "d1d57bdf-f322-4fd6-9d92-c51016d72129", "control-id": "cis_rhel10_7-1.13", "description": "The description for control-id cis_rhel10_7-1.13.", "props": [ @@ -30767,7 +30767,7 @@ ] }, { - "uuid": "dc30f5ae-00a5-4985-a5d8-2e5ac2c9b05a", + "uuid": "e691b7e3-5bfb-43c5-85a0-885326af8925", "control-id": "cis_rhel10_7-2.1", "description": "No notes for control-id 7.2.1.", "props": [ @@ -30784,7 +30784,7 @@ ] }, { - "uuid": "319a00d9-26b2-4af8-9c68-aa6d4e151d38", + "uuid": "9b6ca3f4-d6da-4acf-90e7-5da1143d4d20", "control-id": "cis_rhel10_7-2.2", "description": "No notes for control-id 7.2.2.", "props": [ @@ -30801,7 +30801,7 @@ ] }, { - "uuid": "8fea36c2-d9ee-4615-8891-ef1276ca9035", + "uuid": "f157f6ad-3dc7-4478-b198-fcc778a78a5b", "control-id": "cis_rhel10_7-2.3", "description": "No notes for control-id 7.2.3.", "props": [ @@ -30818,7 +30818,7 @@ ] }, { - "uuid": "ea3cb9fd-742f-4d3e-8da6-5e4fff577449", + "uuid": "3a946528-0dfa-434f-ae26-a72cf1b96bf9", "control-id": "cis_rhel10_7-2.4", "description": "No notes for control-id 7.2.4.", "props": [ @@ -30835,7 +30835,7 @@ ] }, { - "uuid": "98629d12-344e-4ecc-bce5-83aec68ffa1c", + "uuid": "ab3ad5d4-3935-4a13-b9ac-2ea054a1ec1a", "control-id": "cis_rhel10_7-2.5", "description": "No notes for control-id 7.2.5.", "props": [ @@ -30852,7 +30852,7 @@ ] }, { - "uuid": "25c477b6-1778-494b-86bc-95e6f0814e85", + "uuid": "aacd462c-0b71-401c-b971-2df84c11c252", "control-id": "cis_rhel10_7-2.6", "description": "No notes for control-id 7.2.6.", "props": [ @@ -30869,7 +30869,7 @@ ] }, { - "uuid": "f0b11e21-fb7c-46ea-a5fe-37ae3b51cd84", + "uuid": "3b501a9a-72f4-4fcc-b4c2-d586013a597d", "control-id": "cis_rhel10_7-2.7", "description": "No notes for control-id 7.2.7.", "props": [ @@ -30886,7 +30886,7 @@ ] }, { - "uuid": "8dc3bf56-a948-455f-b898-b73e666270d8", + "uuid": "3c3c1d09-81d6-4652-b918-ff9fe2b9e017", "control-id": "cis_rhel10_7-2.8", "description": "No notes for control-id 7.2.8.", "props": [ @@ -30913,7 +30913,7 @@ ] }, { - "uuid": "1903814c-2478-4438-a90b-bb2c468f066b", + "uuid": "d5259436-4b21-4864-9dc8-e678bd7fc136", "control-id": "cis_rhel10_7-2.9", "description": "No notes for control-id 7.2.9.", "props": [ From 3346ece1c720d9c93be2e1b5bd7041ab2db65f4e Mon Sep 17 00:00:00 2001 From: runner Date: Wed, 17 Dec 2025 10:45:45 +0000 Subject: [PATCH 4/4] Automatic updates from complyscribe --- .../component-definition.json | 12 +- .../component-definition.json | 12 +- .../component-definition.json | 12 +- .../component-definition.json | 12 +- .../component-definition.json | 12 +- .../component-definition.json | 3786 ++++++------- .../component-definition.json | 4714 +++++++++-------- .../component-definition.json | 2658 +++++----- .../component-definition.json | 262 +- .../component-definition.json | 2126 ++++---- .../component-definition.json | 2102 ++++---- .../component-definition.json | 3802 +++++++------ .../component-definition.json | 3806 +++++++------ .../component-definition.json | 2178 ++++---- .../component-definition.json | 2186 ++++---- .../component-definition.json | 2194 ++++---- .../component-definition.json | 2470 ++++----- .../component-definition.json | 12 +- .../component-definition.json | 12 +- .../component-definition.json | 12 +- .../component-definition.json | 12 +- .../component-definition.json | 12 +- .../component-definition.json | 12 +- .../component-definition.json | 12 +- .../component-definition.json | 12 +- .../component-definition.json | 8 +- .../component-definition.json | 8 +- .../component-definition.json | 8 +- .../component-definition.json | 12 +- .../component-definition.json | 12 +- .../component-definition.json | 12 +- .../component-definition.json | 12 +- .../component-definition.json | 12 +- .../component-definition.json | 12 +- .../component-definition.json | 12 +- .../component-definition.json | 12 +- .../component-definition.json | 8 +- .../component-definition.json | 8 +- .../component-definition.json | 8 +- .../component-definition.json | 12 +- 40 files changed, 16390 insertions(+), 16206 deletions(-) diff --git a/component-definitions/fedora/fedora-cis_fedora-l1_server/component-definition.json b/component-definitions/fedora/fedora-cis_fedora-l1_server/component-definition.json index 1269a6d9..1193ae34 100644 --- a/component-definitions/fedora/fedora-cis_fedora-l1_server/component-definition.json +++ b/component-definitions/fedora/fedora-cis_fedora-l1_server/component-definition.json @@ -3,8 +3,8 @@ "uuid": "77a62ff1-d5eb-47f8-a08f-063352e9479f", "metadata": { "title": "Component definition for fedora", - "last-modified": "2025-12-11T18:31:36.606568+00:00", - "version": "1.5", + "last-modified": "2025-12-17T11:20:02.273422+00:00", + "version": "1.6", "oscal-version": "1.1.3" }, "components": [ @@ -689,7 +689,7 @@ { "name": "Parameter_Value_Alternatives_36", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -707,7 +707,7 @@ { "name": "Parameter_Value_Alternatives_37", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -9921,7 +9921,7 @@ { "name": "Parameter_Value_Alternatives_36", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -9939,7 +9939,7 @@ { "name": "Parameter_Value_Alternatives_37", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { diff --git a/component-definitions/fedora/fedora-cis_fedora-l1_workstation/component-definition.json b/component-definitions/fedora/fedora-cis_fedora-l1_workstation/component-definition.json index 3bae2d70..5b0be5fa 100644 --- a/component-definitions/fedora/fedora-cis_fedora-l1_workstation/component-definition.json +++ b/component-definitions/fedora/fedora-cis_fedora-l1_workstation/component-definition.json @@ -3,8 +3,8 @@ "uuid": "e4c9973a-dbda-48c4-8081-bf2dbfe65692", "metadata": { "title": "Component definition for fedora", - "last-modified": "2025-12-11T18:32:22.407336+00:00", - "version": "1.5", + "last-modified": "2025-12-17T11:20:51.860810+00:00", + "version": "1.6", "oscal-version": "1.1.3" }, "components": [ @@ -689,7 +689,7 @@ { "name": "Parameter_Value_Alternatives_36", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -707,7 +707,7 @@ { "name": "Parameter_Value_Alternatives_37", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -9701,7 +9701,7 @@ { "name": "Parameter_Value_Alternatives_36", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -9719,7 +9719,7 @@ { "name": "Parameter_Value_Alternatives_37", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { diff --git a/component-definitions/fedora/fedora-cis_fedora-l2_server/component-definition.json b/component-definitions/fedora/fedora-cis_fedora-l2_server/component-definition.json index 48f1b5fb..6373fcf5 100644 --- a/component-definitions/fedora/fedora-cis_fedora-l2_server/component-definition.json +++ b/component-definitions/fedora/fedora-cis_fedora-l2_server/component-definition.json @@ -3,8 +3,8 @@ "uuid": "76afcd42-7a9d-433c-b495-ef156395719c", "metadata": { "title": "Component definition for fedora", - "last-modified": "2025-12-11T18:30:49.925024+00:00", - "version": "1.7", + "last-modified": "2025-12-17T11:19:11.439838+00:00", + "version": "1.8", "oscal-version": "1.1.3" }, "components": [ @@ -869,7 +869,7 @@ { "name": "Parameter_Value_Alternatives_46", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -887,7 +887,7 @@ { "name": "Parameter_Value_Alternatives_47", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -12963,7 +12963,7 @@ { "name": "Parameter_Value_Alternatives_46", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -12981,7 +12981,7 @@ { "name": "Parameter_Value_Alternatives_47", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { diff --git a/component-definitions/fedora/fedora-cis_fedora-l2_workstation/component-definition.json b/component-definitions/fedora/fedora-cis_fedora-l2_workstation/component-definition.json index 22adf337..93a5f7f8 100644 --- a/component-definitions/fedora/fedora-cis_fedora-l2_workstation/component-definition.json +++ b/component-definitions/fedora/fedora-cis_fedora-l2_workstation/component-definition.json @@ -3,8 +3,8 @@ "uuid": "5c3c7cf2-7b25-40ff-b6fe-74a80316f83a", "metadata": { "title": "Component definition for fedora", - "last-modified": "2025-12-11T18:33:12.953082+00:00", - "version": "1.7", + "last-modified": "2025-12-17T11:21:49.392170+00:00", + "version": "1.8", "oscal-version": "1.1.3" }, "components": [ @@ -869,7 +869,7 @@ { "name": "Parameter_Value_Alternatives_46", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -887,7 +887,7 @@ { "name": "Parameter_Value_Alternatives_47", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -12817,7 +12817,7 @@ { "name": "Parameter_Value_Alternatives_46", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -12835,7 +12835,7 @@ { "name": "Parameter_Value_Alternatives_47", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { diff --git a/component-definitions/fedora/fedora-cusp_fedora-default/component-definition.json b/component-definitions/fedora/fedora-cusp_fedora-default/component-definition.json index 264e5eca..834e2c9c 100644 --- a/component-definitions/fedora/fedora-cusp_fedora-default/component-definition.json +++ b/component-definitions/fedora/fedora-cusp_fedora-default/component-definition.json @@ -3,8 +3,8 @@ "uuid": "2d7b24b2-1bb9-4f44-b6d1-9c6b27c84fe0", "metadata": { "title": "Component definition for fedora", - "last-modified": "2025-12-11T18:33:57.584736+00:00", - "version": "1.4", + "last-modified": "2025-12-17T11:22:40.240960+00:00", + "version": "1.5", "oscal-version": "1.1.3" }, "components": [ @@ -473,7 +473,7 @@ { "name": "Parameter_Value_Alternatives_24", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -491,7 +491,7 @@ { "name": "Parameter_Value_Alternatives_25", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -6387,7 +6387,7 @@ { "name": "Parameter_Value_Alternatives_24", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -6405,7 +6405,7 @@ { "name": "Parameter_Value_Alternatives_25", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { diff --git a/component-definitions/rhel10/rhel10-anssi-enhanced/component-definition.json b/component-definitions/rhel10/rhel10-anssi-enhanced/component-definition.json index b276b43f..75685c44 100644 --- a/component-definitions/rhel10/rhel10-anssi-enhanced/component-definition.json +++ b/component-definitions/rhel10/rhel10-anssi-enhanced/component-definition.json @@ -3,8 +3,8 @@ "uuid": "e2f03e22-a04d-43b6-b9bd-963705759d02", "metadata": { "title": "Component definition for rhel10", - "last-modified": "2025-12-11T18:21:44.162974+00:00", - "version": "1.3", + "last-modified": "2025-12-17T11:09:07.029335+00:00", + "version": "1.4", "oscal-version": "1.1.3" }, "components": [ @@ -365,7 +365,7 @@ { "name": "Parameter_Value_Alternatives_18", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -383,7 +383,7 @@ { "name": "Parameter_Value_Alternatives_19", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -959,3499 +959,3511 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_dnf-automatic_installed", + "value": "package_sequoia-sq_installed", "remarks": "rule_set_023" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install dnf-automatic Package", + "value": "Install sequoia-sq Package", "remarks": "rule_set_023" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "timer_dnf-automatic_enabled", + "value": "package_dnf-automatic_installed", "remarks": "rule_set_024" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable dnf-automatic Timer", + "value": "Install dnf-automatic Package", "remarks": "rule_set_024" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dnf-automatic_apply_updates", + "value": "timer_dnf-automatic_enabled", "remarks": "rule_set_025" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure dnf-automatic to Install Available Updates Automatically", + "value": "Enable dnf-automatic Timer", "remarks": "rule_set_025" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dnf-automatic_security_updates_only", + "value": "dnf-automatic_apply_updates", "remarks": "rule_set_026" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure dnf-automatic to Install Only Security Updates", + "value": "Configure dnf-automatic to Install Available Updates Automatically", "remarks": "rule_set_026" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_kea_removed", + "value": "dnf-automatic_security_updates_only", "remarks": "rule_set_027" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall kea Package", + "value": "Configure dnf-automatic to Install Only Security Updates", "remarks": "rule_set_027" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet_removed", + "value": "package_kea_removed", "remarks": "rule_set_028" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove telnet Clients", + "value": "Uninstall kea Package", "remarks": "rule_set_028" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet-server_removed", + "value": "package_telnet_removed", "remarks": "rule_set_029" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall telnet-server Package", + "value": "Remove telnet Clients", "remarks": "rule_set_029" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_tftp_removed", + "value": "package_telnet-server_removed", "remarks": "rule_set_030" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove tftp Daemon", + "value": "Uninstall telnet-server Package", "remarks": "rule_set_030" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_tftp-server_removed", + "value": "package_tftp_removed", "remarks": "rule_set_031" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall tftp-server Package", + "value": "Remove tftp Daemon", "remarks": "rule_set_031" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_systemauth", + "value": "package_tftp-server_removed", "remarks": "rule_set_032" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set PAM Password Hashing Algorithm - system-auth", + "value": "Uninstall tftp-server Package", "remarks": "rule_set_032" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_unix_rounds_system_auth", + "value": "set_password_hashing_algorithm_systemauth", "remarks": "rule_set_033" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set number of Password Hashing Rounds - system-auth", + "value": "Set PAM Password Hashing Algorithm - system-auth", "remarks": "rule_set_033" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_unix_rounds_password_auth", + "value": "accounts_password_pam_unix_rounds_system_auth", "remarks": "rule_set_034" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set number of Password Hashing Rounds - password-auth", + "value": "Set number of Password Hashing Rounds - system-auth", "remarks": "rule_set_034" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_minclass", + "value": "accounts_password_pam_unix_rounds_password_auth", "remarks": "rule_set_035" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", + "value": "Set number of Password Hashing Rounds - password-auth", "remarks": "rule_set_035" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_password", + "value": "accounts_password_pam_minclass", "remarks": "rule_set_036" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Boot Loader Password in grub2", + "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", "remarks": "rule_set_036" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_l1tf_argument", + "value": "grub2_password", "remarks": "rule_set_037" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure L1 Terminal Fault mitigations", + "value": "Set Boot Loader Password in grub2", "remarks": "rule_set_037" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_page_poison_argument", + "value": "grub2_l1tf_argument", "remarks": "rule_set_038" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable page allocator poisoning", + "value": "Configure L1 Terminal Fault mitigations", "remarks": "rule_set_038" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_pti_argument", + "value": "grub2_page_poison_argument", "remarks": "rule_set_039" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Page-Table Isolation (KPTI)", + "value": "Enable page allocator poisoning", "remarks": "rule_set_039" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_slab_nomerge_argument", + "value": "grub2_pti_argument", "remarks": "rule_set_040" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable merging of slabs with similar size", + "value": "Enable Kernel Page-Table Isolation (KPTI)", "remarks": "rule_set_040" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_slub_debug_argument", + "value": "grub2_slab_nomerge_argument", "remarks": "rule_set_041" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable SLUB/SLAB allocator poisoning", + "value": "Disable merging of slabs with similar size", "remarks": "rule_set_041" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_spec_store_bypass_disable_argument", + "value": "grub2_slub_debug_argument", "remarks": "rule_set_042" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Speculative Store Bypass Mitigation", + "value": "Enable SLUB/SLAB allocator poisoning", "remarks": "rule_set_042" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_spectre_v2_argument", + "value": "grub2_spec_store_bypass_disable_argument", "remarks": "rule_set_043" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enforce Spectre v2 mitigation", + "value": "Configure Speculative Store Bypass Mitigation", "remarks": "rule_set_043" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_mds_argument", + "value": "grub2_spectre_v2_argument", "remarks": "rule_set_044" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Microarchitectural Data Sampling mitigation", + "value": "Enforce Spectre v2 mitigation", "remarks": "rule_set_044" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_mce_argument", + "value": "grub2_mds_argument", "remarks": "rule_set_045" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Force kernel panic on uncorrected MCEs", + "value": "Configure Microarchitectural Data Sampling mitigation", "remarks": "rule_set_045" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_page_alloc_shuffle_argument", + "value": "grub2_mce_argument", "remarks": "rule_set_046" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable randomization of the page allocator", + "value": "Force kernel panic on uncorrected MCEs", "remarks": "rule_set_046" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_rng_core_default_quality_argument", + "value": "grub2_page_alloc_shuffle_argument", "remarks": "rule_set_047" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure the confidence in TPM for entropy", + "value": "Enable randomization of the page allocator", "remarks": "rule_set_047" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_vm_mmap_min_addr", + "value": "grub2_rng_core_default_quality_argument", "remarks": "rule_set_048" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Prevent applications from mapping low portion of virtual memory", + "value": "Configure the confidence in TPM for entropy", "remarks": "rule_set_048" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_dmesg_restrict", + "value": "sysctl_vm_mmap_min_addr", "remarks": "rule_set_049" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict Access to Kernel Message Buffer", + "value": "Prevent applications from mapping low portion of virtual memory", "remarks": "rule_set_049" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_kptr_restrict", + "value": "sysctl_kernel_dmesg_restrict", "remarks": "rule_set_050" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict Exposed Kernel Pointer Addresses Access", + "value": "Restrict Access to Kernel Message Buffer", "remarks": "rule_set_050" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_pid_max", + "value": "sysctl_kernel_kptr_restrict", "remarks": "rule_set_051" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure maximum number of process identifiers", + "value": "Restrict Exposed Kernel Pointer Addresses Access", "remarks": "rule_set_051" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_perf_event_max_sample_rate", + "value": "sysctl_kernel_pid_max", "remarks": "rule_set_052" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Limit sampling frequency of the Perf system", + "value": "Configure maximum number of process identifiers", "remarks": "rule_set_052" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_perf_cpu_time_max_percent", + "value": "sysctl_kernel_perf_event_max_sample_rate", "remarks": "rule_set_053" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Limit CPU consumption of the Perf system", + "value": "Limit sampling frequency of the Perf system", "remarks": "rule_set_053" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_perf_event_paranoid", + "value": "sysctl_kernel_perf_cpu_time_max_percent", "remarks": "rule_set_054" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disallow kernel profiling by unprivileged users", + "value": "Limit CPU consumption of the Perf system", "remarks": "rule_set_054" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_randomize_va_space", + "value": "sysctl_kernel_perf_event_paranoid", "remarks": "rule_set_055" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Randomized Layout of Virtual Address Space", + "value": "Disallow kernel profiling by unprivileged users", "remarks": "rule_set_055" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_sysrq", + "value": "sysctl_kernel_randomize_va_space", "remarks": "rule_set_056" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disallow magic SysRq key", + "value": "Enable Randomized Layout of Virtual Address Space", "remarks": "rule_set_056" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_unprivileged_bpf_disabled", + "value": "sysctl_kernel_sysrq", "remarks": "rule_set_057" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Access to Network bpf() Syscall From Unprivileged Processes", + "value": "Disallow magic SysRq key", "remarks": "rule_set_057" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_panic_on_oops", + "value": "sysctl_kernel_unprivileged_bpf_disabled", "remarks": "rule_set_058" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Kernel panic on oops", + "value": "Disable Access to Network bpf() Syscall From Unprivileged Processes", "remarks": "rule_set_058" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_yama_ptrace_scope", + "value": "sysctl_kernel_panic_on_oops", "remarks": "rule_set_059" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict usage of ptrace to descendant processes", + "value": "Kernel panic on oops", "remarks": "rule_set_059" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_core_bpf_jit_harden", + "value": "sysctl_kernel_yama_ptrace_scope", "remarks": "rule_set_060" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Harden the operation of the BPF just-in-time compiler", + "value": "Restrict usage of ptrace to descendant processes", "remarks": "rule_set_060" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_ip_forward", + "value": "sysctl_net_core_bpf_jit_harden", "remarks": "rule_set_061" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for IP Forwarding on IPv4 Interfaces", + "value": "Harden the operation of the BPF just-in-time compiler", "remarks": "rule_set_061" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_accept_local", + "value": "sysctl_net_ipv4_ip_forward", "remarks": "rule_set_062" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Accepting Packets Routed Between Local Interfaces", + "value": "Disable Kernel Parameter for IP Forwarding on IPv4 Interfaces", "remarks": "rule_set_062" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_accept_redirects", + "value": "sysctl_net_ipv4_conf_all_accept_local", "remarks": "rule_set_063" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Accepting ICMP Redirects for All IPv4 Interfaces", + "value": "Disable Accepting Packets Routed Between Local Interfaces", "remarks": "rule_set_063" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_accept_redirects", + "value": "sysctl_net_ipv4_conf_all_accept_redirects", "remarks": "rule_set_064" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv4 Interfaces", + "value": "Disable Accepting ICMP Redirects for All IPv4 Interfaces", "remarks": "rule_set_064" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_secure_redirects", + "value": "sysctl_net_ipv4_conf_default_accept_redirects", "remarks": "rule_set_065" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Accepting Secure ICMP Redirects on all IPv4 Interfaces", + "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv4 Interfaces", "remarks": "rule_set_065" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_secure_redirects", + "value": "sysctl_net_ipv4_conf_all_secure_redirects", "remarks": "rule_set_066" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Kernel Parameter for Accepting Secure Redirects By Default", + "value": "Disable Kernel Parameter for Accepting Secure ICMP Redirects on all IPv4 Interfaces", "remarks": "rule_set_066" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_shared_media", + "value": "sysctl_net_ipv4_conf_default_secure_redirects", "remarks": "rule_set_067" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Sending and Accepting Shared Media Redirects for All IPv4 Interfaces", + "value": "Configure Kernel Parameter for Accepting Secure Redirects By Default", "remarks": "rule_set_067" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_shared_media", + "value": "sysctl_net_ipv4_conf_all_shared_media", "remarks": "rule_set_068" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Sending and Accepting Shared Media Redirects by Default", + "value": "Configure Sending and Accepting Shared Media Redirects for All IPv4 Interfaces", "remarks": "rule_set_068" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_accept_source_route", + "value": "sysctl_net_ipv4_conf_default_shared_media", "remarks": "rule_set_069" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces", + "value": "Configure Sending and Accepting Shared Media Redirects by Default", "remarks": "rule_set_069" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_accept_source_route", + "value": "sysctl_net_ipv4_conf_all_accept_source_route", "remarks": "rule_set_070" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv4 Interfaces by Default", + "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces", "remarks": "rule_set_070" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_arp_filter", + "value": "sysctl_net_ipv4_conf_default_accept_source_route", "remarks": "rule_set_071" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure ARP filtering for All IPv4 Interfaces", + "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv4 Interfaces by Default", "remarks": "rule_set_071" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_arp_ignore", + "value": "sysctl_net_ipv4_conf_all_arp_filter", "remarks": "rule_set_072" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Response Mode of ARP Requests for All IPv4 Interfaces", + "value": "Configure ARP filtering for All IPv4 Interfaces", "remarks": "rule_set_072" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_route_localnet", + "value": "sysctl_net_ipv4_conf_all_arp_ignore", "remarks": "rule_set_073" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Prevent Routing External Traffic to Local Loopback on All IPv4 Interfaces", + "value": "Configure Response Mode of ARP Requests for All IPv4 Interfaces", "remarks": "rule_set_073" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_drop_gratuitous_arp", + "value": "sysctl_net_ipv4_conf_all_route_localnet", "remarks": "rule_set_074" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Drop Gratuitous ARP frames on All IPv4 Interfaces", + "value": "Prevent Routing External Traffic to Local Loopback on All IPv4 Interfaces", "remarks": "rule_set_074" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_rp_filter", + "value": "sysctl_net_ipv4_conf_all_drop_gratuitous_arp", "remarks": "rule_set_075" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces", + "value": "Drop Gratuitous ARP frames on All IPv4 Interfaces", "remarks": "rule_set_075" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_rp_filter", + "value": "sysctl_net_ipv4_conf_all_rp_filter", "remarks": "rule_set_076" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces by Default", + "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces", "remarks": "rule_set_076" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_send_redirects", + "value": "sysctl_net_ipv4_conf_default_rp_filter", "remarks": "rule_set_077" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces", + "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces by Default", "remarks": "rule_set_077" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_send_redirects", + "value": "sysctl_net_ipv4_conf_all_send_redirects", "remarks": "rule_set_078" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces by Default", + "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces", "remarks": "rule_set_078" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses", + "value": "sysctl_net_ipv4_conf_default_send_redirects", "remarks": "rule_set_079" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Ignore Bogus ICMP Error Responses on IPv4 Interfaces", + "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces by Default", "remarks": "rule_set_079" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_ip_local_port_range", + "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses", "remarks": "rule_set_080" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Kernel Parameter to Increase Local Port Range", + "value": "Enable Kernel Parameter to Ignore Bogus ICMP Error Responses on IPv4 Interfaces", "remarks": "rule_set_080" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_tcp_rfc1337", + "value": "sysctl_net_ipv4_ip_local_port_range", "remarks": "rule_set_081" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Use TCP RFC 1337 on IPv4 Interfaces", + "value": "Set Kernel Parameter to Increase Local Port Range", "remarks": "rule_set_081" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_tcp_syncookies", + "value": "sysctl_net_ipv4_tcp_rfc1337", "remarks": "rule_set_082" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Use TCP Syncookies on Network Interfaces", + "value": "Enable Kernel Parameter to Use TCP RFC 1337 on IPv4 Interfaces", "remarks": "rule_set_082" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_router_solicitations", + "value": "sysctl_net_ipv4_tcp_syncookies", "remarks": "rule_set_083" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Denying Router Solicitations on All IPv6 Interfaces", + "value": "Enable Kernel Parameter to Use TCP Syncookies on Network Interfaces", "remarks": "rule_set_083" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_router_solicitations", + "value": "sysctl_net_ipv6_conf_all_router_solicitations", "remarks": "rule_set_084" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Denying Router Solicitations on All IPv6 Interfaces By Default", + "value": "Configure Denying Router Solicitations on All IPv6 Interfaces", "remarks": "rule_set_084" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_accept_ra_rtr_pref", + "value": "sysctl_net_ipv6_conf_default_router_solicitations", "remarks": "rule_set_085" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Accepting Router Preference in Router Advertisements on All IPv6 Interfaces", + "value": "Configure Denying Router Solicitations on All IPv6 Interfaces By Default", "remarks": "rule_set_085" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_accept_ra_rtr_pref", + "value": "sysctl_net_ipv6_conf_all_accept_ra_rtr_pref", "remarks": "rule_set_086" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Accepting Router Preference in Router Advertisements on All IPv6 Interfaces By Default", + "value": "Configure Accepting Router Preference in Router Advertisements on All IPv6 Interfaces", "remarks": "rule_set_086" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_accept_ra_pinfo", + "value": "sysctl_net_ipv6_conf_default_accept_ra_rtr_pref", "remarks": "rule_set_087" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Accepting Prefix Information in Router Advertisements on All IPv6 Interfaces", + "value": "Configure Accepting Router Preference in Router Advertisements on All IPv6 Interfaces By Default", "remarks": "rule_set_087" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_accept_ra_pinfo", + "value": "sysctl_net_ipv6_conf_all_accept_ra_pinfo", "remarks": "rule_set_088" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Accepting Prefix Information in Router Advertisements on All IPv6 Interfaces By Default", + "value": "Configure Accepting Prefix Information in Router Advertisements on All IPv6 Interfaces", "remarks": "rule_set_088" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_accept_ra_defrtr", + "value": "sysctl_net_ipv6_conf_default_accept_ra_pinfo", "remarks": "rule_set_089" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Accepting Default Router in Router Advertisements on All IPv6 Interfaces", + "value": "Configure Accepting Prefix Information in Router Advertisements on All IPv6 Interfaces By Default", "remarks": "rule_set_089" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_accept_ra_defrtr", + "value": "sysctl_net_ipv6_conf_all_accept_ra_defrtr", "remarks": "rule_set_090" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Accepting Default Router in Router Advertisements on All IPv6 Interfaces By Default", + "value": "Configure Accepting Default Router in Router Advertisements on All IPv6 Interfaces", "remarks": "rule_set_090" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_autoconf", + "value": "sysctl_net_ipv6_conf_default_accept_ra_defrtr", "remarks": "rule_set_091" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Auto Configuration on All IPv6 Interfaces", + "value": "Configure Accepting Default Router in Router Advertisements on All IPv6 Interfaces By Default", "remarks": "rule_set_091" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_autoconf", + "value": "sysctl_net_ipv6_conf_all_autoconf", "remarks": "rule_set_092" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Auto Configuration on All IPv6 Interfaces By Default", + "value": "Configure Auto Configuration on All IPv6 Interfaces", "remarks": "rule_set_092" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_accept_redirects", + "value": "sysctl_net_ipv6_conf_default_autoconf", "remarks": "rule_set_093" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Accepting ICMP Redirects for All IPv6 Interfaces", + "value": "Configure Auto Configuration on All IPv6 Interfaces By Default", "remarks": "rule_set_093" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_accept_redirects", + "value": "sysctl_net_ipv6_conf_all_accept_redirects", "remarks": "rule_set_094" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv6 Interfaces", + "value": "Disable Accepting ICMP Redirects for All IPv6 Interfaces", "remarks": "rule_set_094" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_accept_source_route", + "value": "sysctl_net_ipv6_conf_default_accept_redirects", "remarks": "rule_set_095" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv6 Interfaces", + "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv6 Interfaces", "remarks": "rule_set_095" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_accept_source_route", + "value": "sysctl_net_ipv6_conf_all_accept_source_route", "remarks": "rule_set_096" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv6 Interfaces by Default", + "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv6 Interfaces", "remarks": "rule_set_096" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_max_addresses", + "value": "sysctl_net_ipv6_conf_default_accept_source_route", "remarks": "rule_set_097" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Maximum Number of Autoconfigured Addresses on All IPv6 Interfaces", + "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv6 Interfaces by Default", "remarks": "rule_set_097" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_max_addresses", + "value": "sysctl_net_ipv6_conf_all_max_addresses", "remarks": "rule_set_098" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Maximum Number of Autoconfigured Addresses on All IPv6 Interfaces By Default", + "value": "Configure Maximum Number of Autoconfigured Addresses on All IPv6 Interfaces", "remarks": "rule_set_098" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_suid_dumpable", + "value": "sysctl_net_ipv6_conf_default_max_addresses", "remarks": "rule_set_099" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Core Dumps for SUID programs", + "value": "Configure Maximum Number of Autoconfigured Addresses on All IPv6 Interfaces By Default", "remarks": "rule_set_099" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_protected_fifos", + "value": "sysctl_fs_suid_dumpable", "remarks": "rule_set_100" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Enforce DAC on FIFOs", + "value": "Disable Core Dumps for SUID programs", "remarks": "rule_set_100" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_protected_regular", + "value": "sysctl_fs_protected_fifos", "remarks": "rule_set_101" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Enforce DAC on Regular files", + "value": "Enable Kernel Parameter to Enforce DAC on FIFOs", "remarks": "rule_set_101" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_protected_symlinks", + "value": "sysctl_fs_protected_regular", "remarks": "rule_set_102" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", + "value": "Enable Kernel Parameter to Enforce DAC on Regular files", "remarks": "rule_set_102" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_protected_hardlinks", + "value": "sysctl_fs_protected_symlinks", "remarks": "rule_set_103" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Enforce DAC on Hardlinks", + "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", "remarks": "rule_set_103" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_nodev_nonroot_local_partitions", + "value": "sysctl_fs_protected_hardlinks", "remarks": "rule_set_104" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add nodev Option to Non-Root Local Partitions", + "value": "Enable Kernel Parameter to Enforce DAC on Hardlinks", "remarks": "rule_set_104" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "partition_for_boot", + "value": "mount_option_nodev_nonroot_local_partitions", "remarks": "rule_set_105" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure /boot Located On Separate Partition", + "value": "Add nodev Option to Non-Root Local Partitions", "remarks": "rule_set_105" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_boot_nosuid", + "value": "partition_for_boot", "remarks": "rule_set_106" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add nosuid Option to /boot", + "value": "Ensure /boot Located On Separate Partition", "remarks": "rule_set_106" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_boot_noexec", + "value": "mount_option_boot_nosuid", "remarks": "rule_set_107" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add noexec Option to /boot", + "value": "Add nosuid Option to /boot", "remarks": "rule_set_107" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "partition_for_opt", + "value": "mount_option_boot_noexec", "remarks": "rule_set_108" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure /opt Located On Separate Partition", + "value": "Add noexec Option to /boot", "remarks": "rule_set_108" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_opt_nosuid", + "value": "partition_for_opt", "remarks": "rule_set_109" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add nosuid Option to /opt", + "value": "Ensure /opt Located On Separate Partition", "remarks": "rule_set_109" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "systemd_tmp_mount_enabled", + "value": "mount_option_opt_nosuid", "remarks": "rule_set_110" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure tmp.mount Unit Is Enabled", + "value": "Add nosuid Option to /opt", "remarks": "rule_set_110" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_tmp_nosuid", + "value": "systemd_tmp_mount_enabled", "remarks": "rule_set_111" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add nosuid Option to /tmp", + "value": "Ensure tmp.mount Unit Is Enabled", "remarks": "rule_set_111" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_tmp_noexec", + "value": "mount_option_tmp_nosuid", "remarks": "rule_set_112" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add noexec Option to /tmp", + "value": "Add nosuid Option to /tmp", "remarks": "rule_set_112" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "partition_for_srv", + "value": "mount_option_tmp_noexec", "remarks": "rule_set_113" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure /srv Located On Separate Partition", + "value": "Add noexec Option to /tmp", "remarks": "rule_set_113" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_srv_nosuid", + "value": "partition_for_srv", "remarks": "rule_set_114" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add nosuid Option to /srv", + "value": "Ensure /srv Located On Separate Partition", "remarks": "rule_set_114" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "partition_for_home", + "value": "mount_option_srv_nosuid", "remarks": "rule_set_115" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure /home Located On Separate Partition", + "value": "Add nosuid Option to /srv", "remarks": "rule_set_115" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_home_nosuid", + "value": "partition_for_home", "remarks": "rule_set_116" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add nosuid Option to /home", + "value": "Ensure /home Located On Separate Partition", "remarks": "rule_set_116" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_home_noexec", + "value": "mount_option_home_nosuid", "remarks": "rule_set_117" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add noexec Option to /home", + "value": "Add nosuid Option to /home", "remarks": "rule_set_117" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "partition_for_usr", + "value": "mount_option_home_noexec", "remarks": "rule_set_118" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure /usr Located On Separate Partition", + "value": "Add noexec Option to /home", "remarks": "rule_set_118" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "partition_for_var", + "value": "partition_for_usr", "remarks": "rule_set_119" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure /var Located On Separate Partition", + "value": "Ensure /usr Located On Separate Partition", "remarks": "rule_set_119" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_var_nosuid", + "value": "partition_for_var", "remarks": "rule_set_120" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add nosuid Option to /var", + "value": "Ensure /var Located On Separate Partition", "remarks": "rule_set_120" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_var_noexec", + "value": "mount_option_var_nosuid", "remarks": "rule_set_121" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add noexec Option to /var", + "value": "Add nosuid Option to /var", "remarks": "rule_set_121" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "partition_for_var_log", + "value": "mount_option_var_noexec", "remarks": "rule_set_122" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure /var/log Located On Separate Partition", + "value": "Add noexec Option to /var", "remarks": "rule_set_122" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_var_log_noexec", + "value": "partition_for_var_log", "remarks": "rule_set_123" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add noexec Option to /var/log", + "value": "Ensure /var/log Located On Separate Partition", "remarks": "rule_set_123" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_var_log_nosuid", + "value": "mount_option_var_log_noexec", "remarks": "rule_set_124" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add nosuid Option to /var/log", + "value": "Add noexec Option to /var/log", "remarks": "rule_set_124" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "partition_for_var_tmp", + "value": "mount_option_var_log_nosuid", "remarks": "rule_set_125" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure /var/tmp Located On Separate Partition", + "value": "Add nosuid Option to /var/log", "remarks": "rule_set_125" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_var_tmp_nosuid", + "value": "partition_for_var_tmp", "remarks": "rule_set_126" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add nosuid Option to /var/tmp", + "value": "Ensure /var/tmp Located On Separate Partition", "remarks": "rule_set_126" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_var_tmp_noexec", + "value": "mount_option_var_tmp_nosuid", "remarks": "rule_set_127" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add noexec Option to /var/tmp", + "value": "Add nosuid Option to /var/tmp", "remarks": "rule_set_127" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "logind_session_timeout", + "value": "mount_option_var_tmp_noexec", "remarks": "rule_set_128" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Logind to terminate idle sessions after certain time of inactivity", + "value": "Add noexec Option to /var/tmp", "remarks": "rule_set_128" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_tmout", + "value": "logind_session_timeout", "remarks": "rule_set_129" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Interactive Session Timeout", + "value": "Configure Logind to terminate idle sessions after certain time of inactivity", "remarks": "rule_set_129" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_direct_root_logins", + "value": "accounts_tmout", "remarks": "rule_set_130" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Direct root Logins Not Allowed", + "value": "Set Interactive Session Timeout", "remarks": "rule_set_130" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_root_login", + "value": "no_direct_root_logins", "remarks": "rule_set_131" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Root Login", + "value": "Direct root Logins Not Allowed", "remarks": "rule_set_131" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_sudo_installed", + "value": "sshd_disable_root_login", "remarks": "rule_set_132" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install sudo Package", + "value": "Disable SSH Root Login", "remarks": "rule_set_132" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_privileged_commands_sudo", + "value": "package_sudo_installed", "remarks": "rule_set_133" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure auditd Collects Information on the Use of Privileged Commands - sudo", + "value": "Install sudo Package", "remarks": "rule_set_133" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_auditd_enabled", + "value": "audit_rules_privileged_commands_sudo", "remarks": "rule_set_134" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable auditd Service", + "value": "Ensure auditd Collects Information on the Use of Privileged Commands - sudo", "remarks": "rule_set_134" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_audit_installed", + "value": "service_auditd_enabled", "remarks": "rule_set_135" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the audit Subsystem is Installed", + "value": "Enable auditd Service", "remarks": "rule_set_135" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sudo_add_noexec", + "value": "package_audit_installed", "remarks": "rule_set_136" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Privileged Escalated Commands Cannot Execute Other Commands - sudo NOEXEC", + "value": "Ensure the audit Subsystem is Installed", "remarks": "rule_set_136" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sudo_add_requiretty", + "value": "sudo_add_noexec", "remarks": "rule_set_137" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo requiretty", + "value": "Ensure Privileged Escalated Commands Cannot Execute Other Commands - sudo NOEXEC", "remarks": "rule_set_137" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sudo_add_use_pty", + "value": "sudo_add_requiretty", "remarks": "rule_set_138" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo use_pty", + "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo requiretty", "remarks": "rule_set_138" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sudo_add_ignore_dot", + "value": "sudo_add_use_pty", "remarks": "rule_set_139" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure sudo Ignores Commands In Current Dir - sudo ignore_dot", + "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo use_pty", "remarks": "rule_set_139" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sudo_add_env_reset", + "value": "sudo_add_ignore_dot", "remarks": "rule_set_140" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure sudo Runs In A Minimal Environment - sudo env_reset", + "value": "Ensure sudo Ignores Commands In Current Dir - sudo ignore_dot", "remarks": "rule_set_140" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sudoers_no_root_target", + "value": "sudo_add_env_reset", "remarks": "rule_set_141" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Don't target root user in the sudoers file", + "value": "Ensure sudo Runs In A Minimal Environment - sudo env_reset", "remarks": "rule_set_141" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sudoers_no_command_negation", + "value": "sudoers_no_root_target", "remarks": "rule_set_142" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Don't define allowed commands in sudoers by means of exclusion", + "value": "Don't target root user in the sudoers file", "remarks": "rule_set_142" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sudoers_explicit_command_args", + "value": "sudoers_no_command_negation", "remarks": "rule_set_143" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Explicit arguments in sudo specifications", + "value": "Don't define allowed commands in sudoers by means of exclusion", "remarks": "rule_set_143" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_shadow", + "value": "sudoers_explicit_command_args", "remarks": "rule_set_144" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns shadow File", + "value": "Explicit arguments in sudo specifications", "remarks": "rule_set_144" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_shadow", + "value": "file_owner_etc_shadow", "remarks": "rule_set_145" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns shadow File", + "value": "Verify User Who Owns shadow File", "remarks": "rule_set_145" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_shadow", + "value": "file_groupowner_etc_shadow", "remarks": "rule_set_146" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on shadow File", + "value": "Verify Group Who Owns shadow File", "remarks": "rule_set_146" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_gshadow", + "value": "file_permissions_etc_shadow", "remarks": "rule_set_147" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns gshadow File", + "value": "Verify Permissions on shadow File", "remarks": "rule_set_147" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_gshadow", + "value": "file_owner_etc_gshadow", "remarks": "rule_set_148" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns gshadow File", + "value": "Verify User Who Owns gshadow File", "remarks": "rule_set_148" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_gshadow", + "value": "file_groupowner_etc_gshadow", "remarks": "rule_set_149" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on gshadow File", + "value": "Verify Group Who Owns gshadow File", "remarks": "rule_set_149" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_passwd", + "value": "file_permissions_etc_gshadow", "remarks": "rule_set_150" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns passwd File", + "value": "Verify Permissions on gshadow File", "remarks": "rule_set_150" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_passwd", + "value": "file_owner_etc_passwd", "remarks": "rule_set_151" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns passwd File", + "value": "Verify User Who Owns passwd File", "remarks": "rule_set_151" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_passwd", + "value": "file_groupowner_etc_passwd", "remarks": "rule_set_152" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on passwd File", + "value": "Verify Group Who Owns passwd File", "remarks": "rule_set_152" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_group", + "value": "file_permissions_etc_passwd", "remarks": "rule_set_153" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns group File", + "value": "Verify Permissions on passwd File", "remarks": "rule_set_153" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_group", + "value": "file_owner_etc_group", "remarks": "rule_set_154" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns group File", + "value": "Verify User Who Owns group File", "remarks": "rule_set_154" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_group", + "value": "file_groupowner_etc_group", "remarks": "rule_set_155" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on group File", + "value": "Verify Group Who Owns group File", "remarks": "rule_set_155" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_shells", + "value": "file_permissions_etc_group", "remarks": "rule_set_156" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Who Owns /etc/shells File", + "value": "Verify Permissions on group File", "remarks": "rule_set_156" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_shells", + "value": "file_owner_etc_shells", "remarks": "rule_set_157" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns /etc/shells File", + "value": "Verify Who Owns /etc/shells File", "remarks": "rule_set_157" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_shells", + "value": "file_groupowner_etc_shells", "remarks": "rule_set_158" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on /etc/shells File", + "value": "Verify Group Who Owns /etc/shells File", "remarks": "rule_set_158" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_user_dot_group_ownership", + "value": "file_permissions_etc_shells", "remarks": "rule_set_159" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "User Initialization Files Must Be Group-Owned By The Primary Group", + "value": "Verify Permissions on /etc/shells File", "remarks": "rule_set_159" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_user_dot_user_ownership", + "value": "accounts_user_dot_group_ownership", "remarks": "rule_set_160" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "User Initialization Files Must Be Owned By the Primary User", + "value": "User Initialization Files Must Be Group-Owned By The Primary Group", "remarks": "rule_set_160" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_users_home_files_groupownership", + "value": "accounts_user_dot_user_ownership", "remarks": "rule_set_161" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All User Files and Directories In The Home Directory Must Be Group-Owned By The Primary Group", + "value": "User Initialization Files Must Be Owned By the Primary User", "remarks": "rule_set_161" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_users_home_files_ownership", + "value": "accounts_users_home_files_groupownership", "remarks": "rule_set_162" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All User Files and Directories In The Home Directory Must Have a Valid Owner", + "value": "All User Files and Directories In The Home Directory Must Be Group-Owned By The Primary Group", "remarks": "rule_set_162" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_users_home_files_permissions", + "value": "accounts_users_home_files_ownership", "remarks": "rule_set_163" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All User Files and Directories In The Home Directory Must Have Mode 0750 Or Less Permissive", + "value": "All User Files and Directories In The Home Directory Must Have a Valid Owner", "remarks": "rule_set_163" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permission_user_init_files", + "value": "accounts_users_home_files_permissions", "remarks": "rule_set_164" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", + "value": "All User Files and Directories In The Home Directory Must Have Mode 0750 Or Less Permissive", "remarks": "rule_set_164" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dir_system_commands_group_root_owned", + "value": "file_permission_user_init_files", "remarks": "rule_set_165" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify that system commands directories have root as a group owner", + "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", "remarks": "rule_set_165" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dir_system_commands_root_owned", + "value": "dir_system_commands_group_root_owned", "remarks": "rule_set_166" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify that system commands directories have root ownership", + "value": "Verify that system commands directories have root as a group owner", "remarks": "rule_set_166" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupownership_system_commands_dirs", + "value": "dir_system_commands_root_owned", "remarks": "rule_set_167" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify that system commands files are group owned by root or a system account", + "value": "Verify that system commands directories have root ownership", "remarks": "rule_set_167" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_ownership_binary_dirs", + "value": "file_groupownership_system_commands_dirs", "remarks": "rule_set_168" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify that System Executables Have Root Ownership", + "value": "Verify that system commands files are group owned by root or a system account", "remarks": "rule_set_168" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_binary_dirs", + "value": "file_ownership_binary_dirs", "remarks": "rule_set_169" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify that System Executables Have Restrictive Permissions", + "value": "Verify that System Executables Have Root Ownership", "remarks": "rule_set_169" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_ownership_sshd_private_key", + "value": "file_permissions_binary_dirs", "remarks": "rule_set_170" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Ownership on SSH Server Private *_key Key Files", + "value": "Verify that System Executables Have Restrictive Permissions", "remarks": "rule_set_170" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupownership_sshd_private_key", + "value": "file_ownership_sshd_private_key", "remarks": "rule_set_171" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Ownership on SSH Server Private *_key Key Files", + "value": "Verify Ownership on SSH Server Private *_key Key Files", "remarks": "rule_set_171" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_sshd_private_key", + "value": "file_groupownership_sshd_private_key", "remarks": "rule_set_172" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on SSH Server Private *_key Key Files", + "value": "Verify Group Ownership on SSH Server Private *_key Key Files", "remarks": "rule_set_172" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_ownership_sshd_pub_key", + "value": "file_permissions_sshd_private_key", "remarks": "rule_set_173" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Ownership on SSH Server Public *.pub Key Files", + "value": "Verify Permissions on SSH Server Private *_key Key Files", "remarks": "rule_set_173" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupownership_sshd_pub_key", + "value": "file_ownership_sshd_pub_key", "remarks": "rule_set_174" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Ownership on SSH Server Public *.pub Key Files", + "value": "Verify Ownership on SSH Server Public *.pub Key Files", "remarks": "rule_set_174" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_sshd_pub_key", + "value": "file_groupownership_sshd_pub_key", "remarks": "rule_set_175" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on SSH Server Public *.pub Key Files", + "value": "Verify Group Ownership on SSH Server Public *.pub Key Files", "remarks": "rule_set_175" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_sshd_config", + "value": "file_permissions_sshd_pub_key", "remarks": "rule_set_176" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on SSH Server config file", + "value": "Verify Permissions on SSH Server Public *.pub Key Files", "remarks": "rule_set_176" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_sshd_config", + "value": "file_owner_sshd_config", "remarks": "rule_set_177" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns SSH Server config file", + "value": "Verify Owner on SSH Server config file", "remarks": "rule_set_177" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_sshd_config", + "value": "file_groupowner_sshd_config", "remarks": "rule_set_178" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on SSH Server config file", + "value": "Verify Group Who Owns SSH Server config file", "remarks": "rule_set_178" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "directory_owner_etc_selinux", + "value": "file_permissions_sshd_config", "remarks": "rule_set_179" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns /etc/selinux Directory", + "value": "Verify Permissions on SSH Server config file", "remarks": "rule_set_179" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "directory_groupowner_etc_selinux", + "value": "directory_owner_etc_selinux", "remarks": "rule_set_180" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns /etc/selinux Directory", + "value": "Verify User Who Owns /etc/selinux Directory", "remarks": "rule_set_180" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "directory_permissions_etc_selinux", + "value": "directory_groupowner_etc_selinux", "remarks": "rule_set_181" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions On /etc/selinux Directory", + "value": "Verify Group Who Owns /etc/selinux Directory", "remarks": "rule_set_181" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_sestatus_conf", + "value": "directory_permissions_etc_selinux", "remarks": "rule_set_182" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns /etc/sestatus.conf File", + "value": "Verify Permissions On /etc/selinux Directory", "remarks": "rule_set_182" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_sestatus_conf", + "value": "file_owner_etc_sestatus_conf", "remarks": "rule_set_183" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns /etc/sestatus.conf File", + "value": "Verify User Who Owns /etc/sestatus.conf File", "remarks": "rule_set_183" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_sestatus_conf", + "value": "file_groupowner_etc_sestatus_conf", "remarks": "rule_set_184" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions On /etc/sestatus.conf File", + "value": "Verify Group Who Owns /etc/sestatus.conf File", "remarks": "rule_set_184" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "directory_owner_etc_ipsecd", + "value": "file_permissions_etc_sestatus_conf", "remarks": "rule_set_185" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns /etc/ipsec.d Directory", + "value": "Verify Permissions On /etc/sestatus.conf File", "remarks": "rule_set_185" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "directory_groupowner_etc_ipsecd", + "value": "directory_owner_etc_ipsecd", "remarks": "rule_set_186" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns /etc/ipsec.d Directory", + "value": "Verify User Who Owns /etc/ipsec.d Directory", "remarks": "rule_set_186" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "directory_permissions_etc_ipsecd", + "value": "directory_groupowner_etc_ipsecd", "remarks": "rule_set_187" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions On /etc/ipsec.d Directory", + "value": "Verify Group Who Owns /etc/ipsec.d Directory", "remarks": "rule_set_187" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_ipsec_conf", + "value": "directory_permissions_etc_ipsecd", "remarks": "rule_set_188" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns /etc/ipsec.conf File", + "value": "Verify Permissions On /etc/ipsec.d Directory", "remarks": "rule_set_188" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_ipsec_conf", + "value": "file_owner_etc_ipsec_conf", "remarks": "rule_set_189" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns /etc/ipsec.conf File", + "value": "Verify User Who Owns /etc/ipsec.conf File", "remarks": "rule_set_189" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_ipsec_conf", + "value": "file_groupowner_etc_ipsec_conf", "remarks": "rule_set_190" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions On /etc/ipsec.conf File", + "value": "Verify Group Who Owns /etc/ipsec.conf File", "remarks": "rule_set_190" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_ipsec_secrets", + "value": "file_permissions_etc_ipsec_conf", "remarks": "rule_set_191" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns /etc/ipsec.secrets File", + "value": "Verify Permissions On /etc/ipsec.conf File", "remarks": "rule_set_191" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_ipsec_secrets", + "value": "file_owner_etc_ipsec_secrets", "remarks": "rule_set_192" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns /etc/ipsec.secrets File", + "value": "Verify User Who Owns /etc/ipsec.secrets File", "remarks": "rule_set_192" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_ipsec_secrets", + "value": "file_groupowner_etc_ipsec_secrets", "remarks": "rule_set_193" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions On /etc/ipsec.secrets File", + "value": "Verify Group Who Owns /etc/ipsec.secrets File", "remarks": "rule_set_193" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "directory_owner_etc_iptables", + "value": "file_permissions_etc_ipsec_secrets", "remarks": "rule_set_194" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns /etc/iptables Directory", + "value": "Verify Permissions On /etc/ipsec.secrets File", "remarks": "rule_set_194" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "directory_groupowner_etc_iptables", + "value": "directory_owner_etc_iptables", "remarks": "rule_set_195" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns /etc/iptables Directory", + "value": "Verify User Who Owns /etc/iptables Directory", "remarks": "rule_set_195" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "directory_permissions_etc_iptables", + "value": "directory_groupowner_etc_iptables", "remarks": "rule_set_196" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions On /etc/iptables Directory", + "value": "Verify Group Who Owns /etc/iptables Directory", "remarks": "rule_set_196" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "directory_owner_etc_nftables", + "value": "directory_permissions_etc_iptables", + "remarks": "rule_set_197" + }, + { + "name": "Rule_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Verify Permissions On /etc/iptables Directory", "remarks": "rule_set_197" }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "directory_owner_etc_nftables", + "remarks": "rule_set_198" + }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/nftables Directory", - "remarks": "rule_set_197" + "remarks": "rule_set_198" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_nftables", - "remarks": "rule_set_198" + "remarks": "rule_set_199" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/nftables Directory", - "remarks": "rule_set_198" + "remarks": "rule_set_199" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_nftables", - "remarks": "rule_set_199" + "remarks": "rule_set_200" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/nftables Directory", - "remarks": "rule_set_199" + "remarks": "rule_set_200" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_etc_sysctld", - "remarks": "rule_set_200" + "remarks": "rule_set_201" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/sysctl.d Directory", - "remarks": "rule_set_200" + "remarks": "rule_set_201" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_sysctld", - "remarks": "rule_set_201" + "remarks": "rule_set_202" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/sysctl.d Directory", - "remarks": "rule_set_201" + "remarks": "rule_set_202" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_sysctld", - "remarks": "rule_set_202" + "remarks": "rule_set_203" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/sysctl.d Directory", - "remarks": "rule_set_202" + "remarks": "rule_set_203" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_sudoers", - "remarks": "rule_set_203" + "remarks": "rule_set_204" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/sudoers File", - "remarks": "rule_set_203" + "remarks": "rule_set_204" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_sudoers", - "remarks": "rule_set_204" + "remarks": "rule_set_205" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/sudoers File", - "remarks": "rule_set_204" + "remarks": "rule_set_205" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_sudoers", - "remarks": "rule_set_205" + "remarks": "rule_set_206" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/sudoers File", - "remarks": "rule_set_205" + "remarks": "rule_set_206" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_etc_sudoersd", - "remarks": "rule_set_206" + "remarks": "rule_set_207" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/sudoers.d Directory", - "remarks": "rule_set_206" + "remarks": "rule_set_207" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_sudoersd", - "remarks": "rule_set_207" + "remarks": "rule_set_208" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/sudoers.d Directory", - "remarks": "rule_set_207" + "remarks": "rule_set_208" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_sudoersd", - "remarks": "rule_set_208" + "remarks": "rule_set_209" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/sudoers.d Directory", - "remarks": "rule_set_208" + "remarks": "rule_set_209" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_crypttab", - "remarks": "rule_set_209" + "remarks": "rule_set_210" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/crypttab File", - "remarks": "rule_set_209" + "remarks": "rule_set_210" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_crypttab", - "remarks": "rule_set_210" + "remarks": "rule_set_211" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/crypttab File", - "remarks": "rule_set_210" + "remarks": "rule_set_211" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_crypttab", - "remarks": "rule_set_211" + "remarks": "rule_set_212" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/crypttab File", - "remarks": "rule_set_211" + "remarks": "rule_set_212" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_chrony_keys", - "remarks": "rule_set_212" + "remarks": "rule_set_213" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/chrony.keys File", - "remarks": "rule_set_212" + "remarks": "rule_set_213" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_chrony_keys", - "remarks": "rule_set_213" + "remarks": "rule_set_214" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/chrony.keys File", - "remarks": "rule_set_213" + "remarks": "rule_set_214" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_chrony_keys", - "remarks": "rule_set_214" + "remarks": "rule_set_215" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/chrony.keys File", - "remarks": "rule_set_214" + "remarks": "rule_set_215" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "enable_pam_namespace", - "remarks": "rule_set_215" + "remarks": "rule_set_216" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Up a Private Namespace in PAM Configuration", - "remarks": "rule_set_215" + "remarks": "rule_set_216" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_polyinstantiated_tmp", - "remarks": "rule_set_216" + "remarks": "rule_set_217" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Polyinstantiation of /tmp Directories", - "remarks": "rule_set_216" + "remarks": "rule_set_217" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_polyinstantiated_var_tmp", - "remarks": "rule_set_217" + "remarks": "rule_set_218" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Polyinstantiation of /var/tmp Directories", - "remarks": "rule_set_217" + "remarks": "rule_set_218" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sebool_polyinstantiation_enabled", - "remarks": "rule_set_218" + "remarks": "rule_set_219" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the polyinstantiation_enabled SELinux Boolean", - "remarks": "rule_set_218" + "remarks": "rule_set_219" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_sssd_installed", - "remarks": "rule_set_219" + "remarks": "rule_set_220" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install the SSSD Package", - "remarks": "rule_set_219" + "remarks": "rule_set_220" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_sssd_enabled", - "remarks": "rule_set_220" + "remarks": "rule_set_221" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable the SSSD Service", - "remarks": "rule_set_220" + "remarks": "rule_set_221" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "postfix_network_listening_disabled", - "remarks": "rule_set_221" + "remarks": "rule_set_222" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Postfix Network Listening", - "remarks": "rule_set_221" + "remarks": "rule_set_222" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "postfix_client_configure_mail_alias", - "remarks": "rule_set_222" + "remarks": "rule_set_223" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure System to Forward All Mail For The Root Account", - "remarks": "rule_set_222" + "remarks": "rule_set_223" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_state", - "remarks": "rule_set_223" + "remarks": "rule_set_224" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SELinux State is Enforcing", - "remarks": "rule_set_223" + "remarks": "rule_set_224" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_224" + "remarks": "rule_set_225" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_224" + "remarks": "rule_set_225" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_build_database", - "remarks": "rule_set_225" + "remarks": "rule_set_226" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Build and Test AIDE Database", - "remarks": "rule_set_225" + "remarks": "rule_set_226" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_nosmep_argument_absent", - "remarks": "rule_set_226" + "remarks": "rule_set_227" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SMEP is not disabled during boot", - "remarks": "rule_set_226" + "remarks": "rule_set_227" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_nosmap_argument_absent", - "remarks": "rule_set_227" + "remarks": "rule_set_228" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SMAP is not disabled during boot", - "remarks": "rule_set_227" + "remarks": "rule_set_228" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_enable_iommu_force", - "remarks": "rule_set_228" + "remarks": "rule_set_229" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "IOMMU configuration directive", - "remarks": "rule_set_228" + "remarks": "rule_set_229" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_modules_disabled", - "remarks": "rule_set_229" + "remarks": "rule_set_230" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable loading and unloading of kernel modules", - "remarks": "rule_set_229" + "remarks": "rule_set_230" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_grub2_cfg", - "remarks": "rule_set_230" + "remarks": "rule_set_231" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify /boot/grub2/grub.cfg Group Ownership", - "remarks": "rule_set_230" + "remarks": "rule_set_231" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_grub2_cfg", - "remarks": "rule_set_231" + "remarks": "rule_set_232" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify /boot/grub2/grub.cfg User Ownership", - "remarks": "rule_set_231" + "remarks": "rule_set_232" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_grub2_cfg", - "remarks": "rule_set_232" + "remarks": "rule_set_233" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify /boot/grub2/grub.cfg Permissions", - "remarks": "rule_set_232" + "remarks": "rule_set_233" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_user_cfg", - "remarks": "rule_set_233" + "remarks": "rule_set_234" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify /boot/grub2/user.cfg Group Ownership", - "remarks": "rule_set_233" + "remarks": "rule_set_234" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_user_cfg", - "remarks": "rule_set_234" + "remarks": "rule_set_235" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify /boot/grub2/user.cfg User Ownership", - "remarks": "rule_set_234" + "remarks": "rule_set_235" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_user_cfg", - "remarks": "rule_set_235" + "remarks": "rule_set_236" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify /boot/grub2/user.cfg Permissions", - "remarks": "rule_set_235" + "remarks": "rule_set_236" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_systemmap", - "remarks": "rule_set_236" + "remarks": "rule_set_237" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns System.map Files", - "remarks": "rule_set_236" + "remarks": "rule_set_237" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_systemmap", - "remarks": "rule_set_237" + "remarks": "rule_set_238" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns System.map Files", - "remarks": "rule_set_237" + "remarks": "rule_set_238" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_systemmap", - "remarks": "rule_set_238" + "remarks": "rule_set_239" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on System.map Files", - "remarks": "rule_set_238" + "remarks": "rule_set_239" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_bashrc", - "remarks": "rule_set_239" + "remarks": "rule_set_240" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Bash Umask is Set Correctly", - "remarks": "rule_set_239" + "remarks": "rule_set_240" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_login_defs", - "remarks": "rule_set_240" + "remarks": "rule_set_241" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in login.defs", - "remarks": "rule_set_240" + "remarks": "rule_set_241" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_profile", - "remarks": "rule_set_241" + "remarks": "rule_set_242" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in /etc/profile", - "remarks": "rule_set_241" + "remarks": "rule_set_242" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_dedicated_group", - "remarks": "rule_set_242" + "remarks": "rule_set_243" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure a dedicated group owns sudo", - "remarks": "rule_set_242" + "remarks": "rule_set_243" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sudo", - "remarks": "rule_set_243" + "remarks": "rule_set_244" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure That the sudo Binary Has the Correct Permissions", - "remarks": "rule_set_243" + "remarks": "rule_set_244" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_policytype", - "remarks": "rule_set_244" + "remarks": "rule_set_245" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure SELinux Policy", - "remarks": "rule_set_244" + "remarks": "rule_set_245" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_chrony_installed", - "remarks": "rule_set_245" + "remarks": "rule_set_246" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "The Chrony package is installed", - "remarks": "rule_set_245" + "remarks": "rule_set_246" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_chronyd_enabled", - "remarks": "rule_set_246" + "remarks": "rule_set_247" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "The Chronyd service is enabled", - "remarks": "rule_set_246" + "remarks": "rule_set_247" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_specify_remote_server", - "remarks": "rule_set_247" + "remarks": "rule_set_248" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "A remote time server for Chrony is configured", - "remarks": "rule_set_247" + "remarks": "rule_set_248" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_configure_pool_and_server", - "remarks": "rule_set_248" + "remarks": "rule_set_249" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Chrony Configure Pool and Server", - "remarks": "rule_set_248" + "remarks": "rule_set_249" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_remote_loghost", - "remarks": "rule_set_249" + "remarks": "rule_set_250" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Logs Sent To Remote Host", - "remarks": "rule_set_249" + "remarks": "rule_set_250" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_rsyslog-gnutls_installed", - "remarks": "rule_set_250" + "remarks": "rule_set_251" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure rsyslog-gnutls is installed", - "remarks": "rule_set_250" + "remarks": "rule_set_251" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_remote_tls", - "remarks": "rule_set_251" + "remarks": "rule_set_252" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure TLS for rsyslog remote logging", - "remarks": "rule_set_251" + "remarks": "rule_set_252" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_remote_tls_cacert", - "remarks": "rule_set_252" + "remarks": "rule_set_253" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure CA certificate for rsyslog remote logging", - "remarks": "rule_set_252" + "remarks": "rule_set_253" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log_audit", - "remarks": "rule_set_253" + "remarks": "rule_set_254" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log/audit Located On Separate Partition", - "remarks": "rule_set_253" + "remarks": "rule_set_254" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_logrotate_installed", - "remarks": "rule_set_254" + "remarks": "rule_set_255" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure logrotate is Installed", - "remarks": "rule_set_254" + "remarks": "rule_set_255" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "timer_logrotate_enabled", - "remarks": "rule_set_255" + "remarks": "rule_set_256" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable logrotate Timer", - "remarks": "rule_set_255" + "remarks": "rule_set_256" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_logrotate_activated", - "remarks": "rule_set_256" + "remarks": "rule_set_257" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Logrotate Runs Periodically", - "remarks": "rule_set_256" + "remarks": "rule_set_257" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_257" + "remarks": "rule_set_258" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_257" + "remarks": "rule_set_258" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_258" + "remarks": "rule_set_259" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_258" + "remarks": "rule_set_259" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_259" + "remarks": "rule_set_260" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_259" + "remarks": "rule_set_260" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_sysadmin_actions", - "remarks": "rule_set_260" + "remarks": "rule_set_261" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects System Administrator Actions", - "remarks": "rule_set_260" + "remarks": "rule_set_261" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_sudo_log_events", - "remarks": "rule_set_261" + "remarks": "rule_set_262" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to perform maintenance activities", - "remarks": "rule_set_261" + "remarks": "rule_set_262" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_faillock", - "remarks": "rule_set_262" + "remarks": "rule_set_263" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - faillock", - "remarks": "rule_set_262" + "remarks": "rule_set_263" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_lastlog", - "remarks": "rule_set_263" + "remarks": "rule_set_264" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - lastlog", - "remarks": "rule_set_263" + "remarks": "rule_set_264" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_utmp", - "remarks": "rule_set_264" + "remarks": "rule_set_265" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information utmp", - "remarks": "rule_set_264" + "remarks": "rule_set_265" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_btmp", - "remarks": "rule_set_265" + "remarks": "rule_set_266" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information btmp", - "remarks": "rule_set_265" + "remarks": "rule_set_266" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_wtmp", - "remarks": "rule_set_266" + "remarks": "rule_set_267" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", - "remarks": "rule_set_266" + "remarks": "rule_set_267" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_adjtimex", - "remarks": "rule_set_267" + "remarks": "rule_set_268" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through adjtimex", - "remarks": "rule_set_267" + "remarks": "rule_set_268" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_clock_settime", - "remarks": "rule_set_268" + "remarks": "rule_set_269" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through clock_settime", - "remarks": "rule_set_268" + "remarks": "rule_set_269" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_stime", - "remarks": "rule_set_269" + "remarks": "rule_set_270" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through stime", - "remarks": "rule_set_269" + "remarks": "rule_set_270" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_watch_localtime", - "remarks": "rule_set_270" + "remarks": "rule_set_271" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter the localtime File", - "remarks": "rule_set_270" + "remarks": "rule_set_271" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification", - "remarks": "rule_set_271" + "remarks": "rule_set_272" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment", - "remarks": "rule_set_271" + "remarks": "rule_set_272" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chmod", - "remarks": "rule_set_272" + "remarks": "rule_set_273" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", - "remarks": "rule_set_272" + "remarks": "rule_set_273" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chown", - "remarks": "rule_set_273" + "remarks": "rule_set_274" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chown", - "remarks": "rule_set_273" + "remarks": "rule_set_274" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmod", - "remarks": "rule_set_274" + "remarks": "rule_set_275" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmod", - "remarks": "rule_set_274" + "remarks": "rule_set_275" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat", - "remarks": "rule_set_275" + "remarks": "rule_set_276" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat", - "remarks": "rule_set_275" + "remarks": "rule_set_276" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat2", - "remarks": "rule_set_276" + "remarks": "rule_set_277" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat2", - "remarks": "rule_set_276" + "remarks": "rule_set_277" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchown", - "remarks": "rule_set_277" + "remarks": "rule_set_278" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchown", - "remarks": "rule_set_277" + "remarks": "rule_set_278" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchownat", - "remarks": "rule_set_278" + "remarks": "rule_set_279" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchownat", - "remarks": "rule_set_278" + "remarks": "rule_set_279" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fremovexattr", - "remarks": "rule_set_279" + "remarks": "rule_set_280" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fremovexattr", - "remarks": "rule_set_279" + "remarks": "rule_set_280" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fsetxattr", - "remarks": "rule_set_280" + "remarks": "rule_set_281" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fsetxattr", - "remarks": "rule_set_280" + "remarks": "rule_set_281" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lchown", - "remarks": "rule_set_281" + "remarks": "rule_set_282" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lchown", - "remarks": "rule_set_281" + "remarks": "rule_set_282" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lremovexattr", - "remarks": "rule_set_282" + "remarks": "rule_set_283" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lremovexattr", - "remarks": "rule_set_282" + "remarks": "rule_set_283" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lsetxattr", - "remarks": "rule_set_283" + "remarks": "rule_set_284" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lsetxattr", - "remarks": "rule_set_283" + "remarks": "rule_set_284" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_removexattr", - "remarks": "rule_set_284" + "remarks": "rule_set_285" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - removexattr", - "remarks": "rule_set_284" + "remarks": "rule_set_285" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_setxattr", - "remarks": "rule_set_285" + "remarks": "rule_set_286" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - setxattr", - "remarks": "rule_set_285" + "remarks": "rule_set_286" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_creat", - "remarks": "rule_set_286" + "remarks": "rule_set_287" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - creat", - "remarks": "rule_set_286" + "remarks": "rule_set_287" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_ftruncate", - "remarks": "rule_set_287" + "remarks": "rule_set_288" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - ftruncate", - "remarks": "rule_set_287" + "remarks": "rule_set_288" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_open", - "remarks": "rule_set_288" + "remarks": "rule_set_289" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - open", - "remarks": "rule_set_288" + "remarks": "rule_set_289" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_openat", - "remarks": "rule_set_289" + "remarks": "rule_set_290" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - openat", - "remarks": "rule_set_289" + "remarks": "rule_set_290" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_truncate", - "remarks": "rule_set_290" + "remarks": "rule_set_291" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - truncate", - "remarks": "rule_set_290" + "remarks": "rule_set_291" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_group", - "remarks": "rule_set_291" + "remarks": "rule_set_292" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/group", - "remarks": "rule_set_291" + "remarks": "rule_set_292" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_gshadow", - "remarks": "rule_set_292" + "remarks": "rule_set_293" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/gshadow", - "remarks": "rule_set_292" + "remarks": "rule_set_293" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_opasswd", - "remarks": "rule_set_293" + "remarks": "rule_set_294" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", - "remarks": "rule_set_293" + "remarks": "rule_set_294" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_passwd", - "remarks": "rule_set_294" + "remarks": "rule_set_295" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/passwd", - "remarks": "rule_set_294" + "remarks": "rule_set_295" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_shadow", - "remarks": "rule_set_295" + "remarks": "rule_set_296" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/shadow", - "remarks": "rule_set_295" + "remarks": "rule_set_296" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_media_export", - "remarks": "rule_set_296" + "remarks": "rule_set_297" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Exporting to Media (successful)", - "remarks": "rule_set_296" + "remarks": "rule_set_297" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_umount2", - "remarks": "rule_set_297" + "remarks": "rule_set_298" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - umount2", - "remarks": "rule_set_297" + "remarks": "rule_set_298" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands", - "remarks": "rule_set_298" + "remarks": "rule_set_299" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands", - "remarks": "rule_set_298" + "remarks": "rule_set_299" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rename", - "remarks": "rule_set_299" + "remarks": "rule_set_300" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rename", - "remarks": "rule_set_299" + "remarks": "rule_set_300" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat", - "remarks": "rule_set_300" + "remarks": "rule_set_301" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat", - "remarks": "rule_set_300" + "remarks": "rule_set_301" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat2", - "remarks": "rule_set_301" + "remarks": "rule_set_302" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat2", - "remarks": "rule_set_301" + "remarks": "rule_set_302" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rmdir", - "remarks": "rule_set_302" + "remarks": "rule_set_303" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rmdir", - "remarks": "rule_set_302" + "remarks": "rule_set_303" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlink", - "remarks": "rule_set_303" + "remarks": "rule_set_304" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlink", - "remarks": "rule_set_303" + "remarks": "rule_set_304" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlinkat", - "remarks": "rule_set_304" + "remarks": "rule_set_305" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlinkat", - "remarks": "rule_set_304" + "remarks": "rule_set_305" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_delete", - "remarks": "rule_set_305" + "remarks": "rule_set_306" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Unloading - delete_module", - "remarks": "rule_set_305" + "remarks": "rule_set_306" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_init", - "remarks": "rule_set_306" + "remarks": "rule_set_307" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading - init_module", - "remarks": "rule_set_306" + "remarks": "rule_set_307" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_finit", - "remarks": "rule_set_307" + "remarks": "rule_set_308" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - finit_module", - "remarks": "rule_set_307" + "remarks": "rule_set_308" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_insmod", - "remarks": "rule_set_308" + "remarks": "rule_set_309" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - insmod", - "remarks": "rule_set_308" + "remarks": "rule_set_309" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_modprobe", - "remarks": "rule_set_309" + "remarks": "rule_set_310" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - modprobe", - "remarks": "rule_set_309" + "remarks": "rule_set_310" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_rmmod", - "remarks": "rule_set_310" + "remarks": "rule_set_311" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - rmmod", - "remarks": "rule_set_310" + "remarks": "rule_set_311" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_kmod", - "remarks": "rule_set_311" + "remarks": "rule_set_312" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - kmod", - "remarks": "rule_set_311" + "remarks": "rule_set_312" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_etc_selinux", - "remarks": "rule_set_312" + "remarks": "rule_set_313" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls (/etc/selinux)", - "remarks": "rule_set_312" + "remarks": "rule_set_313" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_immutable", - "remarks": "rule_set_313" + "remarks": "rule_set_314" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Make the auditd Configuration Immutable", - "remarks": "rule_set_313" + "remarks": "rule_set_314" } ], "control-implementations": [ { - "uuid": "cb9e849c-ffc2-4370-80c4-db782c06adb5", + "uuid": "ef8d097d-c363-4e41-bd40-fb23d5796073", "source": "trestle://profiles/rhel10-anssi-enhanced/profile.json", "description": "Control implementation for anssi_bp28_enhanced", "props": [ @@ -4687,7 +4699,7 @@ ], "implemented-requirements": [ { - "uuid": "c53f6007-bb65-43e0-89f1-a5a784d2bb70", + "uuid": "0affcff4-d7d4-4ffe-bd83-c05c9c35f3e3", "control-id": "r1", "description": "This requirement can be checked, but remediation requires manual reinstall of the OS. The content automation cannot really configure the BIOS, but can in some cases, check settings that are visible to the OS. Like for example the NX/DX setting.", "props": [ @@ -4709,7 +4721,7 @@ ] }, { - "uuid": "1450571b-b8dd-41d0-9f79-e5f2a81c2e9c", + "uuid": "fa05eb73-b9af-40eb-9c78-983b5123bf27", "control-id": "r7", "description": "No notes for control-id R7.", "props": [ @@ -4726,7 +4738,7 @@ ] }, { - "uuid": "116ea3c2-e2d0-48de-939e-b7e09330692f", + "uuid": "a0da052c-6caa-40ac-99de-38c76dc1fa64", "control-id": "r10", "description": "No notes for control-id R10.", "props": [ @@ -4743,7 +4755,7 @@ ] }, { - "uuid": "7dcde1bb-0912-41c9-913c-20ab4f6bcec2", + "uuid": "6148cb9f-8daa-4956-8eac-7f35d91b4daf", "control-id": "r29", "description": "The /boot partition mounted is essential to perform certain administrative actions, for example updating the kernel. Therefore, for better stability, in this requirement only rules to restrict the access to /boot are selected. It is not changed how the /boot is mounted.", "props": [ @@ -4800,7 +4812,7 @@ ] }, { - "uuid": "9367b740-353f-454c-949d-8615db1f79cf", + "uuid": "3fed6745-1a1e-4d8f-9cbb-fd26b2300718", "control-id": "r36", "description": "There are cases of Systemd services which would stop working in case umask would be configured to 0027 for all services. One such example is the Cups service which needs to create sockets which need to be available for all users. Therefore, this part of the requirement can't be automated.", "props": [ @@ -4827,7 +4839,7 @@ ] }, { - "uuid": "4b669eb9-f15f-405f-9805-f1b1276b636c", + "uuid": "81939b69-41f4-4220-be29-a86b30e35e7c", "control-id": "r37", "description": "Other partitioning mechanisms can include chroot and containers and are not contemplated in this requirement.", "props": [ @@ -4844,7 +4856,7 @@ ] }, { - "uuid": "385debfa-27cc-4b83-ba2e-d89728bb4117", + "uuid": "195ba972-d548-4dd8-88ac-7ac47fc10d7d", "control-id": "r38", "description": "No notes for control-id R38.", "props": [ @@ -4866,7 +4878,7 @@ ] }, { - "uuid": "1b08e27e-118b-408a-8658-5da3d1814354", + "uuid": "379392af-a33b-4fe8-9b0a-ee2f97f28e02", "control-id": "r41", "description": "The description for control-id r41.", "props": [ @@ -4879,7 +4891,7 @@ ] }, { - "uuid": "b0b3967c-88e7-482b-80e8-c8121d366d2e", + "uuid": "ced6bab8-d012-4791-b151-cbad17b41629", "control-id": "r45", "description": "No notes for control-id R45.", "props": [ @@ -4891,7 +4903,7 @@ ] }, { - "uuid": "d175d39f-7277-4860-acae-2443e85d0b09", + "uuid": "50142b6a-ae60-4c83-92e4-8b80bc4cc7cd", "control-id": "r51", "description": "This concerns two aspects, the first is administrative, and involves prompt installation of secrets or trusted elements by the sysadmin. The second involves removal of any default secret or trusted element configured by the operating system during install process, e.g. default known passwords.", "props": [ @@ -4903,7 +4915,7 @@ ] }, { - "uuid": "91b5040a-1b81-4f24-97a3-f384cdb857c4", + "uuid": "265f9773-6eb6-45c0-9705-d1aa41e03728", "control-id": "r57", "description": "The description for control-id r57.", "props": [ @@ -4916,7 +4928,7 @@ ] }, { - "uuid": "7937f8aa-8c5f-4c0d-8682-a83eecaccfde", + "uuid": "f348f527-696d-4bc3-80ea-3ba74d204e08", "control-id": "r60", "description": "The description for control-id r60.", "props": [ @@ -4929,7 +4941,7 @@ ] }, { - "uuid": "0097ff03-e38b-471f-b369-8dff892ce270", + "uuid": "442e86e4-f4b7-4e10-8cdd-b3edd21b1e4f", "control-id": "r64", "description": "SELinux policies limit the privileges of services and daemons just to those which are required. The policies should be enough to restrict the services' privileges to its essentials, but the automated content cannot assess whether they are the minimum required for the deployment.", "props": [ @@ -4946,7 +4958,7 @@ ] }, { - "uuid": "27dabb73-59c5-41d3-b4be-64ec18d70300", + "uuid": "deba73c1-87b9-4fa2-aca7-b1d6b280cf2d", "control-id": "r65", "description": "The description for control-id r65.", "props": [ @@ -4959,7 +4971,7 @@ ] }, { - "uuid": "9c06f2f3-4924-44cb-b5a4-e5b0abb37e6c", + "uuid": "c3128c33-34ac-407b-b363-7b266a3e3a40", "control-id": "r71", "description": "A lot of recommendations and requirements from the DAT-PA-012 document are administrative and hard to automate. The rules selected below address a few of the aspects that can be covered, keep in mind that these configurations should be customized for the systems deployment requirements.", "props": [ @@ -5046,7 +5058,7 @@ ] }, { - "uuid": "0086511f-dc35-4899-b7f1-56e20a3e81d6", + "uuid": "93bea96b-16d7-43fa-90ce-9614e8acadf2", "control-id": "r72", "description": "No notes for control-id R72.", "props": [ @@ -5058,7 +5070,7 @@ ] }, { - "uuid": "d109fa7a-42db-4488-b05a-866dc45ec1eb", + "uuid": "733d7eb9-0330-494b-8e37-4039d8fd338d", "control-id": "r73", "description": "No notes for control-id R73.", "props": [ @@ -5350,7 +5362,7 @@ ] }, { - "uuid": "108cfe37-4a68-4d99-86ab-138dedfc6fb3", + "uuid": "e3814227-4f0a-435b-8c00-2071b122e2c7", "control-id": "r78", "description": "The description for control-id r78.", "props": [ @@ -5363,7 +5375,7 @@ ] }, { - "uuid": "f90acfeb-67bd-4258-982a-9efb22235a39", + "uuid": "8db38de8-c210-40b3-bc85-71a1a7afd584", "control-id": "r2", "description": "The description for control-id r2.", "props": [ @@ -5376,7 +5388,7 @@ ] }, { - "uuid": "2fd26866-d60b-4de9-875f-e9bcd8261f04", + "uuid": "c6d1b67d-145d-4a50-a69c-0d8e9ee12975", "control-id": "r3", "description": "The description for control-id r3.", "props": [ @@ -5389,7 +5401,7 @@ ] }, { - "uuid": "c0fbc6e8-4c86-4483-956a-3afc46c8ad64", + "uuid": "22ce8f3b-23b7-4287-9c2b-c15922ac5393", "control-id": "r5", "description": "No notes for control-id R5.", "props": [ @@ -5406,7 +5418,7 @@ ] }, { - "uuid": "579bb1b5-b636-4c6f-a9f3-ace7681af7bb", + "uuid": "ec826bf9-cc5c-40d9-8e2c-e0b6969e2f2d", "control-id": "r8", "description": "No notes for control-id R8.", "props": [ @@ -5478,7 +5490,7 @@ ] }, { - "uuid": "a5fa48b2-cdf3-4416-9175-3dd152cd010d", + "uuid": "e93de77b-3526-4d62-817c-52c3a2a7ac14", "control-id": "r9", "description": "No notes for control-id R9.", "props": [ @@ -5540,7 +5552,7 @@ ] }, { - "uuid": "ffc55ee9-32ed-4b7f-8847-e1fc1d13806e", + "uuid": "6ad84d41-2422-4569-9413-776510a63a19", "control-id": "r11", "description": "No notes for control-id R11.", "props": [ @@ -5557,7 +5569,7 @@ ] }, { - "uuid": "3faf49bd-5c69-47ec-b42d-87b33666a0e1", + "uuid": "23c840f8-2584-4413-b846-b180fa153fac", "control-id": "r12", "description": "No notes for control-id R12.", "props": [ @@ -5684,7 +5696,7 @@ ] }, { - "uuid": "8f2e429e-c4a1-4e59-ae0a-d746973ada84", + "uuid": "529b0fcd-8b99-41fa-a0b6-73b46f88e2f5", "control-id": "r13", "description": "When IPv6 is not in use, disable it, otherwise secure the IPv6 stack. This control hardens the IPv6 stack, to disable it use the related rules instead.", "props": [ @@ -5776,7 +5788,7 @@ ] }, { - "uuid": "f956198f-9f3e-4f73-9c81-9ba064fbbafb", + "uuid": "03b61677-a9b5-42fd-9ff1-3ab5bdda1116", "control-id": "r14", "description": "The rule for the /proc file system is not implemented", "props": [ @@ -5813,7 +5825,7 @@ ] }, { - "uuid": "a4087751-e3da-4742-95f1-2155d4523e85", + "uuid": "455c8b27-9098-48b2-9ac4-89f9479777b9", "control-id": "r28", "description": "No notes for control-id R28.", "props": [ @@ -5945,7 +5957,7 @@ ] }, { - "uuid": "ddb4f984-ce3e-452e-b333-67c0c17388a1", + "uuid": "ba72227f-85d4-4c13-800a-32bc02abd41f", "control-id": "r32", "description": "ANSSI doesn't specify the length of the inactivity period, we are choosing 10 minutes as reasonable number.", "props": [ @@ -5967,7 +5979,7 @@ ] }, { - "uuid": "af22e84b-2286-4524-8835-fcca9b35d4bc", + "uuid": "302235af-20e7-40e9-ba1a-b454eb1e44b0", "control-id": "r33", "description": "By disabling direct root logins proper accountability is ensured. Users will login first, then escalate to privileged (root) access. Change of privilege operations must be based on executables to monitor the activities performed (for example sudo). Nonetheless, the content automation cannot ensure that each administrator was given a nominative administration account separate from his normal user account.", "props": [ @@ -6009,7 +6021,7 @@ ] }, { - "uuid": "4ce630a2-95d9-40f1-ab61-3d6fc0bc15ce", + "uuid": "825c4188-ea74-4342-b71d-dfe5ffd63e1a", "control-id": "r34", "description": "The description for control-id r34.", "props": [ @@ -6022,7 +6034,7 @@ ] }, { - "uuid": "b09cacb1-f0b0-4d2b-b1c7-fa6e875512a1", + "uuid": "a4d52af0-d928-4e13-b023-a34747f6a9b9", "control-id": "r35", "description": "The description for control-id r35.", "props": [ @@ -6035,7 +6047,7 @@ ] }, { - "uuid": "12fd3c2f-07f9-4e84-8f43-6cdbb91c2dad", + "uuid": "be8bc6b4-ab82-43d8-b332-0f717d444023", "control-id": "r39", "description": "No notes for control-id R39.", "props": [ @@ -6072,7 +6084,7 @@ ] }, { - "uuid": "0c2576c5-8fa4-4a24-ba9f-2c224ba0924e", + "uuid": "d40d57e0-7ebb-4c2a-9abf-a2ede74b0a77", "control-id": "r40", "description": "No notes for control-id R40.", "props": [ @@ -6089,7 +6101,7 @@ ] }, { - "uuid": "475ff88f-7d73-4b81-ac23-347a9bab9a95", + "uuid": "09c6ada9-391b-4816-82df-88611ca3a24f", "control-id": "r42", "description": "No notes for control-id R42.", "props": [ @@ -6106,7 +6118,7 @@ ] }, { - "uuid": "d6e4a5d3-9ec9-42d1-88c3-f40cadc088b9", + "uuid": "8b90e87f-7062-41d5-aeb3-9c6398848f7b", "control-id": "r43", "description": "No notes for control-id R43.", "props": [ @@ -6123,7 +6135,7 @@ ] }, { - "uuid": "e63ad4e9-49f6-485b-86c3-ec7d6ca75cef", + "uuid": "a0244651-5fb7-4dd7-aa20-368170cceda6", "control-id": "r44", "description": "The description for control-id r44.", "props": [ @@ -6136,7 +6148,7 @@ ] }, { - "uuid": "56f590e6-c6d1-4ada-ade1-520b123c6db1", + "uuid": "859e0400-49a2-49ee-94f0-f790bd72f946", "control-id": "r50", "description": "No notes for control-id R50.", "props": [ @@ -6503,7 +6515,7 @@ ] }, { - "uuid": "af6c13f4-5d21-4ccd-a849-2e5c0e126f9a", + "uuid": "5c0d74a1-6299-4bc0-a396-f5af88ba3395", "control-id": "r52", "description": "The description for control-id r52.", "props": [ @@ -6516,7 +6528,7 @@ ] }, { - "uuid": "649422fb-53ed-4214-b2c5-0efce097db7a", + "uuid": "ebf78ded-f4bf-4ab0-8713-0c3c0b92fbff", "control-id": "r55", "description": "The approach of the selected rules is to use and configure pam_namespace module.", "props": [ @@ -6548,7 +6560,7 @@ ] }, { - "uuid": "70f6165b-8062-4830-b110-c5aac31b50c5", + "uuid": "66b25c3e-a421-42dc-a1ef-55e1674d28e1", "control-id": "r63", "description": "The description for control-id r63.", "props": [ @@ -6561,7 +6573,7 @@ ] }, { - "uuid": "1e2882ee-4f06-4b9d-b8de-65a4f10dae4c", + "uuid": "99f58bc0-1718-4335-be72-20c08bab601e", "control-id": "r67", "description": "In systems where remote authentication is handled through sssd service, PAM delegates\nrequests for remote authentication to sssd service through a local Unix socket. The sssd\nservice can use IPA, AD or LDAP as a remote database containing information required for authentication.\nIn case LDAP is configured manually, there are several configuration options which should be chedked.", "props": [ @@ -6583,7 +6595,7 @@ ] }, { - "uuid": "ae495848-9160-415b-94ce-78562d426cdb", + "uuid": "09b6275d-0d8b-41b4-9efc-86783034dd71", "control-id": "r69", "description": "The description for control-id r69.", "props": [ @@ -6596,7 +6608,7 @@ ] }, { - "uuid": "a1e73295-9999-4835-a553-595ec7f58523", + "uuid": "e53ce48a-64f0-41c0-88ab-43fefb085abc", "control-id": "r70", "description": "The description for control-id r70.", "props": [ @@ -6609,7 +6621,7 @@ ] }, { - "uuid": "eb54ef83-1c1f-4472-bd50-e3c48120fbd8", + "uuid": "9b6dfdc3-a9db-458d-ac79-fdd53b7a90c7", "control-id": "r74", "description": "No notes for control-id R74.", "props": [ @@ -6626,7 +6638,7 @@ ] }, { - "uuid": "accfbccd-ff46-4b77-b931-0ce4e5f55f80", + "uuid": "693b030e-6618-4b29-9ed9-6daa95d02485", "control-id": "r75", "description": "Only the alias for root user is covered by the rule. The other services cannot be reliably covered, as there is no simple way of determining what is a service account.", "props": [ @@ -6643,7 +6655,7 @@ ] }, { - "uuid": "891aa7b3-0c69-445c-9405-e897f7bad1bd", + "uuid": "7eb20e83-ce5c-45fe-a808-116ed0643e79", "control-id": "r79", "description": "SELinux can provide confinement and monitoring of services, and AIDE provides basic integrity checking. System logs are configured as part of R43. Hardening of particular services should be done on a case by case basis and is not automated by this content.", "props": [ @@ -6670,7 +6682,7 @@ ] }, { - "uuid": "252d2ed6-2485-4f21-a336-4051e9882732", + "uuid": "99ca2904-f40c-4bde-826e-50f30976a225", "control-id": "r30", "description": "The description for control-id r30.", "props": [ @@ -6683,7 +6695,7 @@ ] }, { - "uuid": "ecb5ed87-c39a-4ee2-b94a-f4b5fec418d3", + "uuid": "f463ef80-e38c-4476-9f6c-172f3a3ace59", "control-id": "r31", "description": "The rules selected below establish a general password strength baseline of 100 bits, based on the recommendations of the technical note \"Recommandations relatives à l'authentification multifacteur et aux mots de passe\" (https://cyber.gouv.fr/publications/recommandations-relatives-lauthentification-multifacteur-et-aux-mots-de-passe)\nThe baseline should be reviewed and tailored to the system's use case and needs.", "props": [ @@ -6755,7 +6767,7 @@ ] }, { - "uuid": "65327fe8-6842-405e-96a0-fdfb32fae7bc", + "uuid": "486826bc-a523-4d86-a371-71643391d16a", "control-id": "r53", "description": "No notes for control-id R53.", "props": [ @@ -6777,7 +6789,7 @@ ] }, { - "uuid": "774b264a-651c-4aab-b171-c2b85a411d20", + "uuid": "9181b1c7-1c95-4c9b-af00-403e0bfdc2bc", "control-id": "r54", "description": "No notes for control-id R54.", "props": [ @@ -6804,7 +6816,7 @@ ] }, { - "uuid": "f4830206-ae3a-459b-bbad-be31e0822f7d", + "uuid": "e78bb377-4260-4232-9096-ca453c5cf87f", "control-id": "r56", "description": "Only programs specifically designed to be used with setuid or setgid bits can have these privilege bits set. This requirement considers apropriate for setuid and setgid bits the binaries that are installed from recognized and authorized repositories (covered in R15). The remediation resets the sticky bit to intended value by vendor/developer, any finding after remediation should be reviewed.", "props": [ @@ -6826,7 +6838,7 @@ ] }, { - "uuid": "08ff82ba-2142-4aff-9275-153b16056e34", + "uuid": "8f0898e0-ca5b-4579-a559-7325c08fd0c8", "control-id": "r58", "description": "The description for control-id r58.", "props": [ @@ -6839,7 +6851,7 @@ ] }, { - "uuid": "0f05cb4a-c6d8-4563-abde-6f48864161f1", + "uuid": "63125fef-7afb-4969-bccb-3b41ec5f9aa0", "control-id": "r59", "description": "It is not trivial to distinguish an official repository from an unofficial one. We cannot draw conclusions from the repo name or URL of the repo (as they can be arbitrary or behind a proxy). One approach to check the origin of installed packages is to check the signature of the packages. If the public key of a repository is not installed, the repo is not trusted.", "props": [ @@ -6867,11 +6879,16 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_redhat_gpgkey_installed" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "package_sequoia-sq_installed" } ] }, { - "uuid": "45e6e7d1-7a11-469b-b21e-55f3b198bd7c", + "uuid": "4221c935-b01c-464c-93be-01b777670110", "control-id": "r61", "description": "Check the vendor CVE feed and configure automatic install of security related updates.", "props": [ @@ -6903,7 +6920,7 @@ ] }, { - "uuid": "50ff718e-9545-4e83-8a28-7496975c44b4", + "uuid": "f36b26e8-7e7b-4a22-ae86-757001b31e14", "control-id": "r62", "description": "The description for control-id r62.", "props": [ @@ -6941,7 +6958,7 @@ ] }, { - "uuid": "639c7218-9e77-4594-a584-9adb48c5db0d", + "uuid": "5222a2d6-4bbd-4bbc-9a8a-9c1d6231ca3f", "control-id": "r68", "description": "The selection of rules doesn't cover the use of hardware devices to protect the passwords.", "props": [ @@ -6978,7 +6995,7 @@ ] }, { - "uuid": "f99cdeb3-2ec1-4d01-bf04-0f4c4d1b285b", + "uuid": "18c25563-58c4-4598-9747-1c2a215f19cb", "control-id": "r80", "description": "The description for control-id r80.", "props": [ @@ -7363,7 +7380,7 @@ { "name": "Parameter_Value_Alternatives_18", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -7381,7 +7398,7 @@ { "name": "Parameter_Value_Alternatives_19", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -8221,6991 +8238,7015 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_dnf-automatic_installed", + "value": "package_sequoia-sq_installed", "remarks": "rule_set_023" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install dnf-automatic Package", + "value": "Install sequoia-sq Package", "remarks": "rule_set_023" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_dnf-automatic_installed", + "value": "package_sequoia-sq_installed", "remarks": "rule_set_023" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install dnf-automatic Package", + "value": "Install sequoia-sq Package", "remarks": "rule_set_023" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "timer_dnf-automatic_enabled", + "value": "package_dnf-automatic_installed", "remarks": "rule_set_024" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable dnf-automatic Timer", + "value": "Install dnf-automatic Package", "remarks": "rule_set_024" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "timer_dnf-automatic_enabled", + "value": "package_dnf-automatic_installed", "remarks": "rule_set_024" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable dnf-automatic Timer", + "value": "Install dnf-automatic Package", "remarks": "rule_set_024" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dnf-automatic_apply_updates", + "value": "timer_dnf-automatic_enabled", "remarks": "rule_set_025" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure dnf-automatic to Install Available Updates Automatically", + "value": "Enable dnf-automatic Timer", "remarks": "rule_set_025" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dnf-automatic_apply_updates", + "value": "timer_dnf-automatic_enabled", "remarks": "rule_set_025" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure dnf-automatic to Install Available Updates Automatically", + "value": "Enable dnf-automatic Timer", "remarks": "rule_set_025" }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "dnf-automatic_apply_updates", + "remarks": "rule_set_026" + }, + { + "name": "Rule_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Configure dnf-automatic to Install Available Updates Automatically", + "remarks": "rule_set_026" + }, + { + "name": "Check_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "dnf-automatic_apply_updates", + "remarks": "rule_set_026" + }, + { + "name": "Check_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Configure dnf-automatic to Install Available Updates Automatically", + "remarks": "rule_set_026" + }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dnf-automatic_security_updates_only", - "remarks": "rule_set_026" + "remarks": "rule_set_027" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure dnf-automatic to Install Only Security Updates", - "remarks": "rule_set_026" + "remarks": "rule_set_027" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dnf-automatic_security_updates_only", - "remarks": "rule_set_026" + "remarks": "rule_set_027" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure dnf-automatic to Install Only Security Updates", - "remarks": "rule_set_026" + "remarks": "rule_set_027" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_kea_removed", - "remarks": "rule_set_027" + "remarks": "rule_set_028" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall kea Package", - "remarks": "rule_set_027" + "remarks": "rule_set_028" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_kea_removed", - "remarks": "rule_set_027" + "remarks": "rule_set_028" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall kea Package", - "remarks": "rule_set_027" + "remarks": "rule_set_028" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_telnet_removed", - "remarks": "rule_set_028" + "remarks": "rule_set_029" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove telnet Clients", - "remarks": "rule_set_028" + "remarks": "rule_set_029" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_telnet_removed", - "remarks": "rule_set_028" + "remarks": "rule_set_029" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove telnet Clients", - "remarks": "rule_set_028" + "remarks": "rule_set_029" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_telnet-server_removed", - "remarks": "rule_set_029" + "remarks": "rule_set_030" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall telnet-server Package", - "remarks": "rule_set_029" + "remarks": "rule_set_030" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_telnet-server_removed", - "remarks": "rule_set_029" + "remarks": "rule_set_030" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall telnet-server Package", - "remarks": "rule_set_029" + "remarks": "rule_set_030" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_tftp_removed", - "remarks": "rule_set_030" + "remarks": "rule_set_031" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove tftp Daemon", - "remarks": "rule_set_030" + "remarks": "rule_set_031" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_tftp_removed", - "remarks": "rule_set_030" + "remarks": "rule_set_031" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove tftp Daemon", - "remarks": "rule_set_030" + "remarks": "rule_set_031" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_tftp-server_removed", - "remarks": "rule_set_031" + "remarks": "rule_set_032" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall tftp-server Package", - "remarks": "rule_set_031" + "remarks": "rule_set_032" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_tftp-server_removed", - "remarks": "rule_set_031" + "remarks": "rule_set_032" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall tftp-server Package", - "remarks": "rule_set_031" + "remarks": "rule_set_032" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_systemauth", - "remarks": "rule_set_032" + "remarks": "rule_set_033" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - system-auth", - "remarks": "rule_set_032" + "remarks": "rule_set_033" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_systemauth", - "remarks": "rule_set_032" + "remarks": "rule_set_033" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - system-auth", - "remarks": "rule_set_032" + "remarks": "rule_set_033" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_rounds_system_auth", - "remarks": "rule_set_033" + "remarks": "rule_set_034" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set number of Password Hashing Rounds - system-auth", - "remarks": "rule_set_033" + "remarks": "rule_set_034" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_rounds_system_auth", - "remarks": "rule_set_033" + "remarks": "rule_set_034" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set number of Password Hashing Rounds - system-auth", - "remarks": "rule_set_033" + "remarks": "rule_set_034" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_rounds_password_auth", - "remarks": "rule_set_034" + "remarks": "rule_set_035" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set number of Password Hashing Rounds - password-auth", - "remarks": "rule_set_034" + "remarks": "rule_set_035" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_rounds_password_auth", - "remarks": "rule_set_034" + "remarks": "rule_set_035" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set number of Password Hashing Rounds - password-auth", - "remarks": "rule_set_034" + "remarks": "rule_set_035" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minclass", - "remarks": "rule_set_035" + "remarks": "rule_set_036" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", - "remarks": "rule_set_035" + "remarks": "rule_set_036" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minclass", - "remarks": "rule_set_035" + "remarks": "rule_set_036" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", - "remarks": "rule_set_035" + "remarks": "rule_set_036" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_password", - "remarks": "rule_set_036" + "remarks": "rule_set_037" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Boot Loader Password in grub2", - "remarks": "rule_set_036" + "remarks": "rule_set_037" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_password", - "remarks": "rule_set_036" + "remarks": "rule_set_037" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Boot Loader Password in grub2", - "remarks": "rule_set_036" + "remarks": "rule_set_037" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_l1tf_argument", - "remarks": "rule_set_037" + "remarks": "rule_set_038" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure L1 Terminal Fault mitigations", - "remarks": "rule_set_037" + "remarks": "rule_set_038" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_l1tf_argument", - "remarks": "rule_set_037" + "remarks": "rule_set_038" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure L1 Terminal Fault mitigations", - "remarks": "rule_set_037" + "remarks": "rule_set_038" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_page_poison_argument", - "remarks": "rule_set_038" + "remarks": "rule_set_039" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable page allocator poisoning", - "remarks": "rule_set_038" + "remarks": "rule_set_039" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_page_poison_argument", - "remarks": "rule_set_038" + "remarks": "rule_set_039" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable page allocator poisoning", - "remarks": "rule_set_038" + "remarks": "rule_set_039" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_pti_argument", - "remarks": "rule_set_039" + "remarks": "rule_set_040" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Page-Table Isolation (KPTI)", - "remarks": "rule_set_039" + "remarks": "rule_set_040" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_pti_argument", - "remarks": "rule_set_039" + "remarks": "rule_set_040" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Page-Table Isolation (KPTI)", - "remarks": "rule_set_039" + "remarks": "rule_set_040" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_slab_nomerge_argument", - "remarks": "rule_set_040" + "remarks": "rule_set_041" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable merging of slabs with similar size", - "remarks": "rule_set_040" + "remarks": "rule_set_041" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_slab_nomerge_argument", - "remarks": "rule_set_040" + "remarks": "rule_set_041" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable merging of slabs with similar size", - "remarks": "rule_set_040" + "remarks": "rule_set_041" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_slub_debug_argument", - "remarks": "rule_set_041" + "remarks": "rule_set_042" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable SLUB/SLAB allocator poisoning", - "remarks": "rule_set_041" + "remarks": "rule_set_042" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_slub_debug_argument", - "remarks": "rule_set_041" + "remarks": "rule_set_042" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable SLUB/SLAB allocator poisoning", - "remarks": "rule_set_041" + "remarks": "rule_set_042" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_spec_store_bypass_disable_argument", - "remarks": "rule_set_042" + "remarks": "rule_set_043" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Speculative Store Bypass Mitigation", - "remarks": "rule_set_042" + "remarks": "rule_set_043" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_spec_store_bypass_disable_argument", - "remarks": "rule_set_042" + "remarks": "rule_set_043" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Speculative Store Bypass Mitigation", - "remarks": "rule_set_042" + "remarks": "rule_set_043" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_spectre_v2_argument", - "remarks": "rule_set_043" + "remarks": "rule_set_044" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Spectre v2 mitigation", - "remarks": "rule_set_043" + "remarks": "rule_set_044" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_spectre_v2_argument", - "remarks": "rule_set_043" + "remarks": "rule_set_044" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Spectre v2 mitigation", - "remarks": "rule_set_043" + "remarks": "rule_set_044" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_mds_argument", - "remarks": "rule_set_044" + "remarks": "rule_set_045" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Microarchitectural Data Sampling mitigation", - "remarks": "rule_set_044" + "remarks": "rule_set_045" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_mds_argument", - "remarks": "rule_set_044" + "remarks": "rule_set_045" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Microarchitectural Data Sampling mitigation", - "remarks": "rule_set_044" + "remarks": "rule_set_045" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_mce_argument", - "remarks": "rule_set_045" + "remarks": "rule_set_046" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Force kernel panic on uncorrected MCEs", - "remarks": "rule_set_045" + "remarks": "rule_set_046" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_mce_argument", - "remarks": "rule_set_045" + "remarks": "rule_set_046" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Force kernel panic on uncorrected MCEs", - "remarks": "rule_set_045" + "remarks": "rule_set_046" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_page_alloc_shuffle_argument", - "remarks": "rule_set_046" + "remarks": "rule_set_047" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable randomization of the page allocator", - "remarks": "rule_set_046" + "remarks": "rule_set_047" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_page_alloc_shuffle_argument", - "remarks": "rule_set_046" + "remarks": "rule_set_047" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable randomization of the page allocator", - "remarks": "rule_set_046" + "remarks": "rule_set_047" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_rng_core_default_quality_argument", - "remarks": "rule_set_047" + "remarks": "rule_set_048" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the confidence in TPM for entropy", - "remarks": "rule_set_047" + "remarks": "rule_set_048" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_rng_core_default_quality_argument", - "remarks": "rule_set_047" + "remarks": "rule_set_048" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the confidence in TPM for entropy", - "remarks": "rule_set_047" + "remarks": "rule_set_048" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_vm_mmap_min_addr", - "remarks": "rule_set_048" + "remarks": "rule_set_049" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent applications from mapping low portion of virtual memory", - "remarks": "rule_set_048" + "remarks": "rule_set_049" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_vm_mmap_min_addr", - "remarks": "rule_set_048" + "remarks": "rule_set_049" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent applications from mapping low portion of virtual memory", - "remarks": "rule_set_048" + "remarks": "rule_set_049" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_dmesg_restrict", - "remarks": "rule_set_049" + "remarks": "rule_set_050" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Access to Kernel Message Buffer", - "remarks": "rule_set_049" + "remarks": "rule_set_050" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_dmesg_restrict", - "remarks": "rule_set_049" + "remarks": "rule_set_050" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Access to Kernel Message Buffer", - "remarks": "rule_set_049" + "remarks": "rule_set_050" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_kptr_restrict", - "remarks": "rule_set_050" + "remarks": "rule_set_051" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Exposed Kernel Pointer Addresses Access", - "remarks": "rule_set_050" + "remarks": "rule_set_051" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_kptr_restrict", - "remarks": "rule_set_050" + "remarks": "rule_set_051" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Exposed Kernel Pointer Addresses Access", - "remarks": "rule_set_050" + "remarks": "rule_set_051" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_pid_max", - "remarks": "rule_set_051" + "remarks": "rule_set_052" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure maximum number of process identifiers", - "remarks": "rule_set_051" + "remarks": "rule_set_052" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_pid_max", - "remarks": "rule_set_051" + "remarks": "rule_set_052" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure maximum number of process identifiers", - "remarks": "rule_set_051" + "remarks": "rule_set_052" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_perf_event_max_sample_rate", - "remarks": "rule_set_052" + "remarks": "rule_set_053" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit sampling frequency of the Perf system", - "remarks": "rule_set_052" + "remarks": "rule_set_053" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_perf_event_max_sample_rate", - "remarks": "rule_set_052" + "remarks": "rule_set_053" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit sampling frequency of the Perf system", - "remarks": "rule_set_052" + "remarks": "rule_set_053" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_perf_cpu_time_max_percent", - "remarks": "rule_set_053" + "remarks": "rule_set_054" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit CPU consumption of the Perf system", - "remarks": "rule_set_053" + "remarks": "rule_set_054" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_perf_cpu_time_max_percent", - "remarks": "rule_set_053" + "remarks": "rule_set_054" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit CPU consumption of the Perf system", - "remarks": "rule_set_053" + "remarks": "rule_set_054" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_perf_event_paranoid", - "remarks": "rule_set_054" + "remarks": "rule_set_055" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disallow kernel profiling by unprivileged users", - "remarks": "rule_set_054" + "remarks": "rule_set_055" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_perf_event_paranoid", - "remarks": "rule_set_054" + "remarks": "rule_set_055" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disallow kernel profiling by unprivileged users", - "remarks": "rule_set_054" + "remarks": "rule_set_055" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_randomize_va_space", - "remarks": "rule_set_055" + "remarks": "rule_set_056" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Randomized Layout of Virtual Address Space", - "remarks": "rule_set_055" + "remarks": "rule_set_056" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_randomize_va_space", - "remarks": "rule_set_055" + "remarks": "rule_set_056" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Randomized Layout of Virtual Address Space", - "remarks": "rule_set_055" + "remarks": "rule_set_056" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_sysrq", - "remarks": "rule_set_056" + "remarks": "rule_set_057" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disallow magic SysRq key", - "remarks": "rule_set_056" + "remarks": "rule_set_057" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_sysrq", - "remarks": "rule_set_056" + "remarks": "rule_set_057" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disallow magic SysRq key", - "remarks": "rule_set_056" + "remarks": "rule_set_057" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_unprivileged_bpf_disabled", - "remarks": "rule_set_057" + "remarks": "rule_set_058" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Access to Network bpf() Syscall From Unprivileged Processes", - "remarks": "rule_set_057" + "remarks": "rule_set_058" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_unprivileged_bpf_disabled", - "remarks": "rule_set_057" + "remarks": "rule_set_058" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Access to Network bpf() Syscall From Unprivileged Processes", - "remarks": "rule_set_057" + "remarks": "rule_set_058" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_panic_on_oops", - "remarks": "rule_set_058" + "remarks": "rule_set_059" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Kernel panic on oops", - "remarks": "rule_set_058" + "remarks": "rule_set_059" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_panic_on_oops", - "remarks": "rule_set_058" + "remarks": "rule_set_059" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Kernel panic on oops", - "remarks": "rule_set_058" + "remarks": "rule_set_059" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_yama_ptrace_scope", - "remarks": "rule_set_059" + "remarks": "rule_set_060" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict usage of ptrace to descendant processes", - "remarks": "rule_set_059" + "remarks": "rule_set_060" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_yama_ptrace_scope", - "remarks": "rule_set_059" + "remarks": "rule_set_060" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict usage of ptrace to descendant processes", - "remarks": "rule_set_059" + "remarks": "rule_set_060" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_core_bpf_jit_harden", - "remarks": "rule_set_060" + "remarks": "rule_set_061" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Harden the operation of the BPF just-in-time compiler", - "remarks": "rule_set_060" + "remarks": "rule_set_061" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_core_bpf_jit_harden", - "remarks": "rule_set_060" + "remarks": "rule_set_061" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Harden the operation of the BPF just-in-time compiler", - "remarks": "rule_set_060" + "remarks": "rule_set_061" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_ip_forward", - "remarks": "rule_set_061" + "remarks": "rule_set_062" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IP Forwarding on IPv4 Interfaces", - "remarks": "rule_set_061" + "remarks": "rule_set_062" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_ip_forward", - "remarks": "rule_set_061" + "remarks": "rule_set_062" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IP Forwarding on IPv4 Interfaces", - "remarks": "rule_set_061" + "remarks": "rule_set_062" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_local", - "remarks": "rule_set_062" + "remarks": "rule_set_063" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting Packets Routed Between Local Interfaces", - "remarks": "rule_set_062" + "remarks": "rule_set_063" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_local", - "remarks": "rule_set_062" + "remarks": "rule_set_063" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting Packets Routed Between Local Interfaces", - "remarks": "rule_set_062" + "remarks": "rule_set_063" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_redirects", - "remarks": "rule_set_063" + "remarks": "rule_set_064" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv4 Interfaces", - "remarks": "rule_set_063" + "remarks": "rule_set_064" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_redirects", - "remarks": "rule_set_063" + "remarks": "rule_set_064" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv4 Interfaces", - "remarks": "rule_set_063" + "remarks": "rule_set_064" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_redirects", - "remarks": "rule_set_064" + "remarks": "rule_set_065" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv4 Interfaces", - "remarks": "rule_set_064" + "remarks": "rule_set_065" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_redirects", - "remarks": "rule_set_064" + "remarks": "rule_set_065" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv4 Interfaces", - "remarks": "rule_set_064" + "remarks": "rule_set_065" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_secure_redirects", - "remarks": "rule_set_065" + "remarks": "rule_set_066" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Secure ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_065" + "remarks": "rule_set_066" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_secure_redirects", - "remarks": "rule_set_065" + "remarks": "rule_set_066" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Secure ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_065" + "remarks": "rule_set_066" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_secure_redirects", - "remarks": "rule_set_066" + "remarks": "rule_set_067" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Kernel Parameter for Accepting Secure Redirects By Default", - "remarks": "rule_set_066" + "remarks": "rule_set_067" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_secure_redirects", - "remarks": "rule_set_066" + "remarks": "rule_set_067" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Kernel Parameter for Accepting Secure Redirects By Default", - "remarks": "rule_set_066" + "remarks": "rule_set_067" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_shared_media", - "remarks": "rule_set_067" + "remarks": "rule_set_068" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Sending and Accepting Shared Media Redirects for All IPv4 Interfaces", - "remarks": "rule_set_067" + "remarks": "rule_set_068" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_shared_media", - "remarks": "rule_set_067" + "remarks": "rule_set_068" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Sending and Accepting Shared Media Redirects for All IPv4 Interfaces", - "remarks": "rule_set_067" + "remarks": "rule_set_068" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_shared_media", - "remarks": "rule_set_068" + "remarks": "rule_set_069" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Sending and Accepting Shared Media Redirects by Default", - "remarks": "rule_set_068" + "remarks": "rule_set_069" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_shared_media", - "remarks": "rule_set_068" + "remarks": "rule_set_069" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Sending and Accepting Shared Media Redirects by Default", - "remarks": "rule_set_068" + "remarks": "rule_set_069" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_source_route", - "remarks": "rule_set_069" + "remarks": "rule_set_070" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces", - "remarks": "rule_set_069" + "remarks": "rule_set_070" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_source_route", - "remarks": "rule_set_069" + "remarks": "rule_set_070" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces", - "remarks": "rule_set_069" + "remarks": "rule_set_070" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_source_route", - "remarks": "rule_set_070" + "remarks": "rule_set_071" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv4 Interfaces by Default", - "remarks": "rule_set_070" + "remarks": "rule_set_071" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_source_route", - "remarks": "rule_set_070" + "remarks": "rule_set_071" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv4 Interfaces by Default", - "remarks": "rule_set_070" + "remarks": "rule_set_071" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_arp_filter", - "remarks": "rule_set_071" + "remarks": "rule_set_072" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure ARP filtering for All IPv4 Interfaces", - "remarks": "rule_set_071" + "remarks": "rule_set_072" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_arp_filter", - "remarks": "rule_set_071" + "remarks": "rule_set_072" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure ARP filtering for All IPv4 Interfaces", - "remarks": "rule_set_071" + "remarks": "rule_set_072" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_arp_ignore", - "remarks": "rule_set_072" + "remarks": "rule_set_073" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Response Mode of ARP Requests for All IPv4 Interfaces", - "remarks": "rule_set_072" + "remarks": "rule_set_073" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_arp_ignore", - "remarks": "rule_set_072" + "remarks": "rule_set_073" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Response Mode of ARP Requests for All IPv4 Interfaces", - "remarks": "rule_set_072" + "remarks": "rule_set_073" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_route_localnet", - "remarks": "rule_set_073" + "remarks": "rule_set_074" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent Routing External Traffic to Local Loopback on All IPv4 Interfaces", - "remarks": "rule_set_073" + "remarks": "rule_set_074" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_route_localnet", - "remarks": "rule_set_073" + "remarks": "rule_set_074" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent Routing External Traffic to Local Loopback on All IPv4 Interfaces", - "remarks": "rule_set_073" + "remarks": "rule_set_074" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_drop_gratuitous_arp", - "remarks": "rule_set_074" + "remarks": "rule_set_075" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Drop Gratuitous ARP frames on All IPv4 Interfaces", - "remarks": "rule_set_074" + "remarks": "rule_set_075" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_drop_gratuitous_arp", - "remarks": "rule_set_074" + "remarks": "rule_set_075" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Drop Gratuitous ARP frames on All IPv4 Interfaces", - "remarks": "rule_set_074" + "remarks": "rule_set_075" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_rp_filter", - "remarks": "rule_set_075" + "remarks": "rule_set_076" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces", - "remarks": "rule_set_075" + "remarks": "rule_set_076" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_rp_filter", - "remarks": "rule_set_075" + "remarks": "rule_set_076" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces", - "remarks": "rule_set_075" + "remarks": "rule_set_076" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_rp_filter", - "remarks": "rule_set_076" + "remarks": "rule_set_077" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces by Default", - "remarks": "rule_set_076" + "remarks": "rule_set_077" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_rp_filter", - "remarks": "rule_set_076" + "remarks": "rule_set_077" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces by Default", - "remarks": "rule_set_076" + "remarks": "rule_set_077" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_send_redirects", - "remarks": "rule_set_077" + "remarks": "rule_set_078" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_077" + "remarks": "rule_set_078" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_send_redirects", - "remarks": "rule_set_077" + "remarks": "rule_set_078" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_077" + "remarks": "rule_set_078" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_send_redirects", - "remarks": "rule_set_078" + "remarks": "rule_set_079" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces by Default", - "remarks": "rule_set_078" + "remarks": "rule_set_079" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_send_redirects", - "remarks": "rule_set_078" + "remarks": "rule_set_079" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces by Default", - "remarks": "rule_set_078" + "remarks": "rule_set_079" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses", - "remarks": "rule_set_079" + "remarks": "rule_set_080" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Ignore Bogus ICMP Error Responses on IPv4 Interfaces", - "remarks": "rule_set_079" + "remarks": "rule_set_080" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses", - "remarks": "rule_set_079" + "remarks": "rule_set_080" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Ignore Bogus ICMP Error Responses on IPv4 Interfaces", - "remarks": "rule_set_079" + "remarks": "rule_set_080" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_ip_local_port_range", - "remarks": "rule_set_080" + "remarks": "rule_set_081" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Kernel Parameter to Increase Local Port Range", - "remarks": "rule_set_080" + "remarks": "rule_set_081" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_ip_local_port_range", - "remarks": "rule_set_080" + "remarks": "rule_set_081" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Kernel Parameter to Increase Local Port Range", - "remarks": "rule_set_080" + "remarks": "rule_set_081" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_tcp_rfc1337", - "remarks": "rule_set_081" + "remarks": "rule_set_082" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use TCP RFC 1337 on IPv4 Interfaces", - "remarks": "rule_set_081" + "remarks": "rule_set_082" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_tcp_rfc1337", - "remarks": "rule_set_081" + "remarks": "rule_set_082" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use TCP RFC 1337 on IPv4 Interfaces", - "remarks": "rule_set_081" + "remarks": "rule_set_082" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_tcp_syncookies", - "remarks": "rule_set_082" + "remarks": "rule_set_083" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use TCP Syncookies on Network Interfaces", - "remarks": "rule_set_082" + "remarks": "rule_set_083" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_tcp_syncookies", - "remarks": "rule_set_082" + "remarks": "rule_set_083" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use TCP Syncookies on Network Interfaces", - "remarks": "rule_set_082" + "remarks": "rule_set_083" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_router_solicitations", - "remarks": "rule_set_083" + "remarks": "rule_set_084" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Denying Router Solicitations on All IPv6 Interfaces", - "remarks": "rule_set_083" + "remarks": "rule_set_084" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_router_solicitations", - "remarks": "rule_set_083" + "remarks": "rule_set_084" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Denying Router Solicitations on All IPv6 Interfaces", - "remarks": "rule_set_083" + "remarks": "rule_set_084" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_router_solicitations", - "remarks": "rule_set_084" + "remarks": "rule_set_085" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Denying Router Solicitations on All IPv6 Interfaces By Default", - "remarks": "rule_set_084" + "remarks": "rule_set_085" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_router_solicitations", - "remarks": "rule_set_084" + "remarks": "rule_set_085" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Denying Router Solicitations on All IPv6 Interfaces By Default", - "remarks": "rule_set_084" + "remarks": "rule_set_085" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_ra_rtr_pref", - "remarks": "rule_set_085" + "remarks": "rule_set_086" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Router Preference in Router Advertisements on All IPv6 Interfaces", - "remarks": "rule_set_085" + "remarks": "rule_set_086" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_ra_rtr_pref", - "remarks": "rule_set_085" + "remarks": "rule_set_086" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Router Preference in Router Advertisements on All IPv6 Interfaces", - "remarks": "rule_set_085" + "remarks": "rule_set_086" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_ra_rtr_pref", - "remarks": "rule_set_086" + "remarks": "rule_set_087" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Router Preference in Router Advertisements on All IPv6 Interfaces By Default", - "remarks": "rule_set_086" + "remarks": "rule_set_087" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_ra_rtr_pref", - "remarks": "rule_set_086" + "remarks": "rule_set_087" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Router Preference in Router Advertisements on All IPv6 Interfaces By Default", - "remarks": "rule_set_086" + "remarks": "rule_set_087" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_ra_pinfo", - "remarks": "rule_set_087" + "remarks": "rule_set_088" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Prefix Information in Router Advertisements on All IPv6 Interfaces", - "remarks": "rule_set_087" + "remarks": "rule_set_088" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_ra_pinfo", - "remarks": "rule_set_087" + "remarks": "rule_set_088" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Prefix Information in Router Advertisements on All IPv6 Interfaces", - "remarks": "rule_set_087" + "remarks": "rule_set_088" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_ra_pinfo", - "remarks": "rule_set_088" + "remarks": "rule_set_089" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Prefix Information in Router Advertisements on All IPv6 Interfaces By Default", - "remarks": "rule_set_088" + "remarks": "rule_set_089" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_ra_pinfo", - "remarks": "rule_set_088" + "remarks": "rule_set_089" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Prefix Information in Router Advertisements on All IPv6 Interfaces By Default", - "remarks": "rule_set_088" + "remarks": "rule_set_089" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_ra_defrtr", - "remarks": "rule_set_089" + "remarks": "rule_set_090" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Default Router in Router Advertisements on All IPv6 Interfaces", - "remarks": "rule_set_089" + "remarks": "rule_set_090" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_ra_defrtr", - "remarks": "rule_set_089" + "remarks": "rule_set_090" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Default Router in Router Advertisements on All IPv6 Interfaces", - "remarks": "rule_set_089" + "remarks": "rule_set_090" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_ra_defrtr", - "remarks": "rule_set_090" + "remarks": "rule_set_091" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Default Router in Router Advertisements on All IPv6 Interfaces By Default", - "remarks": "rule_set_090" + "remarks": "rule_set_091" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_ra_defrtr", - "remarks": "rule_set_090" + "remarks": "rule_set_091" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Default Router in Router Advertisements on All IPv6 Interfaces By Default", - "remarks": "rule_set_090" + "remarks": "rule_set_091" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_autoconf", - "remarks": "rule_set_091" + "remarks": "rule_set_092" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Auto Configuration on All IPv6 Interfaces", - "remarks": "rule_set_091" + "remarks": "rule_set_092" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_autoconf", - "remarks": "rule_set_091" + "remarks": "rule_set_092" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Auto Configuration on All IPv6 Interfaces", - "remarks": "rule_set_091" + "remarks": "rule_set_092" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_autoconf", - "remarks": "rule_set_092" + "remarks": "rule_set_093" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Auto Configuration on All IPv6 Interfaces By Default", - "remarks": "rule_set_092" + "remarks": "rule_set_093" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_autoconf", - "remarks": "rule_set_092" + "remarks": "rule_set_093" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Auto Configuration on All IPv6 Interfaces By Default", - "remarks": "rule_set_092" + "remarks": "rule_set_093" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_redirects", - "remarks": "rule_set_093" + "remarks": "rule_set_094" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv6 Interfaces", - "remarks": "rule_set_093" + "remarks": "rule_set_094" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_redirects", - "remarks": "rule_set_093" + "remarks": "rule_set_094" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv6 Interfaces", - "remarks": "rule_set_093" + "remarks": "rule_set_094" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_redirects", - "remarks": "rule_set_094" + "remarks": "rule_set_095" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv6 Interfaces", - "remarks": "rule_set_094" + "remarks": "rule_set_095" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_redirects", - "remarks": "rule_set_094" + "remarks": "rule_set_095" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv6 Interfaces", - "remarks": "rule_set_094" + "remarks": "rule_set_095" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_source_route", - "remarks": "rule_set_095" + "remarks": "rule_set_096" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv6 Interfaces", - "remarks": "rule_set_095" + "remarks": "rule_set_096" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_source_route", - "remarks": "rule_set_095" + "remarks": "rule_set_096" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv6 Interfaces", - "remarks": "rule_set_095" + "remarks": "rule_set_096" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_source_route", - "remarks": "rule_set_096" + "remarks": "rule_set_097" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv6 Interfaces by Default", - "remarks": "rule_set_096" + "remarks": "rule_set_097" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_source_route", - "remarks": "rule_set_096" + "remarks": "rule_set_097" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv6 Interfaces by Default", - "remarks": "rule_set_096" + "remarks": "rule_set_097" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_max_addresses", - "remarks": "rule_set_097" + "remarks": "rule_set_098" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Maximum Number of Autoconfigured Addresses on All IPv6 Interfaces", - "remarks": "rule_set_097" + "remarks": "rule_set_098" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_max_addresses", - "remarks": "rule_set_097" + "remarks": "rule_set_098" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Maximum Number of Autoconfigured Addresses on All IPv6 Interfaces", - "remarks": "rule_set_097" + "remarks": "rule_set_098" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_max_addresses", - "remarks": "rule_set_098" + "remarks": "rule_set_099" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Maximum Number of Autoconfigured Addresses on All IPv6 Interfaces By Default", - "remarks": "rule_set_098" + "remarks": "rule_set_099" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_max_addresses", - "remarks": "rule_set_098" + "remarks": "rule_set_099" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Maximum Number of Autoconfigured Addresses on All IPv6 Interfaces By Default", - "remarks": "rule_set_098" + "remarks": "rule_set_099" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_suid_dumpable", - "remarks": "rule_set_099" + "remarks": "rule_set_100" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Core Dumps for SUID programs", - "remarks": "rule_set_099" + "remarks": "rule_set_100" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_suid_dumpable", - "remarks": "rule_set_099" + "remarks": "rule_set_100" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Core Dumps for SUID programs", - "remarks": "rule_set_099" + "remarks": "rule_set_100" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_fifos", - "remarks": "rule_set_100" + "remarks": "rule_set_101" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on FIFOs", - "remarks": "rule_set_100" + "remarks": "rule_set_101" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_fifos", - "remarks": "rule_set_100" + "remarks": "rule_set_101" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on FIFOs", - "remarks": "rule_set_100" + "remarks": "rule_set_101" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_regular", - "remarks": "rule_set_101" + "remarks": "rule_set_102" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Regular files", - "remarks": "rule_set_101" + "remarks": "rule_set_102" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_regular", - "remarks": "rule_set_101" + "remarks": "rule_set_102" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Regular files", - "remarks": "rule_set_101" + "remarks": "rule_set_102" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_symlinks", - "remarks": "rule_set_102" + "remarks": "rule_set_103" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", - "remarks": "rule_set_102" + "remarks": "rule_set_103" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_symlinks", - "remarks": "rule_set_102" + "remarks": "rule_set_103" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", - "remarks": "rule_set_102" + "remarks": "rule_set_103" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_hardlinks", - "remarks": "rule_set_103" + "remarks": "rule_set_104" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Hardlinks", - "remarks": "rule_set_103" + "remarks": "rule_set_104" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_hardlinks", - "remarks": "rule_set_103" + "remarks": "rule_set_104" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Hardlinks", - "remarks": "rule_set_103" + "remarks": "rule_set_104" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_nodev_nonroot_local_partitions", - "remarks": "rule_set_104" + "remarks": "rule_set_105" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nodev Option to Non-Root Local Partitions", - "remarks": "rule_set_104" + "remarks": "rule_set_105" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_nodev_nonroot_local_partitions", - "remarks": "rule_set_104" + "remarks": "rule_set_105" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nodev Option to Non-Root Local Partitions", - "remarks": "rule_set_104" + "remarks": "rule_set_105" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_boot", - "remarks": "rule_set_105" + "remarks": "rule_set_106" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /boot Located On Separate Partition", - "remarks": "rule_set_105" + "remarks": "rule_set_106" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_boot", - "remarks": "rule_set_105" + "remarks": "rule_set_106" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /boot Located On Separate Partition", - "remarks": "rule_set_105" + "remarks": "rule_set_106" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_boot_nosuid", - "remarks": "rule_set_106" + "remarks": "rule_set_107" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /boot", - "remarks": "rule_set_106" + "remarks": "rule_set_107" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_boot_nosuid", - "remarks": "rule_set_106" + "remarks": "rule_set_107" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /boot", - "remarks": "rule_set_106" + "remarks": "rule_set_107" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_boot_noexec", - "remarks": "rule_set_107" + "remarks": "rule_set_108" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add noexec Option to /boot", - "remarks": "rule_set_107" + "remarks": "rule_set_108" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_boot_noexec", - "remarks": "rule_set_107" + "remarks": "rule_set_108" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add noexec Option to /boot", - "remarks": "rule_set_107" + "remarks": "rule_set_108" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_opt", - "remarks": "rule_set_108" + "remarks": "rule_set_109" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /opt Located On Separate Partition", - "remarks": "rule_set_108" + "remarks": "rule_set_109" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_opt", - "remarks": "rule_set_108" + "remarks": "rule_set_109" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /opt Located On Separate Partition", - "remarks": "rule_set_108" + "remarks": "rule_set_109" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_opt_nosuid", - "remarks": "rule_set_109" + "remarks": "rule_set_110" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /opt", - "remarks": "rule_set_109" + "remarks": "rule_set_110" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_opt_nosuid", - "remarks": "rule_set_109" + "remarks": "rule_set_110" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /opt", - "remarks": "rule_set_109" + "remarks": "rule_set_110" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "systemd_tmp_mount_enabled", - "remarks": "rule_set_110" + "remarks": "rule_set_111" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure tmp.mount Unit Is Enabled", - "remarks": "rule_set_110" + "remarks": "rule_set_111" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "systemd_tmp_mount_enabled", - "remarks": "rule_set_110" + "remarks": "rule_set_111" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure tmp.mount Unit Is Enabled", - "remarks": "rule_set_110" + "remarks": "rule_set_111" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_tmp_nosuid", - "remarks": "rule_set_111" + "remarks": "rule_set_112" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /tmp", - "remarks": "rule_set_111" + "remarks": "rule_set_112" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_tmp_nosuid", - "remarks": "rule_set_111" + "remarks": "rule_set_112" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /tmp", - "remarks": "rule_set_111" + "remarks": "rule_set_112" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_tmp_noexec", - "remarks": "rule_set_112" + "remarks": "rule_set_113" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add noexec Option to /tmp", - "remarks": "rule_set_112" + "remarks": "rule_set_113" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_tmp_noexec", - "remarks": "rule_set_112" + "remarks": "rule_set_113" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add noexec Option to /tmp", - "remarks": "rule_set_112" + "remarks": "rule_set_113" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_srv", - "remarks": "rule_set_113" + "remarks": "rule_set_114" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /srv Located On Separate Partition", - "remarks": "rule_set_113" + "remarks": "rule_set_114" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_srv", - "remarks": "rule_set_113" + "remarks": "rule_set_114" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /srv Located On Separate Partition", - "remarks": "rule_set_113" + "remarks": "rule_set_114" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_srv_nosuid", - "remarks": "rule_set_114" + "remarks": "rule_set_115" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /srv", - "remarks": "rule_set_114" + "remarks": "rule_set_115" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_srv_nosuid", - "remarks": "rule_set_114" + "remarks": "rule_set_115" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /srv", - "remarks": "rule_set_114" + "remarks": "rule_set_115" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_home", - "remarks": "rule_set_115" + "remarks": "rule_set_116" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /home Located On Separate Partition", - "remarks": "rule_set_115" + "remarks": "rule_set_116" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_home", - "remarks": "rule_set_115" + "remarks": "rule_set_116" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /home Located On Separate Partition", - "remarks": "rule_set_115" + "remarks": "rule_set_116" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_home_nosuid", - "remarks": "rule_set_116" + "remarks": "rule_set_117" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /home", - "remarks": "rule_set_116" + "remarks": "rule_set_117" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_home_nosuid", - "remarks": "rule_set_116" + "remarks": "rule_set_117" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /home", - "remarks": "rule_set_116" + "remarks": "rule_set_117" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_home_noexec", - "remarks": "rule_set_117" + "remarks": "rule_set_118" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add noexec Option to /home", - "remarks": "rule_set_117" + "remarks": "rule_set_118" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_home_noexec", - "remarks": "rule_set_117" + "remarks": "rule_set_118" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add noexec Option to /home", - "remarks": "rule_set_117" + "remarks": "rule_set_118" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_usr", - "remarks": "rule_set_118" + "remarks": "rule_set_119" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /usr Located On Separate Partition", - "remarks": "rule_set_118" + "remarks": "rule_set_119" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_usr", - "remarks": "rule_set_118" + "remarks": "rule_set_119" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /usr Located On Separate Partition", - "remarks": "rule_set_118" + "remarks": "rule_set_119" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var", - "remarks": "rule_set_119" + "remarks": "rule_set_120" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var Located On Separate Partition", - "remarks": "rule_set_119" + "remarks": "rule_set_120" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var", - "remarks": "rule_set_119" + "remarks": "rule_set_120" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var Located On Separate Partition", - "remarks": "rule_set_119" + "remarks": "rule_set_120" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_var_nosuid", - "remarks": "rule_set_120" + "remarks": "rule_set_121" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /var", - "remarks": "rule_set_120" + "remarks": "rule_set_121" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_var_nosuid", - "remarks": "rule_set_120" + "remarks": "rule_set_121" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /var", - "remarks": "rule_set_120" + "remarks": "rule_set_121" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_var_noexec", - "remarks": "rule_set_121" + "remarks": "rule_set_122" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add noexec Option to /var", - "remarks": "rule_set_121" + "remarks": "rule_set_122" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_var_noexec", - "remarks": "rule_set_121" + "remarks": "rule_set_122" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add noexec Option to /var", - "remarks": "rule_set_121" + "remarks": "rule_set_122" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log", - "remarks": "rule_set_122" + "remarks": "rule_set_123" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log Located On Separate Partition", - "remarks": "rule_set_122" + "remarks": "rule_set_123" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log", - "remarks": "rule_set_122" + "remarks": "rule_set_123" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log Located On Separate Partition", - "remarks": "rule_set_122" + "remarks": "rule_set_123" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_var_log_noexec", - "remarks": "rule_set_123" + "remarks": "rule_set_124" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add noexec Option to /var/log", - "remarks": "rule_set_123" + "remarks": "rule_set_124" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_var_log_noexec", - "remarks": "rule_set_123" + "remarks": "rule_set_124" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add noexec Option to /var/log", - "remarks": "rule_set_123" + "remarks": "rule_set_124" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_var_log_nosuid", - "remarks": "rule_set_124" + "remarks": "rule_set_125" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /var/log", - "remarks": "rule_set_124" + "remarks": "rule_set_125" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_var_log_nosuid", - "remarks": "rule_set_124" + "remarks": "rule_set_125" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /var/log", - "remarks": "rule_set_124" + "remarks": "rule_set_125" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_tmp", - "remarks": "rule_set_125" + "remarks": "rule_set_126" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/tmp Located On Separate Partition", - "remarks": "rule_set_125" + "remarks": "rule_set_126" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_tmp", - "remarks": "rule_set_125" + "remarks": "rule_set_126" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/tmp Located On Separate Partition", - "remarks": "rule_set_125" + "remarks": "rule_set_126" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_var_tmp_nosuid", - "remarks": "rule_set_126" + "remarks": "rule_set_127" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /var/tmp", - "remarks": "rule_set_126" + "remarks": "rule_set_127" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_var_tmp_nosuid", - "remarks": "rule_set_126" + "remarks": "rule_set_127" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /var/tmp", - "remarks": "rule_set_126" + "remarks": "rule_set_127" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_var_tmp_noexec", - "remarks": "rule_set_127" + "remarks": "rule_set_128" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add noexec Option to /var/tmp", - "remarks": "rule_set_127" + "remarks": "rule_set_128" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_var_tmp_noexec", - "remarks": "rule_set_127" + "remarks": "rule_set_128" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add noexec Option to /var/tmp", - "remarks": "rule_set_127" + "remarks": "rule_set_128" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "logind_session_timeout", - "remarks": "rule_set_128" + "remarks": "rule_set_129" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Logind to terminate idle sessions after certain time of inactivity", - "remarks": "rule_set_128" + "remarks": "rule_set_129" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "logind_session_timeout", - "remarks": "rule_set_128" + "remarks": "rule_set_129" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Logind to terminate idle sessions after certain time of inactivity", - "remarks": "rule_set_128" + "remarks": "rule_set_129" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_tmout", - "remarks": "rule_set_129" + "remarks": "rule_set_130" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Interactive Session Timeout", - "remarks": "rule_set_129" + "remarks": "rule_set_130" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_tmout", - "remarks": "rule_set_129" + "remarks": "rule_set_130" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Interactive Session Timeout", - "remarks": "rule_set_129" + "remarks": "rule_set_130" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_direct_root_logins", - "remarks": "rule_set_130" + "remarks": "rule_set_131" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Direct root Logins Not Allowed", - "remarks": "rule_set_130" + "remarks": "rule_set_131" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_direct_root_logins", - "remarks": "rule_set_130" + "remarks": "rule_set_131" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Direct root Logins Not Allowed", - "remarks": "rule_set_130" + "remarks": "rule_set_131" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_root_login", - "remarks": "rule_set_131" + "remarks": "rule_set_132" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Root Login", - "remarks": "rule_set_131" + "remarks": "rule_set_132" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_root_login", - "remarks": "rule_set_131" + "remarks": "rule_set_132" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Root Login", - "remarks": "rule_set_131" + "remarks": "rule_set_132" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_sudo_installed", - "remarks": "rule_set_132" + "remarks": "rule_set_133" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install sudo Package", - "remarks": "rule_set_132" + "remarks": "rule_set_133" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_sudo_installed", - "remarks": "rule_set_132" + "remarks": "rule_set_133" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install sudo Package", - "remarks": "rule_set_132" + "remarks": "rule_set_133" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_sudo", - "remarks": "rule_set_133" + "remarks": "rule_set_134" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - sudo", - "remarks": "rule_set_133" + "remarks": "rule_set_134" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_sudo", - "remarks": "rule_set_133" + "remarks": "rule_set_134" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - sudo", - "remarks": "rule_set_133" + "remarks": "rule_set_134" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_auditd_enabled", - "remarks": "rule_set_134" + "remarks": "rule_set_135" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable auditd Service", - "remarks": "rule_set_134" + "remarks": "rule_set_135" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_auditd_enabled", - "remarks": "rule_set_134" + "remarks": "rule_set_135" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable auditd Service", - "remarks": "rule_set_134" + "remarks": "rule_set_135" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit_installed", - "remarks": "rule_set_135" + "remarks": "rule_set_136" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit Subsystem is Installed", - "remarks": "rule_set_135" + "remarks": "rule_set_136" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit_installed", - "remarks": "rule_set_135" + "remarks": "rule_set_136" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit Subsystem is Installed", - "remarks": "rule_set_135" + "remarks": "rule_set_136" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_noexec", - "remarks": "rule_set_136" + "remarks": "rule_set_137" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Privileged Escalated Commands Cannot Execute Other Commands - sudo NOEXEC", - "remarks": "rule_set_136" + "remarks": "rule_set_137" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_noexec", - "remarks": "rule_set_136" + "remarks": "rule_set_137" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Privileged Escalated Commands Cannot Execute Other Commands - sudo NOEXEC", - "remarks": "rule_set_136" + "remarks": "rule_set_137" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_requiretty", - "remarks": "rule_set_137" + "remarks": "rule_set_138" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo requiretty", - "remarks": "rule_set_137" + "remarks": "rule_set_138" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_requiretty", - "remarks": "rule_set_137" + "remarks": "rule_set_138" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo requiretty", - "remarks": "rule_set_137" + "remarks": "rule_set_138" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_use_pty", - "remarks": "rule_set_138" + "remarks": "rule_set_139" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo use_pty", - "remarks": "rule_set_138" + "remarks": "rule_set_139" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_use_pty", - "remarks": "rule_set_138" + "remarks": "rule_set_139" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo use_pty", - "remarks": "rule_set_138" + "remarks": "rule_set_139" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_ignore_dot", - "remarks": "rule_set_139" + "remarks": "rule_set_140" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure sudo Ignores Commands In Current Dir - sudo ignore_dot", - "remarks": "rule_set_139" + "remarks": "rule_set_140" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_ignore_dot", - "remarks": "rule_set_139" + "remarks": "rule_set_140" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure sudo Ignores Commands In Current Dir - sudo ignore_dot", - "remarks": "rule_set_139" + "remarks": "rule_set_140" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_env_reset", - "remarks": "rule_set_140" + "remarks": "rule_set_141" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure sudo Runs In A Minimal Environment - sudo env_reset", - "remarks": "rule_set_140" + "remarks": "rule_set_141" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_env_reset", - "remarks": "rule_set_140" + "remarks": "rule_set_141" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure sudo Runs In A Minimal Environment - sudo env_reset", - "remarks": "rule_set_140" + "remarks": "rule_set_141" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudoers_no_root_target", - "remarks": "rule_set_141" + "remarks": "rule_set_142" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Don't target root user in the sudoers file", - "remarks": "rule_set_141" + "remarks": "rule_set_142" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudoers_no_root_target", - "remarks": "rule_set_141" + "remarks": "rule_set_142" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Don't target root user in the sudoers file", - "remarks": "rule_set_141" + "remarks": "rule_set_142" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudoers_no_command_negation", - "remarks": "rule_set_142" + "remarks": "rule_set_143" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Don't define allowed commands in sudoers by means of exclusion", - "remarks": "rule_set_142" + "remarks": "rule_set_143" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudoers_no_command_negation", - "remarks": "rule_set_142" + "remarks": "rule_set_143" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Don't define allowed commands in sudoers by means of exclusion", - "remarks": "rule_set_142" + "remarks": "rule_set_143" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudoers_explicit_command_args", - "remarks": "rule_set_143" + "remarks": "rule_set_144" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Explicit arguments in sudo specifications", - "remarks": "rule_set_143" + "remarks": "rule_set_144" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudoers_explicit_command_args", - "remarks": "rule_set_143" + "remarks": "rule_set_144" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Explicit arguments in sudo specifications", - "remarks": "rule_set_143" + "remarks": "rule_set_144" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shadow", - "remarks": "rule_set_144" + "remarks": "rule_set_145" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns shadow File", - "remarks": "rule_set_144" + "remarks": "rule_set_145" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shadow", - "remarks": "rule_set_144" + "remarks": "rule_set_145" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns shadow File", - "remarks": "rule_set_144" + "remarks": "rule_set_145" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shadow", - "remarks": "rule_set_145" + "remarks": "rule_set_146" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns shadow File", - "remarks": "rule_set_145" + "remarks": "rule_set_146" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shadow", - "remarks": "rule_set_145" + "remarks": "rule_set_146" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns shadow File", - "remarks": "rule_set_145" + "remarks": "rule_set_146" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shadow", - "remarks": "rule_set_146" + "remarks": "rule_set_147" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on shadow File", - "remarks": "rule_set_146" + "remarks": "rule_set_147" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shadow", - "remarks": "rule_set_146" + "remarks": "rule_set_147" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on shadow File", - "remarks": "rule_set_146" + "remarks": "rule_set_147" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_gshadow", - "remarks": "rule_set_147" + "remarks": "rule_set_148" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns gshadow File", - "remarks": "rule_set_147" + "remarks": "rule_set_148" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_gshadow", - "remarks": "rule_set_147" + "remarks": "rule_set_148" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns gshadow File", - "remarks": "rule_set_147" + "remarks": "rule_set_148" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_gshadow", - "remarks": "rule_set_148" + "remarks": "rule_set_149" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns gshadow File", - "remarks": "rule_set_148" + "remarks": "rule_set_149" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_gshadow", - "remarks": "rule_set_148" + "remarks": "rule_set_149" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns gshadow File", - "remarks": "rule_set_148" + "remarks": "rule_set_149" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_gshadow", - "remarks": "rule_set_149" + "remarks": "rule_set_150" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on gshadow File", - "remarks": "rule_set_149" + "remarks": "rule_set_150" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_gshadow", - "remarks": "rule_set_149" + "remarks": "rule_set_150" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on gshadow File", - "remarks": "rule_set_149" + "remarks": "rule_set_150" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_passwd", - "remarks": "rule_set_150" + "remarks": "rule_set_151" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns passwd File", - "remarks": "rule_set_150" + "remarks": "rule_set_151" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_passwd", - "remarks": "rule_set_150" + "remarks": "rule_set_151" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns passwd File", - "remarks": "rule_set_150" + "remarks": "rule_set_151" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_passwd", - "remarks": "rule_set_151" + "remarks": "rule_set_152" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns passwd File", - "remarks": "rule_set_151" + "remarks": "rule_set_152" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_passwd", - "remarks": "rule_set_151" + "remarks": "rule_set_152" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns passwd File", - "remarks": "rule_set_151" + "remarks": "rule_set_152" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_passwd", - "remarks": "rule_set_152" + "remarks": "rule_set_153" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on passwd File", - "remarks": "rule_set_152" + "remarks": "rule_set_153" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_passwd", - "remarks": "rule_set_152" + "remarks": "rule_set_153" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on passwd File", - "remarks": "rule_set_152" + "remarks": "rule_set_153" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_group", - "remarks": "rule_set_153" + "remarks": "rule_set_154" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns group File", - "remarks": "rule_set_153" + "remarks": "rule_set_154" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_group", - "remarks": "rule_set_153" + "remarks": "rule_set_154" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns group File", - "remarks": "rule_set_153" + "remarks": "rule_set_154" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_group", - "remarks": "rule_set_154" + "remarks": "rule_set_155" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns group File", - "remarks": "rule_set_154" + "remarks": "rule_set_155" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_group", - "remarks": "rule_set_154" + "remarks": "rule_set_155" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns group File", - "remarks": "rule_set_154" + "remarks": "rule_set_155" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_group", - "remarks": "rule_set_155" + "remarks": "rule_set_156" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on group File", - "remarks": "rule_set_155" + "remarks": "rule_set_156" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_group", - "remarks": "rule_set_155" + "remarks": "rule_set_156" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on group File", - "remarks": "rule_set_155" + "remarks": "rule_set_156" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shells", - "remarks": "rule_set_156" + "remarks": "rule_set_157" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Who Owns /etc/shells File", - "remarks": "rule_set_156" + "remarks": "rule_set_157" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shells", - "remarks": "rule_set_156" + "remarks": "rule_set_157" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Who Owns /etc/shells File", - "remarks": "rule_set_156" + "remarks": "rule_set_157" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shells", - "remarks": "rule_set_157" + "remarks": "rule_set_158" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/shells File", - "remarks": "rule_set_157" + "remarks": "rule_set_158" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shells", - "remarks": "rule_set_157" + "remarks": "rule_set_158" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/shells File", - "remarks": "rule_set_157" + "remarks": "rule_set_158" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shells", - "remarks": "rule_set_158" + "remarks": "rule_set_159" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/shells File", - "remarks": "rule_set_158" + "remarks": "rule_set_159" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shells", - "remarks": "rule_set_158" + "remarks": "rule_set_159" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/shells File", - "remarks": "rule_set_158" + "remarks": "rule_set_159" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_159" + "remarks": "rule_set_160" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_159" + "remarks": "rule_set_160" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_159" + "remarks": "rule_set_160" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_159" + "remarks": "rule_set_160" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_160" + "remarks": "rule_set_161" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_160" + "remarks": "rule_set_161" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_160" + "remarks": "rule_set_161" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_160" + "remarks": "rule_set_161" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_users_home_files_groupownership", - "remarks": "rule_set_161" + "remarks": "rule_set_162" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All User Files and Directories In The Home Directory Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_161" + "remarks": "rule_set_162" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_users_home_files_groupownership", - "remarks": "rule_set_161" + "remarks": "rule_set_162" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All User Files and Directories In The Home Directory Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_161" + "remarks": "rule_set_162" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_users_home_files_ownership", - "remarks": "rule_set_162" + "remarks": "rule_set_163" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All User Files and Directories In The Home Directory Must Have a Valid Owner", - "remarks": "rule_set_162" + "remarks": "rule_set_163" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_users_home_files_ownership", - "remarks": "rule_set_162" + "remarks": "rule_set_163" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All User Files and Directories In The Home Directory Must Have a Valid Owner", - "remarks": "rule_set_162" + "remarks": "rule_set_163" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_users_home_files_permissions", - "remarks": "rule_set_163" + "remarks": "rule_set_164" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All User Files and Directories In The Home Directory Must Have Mode 0750 Or Less Permissive", - "remarks": "rule_set_163" + "remarks": "rule_set_164" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_users_home_files_permissions", - "remarks": "rule_set_163" + "remarks": "rule_set_164" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All User Files and Directories In The Home Directory Must Have Mode 0750 Or Less Permissive", - "remarks": "rule_set_163" + "remarks": "rule_set_164" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_164" + "remarks": "rule_set_165" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_164" + "remarks": "rule_set_165" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_164" + "remarks": "rule_set_165" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_164" + "remarks": "rule_set_165" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_system_commands_group_root_owned", - "remarks": "rule_set_165" + "remarks": "rule_set_166" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that system commands directories have root as a group owner", - "remarks": "rule_set_165" + "remarks": "rule_set_166" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_system_commands_group_root_owned", - "remarks": "rule_set_165" + "remarks": "rule_set_166" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that system commands directories have root as a group owner", - "remarks": "rule_set_165" + "remarks": "rule_set_166" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_system_commands_root_owned", - "remarks": "rule_set_166" + "remarks": "rule_set_167" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that system commands directories have root ownership", - "remarks": "rule_set_166" + "remarks": "rule_set_167" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_system_commands_root_owned", - "remarks": "rule_set_166" + "remarks": "rule_set_167" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that system commands directories have root ownership", - "remarks": "rule_set_166" + "remarks": "rule_set_167" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_system_commands_dirs", - "remarks": "rule_set_167" + "remarks": "rule_set_168" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that system commands files are group owned by root or a system account", - "remarks": "rule_set_167" + "remarks": "rule_set_168" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_system_commands_dirs", - "remarks": "rule_set_167" + "remarks": "rule_set_168" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that system commands files are group owned by root or a system account", - "remarks": "rule_set_167" + "remarks": "rule_set_168" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_binary_dirs", - "remarks": "rule_set_168" + "remarks": "rule_set_169" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that System Executables Have Root Ownership", - "remarks": "rule_set_168" + "remarks": "rule_set_169" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_binary_dirs", - "remarks": "rule_set_168" + "remarks": "rule_set_169" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that System Executables Have Root Ownership", - "remarks": "rule_set_168" + "remarks": "rule_set_169" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_binary_dirs", - "remarks": "rule_set_169" + "remarks": "rule_set_170" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that System Executables Have Restrictive Permissions", - "remarks": "rule_set_169" + "remarks": "rule_set_170" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_binary_dirs", - "remarks": "rule_set_169" + "remarks": "rule_set_170" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that System Executables Have Restrictive Permissions", - "remarks": "rule_set_169" + "remarks": "rule_set_170" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_private_key", - "remarks": "rule_set_170" + "remarks": "rule_set_171" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_170" + "remarks": "rule_set_171" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_private_key", - "remarks": "rule_set_170" + "remarks": "rule_set_171" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_170" + "remarks": "rule_set_171" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_private_key", - "remarks": "rule_set_171" + "remarks": "rule_set_172" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_171" + "remarks": "rule_set_172" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_private_key", - "remarks": "rule_set_171" + "remarks": "rule_set_172" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_171" + "remarks": "rule_set_172" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_private_key", - "remarks": "rule_set_172" + "remarks": "rule_set_173" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Private *_key Key Files", - "remarks": "rule_set_172" + "remarks": "rule_set_173" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_private_key", - "remarks": "rule_set_172" + "remarks": "rule_set_173" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Private *_key Key Files", - "remarks": "rule_set_172" + "remarks": "rule_set_173" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_pub_key", - "remarks": "rule_set_173" + "remarks": "rule_set_174" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_173" + "remarks": "rule_set_174" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_pub_key", - "remarks": "rule_set_173" + "remarks": "rule_set_174" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_173" + "remarks": "rule_set_174" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_pub_key", - "remarks": "rule_set_174" + "remarks": "rule_set_175" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_174" + "remarks": "rule_set_175" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_pub_key", - "remarks": "rule_set_174" + "remarks": "rule_set_175" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_174" + "remarks": "rule_set_175" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_pub_key", - "remarks": "rule_set_175" + "remarks": "rule_set_176" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Public *.pub Key Files", - "remarks": "rule_set_175" + "remarks": "rule_set_176" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_pub_key", - "remarks": "rule_set_175" + "remarks": "rule_set_176" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Public *.pub Key Files", - "remarks": "rule_set_175" + "remarks": "rule_set_176" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_config", - "remarks": "rule_set_176" + "remarks": "rule_set_177" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server config file", - "remarks": "rule_set_176" + "remarks": "rule_set_177" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_config", - "remarks": "rule_set_176" + "remarks": "rule_set_177" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server config file", - "remarks": "rule_set_176" + "remarks": "rule_set_177" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_config", - "remarks": "rule_set_177" + "remarks": "rule_set_178" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server config file", - "remarks": "rule_set_177" + "remarks": "rule_set_178" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_config", - "remarks": "rule_set_177" + "remarks": "rule_set_178" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server config file", - "remarks": "rule_set_177" + "remarks": "rule_set_178" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_config", - "remarks": "rule_set_178" + "remarks": "rule_set_179" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server config file", - "remarks": "rule_set_178" + "remarks": "rule_set_179" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_config", - "remarks": "rule_set_178" + "remarks": "rule_set_179" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server config file", - "remarks": "rule_set_178" + "remarks": "rule_set_179" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_etc_selinux", - "remarks": "rule_set_179" + "remarks": "rule_set_180" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/selinux Directory", - "remarks": "rule_set_179" + "remarks": "rule_set_180" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_etc_selinux", - "remarks": "rule_set_179" + "remarks": "rule_set_180" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/selinux Directory", - "remarks": "rule_set_179" + "remarks": "rule_set_180" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_selinux", - "remarks": "rule_set_180" + "remarks": "rule_set_181" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/selinux Directory", - "remarks": "rule_set_180" + "remarks": "rule_set_181" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_selinux", - "remarks": "rule_set_180" + "remarks": "rule_set_181" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/selinux Directory", - "remarks": "rule_set_180" + "remarks": "rule_set_181" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_selinux", - "remarks": "rule_set_181" + "remarks": "rule_set_182" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/selinux Directory", - "remarks": "rule_set_181" + "remarks": "rule_set_182" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_selinux", - "remarks": "rule_set_181" + "remarks": "rule_set_182" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/selinux Directory", - "remarks": "rule_set_181" + "remarks": "rule_set_182" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_sestatus_conf", - "remarks": "rule_set_182" + "remarks": "rule_set_183" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/sestatus.conf File", - "remarks": "rule_set_182" + "remarks": "rule_set_183" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_sestatus_conf", - "remarks": "rule_set_182" + "remarks": "rule_set_183" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/sestatus.conf File", - "remarks": "rule_set_182" + "remarks": "rule_set_183" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_sestatus_conf", - "remarks": "rule_set_183" + "remarks": "rule_set_184" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/sestatus.conf File", - "remarks": "rule_set_183" + "remarks": "rule_set_184" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_sestatus_conf", - "remarks": "rule_set_183" + "remarks": "rule_set_184" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/sestatus.conf File", - "remarks": "rule_set_183" + "remarks": "rule_set_184" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_sestatus_conf", - "remarks": "rule_set_184" + "remarks": "rule_set_185" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/sestatus.conf File", - "remarks": "rule_set_184" + "remarks": "rule_set_185" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_sestatus_conf", - "remarks": "rule_set_184" + "remarks": "rule_set_185" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/sestatus.conf File", - "remarks": "rule_set_184" + "remarks": "rule_set_185" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_etc_ipsecd", - "remarks": "rule_set_185" + "remarks": "rule_set_186" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/ipsec.d Directory", - "remarks": "rule_set_185" + "remarks": "rule_set_186" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_etc_ipsecd", - "remarks": "rule_set_185" + "remarks": "rule_set_186" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/ipsec.d Directory", - "remarks": "rule_set_185" + "remarks": "rule_set_186" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_ipsecd", - "remarks": "rule_set_186" + "remarks": "rule_set_187" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/ipsec.d Directory", - "remarks": "rule_set_186" + "remarks": "rule_set_187" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_ipsecd", - "remarks": "rule_set_186" + "remarks": "rule_set_187" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/ipsec.d Directory", - "remarks": "rule_set_186" + "remarks": "rule_set_187" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_ipsecd", - "remarks": "rule_set_187" + "remarks": "rule_set_188" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/ipsec.d Directory", - "remarks": "rule_set_187" + "remarks": "rule_set_188" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_ipsecd", - "remarks": "rule_set_187" + "remarks": "rule_set_188" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/ipsec.d Directory", - "remarks": "rule_set_187" + "remarks": "rule_set_188" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_ipsec_conf", - "remarks": "rule_set_188" + "remarks": "rule_set_189" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/ipsec.conf File", - "remarks": "rule_set_188" + "remarks": "rule_set_189" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_ipsec_conf", - "remarks": "rule_set_188" + "remarks": "rule_set_189" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/ipsec.conf File", - "remarks": "rule_set_188" + "remarks": "rule_set_189" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_ipsec_conf", - "remarks": "rule_set_189" + "remarks": "rule_set_190" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/ipsec.conf File", - "remarks": "rule_set_189" + "remarks": "rule_set_190" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_ipsec_conf", - "remarks": "rule_set_189" + "remarks": "rule_set_190" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/ipsec.conf File", - "remarks": "rule_set_189" + "remarks": "rule_set_190" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_ipsec_conf", - "remarks": "rule_set_190" + "remarks": "rule_set_191" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/ipsec.conf File", - "remarks": "rule_set_190" + "remarks": "rule_set_191" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_ipsec_conf", - "remarks": "rule_set_190" + "remarks": "rule_set_191" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/ipsec.conf File", - "remarks": "rule_set_190" + "remarks": "rule_set_191" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_ipsec_secrets", - "remarks": "rule_set_191" + "remarks": "rule_set_192" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/ipsec.secrets File", - "remarks": "rule_set_191" + "remarks": "rule_set_192" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_ipsec_secrets", - "remarks": "rule_set_191" + "remarks": "rule_set_192" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/ipsec.secrets File", - "remarks": "rule_set_191" + "remarks": "rule_set_192" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_ipsec_secrets", - "remarks": "rule_set_192" + "remarks": "rule_set_193" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/ipsec.secrets File", - "remarks": "rule_set_192" + "remarks": "rule_set_193" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_ipsec_secrets", - "remarks": "rule_set_192" + "remarks": "rule_set_193" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/ipsec.secrets File", - "remarks": "rule_set_192" + "remarks": "rule_set_193" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_ipsec_secrets", - "remarks": "rule_set_193" + "remarks": "rule_set_194" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/ipsec.secrets File", - "remarks": "rule_set_193" + "remarks": "rule_set_194" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_ipsec_secrets", - "remarks": "rule_set_193" + "remarks": "rule_set_194" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/ipsec.secrets File", - "remarks": "rule_set_193" + "remarks": "rule_set_194" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_etc_iptables", - "remarks": "rule_set_194" + "remarks": "rule_set_195" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/iptables Directory", - "remarks": "rule_set_194" + "remarks": "rule_set_195" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_etc_iptables", - "remarks": "rule_set_194" + "remarks": "rule_set_195" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/iptables Directory", - "remarks": "rule_set_194" + "remarks": "rule_set_195" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_iptables", - "remarks": "rule_set_195" + "remarks": "rule_set_196" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/iptables Directory", - "remarks": "rule_set_195" + "remarks": "rule_set_196" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_iptables", - "remarks": "rule_set_195" + "remarks": "rule_set_196" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/iptables Directory", - "remarks": "rule_set_195" + "remarks": "rule_set_196" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_iptables", - "remarks": "rule_set_196" + "remarks": "rule_set_197" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/iptables Directory", - "remarks": "rule_set_196" + "remarks": "rule_set_197" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_iptables", - "remarks": "rule_set_196" + "remarks": "rule_set_197" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/iptables Directory", - "remarks": "rule_set_196" + "remarks": "rule_set_197" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_etc_nftables", - "remarks": "rule_set_197" + "remarks": "rule_set_198" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/nftables Directory", - "remarks": "rule_set_197" + "remarks": "rule_set_198" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_etc_nftables", - "remarks": "rule_set_197" + "remarks": "rule_set_198" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/nftables Directory", - "remarks": "rule_set_197" + "remarks": "rule_set_198" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_nftables", - "remarks": "rule_set_198" + "remarks": "rule_set_199" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/nftables Directory", - "remarks": "rule_set_198" + "remarks": "rule_set_199" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_nftables", - "remarks": "rule_set_198" + "remarks": "rule_set_199" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/nftables Directory", - "remarks": "rule_set_198" + "remarks": "rule_set_199" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_nftables", - "remarks": "rule_set_199" + "remarks": "rule_set_200" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/nftables Directory", - "remarks": "rule_set_199" + "remarks": "rule_set_200" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_nftables", - "remarks": "rule_set_199" + "remarks": "rule_set_200" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/nftables Directory", - "remarks": "rule_set_199" + "remarks": "rule_set_200" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_etc_sysctld", - "remarks": "rule_set_200" + "remarks": "rule_set_201" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/sysctl.d Directory", - "remarks": "rule_set_200" + "remarks": "rule_set_201" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_etc_sysctld", - "remarks": "rule_set_200" + "remarks": "rule_set_201" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/sysctl.d Directory", - "remarks": "rule_set_200" + "remarks": "rule_set_201" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_sysctld", - "remarks": "rule_set_201" + "remarks": "rule_set_202" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/sysctl.d Directory", - "remarks": "rule_set_201" + "remarks": "rule_set_202" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_sysctld", - "remarks": "rule_set_201" + "remarks": "rule_set_202" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/sysctl.d Directory", - "remarks": "rule_set_201" + "remarks": "rule_set_202" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_sysctld", - "remarks": "rule_set_202" + "remarks": "rule_set_203" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/sysctl.d Directory", - "remarks": "rule_set_202" + "remarks": "rule_set_203" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_sysctld", - "remarks": "rule_set_202" + "remarks": "rule_set_203" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/sysctl.d Directory", - "remarks": "rule_set_202" + "remarks": "rule_set_203" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_sudoers", - "remarks": "rule_set_203" + "remarks": "rule_set_204" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/sudoers File", - "remarks": "rule_set_203" + "remarks": "rule_set_204" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_sudoers", - "remarks": "rule_set_203" + "remarks": "rule_set_204" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/sudoers File", - "remarks": "rule_set_203" + "remarks": "rule_set_204" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_sudoers", - "remarks": "rule_set_204" + "remarks": "rule_set_205" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/sudoers File", - "remarks": "rule_set_204" + "remarks": "rule_set_205" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_sudoers", - "remarks": "rule_set_204" + "remarks": "rule_set_205" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/sudoers File", - "remarks": "rule_set_204" + "remarks": "rule_set_205" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_sudoers", - "remarks": "rule_set_205" + "remarks": "rule_set_206" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/sudoers File", - "remarks": "rule_set_205" + "remarks": "rule_set_206" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_sudoers", - "remarks": "rule_set_205" + "remarks": "rule_set_206" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/sudoers File", - "remarks": "rule_set_205" + "remarks": "rule_set_206" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_etc_sudoersd", - "remarks": "rule_set_206" + "remarks": "rule_set_207" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/sudoers.d Directory", - "remarks": "rule_set_206" + "remarks": "rule_set_207" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_etc_sudoersd", - "remarks": "rule_set_206" + "remarks": "rule_set_207" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/sudoers.d Directory", - "remarks": "rule_set_206" + "remarks": "rule_set_207" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_sudoersd", - "remarks": "rule_set_207" + "remarks": "rule_set_208" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/sudoers.d Directory", - "remarks": "rule_set_207" + "remarks": "rule_set_208" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_sudoersd", - "remarks": "rule_set_207" + "remarks": "rule_set_208" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/sudoers.d Directory", - "remarks": "rule_set_207" + "remarks": "rule_set_208" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_sudoersd", - "remarks": "rule_set_208" + "remarks": "rule_set_209" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/sudoers.d Directory", - "remarks": "rule_set_208" + "remarks": "rule_set_209" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_sudoersd", - "remarks": "rule_set_208" + "remarks": "rule_set_209" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/sudoers.d Directory", - "remarks": "rule_set_208" + "remarks": "rule_set_209" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_crypttab", - "remarks": "rule_set_209" + "remarks": "rule_set_210" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/crypttab File", - "remarks": "rule_set_209" + "remarks": "rule_set_210" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_crypttab", - "remarks": "rule_set_209" + "remarks": "rule_set_210" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/crypttab File", - "remarks": "rule_set_209" + "remarks": "rule_set_210" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_crypttab", - "remarks": "rule_set_210" + "remarks": "rule_set_211" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/crypttab File", - "remarks": "rule_set_210" + "remarks": "rule_set_211" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_crypttab", - "remarks": "rule_set_210" + "remarks": "rule_set_211" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/crypttab File", - "remarks": "rule_set_210" + "remarks": "rule_set_211" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_crypttab", - "remarks": "rule_set_211" + "remarks": "rule_set_212" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/crypttab File", - "remarks": "rule_set_211" + "remarks": "rule_set_212" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_crypttab", - "remarks": "rule_set_211" + "remarks": "rule_set_212" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/crypttab File", - "remarks": "rule_set_211" + "remarks": "rule_set_212" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_chrony_keys", - "remarks": "rule_set_212" + "remarks": "rule_set_213" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/chrony.keys File", - "remarks": "rule_set_212" + "remarks": "rule_set_213" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_chrony_keys", - "remarks": "rule_set_212" + "remarks": "rule_set_213" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/chrony.keys File", - "remarks": "rule_set_212" + "remarks": "rule_set_213" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_chrony_keys", - "remarks": "rule_set_213" + "remarks": "rule_set_214" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/chrony.keys File", - "remarks": "rule_set_213" + "remarks": "rule_set_214" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_chrony_keys", - "remarks": "rule_set_213" + "remarks": "rule_set_214" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/chrony.keys File", - "remarks": "rule_set_213" + "remarks": "rule_set_214" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_chrony_keys", - "remarks": "rule_set_214" + "remarks": "rule_set_215" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/chrony.keys File", - "remarks": "rule_set_214" + "remarks": "rule_set_215" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_chrony_keys", - "remarks": "rule_set_214" + "remarks": "rule_set_215" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/chrony.keys File", - "remarks": "rule_set_214" + "remarks": "rule_set_215" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "enable_pam_namespace", - "remarks": "rule_set_215" + "remarks": "rule_set_216" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Up a Private Namespace in PAM Configuration", - "remarks": "rule_set_215" + "remarks": "rule_set_216" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "enable_pam_namespace", - "remarks": "rule_set_215" + "remarks": "rule_set_216" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Up a Private Namespace in PAM Configuration", - "remarks": "rule_set_215" + "remarks": "rule_set_216" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_polyinstantiated_tmp", - "remarks": "rule_set_216" + "remarks": "rule_set_217" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Polyinstantiation of /tmp Directories", - "remarks": "rule_set_216" + "remarks": "rule_set_217" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_polyinstantiated_tmp", - "remarks": "rule_set_216" + "remarks": "rule_set_217" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Polyinstantiation of /tmp Directories", - "remarks": "rule_set_216" + "remarks": "rule_set_217" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_polyinstantiated_var_tmp", - "remarks": "rule_set_217" + "remarks": "rule_set_218" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Polyinstantiation of /var/tmp Directories", - "remarks": "rule_set_217" + "remarks": "rule_set_218" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_polyinstantiated_var_tmp", - "remarks": "rule_set_217" + "remarks": "rule_set_218" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Polyinstantiation of /var/tmp Directories", - "remarks": "rule_set_217" + "remarks": "rule_set_218" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sebool_polyinstantiation_enabled", - "remarks": "rule_set_218" + "remarks": "rule_set_219" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the polyinstantiation_enabled SELinux Boolean", - "remarks": "rule_set_218" + "remarks": "rule_set_219" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sebool_polyinstantiation_enabled", - "remarks": "rule_set_218" + "remarks": "rule_set_219" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the polyinstantiation_enabled SELinux Boolean", - "remarks": "rule_set_218" + "remarks": "rule_set_219" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_sssd_installed", - "remarks": "rule_set_219" + "remarks": "rule_set_220" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install the SSSD Package", - "remarks": "rule_set_219" + "remarks": "rule_set_220" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_sssd_installed", - "remarks": "rule_set_219" + "remarks": "rule_set_220" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install the SSSD Package", - "remarks": "rule_set_219" + "remarks": "rule_set_220" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_sssd_enabled", - "remarks": "rule_set_220" + "remarks": "rule_set_221" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable the SSSD Service", - "remarks": "rule_set_220" + "remarks": "rule_set_221" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_sssd_enabled", - "remarks": "rule_set_220" + "remarks": "rule_set_221" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable the SSSD Service", - "remarks": "rule_set_220" + "remarks": "rule_set_221" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "postfix_network_listening_disabled", - "remarks": "rule_set_221" + "remarks": "rule_set_222" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Postfix Network Listening", - "remarks": "rule_set_221" + "remarks": "rule_set_222" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "postfix_network_listening_disabled", - "remarks": "rule_set_221" + "remarks": "rule_set_222" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Postfix Network Listening", - "remarks": "rule_set_221" + "remarks": "rule_set_222" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "postfix_client_configure_mail_alias", - "remarks": "rule_set_222" + "remarks": "rule_set_223" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure System to Forward All Mail For The Root Account", - "remarks": "rule_set_222" + "remarks": "rule_set_223" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "postfix_client_configure_mail_alias", - "remarks": "rule_set_222" + "remarks": "rule_set_223" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure System to Forward All Mail For The Root Account", - "remarks": "rule_set_222" + "remarks": "rule_set_223" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_state", - "remarks": "rule_set_223" + "remarks": "rule_set_224" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SELinux State is Enforcing", - "remarks": "rule_set_223" + "remarks": "rule_set_224" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_state", - "remarks": "rule_set_223" + "remarks": "rule_set_224" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SELinux State is Enforcing", - "remarks": "rule_set_223" + "remarks": "rule_set_224" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_224" + "remarks": "rule_set_225" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_224" + "remarks": "rule_set_225" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_224" + "remarks": "rule_set_225" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_224" + "remarks": "rule_set_225" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_build_database", - "remarks": "rule_set_225" + "remarks": "rule_set_226" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Build and Test AIDE Database", - "remarks": "rule_set_225" + "remarks": "rule_set_226" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_build_database", - "remarks": "rule_set_225" + "remarks": "rule_set_226" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Build and Test AIDE Database", - "remarks": "rule_set_225" + "remarks": "rule_set_226" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_nosmep_argument_absent", - "remarks": "rule_set_226" + "remarks": "rule_set_227" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SMEP is not disabled during boot", - "remarks": "rule_set_226" + "remarks": "rule_set_227" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_nosmep_argument_absent", - "remarks": "rule_set_226" + "remarks": "rule_set_227" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SMEP is not disabled during boot", - "remarks": "rule_set_226" + "remarks": "rule_set_227" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_nosmap_argument_absent", - "remarks": "rule_set_227" + "remarks": "rule_set_228" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SMAP is not disabled during boot", - "remarks": "rule_set_227" + "remarks": "rule_set_228" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_nosmap_argument_absent", - "remarks": "rule_set_227" + "remarks": "rule_set_228" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SMAP is not disabled during boot", - "remarks": "rule_set_227" + "remarks": "rule_set_228" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_enable_iommu_force", - "remarks": "rule_set_228" + "remarks": "rule_set_229" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "IOMMU configuration directive", - "remarks": "rule_set_228" + "remarks": "rule_set_229" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_enable_iommu_force", - "remarks": "rule_set_228" + "remarks": "rule_set_229" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "IOMMU configuration directive", - "remarks": "rule_set_228" + "remarks": "rule_set_229" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_modules_disabled", - "remarks": "rule_set_229" + "remarks": "rule_set_230" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable loading and unloading of kernel modules", - "remarks": "rule_set_229" + "remarks": "rule_set_230" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_modules_disabled", - "remarks": "rule_set_229" + "remarks": "rule_set_230" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable loading and unloading of kernel modules", - "remarks": "rule_set_229" + "remarks": "rule_set_230" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_grub2_cfg", - "remarks": "rule_set_230" + "remarks": "rule_set_231" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify /boot/grub2/grub.cfg Group Ownership", - "remarks": "rule_set_230" + "remarks": "rule_set_231" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_grub2_cfg", - "remarks": "rule_set_230" + "remarks": "rule_set_231" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify /boot/grub2/grub.cfg Group Ownership", - "remarks": "rule_set_230" + "remarks": "rule_set_231" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_grub2_cfg", - "remarks": "rule_set_231" + "remarks": "rule_set_232" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify /boot/grub2/grub.cfg User Ownership", - "remarks": "rule_set_231" + "remarks": "rule_set_232" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_grub2_cfg", - "remarks": "rule_set_231" + "remarks": "rule_set_232" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify /boot/grub2/grub.cfg User Ownership", - "remarks": "rule_set_231" + "remarks": "rule_set_232" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_grub2_cfg", - "remarks": "rule_set_232" + "remarks": "rule_set_233" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify /boot/grub2/grub.cfg Permissions", - "remarks": "rule_set_232" + "remarks": "rule_set_233" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_grub2_cfg", - "remarks": "rule_set_232" + "remarks": "rule_set_233" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify /boot/grub2/grub.cfg Permissions", - "remarks": "rule_set_232" + "remarks": "rule_set_233" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_user_cfg", - "remarks": "rule_set_233" + "remarks": "rule_set_234" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify /boot/grub2/user.cfg Group Ownership", - "remarks": "rule_set_233" + "remarks": "rule_set_234" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_user_cfg", - "remarks": "rule_set_233" + "remarks": "rule_set_234" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify /boot/grub2/user.cfg Group Ownership", - "remarks": "rule_set_233" + "remarks": "rule_set_234" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_user_cfg", - "remarks": "rule_set_234" + "remarks": "rule_set_235" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify /boot/grub2/user.cfg User Ownership", - "remarks": "rule_set_234" + "remarks": "rule_set_235" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_user_cfg", - "remarks": "rule_set_234" + "remarks": "rule_set_235" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify /boot/grub2/user.cfg User Ownership", - "remarks": "rule_set_234" + "remarks": "rule_set_235" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_user_cfg", - "remarks": "rule_set_235" + "remarks": "rule_set_236" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify /boot/grub2/user.cfg Permissions", - "remarks": "rule_set_235" + "remarks": "rule_set_236" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_user_cfg", - "remarks": "rule_set_235" + "remarks": "rule_set_236" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify /boot/grub2/user.cfg Permissions", - "remarks": "rule_set_235" + "remarks": "rule_set_236" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_systemmap", - "remarks": "rule_set_236" + "remarks": "rule_set_237" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns System.map Files", - "remarks": "rule_set_236" + "remarks": "rule_set_237" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_systemmap", - "remarks": "rule_set_236" + "remarks": "rule_set_237" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns System.map Files", - "remarks": "rule_set_236" + "remarks": "rule_set_237" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_systemmap", - "remarks": "rule_set_237" + "remarks": "rule_set_238" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns System.map Files", - "remarks": "rule_set_237" + "remarks": "rule_set_238" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_systemmap", - "remarks": "rule_set_237" + "remarks": "rule_set_238" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns System.map Files", - "remarks": "rule_set_237" + "remarks": "rule_set_238" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_systemmap", - "remarks": "rule_set_238" + "remarks": "rule_set_239" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on System.map Files", - "remarks": "rule_set_238" + "remarks": "rule_set_239" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_systemmap", - "remarks": "rule_set_238" + "remarks": "rule_set_239" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on System.map Files", - "remarks": "rule_set_238" + "remarks": "rule_set_239" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_bashrc", - "remarks": "rule_set_239" + "remarks": "rule_set_240" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Bash Umask is Set Correctly", - "remarks": "rule_set_239" + "remarks": "rule_set_240" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_bashrc", - "remarks": "rule_set_239" + "remarks": "rule_set_240" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Bash Umask is Set Correctly", - "remarks": "rule_set_239" + "remarks": "rule_set_240" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_login_defs", - "remarks": "rule_set_240" + "remarks": "rule_set_241" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in login.defs", - "remarks": "rule_set_240" + "remarks": "rule_set_241" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_login_defs", - "remarks": "rule_set_240" + "remarks": "rule_set_241" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in login.defs", - "remarks": "rule_set_240" + "remarks": "rule_set_241" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_profile", - "remarks": "rule_set_241" + "remarks": "rule_set_242" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in /etc/profile", - "remarks": "rule_set_241" + "remarks": "rule_set_242" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_profile", - "remarks": "rule_set_241" + "remarks": "rule_set_242" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in /etc/profile", - "remarks": "rule_set_241" + "remarks": "rule_set_242" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_dedicated_group", - "remarks": "rule_set_242" + "remarks": "rule_set_243" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure a dedicated group owns sudo", - "remarks": "rule_set_242" + "remarks": "rule_set_243" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_dedicated_group", - "remarks": "rule_set_242" + "remarks": "rule_set_243" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure a dedicated group owns sudo", - "remarks": "rule_set_242" + "remarks": "rule_set_243" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sudo", - "remarks": "rule_set_243" + "remarks": "rule_set_244" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure That the sudo Binary Has the Correct Permissions", - "remarks": "rule_set_243" + "remarks": "rule_set_244" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sudo", - "remarks": "rule_set_243" + "remarks": "rule_set_244" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure That the sudo Binary Has the Correct Permissions", - "remarks": "rule_set_243" + "remarks": "rule_set_244" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_policytype", - "remarks": "rule_set_244" + "remarks": "rule_set_245" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure SELinux Policy", - "remarks": "rule_set_244" + "remarks": "rule_set_245" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_policytype", - "remarks": "rule_set_244" + "remarks": "rule_set_245" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure SELinux Policy", - "remarks": "rule_set_244" + "remarks": "rule_set_245" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_chrony_installed", - "remarks": "rule_set_245" + "remarks": "rule_set_246" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "The Chrony package is installed", - "remarks": "rule_set_245" + "remarks": "rule_set_246" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_chrony_installed", - "remarks": "rule_set_245" + "remarks": "rule_set_246" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "The Chrony package is installed", - "remarks": "rule_set_245" + "remarks": "rule_set_246" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_chronyd_enabled", - "remarks": "rule_set_246" + "remarks": "rule_set_247" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "The Chronyd service is enabled", - "remarks": "rule_set_246" + "remarks": "rule_set_247" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_chronyd_enabled", - "remarks": "rule_set_246" + "remarks": "rule_set_247" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "The Chronyd service is enabled", - "remarks": "rule_set_246" + "remarks": "rule_set_247" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_specify_remote_server", - "remarks": "rule_set_247" + "remarks": "rule_set_248" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "A remote time server for Chrony is configured", - "remarks": "rule_set_247" + "remarks": "rule_set_248" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_specify_remote_server", - "remarks": "rule_set_247" + "remarks": "rule_set_248" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "A remote time server for Chrony is configured", - "remarks": "rule_set_247" + "remarks": "rule_set_248" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_configure_pool_and_server", - "remarks": "rule_set_248" + "remarks": "rule_set_249" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Chrony Configure Pool and Server", - "remarks": "rule_set_248" + "remarks": "rule_set_249" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_configure_pool_and_server", - "remarks": "rule_set_248" + "remarks": "rule_set_249" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Chrony Configure Pool and Server", - "remarks": "rule_set_248" + "remarks": "rule_set_249" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_remote_loghost", - "remarks": "rule_set_249" + "remarks": "rule_set_250" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Logs Sent To Remote Host", - "remarks": "rule_set_249" + "remarks": "rule_set_250" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_remote_loghost", - "remarks": "rule_set_249" + "remarks": "rule_set_250" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Logs Sent To Remote Host", - "remarks": "rule_set_249" + "remarks": "rule_set_250" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_rsyslog-gnutls_installed", - "remarks": "rule_set_250" + "remarks": "rule_set_251" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure rsyslog-gnutls is installed", - "remarks": "rule_set_250" + "remarks": "rule_set_251" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_rsyslog-gnutls_installed", - "remarks": "rule_set_250" + "remarks": "rule_set_251" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure rsyslog-gnutls is installed", - "remarks": "rule_set_250" + "remarks": "rule_set_251" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_remote_tls", - "remarks": "rule_set_251" + "remarks": "rule_set_252" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure TLS for rsyslog remote logging", - "remarks": "rule_set_251" + "remarks": "rule_set_252" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_remote_tls", - "remarks": "rule_set_251" + "remarks": "rule_set_252" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure TLS for rsyslog remote logging", - "remarks": "rule_set_251" + "remarks": "rule_set_252" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_remote_tls_cacert", - "remarks": "rule_set_252" + "remarks": "rule_set_253" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure CA certificate for rsyslog remote logging", - "remarks": "rule_set_252" + "remarks": "rule_set_253" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_remote_tls_cacert", - "remarks": "rule_set_252" + "remarks": "rule_set_253" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure CA certificate for rsyslog remote logging", - "remarks": "rule_set_252" + "remarks": "rule_set_253" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log_audit", - "remarks": "rule_set_253" + "remarks": "rule_set_254" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log/audit Located On Separate Partition", - "remarks": "rule_set_253" + "remarks": "rule_set_254" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log_audit", - "remarks": "rule_set_253" + "remarks": "rule_set_254" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log/audit Located On Separate Partition", - "remarks": "rule_set_253" + "remarks": "rule_set_254" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_logrotate_installed", - "remarks": "rule_set_254" + "remarks": "rule_set_255" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure logrotate is Installed", - "remarks": "rule_set_254" + "remarks": "rule_set_255" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_logrotate_installed", - "remarks": "rule_set_254" + "remarks": "rule_set_255" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure logrotate is Installed", - "remarks": "rule_set_254" + "remarks": "rule_set_255" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "timer_logrotate_enabled", - "remarks": "rule_set_255" + "remarks": "rule_set_256" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable logrotate Timer", - "remarks": "rule_set_255" + "remarks": "rule_set_256" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "timer_logrotate_enabled", - "remarks": "rule_set_255" + "remarks": "rule_set_256" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable logrotate Timer", - "remarks": "rule_set_255" + "remarks": "rule_set_256" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_logrotate_activated", - "remarks": "rule_set_256" + "remarks": "rule_set_257" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Logrotate Runs Periodically", - "remarks": "rule_set_256" + "remarks": "rule_set_257" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_logrotate_activated", - "remarks": "rule_set_256" + "remarks": "rule_set_257" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Logrotate Runs Periodically", - "remarks": "rule_set_256" + "remarks": "rule_set_257" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_257" + "remarks": "rule_set_258" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_257" + "remarks": "rule_set_258" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_257" + "remarks": "rule_set_258" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_257" + "remarks": "rule_set_258" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_258" + "remarks": "rule_set_259" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_258" + "remarks": "rule_set_259" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_258" + "remarks": "rule_set_259" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_258" + "remarks": "rule_set_259" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_259" + "remarks": "rule_set_260" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_259" + "remarks": "rule_set_260" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_259" + "remarks": "rule_set_260" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_259" + "remarks": "rule_set_260" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_sysadmin_actions", - "remarks": "rule_set_260" + "remarks": "rule_set_261" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects System Administrator Actions", - "remarks": "rule_set_260" + "remarks": "rule_set_261" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_sysadmin_actions", - "remarks": "rule_set_260" + "remarks": "rule_set_261" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects System Administrator Actions", - "remarks": "rule_set_260" + "remarks": "rule_set_261" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_sudo_log_events", - "remarks": "rule_set_261" + "remarks": "rule_set_262" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to perform maintenance activities", - "remarks": "rule_set_261" + "remarks": "rule_set_262" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_sudo_log_events", - "remarks": "rule_set_261" + "remarks": "rule_set_262" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to perform maintenance activities", - "remarks": "rule_set_261" + "remarks": "rule_set_262" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_faillock", - "remarks": "rule_set_262" + "remarks": "rule_set_263" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - faillock", - "remarks": "rule_set_262" + "remarks": "rule_set_263" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_faillock", - "remarks": "rule_set_262" + "remarks": "rule_set_263" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - faillock", - "remarks": "rule_set_262" + "remarks": "rule_set_263" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_lastlog", - "remarks": "rule_set_263" + "remarks": "rule_set_264" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - lastlog", - "remarks": "rule_set_263" + "remarks": "rule_set_264" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_lastlog", - "remarks": "rule_set_263" + "remarks": "rule_set_264" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - lastlog", - "remarks": "rule_set_263" + "remarks": "rule_set_264" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_utmp", - "remarks": "rule_set_264" + "remarks": "rule_set_265" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information utmp", - "remarks": "rule_set_264" + "remarks": "rule_set_265" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_utmp", - "remarks": "rule_set_264" + "remarks": "rule_set_265" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information utmp", - "remarks": "rule_set_264" + "remarks": "rule_set_265" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_btmp", - "remarks": "rule_set_265" + "remarks": "rule_set_266" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information btmp", - "remarks": "rule_set_265" + "remarks": "rule_set_266" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_btmp", - "remarks": "rule_set_265" + "remarks": "rule_set_266" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information btmp", - "remarks": "rule_set_265" + "remarks": "rule_set_266" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_wtmp", - "remarks": "rule_set_266" + "remarks": "rule_set_267" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", - "remarks": "rule_set_266" + "remarks": "rule_set_267" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_wtmp", - "remarks": "rule_set_266" + "remarks": "rule_set_267" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", - "remarks": "rule_set_266" + "remarks": "rule_set_267" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_adjtimex", - "remarks": "rule_set_267" + "remarks": "rule_set_268" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through adjtimex", - "remarks": "rule_set_267" + "remarks": "rule_set_268" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_adjtimex", - "remarks": "rule_set_267" + "remarks": "rule_set_268" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through adjtimex", - "remarks": "rule_set_267" + "remarks": "rule_set_268" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_clock_settime", - "remarks": "rule_set_268" + "remarks": "rule_set_269" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through clock_settime", - "remarks": "rule_set_268" + "remarks": "rule_set_269" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_clock_settime", - "remarks": "rule_set_268" + "remarks": "rule_set_269" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through clock_settime", - "remarks": "rule_set_268" + "remarks": "rule_set_269" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_stime", - "remarks": "rule_set_269" + "remarks": "rule_set_270" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through stime", - "remarks": "rule_set_269" + "remarks": "rule_set_270" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_stime", - "remarks": "rule_set_269" + "remarks": "rule_set_270" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through stime", - "remarks": "rule_set_269" + "remarks": "rule_set_270" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_watch_localtime", - "remarks": "rule_set_270" + "remarks": "rule_set_271" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter the localtime File", - "remarks": "rule_set_270" + "remarks": "rule_set_271" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_watch_localtime", - "remarks": "rule_set_270" + "remarks": "rule_set_271" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter the localtime File", - "remarks": "rule_set_270" + "remarks": "rule_set_271" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification", - "remarks": "rule_set_271" + "remarks": "rule_set_272" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment", - "remarks": "rule_set_271" + "remarks": "rule_set_272" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification", - "remarks": "rule_set_271" + "remarks": "rule_set_272" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment", - "remarks": "rule_set_271" + "remarks": "rule_set_272" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chmod", - "remarks": "rule_set_272" + "remarks": "rule_set_273" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", - "remarks": "rule_set_272" + "remarks": "rule_set_273" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chmod", - "remarks": "rule_set_272" + "remarks": "rule_set_273" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", - "remarks": "rule_set_272" + "remarks": "rule_set_273" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chown", - "remarks": "rule_set_273" + "remarks": "rule_set_274" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chown", - "remarks": "rule_set_273" + "remarks": "rule_set_274" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chown", - "remarks": "rule_set_273" + "remarks": "rule_set_274" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chown", - "remarks": "rule_set_273" + "remarks": "rule_set_274" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmod", - "remarks": "rule_set_274" + "remarks": "rule_set_275" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmod", - "remarks": "rule_set_274" + "remarks": "rule_set_275" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmod", - "remarks": "rule_set_274" + "remarks": "rule_set_275" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmod", - "remarks": "rule_set_274" + "remarks": "rule_set_275" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat", - "remarks": "rule_set_275" + "remarks": "rule_set_276" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat", - "remarks": "rule_set_275" + "remarks": "rule_set_276" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat", - "remarks": "rule_set_275" + "remarks": "rule_set_276" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat", - "remarks": "rule_set_275" + "remarks": "rule_set_276" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat2", - "remarks": "rule_set_276" + "remarks": "rule_set_277" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat2", - "remarks": "rule_set_276" + "remarks": "rule_set_277" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat2", - "remarks": "rule_set_276" + "remarks": "rule_set_277" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat2", - "remarks": "rule_set_276" + "remarks": "rule_set_277" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchown", - "remarks": "rule_set_277" + "remarks": "rule_set_278" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchown", - "remarks": "rule_set_277" + "remarks": "rule_set_278" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchown", - "remarks": "rule_set_277" + "remarks": "rule_set_278" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchown", - "remarks": "rule_set_277" + "remarks": "rule_set_278" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchownat", - "remarks": "rule_set_278" + "remarks": "rule_set_279" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchownat", - "remarks": "rule_set_278" + "remarks": "rule_set_279" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchownat", - "remarks": "rule_set_278" + "remarks": "rule_set_279" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchownat", - "remarks": "rule_set_278" + "remarks": "rule_set_279" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fremovexattr", - "remarks": "rule_set_279" + "remarks": "rule_set_280" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fremovexattr", - "remarks": "rule_set_279" + "remarks": "rule_set_280" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fremovexattr", - "remarks": "rule_set_279" + "remarks": "rule_set_280" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fremovexattr", - "remarks": "rule_set_279" + "remarks": "rule_set_280" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fsetxattr", - "remarks": "rule_set_280" + "remarks": "rule_set_281" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fsetxattr", - "remarks": "rule_set_280" + "remarks": "rule_set_281" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fsetxattr", - "remarks": "rule_set_280" + "remarks": "rule_set_281" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fsetxattr", - "remarks": "rule_set_280" + "remarks": "rule_set_281" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lchown", - "remarks": "rule_set_281" + "remarks": "rule_set_282" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lchown", - "remarks": "rule_set_281" + "remarks": "rule_set_282" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lchown", - "remarks": "rule_set_281" + "remarks": "rule_set_282" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lchown", - "remarks": "rule_set_281" + "remarks": "rule_set_282" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lremovexattr", - "remarks": "rule_set_282" + "remarks": "rule_set_283" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lremovexattr", - "remarks": "rule_set_282" + "remarks": "rule_set_283" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lremovexattr", - "remarks": "rule_set_282" + "remarks": "rule_set_283" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lremovexattr", - "remarks": "rule_set_282" + "remarks": "rule_set_283" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lsetxattr", - "remarks": "rule_set_283" + "remarks": "rule_set_284" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lsetxattr", - "remarks": "rule_set_283" + "remarks": "rule_set_284" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lsetxattr", - "remarks": "rule_set_283" + "remarks": "rule_set_284" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lsetxattr", - "remarks": "rule_set_283" + "remarks": "rule_set_284" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_removexattr", - "remarks": "rule_set_284" + "remarks": "rule_set_285" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - removexattr", - "remarks": "rule_set_284" + "remarks": "rule_set_285" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_removexattr", - "remarks": "rule_set_284" + "remarks": "rule_set_285" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - removexattr", - "remarks": "rule_set_284" + "remarks": "rule_set_285" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_setxattr", - "remarks": "rule_set_285" + "remarks": "rule_set_286" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - setxattr", - "remarks": "rule_set_285" + "remarks": "rule_set_286" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_setxattr", - "remarks": "rule_set_285" + "remarks": "rule_set_286" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - setxattr", - "remarks": "rule_set_285" + "remarks": "rule_set_286" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_creat", - "remarks": "rule_set_286" + "remarks": "rule_set_287" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - creat", - "remarks": "rule_set_286" + "remarks": "rule_set_287" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_creat", - "remarks": "rule_set_286" + "remarks": "rule_set_287" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - creat", - "remarks": "rule_set_286" + "remarks": "rule_set_287" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_ftruncate", - "remarks": "rule_set_287" + "remarks": "rule_set_288" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - ftruncate", - "remarks": "rule_set_287" + "remarks": "rule_set_288" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_ftruncate", - "remarks": "rule_set_287" + "remarks": "rule_set_288" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - ftruncate", - "remarks": "rule_set_287" + "remarks": "rule_set_288" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_open", - "remarks": "rule_set_288" + "remarks": "rule_set_289" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - open", - "remarks": "rule_set_288" + "remarks": "rule_set_289" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_open", - "remarks": "rule_set_288" + "remarks": "rule_set_289" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - open", - "remarks": "rule_set_288" + "remarks": "rule_set_289" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_openat", - "remarks": "rule_set_289" + "remarks": "rule_set_290" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - openat", - "remarks": "rule_set_289" + "remarks": "rule_set_290" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_openat", - "remarks": "rule_set_289" + "remarks": "rule_set_290" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - openat", - "remarks": "rule_set_289" + "remarks": "rule_set_290" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_truncate", - "remarks": "rule_set_290" + "remarks": "rule_set_291" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - truncate", - "remarks": "rule_set_290" + "remarks": "rule_set_291" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_truncate", - "remarks": "rule_set_290" + "remarks": "rule_set_291" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - truncate", - "remarks": "rule_set_290" + "remarks": "rule_set_291" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_group", - "remarks": "rule_set_291" + "remarks": "rule_set_292" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/group", - "remarks": "rule_set_291" + "remarks": "rule_set_292" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_group", - "remarks": "rule_set_291" + "remarks": "rule_set_292" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/group", - "remarks": "rule_set_291" + "remarks": "rule_set_292" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_gshadow", - "remarks": "rule_set_292" + "remarks": "rule_set_293" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/gshadow", - "remarks": "rule_set_292" + "remarks": "rule_set_293" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_gshadow", - "remarks": "rule_set_292" + "remarks": "rule_set_293" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/gshadow", - "remarks": "rule_set_292" + "remarks": "rule_set_293" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_opasswd", - "remarks": "rule_set_293" + "remarks": "rule_set_294" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", - "remarks": "rule_set_293" + "remarks": "rule_set_294" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_opasswd", - "remarks": "rule_set_293" + "remarks": "rule_set_294" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", - "remarks": "rule_set_293" + "remarks": "rule_set_294" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_passwd", - "remarks": "rule_set_294" + "remarks": "rule_set_295" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/passwd", - "remarks": "rule_set_294" + "remarks": "rule_set_295" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_passwd", - "remarks": "rule_set_294" + "remarks": "rule_set_295" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/passwd", - "remarks": "rule_set_294" + "remarks": "rule_set_295" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_shadow", - "remarks": "rule_set_295" + "remarks": "rule_set_296" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/shadow", - "remarks": "rule_set_295" + "remarks": "rule_set_296" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_shadow", - "remarks": "rule_set_295" + "remarks": "rule_set_296" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/shadow", - "remarks": "rule_set_295" + "remarks": "rule_set_296" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_media_export", - "remarks": "rule_set_296" + "remarks": "rule_set_297" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Exporting to Media (successful)", - "remarks": "rule_set_296" + "remarks": "rule_set_297" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_media_export", - "remarks": "rule_set_296" + "remarks": "rule_set_297" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Exporting to Media (successful)", - "remarks": "rule_set_296" + "remarks": "rule_set_297" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_umount2", - "remarks": "rule_set_297" + "remarks": "rule_set_298" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - umount2", - "remarks": "rule_set_297" + "remarks": "rule_set_298" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_umount2", - "remarks": "rule_set_297" + "remarks": "rule_set_298" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - umount2", - "remarks": "rule_set_297" + "remarks": "rule_set_298" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands", - "remarks": "rule_set_298" + "remarks": "rule_set_299" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands", - "remarks": "rule_set_298" + "remarks": "rule_set_299" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands", - "remarks": "rule_set_298" + "remarks": "rule_set_299" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands", - "remarks": "rule_set_298" + "remarks": "rule_set_299" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rename", - "remarks": "rule_set_299" + "remarks": "rule_set_300" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rename", - "remarks": "rule_set_299" + "remarks": "rule_set_300" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rename", - "remarks": "rule_set_299" + "remarks": "rule_set_300" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rename", - "remarks": "rule_set_299" + "remarks": "rule_set_300" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat", - "remarks": "rule_set_300" + "remarks": "rule_set_301" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat", - "remarks": "rule_set_300" + "remarks": "rule_set_301" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat", - "remarks": "rule_set_300" + "remarks": "rule_set_301" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat", - "remarks": "rule_set_300" + "remarks": "rule_set_301" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat2", - "remarks": "rule_set_301" + "remarks": "rule_set_302" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat2", - "remarks": "rule_set_301" + "remarks": "rule_set_302" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat2", - "remarks": "rule_set_301" + "remarks": "rule_set_302" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat2", - "remarks": "rule_set_301" + "remarks": "rule_set_302" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rmdir", - "remarks": "rule_set_302" + "remarks": "rule_set_303" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rmdir", - "remarks": "rule_set_302" + "remarks": "rule_set_303" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rmdir", - "remarks": "rule_set_302" + "remarks": "rule_set_303" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rmdir", - "remarks": "rule_set_302" + "remarks": "rule_set_303" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlink", - "remarks": "rule_set_303" + "remarks": "rule_set_304" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlink", - "remarks": "rule_set_303" + "remarks": "rule_set_304" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlink", - "remarks": "rule_set_303" + "remarks": "rule_set_304" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlink", - "remarks": "rule_set_303" + "remarks": "rule_set_304" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlinkat", - "remarks": "rule_set_304" + "remarks": "rule_set_305" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlinkat", - "remarks": "rule_set_304" + "remarks": "rule_set_305" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlinkat", - "remarks": "rule_set_304" + "remarks": "rule_set_305" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlinkat", - "remarks": "rule_set_304" + "remarks": "rule_set_305" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_delete", - "remarks": "rule_set_305" + "remarks": "rule_set_306" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Unloading - delete_module", - "remarks": "rule_set_305" + "remarks": "rule_set_306" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_delete", - "remarks": "rule_set_305" + "remarks": "rule_set_306" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Unloading - delete_module", - "remarks": "rule_set_305" + "remarks": "rule_set_306" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_init", - "remarks": "rule_set_306" + "remarks": "rule_set_307" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading - init_module", - "remarks": "rule_set_306" + "remarks": "rule_set_307" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_init", - "remarks": "rule_set_306" + "remarks": "rule_set_307" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading - init_module", - "remarks": "rule_set_306" + "remarks": "rule_set_307" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_finit", - "remarks": "rule_set_307" + "remarks": "rule_set_308" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - finit_module", - "remarks": "rule_set_307" + "remarks": "rule_set_308" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_finit", - "remarks": "rule_set_307" + "remarks": "rule_set_308" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - finit_module", - "remarks": "rule_set_307" + "remarks": "rule_set_308" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_insmod", - "remarks": "rule_set_308" + "remarks": "rule_set_309" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - insmod", - "remarks": "rule_set_308" + "remarks": "rule_set_309" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_insmod", - "remarks": "rule_set_308" + "remarks": "rule_set_309" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - insmod", - "remarks": "rule_set_308" + "remarks": "rule_set_309" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_modprobe", - "remarks": "rule_set_309" + "remarks": "rule_set_310" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - modprobe", - "remarks": "rule_set_309" + "remarks": "rule_set_310" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_modprobe", - "remarks": "rule_set_309" + "remarks": "rule_set_310" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - modprobe", - "remarks": "rule_set_309" + "remarks": "rule_set_310" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_rmmod", - "remarks": "rule_set_310" + "remarks": "rule_set_311" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - rmmod", - "remarks": "rule_set_310" + "remarks": "rule_set_311" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_rmmod", - "remarks": "rule_set_310" + "remarks": "rule_set_311" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - rmmod", - "remarks": "rule_set_310" + "remarks": "rule_set_311" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_kmod", - "remarks": "rule_set_311" + "remarks": "rule_set_312" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - kmod", - "remarks": "rule_set_311" + "remarks": "rule_set_312" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_kmod", - "remarks": "rule_set_311" + "remarks": "rule_set_312" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - kmod", - "remarks": "rule_set_311" + "remarks": "rule_set_312" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_etc_selinux", - "remarks": "rule_set_312" + "remarks": "rule_set_313" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls (/etc/selinux)", - "remarks": "rule_set_312" + "remarks": "rule_set_313" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_etc_selinux", - "remarks": "rule_set_312" + "remarks": "rule_set_313" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls (/etc/selinux)", - "remarks": "rule_set_312" + "remarks": "rule_set_313" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_immutable", - "remarks": "rule_set_313" + "remarks": "rule_set_314" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Make the auditd Configuration Immutable", - "remarks": "rule_set_313" + "remarks": "rule_set_314" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_immutable", - "remarks": "rule_set_313" + "remarks": "rule_set_314" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Make the auditd Configuration Immutable", - "remarks": "rule_set_313" + "remarks": "rule_set_314" } ], "control-implementations": [ { - "uuid": "90d68a2f-76c7-4be6-84dc-dde771944786", + "uuid": "8579db58-28a7-4e36-a329-9981c8425b4c", "source": "trestle://profiles/rhel10-anssi-enhanced/profile.json", "description": "Control implementation for anssi_bp28_enhanced", "props": [ @@ -15441,7 +15482,7 @@ ], "implemented-requirements": [ { - "uuid": "a6bbaab5-3785-4561-9146-ab881e75a675", + "uuid": "de4d2a90-e983-4275-b712-cde16a4acad2", "control-id": "r1", "description": "This requirement can be checked, but remediation requires manual reinstall of the OS. The content automation cannot really configure the BIOS, but can in some cases, check settings that are visible to the OS. Like for example the NX/DX setting.", "props": [ @@ -15463,7 +15504,7 @@ ] }, { - "uuid": "2fceddfd-6910-4308-958f-90b619fa7393", + "uuid": "063066f5-7265-4e7f-bbda-d42bcbf07a59", "control-id": "r7", "description": "No notes for control-id R7.", "props": [ @@ -15480,7 +15521,7 @@ ] }, { - "uuid": "1ad0432a-cc85-427d-8aae-c2be02600740", + "uuid": "76eeed9b-7049-4387-b7ea-32091a3c73f5", "control-id": "r10", "description": "No notes for control-id R10.", "props": [ @@ -15497,7 +15538,7 @@ ] }, { - "uuid": "19d3d174-0889-460c-bcc6-577bb98a9589", + "uuid": "28d83852-651c-4cf0-b098-05ca57c756c3", "control-id": "r29", "description": "The /boot partition mounted is essential to perform certain administrative actions, for example updating the kernel. Therefore, for better stability, in this requirement only rules to restrict the access to /boot are selected. It is not changed how the /boot is mounted.", "props": [ @@ -15554,7 +15595,7 @@ ] }, { - "uuid": "c0230a79-dc08-43ba-8429-48d5ad51ec9d", + "uuid": "08994cce-2dcd-4dce-adf4-7c78bc5e8f6f", "control-id": "r36", "description": "There are cases of Systemd services which would stop working in case umask would be configured to 0027 for all services. One such example is the Cups service which needs to create sockets which need to be available for all users. Therefore, this part of the requirement can't be automated.", "props": [ @@ -15581,7 +15622,7 @@ ] }, { - "uuid": "a646d707-ab2d-49ab-b760-21a1f8f08a70", + "uuid": "4e157b6a-8651-40a7-b90c-ae34f86c6937", "control-id": "r37", "description": "Other partitioning mechanisms can include chroot and containers and are not contemplated in this requirement.", "props": [ @@ -15598,7 +15639,7 @@ ] }, { - "uuid": "f91b613e-6ff3-49c2-b6b8-224007a0de21", + "uuid": "43950fa1-443b-4871-82e6-fc589e664414", "control-id": "r38", "description": "No notes for control-id R38.", "props": [ @@ -15620,7 +15661,7 @@ ] }, { - "uuid": "94545254-5058-4a1d-acdb-b248104dda5d", + "uuid": "8e936461-33a0-48fe-a7a0-9d73f6989728", "control-id": "r41", "description": "The description for control-id r41.", "props": [ @@ -15633,7 +15674,7 @@ ] }, { - "uuid": "51dfdd0d-1754-4fb0-b37d-6b8b22b2600d", + "uuid": "bd4c0853-e3d4-4405-ab9f-12fc96a25389", "control-id": "r45", "description": "No notes for control-id R45.", "props": [ @@ -15645,7 +15686,7 @@ ] }, { - "uuid": "74391e49-0e12-45ab-a3b7-d4c8c24de357", + "uuid": "337446a0-6ab0-4358-8bdf-91277de3711b", "control-id": "r51", "description": "This concerns two aspects, the first is administrative, and involves prompt installation of secrets or trusted elements by the sysadmin. The second involves removal of any default secret or trusted element configured by the operating system during install process, e.g. default known passwords.", "props": [ @@ -15657,7 +15698,7 @@ ] }, { - "uuid": "16ff2e9b-801e-4ce8-b112-da7e639bc9ac", + "uuid": "37d060e0-fcdb-4c37-8f5b-65623d5c64d5", "control-id": "r57", "description": "The description for control-id r57.", "props": [ @@ -15670,7 +15711,7 @@ ] }, { - "uuid": "e16ce193-e689-44aa-bef7-e9331fe4e7ce", + "uuid": "b76a2e07-d7d9-4823-98d4-8d0b727d11ad", "control-id": "r60", "description": "The description for control-id r60.", "props": [ @@ -15683,7 +15724,7 @@ ] }, { - "uuid": "565c094e-48af-44a3-867f-086f83440114", + "uuid": "da8ea1c3-4adc-401e-a286-7ee7aed15d56", "control-id": "r64", "description": "SELinux policies limit the privileges of services and daemons just to those which are required. The policies should be enough to restrict the services' privileges to its essentials, but the automated content cannot assess whether they are the minimum required for the deployment.", "props": [ @@ -15700,7 +15741,7 @@ ] }, { - "uuid": "2430676c-c3cc-4d70-bae9-33c83af22e58", + "uuid": "2d0cdbd1-5d28-4e2e-bc66-a3c2739e8427", "control-id": "r65", "description": "The description for control-id r65.", "props": [ @@ -15713,7 +15754,7 @@ ] }, { - "uuid": "d61f07fc-0b5d-41db-92e4-9cecfd563e51", + "uuid": "ae597dc5-14e3-46e2-89b9-36c82f022282", "control-id": "r71", "description": "A lot of recommendations and requirements from the DAT-PA-012 document are administrative and hard to automate. The rules selected below address a few of the aspects that can be covered, keep in mind that these configurations should be customized for the systems deployment requirements.", "props": [ @@ -15800,7 +15841,7 @@ ] }, { - "uuid": "a010fd28-82a3-46cb-9da4-2300266cce5f", + "uuid": "15aa8534-67bc-439d-b0be-3f055171677e", "control-id": "r72", "description": "No notes for control-id R72.", "props": [ @@ -15812,7 +15853,7 @@ ] }, { - "uuid": "5e258588-24a7-41da-a553-01bb0e25b1d1", + "uuid": "55bae31d-daef-4322-ac07-8aa81429a082", "control-id": "r73", "description": "No notes for control-id R73.", "props": [ @@ -16104,7 +16145,7 @@ ] }, { - "uuid": "d8320cad-952f-48de-b995-af2f5bfb13ec", + "uuid": "cec9c501-8d41-48e0-80fd-a39b3978e14d", "control-id": "r78", "description": "The description for control-id r78.", "props": [ @@ -16117,7 +16158,7 @@ ] }, { - "uuid": "a203052f-c624-47d8-9f01-478f22fd64ac", + "uuid": "abbd3dc8-235d-4375-aaf1-e784966bfbe4", "control-id": "r2", "description": "The description for control-id r2.", "props": [ @@ -16130,7 +16171,7 @@ ] }, { - "uuid": "5243338b-8fd2-4ecc-a7ca-5f583ba03bb6", + "uuid": "832d27af-9284-4108-868a-6d77a3e83830", "control-id": "r3", "description": "The description for control-id r3.", "props": [ @@ -16143,7 +16184,7 @@ ] }, { - "uuid": "424c165b-d37b-40db-a10d-f82b0ee84256", + "uuid": "d1414a10-a910-44f2-87c9-ea3321ab0edb", "control-id": "r5", "description": "No notes for control-id R5.", "props": [ @@ -16160,7 +16201,7 @@ ] }, { - "uuid": "ded0ccf6-cbf7-4fff-9fc8-a21dfec9c61e", + "uuid": "d2190bdc-cc41-467a-b925-111c347a503d", "control-id": "r8", "description": "No notes for control-id R8.", "props": [ @@ -16232,7 +16273,7 @@ ] }, { - "uuid": "79f2030f-d5f1-46de-bb3d-be01b73ee42b", + "uuid": "9b83c236-b0eb-46ea-817a-feef416ec0c0", "control-id": "r9", "description": "No notes for control-id R9.", "props": [ @@ -16294,7 +16335,7 @@ ] }, { - "uuid": "b1b5f887-d629-4809-90c4-1aa99d925121", + "uuid": "09ad6660-08c9-4be9-b42a-e3d056e6e11e", "control-id": "r11", "description": "No notes for control-id R11.", "props": [ @@ -16311,7 +16352,7 @@ ] }, { - "uuid": "8913e5c4-96a9-4dde-bcde-3976a23e6fce", + "uuid": "8c173d5d-a492-4416-a552-3a21f95e7b34", "control-id": "r12", "description": "No notes for control-id R12.", "props": [ @@ -16438,7 +16479,7 @@ ] }, { - "uuid": "b3b5da4a-ae6c-4bac-8f12-55d027d1bc6c", + "uuid": "ee50c63f-3ae9-4a10-9ac8-2c879e1e6a9f", "control-id": "r13", "description": "When IPv6 is not in use, disable it, otherwise secure the IPv6 stack. This control hardens the IPv6 stack, to disable it use the related rules instead.", "props": [ @@ -16530,7 +16571,7 @@ ] }, { - "uuid": "751e438b-22d2-4cb3-b139-82c663594fab", + "uuid": "01b31687-f4d3-4e70-9d87-d52440b3e743", "control-id": "r14", "description": "The rule for the /proc file system is not implemented", "props": [ @@ -16567,7 +16608,7 @@ ] }, { - "uuid": "ea79ae1f-238d-4103-b62a-05122e97181f", + "uuid": "aebe61dd-cdfd-4f2a-8f4b-67a77f1ad9c4", "control-id": "r28", "description": "No notes for control-id R28.", "props": [ @@ -16699,7 +16740,7 @@ ] }, { - "uuid": "85b467b1-c183-4ccb-bfae-d0cd57b73f67", + "uuid": "6140f146-6476-4a24-b21f-effbb4cbf2a2", "control-id": "r32", "description": "ANSSI doesn't specify the length of the inactivity period, we are choosing 10 minutes as reasonable number.", "props": [ @@ -16721,7 +16762,7 @@ ] }, { - "uuid": "ecfa036a-98be-4978-ae0b-a833bfe9ca5a", + "uuid": "6c854235-4781-4a87-81ec-b5000353d6d3", "control-id": "r33", "description": "By disabling direct root logins proper accountability is ensured. Users will login first, then escalate to privileged (root) access. Change of privilege operations must be based on executables to monitor the activities performed (for example sudo). Nonetheless, the content automation cannot ensure that each administrator was given a nominative administration account separate from his normal user account.", "props": [ @@ -16763,7 +16804,7 @@ ] }, { - "uuid": "8a6f6381-ee94-4482-8b5b-0e5f5bd4508b", + "uuid": "32320720-f1ad-41a1-af62-398fac3c13e8", "control-id": "r34", "description": "The description for control-id r34.", "props": [ @@ -16776,7 +16817,7 @@ ] }, { - "uuid": "ef84bb26-d889-4dca-80db-c706acc5fdf6", + "uuid": "db3bf27f-afe5-4ab8-8f20-83ac04209f00", "control-id": "r35", "description": "The description for control-id r35.", "props": [ @@ -16789,7 +16830,7 @@ ] }, { - "uuid": "bf83b284-396d-4cf5-bbe6-63937879075c", + "uuid": "2b5cfc68-77df-4d08-befa-b3e369a9748d", "control-id": "r39", "description": "No notes for control-id R39.", "props": [ @@ -16826,7 +16867,7 @@ ] }, { - "uuid": "afa21346-2bee-4b5a-8797-98c10d107787", + "uuid": "9b3175d4-91e2-45e2-b4fb-3b344250a1a8", "control-id": "r40", "description": "No notes for control-id R40.", "props": [ @@ -16843,7 +16884,7 @@ ] }, { - "uuid": "53f57e4c-b9e7-4607-b748-06b923720483", + "uuid": "34cb61ff-982c-469e-bf51-7dd14cdc40e3", "control-id": "r42", "description": "No notes for control-id R42.", "props": [ @@ -16860,7 +16901,7 @@ ] }, { - "uuid": "e21cf67b-f35b-4c1f-aa30-e5b6410bf273", + "uuid": "5e7bf3f0-ff48-4329-8ef0-7f81cf39102f", "control-id": "r43", "description": "No notes for control-id R43.", "props": [ @@ -16877,7 +16918,7 @@ ] }, { - "uuid": "741021f3-c2c3-4eae-ab88-1f157828f852", + "uuid": "d2876154-5f65-4b95-9858-5ad9a9f64b9d", "control-id": "r44", "description": "The description for control-id r44.", "props": [ @@ -16890,7 +16931,7 @@ ] }, { - "uuid": "526443a0-f0f0-4467-973e-996b3974d6f3", + "uuid": "3c607b19-5df3-45d1-a69b-ffefaebb0ba6", "control-id": "r50", "description": "No notes for control-id R50.", "props": [ @@ -17257,7 +17298,7 @@ ] }, { - "uuid": "d209451b-4ba3-4605-b441-24dfe2fbf897", + "uuid": "b786ab93-466d-4c78-b6e0-ac354916956f", "control-id": "r52", "description": "The description for control-id r52.", "props": [ @@ -17270,7 +17311,7 @@ ] }, { - "uuid": "2580b2da-331f-49bc-b417-a1d2baa121ca", + "uuid": "c4bf9573-fa94-4635-b6e7-66ae434ef1e6", "control-id": "r55", "description": "The approach of the selected rules is to use and configure pam_namespace module.", "props": [ @@ -17302,7 +17343,7 @@ ] }, { - "uuid": "d33a1937-8516-43b8-aac8-78cec23fbf66", + "uuid": "4846394c-16d6-449e-b954-ca9121e7e081", "control-id": "r63", "description": "The description for control-id r63.", "props": [ @@ -17315,7 +17356,7 @@ ] }, { - "uuid": "bb1f54e7-a807-4c54-82e2-878cd8131d54", + "uuid": "008fd208-d65e-4586-88ad-dfed9a82e2fa", "control-id": "r67", "description": "In systems where remote authentication is handled through sssd service, PAM delegates\nrequests for remote authentication to sssd service through a local Unix socket. The sssd\nservice can use IPA, AD or LDAP as a remote database containing information required for authentication.\nIn case LDAP is configured manually, there are several configuration options which should be chedked.", "props": [ @@ -17337,7 +17378,7 @@ ] }, { - "uuid": "f6e22136-1513-40a6-a49e-6e7b191c092c", + "uuid": "b101b2ce-2735-49ab-965a-283b16a4a393", "control-id": "r69", "description": "The description for control-id r69.", "props": [ @@ -17350,7 +17391,7 @@ ] }, { - "uuid": "73a1cd9f-43ef-404b-a197-74505fe8d644", + "uuid": "27df92fd-6107-42c7-b8e3-a948423e7892", "control-id": "r70", "description": "The description for control-id r70.", "props": [ @@ -17363,7 +17404,7 @@ ] }, { - "uuid": "fac5f6c2-461b-4cc9-ab92-b522dc8684c3", + "uuid": "07ace5d9-d7e5-4223-8583-4c66bc400329", "control-id": "r74", "description": "No notes for control-id R74.", "props": [ @@ -17380,7 +17421,7 @@ ] }, { - "uuid": "a7b87d6f-abeb-4fc4-8e6a-1f73a89033ec", + "uuid": "59a5d77d-66fb-4ccf-9062-730b7c8bb66a", "control-id": "r75", "description": "Only the alias for root user is covered by the rule. The other services cannot be reliably covered, as there is no simple way of determining what is a service account.", "props": [ @@ -17397,7 +17438,7 @@ ] }, { - "uuid": "ad71cee2-f34d-4345-84c5-fe18c589ad64", + "uuid": "08104407-7347-4272-8b0f-1aba7ba06096", "control-id": "r79", "description": "SELinux can provide confinement and monitoring of services, and AIDE provides basic integrity checking. System logs are configured as part of R43. Hardening of particular services should be done on a case by case basis and is not automated by this content.", "props": [ @@ -17424,7 +17465,7 @@ ] }, { - "uuid": "d4a0812e-0f73-4ad9-b439-cb50066a525f", + "uuid": "9312d90d-bb3a-4b92-8900-339ff07439b8", "control-id": "r30", "description": "The description for control-id r30.", "props": [ @@ -17437,7 +17478,7 @@ ] }, { - "uuid": "b3c11069-5b90-415f-9394-4abb7059faf0", + "uuid": "301ff329-bb2d-415d-8064-511d7b7e9486", "control-id": "r31", "description": "The rules selected below establish a general password strength baseline of 100 bits, based on the recommendations of the technical note \"Recommandations relatives à l'authentification multifacteur et aux mots de passe\" (https://cyber.gouv.fr/publications/recommandations-relatives-lauthentification-multifacteur-et-aux-mots-de-passe)\nThe baseline should be reviewed and tailored to the system's use case and needs.", "props": [ @@ -17509,7 +17550,7 @@ ] }, { - "uuid": "f7e867a9-b612-481a-bd5e-631d4e058ab3", + "uuid": "cebe1ec3-9ffc-4ed3-865f-d43d5e112c50", "control-id": "r53", "description": "No notes for control-id R53.", "props": [ @@ -17531,7 +17572,7 @@ ] }, { - "uuid": "177ab3dc-2379-4f9e-a00c-599f110dc5c4", + "uuid": "2ccd3307-b91e-4f6c-a34f-840780fe4cc0", "control-id": "r54", "description": "No notes for control-id R54.", "props": [ @@ -17558,7 +17599,7 @@ ] }, { - "uuid": "293b3786-8e59-46f8-ad51-6635d6b6f607", + "uuid": "2508f3df-1ed8-49d1-91c6-926a97d6780a", "control-id": "r56", "description": "Only programs specifically designed to be used with setuid or setgid bits can have these privilege bits set. This requirement considers apropriate for setuid and setgid bits the binaries that are installed from recognized and authorized repositories (covered in R15). The remediation resets the sticky bit to intended value by vendor/developer, any finding after remediation should be reviewed.", "props": [ @@ -17580,7 +17621,7 @@ ] }, { - "uuid": "bf9e455c-478e-4523-8ae7-3f05f36315b6", + "uuid": "92001064-2df7-41f9-b129-0f271e02a002", "control-id": "r58", "description": "The description for control-id r58.", "props": [ @@ -17593,7 +17634,7 @@ ] }, { - "uuid": "8d9ae63a-0c5f-4b1e-a6f9-78acb8af9a43", + "uuid": "2f7c28ec-941c-427a-93af-cf22b261951a", "control-id": "r59", "description": "It is not trivial to distinguish an official repository from an unofficial one. We cannot draw conclusions from the repo name or URL of the repo (as they can be arbitrary or behind a proxy). One approach to check the origin of installed packages is to check the signature of the packages. If the public key of a repository is not installed, the repo is not trusted.", "props": [ @@ -17621,11 +17662,16 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_redhat_gpgkey_installed" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "package_sequoia-sq_installed" } ] }, { - "uuid": "1d7c699f-5d39-4458-8432-828799b18a2e", + "uuid": "63783a07-10fc-40ff-9252-7a1b4187007d", "control-id": "r61", "description": "Check the vendor CVE feed and configure automatic install of security related updates.", "props": [ @@ -17657,7 +17703,7 @@ ] }, { - "uuid": "ff184f0d-edca-4fb3-8ce6-ce5b82598ec7", + "uuid": "ecc5b1d1-75a0-40e6-9f0e-b7c380738be6", "control-id": "r62", "description": "The description for control-id r62.", "props": [ @@ -17695,7 +17741,7 @@ ] }, { - "uuid": "510658e3-2fc8-49ff-b6dc-439f82c12cc8", + "uuid": "23a1650d-aa7b-433f-b5dd-ea97ff310d6b", "control-id": "r68", "description": "The selection of rules doesn't cover the use of hardware devices to protect the passwords.", "props": [ @@ -17732,7 +17778,7 @@ ] }, { - "uuid": "222cfc17-12d6-4e08-9114-88ade9de2110", + "uuid": "09d379b5-eda6-4a2f-b4ed-42c926cd403a", "control-id": "r80", "description": "The description for control-id r80.", "props": [ diff --git a/component-definitions/rhel10/rhel10-anssi-high/component-definition.json b/component-definitions/rhel10/rhel10-anssi-high/component-definition.json index 10e14566..a9f5c00a 100644 --- a/component-definitions/rhel10/rhel10-anssi-high/component-definition.json +++ b/component-definitions/rhel10/rhel10-anssi-high/component-definition.json @@ -3,8 +3,8 @@ "uuid": "4a0dc350-a979-44df-a37c-3c868514176f", "metadata": { "title": "Component definition for rhel10", - "last-modified": "2025-12-11T18:22:34.505501+00:00", - "version": "1.3", + "last-modified": "2025-12-17T11:10:03.358458+00:00", + "version": "1.4", "oscal-version": "1.1.3" }, "components": [ @@ -383,7 +383,7 @@ { "name": "Parameter_Value_Alternatives_19", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -401,7 +401,7 @@ { "name": "Parameter_Value_Alternatives_20", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -1031,4339 +1031,4351 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_dnf-automatic_installed", + "value": "package_sequoia-sq_installed", "remarks": "rule_set_023" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install dnf-automatic Package", + "value": "Install sequoia-sq Package", "remarks": "rule_set_023" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "timer_dnf-automatic_enabled", + "value": "package_dnf-automatic_installed", "remarks": "rule_set_024" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable dnf-automatic Timer", + "value": "Install dnf-automatic Package", "remarks": "rule_set_024" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dnf-automatic_apply_updates", + "value": "timer_dnf-automatic_enabled", "remarks": "rule_set_025" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure dnf-automatic to Install Available Updates Automatically", + "value": "Enable dnf-automatic Timer", "remarks": "rule_set_025" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dnf-automatic_security_updates_only", + "value": "dnf-automatic_apply_updates", "remarks": "rule_set_026" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure dnf-automatic to Install Only Security Updates", + "value": "Configure dnf-automatic to Install Available Updates Automatically", "remarks": "rule_set_026" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_kea_removed", + "value": "dnf-automatic_security_updates_only", "remarks": "rule_set_027" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall kea Package", + "value": "Configure dnf-automatic to Install Only Security Updates", "remarks": "rule_set_027" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet_removed", + "value": "package_kea_removed", "remarks": "rule_set_028" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove telnet Clients", + "value": "Uninstall kea Package", "remarks": "rule_set_028" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet-server_removed", + "value": "package_telnet_removed", "remarks": "rule_set_029" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall telnet-server Package", + "value": "Remove telnet Clients", "remarks": "rule_set_029" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_tftp_removed", + "value": "package_telnet-server_removed", "remarks": "rule_set_030" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove tftp Daemon", + "value": "Uninstall telnet-server Package", "remarks": "rule_set_030" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_tftp-server_removed", + "value": "package_tftp_removed", "remarks": "rule_set_031" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall tftp-server Package", + "value": "Remove tftp Daemon", "remarks": "rule_set_031" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_systemauth", + "value": "package_tftp-server_removed", "remarks": "rule_set_032" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set PAM Password Hashing Algorithm - system-auth", + "value": "Uninstall tftp-server Package", "remarks": "rule_set_032" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_unix_rounds_system_auth", + "value": "set_password_hashing_algorithm_systemauth", "remarks": "rule_set_033" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set number of Password Hashing Rounds - system-auth", + "value": "Set PAM Password Hashing Algorithm - system-auth", "remarks": "rule_set_033" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_unix_rounds_password_auth", + "value": "accounts_password_pam_unix_rounds_system_auth", "remarks": "rule_set_034" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set number of Password Hashing Rounds - password-auth", + "value": "Set number of Password Hashing Rounds - system-auth", "remarks": "rule_set_034" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_minclass", + "value": "accounts_password_pam_unix_rounds_password_auth", "remarks": "rule_set_035" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", + "value": "Set number of Password Hashing Rounds - password-auth", "remarks": "rule_set_035" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_password", + "value": "accounts_password_pam_minclass", "remarks": "rule_set_036" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Boot Loader Password in grub2", + "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", "remarks": "rule_set_036" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_l1tf_argument", + "value": "grub2_password", "remarks": "rule_set_037" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure L1 Terminal Fault mitigations", + "value": "Set Boot Loader Password in grub2", "remarks": "rule_set_037" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_page_poison_argument", + "value": "grub2_l1tf_argument", "remarks": "rule_set_038" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable page allocator poisoning", + "value": "Configure L1 Terminal Fault mitigations", "remarks": "rule_set_038" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_pti_argument", + "value": "grub2_page_poison_argument", "remarks": "rule_set_039" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Page-Table Isolation (KPTI)", + "value": "Enable page allocator poisoning", "remarks": "rule_set_039" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_slab_nomerge_argument", + "value": "grub2_pti_argument", "remarks": "rule_set_040" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable merging of slabs with similar size", + "value": "Enable Kernel Page-Table Isolation (KPTI)", "remarks": "rule_set_040" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_slub_debug_argument", + "value": "grub2_slab_nomerge_argument", "remarks": "rule_set_041" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable SLUB/SLAB allocator poisoning", + "value": "Disable merging of slabs with similar size", "remarks": "rule_set_041" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_spec_store_bypass_disable_argument", + "value": "grub2_slub_debug_argument", "remarks": "rule_set_042" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Speculative Store Bypass Mitigation", + "value": "Enable SLUB/SLAB allocator poisoning", "remarks": "rule_set_042" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_spectre_v2_argument", + "value": "grub2_spec_store_bypass_disable_argument", "remarks": "rule_set_043" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enforce Spectre v2 mitigation", + "value": "Configure Speculative Store Bypass Mitigation", "remarks": "rule_set_043" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_mds_argument", + "value": "grub2_spectre_v2_argument", "remarks": "rule_set_044" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Microarchitectural Data Sampling mitigation", + "value": "Enforce Spectre v2 mitigation", "remarks": "rule_set_044" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_mce_argument", + "value": "grub2_mds_argument", "remarks": "rule_set_045" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Force kernel panic on uncorrected MCEs", + "value": "Configure Microarchitectural Data Sampling mitigation", "remarks": "rule_set_045" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_page_alloc_shuffle_argument", + "value": "grub2_mce_argument", "remarks": "rule_set_046" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable randomization of the page allocator", + "value": "Force kernel panic on uncorrected MCEs", "remarks": "rule_set_046" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_rng_core_default_quality_argument", + "value": "grub2_page_alloc_shuffle_argument", "remarks": "rule_set_047" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure the confidence in TPM for entropy", + "value": "Enable randomization of the page allocator", "remarks": "rule_set_047" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_vm_mmap_min_addr", + "value": "grub2_rng_core_default_quality_argument", "remarks": "rule_set_048" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Prevent applications from mapping low portion of virtual memory", + "value": "Configure the confidence in TPM for entropy", "remarks": "rule_set_048" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_dmesg_restrict", + "value": "sysctl_vm_mmap_min_addr", "remarks": "rule_set_049" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict Access to Kernel Message Buffer", + "value": "Prevent applications from mapping low portion of virtual memory", "remarks": "rule_set_049" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_kptr_restrict", + "value": "sysctl_kernel_dmesg_restrict", "remarks": "rule_set_050" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict Exposed Kernel Pointer Addresses Access", + "value": "Restrict Access to Kernel Message Buffer", "remarks": "rule_set_050" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_pid_max", + "value": "sysctl_kernel_kptr_restrict", "remarks": "rule_set_051" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure maximum number of process identifiers", + "value": "Restrict Exposed Kernel Pointer Addresses Access", "remarks": "rule_set_051" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_perf_event_max_sample_rate", + "value": "sysctl_kernel_pid_max", "remarks": "rule_set_052" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Limit sampling frequency of the Perf system", + "value": "Configure maximum number of process identifiers", "remarks": "rule_set_052" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_perf_cpu_time_max_percent", + "value": "sysctl_kernel_perf_event_max_sample_rate", "remarks": "rule_set_053" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Limit CPU consumption of the Perf system", + "value": "Limit sampling frequency of the Perf system", "remarks": "rule_set_053" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_perf_event_paranoid", + "value": "sysctl_kernel_perf_cpu_time_max_percent", "remarks": "rule_set_054" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disallow kernel profiling by unprivileged users", + "value": "Limit CPU consumption of the Perf system", "remarks": "rule_set_054" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_randomize_va_space", + "value": "sysctl_kernel_perf_event_paranoid", "remarks": "rule_set_055" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Randomized Layout of Virtual Address Space", + "value": "Disallow kernel profiling by unprivileged users", "remarks": "rule_set_055" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_sysrq", + "value": "sysctl_kernel_randomize_va_space", "remarks": "rule_set_056" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disallow magic SysRq key", + "value": "Enable Randomized Layout of Virtual Address Space", "remarks": "rule_set_056" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_unprivileged_bpf_disabled", + "value": "sysctl_kernel_sysrq", "remarks": "rule_set_057" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Access to Network bpf() Syscall From Unprivileged Processes", + "value": "Disallow magic SysRq key", "remarks": "rule_set_057" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_panic_on_oops", + "value": "sysctl_kernel_unprivileged_bpf_disabled", "remarks": "rule_set_058" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Kernel panic on oops", + "value": "Disable Access to Network bpf() Syscall From Unprivileged Processes", "remarks": "rule_set_058" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_yama_ptrace_scope", + "value": "sysctl_kernel_panic_on_oops", "remarks": "rule_set_059" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict usage of ptrace to descendant processes", + "value": "Kernel panic on oops", "remarks": "rule_set_059" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_core_bpf_jit_harden", + "value": "sysctl_kernel_yama_ptrace_scope", "remarks": "rule_set_060" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Harden the operation of the BPF just-in-time compiler", + "value": "Restrict usage of ptrace to descendant processes", "remarks": "rule_set_060" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_ip_forward", + "value": "sysctl_net_core_bpf_jit_harden", "remarks": "rule_set_061" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for IP Forwarding on IPv4 Interfaces", + "value": "Harden the operation of the BPF just-in-time compiler", "remarks": "rule_set_061" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_accept_local", + "value": "sysctl_net_ipv4_ip_forward", "remarks": "rule_set_062" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Accepting Packets Routed Between Local Interfaces", + "value": "Disable Kernel Parameter for IP Forwarding on IPv4 Interfaces", "remarks": "rule_set_062" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_accept_redirects", + "value": "sysctl_net_ipv4_conf_all_accept_local", "remarks": "rule_set_063" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Accepting ICMP Redirects for All IPv4 Interfaces", + "value": "Disable Accepting Packets Routed Between Local Interfaces", "remarks": "rule_set_063" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_accept_redirects", + "value": "sysctl_net_ipv4_conf_all_accept_redirects", "remarks": "rule_set_064" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv4 Interfaces", + "value": "Disable Accepting ICMP Redirects for All IPv4 Interfaces", "remarks": "rule_set_064" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_secure_redirects", + "value": "sysctl_net_ipv4_conf_default_accept_redirects", "remarks": "rule_set_065" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Accepting Secure ICMP Redirects on all IPv4 Interfaces", + "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv4 Interfaces", "remarks": "rule_set_065" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_secure_redirects", + "value": "sysctl_net_ipv4_conf_all_secure_redirects", "remarks": "rule_set_066" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Kernel Parameter for Accepting Secure Redirects By Default", + "value": "Disable Kernel Parameter for Accepting Secure ICMP Redirects on all IPv4 Interfaces", "remarks": "rule_set_066" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_shared_media", + "value": "sysctl_net_ipv4_conf_default_secure_redirects", "remarks": "rule_set_067" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Sending and Accepting Shared Media Redirects for All IPv4 Interfaces", + "value": "Configure Kernel Parameter for Accepting Secure Redirects By Default", "remarks": "rule_set_067" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_shared_media", + "value": "sysctl_net_ipv4_conf_all_shared_media", "remarks": "rule_set_068" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Sending and Accepting Shared Media Redirects by Default", + "value": "Configure Sending and Accepting Shared Media Redirects for All IPv4 Interfaces", "remarks": "rule_set_068" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_accept_source_route", + "value": "sysctl_net_ipv4_conf_default_shared_media", "remarks": "rule_set_069" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces", + "value": "Configure Sending and Accepting Shared Media Redirects by Default", "remarks": "rule_set_069" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_accept_source_route", + "value": "sysctl_net_ipv4_conf_all_accept_source_route", "remarks": "rule_set_070" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv4 Interfaces by Default", + "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces", "remarks": "rule_set_070" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_arp_filter", + "value": "sysctl_net_ipv4_conf_default_accept_source_route", "remarks": "rule_set_071" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure ARP filtering for All IPv4 Interfaces", + "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv4 Interfaces by Default", "remarks": "rule_set_071" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_arp_ignore", + "value": "sysctl_net_ipv4_conf_all_arp_filter", "remarks": "rule_set_072" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Response Mode of ARP Requests for All IPv4 Interfaces", + "value": "Configure ARP filtering for All IPv4 Interfaces", "remarks": "rule_set_072" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_route_localnet", + "value": "sysctl_net_ipv4_conf_all_arp_ignore", "remarks": "rule_set_073" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Prevent Routing External Traffic to Local Loopback on All IPv4 Interfaces", + "value": "Configure Response Mode of ARP Requests for All IPv4 Interfaces", "remarks": "rule_set_073" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_drop_gratuitous_arp", + "value": "sysctl_net_ipv4_conf_all_route_localnet", "remarks": "rule_set_074" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Drop Gratuitous ARP frames on All IPv4 Interfaces", + "value": "Prevent Routing External Traffic to Local Loopback on All IPv4 Interfaces", "remarks": "rule_set_074" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_rp_filter", + "value": "sysctl_net_ipv4_conf_all_drop_gratuitous_arp", "remarks": "rule_set_075" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces", + "value": "Drop Gratuitous ARP frames on All IPv4 Interfaces", "remarks": "rule_set_075" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_rp_filter", + "value": "sysctl_net_ipv4_conf_all_rp_filter", "remarks": "rule_set_076" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces by Default", + "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces", "remarks": "rule_set_076" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_send_redirects", + "value": "sysctl_net_ipv4_conf_default_rp_filter", "remarks": "rule_set_077" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces", + "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces by Default", "remarks": "rule_set_077" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_send_redirects", + "value": "sysctl_net_ipv4_conf_all_send_redirects", "remarks": "rule_set_078" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces by Default", + "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces", "remarks": "rule_set_078" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses", + "value": "sysctl_net_ipv4_conf_default_send_redirects", "remarks": "rule_set_079" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Ignore Bogus ICMP Error Responses on IPv4 Interfaces", + "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces by Default", "remarks": "rule_set_079" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_ip_local_port_range", + "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses", "remarks": "rule_set_080" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Kernel Parameter to Increase Local Port Range", + "value": "Enable Kernel Parameter to Ignore Bogus ICMP Error Responses on IPv4 Interfaces", "remarks": "rule_set_080" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_tcp_rfc1337", + "value": "sysctl_net_ipv4_ip_local_port_range", "remarks": "rule_set_081" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Use TCP RFC 1337 on IPv4 Interfaces", + "value": "Set Kernel Parameter to Increase Local Port Range", "remarks": "rule_set_081" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_tcp_syncookies", + "value": "sysctl_net_ipv4_tcp_rfc1337", "remarks": "rule_set_082" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Use TCP Syncookies on Network Interfaces", + "value": "Enable Kernel Parameter to Use TCP RFC 1337 on IPv4 Interfaces", "remarks": "rule_set_082" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_router_solicitations", + "value": "sysctl_net_ipv4_tcp_syncookies", "remarks": "rule_set_083" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Denying Router Solicitations on All IPv6 Interfaces", + "value": "Enable Kernel Parameter to Use TCP Syncookies on Network Interfaces", "remarks": "rule_set_083" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_router_solicitations", + "value": "sysctl_net_ipv6_conf_all_router_solicitations", "remarks": "rule_set_084" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Denying Router Solicitations on All IPv6 Interfaces By Default", + "value": "Configure Denying Router Solicitations on All IPv6 Interfaces", "remarks": "rule_set_084" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_accept_ra_rtr_pref", + "value": "sysctl_net_ipv6_conf_default_router_solicitations", "remarks": "rule_set_085" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Accepting Router Preference in Router Advertisements on All IPv6 Interfaces", + "value": "Configure Denying Router Solicitations on All IPv6 Interfaces By Default", "remarks": "rule_set_085" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_accept_ra_rtr_pref", + "value": "sysctl_net_ipv6_conf_all_accept_ra_rtr_pref", "remarks": "rule_set_086" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Accepting Router Preference in Router Advertisements on All IPv6 Interfaces By Default", + "value": "Configure Accepting Router Preference in Router Advertisements on All IPv6 Interfaces", "remarks": "rule_set_086" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_accept_ra_pinfo", + "value": "sysctl_net_ipv6_conf_default_accept_ra_rtr_pref", "remarks": "rule_set_087" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Accepting Prefix Information in Router Advertisements on All IPv6 Interfaces", + "value": "Configure Accepting Router Preference in Router Advertisements on All IPv6 Interfaces By Default", "remarks": "rule_set_087" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_accept_ra_pinfo", + "value": "sysctl_net_ipv6_conf_all_accept_ra_pinfo", "remarks": "rule_set_088" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Accepting Prefix Information in Router Advertisements on All IPv6 Interfaces By Default", + "value": "Configure Accepting Prefix Information in Router Advertisements on All IPv6 Interfaces", "remarks": "rule_set_088" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_accept_ra_defrtr", + "value": "sysctl_net_ipv6_conf_default_accept_ra_pinfo", "remarks": "rule_set_089" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Accepting Default Router in Router Advertisements on All IPv6 Interfaces", + "value": "Configure Accepting Prefix Information in Router Advertisements on All IPv6 Interfaces By Default", "remarks": "rule_set_089" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_accept_ra_defrtr", + "value": "sysctl_net_ipv6_conf_all_accept_ra_defrtr", "remarks": "rule_set_090" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Accepting Default Router in Router Advertisements on All IPv6 Interfaces By Default", + "value": "Configure Accepting Default Router in Router Advertisements on All IPv6 Interfaces", "remarks": "rule_set_090" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_autoconf", + "value": "sysctl_net_ipv6_conf_default_accept_ra_defrtr", "remarks": "rule_set_091" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Auto Configuration on All IPv6 Interfaces", + "value": "Configure Accepting Default Router in Router Advertisements on All IPv6 Interfaces By Default", "remarks": "rule_set_091" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_autoconf", + "value": "sysctl_net_ipv6_conf_all_autoconf", "remarks": "rule_set_092" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Auto Configuration on All IPv6 Interfaces By Default", + "value": "Configure Auto Configuration on All IPv6 Interfaces", "remarks": "rule_set_092" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_accept_redirects", + "value": "sysctl_net_ipv6_conf_default_autoconf", "remarks": "rule_set_093" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Accepting ICMP Redirects for All IPv6 Interfaces", + "value": "Configure Auto Configuration on All IPv6 Interfaces By Default", "remarks": "rule_set_093" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_accept_redirects", + "value": "sysctl_net_ipv6_conf_all_accept_redirects", "remarks": "rule_set_094" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv6 Interfaces", + "value": "Disable Accepting ICMP Redirects for All IPv6 Interfaces", "remarks": "rule_set_094" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_accept_source_route", + "value": "sysctl_net_ipv6_conf_default_accept_redirects", "remarks": "rule_set_095" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv6 Interfaces", + "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv6 Interfaces", "remarks": "rule_set_095" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_accept_source_route", + "value": "sysctl_net_ipv6_conf_all_accept_source_route", "remarks": "rule_set_096" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv6 Interfaces by Default", + "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv6 Interfaces", "remarks": "rule_set_096" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_max_addresses", + "value": "sysctl_net_ipv6_conf_default_accept_source_route", "remarks": "rule_set_097" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Maximum Number of Autoconfigured Addresses on All IPv6 Interfaces", + "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv6 Interfaces by Default", "remarks": "rule_set_097" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_max_addresses", + "value": "sysctl_net_ipv6_conf_all_max_addresses", "remarks": "rule_set_098" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Maximum Number of Autoconfigured Addresses on All IPv6 Interfaces By Default", + "value": "Configure Maximum Number of Autoconfigured Addresses on All IPv6 Interfaces", "remarks": "rule_set_098" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_suid_dumpable", + "value": "sysctl_net_ipv6_conf_default_max_addresses", "remarks": "rule_set_099" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Core Dumps for SUID programs", + "value": "Configure Maximum Number of Autoconfigured Addresses on All IPv6 Interfaces By Default", "remarks": "rule_set_099" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_protected_fifos", + "value": "sysctl_fs_suid_dumpable", "remarks": "rule_set_100" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Enforce DAC on FIFOs", + "value": "Disable Core Dumps for SUID programs", "remarks": "rule_set_100" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_protected_regular", + "value": "sysctl_fs_protected_fifos", "remarks": "rule_set_101" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Enforce DAC on Regular files", + "value": "Enable Kernel Parameter to Enforce DAC on FIFOs", "remarks": "rule_set_101" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_protected_symlinks", + "value": "sysctl_fs_protected_regular", "remarks": "rule_set_102" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", + "value": "Enable Kernel Parameter to Enforce DAC on Regular files", "remarks": "rule_set_102" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_protected_hardlinks", + "value": "sysctl_fs_protected_symlinks", "remarks": "rule_set_103" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Enforce DAC on Hardlinks", + "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", "remarks": "rule_set_103" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_nodev_nonroot_local_partitions", + "value": "sysctl_fs_protected_hardlinks", "remarks": "rule_set_104" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add nodev Option to Non-Root Local Partitions", + "value": "Enable Kernel Parameter to Enforce DAC on Hardlinks", "remarks": "rule_set_104" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "partition_for_boot", + "value": "mount_option_nodev_nonroot_local_partitions", "remarks": "rule_set_105" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure /boot Located On Separate Partition", + "value": "Add nodev Option to Non-Root Local Partitions", "remarks": "rule_set_105" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_boot_nosuid", + "value": "partition_for_boot", "remarks": "rule_set_106" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add nosuid Option to /boot", + "value": "Ensure /boot Located On Separate Partition", "remarks": "rule_set_106" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_boot_noexec", + "value": "mount_option_boot_nosuid", "remarks": "rule_set_107" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add noexec Option to /boot", + "value": "Add nosuid Option to /boot", "remarks": "rule_set_107" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "partition_for_opt", + "value": "mount_option_boot_noexec", "remarks": "rule_set_108" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure /opt Located On Separate Partition", + "value": "Add noexec Option to /boot", "remarks": "rule_set_108" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_opt_nosuid", + "value": "partition_for_opt", "remarks": "rule_set_109" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add nosuid Option to /opt", + "value": "Ensure /opt Located On Separate Partition", "remarks": "rule_set_109" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "systemd_tmp_mount_enabled", + "value": "mount_option_opt_nosuid", "remarks": "rule_set_110" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure tmp.mount Unit Is Enabled", + "value": "Add nosuid Option to /opt", "remarks": "rule_set_110" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_tmp_nosuid", + "value": "systemd_tmp_mount_enabled", "remarks": "rule_set_111" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add nosuid Option to /tmp", + "value": "Ensure tmp.mount Unit Is Enabled", "remarks": "rule_set_111" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_tmp_noexec", + "value": "mount_option_tmp_nosuid", "remarks": "rule_set_112" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add noexec Option to /tmp", + "value": "Add nosuid Option to /tmp", "remarks": "rule_set_112" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "partition_for_srv", + "value": "mount_option_tmp_noexec", "remarks": "rule_set_113" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure /srv Located On Separate Partition", + "value": "Add noexec Option to /tmp", "remarks": "rule_set_113" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_srv_nosuid", + "value": "partition_for_srv", "remarks": "rule_set_114" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add nosuid Option to /srv", + "value": "Ensure /srv Located On Separate Partition", "remarks": "rule_set_114" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "partition_for_home", + "value": "mount_option_srv_nosuid", "remarks": "rule_set_115" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure /home Located On Separate Partition", + "value": "Add nosuid Option to /srv", "remarks": "rule_set_115" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_home_nosuid", + "value": "partition_for_home", "remarks": "rule_set_116" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add nosuid Option to /home", + "value": "Ensure /home Located On Separate Partition", "remarks": "rule_set_116" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_home_noexec", + "value": "mount_option_home_nosuid", "remarks": "rule_set_117" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add noexec Option to /home", + "value": "Add nosuid Option to /home", "remarks": "rule_set_117" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "partition_for_usr", + "value": "mount_option_home_noexec", "remarks": "rule_set_118" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure /usr Located On Separate Partition", + "value": "Add noexec Option to /home", "remarks": "rule_set_118" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "partition_for_var", + "value": "partition_for_usr", "remarks": "rule_set_119" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure /var Located On Separate Partition", + "value": "Ensure /usr Located On Separate Partition", "remarks": "rule_set_119" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_var_nosuid", + "value": "partition_for_var", "remarks": "rule_set_120" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add nosuid Option to /var", + "value": "Ensure /var Located On Separate Partition", "remarks": "rule_set_120" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_var_noexec", + "value": "mount_option_var_nosuid", "remarks": "rule_set_121" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add noexec Option to /var", + "value": "Add nosuid Option to /var", "remarks": "rule_set_121" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "partition_for_var_log", + "value": "mount_option_var_noexec", "remarks": "rule_set_122" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure /var/log Located On Separate Partition", + "value": "Add noexec Option to /var", "remarks": "rule_set_122" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_var_log_noexec", + "value": "partition_for_var_log", "remarks": "rule_set_123" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add noexec Option to /var/log", + "value": "Ensure /var/log Located On Separate Partition", "remarks": "rule_set_123" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_var_log_nosuid", + "value": "mount_option_var_log_noexec", "remarks": "rule_set_124" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add nosuid Option to /var/log", + "value": "Add noexec Option to /var/log", "remarks": "rule_set_124" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "partition_for_var_tmp", + "value": "mount_option_var_log_nosuid", "remarks": "rule_set_125" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure /var/tmp Located On Separate Partition", + "value": "Add nosuid Option to /var/log", "remarks": "rule_set_125" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_var_tmp_nosuid", + "value": "partition_for_var_tmp", "remarks": "rule_set_126" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add nosuid Option to /var/tmp", + "value": "Ensure /var/tmp Located On Separate Partition", "remarks": "rule_set_126" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_var_tmp_noexec", + "value": "mount_option_var_tmp_nosuid", "remarks": "rule_set_127" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add noexec Option to /var/tmp", + "value": "Add nosuid Option to /var/tmp", "remarks": "rule_set_127" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "logind_session_timeout", + "value": "mount_option_var_tmp_noexec", "remarks": "rule_set_128" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Logind to terminate idle sessions after certain time of inactivity", + "value": "Add noexec Option to /var/tmp", "remarks": "rule_set_128" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_tmout", + "value": "logind_session_timeout", "remarks": "rule_set_129" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Interactive Session Timeout", + "value": "Configure Logind to terminate idle sessions after certain time of inactivity", "remarks": "rule_set_129" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_direct_root_logins", + "value": "accounts_tmout", "remarks": "rule_set_130" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Direct root Logins Not Allowed", + "value": "Set Interactive Session Timeout", "remarks": "rule_set_130" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_root_login", + "value": "no_direct_root_logins", "remarks": "rule_set_131" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Root Login", + "value": "Direct root Logins Not Allowed", "remarks": "rule_set_131" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_sudo_installed", + "value": "sshd_disable_root_login", "remarks": "rule_set_132" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install sudo Package", + "value": "Disable SSH Root Login", "remarks": "rule_set_132" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_privileged_commands_sudo", + "value": "package_sudo_installed", "remarks": "rule_set_133" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure auditd Collects Information on the Use of Privileged Commands - sudo", + "value": "Install sudo Package", "remarks": "rule_set_133" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_auditd_enabled", + "value": "audit_rules_privileged_commands_sudo", "remarks": "rule_set_134" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable auditd Service", + "value": "Ensure auditd Collects Information on the Use of Privileged Commands - sudo", "remarks": "rule_set_134" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_audit_installed", + "value": "service_auditd_enabled", "remarks": "rule_set_135" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the audit Subsystem is Installed", + "value": "Enable auditd Service", "remarks": "rule_set_135" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sudo_add_noexec", + "value": "package_audit_installed", "remarks": "rule_set_136" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Privileged Escalated Commands Cannot Execute Other Commands - sudo NOEXEC", + "value": "Ensure the audit Subsystem is Installed", "remarks": "rule_set_136" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sudo_add_requiretty", + "value": "sudo_add_noexec", "remarks": "rule_set_137" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo requiretty", + "value": "Ensure Privileged Escalated Commands Cannot Execute Other Commands - sudo NOEXEC", "remarks": "rule_set_137" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sudo_add_use_pty", + "value": "sudo_add_requiretty", "remarks": "rule_set_138" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo use_pty", + "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo requiretty", "remarks": "rule_set_138" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sudo_add_ignore_dot", + "value": "sudo_add_use_pty", "remarks": "rule_set_139" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure sudo Ignores Commands In Current Dir - sudo ignore_dot", + "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo use_pty", "remarks": "rule_set_139" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sudo_add_env_reset", + "value": "sudo_add_ignore_dot", "remarks": "rule_set_140" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure sudo Runs In A Minimal Environment - sudo env_reset", + "value": "Ensure sudo Ignores Commands In Current Dir - sudo ignore_dot", "remarks": "rule_set_140" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sudoers_no_root_target", + "value": "sudo_add_env_reset", "remarks": "rule_set_141" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Don't target root user in the sudoers file", + "value": "Ensure sudo Runs In A Minimal Environment - sudo env_reset", "remarks": "rule_set_141" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sudoers_no_command_negation", + "value": "sudoers_no_root_target", "remarks": "rule_set_142" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Don't define allowed commands in sudoers by means of exclusion", + "value": "Don't target root user in the sudoers file", "remarks": "rule_set_142" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sudoers_explicit_command_args", + "value": "sudoers_no_command_negation", "remarks": "rule_set_143" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Explicit arguments in sudo specifications", + "value": "Don't define allowed commands in sudoers by means of exclusion", "remarks": "rule_set_143" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_shadow", + "value": "sudoers_explicit_command_args", "remarks": "rule_set_144" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns shadow File", + "value": "Explicit arguments in sudo specifications", "remarks": "rule_set_144" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_shadow", + "value": "file_owner_etc_shadow", "remarks": "rule_set_145" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns shadow File", + "value": "Verify User Who Owns shadow File", "remarks": "rule_set_145" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_shadow", + "value": "file_groupowner_etc_shadow", "remarks": "rule_set_146" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on shadow File", + "value": "Verify Group Who Owns shadow File", "remarks": "rule_set_146" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_gshadow", + "value": "file_permissions_etc_shadow", "remarks": "rule_set_147" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns gshadow File", + "value": "Verify Permissions on shadow File", "remarks": "rule_set_147" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_gshadow", + "value": "file_owner_etc_gshadow", "remarks": "rule_set_148" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns gshadow File", + "value": "Verify User Who Owns gshadow File", "remarks": "rule_set_148" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_gshadow", + "value": "file_groupowner_etc_gshadow", "remarks": "rule_set_149" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on gshadow File", + "value": "Verify Group Who Owns gshadow File", "remarks": "rule_set_149" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_passwd", + "value": "file_permissions_etc_gshadow", "remarks": "rule_set_150" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns passwd File", + "value": "Verify Permissions on gshadow File", "remarks": "rule_set_150" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_passwd", + "value": "file_owner_etc_passwd", + "remarks": "rule_set_151" + }, + { + "name": "Rule_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Verify User Who Owns passwd File", "remarks": "rule_set_151" }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "file_groupowner_etc_passwd", + "remarks": "rule_set_152" + }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns passwd File", - "remarks": "rule_set_151" + "remarks": "rule_set_152" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_passwd", - "remarks": "rule_set_152" + "remarks": "rule_set_153" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on passwd File", - "remarks": "rule_set_152" + "remarks": "rule_set_153" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_group", - "remarks": "rule_set_153" + "remarks": "rule_set_154" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns group File", - "remarks": "rule_set_153" + "remarks": "rule_set_154" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_group", - "remarks": "rule_set_154" + "remarks": "rule_set_155" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns group File", - "remarks": "rule_set_154" + "remarks": "rule_set_155" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_group", - "remarks": "rule_set_155" + "remarks": "rule_set_156" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on group File", - "remarks": "rule_set_155" + "remarks": "rule_set_156" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shells", - "remarks": "rule_set_156" + "remarks": "rule_set_157" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Who Owns /etc/shells File", - "remarks": "rule_set_156" + "remarks": "rule_set_157" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shells", - "remarks": "rule_set_157" + "remarks": "rule_set_158" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/shells File", - "remarks": "rule_set_157" + "remarks": "rule_set_158" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shells", - "remarks": "rule_set_158" + "remarks": "rule_set_159" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/shells File", - "remarks": "rule_set_158" + "remarks": "rule_set_159" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_159" + "remarks": "rule_set_160" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_159" + "remarks": "rule_set_160" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_160" + "remarks": "rule_set_161" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_160" + "remarks": "rule_set_161" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_users_home_files_groupownership", - "remarks": "rule_set_161" + "remarks": "rule_set_162" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All User Files and Directories In The Home Directory Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_161" + "remarks": "rule_set_162" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_users_home_files_ownership", - "remarks": "rule_set_162" + "remarks": "rule_set_163" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All User Files and Directories In The Home Directory Must Have a Valid Owner", - "remarks": "rule_set_162" + "remarks": "rule_set_163" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_users_home_files_permissions", - "remarks": "rule_set_163" + "remarks": "rule_set_164" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All User Files and Directories In The Home Directory Must Have Mode 0750 Or Less Permissive", - "remarks": "rule_set_163" + "remarks": "rule_set_164" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_164" + "remarks": "rule_set_165" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_164" + "remarks": "rule_set_165" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_system_commands_group_root_owned", - "remarks": "rule_set_165" + "remarks": "rule_set_166" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that system commands directories have root as a group owner", - "remarks": "rule_set_165" + "remarks": "rule_set_166" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_system_commands_root_owned", - "remarks": "rule_set_166" + "remarks": "rule_set_167" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that system commands directories have root ownership", - "remarks": "rule_set_166" + "remarks": "rule_set_167" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_system_commands_dirs", - "remarks": "rule_set_167" + "remarks": "rule_set_168" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that system commands files are group owned by root or a system account", - "remarks": "rule_set_167" + "remarks": "rule_set_168" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_binary_dirs", - "remarks": "rule_set_168" + "remarks": "rule_set_169" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that System Executables Have Root Ownership", - "remarks": "rule_set_168" + "remarks": "rule_set_169" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_binary_dirs", - "remarks": "rule_set_169" + "remarks": "rule_set_170" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that System Executables Have Restrictive Permissions", - "remarks": "rule_set_169" + "remarks": "rule_set_170" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_private_key", - "remarks": "rule_set_170" + "remarks": "rule_set_171" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_170" + "remarks": "rule_set_171" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_private_key", - "remarks": "rule_set_171" + "remarks": "rule_set_172" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_171" + "remarks": "rule_set_172" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_private_key", - "remarks": "rule_set_172" + "remarks": "rule_set_173" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Private *_key Key Files", - "remarks": "rule_set_172" + "remarks": "rule_set_173" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_pub_key", - "remarks": "rule_set_173" + "remarks": "rule_set_174" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_173" + "remarks": "rule_set_174" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_pub_key", - "remarks": "rule_set_174" + "remarks": "rule_set_175" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_174" + "remarks": "rule_set_175" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_pub_key", - "remarks": "rule_set_175" + "remarks": "rule_set_176" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Public *.pub Key Files", - "remarks": "rule_set_175" + "remarks": "rule_set_176" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_config", - "remarks": "rule_set_176" + "remarks": "rule_set_177" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server config file", - "remarks": "rule_set_176" + "remarks": "rule_set_177" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_config", - "remarks": "rule_set_177" + "remarks": "rule_set_178" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server config file", - "remarks": "rule_set_177" + "remarks": "rule_set_178" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_config", - "remarks": "rule_set_178" + "remarks": "rule_set_179" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server config file", - "remarks": "rule_set_178" + "remarks": "rule_set_179" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_etc_selinux", - "remarks": "rule_set_179" + "remarks": "rule_set_180" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/selinux Directory", - "remarks": "rule_set_179" + "remarks": "rule_set_180" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_selinux", - "remarks": "rule_set_180" + "remarks": "rule_set_181" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/selinux Directory", - "remarks": "rule_set_180" + "remarks": "rule_set_181" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_selinux", - "remarks": "rule_set_181" + "remarks": "rule_set_182" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/selinux Directory", - "remarks": "rule_set_181" + "remarks": "rule_set_182" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_sestatus_conf", - "remarks": "rule_set_182" + "remarks": "rule_set_183" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/sestatus.conf File", - "remarks": "rule_set_182" + "remarks": "rule_set_183" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_sestatus_conf", - "remarks": "rule_set_183" + "remarks": "rule_set_184" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/sestatus.conf File", - "remarks": "rule_set_183" + "remarks": "rule_set_184" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_sestatus_conf", - "remarks": "rule_set_184" + "remarks": "rule_set_185" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/sestatus.conf File", - "remarks": "rule_set_184" + "remarks": "rule_set_185" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_etc_ipsecd", - "remarks": "rule_set_185" + "remarks": "rule_set_186" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/ipsec.d Directory", - "remarks": "rule_set_185" + "remarks": "rule_set_186" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_ipsecd", - "remarks": "rule_set_186" + "remarks": "rule_set_187" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/ipsec.d Directory", - "remarks": "rule_set_186" + "remarks": "rule_set_187" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_ipsecd", - "remarks": "rule_set_187" + "remarks": "rule_set_188" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/ipsec.d Directory", - "remarks": "rule_set_187" + "remarks": "rule_set_188" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_ipsec_conf", - "remarks": "rule_set_188" + "remarks": "rule_set_189" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/ipsec.conf File", - "remarks": "rule_set_188" + "remarks": "rule_set_189" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_ipsec_conf", - "remarks": "rule_set_189" + "remarks": "rule_set_190" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/ipsec.conf File", - "remarks": "rule_set_189" + "remarks": "rule_set_190" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_ipsec_conf", - "remarks": "rule_set_190" + "remarks": "rule_set_191" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/ipsec.conf File", - "remarks": "rule_set_190" + "remarks": "rule_set_191" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_ipsec_secrets", - "remarks": "rule_set_191" + "remarks": "rule_set_192" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/ipsec.secrets File", - "remarks": "rule_set_191" + "remarks": "rule_set_192" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_ipsec_secrets", - "remarks": "rule_set_192" + "remarks": "rule_set_193" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/ipsec.secrets File", - "remarks": "rule_set_192" + "remarks": "rule_set_193" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_ipsec_secrets", - "remarks": "rule_set_193" + "remarks": "rule_set_194" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/ipsec.secrets File", - "remarks": "rule_set_193" + "remarks": "rule_set_194" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_etc_iptables", - "remarks": "rule_set_194" + "remarks": "rule_set_195" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/iptables Directory", - "remarks": "rule_set_194" + "remarks": "rule_set_195" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_iptables", - "remarks": "rule_set_195" + "remarks": "rule_set_196" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/iptables Directory", - "remarks": "rule_set_195" + "remarks": "rule_set_196" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_iptables", - "remarks": "rule_set_196" + "remarks": "rule_set_197" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/iptables Directory", - "remarks": "rule_set_196" + "remarks": "rule_set_197" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_etc_nftables", - "remarks": "rule_set_197" + "remarks": "rule_set_198" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/nftables Directory", - "remarks": "rule_set_197" + "remarks": "rule_set_198" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_nftables", - "remarks": "rule_set_198" + "remarks": "rule_set_199" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/nftables Directory", - "remarks": "rule_set_198" + "remarks": "rule_set_199" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_nftables", - "remarks": "rule_set_199" + "remarks": "rule_set_200" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/nftables Directory", - "remarks": "rule_set_199" + "remarks": "rule_set_200" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_etc_sysctld", - "remarks": "rule_set_200" + "remarks": "rule_set_201" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/sysctl.d Directory", - "remarks": "rule_set_200" + "remarks": "rule_set_201" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_sysctld", - "remarks": "rule_set_201" + "remarks": "rule_set_202" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/sysctl.d Directory", - "remarks": "rule_set_201" + "remarks": "rule_set_202" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_sysctld", - "remarks": "rule_set_202" + "remarks": "rule_set_203" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/sysctl.d Directory", - "remarks": "rule_set_202" + "remarks": "rule_set_203" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_sudoers", - "remarks": "rule_set_203" + "remarks": "rule_set_204" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/sudoers File", - "remarks": "rule_set_203" + "remarks": "rule_set_204" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_sudoers", - "remarks": "rule_set_204" + "remarks": "rule_set_205" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/sudoers File", - "remarks": "rule_set_204" + "remarks": "rule_set_205" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_sudoers", - "remarks": "rule_set_205" + "remarks": "rule_set_206" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/sudoers File", - "remarks": "rule_set_205" + "remarks": "rule_set_206" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_etc_sudoersd", - "remarks": "rule_set_206" + "remarks": "rule_set_207" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/sudoers.d Directory", - "remarks": "rule_set_206" + "remarks": "rule_set_207" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_sudoersd", - "remarks": "rule_set_207" + "remarks": "rule_set_208" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/sudoers.d Directory", - "remarks": "rule_set_207" + "remarks": "rule_set_208" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_sudoersd", - "remarks": "rule_set_208" + "remarks": "rule_set_209" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/sudoers.d Directory", - "remarks": "rule_set_208" + "remarks": "rule_set_209" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_crypttab", - "remarks": "rule_set_209" + "remarks": "rule_set_210" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/crypttab File", - "remarks": "rule_set_209" + "remarks": "rule_set_210" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_crypttab", - "remarks": "rule_set_210" + "remarks": "rule_set_211" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/crypttab File", - "remarks": "rule_set_210" + "remarks": "rule_set_211" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_crypttab", - "remarks": "rule_set_211" + "remarks": "rule_set_212" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/crypttab File", - "remarks": "rule_set_211" + "remarks": "rule_set_212" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_chrony_keys", - "remarks": "rule_set_212" + "remarks": "rule_set_213" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/chrony.keys File", - "remarks": "rule_set_212" + "remarks": "rule_set_213" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_chrony_keys", - "remarks": "rule_set_213" + "remarks": "rule_set_214" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/chrony.keys File", - "remarks": "rule_set_213" + "remarks": "rule_set_214" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_chrony_keys", - "remarks": "rule_set_214" + "remarks": "rule_set_215" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/chrony.keys File", - "remarks": "rule_set_214" + "remarks": "rule_set_215" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "enable_pam_namespace", - "remarks": "rule_set_215" + "remarks": "rule_set_216" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Up a Private Namespace in PAM Configuration", - "remarks": "rule_set_215" + "remarks": "rule_set_216" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_polyinstantiated_tmp", - "remarks": "rule_set_216" + "remarks": "rule_set_217" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Polyinstantiation of /tmp Directories", - "remarks": "rule_set_216" + "remarks": "rule_set_217" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_polyinstantiated_var_tmp", - "remarks": "rule_set_217" + "remarks": "rule_set_218" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Polyinstantiation of /var/tmp Directories", - "remarks": "rule_set_217" + "remarks": "rule_set_218" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sebool_polyinstantiation_enabled", - "remarks": "rule_set_218" + "remarks": "rule_set_219" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the polyinstantiation_enabled SELinux Boolean", - "remarks": "rule_set_218" + "remarks": "rule_set_219" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_sssd_installed", - "remarks": "rule_set_219" + "remarks": "rule_set_220" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install the SSSD Package", - "remarks": "rule_set_219" + "remarks": "rule_set_220" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_sssd_enabled", - "remarks": "rule_set_220" + "remarks": "rule_set_221" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable the SSSD Service", - "remarks": "rule_set_220" + "remarks": "rule_set_221" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "postfix_network_listening_disabled", - "remarks": "rule_set_221" + "remarks": "rule_set_222" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Postfix Network Listening", - "remarks": "rule_set_221" + "remarks": "rule_set_222" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "postfix_client_configure_mail_alias", - "remarks": "rule_set_222" + "remarks": "rule_set_223" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure System to Forward All Mail For The Root Account", - "remarks": "rule_set_222" + "remarks": "rule_set_223" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_state", - "remarks": "rule_set_223" + "remarks": "rule_set_224" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SELinux State is Enforcing", - "remarks": "rule_set_223" + "remarks": "rule_set_224" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_224" + "remarks": "rule_set_225" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_224" + "remarks": "rule_set_225" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_build_database", - "remarks": "rule_set_225" + "remarks": "rule_set_226" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Build and Test AIDE Database", - "remarks": "rule_set_225" + "remarks": "rule_set_226" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_nosmep_argument_absent", - "remarks": "rule_set_226" + "remarks": "rule_set_227" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SMEP is not disabled during boot", - "remarks": "rule_set_226" + "remarks": "rule_set_227" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_nosmap_argument_absent", - "remarks": "rule_set_227" + "remarks": "rule_set_228" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SMAP is not disabled during boot", - "remarks": "rule_set_227" + "remarks": "rule_set_228" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_enable_iommu_force", - "remarks": "rule_set_228" + "remarks": "rule_set_229" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "IOMMU configuration directive", - "remarks": "rule_set_228" + "remarks": "rule_set_229" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_modules_disabled", - "remarks": "rule_set_229" + "remarks": "rule_set_230" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable loading and unloading of kernel modules", - "remarks": "rule_set_229" + "remarks": "rule_set_230" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_grub2_cfg", - "remarks": "rule_set_230" + "remarks": "rule_set_231" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify /boot/grub2/grub.cfg Group Ownership", - "remarks": "rule_set_230" + "remarks": "rule_set_231" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_grub2_cfg", - "remarks": "rule_set_231" + "remarks": "rule_set_232" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify /boot/grub2/grub.cfg User Ownership", - "remarks": "rule_set_231" + "remarks": "rule_set_232" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_grub2_cfg", - "remarks": "rule_set_232" + "remarks": "rule_set_233" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify /boot/grub2/grub.cfg Permissions", - "remarks": "rule_set_232" + "remarks": "rule_set_233" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_user_cfg", - "remarks": "rule_set_233" + "remarks": "rule_set_234" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify /boot/grub2/user.cfg Group Ownership", - "remarks": "rule_set_233" + "remarks": "rule_set_234" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_user_cfg", - "remarks": "rule_set_234" + "remarks": "rule_set_235" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify /boot/grub2/user.cfg User Ownership", - "remarks": "rule_set_234" + "remarks": "rule_set_235" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_user_cfg", - "remarks": "rule_set_235" + "remarks": "rule_set_236" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify /boot/grub2/user.cfg Permissions", - "remarks": "rule_set_235" + "remarks": "rule_set_236" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_systemmap", - "remarks": "rule_set_236" + "remarks": "rule_set_237" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns System.map Files", - "remarks": "rule_set_236" + "remarks": "rule_set_237" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_systemmap", - "remarks": "rule_set_237" + "remarks": "rule_set_238" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns System.map Files", - "remarks": "rule_set_237" + "remarks": "rule_set_238" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_systemmap", - "remarks": "rule_set_238" + "remarks": "rule_set_239" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on System.map Files", - "remarks": "rule_set_238" + "remarks": "rule_set_239" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_bashrc", - "remarks": "rule_set_239" + "remarks": "rule_set_240" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Bash Umask is Set Correctly", - "remarks": "rule_set_239" + "remarks": "rule_set_240" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_login_defs", - "remarks": "rule_set_240" + "remarks": "rule_set_241" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in login.defs", - "remarks": "rule_set_240" + "remarks": "rule_set_241" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_profile", - "remarks": "rule_set_241" + "remarks": "rule_set_242" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in /etc/profile", - "remarks": "rule_set_241" + "remarks": "rule_set_242" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_dedicated_group", - "remarks": "rule_set_242" + "remarks": "rule_set_243" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure a dedicated group owns sudo", - "remarks": "rule_set_242" + "remarks": "rule_set_243" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sudo", - "remarks": "rule_set_243" + "remarks": "rule_set_244" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure That the sudo Binary Has the Correct Permissions", - "remarks": "rule_set_243" + "remarks": "rule_set_244" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_policytype", - "remarks": "rule_set_244" + "remarks": "rule_set_245" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure SELinux Policy", - "remarks": "rule_set_244" + "remarks": "rule_set_245" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_chrony_installed", - "remarks": "rule_set_245" + "remarks": "rule_set_246" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "The Chrony package is installed", - "remarks": "rule_set_245" + "remarks": "rule_set_246" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_chronyd_enabled", - "remarks": "rule_set_246" + "remarks": "rule_set_247" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "The Chronyd service is enabled", - "remarks": "rule_set_246" + "remarks": "rule_set_247" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_specify_remote_server", - "remarks": "rule_set_247" + "remarks": "rule_set_248" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "A remote time server for Chrony is configured", - "remarks": "rule_set_247" + "remarks": "rule_set_248" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_configure_pool_and_server", - "remarks": "rule_set_248" + "remarks": "rule_set_249" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Chrony Configure Pool and Server", - "remarks": "rule_set_248" + "remarks": "rule_set_249" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_remote_loghost", - "remarks": "rule_set_249" + "remarks": "rule_set_250" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Logs Sent To Remote Host", - "remarks": "rule_set_249" + "remarks": "rule_set_250" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_rsyslog-gnutls_installed", - "remarks": "rule_set_250" + "remarks": "rule_set_251" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure rsyslog-gnutls is installed", - "remarks": "rule_set_250" + "remarks": "rule_set_251" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_remote_tls", - "remarks": "rule_set_251" + "remarks": "rule_set_252" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure TLS for rsyslog remote logging", - "remarks": "rule_set_251" + "remarks": "rule_set_252" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_remote_tls_cacert", - "remarks": "rule_set_252" + "remarks": "rule_set_253" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure CA certificate for rsyslog remote logging", - "remarks": "rule_set_252" + "remarks": "rule_set_253" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log_audit", - "remarks": "rule_set_253" + "remarks": "rule_set_254" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log/audit Located On Separate Partition", - "remarks": "rule_set_253" + "remarks": "rule_set_254" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_logrotate_installed", - "remarks": "rule_set_254" + "remarks": "rule_set_255" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure logrotate is Installed", - "remarks": "rule_set_254" + "remarks": "rule_set_255" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "timer_logrotate_enabled", - "remarks": "rule_set_255" + "remarks": "rule_set_256" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable logrotate Timer", - "remarks": "rule_set_255" + "remarks": "rule_set_256" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_logrotate_activated", - "remarks": "rule_set_256" + "remarks": "rule_set_257" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Logrotate Runs Periodically", - "remarks": "rule_set_256" + "remarks": "rule_set_257" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_257" + "remarks": "rule_set_258" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_257" + "remarks": "rule_set_258" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_258" + "remarks": "rule_set_259" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_258" + "remarks": "rule_set_259" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_259" + "remarks": "rule_set_260" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_259" + "remarks": "rule_set_260" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_sysadmin_actions", - "remarks": "rule_set_260" + "remarks": "rule_set_261" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects System Administrator Actions", - "remarks": "rule_set_260" + "remarks": "rule_set_261" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_sudo_log_events", - "remarks": "rule_set_261" + "remarks": "rule_set_262" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to perform maintenance activities", - "remarks": "rule_set_261" + "remarks": "rule_set_262" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_faillock", - "remarks": "rule_set_262" + "remarks": "rule_set_263" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - faillock", - "remarks": "rule_set_262" + "remarks": "rule_set_263" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_lastlog", - "remarks": "rule_set_263" + "remarks": "rule_set_264" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - lastlog", - "remarks": "rule_set_263" + "remarks": "rule_set_264" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_utmp", - "remarks": "rule_set_264" + "remarks": "rule_set_265" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information utmp", - "remarks": "rule_set_264" + "remarks": "rule_set_265" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_btmp", - "remarks": "rule_set_265" + "remarks": "rule_set_266" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information btmp", - "remarks": "rule_set_265" + "remarks": "rule_set_266" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_wtmp", - "remarks": "rule_set_266" + "remarks": "rule_set_267" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", - "remarks": "rule_set_266" + "remarks": "rule_set_267" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_adjtimex", - "remarks": "rule_set_267" + "remarks": "rule_set_268" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through adjtimex", - "remarks": "rule_set_267" + "remarks": "rule_set_268" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_clock_settime", - "remarks": "rule_set_268" + "remarks": "rule_set_269" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through clock_settime", - "remarks": "rule_set_268" + "remarks": "rule_set_269" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_stime", - "remarks": "rule_set_269" + "remarks": "rule_set_270" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through stime", - "remarks": "rule_set_269" + "remarks": "rule_set_270" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_watch_localtime", - "remarks": "rule_set_270" + "remarks": "rule_set_271" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter the localtime File", - "remarks": "rule_set_270" + "remarks": "rule_set_271" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification", - "remarks": "rule_set_271" + "remarks": "rule_set_272" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment", - "remarks": "rule_set_271" + "remarks": "rule_set_272" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chmod", - "remarks": "rule_set_272" + "remarks": "rule_set_273" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", - "remarks": "rule_set_272" + "remarks": "rule_set_273" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chown", - "remarks": "rule_set_273" + "remarks": "rule_set_274" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chown", - "remarks": "rule_set_273" + "remarks": "rule_set_274" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmod", - "remarks": "rule_set_274" + "remarks": "rule_set_275" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmod", - "remarks": "rule_set_274" + "remarks": "rule_set_275" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat", - "remarks": "rule_set_275" + "remarks": "rule_set_276" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat", - "remarks": "rule_set_275" + "remarks": "rule_set_276" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat2", - "remarks": "rule_set_276" + "remarks": "rule_set_277" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat2", - "remarks": "rule_set_276" + "remarks": "rule_set_277" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchown", - "remarks": "rule_set_277" + "remarks": "rule_set_278" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchown", - "remarks": "rule_set_277" + "remarks": "rule_set_278" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchownat", - "remarks": "rule_set_278" + "remarks": "rule_set_279" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchownat", - "remarks": "rule_set_278" + "remarks": "rule_set_279" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fremovexattr", - "remarks": "rule_set_279" + "remarks": "rule_set_280" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fremovexattr", - "remarks": "rule_set_279" + "remarks": "rule_set_280" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fsetxattr", - "remarks": "rule_set_280" + "remarks": "rule_set_281" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fsetxattr", - "remarks": "rule_set_280" + "remarks": "rule_set_281" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lchown", - "remarks": "rule_set_281" + "remarks": "rule_set_282" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lchown", - "remarks": "rule_set_281" + "remarks": "rule_set_282" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lremovexattr", - "remarks": "rule_set_282" + "remarks": "rule_set_283" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lremovexattr", - "remarks": "rule_set_282" + "remarks": "rule_set_283" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lsetxattr", - "remarks": "rule_set_283" + "remarks": "rule_set_284" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lsetxattr", - "remarks": "rule_set_283" + "remarks": "rule_set_284" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_removexattr", - "remarks": "rule_set_284" + "remarks": "rule_set_285" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - removexattr", - "remarks": "rule_set_284" + "remarks": "rule_set_285" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_setxattr", - "remarks": "rule_set_285" + "remarks": "rule_set_286" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - setxattr", - "remarks": "rule_set_285" + "remarks": "rule_set_286" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_creat", - "remarks": "rule_set_286" + "remarks": "rule_set_287" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - creat", - "remarks": "rule_set_286" + "remarks": "rule_set_287" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_ftruncate", - "remarks": "rule_set_287" + "remarks": "rule_set_288" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - ftruncate", - "remarks": "rule_set_287" + "remarks": "rule_set_288" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_open", - "remarks": "rule_set_288" + "remarks": "rule_set_289" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - open", - "remarks": "rule_set_288" + "remarks": "rule_set_289" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_openat", - "remarks": "rule_set_289" + "remarks": "rule_set_290" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - openat", - "remarks": "rule_set_289" + "remarks": "rule_set_290" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_truncate", - "remarks": "rule_set_290" + "remarks": "rule_set_291" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - truncate", - "remarks": "rule_set_290" + "remarks": "rule_set_291" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_group", - "remarks": "rule_set_291" + "remarks": "rule_set_292" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/group", - "remarks": "rule_set_291" + "remarks": "rule_set_292" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_gshadow", - "remarks": "rule_set_292" + "remarks": "rule_set_293" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/gshadow", - "remarks": "rule_set_292" + "remarks": "rule_set_293" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_opasswd", - "remarks": "rule_set_293" + "remarks": "rule_set_294" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", - "remarks": "rule_set_293" + "remarks": "rule_set_294" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_passwd", - "remarks": "rule_set_294" + "remarks": "rule_set_295" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/passwd", - "remarks": "rule_set_294" + "remarks": "rule_set_295" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_shadow", - "remarks": "rule_set_295" + "remarks": "rule_set_296" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/shadow", - "remarks": "rule_set_295" + "remarks": "rule_set_296" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_media_export", - "remarks": "rule_set_296" + "remarks": "rule_set_297" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Exporting to Media (successful)", - "remarks": "rule_set_296" + "remarks": "rule_set_297" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_umount2", - "remarks": "rule_set_297" + "remarks": "rule_set_298" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - umount2", - "remarks": "rule_set_297" + "remarks": "rule_set_298" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands", - "remarks": "rule_set_298" + "remarks": "rule_set_299" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands", - "remarks": "rule_set_298" + "remarks": "rule_set_299" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rename", - "remarks": "rule_set_299" + "remarks": "rule_set_300" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rename", - "remarks": "rule_set_299" + "remarks": "rule_set_300" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat", - "remarks": "rule_set_300" + "remarks": "rule_set_301" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat", - "remarks": "rule_set_300" + "remarks": "rule_set_301" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat2", - "remarks": "rule_set_301" + "remarks": "rule_set_302" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat2", - "remarks": "rule_set_301" + "remarks": "rule_set_302" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rmdir", - "remarks": "rule_set_302" + "remarks": "rule_set_303" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rmdir", - "remarks": "rule_set_302" + "remarks": "rule_set_303" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlink", - "remarks": "rule_set_303" + "remarks": "rule_set_304" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlink", - "remarks": "rule_set_303" + "remarks": "rule_set_304" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlinkat", - "remarks": "rule_set_304" + "remarks": "rule_set_305" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlinkat", - "remarks": "rule_set_304" + "remarks": "rule_set_305" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_delete", - "remarks": "rule_set_305" + "remarks": "rule_set_306" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Unloading - delete_module", - "remarks": "rule_set_305" + "remarks": "rule_set_306" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_init", - "remarks": "rule_set_306" + "remarks": "rule_set_307" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading - init_module", - "remarks": "rule_set_306" + "remarks": "rule_set_307" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_finit", - "remarks": "rule_set_307" + "remarks": "rule_set_308" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - finit_module", - "remarks": "rule_set_307" + "remarks": "rule_set_308" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_insmod", - "remarks": "rule_set_308" + "remarks": "rule_set_309" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - insmod", - "remarks": "rule_set_308" + "remarks": "rule_set_309" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_modprobe", - "remarks": "rule_set_309" + "remarks": "rule_set_310" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - modprobe", - "remarks": "rule_set_309" + "remarks": "rule_set_310" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_rmmod", - "remarks": "rule_set_310" + "remarks": "rule_set_311" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - rmmod", - "remarks": "rule_set_310" + "remarks": "rule_set_311" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_kmod", - "remarks": "rule_set_311" + "remarks": "rule_set_312" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - kmod", - "remarks": "rule_set_311" + "remarks": "rule_set_312" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_etc_selinux", - "remarks": "rule_set_312" + "remarks": "rule_set_313" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls (/etc/selinux)", - "remarks": "rule_set_312" + "remarks": "rule_set_313" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_immutable", - "remarks": "rule_set_313" + "remarks": "rule_set_314" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Make the auditd Configuration Immutable", - "remarks": "rule_set_313" + "remarks": "rule_set_314" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_strict_kernel_rwx", - "remarks": "rule_set_314" + "remarks": "rule_set_315" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Make the kernel text and rodata read-only", - "remarks": "rule_set_314" + "remarks": "rule_set_315" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_debug_wx", - "remarks": "rule_set_315" + "remarks": "rule_set_316" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Warn on W+X mappings found at boot", - "remarks": "rule_set_315" + "remarks": "rule_set_316" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_debug_fs", - "remarks": "rule_set_316" + "remarks": "rule_set_317" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable kernel debugfs", - "remarks": "rule_set_316" + "remarks": "rule_set_317" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_stackprotector", - "remarks": "rule_set_317" + "remarks": "rule_set_318" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Stack Protector buffer overflow detection", - "remarks": "rule_set_317" + "remarks": "rule_set_318" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_stackprotector_strong", - "remarks": "rule_set_318" + "remarks": "rule_set_319" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Strong Stack Protector", - "remarks": "rule_set_318" + "remarks": "rule_set_319" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_sched_stack_end_check", - "remarks": "rule_set_319" + "remarks": "rule_set_320" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Detect stack corruption on calls to schedule()", - "remarks": "rule_set_319" + "remarks": "rule_set_320" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_hardened_usercopy", - "remarks": "rule_set_320" + "remarks": "rule_set_321" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Harden memory copies between kernel and userspace", - "remarks": "rule_set_320" + "remarks": "rule_set_321" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_vmap_stack", - "remarks": "rule_set_321" + "remarks": "rule_set_322" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User a virtually-mapped stack", - "remarks": "rule_set_321" + "remarks": "rule_set_322" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_fortify_source", - "remarks": "rule_set_322" + "remarks": "rule_set_323" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Harden common str/mem functions against buffer overflows", - "remarks": "rule_set_322" + "remarks": "rule_set_323" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_acpi_custom_method", - "remarks": "rule_set_323" + "remarks": "rule_set_324" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Do not allow ACPI methods to be inserted/replaced at run time", - "remarks": "rule_set_323" + "remarks": "rule_set_324" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_proc_kcore", - "remarks": "rule_set_324" + "remarks": "rule_set_325" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable support for /proc/kkcore", - "remarks": "rule_set_324" + "remarks": "rule_set_325" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_compat_vdso", - "remarks": "rule_set_325" + "remarks": "rule_set_326" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the 32-bit vDSO", - "remarks": "rule_set_325" + "remarks": "rule_set_326" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_security_dmesg_restrict", - "remarks": "rule_set_326" + "remarks": "rule_set_327" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict unprivileged access to the kernel syslog", - "remarks": "rule_set_326" + "remarks": "rule_set_327" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_legacy_vsyscall_none", - "remarks": "rule_set_327" + "remarks": "rule_set_328" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable vsyscall mapping", - "remarks": "rule_set_327" + "remarks": "rule_set_328" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_legacy_vsyscall_emulate", - "remarks": "rule_set_328" + "remarks": "rule_set_329" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable vsyscall emulation", - "remarks": "rule_set_328" + "remarks": "rule_set_329" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_legacy_vsyscall_xonly", - "remarks": "rule_set_329" + "remarks": "rule_set_330" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable vsyscall emulate execution only", - "remarks": "rule_set_329" + "remarks": "rule_set_330" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_x86_vsyscall_emulation", - "remarks": "rule_set_330" + "remarks": "rule_set_331" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable x86 vsyscall emulation", - "remarks": "rule_set_330" + "remarks": "rule_set_331" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_debug_credentials", - "remarks": "rule_set_331" + "remarks": "rule_set_332" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable checks on credential management", - "remarks": "rule_set_331" + "remarks": "rule_set_332" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_debug_notifiers", - "remarks": "rule_set_332" + "remarks": "rule_set_333" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable checks on notifier call chains", - "remarks": "rule_set_332" + "remarks": "rule_set_333" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_debug_list", - "remarks": "rule_set_333" + "remarks": "rule_set_334" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable checks on linked list manipulation", - "remarks": "rule_set_333" + "remarks": "rule_set_334" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_debug_sg", - "remarks": "rule_set_334" + "remarks": "rule_set_335" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable checks on scatter-gather (SG) table operations", - "remarks": "rule_set_334" + "remarks": "rule_set_335" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_bug_on_data_corruption", - "remarks": "rule_set_335" + "remarks": "rule_set_336" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Trigger a kernel BUG when data corruption is detected", - "remarks": "rule_set_335" + "remarks": "rule_set_336" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_slab_freelist_random", - "remarks": "rule_set_336" + "remarks": "rule_set_337" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Randomize slab freelist", - "remarks": "rule_set_336" + "remarks": "rule_set_337" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_slab_freelist_hardened", - "remarks": "rule_set_337" + "remarks": "rule_set_338" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Harden slab freelist metadata", - "remarks": "rule_set_337" + "remarks": "rule_set_338" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_slab_merge_default", - "remarks": "rule_set_338" + "remarks": "rule_set_339" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disallow merge of slab caches", - "remarks": "rule_set_338" + "remarks": "rule_set_339" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_slub_debug", - "remarks": "rule_set_339" + "remarks": "rule_set_340" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable SLUB debugging support", - "remarks": "rule_set_339" + "remarks": "rule_set_340" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_page_poisoning", - "remarks": "rule_set_340" + "remarks": "rule_set_341" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable poison of pages after freeing", - "remarks": "rule_set_340" + "remarks": "rule_set_341" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_compat_brk", - "remarks": "rule_set_341" + "remarks": "rule_set_342" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable compatibility with brk()", - "remarks": "rule_set_341" + "remarks": "rule_set_342" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_strict_module_rwx", - "remarks": "rule_set_342" + "remarks": "rule_set_343" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Make the module text and rodata read-only", - "remarks": "rule_set_342" + "remarks": "rule_set_343" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_module_sig", - "remarks": "rule_set_343" + "remarks": "rule_set_344" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable module signature verification", - "remarks": "rule_set_343" + "remarks": "rule_set_344" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_module_sig_force", - "remarks": "rule_set_344" + "remarks": "rule_set_345" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require modules to be validly signed", - "remarks": "rule_set_344" + "remarks": "rule_set_345" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_module_sig_all", - "remarks": "rule_set_345" + "remarks": "rule_set_346" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable automatic signing of all modules", - "remarks": "rule_set_345" + "remarks": "rule_set_346" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_module_sig_sha512", - "remarks": "rule_set_346" + "remarks": "rule_set_347" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Sign kernel modules with SHA-512", - "remarks": "rule_set_346" + "remarks": "rule_set_347" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_module_sig_hash", - "remarks": "rule_set_347" + "remarks": "rule_set_348" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Specify the hash to use when signing modules", - "remarks": "rule_set_347" + "remarks": "rule_set_348" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_module_sig_key", - "remarks": "rule_set_348" + "remarks": "rule_set_349" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Specify module signing key to use", - "remarks": "rule_set_348" + "remarks": "rule_set_349" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_bug", - "remarks": "rule_set_349" + "remarks": "rule_set_350" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable support for BUG()", - "remarks": "rule_set_349" + "remarks": "rule_set_350" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_panic_on_oops", - "remarks": "rule_set_350" + "remarks": "rule_set_351" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Kernel panic oops", - "remarks": "rule_set_350" + "remarks": "rule_set_351" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_panic_timeout", - "remarks": "rule_set_351" + "remarks": "rule_set_352" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Kernel panic timeout", - "remarks": "rule_set_351" + "remarks": "rule_set_352" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_seccomp", - "remarks": "rule_set_352" + "remarks": "rule_set_353" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable seccomp to safely compute untrusted bytecode", - "remarks": "rule_set_352" + "remarks": "rule_set_353" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_seccomp_filter", - "remarks": "rule_set_353" + "remarks": "rule_set_354" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable use of Berkeley Packet Filter with seccomp", - "remarks": "rule_set_353" + "remarks": "rule_set_354" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_security", - "remarks": "rule_set_354" + "remarks": "rule_set_355" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable different security models", - "remarks": "rule_set_354" + "remarks": "rule_set_355" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_security_yama", - "remarks": "rule_set_355" + "remarks": "rule_set_356" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Yama support", - "remarks": "rule_set_355" + "remarks": "rule_set_356" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_gcc_plugin_latent_entropy", - "remarks": "rule_set_356" + "remarks": "rule_set_357" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Generate some entropy during boot and runtime", - "remarks": "rule_set_356" + "remarks": "rule_set_357" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_gcc_plugin_stackleak", - "remarks": "rule_set_357" + "remarks": "rule_set_358" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Poison kernel stack before returning from syscalls", - "remarks": "rule_set_357" + "remarks": "rule_set_358" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_gcc_plugin_structleak", - "remarks": "rule_set_358" + "remarks": "rule_set_359" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Force initialization of variables containing userspace addresses", - "remarks": "rule_set_358" + "remarks": "rule_set_359" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_gcc_plugin_structleak_byref_all", - "remarks": "rule_set_359" + "remarks": "rule_set_360" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "zero-init everything passed by reference", - "remarks": "rule_set_359" + "remarks": "rule_set_360" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_gcc_plugin_randstruct", - "remarks": "rule_set_360" + "remarks": "rule_set_361" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Randomize layout of sensitive kernel structures", - "remarks": "rule_set_360" + "remarks": "rule_set_361" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_syn_cookies", - "remarks": "rule_set_361" + "remarks": "rule_set_362" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable TCP/IP syncookie support", - "remarks": "rule_set_361" + "remarks": "rule_set_362" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_kexec", - "remarks": "rule_set_362" + "remarks": "rule_set_363" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable kexec system call", - "remarks": "rule_set_362" + "remarks": "rule_set_363" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_hibernation", - "remarks": "rule_set_363" + "remarks": "rule_set_364" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable hibernation", - "remarks": "rule_set_363" + "remarks": "rule_set_364" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_binfmt_misc", - "remarks": "rule_set_364" + "remarks": "rule_set_365" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable kernel support for MISC binaries", - "remarks": "rule_set_364" + "remarks": "rule_set_365" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_legacy_ptys", - "remarks": "rule_set_365" + "remarks": "rule_set_366" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable legacy (BSD) PTY support", - "remarks": "rule_set_365" + "remarks": "rule_set_366" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_default_mmap_min_addr", - "remarks": "rule_set_366" + "remarks": "rule_set_367" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Low Address Space To Protect From User Allocation", - "remarks": "rule_set_366" + "remarks": "rule_set_367" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_randomize_base", - "remarks": "rule_set_367" + "remarks": "rule_set_368" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Randomize the address of the kernel image (KASLR)", - "remarks": "rule_set_367" + "remarks": "rule_set_368" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_randomize_memory", - "remarks": "rule_set_368" + "remarks": "rule_set_369" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Randomize the kernel memory sections", - "remarks": "rule_set_368" + "remarks": "rule_set_369" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_ia32_emulation", - "remarks": "rule_set_369" + "remarks": "rule_set_370" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable IA32 emulation", - "remarks": "rule_set_369" + "remarks": "rule_set_370" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_modify_ldt_syscall", - "remarks": "rule_set_370" + "remarks": "rule_set_371" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the LDT (local descriptor table)", - "remarks": "rule_set_370" + "remarks": "rule_set_371" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_arm64_sw_ttbr0_pan", - "remarks": "rule_set_371" + "remarks": "rule_set_372" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Emulate Privileged Access Never (PAN)", - "remarks": "rule_set_371" + "remarks": "rule_set_372" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_unmap_kernel_at_el0", - "remarks": "rule_set_372" + "remarks": "rule_set_373" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Unmap kernel when running in userspace (aka KAISER)", - "remarks": "rule_set_372" + "remarks": "rule_set_373" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sebool_selinuxuser_execheap", - "remarks": "rule_set_373" + "remarks": "rule_set_374" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the selinuxuser_execheap SELinux Boolean", - "remarks": "rule_set_373" + "remarks": "rule_set_374" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sebool_deny_execmem", - "remarks": "rule_set_374" + "remarks": "rule_set_375" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the deny_execmem SELinux Boolean", - "remarks": "rule_set_374" + "remarks": "rule_set_375" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sebool_selinuxuser_execstack", - "remarks": "rule_set_375" + "remarks": "rule_set_376" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the selinuxuser_execstack SELinux Boolean", - "remarks": "rule_set_375" + "remarks": "rule_set_376" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sebool_ssh_sysadm_login", - "remarks": "rule_set_376" + "remarks": "rule_set_377" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the ssh_sysadm_login SELinux Boolean", - "remarks": "rule_set_376" + "remarks": "rule_set_377" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_setroubleshoot_removed", - "remarks": "rule_set_377" + "remarks": "rule_set_378" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall setroubleshoot Package", - "remarks": "rule_set_377" + "remarks": "rule_set_378" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_setroubleshoot-server_removed", - "remarks": "rule_set_378" + "remarks": "rule_set_379" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall setroubleshoot-server Package", - "remarks": "rule_set_378" + "remarks": "rule_set_379" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_setroubleshoot-plugins_removed", - "remarks": "rule_set_379" + "remarks": "rule_set_380" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall setroubleshoot-plugins Package", - "remarks": "rule_set_379" + "remarks": "rule_set_380" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_periodic_cron_checking", - "remarks": "rule_set_380" + "remarks": "rule_set_381" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Periodic Execution of AIDE", - "remarks": "rule_set_380" + "remarks": "rule_set_381" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_scan_notification", - "remarks": "rule_set_381" + "remarks": "rule_set_382" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Notification of Post-AIDE Scan Details", - "remarks": "rule_set_381" + "remarks": "rule_set_382" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_verify_acls", - "remarks": "rule_set_382" + "remarks": "rule_set_383" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure AIDE to Verify Access Control Lists (ACLs)", - "remarks": "rule_set_382" + "remarks": "rule_set_383" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_verify_ext_attributes", - "remarks": "rule_set_383" + "remarks": "rule_set_384" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure AIDE to Verify Extended Attributes", - "remarks": "rule_set_383" + "remarks": "rule_set_384" } ], "control-implementations": [ { - "uuid": "3118cc91-a1f0-4f45-8221-ae02e8b1123d", + "uuid": "1eb383cc-b728-47b3-aefa-3ebdc047c820", "source": "trestle://profiles/rhel10-anssi-high/profile.json", "description": "Control implementation for anssi_bp28_high", "props": [ @@ -5623,7 +5635,7 @@ ], "implemented-requirements": [ { - "uuid": "f99a9be5-3f7e-4378-afe2-9ea796dd6701", + "uuid": "0045d41a-2c30-4153-b728-7df486574354", "control-id": "r4", "description": "The description for control-id r4.", "props": [ @@ -5636,7 +5648,7 @@ ] }, { - "uuid": "1b76ae85-abdf-4546-bd88-ed53f7842cfe", + "uuid": "31bdbb2b-faad-4763-9614-d81d602b4610", "control-id": "r6", "description": "The description for control-id r6.", "props": [ @@ -5649,7 +5661,7 @@ ] }, { - "uuid": "11a0c42f-94e5-4d48-8f8b-baa646b7a716", + "uuid": "89026a72-c539-4b6c-aeed-64e1d8d004f9", "control-id": "r15", "description": "The special case of direct access to physical memory is not handled.", "props": [ @@ -5746,7 +5758,7 @@ ] }, { - "uuid": "99afee46-2edb-4832-97e1-98ad46930697", + "uuid": "1a34e07a-0043-4827-a049-2f6fb56d0fe4", "control-id": "r16", "description": "No notes for control-id R16.", "props": [ @@ -5783,7 +5795,7 @@ ] }, { - "uuid": "855f8b27-5341-4a8c-854a-62704ff99e3e", + "uuid": "cf1f1bc7-c933-4515-a7cf-2f8c1509451a", "control-id": "r17", "description": "No notes for control-id R17.", "props": [ @@ -5825,7 +5837,7 @@ ] }, { - "uuid": "f902689b-8238-4b80-a1fa-bbfc881c8b28", + "uuid": "4de39415-9fc2-4ccb-a3ec-5810a8f951d2", "control-id": "r18", "description": "No notes for control-id R18.", "props": [ @@ -5872,7 +5884,7 @@ ] }, { - "uuid": "394b2111-7010-45e4-b8f5-10cea414e7c6", + "uuid": "07c7e005-e908-4cf2-ad07-9881a0cab46c", "control-id": "r19", "description": "No notes for control-id R19.", "props": [ @@ -5899,7 +5911,7 @@ ] }, { - "uuid": "fc378499-c7ce-4298-b2fa-035f7624a399", + "uuid": "8507a27c-9ee3-4f3a-ba58-a45670c0ebae", "control-id": "r20", "description": "No notes for control-id R20.", "props": [ @@ -5931,7 +5943,7 @@ ] }, { - "uuid": "c9e1fd6d-1aa3-4a9d-97d6-9ea58b1f32f0", + "uuid": "d03ace1a-a2b7-4176-8ca2-d425867210ae", "control-id": "r21", "description": "No notes for control-id R21.", "props": [ @@ -5968,7 +5980,7 @@ ] }, { - "uuid": "ab6d228a-6a2f-4ab1-a3fa-f84ace1b92ff", + "uuid": "85eefa72-7429-4777-ba12-913e719bd51b", "control-id": "r22", "description": "This control doesn't disable the IPv6 stack, to disable it select the related rule.", "props": [ @@ -5985,7 +5997,7 @@ ] }, { - "uuid": "960ae855-d0cf-4e57-9f91-aec4b8e76f66", + "uuid": "47aed824-44dd-457f-992f-07c855af8944", "control-id": "r23", "description": "If the system can function without support for kernel modules, module support should be disabled by setting CONFIG_MODULES=n.", "props": [ @@ -6017,7 +6029,7 @@ ] }, { - "uuid": "d38b0384-9b2f-4714-8d53-0ed2f18e1110", + "uuid": "acf6c3b2-e9a1-4bd4-aa56-139a08b9cd79", "control-id": "r24", "description": "The description for control-id r24.", "props": [ @@ -6030,7 +6042,7 @@ ] }, { - "uuid": "6c8729a1-b988-4343-99cb-31ad9fbcce3b", + "uuid": "a1f8cb4b-ed1e-4e28-a94c-11ad5716c212", "control-id": "r25", "description": "No notes for control-id R25.", "props": [ @@ -6067,7 +6079,7 @@ ] }, { - "uuid": "c30bd536-7410-4d8f-915d-cc0963a3ff51", + "uuid": "ad9da471-882f-43d9-ba24-8ace4879daef", "control-id": "r26", "description": "The description for control-id r26.", "props": [ @@ -6080,7 +6092,7 @@ ] }, { - "uuid": "fd9c859a-5cdc-403d-97c4-e6cd00f8e613", + "uuid": "c8c85d15-d897-4e18-974e-9af1e5f3d9b9", "control-id": "r27", "description": "No notes for control-id R27.", "props": [ @@ -6112,7 +6124,7 @@ ] }, { - "uuid": "397b2c31-afae-4f97-82d6-0543c6dc73bf", + "uuid": "b6dce40b-44c9-47e3-b03c-940a704fc6d8", "control-id": "r46", "description": "No notes for control-id R46.", "props": [ @@ -6129,7 +6141,7 @@ ] }, { - "uuid": "756728e8-c9c2-4eb0-83d0-8cdfd290f1ef", + "uuid": "c822b576-6f7b-427e-b374-dd0011b3d6fb", "control-id": "r47", "description": "The description for control-id r47.", "props": [ @@ -6142,7 +6154,7 @@ ] }, { - "uuid": "03928543-fbff-4eaf-be82-03df36404c50", + "uuid": "f6132129-ca0c-4f16-9b15-19194fd6f176", "control-id": "r48", "description": "In RHEL, the SELinux boolean allow_execheap is renamed to selinuxuser_execheap, and the boolean allow_execstack is renamed to selinuxuser_execstack. And allow_execmem is not available, deny_execmem provides the same functionality.", "props": [ @@ -6174,7 +6186,7 @@ ] }, { - "uuid": "ef0b75ee-5ba4-4e05-b3fe-25829630d39a", + "uuid": "7fb19378-105e-45c6-8c33-4e7e8d9a2928", "control-id": "r49", "description": "No notes for control-id R49.", "props": [ @@ -6201,7 +6213,7 @@ ] }, { - "uuid": "b87fe155-ae24-4db6-a4a5-8de95c9d2bff", + "uuid": "9ae53182-0f43-4cca-b9e3-d60d2d3d333b", "control-id": "r66", "description": "The description for control-id r66.", "props": [ @@ -6214,7 +6226,7 @@ ] }, { - "uuid": "0732abf6-ecab-403c-89a8-bbde172720a9", + "uuid": "13652185-526d-41ad-befc-7418398ce7ac", "control-id": "r76", "description": "No notes for control-id R76.", "props": [ @@ -6256,7 +6268,7 @@ ] }, { - "uuid": "90359417-4057-420f-baee-db2ede242d2d", + "uuid": "28ffb4e1-dc91-4655-b43a-f5ff785c95a9", "control-id": "r77", "description": "The description for control-id r77.", "props": [ @@ -6269,7 +6281,7 @@ ] }, { - "uuid": "b235d4a2-c896-46f9-aaaa-2e703157afa7", + "uuid": "95659cb4-4438-4a27-a75e-868448790f50", "control-id": "r1", "description": "This requirement can be checked, but remediation requires manual reinstall of the OS. The content automation cannot really configure the BIOS, but can in some cases, check settings that are visible to the OS. Like for example the NX/DX setting.", "props": [ @@ -6291,7 +6303,7 @@ ] }, { - "uuid": "0c0d6868-fb82-400e-81b6-feda838bc227", + "uuid": "c772b48a-11a6-4765-9488-5b2818ffa8a5", "control-id": "r7", "description": "No notes for control-id R7.", "props": [ @@ -6308,7 +6320,7 @@ ] }, { - "uuid": "eb22fe71-9d23-4ec4-9170-e17f511b572c", + "uuid": "834061a5-eba3-4a3b-ad30-78a07c8b166d", "control-id": "r10", "description": "No notes for control-id R10.", "props": [ @@ -6325,7 +6337,7 @@ ] }, { - "uuid": "8d304ca9-e97e-4fb9-a4b0-c8db86c3e796", + "uuid": "dea42dd7-9282-4caf-abed-63ea97345c2e", "control-id": "r29", "description": "The /boot partition mounted is essential to perform certain administrative actions, for example updating the kernel. Therefore, for better stability, in this requirement only rules to restrict the access to /boot are selected. It is not changed how the /boot is mounted.", "props": [ @@ -6382,7 +6394,7 @@ ] }, { - "uuid": "b77a1ab9-d38d-4c89-84e0-9719e5f245dd", + "uuid": "3966d20e-92ed-46a8-a7ec-fd05b3a3142f", "control-id": "r36", "description": "There are cases of Systemd services which would stop working in case umask would be configured to 0027 for all services. One such example is the Cups service which needs to create sockets which need to be available for all users. Therefore, this part of the requirement can't be automated.", "props": [ @@ -6409,7 +6421,7 @@ ] }, { - "uuid": "a58346e5-1c96-4255-b2d5-30e0ae49bb7d", + "uuid": "94ede3f5-80c8-4e46-942f-4558f296023d", "control-id": "r37", "description": "Other partitioning mechanisms can include chroot and containers and are not contemplated in this requirement.", "props": [ @@ -6426,7 +6438,7 @@ ] }, { - "uuid": "ff75fde1-0121-4ccb-8411-5171660f576a", + "uuid": "8d108b6d-24a6-4b79-99d7-2b0039f8f2ce", "control-id": "r38", "description": "No notes for control-id R38.", "props": [ @@ -6448,7 +6460,7 @@ ] }, { - "uuid": "78597691-c119-4e7d-b625-7bae1dd36f33", + "uuid": "19c3f0a3-dfb8-4cd7-84fd-6ea9dc4a0c1e", "control-id": "r41", "description": "The description for control-id r41.", "props": [ @@ -6461,7 +6473,7 @@ ] }, { - "uuid": "dacc3fd2-45f6-4528-b669-4682aa9d6bb7", + "uuid": "e0b83b04-352c-459e-821f-53d4a585312e", "control-id": "r45", "description": "No notes for control-id R45.", "props": [ @@ -6473,7 +6485,7 @@ ] }, { - "uuid": "a4188a03-4d34-40c7-8793-89aa9a1ae369", + "uuid": "6042b6c8-693d-414e-b1bd-d80ceabcaeec", "control-id": "r51", "description": "This concerns two aspects, the first is administrative, and involves prompt installation of secrets or trusted elements by the sysadmin. The second involves removal of any default secret or trusted element configured by the operating system during install process, e.g. default known passwords.", "props": [ @@ -6485,7 +6497,7 @@ ] }, { - "uuid": "d1109cdd-5d21-41e4-9603-5a213771c061", + "uuid": "f7e2b142-eed7-4557-8bde-81d9d4117baa", "control-id": "r57", "description": "The description for control-id r57.", "props": [ @@ -6498,7 +6510,7 @@ ] }, { - "uuid": "63f3901f-5560-4bd8-938c-1317b34fc801", + "uuid": "637c72c1-14f5-469b-9c4c-97c96c5fb5fc", "control-id": "r60", "description": "The description for control-id r60.", "props": [ @@ -6511,7 +6523,7 @@ ] }, { - "uuid": "576f991e-ac38-4201-bb89-76e47230160d", + "uuid": "cdc7e47e-6200-43c7-8bf3-5154aede15a3", "control-id": "r64", "description": "SELinux policies limit the privileges of services and daemons just to those which are required. The policies should be enough to restrict the services' privileges to its essentials, but the automated content cannot assess whether they are the minimum required for the deployment.", "props": [ @@ -6528,7 +6540,7 @@ ] }, { - "uuid": "8d167bcd-3fa2-4325-99cf-66ac4d9840ef", + "uuid": "74cac590-ef8f-4849-97e2-82d53b61cc28", "control-id": "r65", "description": "The description for control-id r65.", "props": [ @@ -6541,7 +6553,7 @@ ] }, { - "uuid": "1b812d93-eeb4-4dfa-8a99-110bf0163ccf", + "uuid": "94cca7ac-22d7-41d5-99f0-c607e3a0133c", "control-id": "r71", "description": "A lot of recommendations and requirements from the DAT-PA-012 document are administrative and hard to automate. The rules selected below address a few of the aspects that can be covered, keep in mind that these configurations should be customized for the systems deployment requirements.", "props": [ @@ -6628,7 +6640,7 @@ ] }, { - "uuid": "54c7d1fe-e3ab-41ce-be1a-48ce5e8d6fe1", + "uuid": "27cafeab-c7a7-42a4-8bcd-7da2a990780a", "control-id": "r72", "description": "No notes for control-id R72.", "props": [ @@ -6640,7 +6652,7 @@ ] }, { - "uuid": "b0220de8-a467-43be-94e5-032ffe777ce2", + "uuid": "8b3fecff-0bc3-4998-ae73-cfb657158175", "control-id": "r73", "description": "No notes for control-id R73.", "props": [ @@ -6932,7 +6944,7 @@ ] }, { - "uuid": "9be4d8a2-948e-485d-9895-4723a8cdadab", + "uuid": "3014030f-f73f-463a-877c-e2c49890bc5e", "control-id": "r78", "description": "The description for control-id r78.", "props": [ @@ -6945,7 +6957,7 @@ ] }, { - "uuid": "ce6e2624-891b-49cb-9f88-bc9400f444ac", + "uuid": "4209ec29-f2fb-42d0-93f6-6d8b4b2157a6", "control-id": "r2", "description": "The description for control-id r2.", "props": [ @@ -6958,7 +6970,7 @@ ] }, { - "uuid": "b8a92155-00a5-4405-ad7d-3450d75a4465", + "uuid": "d6434c22-1d33-447b-b6cf-4e3ef7245da1", "control-id": "r3", "description": "The description for control-id r3.", "props": [ @@ -6971,7 +6983,7 @@ ] }, { - "uuid": "ed3278b4-8b4e-4ec7-b33d-e8cd68ac37a7", + "uuid": "527a7fb7-a256-46f7-8ee8-aa0ebd38820f", "control-id": "r5", "description": "No notes for control-id R5.", "props": [ @@ -6988,7 +7000,7 @@ ] }, { - "uuid": "05d854a4-43ce-4b5b-9a40-f12ad83db0cc", + "uuid": "0a098720-6a7b-44cd-b4c6-138bdcbab837", "control-id": "r8", "description": "No notes for control-id R8.", "props": [ @@ -7060,7 +7072,7 @@ ] }, { - "uuid": "282469b6-e1cc-4253-989f-4442efaeb662", + "uuid": "a4488aa3-6110-4120-8915-7f51383dfbdd", "control-id": "r9", "description": "No notes for control-id R9.", "props": [ @@ -7122,7 +7134,7 @@ ] }, { - "uuid": "9dd1ac6d-d6f0-4599-b9e3-73ae9e2a470f", + "uuid": "600962c1-d9de-4087-ab47-cc1b35857218", "control-id": "r11", "description": "No notes for control-id R11.", "props": [ @@ -7139,7 +7151,7 @@ ] }, { - "uuid": "f6de9404-4453-43a7-98d9-828f3ec99fe3", + "uuid": "4043a578-f427-45ca-bbfd-73c0de99e3e9", "control-id": "r12", "description": "No notes for control-id R12.", "props": [ @@ -7266,7 +7278,7 @@ ] }, { - "uuid": "aa8db05d-9b73-4826-94ba-c18a3bf7df73", + "uuid": "2c454e36-fa1d-43ab-b30e-3abcb049fb77", "control-id": "r13", "description": "When IPv6 is not in use, disable it, otherwise secure the IPv6 stack. This control hardens the IPv6 stack, to disable it use the related rules instead.", "props": [ @@ -7358,7 +7370,7 @@ ] }, { - "uuid": "4954b794-6e20-4119-8723-c76e4b9fa6e0", + "uuid": "425b0bb9-a4c5-4899-9033-c445d9dcb025", "control-id": "r14", "description": "The rule for the /proc file system is not implemented", "props": [ @@ -7395,7 +7407,7 @@ ] }, { - "uuid": "8a90f3b0-028f-42c4-b2ad-95f6c70ae330", + "uuid": "2a08a2c4-a1bc-4791-b4e3-aa24d7fec4ac", "control-id": "r28", "description": "No notes for control-id R28.", "props": [ @@ -7527,7 +7539,7 @@ ] }, { - "uuid": "a488203d-b474-481c-91fe-5964173b0d6f", + "uuid": "9bfe5d41-be54-4e93-af5c-2bb5110c29e1", "control-id": "r32", "description": "ANSSI doesn't specify the length of the inactivity period, we are choosing 10 minutes as reasonable number.", "props": [ @@ -7549,7 +7561,7 @@ ] }, { - "uuid": "895021e3-6a7c-4883-befa-6e4e13ca27ff", + "uuid": "9762d9d2-90c2-4462-91c5-2117f61e29b1", "control-id": "r33", "description": "By disabling direct root logins proper accountability is ensured. Users will login first, then escalate to privileged (root) access. Change of privilege operations must be based on executables to monitor the activities performed (for example sudo). Nonetheless, the content automation cannot ensure that each administrator was given a nominative administration account separate from his normal user account.", "props": [ @@ -7591,7 +7603,7 @@ ] }, { - "uuid": "5053cba6-0cc3-48d5-8574-a6eaabdfb498", + "uuid": "75334e5d-6a79-4373-bb3a-6644592d57de", "control-id": "r34", "description": "The description for control-id r34.", "props": [ @@ -7604,7 +7616,7 @@ ] }, { - "uuid": "f02a1ef0-c54a-496d-805c-6757e17d1712", + "uuid": "c495fa18-5edc-41a7-8449-40d48d260869", "control-id": "r35", "description": "The description for control-id r35.", "props": [ @@ -7617,7 +7629,7 @@ ] }, { - "uuid": "36fab66b-8880-490a-a35d-74a121364294", + "uuid": "6955cca1-e424-451b-827e-359ec8818ff9", "control-id": "r39", "description": "No notes for control-id R39.", "props": [ @@ -7654,7 +7666,7 @@ ] }, { - "uuid": "95001dba-a858-45df-825e-da1bdf3e2fdc", + "uuid": "b09575c3-4406-4df2-8609-934beba86a16", "control-id": "r40", "description": "No notes for control-id R40.", "props": [ @@ -7671,7 +7683,7 @@ ] }, { - "uuid": "94258b68-ea51-4274-9910-ad492502789e", + "uuid": "89adac3f-63ee-4440-b551-dcd00d040d69", "control-id": "r42", "description": "No notes for control-id R42.", "props": [ @@ -7688,7 +7700,7 @@ ] }, { - "uuid": "bc83a8ee-de66-4b04-aec8-f43714a154e5", + "uuid": "969b8f02-2c32-4a43-8694-3b8cff16a7ab", "control-id": "r43", "description": "No notes for control-id R43.", "props": [ @@ -7705,7 +7717,7 @@ ] }, { - "uuid": "a062c948-0ff1-45ba-9d23-2fb2a58a4def", + "uuid": "e214c0df-cbf5-4000-9e52-1d308c3ae380", "control-id": "r44", "description": "The description for control-id r44.", "props": [ @@ -7718,7 +7730,7 @@ ] }, { - "uuid": "a61a58e6-ed81-4f9d-b738-7b18f3e4e35a", + "uuid": "54b10039-8e09-45c9-b72e-a8f86be1841c", "control-id": "r50", "description": "No notes for control-id R50.", "props": [ @@ -8085,7 +8097,7 @@ ] }, { - "uuid": "39d02f89-084f-4eb1-b88b-2cd4f93ba8a6", + "uuid": "31efecdd-c19f-455c-a7cf-10c2bfe01254", "control-id": "r52", "description": "The description for control-id r52.", "props": [ @@ -8098,7 +8110,7 @@ ] }, { - "uuid": "821f9b57-83b2-497f-a148-ccf4cec4d6dd", + "uuid": "cd5eeb0f-28d4-4059-b8a5-95ebb562e685", "control-id": "r55", "description": "The approach of the selected rules is to use and configure pam_namespace module.", "props": [ @@ -8130,7 +8142,7 @@ ] }, { - "uuid": "ac613979-8515-4b8d-9069-07afaa5eee50", + "uuid": "5ed0c688-aa50-4bab-ae02-a9d0e72cb62e", "control-id": "r63", "description": "The description for control-id r63.", "props": [ @@ -8143,7 +8155,7 @@ ] }, { - "uuid": "1dffa59d-e70e-42aa-bb6b-2a3610c7a47d", + "uuid": "a8313bd7-f809-46d1-9ec3-8cd57a6d9d85", "control-id": "r67", "description": "In systems where remote authentication is handled through sssd service, PAM delegates\nrequests for remote authentication to sssd service through a local Unix socket. The sssd\nservice can use IPA, AD or LDAP as a remote database containing information required for authentication.\nIn case LDAP is configured manually, there are several configuration options which should be chedked.", "props": [ @@ -8165,7 +8177,7 @@ ] }, { - "uuid": "37f2291d-00af-4427-b290-a061151f91c8", + "uuid": "4ca5a5bc-65d4-4ffa-939c-1e6bd9914085", "control-id": "r69", "description": "The description for control-id r69.", "props": [ @@ -8178,7 +8190,7 @@ ] }, { - "uuid": "d4676fb6-5ac1-4025-8761-81bdda23d0d8", + "uuid": "fd1d06f4-83f2-4826-a17d-e382e78dae26", "control-id": "r70", "description": "The description for control-id r70.", "props": [ @@ -8191,7 +8203,7 @@ ] }, { - "uuid": "efae368e-f521-4481-8c70-2d902debe8e1", + "uuid": "e1921a88-2d68-4331-9aed-9fc8b8db12ba", "control-id": "r74", "description": "No notes for control-id R74.", "props": [ @@ -8208,7 +8220,7 @@ ] }, { - "uuid": "1c166e8f-137b-4bd6-a1eb-f79802704c34", + "uuid": "efc9f56f-77a4-4485-a8f5-aabce571ef68", "control-id": "r75", "description": "Only the alias for root user is covered by the rule. The other services cannot be reliably covered, as there is no simple way of determining what is a service account.", "props": [ @@ -8225,7 +8237,7 @@ ] }, { - "uuid": "1612481f-ddb5-4c11-95a7-1a1edfe8c675", + "uuid": "6a6809e2-7c62-4948-bc38-d29aadcaf528", "control-id": "r79", "description": "SELinux can provide confinement and monitoring of services, and AIDE provides basic integrity checking. System logs are configured as part of R43. Hardening of particular services should be done on a case by case basis and is not automated by this content.", "props": [ @@ -8252,7 +8264,7 @@ ] }, { - "uuid": "75fdc847-6412-4896-8400-32caee108a6a", + "uuid": "8f5d6fe8-75f9-41e0-b04e-d7f3b36a3e6a", "control-id": "r30", "description": "The description for control-id r30.", "props": [ @@ -8265,7 +8277,7 @@ ] }, { - "uuid": "e7538670-ea71-4250-ab0e-3501333e4782", + "uuid": "62ef48fd-455f-47f9-afa9-c196a8636e05", "control-id": "r31", "description": "The rules selected below establish a general password strength baseline of 100 bits, based on the recommendations of the technical note \"Recommandations relatives à l'authentification multifacteur et aux mots de passe\" (https://cyber.gouv.fr/publications/recommandations-relatives-lauthentification-multifacteur-et-aux-mots-de-passe)\nThe baseline should be reviewed and tailored to the system's use case and needs.", "props": [ @@ -8337,7 +8349,7 @@ ] }, { - "uuid": "f9c4b66b-c48c-43d4-97b6-877ad656efde", + "uuid": "b98ca982-6688-4308-9d99-081dfce5b89f", "control-id": "r53", "description": "No notes for control-id R53.", "props": [ @@ -8359,7 +8371,7 @@ ] }, { - "uuid": "44246709-09bd-4a6e-b682-108efa17bd8f", + "uuid": "06ad0df8-1d3c-4d1c-8bc9-7adaf324fdba", "control-id": "r54", "description": "No notes for control-id R54.", "props": [ @@ -8386,7 +8398,7 @@ ] }, { - "uuid": "ec5530eb-aad4-499c-b58c-99016c452f1f", + "uuid": "c2d708aa-4857-4925-bb89-7d0a3c6ecbf4", "control-id": "r56", "description": "Only programs specifically designed to be used with setuid or setgid bits can have these privilege bits set. This requirement considers apropriate for setuid and setgid bits the binaries that are installed from recognized and authorized repositories (covered in R15). The remediation resets the sticky bit to intended value by vendor/developer, any finding after remediation should be reviewed.", "props": [ @@ -8408,7 +8420,7 @@ ] }, { - "uuid": "3194f303-2e70-4f3a-a4b3-09a1f9854636", + "uuid": "7c8d0538-c958-455d-9b7e-7ea48279efb8", "control-id": "r58", "description": "The description for control-id r58.", "props": [ @@ -8421,7 +8433,7 @@ ] }, { - "uuid": "e15f0977-fa7a-42cd-bfa2-1779989c51f2", + "uuid": "20bdfe34-283d-4950-9eff-d25e60353bc9", "control-id": "r59", "description": "It is not trivial to distinguish an official repository from an unofficial one. We cannot draw conclusions from the repo name or URL of the repo (as they can be arbitrary or behind a proxy). One approach to check the origin of installed packages is to check the signature of the packages. If the public key of a repository is not installed, the repo is not trusted.", "props": [ @@ -8449,11 +8461,16 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_redhat_gpgkey_installed" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "package_sequoia-sq_installed" } ] }, { - "uuid": "8170dcd6-a97d-4a6b-b3a2-928cbfbbe8d7", + "uuid": "242f2685-e082-40ce-8367-dd94295f4a49", "control-id": "r61", "description": "Check the vendor CVE feed and configure automatic install of security related updates.", "props": [ @@ -8485,7 +8502,7 @@ ] }, { - "uuid": "446dd767-6729-4320-aafe-1ea786e7528a", + "uuid": "aa53bbfc-79b9-48fe-98e8-f62ae0ed9142", "control-id": "r62", "description": "The description for control-id r62.", "props": [ @@ -8523,7 +8540,7 @@ ] }, { - "uuid": "ab2a872a-b4da-4bf9-8b4b-83e72ab3dc2a", + "uuid": "1fbf9d66-add7-4e0a-80b8-d51b86798ccc", "control-id": "r68", "description": "The selection of rules doesn't cover the use of hardware devices to protect the passwords.", "props": [ @@ -8560,7 +8577,7 @@ ] }, { - "uuid": "d1eaf809-369e-46a8-93f3-f58a5206c707", + "uuid": "70419368-23ff-47f4-9074-ef489fe0a8f9", "control-id": "r80", "description": "The description for control-id r80.", "props": [ @@ -8963,7 +8980,7 @@ { "name": "Parameter_Value_Alternatives_19", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -8981,7 +8998,7 @@ { "name": "Parameter_Value_Alternatives_20", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -9875,8671 +9892,8695 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_dnf-automatic_installed", + "value": "package_sequoia-sq_installed", "remarks": "rule_set_023" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install dnf-automatic Package", + "value": "Install sequoia-sq Package", "remarks": "rule_set_023" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_dnf-automatic_installed", + "value": "package_sequoia-sq_installed", "remarks": "rule_set_023" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install dnf-automatic Package", + "value": "Install sequoia-sq Package", "remarks": "rule_set_023" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "timer_dnf-automatic_enabled", + "value": "package_dnf-automatic_installed", "remarks": "rule_set_024" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable dnf-automatic Timer", + "value": "Install dnf-automatic Package", "remarks": "rule_set_024" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "timer_dnf-automatic_enabled", + "value": "package_dnf-automatic_installed", "remarks": "rule_set_024" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable dnf-automatic Timer", + "value": "Install dnf-automatic Package", "remarks": "rule_set_024" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dnf-automatic_apply_updates", + "value": "timer_dnf-automatic_enabled", "remarks": "rule_set_025" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure dnf-automatic to Install Available Updates Automatically", + "value": "Enable dnf-automatic Timer", "remarks": "rule_set_025" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dnf-automatic_apply_updates", + "value": "timer_dnf-automatic_enabled", "remarks": "rule_set_025" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure dnf-automatic to Install Available Updates Automatically", + "value": "Enable dnf-automatic Timer", "remarks": "rule_set_025" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dnf-automatic_security_updates_only", + "value": "dnf-automatic_apply_updates", "remarks": "rule_set_026" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure dnf-automatic to Install Only Security Updates", + "value": "Configure dnf-automatic to Install Available Updates Automatically", "remarks": "rule_set_026" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dnf-automatic_security_updates_only", + "value": "dnf-automatic_apply_updates", "remarks": "rule_set_026" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure dnf-automatic to Install Only Security Updates", + "value": "Configure dnf-automatic to Install Available Updates Automatically", "remarks": "rule_set_026" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_kea_removed", + "value": "dnf-automatic_security_updates_only", "remarks": "rule_set_027" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall kea Package", + "value": "Configure dnf-automatic to Install Only Security Updates", "remarks": "rule_set_027" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_kea_removed", + "value": "dnf-automatic_security_updates_only", "remarks": "rule_set_027" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall kea Package", + "value": "Configure dnf-automatic to Install Only Security Updates", "remarks": "rule_set_027" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet_removed", + "value": "package_kea_removed", "remarks": "rule_set_028" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove telnet Clients", + "value": "Uninstall kea Package", "remarks": "rule_set_028" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet_removed", + "value": "package_kea_removed", "remarks": "rule_set_028" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove telnet Clients", + "value": "Uninstall kea Package", "remarks": "rule_set_028" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet-server_removed", + "value": "package_telnet_removed", "remarks": "rule_set_029" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall telnet-server Package", + "value": "Remove telnet Clients", "remarks": "rule_set_029" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet-server_removed", + "value": "package_telnet_removed", "remarks": "rule_set_029" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall telnet-server Package", + "value": "Remove telnet Clients", "remarks": "rule_set_029" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_tftp_removed", + "value": "package_telnet-server_removed", "remarks": "rule_set_030" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove tftp Daemon", + "value": "Uninstall telnet-server Package", "remarks": "rule_set_030" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_tftp_removed", + "value": "package_telnet-server_removed", "remarks": "rule_set_030" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove tftp Daemon", + "value": "Uninstall telnet-server Package", "remarks": "rule_set_030" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_tftp-server_removed", + "value": "package_tftp_removed", "remarks": "rule_set_031" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall tftp-server Package", + "value": "Remove tftp Daemon", "remarks": "rule_set_031" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_tftp-server_removed", + "value": "package_tftp_removed", "remarks": "rule_set_031" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall tftp-server Package", + "value": "Remove tftp Daemon", "remarks": "rule_set_031" }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "package_tftp-server_removed", + "remarks": "rule_set_032" + }, + { + "name": "Rule_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Uninstall tftp-server Package", + "remarks": "rule_set_032" + }, + { + "name": "Check_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "package_tftp-server_removed", + "remarks": "rule_set_032" + }, + { + "name": "Check_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Uninstall tftp-server Package", + "remarks": "rule_set_032" + }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_systemauth", - "remarks": "rule_set_032" + "remarks": "rule_set_033" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - system-auth", - "remarks": "rule_set_032" + "remarks": "rule_set_033" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_systemauth", - "remarks": "rule_set_032" + "remarks": "rule_set_033" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - system-auth", - "remarks": "rule_set_032" + "remarks": "rule_set_033" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_rounds_system_auth", - "remarks": "rule_set_033" + "remarks": "rule_set_034" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set number of Password Hashing Rounds - system-auth", - "remarks": "rule_set_033" + "remarks": "rule_set_034" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_rounds_system_auth", - "remarks": "rule_set_033" + "remarks": "rule_set_034" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set number of Password Hashing Rounds - system-auth", - "remarks": "rule_set_033" + "remarks": "rule_set_034" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_rounds_password_auth", - "remarks": "rule_set_034" + "remarks": "rule_set_035" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set number of Password Hashing Rounds - password-auth", - "remarks": "rule_set_034" + "remarks": "rule_set_035" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_rounds_password_auth", - "remarks": "rule_set_034" + "remarks": "rule_set_035" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set number of Password Hashing Rounds - password-auth", - "remarks": "rule_set_034" + "remarks": "rule_set_035" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minclass", - "remarks": "rule_set_035" + "remarks": "rule_set_036" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", - "remarks": "rule_set_035" + "remarks": "rule_set_036" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minclass", - "remarks": "rule_set_035" + "remarks": "rule_set_036" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", - "remarks": "rule_set_035" + "remarks": "rule_set_036" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_password", - "remarks": "rule_set_036" + "remarks": "rule_set_037" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Boot Loader Password in grub2", - "remarks": "rule_set_036" + "remarks": "rule_set_037" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_password", - "remarks": "rule_set_036" + "remarks": "rule_set_037" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Boot Loader Password in grub2", - "remarks": "rule_set_036" + "remarks": "rule_set_037" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_l1tf_argument", - "remarks": "rule_set_037" + "remarks": "rule_set_038" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure L1 Terminal Fault mitigations", - "remarks": "rule_set_037" + "remarks": "rule_set_038" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_l1tf_argument", - "remarks": "rule_set_037" + "remarks": "rule_set_038" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure L1 Terminal Fault mitigations", - "remarks": "rule_set_037" + "remarks": "rule_set_038" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_page_poison_argument", - "remarks": "rule_set_038" + "remarks": "rule_set_039" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable page allocator poisoning", - "remarks": "rule_set_038" + "remarks": "rule_set_039" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_page_poison_argument", - "remarks": "rule_set_038" + "remarks": "rule_set_039" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable page allocator poisoning", - "remarks": "rule_set_038" + "remarks": "rule_set_039" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_pti_argument", - "remarks": "rule_set_039" + "remarks": "rule_set_040" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Page-Table Isolation (KPTI)", - "remarks": "rule_set_039" + "remarks": "rule_set_040" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_pti_argument", - "remarks": "rule_set_039" + "remarks": "rule_set_040" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Page-Table Isolation (KPTI)", - "remarks": "rule_set_039" + "remarks": "rule_set_040" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_slab_nomerge_argument", - "remarks": "rule_set_040" + "remarks": "rule_set_041" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable merging of slabs with similar size", - "remarks": "rule_set_040" + "remarks": "rule_set_041" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_slab_nomerge_argument", - "remarks": "rule_set_040" + "remarks": "rule_set_041" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable merging of slabs with similar size", - "remarks": "rule_set_040" + "remarks": "rule_set_041" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_slub_debug_argument", - "remarks": "rule_set_041" + "remarks": "rule_set_042" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable SLUB/SLAB allocator poisoning", - "remarks": "rule_set_041" + "remarks": "rule_set_042" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_slub_debug_argument", - "remarks": "rule_set_041" + "remarks": "rule_set_042" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable SLUB/SLAB allocator poisoning", - "remarks": "rule_set_041" + "remarks": "rule_set_042" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_spec_store_bypass_disable_argument", - "remarks": "rule_set_042" + "remarks": "rule_set_043" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Speculative Store Bypass Mitigation", - "remarks": "rule_set_042" + "remarks": "rule_set_043" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_spec_store_bypass_disable_argument", - "remarks": "rule_set_042" + "remarks": "rule_set_043" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Speculative Store Bypass Mitigation", - "remarks": "rule_set_042" + "remarks": "rule_set_043" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_spectre_v2_argument", - "remarks": "rule_set_043" + "remarks": "rule_set_044" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Spectre v2 mitigation", - "remarks": "rule_set_043" + "remarks": "rule_set_044" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_spectre_v2_argument", - "remarks": "rule_set_043" + "remarks": "rule_set_044" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Spectre v2 mitigation", - "remarks": "rule_set_043" + "remarks": "rule_set_044" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_mds_argument", - "remarks": "rule_set_044" + "remarks": "rule_set_045" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Microarchitectural Data Sampling mitigation", - "remarks": "rule_set_044" + "remarks": "rule_set_045" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_mds_argument", - "remarks": "rule_set_044" + "remarks": "rule_set_045" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Microarchitectural Data Sampling mitigation", - "remarks": "rule_set_044" + "remarks": "rule_set_045" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_mce_argument", - "remarks": "rule_set_045" + "remarks": "rule_set_046" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Force kernel panic on uncorrected MCEs", - "remarks": "rule_set_045" + "remarks": "rule_set_046" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_mce_argument", - "remarks": "rule_set_045" + "remarks": "rule_set_046" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Force kernel panic on uncorrected MCEs", - "remarks": "rule_set_045" + "remarks": "rule_set_046" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_page_alloc_shuffle_argument", - "remarks": "rule_set_046" + "remarks": "rule_set_047" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable randomization of the page allocator", - "remarks": "rule_set_046" + "remarks": "rule_set_047" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_page_alloc_shuffle_argument", - "remarks": "rule_set_046" + "remarks": "rule_set_047" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable randomization of the page allocator", - "remarks": "rule_set_046" + "remarks": "rule_set_047" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_rng_core_default_quality_argument", - "remarks": "rule_set_047" + "remarks": "rule_set_048" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the confidence in TPM for entropy", - "remarks": "rule_set_047" + "remarks": "rule_set_048" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_rng_core_default_quality_argument", - "remarks": "rule_set_047" + "remarks": "rule_set_048" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the confidence in TPM for entropy", - "remarks": "rule_set_047" + "remarks": "rule_set_048" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_vm_mmap_min_addr", - "remarks": "rule_set_048" + "remarks": "rule_set_049" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent applications from mapping low portion of virtual memory", - "remarks": "rule_set_048" + "remarks": "rule_set_049" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_vm_mmap_min_addr", - "remarks": "rule_set_048" + "remarks": "rule_set_049" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent applications from mapping low portion of virtual memory", - "remarks": "rule_set_048" + "remarks": "rule_set_049" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_dmesg_restrict", - "remarks": "rule_set_049" + "remarks": "rule_set_050" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Access to Kernel Message Buffer", - "remarks": "rule_set_049" + "remarks": "rule_set_050" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_dmesg_restrict", - "remarks": "rule_set_049" + "remarks": "rule_set_050" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Access to Kernel Message Buffer", - "remarks": "rule_set_049" + "remarks": "rule_set_050" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_kptr_restrict", - "remarks": "rule_set_050" + "remarks": "rule_set_051" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Exposed Kernel Pointer Addresses Access", - "remarks": "rule_set_050" + "remarks": "rule_set_051" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_kptr_restrict", - "remarks": "rule_set_050" + "remarks": "rule_set_051" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Exposed Kernel Pointer Addresses Access", - "remarks": "rule_set_050" + "remarks": "rule_set_051" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_pid_max", - "remarks": "rule_set_051" + "remarks": "rule_set_052" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure maximum number of process identifiers", - "remarks": "rule_set_051" + "remarks": "rule_set_052" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_pid_max", - "remarks": "rule_set_051" + "remarks": "rule_set_052" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure maximum number of process identifiers", - "remarks": "rule_set_051" + "remarks": "rule_set_052" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_perf_event_max_sample_rate", - "remarks": "rule_set_052" + "remarks": "rule_set_053" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit sampling frequency of the Perf system", - "remarks": "rule_set_052" + "remarks": "rule_set_053" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_perf_event_max_sample_rate", - "remarks": "rule_set_052" + "remarks": "rule_set_053" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit sampling frequency of the Perf system", - "remarks": "rule_set_052" + "remarks": "rule_set_053" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_perf_cpu_time_max_percent", - "remarks": "rule_set_053" + "remarks": "rule_set_054" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit CPU consumption of the Perf system", - "remarks": "rule_set_053" + "remarks": "rule_set_054" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_perf_cpu_time_max_percent", - "remarks": "rule_set_053" + "remarks": "rule_set_054" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit CPU consumption of the Perf system", - "remarks": "rule_set_053" + "remarks": "rule_set_054" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_perf_event_paranoid", - "remarks": "rule_set_054" + "remarks": "rule_set_055" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disallow kernel profiling by unprivileged users", - "remarks": "rule_set_054" + "remarks": "rule_set_055" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_perf_event_paranoid", - "remarks": "rule_set_054" + "remarks": "rule_set_055" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disallow kernel profiling by unprivileged users", - "remarks": "rule_set_054" + "remarks": "rule_set_055" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_randomize_va_space", - "remarks": "rule_set_055" + "remarks": "rule_set_056" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Randomized Layout of Virtual Address Space", - "remarks": "rule_set_055" + "remarks": "rule_set_056" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_randomize_va_space", - "remarks": "rule_set_055" + "remarks": "rule_set_056" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Randomized Layout of Virtual Address Space", - "remarks": "rule_set_055" + "remarks": "rule_set_056" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_sysrq", - "remarks": "rule_set_056" + "remarks": "rule_set_057" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disallow magic SysRq key", - "remarks": "rule_set_056" + "remarks": "rule_set_057" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_sysrq", - "remarks": "rule_set_056" + "remarks": "rule_set_057" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disallow magic SysRq key", - "remarks": "rule_set_056" + "remarks": "rule_set_057" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_unprivileged_bpf_disabled", - "remarks": "rule_set_057" + "remarks": "rule_set_058" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Access to Network bpf() Syscall From Unprivileged Processes", - "remarks": "rule_set_057" + "remarks": "rule_set_058" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_unprivileged_bpf_disabled", - "remarks": "rule_set_057" + "remarks": "rule_set_058" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Access to Network bpf() Syscall From Unprivileged Processes", - "remarks": "rule_set_057" + "remarks": "rule_set_058" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_panic_on_oops", - "remarks": "rule_set_058" + "remarks": "rule_set_059" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Kernel panic on oops", - "remarks": "rule_set_058" + "remarks": "rule_set_059" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_panic_on_oops", - "remarks": "rule_set_058" + "remarks": "rule_set_059" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Kernel panic on oops", - "remarks": "rule_set_058" + "remarks": "rule_set_059" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_yama_ptrace_scope", - "remarks": "rule_set_059" + "remarks": "rule_set_060" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict usage of ptrace to descendant processes", - "remarks": "rule_set_059" + "remarks": "rule_set_060" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_yama_ptrace_scope", - "remarks": "rule_set_059" + "remarks": "rule_set_060" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict usage of ptrace to descendant processes", - "remarks": "rule_set_059" + "remarks": "rule_set_060" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_core_bpf_jit_harden", - "remarks": "rule_set_060" + "remarks": "rule_set_061" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Harden the operation of the BPF just-in-time compiler", - "remarks": "rule_set_060" + "remarks": "rule_set_061" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_core_bpf_jit_harden", - "remarks": "rule_set_060" + "remarks": "rule_set_061" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Harden the operation of the BPF just-in-time compiler", - "remarks": "rule_set_060" + "remarks": "rule_set_061" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_ip_forward", - "remarks": "rule_set_061" + "remarks": "rule_set_062" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IP Forwarding on IPv4 Interfaces", - "remarks": "rule_set_061" + "remarks": "rule_set_062" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_ip_forward", - "remarks": "rule_set_061" + "remarks": "rule_set_062" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IP Forwarding on IPv4 Interfaces", - "remarks": "rule_set_061" + "remarks": "rule_set_062" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_local", - "remarks": "rule_set_062" + "remarks": "rule_set_063" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting Packets Routed Between Local Interfaces", - "remarks": "rule_set_062" + "remarks": "rule_set_063" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_local", - "remarks": "rule_set_062" + "remarks": "rule_set_063" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting Packets Routed Between Local Interfaces", - "remarks": "rule_set_062" + "remarks": "rule_set_063" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_redirects", - "remarks": "rule_set_063" + "remarks": "rule_set_064" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv4 Interfaces", - "remarks": "rule_set_063" + "remarks": "rule_set_064" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_redirects", - "remarks": "rule_set_063" + "remarks": "rule_set_064" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv4 Interfaces", - "remarks": "rule_set_063" + "remarks": "rule_set_064" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_redirects", - "remarks": "rule_set_064" + "remarks": "rule_set_065" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv4 Interfaces", - "remarks": "rule_set_064" + "remarks": "rule_set_065" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_redirects", - "remarks": "rule_set_064" + "remarks": "rule_set_065" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv4 Interfaces", - "remarks": "rule_set_064" + "remarks": "rule_set_065" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_secure_redirects", - "remarks": "rule_set_065" + "remarks": "rule_set_066" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Secure ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_065" + "remarks": "rule_set_066" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_secure_redirects", - "remarks": "rule_set_065" + "remarks": "rule_set_066" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Secure ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_065" + "remarks": "rule_set_066" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_secure_redirects", - "remarks": "rule_set_066" + "remarks": "rule_set_067" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Kernel Parameter for Accepting Secure Redirects By Default", - "remarks": "rule_set_066" + "remarks": "rule_set_067" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_secure_redirects", - "remarks": "rule_set_066" + "remarks": "rule_set_067" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Kernel Parameter for Accepting Secure Redirects By Default", - "remarks": "rule_set_066" + "remarks": "rule_set_067" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_shared_media", - "remarks": "rule_set_067" + "remarks": "rule_set_068" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Sending and Accepting Shared Media Redirects for All IPv4 Interfaces", - "remarks": "rule_set_067" + "remarks": "rule_set_068" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_shared_media", - "remarks": "rule_set_067" + "remarks": "rule_set_068" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Sending and Accepting Shared Media Redirects for All IPv4 Interfaces", - "remarks": "rule_set_067" + "remarks": "rule_set_068" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_shared_media", - "remarks": "rule_set_068" + "remarks": "rule_set_069" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Sending and Accepting Shared Media Redirects by Default", - "remarks": "rule_set_068" + "remarks": "rule_set_069" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_shared_media", - "remarks": "rule_set_068" + "remarks": "rule_set_069" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Sending and Accepting Shared Media Redirects by Default", - "remarks": "rule_set_068" + "remarks": "rule_set_069" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_source_route", - "remarks": "rule_set_069" + "remarks": "rule_set_070" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces", - "remarks": "rule_set_069" + "remarks": "rule_set_070" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_source_route", - "remarks": "rule_set_069" + "remarks": "rule_set_070" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces", - "remarks": "rule_set_069" + "remarks": "rule_set_070" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_source_route", - "remarks": "rule_set_070" + "remarks": "rule_set_071" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv4 Interfaces by Default", - "remarks": "rule_set_070" + "remarks": "rule_set_071" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_source_route", - "remarks": "rule_set_070" + "remarks": "rule_set_071" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv4 Interfaces by Default", - "remarks": "rule_set_070" + "remarks": "rule_set_071" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_arp_filter", - "remarks": "rule_set_071" + "remarks": "rule_set_072" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure ARP filtering for All IPv4 Interfaces", - "remarks": "rule_set_071" + "remarks": "rule_set_072" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_arp_filter", - "remarks": "rule_set_071" + "remarks": "rule_set_072" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure ARP filtering for All IPv4 Interfaces", - "remarks": "rule_set_071" + "remarks": "rule_set_072" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_arp_ignore", - "remarks": "rule_set_072" + "remarks": "rule_set_073" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Response Mode of ARP Requests for All IPv4 Interfaces", - "remarks": "rule_set_072" + "remarks": "rule_set_073" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_arp_ignore", - "remarks": "rule_set_072" + "remarks": "rule_set_073" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Response Mode of ARP Requests for All IPv4 Interfaces", - "remarks": "rule_set_072" + "remarks": "rule_set_073" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_route_localnet", - "remarks": "rule_set_073" + "remarks": "rule_set_074" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent Routing External Traffic to Local Loopback on All IPv4 Interfaces", - "remarks": "rule_set_073" + "remarks": "rule_set_074" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_route_localnet", - "remarks": "rule_set_073" + "remarks": "rule_set_074" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent Routing External Traffic to Local Loopback on All IPv4 Interfaces", - "remarks": "rule_set_073" + "remarks": "rule_set_074" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_drop_gratuitous_arp", - "remarks": "rule_set_074" + "remarks": "rule_set_075" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Drop Gratuitous ARP frames on All IPv4 Interfaces", - "remarks": "rule_set_074" + "remarks": "rule_set_075" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_drop_gratuitous_arp", - "remarks": "rule_set_074" + "remarks": "rule_set_075" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Drop Gratuitous ARP frames on All IPv4 Interfaces", - "remarks": "rule_set_074" + "remarks": "rule_set_075" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_rp_filter", - "remarks": "rule_set_075" + "remarks": "rule_set_076" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces", - "remarks": "rule_set_075" + "remarks": "rule_set_076" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_rp_filter", - "remarks": "rule_set_075" + "remarks": "rule_set_076" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces", - "remarks": "rule_set_075" + "remarks": "rule_set_076" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_rp_filter", - "remarks": "rule_set_076" + "remarks": "rule_set_077" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces by Default", - "remarks": "rule_set_076" + "remarks": "rule_set_077" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_rp_filter", - "remarks": "rule_set_076" + "remarks": "rule_set_077" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces by Default", - "remarks": "rule_set_076" + "remarks": "rule_set_077" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_send_redirects", - "remarks": "rule_set_077" + "remarks": "rule_set_078" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_077" + "remarks": "rule_set_078" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_send_redirects", - "remarks": "rule_set_077" + "remarks": "rule_set_078" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_077" + "remarks": "rule_set_078" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_send_redirects", - "remarks": "rule_set_078" + "remarks": "rule_set_079" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces by Default", - "remarks": "rule_set_078" + "remarks": "rule_set_079" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_send_redirects", - "remarks": "rule_set_078" + "remarks": "rule_set_079" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces by Default", - "remarks": "rule_set_078" + "remarks": "rule_set_079" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses", - "remarks": "rule_set_079" + "remarks": "rule_set_080" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Ignore Bogus ICMP Error Responses on IPv4 Interfaces", - "remarks": "rule_set_079" + "remarks": "rule_set_080" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses", - "remarks": "rule_set_079" + "remarks": "rule_set_080" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Ignore Bogus ICMP Error Responses on IPv4 Interfaces", - "remarks": "rule_set_079" + "remarks": "rule_set_080" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_ip_local_port_range", - "remarks": "rule_set_080" + "remarks": "rule_set_081" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Kernel Parameter to Increase Local Port Range", - "remarks": "rule_set_080" + "remarks": "rule_set_081" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_ip_local_port_range", - "remarks": "rule_set_080" + "remarks": "rule_set_081" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Kernel Parameter to Increase Local Port Range", - "remarks": "rule_set_080" + "remarks": "rule_set_081" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_tcp_rfc1337", - "remarks": "rule_set_081" + "remarks": "rule_set_082" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use TCP RFC 1337 on IPv4 Interfaces", - "remarks": "rule_set_081" + "remarks": "rule_set_082" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_tcp_rfc1337", - "remarks": "rule_set_081" + "remarks": "rule_set_082" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use TCP RFC 1337 on IPv4 Interfaces", - "remarks": "rule_set_081" + "remarks": "rule_set_082" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_tcp_syncookies", - "remarks": "rule_set_082" + "remarks": "rule_set_083" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use TCP Syncookies on Network Interfaces", - "remarks": "rule_set_082" + "remarks": "rule_set_083" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_tcp_syncookies", - "remarks": "rule_set_082" + "remarks": "rule_set_083" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use TCP Syncookies on Network Interfaces", - "remarks": "rule_set_082" + "remarks": "rule_set_083" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_router_solicitations", - "remarks": "rule_set_083" + "remarks": "rule_set_084" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Denying Router Solicitations on All IPv6 Interfaces", - "remarks": "rule_set_083" + "remarks": "rule_set_084" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_router_solicitations", - "remarks": "rule_set_083" + "remarks": "rule_set_084" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Denying Router Solicitations on All IPv6 Interfaces", - "remarks": "rule_set_083" + "remarks": "rule_set_084" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_router_solicitations", - "remarks": "rule_set_084" + "remarks": "rule_set_085" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Denying Router Solicitations on All IPv6 Interfaces By Default", - "remarks": "rule_set_084" + "remarks": "rule_set_085" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_router_solicitations", - "remarks": "rule_set_084" + "remarks": "rule_set_085" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Denying Router Solicitations on All IPv6 Interfaces By Default", - "remarks": "rule_set_084" + "remarks": "rule_set_085" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_ra_rtr_pref", - "remarks": "rule_set_085" + "remarks": "rule_set_086" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Router Preference in Router Advertisements on All IPv6 Interfaces", - "remarks": "rule_set_085" + "remarks": "rule_set_086" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_ra_rtr_pref", - "remarks": "rule_set_085" + "remarks": "rule_set_086" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Router Preference in Router Advertisements on All IPv6 Interfaces", - "remarks": "rule_set_085" + "remarks": "rule_set_086" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_ra_rtr_pref", - "remarks": "rule_set_086" + "remarks": "rule_set_087" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Router Preference in Router Advertisements on All IPv6 Interfaces By Default", - "remarks": "rule_set_086" + "remarks": "rule_set_087" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_ra_rtr_pref", - "remarks": "rule_set_086" + "remarks": "rule_set_087" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Router Preference in Router Advertisements on All IPv6 Interfaces By Default", - "remarks": "rule_set_086" + "remarks": "rule_set_087" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_ra_pinfo", - "remarks": "rule_set_087" + "remarks": "rule_set_088" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Prefix Information in Router Advertisements on All IPv6 Interfaces", - "remarks": "rule_set_087" + "remarks": "rule_set_088" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_ra_pinfo", - "remarks": "rule_set_087" + "remarks": "rule_set_088" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Prefix Information in Router Advertisements on All IPv6 Interfaces", - "remarks": "rule_set_087" + "remarks": "rule_set_088" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_ra_pinfo", - "remarks": "rule_set_088" + "remarks": "rule_set_089" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Prefix Information in Router Advertisements on All IPv6 Interfaces By Default", - "remarks": "rule_set_088" + "remarks": "rule_set_089" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_ra_pinfo", - "remarks": "rule_set_088" + "remarks": "rule_set_089" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Prefix Information in Router Advertisements on All IPv6 Interfaces By Default", - "remarks": "rule_set_088" + "remarks": "rule_set_089" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_ra_defrtr", - "remarks": "rule_set_089" + "remarks": "rule_set_090" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Default Router in Router Advertisements on All IPv6 Interfaces", - "remarks": "rule_set_089" + "remarks": "rule_set_090" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_ra_defrtr", - "remarks": "rule_set_089" + "remarks": "rule_set_090" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Default Router in Router Advertisements on All IPv6 Interfaces", - "remarks": "rule_set_089" + "remarks": "rule_set_090" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_ra_defrtr", - "remarks": "rule_set_090" + "remarks": "rule_set_091" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Default Router in Router Advertisements on All IPv6 Interfaces By Default", - "remarks": "rule_set_090" + "remarks": "rule_set_091" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_ra_defrtr", - "remarks": "rule_set_090" + "remarks": "rule_set_091" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Default Router in Router Advertisements on All IPv6 Interfaces By Default", - "remarks": "rule_set_090" + "remarks": "rule_set_091" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_autoconf", - "remarks": "rule_set_091" + "remarks": "rule_set_092" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Auto Configuration on All IPv6 Interfaces", - "remarks": "rule_set_091" + "remarks": "rule_set_092" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_autoconf", - "remarks": "rule_set_091" + "remarks": "rule_set_092" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Auto Configuration on All IPv6 Interfaces", - "remarks": "rule_set_091" + "remarks": "rule_set_092" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_autoconf", - "remarks": "rule_set_092" + "remarks": "rule_set_093" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Auto Configuration on All IPv6 Interfaces By Default", - "remarks": "rule_set_092" + "remarks": "rule_set_093" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_autoconf", - "remarks": "rule_set_092" + "remarks": "rule_set_093" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Auto Configuration on All IPv6 Interfaces By Default", - "remarks": "rule_set_092" + "remarks": "rule_set_093" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_redirects", - "remarks": "rule_set_093" + "remarks": "rule_set_094" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv6 Interfaces", - "remarks": "rule_set_093" + "remarks": "rule_set_094" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_redirects", - "remarks": "rule_set_093" + "remarks": "rule_set_094" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv6 Interfaces", - "remarks": "rule_set_093" + "remarks": "rule_set_094" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_redirects", - "remarks": "rule_set_094" + "remarks": "rule_set_095" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv6 Interfaces", - "remarks": "rule_set_094" + "remarks": "rule_set_095" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_redirects", - "remarks": "rule_set_094" + "remarks": "rule_set_095" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv6 Interfaces", - "remarks": "rule_set_094" + "remarks": "rule_set_095" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_source_route", - "remarks": "rule_set_095" + "remarks": "rule_set_096" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv6 Interfaces", - "remarks": "rule_set_095" + "remarks": "rule_set_096" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_source_route", - "remarks": "rule_set_095" + "remarks": "rule_set_096" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv6 Interfaces", - "remarks": "rule_set_095" + "remarks": "rule_set_096" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_source_route", - "remarks": "rule_set_096" + "remarks": "rule_set_097" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv6 Interfaces by Default", - "remarks": "rule_set_096" + "remarks": "rule_set_097" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_source_route", - "remarks": "rule_set_096" + "remarks": "rule_set_097" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv6 Interfaces by Default", - "remarks": "rule_set_096" + "remarks": "rule_set_097" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_max_addresses", - "remarks": "rule_set_097" + "remarks": "rule_set_098" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Maximum Number of Autoconfigured Addresses on All IPv6 Interfaces", - "remarks": "rule_set_097" + "remarks": "rule_set_098" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_max_addresses", - "remarks": "rule_set_097" + "remarks": "rule_set_098" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Maximum Number of Autoconfigured Addresses on All IPv6 Interfaces", - "remarks": "rule_set_097" + "remarks": "rule_set_098" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_max_addresses", - "remarks": "rule_set_098" + "remarks": "rule_set_099" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Maximum Number of Autoconfigured Addresses on All IPv6 Interfaces By Default", - "remarks": "rule_set_098" + "remarks": "rule_set_099" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_max_addresses", - "remarks": "rule_set_098" + "remarks": "rule_set_099" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Maximum Number of Autoconfigured Addresses on All IPv6 Interfaces By Default", - "remarks": "rule_set_098" + "remarks": "rule_set_099" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_suid_dumpable", - "remarks": "rule_set_099" + "remarks": "rule_set_100" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Core Dumps for SUID programs", - "remarks": "rule_set_099" + "remarks": "rule_set_100" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_suid_dumpable", - "remarks": "rule_set_099" + "remarks": "rule_set_100" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Core Dumps for SUID programs", - "remarks": "rule_set_099" + "remarks": "rule_set_100" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_fifos", - "remarks": "rule_set_100" + "remarks": "rule_set_101" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on FIFOs", - "remarks": "rule_set_100" + "remarks": "rule_set_101" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_fifos", - "remarks": "rule_set_100" + "remarks": "rule_set_101" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on FIFOs", - "remarks": "rule_set_100" + "remarks": "rule_set_101" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_regular", - "remarks": "rule_set_101" + "remarks": "rule_set_102" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Regular files", - "remarks": "rule_set_101" + "remarks": "rule_set_102" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_regular", - "remarks": "rule_set_101" + "remarks": "rule_set_102" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Regular files", - "remarks": "rule_set_101" + "remarks": "rule_set_102" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_symlinks", - "remarks": "rule_set_102" + "remarks": "rule_set_103" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", - "remarks": "rule_set_102" + "remarks": "rule_set_103" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_symlinks", - "remarks": "rule_set_102" + "remarks": "rule_set_103" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", - "remarks": "rule_set_102" + "remarks": "rule_set_103" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_hardlinks", - "remarks": "rule_set_103" + "remarks": "rule_set_104" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Hardlinks", - "remarks": "rule_set_103" + "remarks": "rule_set_104" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_hardlinks", - "remarks": "rule_set_103" + "remarks": "rule_set_104" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Hardlinks", - "remarks": "rule_set_103" + "remarks": "rule_set_104" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_nodev_nonroot_local_partitions", - "remarks": "rule_set_104" + "remarks": "rule_set_105" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nodev Option to Non-Root Local Partitions", - "remarks": "rule_set_104" + "remarks": "rule_set_105" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_nodev_nonroot_local_partitions", - "remarks": "rule_set_104" + "remarks": "rule_set_105" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nodev Option to Non-Root Local Partitions", - "remarks": "rule_set_104" + "remarks": "rule_set_105" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_boot", - "remarks": "rule_set_105" + "remarks": "rule_set_106" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /boot Located On Separate Partition", - "remarks": "rule_set_105" + "remarks": "rule_set_106" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_boot", - "remarks": "rule_set_105" + "remarks": "rule_set_106" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /boot Located On Separate Partition", - "remarks": "rule_set_105" + "remarks": "rule_set_106" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_boot_nosuid", - "remarks": "rule_set_106" + "remarks": "rule_set_107" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /boot", - "remarks": "rule_set_106" + "remarks": "rule_set_107" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_boot_nosuid", - "remarks": "rule_set_106" + "remarks": "rule_set_107" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /boot", - "remarks": "rule_set_106" + "remarks": "rule_set_107" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_boot_noexec", - "remarks": "rule_set_107" + "remarks": "rule_set_108" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add noexec Option to /boot", - "remarks": "rule_set_107" + "remarks": "rule_set_108" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_boot_noexec", - "remarks": "rule_set_107" + "remarks": "rule_set_108" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add noexec Option to /boot", - "remarks": "rule_set_107" + "remarks": "rule_set_108" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_opt", - "remarks": "rule_set_108" + "remarks": "rule_set_109" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /opt Located On Separate Partition", - "remarks": "rule_set_108" + "remarks": "rule_set_109" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_opt", - "remarks": "rule_set_108" + "remarks": "rule_set_109" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /opt Located On Separate Partition", - "remarks": "rule_set_108" + "remarks": "rule_set_109" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_opt_nosuid", - "remarks": "rule_set_109" + "remarks": "rule_set_110" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /opt", - "remarks": "rule_set_109" + "remarks": "rule_set_110" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_opt_nosuid", - "remarks": "rule_set_109" + "remarks": "rule_set_110" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /opt", - "remarks": "rule_set_109" + "remarks": "rule_set_110" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "systemd_tmp_mount_enabled", - "remarks": "rule_set_110" + "remarks": "rule_set_111" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure tmp.mount Unit Is Enabled", - "remarks": "rule_set_110" + "remarks": "rule_set_111" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "systemd_tmp_mount_enabled", - "remarks": "rule_set_110" + "remarks": "rule_set_111" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure tmp.mount Unit Is Enabled", - "remarks": "rule_set_110" + "remarks": "rule_set_111" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_tmp_nosuid", - "remarks": "rule_set_111" + "remarks": "rule_set_112" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /tmp", - "remarks": "rule_set_111" + "remarks": "rule_set_112" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_tmp_nosuid", - "remarks": "rule_set_111" + "remarks": "rule_set_112" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /tmp", - "remarks": "rule_set_111" + "remarks": "rule_set_112" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_tmp_noexec", - "remarks": "rule_set_112" + "remarks": "rule_set_113" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add noexec Option to /tmp", - "remarks": "rule_set_112" + "remarks": "rule_set_113" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_tmp_noexec", - "remarks": "rule_set_112" + "remarks": "rule_set_113" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add noexec Option to /tmp", - "remarks": "rule_set_112" + "remarks": "rule_set_113" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_srv", - "remarks": "rule_set_113" + "remarks": "rule_set_114" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /srv Located On Separate Partition", - "remarks": "rule_set_113" + "remarks": "rule_set_114" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_srv", - "remarks": "rule_set_113" + "remarks": "rule_set_114" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /srv Located On Separate Partition", - "remarks": "rule_set_113" + "remarks": "rule_set_114" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_srv_nosuid", - "remarks": "rule_set_114" + "remarks": "rule_set_115" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /srv", - "remarks": "rule_set_114" + "remarks": "rule_set_115" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_srv_nosuid", - "remarks": "rule_set_114" + "remarks": "rule_set_115" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /srv", - "remarks": "rule_set_114" + "remarks": "rule_set_115" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_home", - "remarks": "rule_set_115" + "remarks": "rule_set_116" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /home Located On Separate Partition", - "remarks": "rule_set_115" + "remarks": "rule_set_116" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_home", - "remarks": "rule_set_115" + "remarks": "rule_set_116" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /home Located On Separate Partition", - "remarks": "rule_set_115" + "remarks": "rule_set_116" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_home_nosuid", - "remarks": "rule_set_116" + "remarks": "rule_set_117" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /home", - "remarks": "rule_set_116" + "remarks": "rule_set_117" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_home_nosuid", - "remarks": "rule_set_116" + "remarks": "rule_set_117" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /home", - "remarks": "rule_set_116" + "remarks": "rule_set_117" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_home_noexec", - "remarks": "rule_set_117" + "remarks": "rule_set_118" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add noexec Option to /home", - "remarks": "rule_set_117" + "remarks": "rule_set_118" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_home_noexec", - "remarks": "rule_set_117" + "remarks": "rule_set_118" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add noexec Option to /home", - "remarks": "rule_set_117" + "remarks": "rule_set_118" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_usr", - "remarks": "rule_set_118" + "remarks": "rule_set_119" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /usr Located On Separate Partition", - "remarks": "rule_set_118" + "remarks": "rule_set_119" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_usr", - "remarks": "rule_set_118" + "remarks": "rule_set_119" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /usr Located On Separate Partition", - "remarks": "rule_set_118" + "remarks": "rule_set_119" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var", - "remarks": "rule_set_119" + "remarks": "rule_set_120" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var Located On Separate Partition", - "remarks": "rule_set_119" + "remarks": "rule_set_120" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var", - "remarks": "rule_set_119" + "remarks": "rule_set_120" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var Located On Separate Partition", - "remarks": "rule_set_119" + "remarks": "rule_set_120" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_var_nosuid", - "remarks": "rule_set_120" + "remarks": "rule_set_121" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /var", - "remarks": "rule_set_120" + "remarks": "rule_set_121" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_var_nosuid", - "remarks": "rule_set_120" + "remarks": "rule_set_121" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /var", - "remarks": "rule_set_120" + "remarks": "rule_set_121" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_var_noexec", - "remarks": "rule_set_121" + "remarks": "rule_set_122" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add noexec Option to /var", - "remarks": "rule_set_121" + "remarks": "rule_set_122" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_var_noexec", - "remarks": "rule_set_121" + "remarks": "rule_set_122" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add noexec Option to /var", - "remarks": "rule_set_121" + "remarks": "rule_set_122" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log", - "remarks": "rule_set_122" + "remarks": "rule_set_123" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log Located On Separate Partition", - "remarks": "rule_set_122" + "remarks": "rule_set_123" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log", - "remarks": "rule_set_122" + "remarks": "rule_set_123" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log Located On Separate Partition", - "remarks": "rule_set_122" + "remarks": "rule_set_123" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_var_log_noexec", - "remarks": "rule_set_123" + "remarks": "rule_set_124" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add noexec Option to /var/log", - "remarks": "rule_set_123" + "remarks": "rule_set_124" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_var_log_noexec", - "remarks": "rule_set_123" + "remarks": "rule_set_124" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add noexec Option to /var/log", - "remarks": "rule_set_123" + "remarks": "rule_set_124" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_var_log_nosuid", - "remarks": "rule_set_124" + "remarks": "rule_set_125" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /var/log", - "remarks": "rule_set_124" + "remarks": "rule_set_125" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_var_log_nosuid", - "remarks": "rule_set_124" + "remarks": "rule_set_125" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /var/log", - "remarks": "rule_set_124" + "remarks": "rule_set_125" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_tmp", - "remarks": "rule_set_125" + "remarks": "rule_set_126" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/tmp Located On Separate Partition", - "remarks": "rule_set_125" + "remarks": "rule_set_126" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_tmp", - "remarks": "rule_set_125" + "remarks": "rule_set_126" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/tmp Located On Separate Partition", - "remarks": "rule_set_125" + "remarks": "rule_set_126" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_var_tmp_nosuid", - "remarks": "rule_set_126" + "remarks": "rule_set_127" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /var/tmp", - "remarks": "rule_set_126" + "remarks": "rule_set_127" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_var_tmp_nosuid", - "remarks": "rule_set_126" + "remarks": "rule_set_127" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /var/tmp", - "remarks": "rule_set_126" + "remarks": "rule_set_127" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_var_tmp_noexec", - "remarks": "rule_set_127" + "remarks": "rule_set_128" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add noexec Option to /var/tmp", - "remarks": "rule_set_127" + "remarks": "rule_set_128" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_var_tmp_noexec", - "remarks": "rule_set_127" + "remarks": "rule_set_128" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add noexec Option to /var/tmp", - "remarks": "rule_set_127" + "remarks": "rule_set_128" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "logind_session_timeout", - "remarks": "rule_set_128" + "remarks": "rule_set_129" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Logind to terminate idle sessions after certain time of inactivity", - "remarks": "rule_set_128" + "remarks": "rule_set_129" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "logind_session_timeout", - "remarks": "rule_set_128" + "remarks": "rule_set_129" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Logind to terminate idle sessions after certain time of inactivity", - "remarks": "rule_set_128" + "remarks": "rule_set_129" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_tmout", - "remarks": "rule_set_129" + "remarks": "rule_set_130" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Interactive Session Timeout", - "remarks": "rule_set_129" + "remarks": "rule_set_130" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_tmout", - "remarks": "rule_set_129" + "remarks": "rule_set_130" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Interactive Session Timeout", - "remarks": "rule_set_129" + "remarks": "rule_set_130" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_direct_root_logins", - "remarks": "rule_set_130" + "remarks": "rule_set_131" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Direct root Logins Not Allowed", - "remarks": "rule_set_130" + "remarks": "rule_set_131" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_direct_root_logins", - "remarks": "rule_set_130" + "remarks": "rule_set_131" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Direct root Logins Not Allowed", - "remarks": "rule_set_130" + "remarks": "rule_set_131" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_root_login", - "remarks": "rule_set_131" + "remarks": "rule_set_132" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Root Login", - "remarks": "rule_set_131" + "remarks": "rule_set_132" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_root_login", - "remarks": "rule_set_131" + "remarks": "rule_set_132" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Root Login", - "remarks": "rule_set_131" + "remarks": "rule_set_132" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_sudo_installed", - "remarks": "rule_set_132" + "remarks": "rule_set_133" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install sudo Package", - "remarks": "rule_set_132" + "remarks": "rule_set_133" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_sudo_installed", - "remarks": "rule_set_132" + "remarks": "rule_set_133" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install sudo Package", - "remarks": "rule_set_132" + "remarks": "rule_set_133" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_sudo", - "remarks": "rule_set_133" + "remarks": "rule_set_134" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - sudo", - "remarks": "rule_set_133" + "remarks": "rule_set_134" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_sudo", - "remarks": "rule_set_133" + "remarks": "rule_set_134" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - sudo", - "remarks": "rule_set_133" + "remarks": "rule_set_134" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_auditd_enabled", - "remarks": "rule_set_134" + "remarks": "rule_set_135" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable auditd Service", - "remarks": "rule_set_134" + "remarks": "rule_set_135" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_auditd_enabled", - "remarks": "rule_set_134" + "remarks": "rule_set_135" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable auditd Service", - "remarks": "rule_set_134" + "remarks": "rule_set_135" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit_installed", - "remarks": "rule_set_135" + "remarks": "rule_set_136" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit Subsystem is Installed", - "remarks": "rule_set_135" + "remarks": "rule_set_136" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit_installed", - "remarks": "rule_set_135" + "remarks": "rule_set_136" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit Subsystem is Installed", - "remarks": "rule_set_135" + "remarks": "rule_set_136" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_noexec", - "remarks": "rule_set_136" + "remarks": "rule_set_137" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Privileged Escalated Commands Cannot Execute Other Commands - sudo NOEXEC", - "remarks": "rule_set_136" + "remarks": "rule_set_137" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_noexec", - "remarks": "rule_set_136" + "remarks": "rule_set_137" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Privileged Escalated Commands Cannot Execute Other Commands - sudo NOEXEC", - "remarks": "rule_set_136" + "remarks": "rule_set_137" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_requiretty", - "remarks": "rule_set_137" + "remarks": "rule_set_138" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo requiretty", - "remarks": "rule_set_137" + "remarks": "rule_set_138" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_requiretty", - "remarks": "rule_set_137" + "remarks": "rule_set_138" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo requiretty", - "remarks": "rule_set_137" + "remarks": "rule_set_138" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_use_pty", - "remarks": "rule_set_138" + "remarks": "rule_set_139" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo use_pty", - "remarks": "rule_set_138" + "remarks": "rule_set_139" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_use_pty", - "remarks": "rule_set_138" + "remarks": "rule_set_139" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo use_pty", - "remarks": "rule_set_138" + "remarks": "rule_set_139" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_ignore_dot", - "remarks": "rule_set_139" + "remarks": "rule_set_140" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure sudo Ignores Commands In Current Dir - sudo ignore_dot", - "remarks": "rule_set_139" + "remarks": "rule_set_140" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_ignore_dot", - "remarks": "rule_set_139" + "remarks": "rule_set_140" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure sudo Ignores Commands In Current Dir - sudo ignore_dot", - "remarks": "rule_set_139" + "remarks": "rule_set_140" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_env_reset", - "remarks": "rule_set_140" + "remarks": "rule_set_141" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure sudo Runs In A Minimal Environment - sudo env_reset", - "remarks": "rule_set_140" + "remarks": "rule_set_141" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_env_reset", - "remarks": "rule_set_140" + "remarks": "rule_set_141" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure sudo Runs In A Minimal Environment - sudo env_reset", - "remarks": "rule_set_140" + "remarks": "rule_set_141" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudoers_no_root_target", - "remarks": "rule_set_141" + "remarks": "rule_set_142" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Don't target root user in the sudoers file", - "remarks": "rule_set_141" + "remarks": "rule_set_142" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudoers_no_root_target", - "remarks": "rule_set_141" + "remarks": "rule_set_142" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Don't target root user in the sudoers file", - "remarks": "rule_set_141" + "remarks": "rule_set_142" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudoers_no_command_negation", - "remarks": "rule_set_142" + "remarks": "rule_set_143" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Don't define allowed commands in sudoers by means of exclusion", - "remarks": "rule_set_142" + "remarks": "rule_set_143" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudoers_no_command_negation", - "remarks": "rule_set_142" + "remarks": "rule_set_143" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Don't define allowed commands in sudoers by means of exclusion", - "remarks": "rule_set_142" + "remarks": "rule_set_143" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudoers_explicit_command_args", - "remarks": "rule_set_143" + "remarks": "rule_set_144" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Explicit arguments in sudo specifications", - "remarks": "rule_set_143" + "remarks": "rule_set_144" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudoers_explicit_command_args", - "remarks": "rule_set_143" + "remarks": "rule_set_144" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Explicit arguments in sudo specifications", - "remarks": "rule_set_143" + "remarks": "rule_set_144" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shadow", - "remarks": "rule_set_144" + "remarks": "rule_set_145" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns shadow File", - "remarks": "rule_set_144" + "remarks": "rule_set_145" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shadow", - "remarks": "rule_set_144" + "remarks": "rule_set_145" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns shadow File", - "remarks": "rule_set_144" + "remarks": "rule_set_145" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shadow", - "remarks": "rule_set_145" + "remarks": "rule_set_146" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns shadow File", - "remarks": "rule_set_145" + "remarks": "rule_set_146" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shadow", - "remarks": "rule_set_145" + "remarks": "rule_set_146" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns shadow File", - "remarks": "rule_set_145" + "remarks": "rule_set_146" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shadow", - "remarks": "rule_set_146" + "remarks": "rule_set_147" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on shadow File", - "remarks": "rule_set_146" + "remarks": "rule_set_147" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shadow", - "remarks": "rule_set_146" + "remarks": "rule_set_147" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on shadow File", - "remarks": "rule_set_146" + "remarks": "rule_set_147" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_gshadow", - "remarks": "rule_set_147" + "remarks": "rule_set_148" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns gshadow File", - "remarks": "rule_set_147" + "remarks": "rule_set_148" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_gshadow", - "remarks": "rule_set_147" + "remarks": "rule_set_148" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns gshadow File", - "remarks": "rule_set_147" + "remarks": "rule_set_148" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_gshadow", - "remarks": "rule_set_148" + "remarks": "rule_set_149" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns gshadow File", - "remarks": "rule_set_148" + "remarks": "rule_set_149" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_gshadow", - "remarks": "rule_set_148" + "remarks": "rule_set_149" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns gshadow File", - "remarks": "rule_set_148" + "remarks": "rule_set_149" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_gshadow", - "remarks": "rule_set_149" + "remarks": "rule_set_150" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on gshadow File", - "remarks": "rule_set_149" + "remarks": "rule_set_150" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_gshadow", - "remarks": "rule_set_149" + "remarks": "rule_set_150" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on gshadow File", - "remarks": "rule_set_149" + "remarks": "rule_set_150" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_passwd", - "remarks": "rule_set_150" + "remarks": "rule_set_151" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns passwd File", - "remarks": "rule_set_150" + "remarks": "rule_set_151" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_passwd", - "remarks": "rule_set_150" + "remarks": "rule_set_151" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns passwd File", - "remarks": "rule_set_150" + "remarks": "rule_set_151" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_passwd", - "remarks": "rule_set_151" + "remarks": "rule_set_152" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns passwd File", - "remarks": "rule_set_151" + "remarks": "rule_set_152" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_passwd", - "remarks": "rule_set_151" + "remarks": "rule_set_152" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns passwd File", - "remarks": "rule_set_151" + "remarks": "rule_set_152" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_passwd", - "remarks": "rule_set_152" + "remarks": "rule_set_153" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on passwd File", - "remarks": "rule_set_152" + "remarks": "rule_set_153" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_passwd", - "remarks": "rule_set_152" + "remarks": "rule_set_153" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on passwd File", - "remarks": "rule_set_152" + "remarks": "rule_set_153" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_group", - "remarks": "rule_set_153" + "remarks": "rule_set_154" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns group File", - "remarks": "rule_set_153" + "remarks": "rule_set_154" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_group", - "remarks": "rule_set_153" + "remarks": "rule_set_154" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns group File", - "remarks": "rule_set_153" + "remarks": "rule_set_154" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_group", - "remarks": "rule_set_154" + "remarks": "rule_set_155" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns group File", - "remarks": "rule_set_154" + "remarks": "rule_set_155" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_group", - "remarks": "rule_set_154" + "remarks": "rule_set_155" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns group File", - "remarks": "rule_set_154" + "remarks": "rule_set_155" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_group", - "remarks": "rule_set_155" + "remarks": "rule_set_156" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on group File", - "remarks": "rule_set_155" + "remarks": "rule_set_156" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_group", - "remarks": "rule_set_155" + "remarks": "rule_set_156" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on group File", - "remarks": "rule_set_155" + "remarks": "rule_set_156" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shells", - "remarks": "rule_set_156" + "remarks": "rule_set_157" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Who Owns /etc/shells File", - "remarks": "rule_set_156" + "remarks": "rule_set_157" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shells", - "remarks": "rule_set_156" + "remarks": "rule_set_157" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Who Owns /etc/shells File", - "remarks": "rule_set_156" + "remarks": "rule_set_157" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shells", - "remarks": "rule_set_157" + "remarks": "rule_set_158" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/shells File", - "remarks": "rule_set_157" + "remarks": "rule_set_158" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shells", - "remarks": "rule_set_157" + "remarks": "rule_set_158" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/shells File", - "remarks": "rule_set_157" + "remarks": "rule_set_158" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shells", - "remarks": "rule_set_158" + "remarks": "rule_set_159" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/shells File", - "remarks": "rule_set_158" + "remarks": "rule_set_159" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shells", - "remarks": "rule_set_158" + "remarks": "rule_set_159" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/shells File", - "remarks": "rule_set_158" + "remarks": "rule_set_159" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_159" + "remarks": "rule_set_160" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_159" + "remarks": "rule_set_160" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_159" + "remarks": "rule_set_160" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_159" + "remarks": "rule_set_160" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_160" + "remarks": "rule_set_161" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_160" + "remarks": "rule_set_161" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_160" + "remarks": "rule_set_161" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_160" + "remarks": "rule_set_161" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_users_home_files_groupownership", - "remarks": "rule_set_161" + "remarks": "rule_set_162" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All User Files and Directories In The Home Directory Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_161" + "remarks": "rule_set_162" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_users_home_files_groupownership", - "remarks": "rule_set_161" + "remarks": "rule_set_162" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All User Files and Directories In The Home Directory Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_161" + "remarks": "rule_set_162" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_users_home_files_ownership", - "remarks": "rule_set_162" + "remarks": "rule_set_163" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All User Files and Directories In The Home Directory Must Have a Valid Owner", - "remarks": "rule_set_162" + "remarks": "rule_set_163" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_users_home_files_ownership", - "remarks": "rule_set_162" + "remarks": "rule_set_163" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All User Files and Directories In The Home Directory Must Have a Valid Owner", - "remarks": "rule_set_162" + "remarks": "rule_set_163" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_users_home_files_permissions", - "remarks": "rule_set_163" + "remarks": "rule_set_164" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All User Files and Directories In The Home Directory Must Have Mode 0750 Or Less Permissive", - "remarks": "rule_set_163" + "remarks": "rule_set_164" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_users_home_files_permissions", - "remarks": "rule_set_163" + "remarks": "rule_set_164" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All User Files and Directories In The Home Directory Must Have Mode 0750 Or Less Permissive", - "remarks": "rule_set_163" + "remarks": "rule_set_164" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_164" + "remarks": "rule_set_165" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_164" + "remarks": "rule_set_165" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_164" + "remarks": "rule_set_165" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_164" + "remarks": "rule_set_165" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_system_commands_group_root_owned", - "remarks": "rule_set_165" + "remarks": "rule_set_166" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that system commands directories have root as a group owner", - "remarks": "rule_set_165" + "remarks": "rule_set_166" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_system_commands_group_root_owned", - "remarks": "rule_set_165" + "remarks": "rule_set_166" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that system commands directories have root as a group owner", - "remarks": "rule_set_165" + "remarks": "rule_set_166" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_system_commands_root_owned", - "remarks": "rule_set_166" + "remarks": "rule_set_167" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that system commands directories have root ownership", - "remarks": "rule_set_166" + "remarks": "rule_set_167" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_system_commands_root_owned", - "remarks": "rule_set_166" + "remarks": "rule_set_167" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that system commands directories have root ownership", - "remarks": "rule_set_166" + "remarks": "rule_set_167" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_system_commands_dirs", - "remarks": "rule_set_167" + "remarks": "rule_set_168" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that system commands files are group owned by root or a system account", - "remarks": "rule_set_167" + "remarks": "rule_set_168" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_system_commands_dirs", - "remarks": "rule_set_167" + "remarks": "rule_set_168" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that system commands files are group owned by root or a system account", - "remarks": "rule_set_167" + "remarks": "rule_set_168" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_binary_dirs", - "remarks": "rule_set_168" + "remarks": "rule_set_169" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that System Executables Have Root Ownership", - "remarks": "rule_set_168" + "remarks": "rule_set_169" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_binary_dirs", - "remarks": "rule_set_168" + "remarks": "rule_set_169" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that System Executables Have Root Ownership", - "remarks": "rule_set_168" + "remarks": "rule_set_169" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_binary_dirs", - "remarks": "rule_set_169" + "remarks": "rule_set_170" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that System Executables Have Restrictive Permissions", - "remarks": "rule_set_169" + "remarks": "rule_set_170" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_binary_dirs", - "remarks": "rule_set_169" + "remarks": "rule_set_170" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that System Executables Have Restrictive Permissions", - "remarks": "rule_set_169" + "remarks": "rule_set_170" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_private_key", - "remarks": "rule_set_170" + "remarks": "rule_set_171" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_170" + "remarks": "rule_set_171" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_private_key", - "remarks": "rule_set_170" + "remarks": "rule_set_171" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_170" + "remarks": "rule_set_171" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_private_key", - "remarks": "rule_set_171" + "remarks": "rule_set_172" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_171" + "remarks": "rule_set_172" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_private_key", - "remarks": "rule_set_171" + "remarks": "rule_set_172" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_171" + "remarks": "rule_set_172" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_private_key", - "remarks": "rule_set_172" + "remarks": "rule_set_173" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Private *_key Key Files", - "remarks": "rule_set_172" + "remarks": "rule_set_173" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_private_key", - "remarks": "rule_set_172" + "remarks": "rule_set_173" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Private *_key Key Files", - "remarks": "rule_set_172" + "remarks": "rule_set_173" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_pub_key", - "remarks": "rule_set_173" + "remarks": "rule_set_174" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_173" + "remarks": "rule_set_174" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_pub_key", - "remarks": "rule_set_173" + "remarks": "rule_set_174" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_173" + "remarks": "rule_set_174" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_pub_key", - "remarks": "rule_set_174" + "remarks": "rule_set_175" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_174" + "remarks": "rule_set_175" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_pub_key", - "remarks": "rule_set_174" + "remarks": "rule_set_175" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_174" + "remarks": "rule_set_175" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_pub_key", - "remarks": "rule_set_175" + "remarks": "rule_set_176" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Public *.pub Key Files", - "remarks": "rule_set_175" + "remarks": "rule_set_176" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_pub_key", - "remarks": "rule_set_175" + "remarks": "rule_set_176" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Public *.pub Key Files", - "remarks": "rule_set_175" + "remarks": "rule_set_176" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_config", - "remarks": "rule_set_176" + "remarks": "rule_set_177" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server config file", - "remarks": "rule_set_176" + "remarks": "rule_set_177" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_config", - "remarks": "rule_set_176" + "remarks": "rule_set_177" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server config file", - "remarks": "rule_set_176" + "remarks": "rule_set_177" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_config", - "remarks": "rule_set_177" + "remarks": "rule_set_178" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server config file", - "remarks": "rule_set_177" + "remarks": "rule_set_178" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_config", - "remarks": "rule_set_177" + "remarks": "rule_set_178" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server config file", - "remarks": "rule_set_177" + "remarks": "rule_set_178" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_config", - "remarks": "rule_set_178" + "remarks": "rule_set_179" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server config file", - "remarks": "rule_set_178" + "remarks": "rule_set_179" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_config", - "remarks": "rule_set_178" + "remarks": "rule_set_179" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server config file", - "remarks": "rule_set_178" + "remarks": "rule_set_179" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_etc_selinux", - "remarks": "rule_set_179" + "remarks": "rule_set_180" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/selinux Directory", - "remarks": "rule_set_179" + "remarks": "rule_set_180" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_etc_selinux", - "remarks": "rule_set_179" + "remarks": "rule_set_180" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/selinux Directory", - "remarks": "rule_set_179" + "remarks": "rule_set_180" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_selinux", - "remarks": "rule_set_180" + "remarks": "rule_set_181" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/selinux Directory", - "remarks": "rule_set_180" + "remarks": "rule_set_181" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_selinux", - "remarks": "rule_set_180" + "remarks": "rule_set_181" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/selinux Directory", - "remarks": "rule_set_180" + "remarks": "rule_set_181" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_selinux", - "remarks": "rule_set_181" + "remarks": "rule_set_182" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/selinux Directory", - "remarks": "rule_set_181" + "remarks": "rule_set_182" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_selinux", - "remarks": "rule_set_181" + "remarks": "rule_set_182" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/selinux Directory", - "remarks": "rule_set_181" + "remarks": "rule_set_182" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_sestatus_conf", - "remarks": "rule_set_182" + "remarks": "rule_set_183" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/sestatus.conf File", - "remarks": "rule_set_182" + "remarks": "rule_set_183" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_sestatus_conf", - "remarks": "rule_set_182" + "remarks": "rule_set_183" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/sestatus.conf File", - "remarks": "rule_set_182" + "remarks": "rule_set_183" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_sestatus_conf", - "remarks": "rule_set_183" + "remarks": "rule_set_184" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/sestatus.conf File", - "remarks": "rule_set_183" + "remarks": "rule_set_184" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_sestatus_conf", - "remarks": "rule_set_183" + "remarks": "rule_set_184" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/sestatus.conf File", - "remarks": "rule_set_183" + "remarks": "rule_set_184" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_sestatus_conf", - "remarks": "rule_set_184" + "remarks": "rule_set_185" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/sestatus.conf File", - "remarks": "rule_set_184" + "remarks": "rule_set_185" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_sestatus_conf", - "remarks": "rule_set_184" + "remarks": "rule_set_185" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/sestatus.conf File", - "remarks": "rule_set_184" + "remarks": "rule_set_185" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_etc_ipsecd", - "remarks": "rule_set_185" + "remarks": "rule_set_186" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/ipsec.d Directory", - "remarks": "rule_set_185" + "remarks": "rule_set_186" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_etc_ipsecd", - "remarks": "rule_set_185" + "remarks": "rule_set_186" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/ipsec.d Directory", - "remarks": "rule_set_185" + "remarks": "rule_set_186" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_ipsecd", - "remarks": "rule_set_186" + "remarks": "rule_set_187" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/ipsec.d Directory", - "remarks": "rule_set_186" + "remarks": "rule_set_187" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_ipsecd", - "remarks": "rule_set_186" + "remarks": "rule_set_187" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/ipsec.d Directory", - "remarks": "rule_set_186" + "remarks": "rule_set_187" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_ipsecd", - "remarks": "rule_set_187" + "remarks": "rule_set_188" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/ipsec.d Directory", - "remarks": "rule_set_187" + "remarks": "rule_set_188" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_ipsecd", - "remarks": "rule_set_187" + "remarks": "rule_set_188" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/ipsec.d Directory", - "remarks": "rule_set_187" + "remarks": "rule_set_188" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_ipsec_conf", - "remarks": "rule_set_188" + "remarks": "rule_set_189" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/ipsec.conf File", - "remarks": "rule_set_188" + "remarks": "rule_set_189" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_ipsec_conf", - "remarks": "rule_set_188" + "remarks": "rule_set_189" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/ipsec.conf File", - "remarks": "rule_set_188" + "remarks": "rule_set_189" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_ipsec_conf", - "remarks": "rule_set_189" + "remarks": "rule_set_190" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/ipsec.conf File", - "remarks": "rule_set_189" + "remarks": "rule_set_190" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_ipsec_conf", - "remarks": "rule_set_189" + "remarks": "rule_set_190" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/ipsec.conf File", - "remarks": "rule_set_189" + "remarks": "rule_set_190" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_ipsec_conf", - "remarks": "rule_set_190" + "remarks": "rule_set_191" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/ipsec.conf File", - "remarks": "rule_set_190" + "remarks": "rule_set_191" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_ipsec_conf", - "remarks": "rule_set_190" + "remarks": "rule_set_191" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/ipsec.conf File", - "remarks": "rule_set_190" + "remarks": "rule_set_191" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_ipsec_secrets", - "remarks": "rule_set_191" + "remarks": "rule_set_192" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/ipsec.secrets File", - "remarks": "rule_set_191" + "remarks": "rule_set_192" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_ipsec_secrets", - "remarks": "rule_set_191" + "remarks": "rule_set_192" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/ipsec.secrets File", - "remarks": "rule_set_191" + "remarks": "rule_set_192" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_ipsec_secrets", - "remarks": "rule_set_192" + "remarks": "rule_set_193" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/ipsec.secrets File", - "remarks": "rule_set_192" + "remarks": "rule_set_193" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_ipsec_secrets", - "remarks": "rule_set_192" + "remarks": "rule_set_193" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/ipsec.secrets File", - "remarks": "rule_set_192" + "remarks": "rule_set_193" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_ipsec_secrets", - "remarks": "rule_set_193" + "remarks": "rule_set_194" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/ipsec.secrets File", - "remarks": "rule_set_193" + "remarks": "rule_set_194" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_ipsec_secrets", - "remarks": "rule_set_193" + "remarks": "rule_set_194" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/ipsec.secrets File", - "remarks": "rule_set_193" + "remarks": "rule_set_194" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_etc_iptables", - "remarks": "rule_set_194" + "remarks": "rule_set_195" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/iptables Directory", - "remarks": "rule_set_194" + "remarks": "rule_set_195" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_etc_iptables", - "remarks": "rule_set_194" + "remarks": "rule_set_195" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/iptables Directory", - "remarks": "rule_set_194" + "remarks": "rule_set_195" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_iptables", - "remarks": "rule_set_195" + "remarks": "rule_set_196" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/iptables Directory", - "remarks": "rule_set_195" + "remarks": "rule_set_196" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_iptables", - "remarks": "rule_set_195" + "remarks": "rule_set_196" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/iptables Directory", - "remarks": "rule_set_195" + "remarks": "rule_set_196" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_iptables", - "remarks": "rule_set_196" + "remarks": "rule_set_197" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/iptables Directory", - "remarks": "rule_set_196" + "remarks": "rule_set_197" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_iptables", - "remarks": "rule_set_196" + "remarks": "rule_set_197" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/iptables Directory", - "remarks": "rule_set_196" + "remarks": "rule_set_197" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_etc_nftables", - "remarks": "rule_set_197" + "remarks": "rule_set_198" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/nftables Directory", - "remarks": "rule_set_197" + "remarks": "rule_set_198" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_etc_nftables", - "remarks": "rule_set_197" + "remarks": "rule_set_198" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/nftables Directory", - "remarks": "rule_set_197" + "remarks": "rule_set_198" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_nftables", - "remarks": "rule_set_198" + "remarks": "rule_set_199" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/nftables Directory", - "remarks": "rule_set_198" + "remarks": "rule_set_199" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_nftables", - "remarks": "rule_set_198" + "remarks": "rule_set_199" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/nftables Directory", - "remarks": "rule_set_198" + "remarks": "rule_set_199" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_nftables", - "remarks": "rule_set_199" + "remarks": "rule_set_200" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/nftables Directory", - "remarks": "rule_set_199" + "remarks": "rule_set_200" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_nftables", - "remarks": "rule_set_199" + "remarks": "rule_set_200" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/nftables Directory", - "remarks": "rule_set_199" + "remarks": "rule_set_200" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_etc_sysctld", - "remarks": "rule_set_200" + "remarks": "rule_set_201" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/sysctl.d Directory", - "remarks": "rule_set_200" + "remarks": "rule_set_201" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_etc_sysctld", - "remarks": "rule_set_200" + "remarks": "rule_set_201" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/sysctl.d Directory", - "remarks": "rule_set_200" + "remarks": "rule_set_201" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_sysctld", - "remarks": "rule_set_201" + "remarks": "rule_set_202" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/sysctl.d Directory", - "remarks": "rule_set_201" + "remarks": "rule_set_202" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_sysctld", - "remarks": "rule_set_201" + "remarks": "rule_set_202" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/sysctl.d Directory", - "remarks": "rule_set_201" + "remarks": "rule_set_202" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_sysctld", - "remarks": "rule_set_202" + "remarks": "rule_set_203" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/sysctl.d Directory", - "remarks": "rule_set_202" + "remarks": "rule_set_203" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_sysctld", - "remarks": "rule_set_202" + "remarks": "rule_set_203" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/sysctl.d Directory", - "remarks": "rule_set_202" + "remarks": "rule_set_203" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_sudoers", - "remarks": "rule_set_203" + "remarks": "rule_set_204" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/sudoers File", - "remarks": "rule_set_203" + "remarks": "rule_set_204" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_sudoers", - "remarks": "rule_set_203" + "remarks": "rule_set_204" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/sudoers File", - "remarks": "rule_set_203" + "remarks": "rule_set_204" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_sudoers", - "remarks": "rule_set_204" + "remarks": "rule_set_205" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/sudoers File", - "remarks": "rule_set_204" + "remarks": "rule_set_205" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_sudoers", - "remarks": "rule_set_204" + "remarks": "rule_set_205" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/sudoers File", - "remarks": "rule_set_204" + "remarks": "rule_set_205" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_sudoers", - "remarks": "rule_set_205" + "remarks": "rule_set_206" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/sudoers File", - "remarks": "rule_set_205" + "remarks": "rule_set_206" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_sudoers", - "remarks": "rule_set_205" + "remarks": "rule_set_206" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/sudoers File", - "remarks": "rule_set_205" + "remarks": "rule_set_206" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_etc_sudoersd", - "remarks": "rule_set_206" + "remarks": "rule_set_207" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/sudoers.d Directory", - "remarks": "rule_set_206" + "remarks": "rule_set_207" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_etc_sudoersd", - "remarks": "rule_set_206" + "remarks": "rule_set_207" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/sudoers.d Directory", - "remarks": "rule_set_206" + "remarks": "rule_set_207" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_sudoersd", - "remarks": "rule_set_207" + "remarks": "rule_set_208" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/sudoers.d Directory", - "remarks": "rule_set_207" + "remarks": "rule_set_208" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_sudoersd", - "remarks": "rule_set_207" + "remarks": "rule_set_208" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/sudoers.d Directory", - "remarks": "rule_set_207" + "remarks": "rule_set_208" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_sudoersd", - "remarks": "rule_set_208" + "remarks": "rule_set_209" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/sudoers.d Directory", - "remarks": "rule_set_208" + "remarks": "rule_set_209" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_sudoersd", - "remarks": "rule_set_208" + "remarks": "rule_set_209" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/sudoers.d Directory", - "remarks": "rule_set_208" + "remarks": "rule_set_209" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_crypttab", - "remarks": "rule_set_209" + "remarks": "rule_set_210" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/crypttab File", - "remarks": "rule_set_209" + "remarks": "rule_set_210" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_crypttab", - "remarks": "rule_set_209" + "remarks": "rule_set_210" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/crypttab File", - "remarks": "rule_set_209" + "remarks": "rule_set_210" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_crypttab", - "remarks": "rule_set_210" + "remarks": "rule_set_211" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/crypttab File", - "remarks": "rule_set_210" + "remarks": "rule_set_211" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_crypttab", - "remarks": "rule_set_210" + "remarks": "rule_set_211" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/crypttab File", - "remarks": "rule_set_210" + "remarks": "rule_set_211" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_crypttab", - "remarks": "rule_set_211" + "remarks": "rule_set_212" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/crypttab File", - "remarks": "rule_set_211" + "remarks": "rule_set_212" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_crypttab", - "remarks": "rule_set_211" + "remarks": "rule_set_212" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/crypttab File", - "remarks": "rule_set_211" + "remarks": "rule_set_212" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_chrony_keys", - "remarks": "rule_set_212" + "remarks": "rule_set_213" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/chrony.keys File", - "remarks": "rule_set_212" + "remarks": "rule_set_213" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_chrony_keys", - "remarks": "rule_set_212" + "remarks": "rule_set_213" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/chrony.keys File", - "remarks": "rule_set_212" + "remarks": "rule_set_213" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_chrony_keys", - "remarks": "rule_set_213" + "remarks": "rule_set_214" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/chrony.keys File", - "remarks": "rule_set_213" + "remarks": "rule_set_214" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_chrony_keys", - "remarks": "rule_set_213" + "remarks": "rule_set_214" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/chrony.keys File", - "remarks": "rule_set_213" + "remarks": "rule_set_214" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_chrony_keys", - "remarks": "rule_set_214" + "remarks": "rule_set_215" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/chrony.keys File", - "remarks": "rule_set_214" + "remarks": "rule_set_215" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_chrony_keys", - "remarks": "rule_set_214" + "remarks": "rule_set_215" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/chrony.keys File", - "remarks": "rule_set_214" + "remarks": "rule_set_215" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "enable_pam_namespace", - "remarks": "rule_set_215" + "remarks": "rule_set_216" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Up a Private Namespace in PAM Configuration", - "remarks": "rule_set_215" + "remarks": "rule_set_216" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "enable_pam_namespace", - "remarks": "rule_set_215" + "remarks": "rule_set_216" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Up a Private Namespace in PAM Configuration", - "remarks": "rule_set_215" + "remarks": "rule_set_216" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_polyinstantiated_tmp", - "remarks": "rule_set_216" + "remarks": "rule_set_217" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Polyinstantiation of /tmp Directories", - "remarks": "rule_set_216" + "remarks": "rule_set_217" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_polyinstantiated_tmp", - "remarks": "rule_set_216" + "remarks": "rule_set_217" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Polyinstantiation of /tmp Directories", - "remarks": "rule_set_216" + "remarks": "rule_set_217" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_polyinstantiated_var_tmp", - "remarks": "rule_set_217" + "remarks": "rule_set_218" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Polyinstantiation of /var/tmp Directories", - "remarks": "rule_set_217" + "remarks": "rule_set_218" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_polyinstantiated_var_tmp", - "remarks": "rule_set_217" + "remarks": "rule_set_218" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Polyinstantiation of /var/tmp Directories", - "remarks": "rule_set_217" + "remarks": "rule_set_218" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sebool_polyinstantiation_enabled", - "remarks": "rule_set_218" + "remarks": "rule_set_219" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the polyinstantiation_enabled SELinux Boolean", - "remarks": "rule_set_218" + "remarks": "rule_set_219" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sebool_polyinstantiation_enabled", - "remarks": "rule_set_218" + "remarks": "rule_set_219" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the polyinstantiation_enabled SELinux Boolean", - "remarks": "rule_set_218" + "remarks": "rule_set_219" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_sssd_installed", - "remarks": "rule_set_219" + "remarks": "rule_set_220" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install the SSSD Package", - "remarks": "rule_set_219" + "remarks": "rule_set_220" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_sssd_installed", - "remarks": "rule_set_219" + "remarks": "rule_set_220" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install the SSSD Package", - "remarks": "rule_set_219" + "remarks": "rule_set_220" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_sssd_enabled", - "remarks": "rule_set_220" + "remarks": "rule_set_221" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable the SSSD Service", - "remarks": "rule_set_220" + "remarks": "rule_set_221" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_sssd_enabled", - "remarks": "rule_set_220" + "remarks": "rule_set_221" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable the SSSD Service", - "remarks": "rule_set_220" + "remarks": "rule_set_221" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "postfix_network_listening_disabled", - "remarks": "rule_set_221" + "remarks": "rule_set_222" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Postfix Network Listening", - "remarks": "rule_set_221" + "remarks": "rule_set_222" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "postfix_network_listening_disabled", - "remarks": "rule_set_221" + "remarks": "rule_set_222" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Postfix Network Listening", - "remarks": "rule_set_221" + "remarks": "rule_set_222" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "postfix_client_configure_mail_alias", - "remarks": "rule_set_222" + "remarks": "rule_set_223" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure System to Forward All Mail For The Root Account", - "remarks": "rule_set_222" + "remarks": "rule_set_223" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "postfix_client_configure_mail_alias", - "remarks": "rule_set_222" + "remarks": "rule_set_223" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure System to Forward All Mail For The Root Account", - "remarks": "rule_set_222" + "remarks": "rule_set_223" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_state", - "remarks": "rule_set_223" + "remarks": "rule_set_224" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SELinux State is Enforcing", - "remarks": "rule_set_223" + "remarks": "rule_set_224" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_state", - "remarks": "rule_set_223" + "remarks": "rule_set_224" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SELinux State is Enforcing", - "remarks": "rule_set_223" + "remarks": "rule_set_224" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_224" + "remarks": "rule_set_225" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_224" + "remarks": "rule_set_225" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_224" + "remarks": "rule_set_225" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_224" + "remarks": "rule_set_225" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_build_database", - "remarks": "rule_set_225" + "remarks": "rule_set_226" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Build and Test AIDE Database", - "remarks": "rule_set_225" + "remarks": "rule_set_226" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_build_database", - "remarks": "rule_set_225" + "remarks": "rule_set_226" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Build and Test AIDE Database", - "remarks": "rule_set_225" + "remarks": "rule_set_226" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_nosmep_argument_absent", - "remarks": "rule_set_226" + "remarks": "rule_set_227" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SMEP is not disabled during boot", - "remarks": "rule_set_226" + "remarks": "rule_set_227" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_nosmep_argument_absent", - "remarks": "rule_set_226" + "remarks": "rule_set_227" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SMEP is not disabled during boot", - "remarks": "rule_set_226" + "remarks": "rule_set_227" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_nosmap_argument_absent", - "remarks": "rule_set_227" + "remarks": "rule_set_228" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SMAP is not disabled during boot", - "remarks": "rule_set_227" + "remarks": "rule_set_228" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_nosmap_argument_absent", - "remarks": "rule_set_227" + "remarks": "rule_set_228" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SMAP is not disabled during boot", - "remarks": "rule_set_227" + "remarks": "rule_set_228" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_enable_iommu_force", - "remarks": "rule_set_228" + "remarks": "rule_set_229" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "IOMMU configuration directive", - "remarks": "rule_set_228" + "remarks": "rule_set_229" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_enable_iommu_force", - "remarks": "rule_set_228" + "remarks": "rule_set_229" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "IOMMU configuration directive", - "remarks": "rule_set_228" + "remarks": "rule_set_229" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_modules_disabled", - "remarks": "rule_set_229" + "remarks": "rule_set_230" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable loading and unloading of kernel modules", - "remarks": "rule_set_229" + "remarks": "rule_set_230" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_modules_disabled", - "remarks": "rule_set_229" + "remarks": "rule_set_230" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable loading and unloading of kernel modules", - "remarks": "rule_set_229" + "remarks": "rule_set_230" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_grub2_cfg", - "remarks": "rule_set_230" + "remarks": "rule_set_231" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify /boot/grub2/grub.cfg Group Ownership", - "remarks": "rule_set_230" + "remarks": "rule_set_231" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_grub2_cfg", - "remarks": "rule_set_230" + "remarks": "rule_set_231" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify /boot/grub2/grub.cfg Group Ownership", - "remarks": "rule_set_230" + "remarks": "rule_set_231" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_grub2_cfg", - "remarks": "rule_set_231" + "remarks": "rule_set_232" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify /boot/grub2/grub.cfg User Ownership", - "remarks": "rule_set_231" + "remarks": "rule_set_232" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_grub2_cfg", - "remarks": "rule_set_231" + "remarks": "rule_set_232" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify /boot/grub2/grub.cfg User Ownership", - "remarks": "rule_set_231" + "remarks": "rule_set_232" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_grub2_cfg", - "remarks": "rule_set_232" + "remarks": "rule_set_233" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify /boot/grub2/grub.cfg Permissions", - "remarks": "rule_set_232" + "remarks": "rule_set_233" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_grub2_cfg", - "remarks": "rule_set_232" + "remarks": "rule_set_233" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify /boot/grub2/grub.cfg Permissions", - "remarks": "rule_set_232" + "remarks": "rule_set_233" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_user_cfg", - "remarks": "rule_set_233" + "remarks": "rule_set_234" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify /boot/grub2/user.cfg Group Ownership", - "remarks": "rule_set_233" + "remarks": "rule_set_234" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_user_cfg", - "remarks": "rule_set_233" + "remarks": "rule_set_234" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify /boot/grub2/user.cfg Group Ownership", - "remarks": "rule_set_233" + "remarks": "rule_set_234" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_user_cfg", - "remarks": "rule_set_234" + "remarks": "rule_set_235" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify /boot/grub2/user.cfg User Ownership", - "remarks": "rule_set_234" + "remarks": "rule_set_235" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_user_cfg", - "remarks": "rule_set_234" + "remarks": "rule_set_235" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify /boot/grub2/user.cfg User Ownership", - "remarks": "rule_set_234" + "remarks": "rule_set_235" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_user_cfg", - "remarks": "rule_set_235" + "remarks": "rule_set_236" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify /boot/grub2/user.cfg Permissions", - "remarks": "rule_set_235" + "remarks": "rule_set_236" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_user_cfg", - "remarks": "rule_set_235" + "remarks": "rule_set_236" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify /boot/grub2/user.cfg Permissions", - "remarks": "rule_set_235" + "remarks": "rule_set_236" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_systemmap", - "remarks": "rule_set_236" + "remarks": "rule_set_237" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns System.map Files", - "remarks": "rule_set_236" + "remarks": "rule_set_237" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_systemmap", - "remarks": "rule_set_236" + "remarks": "rule_set_237" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns System.map Files", - "remarks": "rule_set_236" + "remarks": "rule_set_237" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_systemmap", - "remarks": "rule_set_237" + "remarks": "rule_set_238" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns System.map Files", - "remarks": "rule_set_237" + "remarks": "rule_set_238" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_systemmap", - "remarks": "rule_set_237" + "remarks": "rule_set_238" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns System.map Files", - "remarks": "rule_set_237" + "remarks": "rule_set_238" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_systemmap", - "remarks": "rule_set_238" + "remarks": "rule_set_239" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on System.map Files", - "remarks": "rule_set_238" + "remarks": "rule_set_239" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_systemmap", - "remarks": "rule_set_238" + "remarks": "rule_set_239" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on System.map Files", - "remarks": "rule_set_238" + "remarks": "rule_set_239" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_bashrc", - "remarks": "rule_set_239" + "remarks": "rule_set_240" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Bash Umask is Set Correctly", - "remarks": "rule_set_239" + "remarks": "rule_set_240" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_bashrc", - "remarks": "rule_set_239" + "remarks": "rule_set_240" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Bash Umask is Set Correctly", - "remarks": "rule_set_239" + "remarks": "rule_set_240" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_login_defs", - "remarks": "rule_set_240" + "remarks": "rule_set_241" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in login.defs", - "remarks": "rule_set_240" + "remarks": "rule_set_241" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_login_defs", - "remarks": "rule_set_240" + "remarks": "rule_set_241" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in login.defs", - "remarks": "rule_set_240" + "remarks": "rule_set_241" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_profile", - "remarks": "rule_set_241" + "remarks": "rule_set_242" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in /etc/profile", - "remarks": "rule_set_241" + "remarks": "rule_set_242" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_profile", - "remarks": "rule_set_241" + "remarks": "rule_set_242" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in /etc/profile", - "remarks": "rule_set_241" + "remarks": "rule_set_242" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_dedicated_group", - "remarks": "rule_set_242" + "remarks": "rule_set_243" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure a dedicated group owns sudo", - "remarks": "rule_set_242" + "remarks": "rule_set_243" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_dedicated_group", - "remarks": "rule_set_242" + "remarks": "rule_set_243" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure a dedicated group owns sudo", - "remarks": "rule_set_242" + "remarks": "rule_set_243" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sudo", - "remarks": "rule_set_243" + "remarks": "rule_set_244" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure That the sudo Binary Has the Correct Permissions", - "remarks": "rule_set_243" + "remarks": "rule_set_244" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sudo", - "remarks": "rule_set_243" + "remarks": "rule_set_244" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure That the sudo Binary Has the Correct Permissions", - "remarks": "rule_set_243" + "remarks": "rule_set_244" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_policytype", - "remarks": "rule_set_244" + "remarks": "rule_set_245" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure SELinux Policy", - "remarks": "rule_set_244" + "remarks": "rule_set_245" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_policytype", - "remarks": "rule_set_244" + "remarks": "rule_set_245" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure SELinux Policy", - "remarks": "rule_set_244" + "remarks": "rule_set_245" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_chrony_installed", - "remarks": "rule_set_245" + "remarks": "rule_set_246" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "The Chrony package is installed", - "remarks": "rule_set_245" + "remarks": "rule_set_246" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_chrony_installed", - "remarks": "rule_set_245" + "remarks": "rule_set_246" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "The Chrony package is installed", - "remarks": "rule_set_245" + "remarks": "rule_set_246" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_chronyd_enabled", - "remarks": "rule_set_246" + "remarks": "rule_set_247" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "The Chronyd service is enabled", - "remarks": "rule_set_246" + "remarks": "rule_set_247" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_chronyd_enabled", - "remarks": "rule_set_246" + "remarks": "rule_set_247" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "The Chronyd service is enabled", - "remarks": "rule_set_246" + "remarks": "rule_set_247" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_specify_remote_server", - "remarks": "rule_set_247" + "remarks": "rule_set_248" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "A remote time server for Chrony is configured", - "remarks": "rule_set_247" + "remarks": "rule_set_248" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_specify_remote_server", - "remarks": "rule_set_247" + "remarks": "rule_set_248" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "A remote time server for Chrony is configured", - "remarks": "rule_set_247" + "remarks": "rule_set_248" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_configure_pool_and_server", - "remarks": "rule_set_248" + "remarks": "rule_set_249" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Chrony Configure Pool and Server", - "remarks": "rule_set_248" + "remarks": "rule_set_249" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_configure_pool_and_server", - "remarks": "rule_set_248" + "remarks": "rule_set_249" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Chrony Configure Pool and Server", - "remarks": "rule_set_248" + "remarks": "rule_set_249" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_remote_loghost", - "remarks": "rule_set_249" + "remarks": "rule_set_250" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Logs Sent To Remote Host", - "remarks": "rule_set_249" + "remarks": "rule_set_250" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_remote_loghost", - "remarks": "rule_set_249" + "remarks": "rule_set_250" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Logs Sent To Remote Host", - "remarks": "rule_set_249" + "remarks": "rule_set_250" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_rsyslog-gnutls_installed", - "remarks": "rule_set_250" + "remarks": "rule_set_251" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure rsyslog-gnutls is installed", - "remarks": "rule_set_250" + "remarks": "rule_set_251" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_rsyslog-gnutls_installed", - "remarks": "rule_set_250" + "remarks": "rule_set_251" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure rsyslog-gnutls is installed", - "remarks": "rule_set_250" + "remarks": "rule_set_251" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_remote_tls", - "remarks": "rule_set_251" + "remarks": "rule_set_252" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure TLS for rsyslog remote logging", - "remarks": "rule_set_251" + "remarks": "rule_set_252" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_remote_tls", - "remarks": "rule_set_251" + "remarks": "rule_set_252" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure TLS for rsyslog remote logging", - "remarks": "rule_set_251" + "remarks": "rule_set_252" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_remote_tls_cacert", - "remarks": "rule_set_252" + "remarks": "rule_set_253" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure CA certificate for rsyslog remote logging", - "remarks": "rule_set_252" + "remarks": "rule_set_253" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_remote_tls_cacert", - "remarks": "rule_set_252" + "remarks": "rule_set_253" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure CA certificate for rsyslog remote logging", - "remarks": "rule_set_252" + "remarks": "rule_set_253" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log_audit", - "remarks": "rule_set_253" + "remarks": "rule_set_254" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log/audit Located On Separate Partition", - "remarks": "rule_set_253" + "remarks": "rule_set_254" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log_audit", - "remarks": "rule_set_253" + "remarks": "rule_set_254" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log/audit Located On Separate Partition", - "remarks": "rule_set_253" + "remarks": "rule_set_254" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_logrotate_installed", - "remarks": "rule_set_254" + "remarks": "rule_set_255" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure logrotate is Installed", - "remarks": "rule_set_254" + "remarks": "rule_set_255" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_logrotate_installed", - "remarks": "rule_set_254" + "remarks": "rule_set_255" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure logrotate is Installed", - "remarks": "rule_set_254" + "remarks": "rule_set_255" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "timer_logrotate_enabled", - "remarks": "rule_set_255" + "remarks": "rule_set_256" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable logrotate Timer", - "remarks": "rule_set_255" + "remarks": "rule_set_256" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "timer_logrotate_enabled", - "remarks": "rule_set_255" + "remarks": "rule_set_256" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable logrotate Timer", - "remarks": "rule_set_255" + "remarks": "rule_set_256" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_logrotate_activated", - "remarks": "rule_set_256" + "remarks": "rule_set_257" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Logrotate Runs Periodically", - "remarks": "rule_set_256" + "remarks": "rule_set_257" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_logrotate_activated", - "remarks": "rule_set_256" + "remarks": "rule_set_257" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Logrotate Runs Periodically", - "remarks": "rule_set_256" + "remarks": "rule_set_257" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_257" + "remarks": "rule_set_258" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_257" + "remarks": "rule_set_258" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_257" + "remarks": "rule_set_258" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_257" + "remarks": "rule_set_258" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_258" + "remarks": "rule_set_259" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_258" + "remarks": "rule_set_259" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_258" + "remarks": "rule_set_259" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_258" + "remarks": "rule_set_259" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_259" + "remarks": "rule_set_260" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_259" + "remarks": "rule_set_260" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_259" + "remarks": "rule_set_260" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_259" + "remarks": "rule_set_260" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_sysadmin_actions", - "remarks": "rule_set_260" + "remarks": "rule_set_261" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects System Administrator Actions", - "remarks": "rule_set_260" + "remarks": "rule_set_261" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_sysadmin_actions", - "remarks": "rule_set_260" + "remarks": "rule_set_261" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects System Administrator Actions", - "remarks": "rule_set_260" + "remarks": "rule_set_261" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_sudo_log_events", - "remarks": "rule_set_261" + "remarks": "rule_set_262" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to perform maintenance activities", - "remarks": "rule_set_261" + "remarks": "rule_set_262" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_sudo_log_events", - "remarks": "rule_set_261" + "remarks": "rule_set_262" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to perform maintenance activities", - "remarks": "rule_set_261" + "remarks": "rule_set_262" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_faillock", - "remarks": "rule_set_262" + "remarks": "rule_set_263" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - faillock", - "remarks": "rule_set_262" + "remarks": "rule_set_263" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_faillock", - "remarks": "rule_set_262" + "remarks": "rule_set_263" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - faillock", - "remarks": "rule_set_262" + "remarks": "rule_set_263" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_lastlog", - "remarks": "rule_set_263" + "remarks": "rule_set_264" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - lastlog", - "remarks": "rule_set_263" + "remarks": "rule_set_264" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_lastlog", - "remarks": "rule_set_263" + "remarks": "rule_set_264" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - lastlog", - "remarks": "rule_set_263" + "remarks": "rule_set_264" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_utmp", - "remarks": "rule_set_264" + "remarks": "rule_set_265" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information utmp", - "remarks": "rule_set_264" + "remarks": "rule_set_265" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_utmp", - "remarks": "rule_set_264" + "remarks": "rule_set_265" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information utmp", - "remarks": "rule_set_264" + "remarks": "rule_set_265" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_btmp", - "remarks": "rule_set_265" + "remarks": "rule_set_266" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information btmp", - "remarks": "rule_set_265" + "remarks": "rule_set_266" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_btmp", - "remarks": "rule_set_265" + "remarks": "rule_set_266" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information btmp", - "remarks": "rule_set_265" + "remarks": "rule_set_266" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_wtmp", - "remarks": "rule_set_266" + "remarks": "rule_set_267" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", - "remarks": "rule_set_266" + "remarks": "rule_set_267" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_wtmp", - "remarks": "rule_set_266" + "remarks": "rule_set_267" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", - "remarks": "rule_set_266" + "remarks": "rule_set_267" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_adjtimex", - "remarks": "rule_set_267" + "remarks": "rule_set_268" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through adjtimex", - "remarks": "rule_set_267" + "remarks": "rule_set_268" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_adjtimex", - "remarks": "rule_set_267" + "remarks": "rule_set_268" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through adjtimex", - "remarks": "rule_set_267" + "remarks": "rule_set_268" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_clock_settime", - "remarks": "rule_set_268" + "remarks": "rule_set_269" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through clock_settime", - "remarks": "rule_set_268" + "remarks": "rule_set_269" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_clock_settime", - "remarks": "rule_set_268" + "remarks": "rule_set_269" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through clock_settime", - "remarks": "rule_set_268" + "remarks": "rule_set_269" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_stime", - "remarks": "rule_set_269" + "remarks": "rule_set_270" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through stime", - "remarks": "rule_set_269" + "remarks": "rule_set_270" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_stime", - "remarks": "rule_set_269" + "remarks": "rule_set_270" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through stime", - "remarks": "rule_set_269" + "remarks": "rule_set_270" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_watch_localtime", - "remarks": "rule_set_270" + "remarks": "rule_set_271" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter the localtime File", - "remarks": "rule_set_270" + "remarks": "rule_set_271" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_watch_localtime", - "remarks": "rule_set_270" + "remarks": "rule_set_271" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter the localtime File", - "remarks": "rule_set_270" + "remarks": "rule_set_271" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification", - "remarks": "rule_set_271" + "remarks": "rule_set_272" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment", - "remarks": "rule_set_271" + "remarks": "rule_set_272" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification", - "remarks": "rule_set_271" + "remarks": "rule_set_272" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment", - "remarks": "rule_set_271" + "remarks": "rule_set_272" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chmod", - "remarks": "rule_set_272" + "remarks": "rule_set_273" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", - "remarks": "rule_set_272" + "remarks": "rule_set_273" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chmod", - "remarks": "rule_set_272" + "remarks": "rule_set_273" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", - "remarks": "rule_set_272" + "remarks": "rule_set_273" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chown", - "remarks": "rule_set_273" + "remarks": "rule_set_274" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chown", - "remarks": "rule_set_273" + "remarks": "rule_set_274" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chown", - "remarks": "rule_set_273" + "remarks": "rule_set_274" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chown", - "remarks": "rule_set_273" + "remarks": "rule_set_274" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmod", - "remarks": "rule_set_274" + "remarks": "rule_set_275" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmod", - "remarks": "rule_set_274" + "remarks": "rule_set_275" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmod", - "remarks": "rule_set_274" + "remarks": "rule_set_275" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmod", - "remarks": "rule_set_274" + "remarks": "rule_set_275" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat", - "remarks": "rule_set_275" + "remarks": "rule_set_276" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat", - "remarks": "rule_set_275" + "remarks": "rule_set_276" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat", - "remarks": "rule_set_275" + "remarks": "rule_set_276" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat", - "remarks": "rule_set_275" + "remarks": "rule_set_276" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat2", - "remarks": "rule_set_276" + "remarks": "rule_set_277" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat2", - "remarks": "rule_set_276" + "remarks": "rule_set_277" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat2", - "remarks": "rule_set_276" + "remarks": "rule_set_277" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat2", - "remarks": "rule_set_276" + "remarks": "rule_set_277" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchown", - "remarks": "rule_set_277" + "remarks": "rule_set_278" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchown", - "remarks": "rule_set_277" + "remarks": "rule_set_278" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchown", - "remarks": "rule_set_277" + "remarks": "rule_set_278" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchown", - "remarks": "rule_set_277" + "remarks": "rule_set_278" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchownat", - "remarks": "rule_set_278" + "remarks": "rule_set_279" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchownat", - "remarks": "rule_set_278" + "remarks": "rule_set_279" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchownat", - "remarks": "rule_set_278" + "remarks": "rule_set_279" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchownat", - "remarks": "rule_set_278" + "remarks": "rule_set_279" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fremovexattr", - "remarks": "rule_set_279" + "remarks": "rule_set_280" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fremovexattr", - "remarks": "rule_set_279" + "remarks": "rule_set_280" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fremovexattr", - "remarks": "rule_set_279" + "remarks": "rule_set_280" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fremovexattr", - "remarks": "rule_set_279" + "remarks": "rule_set_280" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fsetxattr", - "remarks": "rule_set_280" + "remarks": "rule_set_281" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fsetxattr", - "remarks": "rule_set_280" + "remarks": "rule_set_281" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fsetxattr", - "remarks": "rule_set_280" + "remarks": "rule_set_281" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fsetxattr", - "remarks": "rule_set_280" + "remarks": "rule_set_281" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lchown", - "remarks": "rule_set_281" + "remarks": "rule_set_282" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lchown", - "remarks": "rule_set_281" + "remarks": "rule_set_282" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lchown", - "remarks": "rule_set_281" + "remarks": "rule_set_282" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lchown", - "remarks": "rule_set_281" + "remarks": "rule_set_282" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lremovexattr", - "remarks": "rule_set_282" + "remarks": "rule_set_283" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lremovexattr", - "remarks": "rule_set_282" + "remarks": "rule_set_283" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lremovexattr", - "remarks": "rule_set_282" + "remarks": "rule_set_283" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lremovexattr", - "remarks": "rule_set_282" + "remarks": "rule_set_283" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lsetxattr", - "remarks": "rule_set_283" + "remarks": "rule_set_284" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lsetxattr", - "remarks": "rule_set_283" + "remarks": "rule_set_284" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lsetxattr", - "remarks": "rule_set_283" + "remarks": "rule_set_284" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lsetxattr", - "remarks": "rule_set_283" + "remarks": "rule_set_284" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_removexattr", - "remarks": "rule_set_284" + "remarks": "rule_set_285" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - removexattr", - "remarks": "rule_set_284" + "remarks": "rule_set_285" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_removexattr", - "remarks": "rule_set_284" + "remarks": "rule_set_285" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - removexattr", - "remarks": "rule_set_284" + "remarks": "rule_set_285" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_setxattr", - "remarks": "rule_set_285" + "remarks": "rule_set_286" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - setxattr", - "remarks": "rule_set_285" + "remarks": "rule_set_286" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_setxattr", - "remarks": "rule_set_285" + "remarks": "rule_set_286" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - setxattr", - "remarks": "rule_set_285" + "remarks": "rule_set_286" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_creat", - "remarks": "rule_set_286" + "remarks": "rule_set_287" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - creat", - "remarks": "rule_set_286" + "remarks": "rule_set_287" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_creat", - "remarks": "rule_set_286" + "remarks": "rule_set_287" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - creat", - "remarks": "rule_set_286" + "remarks": "rule_set_287" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_ftruncate", - "remarks": "rule_set_287" + "remarks": "rule_set_288" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - ftruncate", - "remarks": "rule_set_287" + "remarks": "rule_set_288" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_ftruncate", - "remarks": "rule_set_287" + "remarks": "rule_set_288" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - ftruncate", - "remarks": "rule_set_287" + "remarks": "rule_set_288" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_open", - "remarks": "rule_set_288" + "remarks": "rule_set_289" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - open", - "remarks": "rule_set_288" + "remarks": "rule_set_289" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_open", - "remarks": "rule_set_288" + "remarks": "rule_set_289" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - open", - "remarks": "rule_set_288" + "remarks": "rule_set_289" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_openat", - "remarks": "rule_set_289" + "remarks": "rule_set_290" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - openat", - "remarks": "rule_set_289" + "remarks": "rule_set_290" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_openat", - "remarks": "rule_set_289" + "remarks": "rule_set_290" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - openat", - "remarks": "rule_set_289" + "remarks": "rule_set_290" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_truncate", - "remarks": "rule_set_290" + "remarks": "rule_set_291" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - truncate", - "remarks": "rule_set_290" + "remarks": "rule_set_291" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_truncate", - "remarks": "rule_set_290" + "remarks": "rule_set_291" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - truncate", - "remarks": "rule_set_290" + "remarks": "rule_set_291" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_group", - "remarks": "rule_set_291" + "remarks": "rule_set_292" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/group", - "remarks": "rule_set_291" + "remarks": "rule_set_292" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_group", - "remarks": "rule_set_291" + "remarks": "rule_set_292" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/group", - "remarks": "rule_set_291" + "remarks": "rule_set_292" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_gshadow", - "remarks": "rule_set_292" + "remarks": "rule_set_293" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/gshadow", - "remarks": "rule_set_292" + "remarks": "rule_set_293" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_gshadow", - "remarks": "rule_set_292" + "remarks": "rule_set_293" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/gshadow", - "remarks": "rule_set_292" + "remarks": "rule_set_293" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_opasswd", - "remarks": "rule_set_293" + "remarks": "rule_set_294" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", - "remarks": "rule_set_293" + "remarks": "rule_set_294" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_opasswd", - "remarks": "rule_set_293" + "remarks": "rule_set_294" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", - "remarks": "rule_set_293" + "remarks": "rule_set_294" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_passwd", - "remarks": "rule_set_294" + "remarks": "rule_set_295" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/passwd", - "remarks": "rule_set_294" + "remarks": "rule_set_295" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_passwd", - "remarks": "rule_set_294" + "remarks": "rule_set_295" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/passwd", - "remarks": "rule_set_294" + "remarks": "rule_set_295" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_shadow", - "remarks": "rule_set_295" + "remarks": "rule_set_296" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/shadow", - "remarks": "rule_set_295" + "remarks": "rule_set_296" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_shadow", - "remarks": "rule_set_295" + "remarks": "rule_set_296" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/shadow", - "remarks": "rule_set_295" + "remarks": "rule_set_296" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_media_export", - "remarks": "rule_set_296" + "remarks": "rule_set_297" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Exporting to Media (successful)", - "remarks": "rule_set_296" + "remarks": "rule_set_297" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_media_export", - "remarks": "rule_set_296" + "remarks": "rule_set_297" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Exporting to Media (successful)", - "remarks": "rule_set_296" + "remarks": "rule_set_297" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_umount2", - "remarks": "rule_set_297" + "remarks": "rule_set_298" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - umount2", - "remarks": "rule_set_297" + "remarks": "rule_set_298" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_umount2", - "remarks": "rule_set_297" + "remarks": "rule_set_298" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - umount2", - "remarks": "rule_set_297" + "remarks": "rule_set_298" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands", - "remarks": "rule_set_298" + "remarks": "rule_set_299" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands", - "remarks": "rule_set_298" + "remarks": "rule_set_299" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands", - "remarks": "rule_set_298" + "remarks": "rule_set_299" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands", - "remarks": "rule_set_298" + "remarks": "rule_set_299" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rename", - "remarks": "rule_set_299" + "remarks": "rule_set_300" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rename", - "remarks": "rule_set_299" + "remarks": "rule_set_300" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rename", - "remarks": "rule_set_299" + "remarks": "rule_set_300" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rename", - "remarks": "rule_set_299" + "remarks": "rule_set_300" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat", - "remarks": "rule_set_300" + "remarks": "rule_set_301" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat", - "remarks": "rule_set_300" + "remarks": "rule_set_301" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat", - "remarks": "rule_set_300" + "remarks": "rule_set_301" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat", - "remarks": "rule_set_300" + "remarks": "rule_set_301" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat2", - "remarks": "rule_set_301" + "remarks": "rule_set_302" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat2", - "remarks": "rule_set_301" + "remarks": "rule_set_302" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat2", - "remarks": "rule_set_301" + "remarks": "rule_set_302" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat2", - "remarks": "rule_set_301" + "remarks": "rule_set_302" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rmdir", - "remarks": "rule_set_302" + "remarks": "rule_set_303" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rmdir", - "remarks": "rule_set_302" + "remarks": "rule_set_303" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rmdir", - "remarks": "rule_set_302" + "remarks": "rule_set_303" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rmdir", - "remarks": "rule_set_302" + "remarks": "rule_set_303" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlink", - "remarks": "rule_set_303" + "remarks": "rule_set_304" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlink", - "remarks": "rule_set_303" + "remarks": "rule_set_304" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlink", - "remarks": "rule_set_303" + "remarks": "rule_set_304" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlink", - "remarks": "rule_set_303" + "remarks": "rule_set_304" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlinkat", - "remarks": "rule_set_304" + "remarks": "rule_set_305" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlinkat", - "remarks": "rule_set_304" + "remarks": "rule_set_305" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlinkat", - "remarks": "rule_set_304" + "remarks": "rule_set_305" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlinkat", - "remarks": "rule_set_304" + "remarks": "rule_set_305" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_delete", - "remarks": "rule_set_305" + "remarks": "rule_set_306" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Unloading - delete_module", - "remarks": "rule_set_305" + "remarks": "rule_set_306" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_delete", - "remarks": "rule_set_305" + "remarks": "rule_set_306" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Unloading - delete_module", - "remarks": "rule_set_305" + "remarks": "rule_set_306" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_init", - "remarks": "rule_set_306" + "remarks": "rule_set_307" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading - init_module", - "remarks": "rule_set_306" + "remarks": "rule_set_307" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_init", - "remarks": "rule_set_306" + "remarks": "rule_set_307" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading - init_module", - "remarks": "rule_set_306" + "remarks": "rule_set_307" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_finit", - "remarks": "rule_set_307" + "remarks": "rule_set_308" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - finit_module", - "remarks": "rule_set_307" + "remarks": "rule_set_308" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_finit", - "remarks": "rule_set_307" + "remarks": "rule_set_308" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - finit_module", - "remarks": "rule_set_307" + "remarks": "rule_set_308" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_insmod", - "remarks": "rule_set_308" + "remarks": "rule_set_309" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - insmod", - "remarks": "rule_set_308" + "remarks": "rule_set_309" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_insmod", - "remarks": "rule_set_308" + "remarks": "rule_set_309" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - insmod", - "remarks": "rule_set_308" + "remarks": "rule_set_309" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_modprobe", - "remarks": "rule_set_309" + "remarks": "rule_set_310" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - modprobe", - "remarks": "rule_set_309" + "remarks": "rule_set_310" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_modprobe", - "remarks": "rule_set_309" + "remarks": "rule_set_310" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - modprobe", - "remarks": "rule_set_309" + "remarks": "rule_set_310" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_rmmod", - "remarks": "rule_set_310" + "remarks": "rule_set_311" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - rmmod", - "remarks": "rule_set_310" + "remarks": "rule_set_311" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_rmmod", - "remarks": "rule_set_310" + "remarks": "rule_set_311" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - rmmod", - "remarks": "rule_set_310" + "remarks": "rule_set_311" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_kmod", - "remarks": "rule_set_311" + "remarks": "rule_set_312" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - kmod", - "remarks": "rule_set_311" + "remarks": "rule_set_312" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_kmod", - "remarks": "rule_set_311" + "remarks": "rule_set_312" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - kmod", - "remarks": "rule_set_311" + "remarks": "rule_set_312" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_etc_selinux", - "remarks": "rule_set_312" + "remarks": "rule_set_313" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls (/etc/selinux)", - "remarks": "rule_set_312" + "remarks": "rule_set_313" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_etc_selinux", - "remarks": "rule_set_312" + "remarks": "rule_set_313" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls (/etc/selinux)", - "remarks": "rule_set_312" + "remarks": "rule_set_313" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_immutable", - "remarks": "rule_set_313" + "remarks": "rule_set_314" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Make the auditd Configuration Immutable", - "remarks": "rule_set_313" + "remarks": "rule_set_314" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_immutable", - "remarks": "rule_set_313" + "remarks": "rule_set_314" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Make the auditd Configuration Immutable", - "remarks": "rule_set_313" + "remarks": "rule_set_314" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_strict_kernel_rwx", - "remarks": "rule_set_314" + "remarks": "rule_set_315" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Make the kernel text and rodata read-only", - "remarks": "rule_set_314" + "remarks": "rule_set_315" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_strict_kernel_rwx", - "remarks": "rule_set_314" + "remarks": "rule_set_315" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Make the kernel text and rodata read-only", - "remarks": "rule_set_314" + "remarks": "rule_set_315" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_debug_wx", - "remarks": "rule_set_315" + "remarks": "rule_set_316" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Warn on W+X mappings found at boot", - "remarks": "rule_set_315" + "remarks": "rule_set_316" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_debug_wx", - "remarks": "rule_set_315" + "remarks": "rule_set_316" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Warn on W+X mappings found at boot", - "remarks": "rule_set_315" + "remarks": "rule_set_316" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_debug_fs", - "remarks": "rule_set_316" + "remarks": "rule_set_317" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable kernel debugfs", - "remarks": "rule_set_316" + "remarks": "rule_set_317" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_debug_fs", - "remarks": "rule_set_316" + "remarks": "rule_set_317" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable kernel debugfs", - "remarks": "rule_set_316" + "remarks": "rule_set_317" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_stackprotector", - "remarks": "rule_set_317" + "remarks": "rule_set_318" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Stack Protector buffer overflow detection", - "remarks": "rule_set_317" + "remarks": "rule_set_318" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_stackprotector", - "remarks": "rule_set_317" + "remarks": "rule_set_318" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Stack Protector buffer overflow detection", - "remarks": "rule_set_317" + "remarks": "rule_set_318" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_stackprotector_strong", - "remarks": "rule_set_318" + "remarks": "rule_set_319" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Strong Stack Protector", - "remarks": "rule_set_318" + "remarks": "rule_set_319" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_stackprotector_strong", - "remarks": "rule_set_318" + "remarks": "rule_set_319" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Strong Stack Protector", - "remarks": "rule_set_318" + "remarks": "rule_set_319" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_sched_stack_end_check", - "remarks": "rule_set_319" + "remarks": "rule_set_320" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Detect stack corruption on calls to schedule()", - "remarks": "rule_set_319" + "remarks": "rule_set_320" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_sched_stack_end_check", - "remarks": "rule_set_319" + "remarks": "rule_set_320" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Detect stack corruption on calls to schedule()", - "remarks": "rule_set_319" + "remarks": "rule_set_320" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_hardened_usercopy", - "remarks": "rule_set_320" + "remarks": "rule_set_321" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Harden memory copies between kernel and userspace", - "remarks": "rule_set_320" + "remarks": "rule_set_321" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_hardened_usercopy", - "remarks": "rule_set_320" + "remarks": "rule_set_321" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Harden memory copies between kernel and userspace", - "remarks": "rule_set_320" + "remarks": "rule_set_321" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_vmap_stack", - "remarks": "rule_set_321" + "remarks": "rule_set_322" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User a virtually-mapped stack", - "remarks": "rule_set_321" + "remarks": "rule_set_322" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_vmap_stack", - "remarks": "rule_set_321" + "remarks": "rule_set_322" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User a virtually-mapped stack", - "remarks": "rule_set_321" + "remarks": "rule_set_322" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_fortify_source", - "remarks": "rule_set_322" + "remarks": "rule_set_323" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Harden common str/mem functions against buffer overflows", - "remarks": "rule_set_322" + "remarks": "rule_set_323" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_fortify_source", - "remarks": "rule_set_322" + "remarks": "rule_set_323" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Harden common str/mem functions against buffer overflows", - "remarks": "rule_set_322" + "remarks": "rule_set_323" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_acpi_custom_method", - "remarks": "rule_set_323" + "remarks": "rule_set_324" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Do not allow ACPI methods to be inserted/replaced at run time", - "remarks": "rule_set_323" + "remarks": "rule_set_324" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_acpi_custom_method", - "remarks": "rule_set_323" + "remarks": "rule_set_324" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Do not allow ACPI methods to be inserted/replaced at run time", - "remarks": "rule_set_323" + "remarks": "rule_set_324" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_proc_kcore", - "remarks": "rule_set_324" + "remarks": "rule_set_325" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable support for /proc/kkcore", - "remarks": "rule_set_324" + "remarks": "rule_set_325" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_proc_kcore", - "remarks": "rule_set_324" + "remarks": "rule_set_325" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable support for /proc/kkcore", - "remarks": "rule_set_324" + "remarks": "rule_set_325" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_compat_vdso", - "remarks": "rule_set_325" + "remarks": "rule_set_326" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the 32-bit vDSO", - "remarks": "rule_set_325" + "remarks": "rule_set_326" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_compat_vdso", - "remarks": "rule_set_325" + "remarks": "rule_set_326" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the 32-bit vDSO", - "remarks": "rule_set_325" + "remarks": "rule_set_326" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_security_dmesg_restrict", - "remarks": "rule_set_326" + "remarks": "rule_set_327" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict unprivileged access to the kernel syslog", - "remarks": "rule_set_326" + "remarks": "rule_set_327" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_security_dmesg_restrict", - "remarks": "rule_set_326" + "remarks": "rule_set_327" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict unprivileged access to the kernel syslog", - "remarks": "rule_set_326" + "remarks": "rule_set_327" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_legacy_vsyscall_none", - "remarks": "rule_set_327" + "remarks": "rule_set_328" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable vsyscall mapping", - "remarks": "rule_set_327" + "remarks": "rule_set_328" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_legacy_vsyscall_none", - "remarks": "rule_set_327" + "remarks": "rule_set_328" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable vsyscall mapping", - "remarks": "rule_set_327" + "remarks": "rule_set_328" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_legacy_vsyscall_emulate", - "remarks": "rule_set_328" + "remarks": "rule_set_329" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable vsyscall emulation", - "remarks": "rule_set_328" + "remarks": "rule_set_329" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_legacy_vsyscall_emulate", - "remarks": "rule_set_328" + "remarks": "rule_set_329" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable vsyscall emulation", - "remarks": "rule_set_328" + "remarks": "rule_set_329" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_legacy_vsyscall_xonly", - "remarks": "rule_set_329" + "remarks": "rule_set_330" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable vsyscall emulate execution only", - "remarks": "rule_set_329" + "remarks": "rule_set_330" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_legacy_vsyscall_xonly", - "remarks": "rule_set_329" + "remarks": "rule_set_330" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable vsyscall emulate execution only", - "remarks": "rule_set_329" + "remarks": "rule_set_330" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_x86_vsyscall_emulation", - "remarks": "rule_set_330" + "remarks": "rule_set_331" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable x86 vsyscall emulation", - "remarks": "rule_set_330" + "remarks": "rule_set_331" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_x86_vsyscall_emulation", - "remarks": "rule_set_330" + "remarks": "rule_set_331" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable x86 vsyscall emulation", - "remarks": "rule_set_330" + "remarks": "rule_set_331" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_debug_credentials", - "remarks": "rule_set_331" + "remarks": "rule_set_332" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable checks on credential management", - "remarks": "rule_set_331" + "remarks": "rule_set_332" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_debug_credentials", - "remarks": "rule_set_331" + "remarks": "rule_set_332" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable checks on credential management", - "remarks": "rule_set_331" + "remarks": "rule_set_332" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_debug_notifiers", - "remarks": "rule_set_332" + "remarks": "rule_set_333" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable checks on notifier call chains", - "remarks": "rule_set_332" + "remarks": "rule_set_333" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_debug_notifiers", - "remarks": "rule_set_332" + "remarks": "rule_set_333" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable checks on notifier call chains", - "remarks": "rule_set_332" + "remarks": "rule_set_333" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_debug_list", - "remarks": "rule_set_333" + "remarks": "rule_set_334" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable checks on linked list manipulation", - "remarks": "rule_set_333" + "remarks": "rule_set_334" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_debug_list", - "remarks": "rule_set_333" + "remarks": "rule_set_334" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable checks on linked list manipulation", - "remarks": "rule_set_333" + "remarks": "rule_set_334" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_debug_sg", - "remarks": "rule_set_334" + "remarks": "rule_set_335" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable checks on scatter-gather (SG) table operations", - "remarks": "rule_set_334" + "remarks": "rule_set_335" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_debug_sg", - "remarks": "rule_set_334" + "remarks": "rule_set_335" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable checks on scatter-gather (SG) table operations", - "remarks": "rule_set_334" + "remarks": "rule_set_335" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_bug_on_data_corruption", - "remarks": "rule_set_335" + "remarks": "rule_set_336" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Trigger a kernel BUG when data corruption is detected", - "remarks": "rule_set_335" + "remarks": "rule_set_336" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_bug_on_data_corruption", - "remarks": "rule_set_335" + "remarks": "rule_set_336" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Trigger a kernel BUG when data corruption is detected", - "remarks": "rule_set_335" + "remarks": "rule_set_336" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_slab_freelist_random", - "remarks": "rule_set_336" + "remarks": "rule_set_337" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Randomize slab freelist", - "remarks": "rule_set_336" + "remarks": "rule_set_337" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_slab_freelist_random", - "remarks": "rule_set_336" + "remarks": "rule_set_337" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Randomize slab freelist", - "remarks": "rule_set_336" + "remarks": "rule_set_337" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_slab_freelist_hardened", - "remarks": "rule_set_337" + "remarks": "rule_set_338" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Harden slab freelist metadata", - "remarks": "rule_set_337" + "remarks": "rule_set_338" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_slab_freelist_hardened", - "remarks": "rule_set_337" + "remarks": "rule_set_338" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Harden slab freelist metadata", - "remarks": "rule_set_337" + "remarks": "rule_set_338" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_slab_merge_default", - "remarks": "rule_set_338" + "remarks": "rule_set_339" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disallow merge of slab caches", - "remarks": "rule_set_338" + "remarks": "rule_set_339" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_slab_merge_default", - "remarks": "rule_set_338" + "remarks": "rule_set_339" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disallow merge of slab caches", - "remarks": "rule_set_338" + "remarks": "rule_set_339" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_slub_debug", - "remarks": "rule_set_339" + "remarks": "rule_set_340" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable SLUB debugging support", - "remarks": "rule_set_339" + "remarks": "rule_set_340" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_slub_debug", - "remarks": "rule_set_339" + "remarks": "rule_set_340" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable SLUB debugging support", - "remarks": "rule_set_339" + "remarks": "rule_set_340" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_page_poisoning", - "remarks": "rule_set_340" + "remarks": "rule_set_341" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable poison of pages after freeing", - "remarks": "rule_set_340" + "remarks": "rule_set_341" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_page_poisoning", - "remarks": "rule_set_340" + "remarks": "rule_set_341" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable poison of pages after freeing", - "remarks": "rule_set_340" + "remarks": "rule_set_341" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_compat_brk", - "remarks": "rule_set_341" + "remarks": "rule_set_342" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable compatibility with brk()", - "remarks": "rule_set_341" + "remarks": "rule_set_342" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_compat_brk", - "remarks": "rule_set_341" + "remarks": "rule_set_342" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable compatibility with brk()", - "remarks": "rule_set_341" + "remarks": "rule_set_342" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_strict_module_rwx", - "remarks": "rule_set_342" + "remarks": "rule_set_343" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Make the module text and rodata read-only", - "remarks": "rule_set_342" + "remarks": "rule_set_343" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_strict_module_rwx", - "remarks": "rule_set_342" + "remarks": "rule_set_343" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Make the module text and rodata read-only", - "remarks": "rule_set_342" + "remarks": "rule_set_343" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_module_sig", - "remarks": "rule_set_343" + "remarks": "rule_set_344" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable module signature verification", - "remarks": "rule_set_343" + "remarks": "rule_set_344" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_module_sig", - "remarks": "rule_set_343" + "remarks": "rule_set_344" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable module signature verification", - "remarks": "rule_set_343" + "remarks": "rule_set_344" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_module_sig_force", - "remarks": "rule_set_344" + "remarks": "rule_set_345" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require modules to be validly signed", - "remarks": "rule_set_344" + "remarks": "rule_set_345" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_module_sig_force", - "remarks": "rule_set_344" + "remarks": "rule_set_345" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require modules to be validly signed", - "remarks": "rule_set_344" + "remarks": "rule_set_345" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_module_sig_all", - "remarks": "rule_set_345" + "remarks": "rule_set_346" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable automatic signing of all modules", - "remarks": "rule_set_345" + "remarks": "rule_set_346" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_module_sig_all", - "remarks": "rule_set_345" + "remarks": "rule_set_346" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable automatic signing of all modules", - "remarks": "rule_set_345" + "remarks": "rule_set_346" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_module_sig_sha512", - "remarks": "rule_set_346" + "remarks": "rule_set_347" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Sign kernel modules with SHA-512", - "remarks": "rule_set_346" + "remarks": "rule_set_347" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_module_sig_sha512", - "remarks": "rule_set_346" + "remarks": "rule_set_347" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Sign kernel modules with SHA-512", - "remarks": "rule_set_346" + "remarks": "rule_set_347" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_module_sig_hash", - "remarks": "rule_set_347" + "remarks": "rule_set_348" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Specify the hash to use when signing modules", - "remarks": "rule_set_347" + "remarks": "rule_set_348" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_module_sig_hash", - "remarks": "rule_set_347" + "remarks": "rule_set_348" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Specify the hash to use when signing modules", - "remarks": "rule_set_347" + "remarks": "rule_set_348" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_module_sig_key", - "remarks": "rule_set_348" + "remarks": "rule_set_349" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Specify module signing key to use", - "remarks": "rule_set_348" + "remarks": "rule_set_349" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_module_sig_key", - "remarks": "rule_set_348" + "remarks": "rule_set_349" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Specify module signing key to use", - "remarks": "rule_set_348" + "remarks": "rule_set_349" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_bug", - "remarks": "rule_set_349" + "remarks": "rule_set_350" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable support for BUG()", - "remarks": "rule_set_349" + "remarks": "rule_set_350" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_bug", - "remarks": "rule_set_349" + "remarks": "rule_set_350" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable support for BUG()", - "remarks": "rule_set_349" + "remarks": "rule_set_350" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_panic_on_oops", - "remarks": "rule_set_350" + "remarks": "rule_set_351" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Kernel panic oops", - "remarks": "rule_set_350" + "remarks": "rule_set_351" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_panic_on_oops", - "remarks": "rule_set_350" + "remarks": "rule_set_351" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Kernel panic oops", - "remarks": "rule_set_350" + "remarks": "rule_set_351" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_panic_timeout", - "remarks": "rule_set_351" + "remarks": "rule_set_352" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Kernel panic timeout", - "remarks": "rule_set_351" + "remarks": "rule_set_352" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_panic_timeout", - "remarks": "rule_set_351" + "remarks": "rule_set_352" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Kernel panic timeout", - "remarks": "rule_set_351" + "remarks": "rule_set_352" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_seccomp", - "remarks": "rule_set_352" + "remarks": "rule_set_353" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable seccomp to safely compute untrusted bytecode", - "remarks": "rule_set_352" + "remarks": "rule_set_353" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_seccomp", - "remarks": "rule_set_352" + "remarks": "rule_set_353" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable seccomp to safely compute untrusted bytecode", - "remarks": "rule_set_352" + "remarks": "rule_set_353" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_seccomp_filter", - "remarks": "rule_set_353" + "remarks": "rule_set_354" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable use of Berkeley Packet Filter with seccomp", - "remarks": "rule_set_353" + "remarks": "rule_set_354" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_seccomp_filter", - "remarks": "rule_set_353" + "remarks": "rule_set_354" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable use of Berkeley Packet Filter with seccomp", - "remarks": "rule_set_353" + "remarks": "rule_set_354" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_security", - "remarks": "rule_set_354" + "remarks": "rule_set_355" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable different security models", - "remarks": "rule_set_354" + "remarks": "rule_set_355" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_security", - "remarks": "rule_set_354" + "remarks": "rule_set_355" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable different security models", - "remarks": "rule_set_354" + "remarks": "rule_set_355" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_security_yama", - "remarks": "rule_set_355" + "remarks": "rule_set_356" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Yama support", - "remarks": "rule_set_355" + "remarks": "rule_set_356" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_security_yama", - "remarks": "rule_set_355" + "remarks": "rule_set_356" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Yama support", - "remarks": "rule_set_355" + "remarks": "rule_set_356" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_gcc_plugin_latent_entropy", - "remarks": "rule_set_356" + "remarks": "rule_set_357" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Generate some entropy during boot and runtime", - "remarks": "rule_set_356" + "remarks": "rule_set_357" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_gcc_plugin_latent_entropy", - "remarks": "rule_set_356" + "remarks": "rule_set_357" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Generate some entropy during boot and runtime", - "remarks": "rule_set_356" + "remarks": "rule_set_357" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_gcc_plugin_stackleak", - "remarks": "rule_set_357" + "remarks": "rule_set_358" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Poison kernel stack before returning from syscalls", - "remarks": "rule_set_357" + "remarks": "rule_set_358" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_gcc_plugin_stackleak", - "remarks": "rule_set_357" + "remarks": "rule_set_358" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Poison kernel stack before returning from syscalls", - "remarks": "rule_set_357" + "remarks": "rule_set_358" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_gcc_plugin_structleak", - "remarks": "rule_set_358" + "remarks": "rule_set_359" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Force initialization of variables containing userspace addresses", - "remarks": "rule_set_358" + "remarks": "rule_set_359" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_gcc_plugin_structleak", - "remarks": "rule_set_358" + "remarks": "rule_set_359" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Force initialization of variables containing userspace addresses", - "remarks": "rule_set_358" + "remarks": "rule_set_359" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_gcc_plugin_structleak_byref_all", - "remarks": "rule_set_359" + "remarks": "rule_set_360" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "zero-init everything passed by reference", - "remarks": "rule_set_359" + "remarks": "rule_set_360" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_gcc_plugin_structleak_byref_all", - "remarks": "rule_set_359" + "remarks": "rule_set_360" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "zero-init everything passed by reference", - "remarks": "rule_set_359" + "remarks": "rule_set_360" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_gcc_plugin_randstruct", - "remarks": "rule_set_360" + "remarks": "rule_set_361" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Randomize layout of sensitive kernel structures", - "remarks": "rule_set_360" + "remarks": "rule_set_361" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_gcc_plugin_randstruct", - "remarks": "rule_set_360" + "remarks": "rule_set_361" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Randomize layout of sensitive kernel structures", - "remarks": "rule_set_360" + "remarks": "rule_set_361" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_syn_cookies", - "remarks": "rule_set_361" + "remarks": "rule_set_362" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable TCP/IP syncookie support", - "remarks": "rule_set_361" + "remarks": "rule_set_362" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_syn_cookies", - "remarks": "rule_set_361" + "remarks": "rule_set_362" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable TCP/IP syncookie support", - "remarks": "rule_set_361" + "remarks": "rule_set_362" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_kexec", - "remarks": "rule_set_362" + "remarks": "rule_set_363" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable kexec system call", - "remarks": "rule_set_362" + "remarks": "rule_set_363" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_kexec", - "remarks": "rule_set_362" + "remarks": "rule_set_363" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable kexec system call", - "remarks": "rule_set_362" + "remarks": "rule_set_363" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_hibernation", - "remarks": "rule_set_363" + "remarks": "rule_set_364" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable hibernation", - "remarks": "rule_set_363" + "remarks": "rule_set_364" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_hibernation", - "remarks": "rule_set_363" + "remarks": "rule_set_364" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable hibernation", - "remarks": "rule_set_363" + "remarks": "rule_set_364" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_binfmt_misc", - "remarks": "rule_set_364" + "remarks": "rule_set_365" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable kernel support for MISC binaries", - "remarks": "rule_set_364" + "remarks": "rule_set_365" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_binfmt_misc", - "remarks": "rule_set_364" + "remarks": "rule_set_365" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable kernel support for MISC binaries", - "remarks": "rule_set_364" + "remarks": "rule_set_365" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_legacy_ptys", - "remarks": "rule_set_365" + "remarks": "rule_set_366" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable legacy (BSD) PTY support", - "remarks": "rule_set_365" + "remarks": "rule_set_366" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_legacy_ptys", - "remarks": "rule_set_365" + "remarks": "rule_set_366" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable legacy (BSD) PTY support", - "remarks": "rule_set_365" + "remarks": "rule_set_366" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_default_mmap_min_addr", - "remarks": "rule_set_366" + "remarks": "rule_set_367" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Low Address Space To Protect From User Allocation", - "remarks": "rule_set_366" + "remarks": "rule_set_367" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_default_mmap_min_addr", - "remarks": "rule_set_366" + "remarks": "rule_set_367" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Low Address Space To Protect From User Allocation", - "remarks": "rule_set_366" + "remarks": "rule_set_367" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_randomize_base", - "remarks": "rule_set_367" + "remarks": "rule_set_368" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Randomize the address of the kernel image (KASLR)", - "remarks": "rule_set_367" + "remarks": "rule_set_368" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_randomize_base", - "remarks": "rule_set_367" + "remarks": "rule_set_368" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Randomize the address of the kernel image (KASLR)", - "remarks": "rule_set_367" + "remarks": "rule_set_368" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_randomize_memory", - "remarks": "rule_set_368" + "remarks": "rule_set_369" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Randomize the kernel memory sections", - "remarks": "rule_set_368" + "remarks": "rule_set_369" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_randomize_memory", - "remarks": "rule_set_368" + "remarks": "rule_set_369" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Randomize the kernel memory sections", - "remarks": "rule_set_368" + "remarks": "rule_set_369" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_ia32_emulation", - "remarks": "rule_set_369" + "remarks": "rule_set_370" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable IA32 emulation", - "remarks": "rule_set_369" + "remarks": "rule_set_370" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_ia32_emulation", - "remarks": "rule_set_369" + "remarks": "rule_set_370" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable IA32 emulation", - "remarks": "rule_set_369" + "remarks": "rule_set_370" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_modify_ldt_syscall", - "remarks": "rule_set_370" + "remarks": "rule_set_371" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the LDT (local descriptor table)", - "remarks": "rule_set_370" + "remarks": "rule_set_371" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_modify_ldt_syscall", - "remarks": "rule_set_370" + "remarks": "rule_set_371" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the LDT (local descriptor table)", - "remarks": "rule_set_370" + "remarks": "rule_set_371" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_arm64_sw_ttbr0_pan", - "remarks": "rule_set_371" + "remarks": "rule_set_372" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Emulate Privileged Access Never (PAN)", - "remarks": "rule_set_371" + "remarks": "rule_set_372" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_arm64_sw_ttbr0_pan", - "remarks": "rule_set_371" + "remarks": "rule_set_372" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Emulate Privileged Access Never (PAN)", - "remarks": "rule_set_371" + "remarks": "rule_set_372" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_unmap_kernel_at_el0", - "remarks": "rule_set_372" + "remarks": "rule_set_373" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Unmap kernel when running in userspace (aka KAISER)", - "remarks": "rule_set_372" + "remarks": "rule_set_373" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_config_unmap_kernel_at_el0", - "remarks": "rule_set_372" + "remarks": "rule_set_373" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Unmap kernel when running in userspace (aka KAISER)", - "remarks": "rule_set_372" + "remarks": "rule_set_373" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sebool_selinuxuser_execheap", - "remarks": "rule_set_373" + "remarks": "rule_set_374" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the selinuxuser_execheap SELinux Boolean", - "remarks": "rule_set_373" + "remarks": "rule_set_374" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sebool_selinuxuser_execheap", - "remarks": "rule_set_373" + "remarks": "rule_set_374" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the selinuxuser_execheap SELinux Boolean", - "remarks": "rule_set_373" + "remarks": "rule_set_374" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sebool_deny_execmem", - "remarks": "rule_set_374" + "remarks": "rule_set_375" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the deny_execmem SELinux Boolean", - "remarks": "rule_set_374" + "remarks": "rule_set_375" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sebool_deny_execmem", - "remarks": "rule_set_374" + "remarks": "rule_set_375" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the deny_execmem SELinux Boolean", - "remarks": "rule_set_374" + "remarks": "rule_set_375" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sebool_selinuxuser_execstack", - "remarks": "rule_set_375" + "remarks": "rule_set_376" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the selinuxuser_execstack SELinux Boolean", - "remarks": "rule_set_375" + "remarks": "rule_set_376" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sebool_selinuxuser_execstack", - "remarks": "rule_set_375" + "remarks": "rule_set_376" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the selinuxuser_execstack SELinux Boolean", - "remarks": "rule_set_375" + "remarks": "rule_set_376" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sebool_ssh_sysadm_login", - "remarks": "rule_set_376" + "remarks": "rule_set_377" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the ssh_sysadm_login SELinux Boolean", - "remarks": "rule_set_376" + "remarks": "rule_set_377" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sebool_ssh_sysadm_login", - "remarks": "rule_set_376" + "remarks": "rule_set_377" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the ssh_sysadm_login SELinux Boolean", - "remarks": "rule_set_376" + "remarks": "rule_set_377" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_setroubleshoot_removed", - "remarks": "rule_set_377" + "remarks": "rule_set_378" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall setroubleshoot Package", - "remarks": "rule_set_377" + "remarks": "rule_set_378" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_setroubleshoot_removed", - "remarks": "rule_set_377" + "remarks": "rule_set_378" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall setroubleshoot Package", - "remarks": "rule_set_377" + "remarks": "rule_set_378" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_setroubleshoot-server_removed", - "remarks": "rule_set_378" + "remarks": "rule_set_379" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall setroubleshoot-server Package", - "remarks": "rule_set_378" + "remarks": "rule_set_379" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_setroubleshoot-server_removed", - "remarks": "rule_set_378" + "remarks": "rule_set_379" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall setroubleshoot-server Package", - "remarks": "rule_set_378" + "remarks": "rule_set_379" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_setroubleshoot-plugins_removed", - "remarks": "rule_set_379" + "remarks": "rule_set_380" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall setroubleshoot-plugins Package", - "remarks": "rule_set_379" + "remarks": "rule_set_380" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_setroubleshoot-plugins_removed", - "remarks": "rule_set_379" + "remarks": "rule_set_380" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Uninstall setroubleshoot-plugins Package", - "remarks": "rule_set_379" + "remarks": "rule_set_380" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_periodic_cron_checking", - "remarks": "rule_set_380" + "remarks": "rule_set_381" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Periodic Execution of AIDE", - "remarks": "rule_set_380" + "remarks": "rule_set_381" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_periodic_cron_checking", - "remarks": "rule_set_380" + "remarks": "rule_set_381" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Periodic Execution of AIDE", - "remarks": "rule_set_380" + "remarks": "rule_set_381" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_scan_notification", - "remarks": "rule_set_381" + "remarks": "rule_set_382" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Notification of Post-AIDE Scan Details", - "remarks": "rule_set_381" + "remarks": "rule_set_382" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_scan_notification", - "remarks": "rule_set_381" + "remarks": "rule_set_382" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Notification of Post-AIDE Scan Details", - "remarks": "rule_set_381" + "remarks": "rule_set_382" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_verify_acls", - "remarks": "rule_set_382" + "remarks": "rule_set_383" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure AIDE to Verify Access Control Lists (ACLs)", - "remarks": "rule_set_382" + "remarks": "rule_set_383" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_verify_acls", - "remarks": "rule_set_382" + "remarks": "rule_set_383" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure AIDE to Verify Access Control Lists (ACLs)", - "remarks": "rule_set_382" + "remarks": "rule_set_383" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_verify_ext_attributes", - "remarks": "rule_set_383" + "remarks": "rule_set_384" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure AIDE to Verify Extended Attributes", - "remarks": "rule_set_383" + "remarks": "rule_set_384" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_verify_ext_attributes", - "remarks": "rule_set_383" + "remarks": "rule_set_384" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure AIDE to Verify Extended Attributes", - "remarks": "rule_set_383" + "remarks": "rule_set_384" } ], "control-implementations": [ { - "uuid": "bd5f172a-f0d6-4edd-a701-ca209a6bb6ee", + "uuid": "e198a7f5-3c07-45a7-932a-ea4e63ae6d4d", "source": "trestle://profiles/rhel10-anssi-high/profile.json", "description": "Control implementation for anssi_bp28_high", "props": [ @@ -18799,7 +18840,7 @@ ], "implemented-requirements": [ { - "uuid": "f1e895c9-0ad9-43b5-98ba-4d53dfdd4f98", + "uuid": "5c16c59b-f8ff-47c6-9948-4e38858a4c47", "control-id": "r4", "description": "The description for control-id r4.", "props": [ @@ -18812,7 +18853,7 @@ ] }, { - "uuid": "e441ce23-1056-47da-8f31-3329c599675d", + "uuid": "2a16bf68-c25c-4a34-9b09-f3fa37462fee", "control-id": "r6", "description": "The description for control-id r6.", "props": [ @@ -18825,7 +18866,7 @@ ] }, { - "uuid": "bfc7a67f-55b8-46ea-8f69-6d3a07838518", + "uuid": "2bea139e-af8a-43cb-abe5-558c4bb590fa", "control-id": "r15", "description": "The special case of direct access to physical memory is not handled.", "props": [ @@ -18922,7 +18963,7 @@ ] }, { - "uuid": "242bb1ee-912b-4a01-ae7d-e53b81b023da", + "uuid": "3dcaf0d3-735f-46f3-a001-15954d651e2c", "control-id": "r16", "description": "No notes for control-id R16.", "props": [ @@ -18959,7 +19000,7 @@ ] }, { - "uuid": "f4026395-1398-4fc1-883c-dbb87fda56b7", + "uuid": "058a982f-8a3e-4953-9ffe-1dca9a7b6a78", "control-id": "r17", "description": "No notes for control-id R17.", "props": [ @@ -19001,7 +19042,7 @@ ] }, { - "uuid": "2203df46-99a8-4f63-9196-1c8ff53a5f99", + "uuid": "e6f22cd4-646c-422a-a9ac-99c15d968cd3", "control-id": "r18", "description": "No notes for control-id R18.", "props": [ @@ -19048,7 +19089,7 @@ ] }, { - "uuid": "35a45401-aa9e-4ef5-bda3-ca7ebc6e8758", + "uuid": "a0b9baf5-d811-42fc-b9b6-b60acc5c5745", "control-id": "r19", "description": "No notes for control-id R19.", "props": [ @@ -19075,7 +19116,7 @@ ] }, { - "uuid": "75ebbb0b-c89c-4bb7-8721-934525d11e7a", + "uuid": "2458a631-8be8-4a9e-ac02-ba02b0aed926", "control-id": "r20", "description": "No notes for control-id R20.", "props": [ @@ -19107,7 +19148,7 @@ ] }, { - "uuid": "d18b53ef-57dd-4a12-94a8-40d6931aaac3", + "uuid": "5c7744a3-738f-4e86-b7cf-74f81c20abc4", "control-id": "r21", "description": "No notes for control-id R21.", "props": [ @@ -19144,7 +19185,7 @@ ] }, { - "uuid": "74f5397c-cdf9-47ac-bf38-89bc9a17b15e", + "uuid": "84f654d2-326c-46cb-9df0-8bfc1cdf2975", "control-id": "r22", "description": "This control doesn't disable the IPv6 stack, to disable it select the related rule.", "props": [ @@ -19161,7 +19202,7 @@ ] }, { - "uuid": "ef660315-06ff-4515-97de-e4ba36b9f2ea", + "uuid": "ef42b1a9-a865-403a-a4fe-cab05c65cdd1", "control-id": "r23", "description": "If the system can function without support for kernel modules, module support should be disabled by setting CONFIG_MODULES=n.", "props": [ @@ -19193,7 +19234,7 @@ ] }, { - "uuid": "e08d64ec-5e8f-487a-a6bb-3ea3eb1b62d7", + "uuid": "1eff950a-e23a-4de6-bd89-4eda04919a15", "control-id": "r24", "description": "The description for control-id r24.", "props": [ @@ -19206,7 +19247,7 @@ ] }, { - "uuid": "fca089a1-8da7-4049-a6e1-28ac8895e1b5", + "uuid": "617646a6-e312-4c36-a34e-24d27cb63fa8", "control-id": "r25", "description": "No notes for control-id R25.", "props": [ @@ -19243,7 +19284,7 @@ ] }, { - "uuid": "26744de8-2032-45e7-ad1f-a91be0e704bf", + "uuid": "08cfd957-3c4f-459f-ad28-deadbbaee358", "control-id": "r26", "description": "The description for control-id r26.", "props": [ @@ -19256,7 +19297,7 @@ ] }, { - "uuid": "6313419e-84a9-4ce5-b1e9-eea13784b12c", + "uuid": "7f31a660-fa52-4618-b18e-9a821f0c53e0", "control-id": "r27", "description": "No notes for control-id R27.", "props": [ @@ -19288,7 +19329,7 @@ ] }, { - "uuid": "b4755c2b-68dc-473d-9ff9-fc59d2440140", + "uuid": "f61cc306-e61b-4642-8ed6-a08e59548daa", "control-id": "r46", "description": "No notes for control-id R46.", "props": [ @@ -19305,7 +19346,7 @@ ] }, { - "uuid": "337146aa-447b-4748-8c16-6365342b3c66", + "uuid": "fcf64ed5-7ebe-4934-bea9-c3001fa05fcd", "control-id": "r47", "description": "The description for control-id r47.", "props": [ @@ -19318,7 +19359,7 @@ ] }, { - "uuid": "f3b135d7-814b-4571-9fcb-28ade3412872", + "uuid": "ce734176-f901-4e85-bc02-5fe27fd41de6", "control-id": "r48", "description": "In RHEL, the SELinux boolean allow_execheap is renamed to selinuxuser_execheap, and the boolean allow_execstack is renamed to selinuxuser_execstack. And allow_execmem is not available, deny_execmem provides the same functionality.", "props": [ @@ -19350,7 +19391,7 @@ ] }, { - "uuid": "237a9eee-1901-4648-9ad4-65c4e24a7d9c", + "uuid": "cc00c8bd-bd50-43ce-a431-d5f9e7ddeab5", "control-id": "r49", "description": "No notes for control-id R49.", "props": [ @@ -19377,7 +19418,7 @@ ] }, { - "uuid": "909de9d8-1b89-48ee-a27f-b750b778a6a7", + "uuid": "f177bdd0-6719-4fb4-9e79-464076e54df4", "control-id": "r66", "description": "The description for control-id r66.", "props": [ @@ -19390,7 +19431,7 @@ ] }, { - "uuid": "0485b7e4-7e7c-456b-a5d0-eb5fa39c7d54", + "uuid": "c07ba1f8-e626-42ff-a34f-92b9d08a4c20", "control-id": "r76", "description": "No notes for control-id R76.", "props": [ @@ -19432,7 +19473,7 @@ ] }, { - "uuid": "a246e95a-8b22-4ba8-b056-5b7867afe5f8", + "uuid": "b332c2c3-763d-48a9-b93b-e27bebabc67a", "control-id": "r77", "description": "The description for control-id r77.", "props": [ @@ -19445,7 +19486,7 @@ ] }, { - "uuid": "fb0c77e5-b2b7-42cd-bd63-c3a63448f630", + "uuid": "8bdab886-9835-4c59-8f05-eaf4207260b2", "control-id": "r1", "description": "This requirement can be checked, but remediation requires manual reinstall of the OS. The content automation cannot really configure the BIOS, but can in some cases, check settings that are visible to the OS. Like for example the NX/DX setting.", "props": [ @@ -19467,7 +19508,7 @@ ] }, { - "uuid": "4dfcfca7-b42c-440e-ac84-19d1590c8250", + "uuid": "64fa5a7a-c259-442f-ae2d-1469f7dd8bcb", "control-id": "r7", "description": "No notes for control-id R7.", "props": [ @@ -19484,7 +19525,7 @@ ] }, { - "uuid": "927f8ed4-4956-440f-bdee-7958dfbdc59e", + "uuid": "9d313d00-5b70-44f4-9c4e-8a524011a49a", "control-id": "r10", "description": "No notes for control-id R10.", "props": [ @@ -19501,7 +19542,7 @@ ] }, { - "uuid": "949396a0-0c34-486d-92e4-489ffcbb8939", + "uuid": "b74fba37-0939-41cb-9010-c9df634700bb", "control-id": "r29", "description": "The /boot partition mounted is essential to perform certain administrative actions, for example updating the kernel. Therefore, for better stability, in this requirement only rules to restrict the access to /boot are selected. It is not changed how the /boot is mounted.", "props": [ @@ -19558,7 +19599,7 @@ ] }, { - "uuid": "3c7f40ba-1f45-4d4c-8f2d-776929c9fda4", + "uuid": "13c001ed-45e3-464b-b113-b7652d66fcda", "control-id": "r36", "description": "There are cases of Systemd services which would stop working in case umask would be configured to 0027 for all services. One such example is the Cups service which needs to create sockets which need to be available for all users. Therefore, this part of the requirement can't be automated.", "props": [ @@ -19585,7 +19626,7 @@ ] }, { - "uuid": "7958f803-dd2a-4c18-b707-8927f6122bbc", + "uuid": "86b38849-814c-4f34-b95d-a097b76533c0", "control-id": "r37", "description": "Other partitioning mechanisms can include chroot and containers and are not contemplated in this requirement.", "props": [ @@ -19602,7 +19643,7 @@ ] }, { - "uuid": "21e59793-4a72-4eb3-b234-70248f1fdbb3", + "uuid": "af4aa0a7-7cb9-44d8-aeef-17e060655aa0", "control-id": "r38", "description": "No notes for control-id R38.", "props": [ @@ -19624,7 +19665,7 @@ ] }, { - "uuid": "4d7878c8-1cf9-4d95-a7dd-f487ebe3ecd1", + "uuid": "54879e30-ee76-4565-975f-06c62be0ad29", "control-id": "r41", "description": "The description for control-id r41.", "props": [ @@ -19637,7 +19678,7 @@ ] }, { - "uuid": "4576590e-4d32-4032-9cbe-9e3a9767e966", + "uuid": "fc01085c-3630-4643-b78b-f562889049ec", "control-id": "r45", "description": "No notes for control-id R45.", "props": [ @@ -19649,7 +19690,7 @@ ] }, { - "uuid": "d22010bd-2d96-453f-8305-3ca78f21449b", + "uuid": "59452d28-18e1-45b4-a91e-a814efa6f94f", "control-id": "r51", "description": "This concerns two aspects, the first is administrative, and involves prompt installation of secrets or trusted elements by the sysadmin. The second involves removal of any default secret or trusted element configured by the operating system during install process, e.g. default known passwords.", "props": [ @@ -19661,7 +19702,7 @@ ] }, { - "uuid": "432e95ac-e551-43b4-be90-20ad848a4a6b", + "uuid": "7ac6b91a-5bb7-40f4-8724-354c2f4d448e", "control-id": "r57", "description": "The description for control-id r57.", "props": [ @@ -19674,7 +19715,7 @@ ] }, { - "uuid": "a1c25555-8762-4bc4-9c9f-10502319addd", + "uuid": "63cf0e55-c1a0-4f0d-b5e0-f798d99b5cad", "control-id": "r60", "description": "The description for control-id r60.", "props": [ @@ -19687,7 +19728,7 @@ ] }, { - "uuid": "7a62f78b-5363-4d29-a893-f411543f98b6", + "uuid": "9070477d-ae5b-4855-9549-0ccf556ed362", "control-id": "r64", "description": "SELinux policies limit the privileges of services and daemons just to those which are required. The policies should be enough to restrict the services' privileges to its essentials, but the automated content cannot assess whether they are the minimum required for the deployment.", "props": [ @@ -19704,7 +19745,7 @@ ] }, { - "uuid": "3a183450-04e2-429c-8923-e11a4055bae8", + "uuid": "a69e0c50-29bb-438c-a966-096de5eba948", "control-id": "r65", "description": "The description for control-id r65.", "props": [ @@ -19717,7 +19758,7 @@ ] }, { - "uuid": "d95136ca-739d-4cbf-89a0-cf5406705dff", + "uuid": "8e003cd5-2a54-461c-a922-a62755889751", "control-id": "r71", "description": "A lot of recommendations and requirements from the DAT-PA-012 document are administrative and hard to automate. The rules selected below address a few of the aspects that can be covered, keep in mind that these configurations should be customized for the systems deployment requirements.", "props": [ @@ -19804,7 +19845,7 @@ ] }, { - "uuid": "830c05a2-229a-481d-a6dd-62fc22c11b6b", + "uuid": "91774416-5088-47a0-968d-d2ce4c5d32a9", "control-id": "r72", "description": "No notes for control-id R72.", "props": [ @@ -19816,7 +19857,7 @@ ] }, { - "uuid": "c6bf9cce-3d26-44ec-9ee9-7b0dcb944f78", + "uuid": "04c69189-2468-47da-a941-1b26680429d7", "control-id": "r73", "description": "No notes for control-id R73.", "props": [ @@ -20108,7 +20149,7 @@ ] }, { - "uuid": "8b1fa61a-31be-457b-857a-dcc47795e7f9", + "uuid": "85ed547f-721d-4379-83f6-ce53b6c156d2", "control-id": "r78", "description": "The description for control-id r78.", "props": [ @@ -20121,7 +20162,7 @@ ] }, { - "uuid": "794020bc-c590-4135-b056-21ef20b41afb", + "uuid": "b480bd1e-1f26-422b-a232-b8f6e6a666fe", "control-id": "r2", "description": "The description for control-id r2.", "props": [ @@ -20134,7 +20175,7 @@ ] }, { - "uuid": "f1ab67b4-192d-4ae1-9a8f-86dc8c780c1c", + "uuid": "9fad6b1b-b438-455b-a95d-4a773ef74125", "control-id": "r3", "description": "The description for control-id r3.", "props": [ @@ -20147,7 +20188,7 @@ ] }, { - "uuid": "802d506d-aacc-4dca-bcdd-57821ed66910", + "uuid": "2a731c27-016d-492a-b1fa-f382c423ada6", "control-id": "r5", "description": "No notes for control-id R5.", "props": [ @@ -20164,7 +20205,7 @@ ] }, { - "uuid": "0cd6124c-0c3a-4dc1-9436-a202272cca2e", + "uuid": "fcd0493f-7a1e-4e8e-8bca-0ca2bae55180", "control-id": "r8", "description": "No notes for control-id R8.", "props": [ @@ -20236,7 +20277,7 @@ ] }, { - "uuid": "5b9d0c5c-24f8-469d-9124-28dc5654a296", + "uuid": "04e7a1ea-3771-4717-a190-3d9ee41816fb", "control-id": "r9", "description": "No notes for control-id R9.", "props": [ @@ -20298,7 +20339,7 @@ ] }, { - "uuid": "dad351c3-f045-4c6d-9b45-2a93b0bf4e99", + "uuid": "65613536-b43a-403a-af29-164bc0f77a4d", "control-id": "r11", "description": "No notes for control-id R11.", "props": [ @@ -20315,7 +20356,7 @@ ] }, { - "uuid": "0402cb60-e0a9-42b0-bd51-ee2f0527bd27", + "uuid": "96857ce1-e81e-432a-a266-ac5bfbea7db5", "control-id": "r12", "description": "No notes for control-id R12.", "props": [ @@ -20442,7 +20483,7 @@ ] }, { - "uuid": "4e7ff8d5-2e61-474b-b047-e95a8f62eaf4", + "uuid": "db3f544f-ae99-442f-921f-1676c8c2e047", "control-id": "r13", "description": "When IPv6 is not in use, disable it, otherwise secure the IPv6 stack. This control hardens the IPv6 stack, to disable it use the related rules instead.", "props": [ @@ -20534,7 +20575,7 @@ ] }, { - "uuid": "1ada932d-859d-4bc4-a075-7987f31fd22c", + "uuid": "5c87f9f2-4eb8-47b7-b70b-444181b58eda", "control-id": "r14", "description": "The rule for the /proc file system is not implemented", "props": [ @@ -20571,7 +20612,7 @@ ] }, { - "uuid": "b87603db-134e-4ac4-bc8c-83db98354e40", + "uuid": "10df04a5-dfc1-4ece-92a7-d41beb1787a5", "control-id": "r28", "description": "No notes for control-id R28.", "props": [ @@ -20703,7 +20744,7 @@ ] }, { - "uuid": "ce7aad16-27bb-473b-bb72-6c963a9a08be", + "uuid": "931b7631-bde9-464f-b7a4-7131b40a21b2", "control-id": "r32", "description": "ANSSI doesn't specify the length of the inactivity period, we are choosing 10 minutes as reasonable number.", "props": [ @@ -20725,7 +20766,7 @@ ] }, { - "uuid": "6a6fed57-077d-46c2-919d-91d40dbaee8b", + "uuid": "6e5196e9-014b-4d85-b3b6-91a4f7fc1486", "control-id": "r33", "description": "By disabling direct root logins proper accountability is ensured. Users will login first, then escalate to privileged (root) access. Change of privilege operations must be based on executables to monitor the activities performed (for example sudo). Nonetheless, the content automation cannot ensure that each administrator was given a nominative administration account separate from his normal user account.", "props": [ @@ -20767,7 +20808,7 @@ ] }, { - "uuid": "20e77c17-a940-4d30-b2bb-2408ce698418", + "uuid": "d994f63a-2c1e-43ca-86b5-201ad9f72ab8", "control-id": "r34", "description": "The description for control-id r34.", "props": [ @@ -20780,7 +20821,7 @@ ] }, { - "uuid": "7ffac8df-1ed5-4775-8500-11f7533a1d57", + "uuid": "52ac1ac1-cb1e-4a26-b3a3-10662363c545", "control-id": "r35", "description": "The description for control-id r35.", "props": [ @@ -20793,7 +20834,7 @@ ] }, { - "uuid": "e75389fa-9b83-45ec-a0d5-4e4418269ed1", + "uuid": "8623d277-fa99-4ae7-b96d-3e0301941fc2", "control-id": "r39", "description": "No notes for control-id R39.", "props": [ @@ -20830,7 +20871,7 @@ ] }, { - "uuid": "4c541013-dcad-44f5-ad8a-59d9bfa57a9b", + "uuid": "7bcd2e5a-f283-4346-ae8b-e7acf0ff51c6", "control-id": "r40", "description": "No notes for control-id R40.", "props": [ @@ -20847,7 +20888,7 @@ ] }, { - "uuid": "d00988a6-0820-4d4f-8b85-62952794c4c5", + "uuid": "9f51e70a-8256-412d-8bc1-de0b3330b943", "control-id": "r42", "description": "No notes for control-id R42.", "props": [ @@ -20864,7 +20905,7 @@ ] }, { - "uuid": "1141696e-bd22-4595-b19f-9c4c14dc1054", + "uuid": "341dcc7c-5955-4c69-9d5d-1b39edbd7c73", "control-id": "r43", "description": "No notes for control-id R43.", "props": [ @@ -20881,7 +20922,7 @@ ] }, { - "uuid": "7dcdd6a9-24a6-4f9f-a95d-fa512f3afea7", + "uuid": "c05f6a09-d1b4-4a95-8046-909efabd396c", "control-id": "r44", "description": "The description for control-id r44.", "props": [ @@ -20894,7 +20935,7 @@ ] }, { - "uuid": "b66b52aa-5891-4545-a7de-51532c58be80", + "uuid": "fbd26c73-892e-4d2c-bac1-6005c7efa7dd", "control-id": "r50", "description": "No notes for control-id R50.", "props": [ @@ -21261,7 +21302,7 @@ ] }, { - "uuid": "26b8c78a-b029-41e2-8ddb-bbde5b8a58f8", + "uuid": "5086f320-0583-40b3-bd9e-8175c2507ab7", "control-id": "r52", "description": "The description for control-id r52.", "props": [ @@ -21274,7 +21315,7 @@ ] }, { - "uuid": "fef1db25-bb44-46b7-a5ed-068a0199c5cd", + "uuid": "4ea68d0f-3c5d-4ad6-ac20-3c13abc14450", "control-id": "r55", "description": "The approach of the selected rules is to use and configure pam_namespace module.", "props": [ @@ -21306,7 +21347,7 @@ ] }, { - "uuid": "14ddd793-ee98-457f-9e0a-1527164ce4fc", + "uuid": "78821b2f-af10-404f-921d-96258eccd7e0", "control-id": "r63", "description": "The description for control-id r63.", "props": [ @@ -21319,7 +21360,7 @@ ] }, { - "uuid": "869a00d2-1c92-4898-80cb-ef6bd22f1251", + "uuid": "8d9b6b0b-62a8-447b-a0b6-a4e4a24633e6", "control-id": "r67", "description": "In systems where remote authentication is handled through sssd service, PAM delegates\nrequests for remote authentication to sssd service through a local Unix socket. The sssd\nservice can use IPA, AD or LDAP as a remote database containing information required for authentication.\nIn case LDAP is configured manually, there are several configuration options which should be chedked.", "props": [ @@ -21341,7 +21382,7 @@ ] }, { - "uuid": "51b7707f-eda1-42eb-8ed9-37cdac374960", + "uuid": "57f28c73-1816-4a94-a982-aeafb85fa9cc", "control-id": "r69", "description": "The description for control-id r69.", "props": [ @@ -21354,7 +21395,7 @@ ] }, { - "uuid": "62f7029f-ef0e-40ac-a535-f13d9a7fdb28", + "uuid": "bdce061f-1bbc-4235-85f9-478c7a8e2b5e", "control-id": "r70", "description": "The description for control-id r70.", "props": [ @@ -21367,7 +21408,7 @@ ] }, { - "uuid": "ac8ddcb6-cc7c-44be-a191-fdd1a6a278b6", + "uuid": "d29d0e6b-3506-414b-98ab-c482ec980c92", "control-id": "r74", "description": "No notes for control-id R74.", "props": [ @@ -21384,7 +21425,7 @@ ] }, { - "uuid": "3fb2847f-6a8f-46c9-b515-329206df2ed9", + "uuid": "04e72a80-de72-4e08-b6bb-730d1d120032", "control-id": "r75", "description": "Only the alias for root user is covered by the rule. The other services cannot be reliably covered, as there is no simple way of determining what is a service account.", "props": [ @@ -21401,7 +21442,7 @@ ] }, { - "uuid": "e7164ce3-e0eb-4c95-8c02-61bc3805bc56", + "uuid": "c5416494-e002-4736-8913-ebf965a33b13", "control-id": "r79", "description": "SELinux can provide confinement and monitoring of services, and AIDE provides basic integrity checking. System logs are configured as part of R43. Hardening of particular services should be done on a case by case basis and is not automated by this content.", "props": [ @@ -21428,7 +21469,7 @@ ] }, { - "uuid": "964273cc-9558-4805-a5e9-690d5dc81577", + "uuid": "67e35e49-2439-48e8-90d9-13840143332e", "control-id": "r30", "description": "The description for control-id r30.", "props": [ @@ -21441,7 +21482,7 @@ ] }, { - "uuid": "f7e5df6f-5f34-4445-b72d-44f31ce15bf3", + "uuid": "023ef56e-c169-45ca-8f93-48e04ca24c83", "control-id": "r31", "description": "The rules selected below establish a general password strength baseline of 100 bits, based on the recommendations of the technical note \"Recommandations relatives à l'authentification multifacteur et aux mots de passe\" (https://cyber.gouv.fr/publications/recommandations-relatives-lauthentification-multifacteur-et-aux-mots-de-passe)\nThe baseline should be reviewed and tailored to the system's use case and needs.", "props": [ @@ -21513,7 +21554,7 @@ ] }, { - "uuid": "fc81deb7-9398-4c76-aa5f-179f1c18919d", + "uuid": "9715895f-17b6-4aa9-be5c-2adf442ce799", "control-id": "r53", "description": "No notes for control-id R53.", "props": [ @@ -21535,7 +21576,7 @@ ] }, { - "uuid": "52c17ccf-ad69-4d9d-ad61-beb556b8d908", + "uuid": "3ebf97a3-7009-4f7d-8c8a-ebb136f71fca", "control-id": "r54", "description": "No notes for control-id R54.", "props": [ @@ -21562,7 +21603,7 @@ ] }, { - "uuid": "2a4ab480-7150-4f29-90ab-4b8ae5e8c138", + "uuid": "fdac0b6a-8e12-4ed8-b52c-778b69c87eb5", "control-id": "r56", "description": "Only programs specifically designed to be used with setuid or setgid bits can have these privilege bits set. This requirement considers apropriate for setuid and setgid bits the binaries that are installed from recognized and authorized repositories (covered in R15). The remediation resets the sticky bit to intended value by vendor/developer, any finding after remediation should be reviewed.", "props": [ @@ -21584,7 +21625,7 @@ ] }, { - "uuid": "cf98e0ce-7d86-4af8-b4ac-ece8c6294e3d", + "uuid": "f96a8128-3c50-40da-aab4-63a091bce0a9", "control-id": "r58", "description": "The description for control-id r58.", "props": [ @@ -21597,7 +21638,7 @@ ] }, { - "uuid": "043c3622-4b9b-4e66-8c5e-1baa93363f9d", + "uuid": "735ec44e-d6b1-4af2-8ded-1b614d6b69cc", "control-id": "r59", "description": "It is not trivial to distinguish an official repository from an unofficial one. We cannot draw conclusions from the repo name or URL of the repo (as they can be arbitrary or behind a proxy). One approach to check the origin of installed packages is to check the signature of the packages. If the public key of a repository is not installed, the repo is not trusted.", "props": [ @@ -21625,11 +21666,16 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_redhat_gpgkey_installed" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "package_sequoia-sq_installed" } ] }, { - "uuid": "ac78cf0a-01de-45f2-aa3f-f27b33a4b3fc", + "uuid": "a220d7fc-21d8-4cf5-b75d-7232524e868c", "control-id": "r61", "description": "Check the vendor CVE feed and configure automatic install of security related updates.", "props": [ @@ -21661,7 +21707,7 @@ ] }, { - "uuid": "16ff4cf5-0bce-4116-b15d-11393593e2ae", + "uuid": "3948c74d-47c8-4a6b-9bcd-c01101091ee5", "control-id": "r62", "description": "The description for control-id r62.", "props": [ @@ -21699,7 +21745,7 @@ ] }, { - "uuid": "06222ba3-f0cd-4443-9ec7-157bcd5787e2", + "uuid": "1d927cb2-17e2-47b9-bc99-eb7bb6b8cd97", "control-id": "r68", "description": "The selection of rules doesn't cover the use of hardware devices to protect the passwords.", "props": [ @@ -21736,7 +21782,7 @@ ] }, { - "uuid": "3b0c45e6-7c11-4f9a-8b9f-76852cdb759c", + "uuid": "26e6eaaa-c04e-4652-88ad-97b0d7fbd077", "control-id": "r80", "description": "The description for control-id r80.", "props": [ diff --git a/component-definitions/rhel10/rhel10-anssi-intermediary/component-definition.json b/component-definitions/rhel10/rhel10-anssi-intermediary/component-definition.json index e7eed920..72054f75 100644 --- a/component-definitions/rhel10/rhel10-anssi-intermediary/component-definition.json +++ b/component-definitions/rhel10/rhel10-anssi-intermediary/component-definition.json @@ -3,8 +3,8 @@ "uuid": "1f77331e-b554-42c3-a018-031a615e42c7", "metadata": { "title": "Component definition for rhel10", - "last-modified": "2025-12-11T18:23:17.372532+00:00", - "version": "1.3", + "last-modified": "2025-12-17T11:10:50.929981+00:00", + "version": "1.4", "oscal-version": "1.1.3" }, "components": [ @@ -347,7 +347,7 @@ { "name": "Parameter_Value_Alternatives_17", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -365,7 +365,7 @@ { "name": "Parameter_Value_Alternatives_18", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -905,2443 +905,2455 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_dnf-automatic_installed", + "value": "package_sequoia-sq_installed", "remarks": "rule_set_023" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install dnf-automatic Package", + "value": "Install sequoia-sq Package", "remarks": "rule_set_023" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "timer_dnf-automatic_enabled", + "value": "package_dnf-automatic_installed", "remarks": "rule_set_024" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable dnf-automatic Timer", + "value": "Install dnf-automatic Package", "remarks": "rule_set_024" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dnf-automatic_apply_updates", + "value": "timer_dnf-automatic_enabled", "remarks": "rule_set_025" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure dnf-automatic to Install Available Updates Automatically", + "value": "Enable dnf-automatic Timer", "remarks": "rule_set_025" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dnf-automatic_security_updates_only", + "value": "dnf-automatic_apply_updates", "remarks": "rule_set_026" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure dnf-automatic to Install Only Security Updates", + "value": "Configure dnf-automatic to Install Available Updates Automatically", "remarks": "rule_set_026" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_kea_removed", + "value": "dnf-automatic_security_updates_only", "remarks": "rule_set_027" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall kea Package", + "value": "Configure dnf-automatic to Install Only Security Updates", "remarks": "rule_set_027" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet_removed", + "value": "package_kea_removed", "remarks": "rule_set_028" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove telnet Clients", + "value": "Uninstall kea Package", "remarks": "rule_set_028" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet-server_removed", + "value": "package_telnet_removed", "remarks": "rule_set_029" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall telnet-server Package", + "value": "Remove telnet Clients", "remarks": "rule_set_029" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_tftp_removed", + "value": "package_telnet-server_removed", "remarks": "rule_set_030" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove tftp Daemon", + "value": "Uninstall telnet-server Package", "remarks": "rule_set_030" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_tftp-server_removed", + "value": "package_tftp_removed", "remarks": "rule_set_031" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall tftp-server Package", + "value": "Remove tftp Daemon", "remarks": "rule_set_031" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_systemauth", + "value": "package_tftp-server_removed", "remarks": "rule_set_032" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set PAM Password Hashing Algorithm - system-auth", + "value": "Uninstall tftp-server Package", "remarks": "rule_set_032" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_unix_rounds_system_auth", + "value": "set_password_hashing_algorithm_systemauth", "remarks": "rule_set_033" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set number of Password Hashing Rounds - system-auth", + "value": "Set PAM Password Hashing Algorithm - system-auth", "remarks": "rule_set_033" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_unix_rounds_password_auth", + "value": "accounts_password_pam_unix_rounds_system_auth", "remarks": "rule_set_034" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set number of Password Hashing Rounds - password-auth", + "value": "Set number of Password Hashing Rounds - system-auth", "remarks": "rule_set_034" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_minclass", + "value": "accounts_password_pam_unix_rounds_password_auth", "remarks": "rule_set_035" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", + "value": "Set number of Password Hashing Rounds - password-auth", "remarks": "rule_set_035" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_password", + "value": "accounts_password_pam_minclass", "remarks": "rule_set_036" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Boot Loader Password in grub2", + "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", "remarks": "rule_set_036" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_l1tf_argument", + "value": "grub2_password", "remarks": "rule_set_037" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure L1 Terminal Fault mitigations", + "value": "Set Boot Loader Password in grub2", "remarks": "rule_set_037" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_page_poison_argument", + "value": "grub2_l1tf_argument", "remarks": "rule_set_038" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable page allocator poisoning", + "value": "Configure L1 Terminal Fault mitigations", "remarks": "rule_set_038" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_pti_argument", + "value": "grub2_page_poison_argument", "remarks": "rule_set_039" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Page-Table Isolation (KPTI)", + "value": "Enable page allocator poisoning", "remarks": "rule_set_039" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_slab_nomerge_argument", + "value": "grub2_pti_argument", "remarks": "rule_set_040" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable merging of slabs with similar size", + "value": "Enable Kernel Page-Table Isolation (KPTI)", "remarks": "rule_set_040" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_slub_debug_argument", + "value": "grub2_slab_nomerge_argument", "remarks": "rule_set_041" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable SLUB/SLAB allocator poisoning", + "value": "Disable merging of slabs with similar size", "remarks": "rule_set_041" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_spec_store_bypass_disable_argument", + "value": "grub2_slub_debug_argument", "remarks": "rule_set_042" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Speculative Store Bypass Mitigation", + "value": "Enable SLUB/SLAB allocator poisoning", "remarks": "rule_set_042" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_spectre_v2_argument", + "value": "grub2_spec_store_bypass_disable_argument", "remarks": "rule_set_043" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enforce Spectre v2 mitigation", + "value": "Configure Speculative Store Bypass Mitigation", "remarks": "rule_set_043" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_mds_argument", + "value": "grub2_spectre_v2_argument", "remarks": "rule_set_044" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Microarchitectural Data Sampling mitigation", + "value": "Enforce Spectre v2 mitigation", "remarks": "rule_set_044" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_mce_argument", + "value": "grub2_mds_argument", "remarks": "rule_set_045" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Force kernel panic on uncorrected MCEs", + "value": "Configure Microarchitectural Data Sampling mitigation", "remarks": "rule_set_045" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_page_alloc_shuffle_argument", + "value": "grub2_mce_argument", "remarks": "rule_set_046" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable randomization of the page allocator", + "value": "Force kernel panic on uncorrected MCEs", "remarks": "rule_set_046" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_rng_core_default_quality_argument", + "value": "grub2_page_alloc_shuffle_argument", "remarks": "rule_set_047" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure the confidence in TPM for entropy", + "value": "Enable randomization of the page allocator", "remarks": "rule_set_047" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_vm_mmap_min_addr", + "value": "grub2_rng_core_default_quality_argument", "remarks": "rule_set_048" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Prevent applications from mapping low portion of virtual memory", + "value": "Configure the confidence in TPM for entropy", "remarks": "rule_set_048" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_dmesg_restrict", + "value": "sysctl_vm_mmap_min_addr", "remarks": "rule_set_049" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict Access to Kernel Message Buffer", + "value": "Prevent applications from mapping low portion of virtual memory", "remarks": "rule_set_049" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_kptr_restrict", + "value": "sysctl_kernel_dmesg_restrict", "remarks": "rule_set_050" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict Exposed Kernel Pointer Addresses Access", + "value": "Restrict Access to Kernel Message Buffer", "remarks": "rule_set_050" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_pid_max", + "value": "sysctl_kernel_kptr_restrict", "remarks": "rule_set_051" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure maximum number of process identifiers", + "value": "Restrict Exposed Kernel Pointer Addresses Access", "remarks": "rule_set_051" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_perf_event_max_sample_rate", + "value": "sysctl_kernel_pid_max", "remarks": "rule_set_052" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Limit sampling frequency of the Perf system", + "value": "Configure maximum number of process identifiers", "remarks": "rule_set_052" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_perf_cpu_time_max_percent", + "value": "sysctl_kernel_perf_event_max_sample_rate", "remarks": "rule_set_053" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Limit CPU consumption of the Perf system", + "value": "Limit sampling frequency of the Perf system", "remarks": "rule_set_053" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_perf_event_paranoid", + "value": "sysctl_kernel_perf_cpu_time_max_percent", "remarks": "rule_set_054" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disallow kernel profiling by unprivileged users", + "value": "Limit CPU consumption of the Perf system", "remarks": "rule_set_054" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_randomize_va_space", + "value": "sysctl_kernel_perf_event_paranoid", "remarks": "rule_set_055" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Randomized Layout of Virtual Address Space", + "value": "Disallow kernel profiling by unprivileged users", "remarks": "rule_set_055" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_sysrq", + "value": "sysctl_kernel_randomize_va_space", "remarks": "rule_set_056" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disallow magic SysRq key", + "value": "Enable Randomized Layout of Virtual Address Space", "remarks": "rule_set_056" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_unprivileged_bpf_disabled", + "value": "sysctl_kernel_sysrq", "remarks": "rule_set_057" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Access to Network bpf() Syscall From Unprivileged Processes", + "value": "Disallow magic SysRq key", "remarks": "rule_set_057" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_panic_on_oops", + "value": "sysctl_kernel_unprivileged_bpf_disabled", "remarks": "rule_set_058" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Kernel panic on oops", + "value": "Disable Access to Network bpf() Syscall From Unprivileged Processes", "remarks": "rule_set_058" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_yama_ptrace_scope", + "value": "sysctl_kernel_panic_on_oops", "remarks": "rule_set_059" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict usage of ptrace to descendant processes", + "value": "Kernel panic on oops", "remarks": "rule_set_059" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_core_bpf_jit_harden", + "value": "sysctl_kernel_yama_ptrace_scope", "remarks": "rule_set_060" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Harden the operation of the BPF just-in-time compiler", + "value": "Restrict usage of ptrace to descendant processes", "remarks": "rule_set_060" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_ip_forward", + "value": "sysctl_net_core_bpf_jit_harden", "remarks": "rule_set_061" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for IP Forwarding on IPv4 Interfaces", + "value": "Harden the operation of the BPF just-in-time compiler", "remarks": "rule_set_061" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_accept_local", + "value": "sysctl_net_ipv4_ip_forward", "remarks": "rule_set_062" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Accepting Packets Routed Between Local Interfaces", + "value": "Disable Kernel Parameter for IP Forwarding on IPv4 Interfaces", "remarks": "rule_set_062" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_accept_redirects", + "value": "sysctl_net_ipv4_conf_all_accept_local", "remarks": "rule_set_063" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Accepting ICMP Redirects for All IPv4 Interfaces", + "value": "Disable Accepting Packets Routed Between Local Interfaces", "remarks": "rule_set_063" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_accept_redirects", + "value": "sysctl_net_ipv4_conf_all_accept_redirects", "remarks": "rule_set_064" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv4 Interfaces", + "value": "Disable Accepting ICMP Redirects for All IPv4 Interfaces", "remarks": "rule_set_064" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_secure_redirects", + "value": "sysctl_net_ipv4_conf_default_accept_redirects", "remarks": "rule_set_065" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Accepting Secure ICMP Redirects on all IPv4 Interfaces", + "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv4 Interfaces", "remarks": "rule_set_065" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_secure_redirects", + "value": "sysctl_net_ipv4_conf_all_secure_redirects", "remarks": "rule_set_066" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Kernel Parameter for Accepting Secure Redirects By Default", + "value": "Disable Kernel Parameter for Accepting Secure ICMP Redirects on all IPv4 Interfaces", "remarks": "rule_set_066" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_shared_media", + "value": "sysctl_net_ipv4_conf_default_secure_redirects", "remarks": "rule_set_067" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Sending and Accepting Shared Media Redirects for All IPv4 Interfaces", + "value": "Configure Kernel Parameter for Accepting Secure Redirects By Default", "remarks": "rule_set_067" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_shared_media", + "value": "sysctl_net_ipv4_conf_all_shared_media", "remarks": "rule_set_068" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Sending and Accepting Shared Media Redirects by Default", + "value": "Configure Sending and Accepting Shared Media Redirects for All IPv4 Interfaces", "remarks": "rule_set_068" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_accept_source_route", + "value": "sysctl_net_ipv4_conf_default_shared_media", "remarks": "rule_set_069" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces", + "value": "Configure Sending and Accepting Shared Media Redirects by Default", "remarks": "rule_set_069" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_accept_source_route", + "value": "sysctl_net_ipv4_conf_all_accept_source_route", "remarks": "rule_set_070" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv4 Interfaces by Default", + "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces", "remarks": "rule_set_070" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_arp_filter", + "value": "sysctl_net_ipv4_conf_default_accept_source_route", "remarks": "rule_set_071" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure ARP filtering for All IPv4 Interfaces", + "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv4 Interfaces by Default", "remarks": "rule_set_071" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_arp_ignore", + "value": "sysctl_net_ipv4_conf_all_arp_filter", "remarks": "rule_set_072" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Response Mode of ARP Requests for All IPv4 Interfaces", + "value": "Configure ARP filtering for All IPv4 Interfaces", "remarks": "rule_set_072" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_route_localnet", + "value": "sysctl_net_ipv4_conf_all_arp_ignore", "remarks": "rule_set_073" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Prevent Routing External Traffic to Local Loopback on All IPv4 Interfaces", + "value": "Configure Response Mode of ARP Requests for All IPv4 Interfaces", "remarks": "rule_set_073" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_drop_gratuitous_arp", + "value": "sysctl_net_ipv4_conf_all_route_localnet", "remarks": "rule_set_074" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Drop Gratuitous ARP frames on All IPv4 Interfaces", + "value": "Prevent Routing External Traffic to Local Loopback on All IPv4 Interfaces", "remarks": "rule_set_074" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_rp_filter", + "value": "sysctl_net_ipv4_conf_all_drop_gratuitous_arp", "remarks": "rule_set_075" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces", + "value": "Drop Gratuitous ARP frames on All IPv4 Interfaces", "remarks": "rule_set_075" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_rp_filter", + "value": "sysctl_net_ipv4_conf_all_rp_filter", "remarks": "rule_set_076" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces by Default", + "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces", "remarks": "rule_set_076" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_all_send_redirects", + "value": "sysctl_net_ipv4_conf_default_rp_filter", "remarks": "rule_set_077" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces", + "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces by Default", "remarks": "rule_set_077" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_conf_default_send_redirects", + "value": "sysctl_net_ipv4_conf_all_send_redirects", "remarks": "rule_set_078" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces by Default", + "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces", "remarks": "rule_set_078" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses", + "value": "sysctl_net_ipv4_conf_default_send_redirects", "remarks": "rule_set_079" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Ignore Bogus ICMP Error Responses on IPv4 Interfaces", + "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces by Default", "remarks": "rule_set_079" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_ip_local_port_range", + "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses", "remarks": "rule_set_080" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Kernel Parameter to Increase Local Port Range", + "value": "Enable Kernel Parameter to Ignore Bogus ICMP Error Responses on IPv4 Interfaces", "remarks": "rule_set_080" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_tcp_rfc1337", + "value": "sysctl_net_ipv4_ip_local_port_range", "remarks": "rule_set_081" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Use TCP RFC 1337 on IPv4 Interfaces", + "value": "Set Kernel Parameter to Increase Local Port Range", "remarks": "rule_set_081" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv4_tcp_syncookies", + "value": "sysctl_net_ipv4_tcp_rfc1337", "remarks": "rule_set_082" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Use TCP Syncookies on Network Interfaces", + "value": "Enable Kernel Parameter to Use TCP RFC 1337 on IPv4 Interfaces", "remarks": "rule_set_082" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_router_solicitations", + "value": "sysctl_net_ipv4_tcp_syncookies", "remarks": "rule_set_083" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Denying Router Solicitations on All IPv6 Interfaces", + "value": "Enable Kernel Parameter to Use TCP Syncookies on Network Interfaces", "remarks": "rule_set_083" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_router_solicitations", + "value": "sysctl_net_ipv6_conf_all_router_solicitations", "remarks": "rule_set_084" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Denying Router Solicitations on All IPv6 Interfaces By Default", + "value": "Configure Denying Router Solicitations on All IPv6 Interfaces", "remarks": "rule_set_084" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_accept_ra_rtr_pref", + "value": "sysctl_net_ipv6_conf_default_router_solicitations", "remarks": "rule_set_085" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Accepting Router Preference in Router Advertisements on All IPv6 Interfaces", + "value": "Configure Denying Router Solicitations on All IPv6 Interfaces By Default", "remarks": "rule_set_085" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_accept_ra_rtr_pref", + "value": "sysctl_net_ipv6_conf_all_accept_ra_rtr_pref", "remarks": "rule_set_086" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Accepting Router Preference in Router Advertisements on All IPv6 Interfaces By Default", + "value": "Configure Accepting Router Preference in Router Advertisements on All IPv6 Interfaces", "remarks": "rule_set_086" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_accept_ra_pinfo", + "value": "sysctl_net_ipv6_conf_default_accept_ra_rtr_pref", "remarks": "rule_set_087" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Accepting Prefix Information in Router Advertisements on All IPv6 Interfaces", + "value": "Configure Accepting Router Preference in Router Advertisements on All IPv6 Interfaces By Default", "remarks": "rule_set_087" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_accept_ra_pinfo", + "value": "sysctl_net_ipv6_conf_all_accept_ra_pinfo", "remarks": "rule_set_088" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Accepting Prefix Information in Router Advertisements on All IPv6 Interfaces By Default", + "value": "Configure Accepting Prefix Information in Router Advertisements on All IPv6 Interfaces", "remarks": "rule_set_088" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_accept_ra_defrtr", + "value": "sysctl_net_ipv6_conf_default_accept_ra_pinfo", "remarks": "rule_set_089" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Accepting Default Router in Router Advertisements on All IPv6 Interfaces", + "value": "Configure Accepting Prefix Information in Router Advertisements on All IPv6 Interfaces By Default", "remarks": "rule_set_089" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_accept_ra_defrtr", + "value": "sysctl_net_ipv6_conf_all_accept_ra_defrtr", "remarks": "rule_set_090" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Accepting Default Router in Router Advertisements on All IPv6 Interfaces By Default", + "value": "Configure Accepting Default Router in Router Advertisements on All IPv6 Interfaces", "remarks": "rule_set_090" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_autoconf", + "value": "sysctl_net_ipv6_conf_default_accept_ra_defrtr", "remarks": "rule_set_091" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Auto Configuration on All IPv6 Interfaces", + "value": "Configure Accepting Default Router in Router Advertisements on All IPv6 Interfaces By Default", "remarks": "rule_set_091" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_autoconf", + "value": "sysctl_net_ipv6_conf_all_autoconf", "remarks": "rule_set_092" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Auto Configuration on All IPv6 Interfaces By Default", + "value": "Configure Auto Configuration on All IPv6 Interfaces", "remarks": "rule_set_092" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_accept_redirects", + "value": "sysctl_net_ipv6_conf_default_autoconf", "remarks": "rule_set_093" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Accepting ICMP Redirects for All IPv6 Interfaces", + "value": "Configure Auto Configuration on All IPv6 Interfaces By Default", "remarks": "rule_set_093" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_accept_redirects", + "value": "sysctl_net_ipv6_conf_all_accept_redirects", "remarks": "rule_set_094" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv6 Interfaces", + "value": "Disable Accepting ICMP Redirects for All IPv6 Interfaces", "remarks": "rule_set_094" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_accept_source_route", + "value": "sysctl_net_ipv6_conf_default_accept_redirects", "remarks": "rule_set_095" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv6 Interfaces", + "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv6 Interfaces", "remarks": "rule_set_095" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_accept_source_route", + "value": "sysctl_net_ipv6_conf_all_accept_source_route", "remarks": "rule_set_096" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv6 Interfaces by Default", + "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv6 Interfaces", "remarks": "rule_set_096" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_all_max_addresses", + "value": "sysctl_net_ipv6_conf_default_accept_source_route", "remarks": "rule_set_097" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Maximum Number of Autoconfigured Addresses on All IPv6 Interfaces", + "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv6 Interfaces by Default", "remarks": "rule_set_097" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_ipv6_conf_default_max_addresses", + "value": "sysctl_net_ipv6_conf_all_max_addresses", "remarks": "rule_set_098" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Maximum Number of Autoconfigured Addresses on All IPv6 Interfaces By Default", + "value": "Configure Maximum Number of Autoconfigured Addresses on All IPv6 Interfaces", "remarks": "rule_set_098" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_suid_dumpable", + "value": "sysctl_net_ipv6_conf_default_max_addresses", "remarks": "rule_set_099" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Core Dumps for SUID programs", + "value": "Configure Maximum Number of Autoconfigured Addresses on All IPv6 Interfaces By Default", "remarks": "rule_set_099" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_protected_fifos", + "value": "sysctl_fs_suid_dumpable", "remarks": "rule_set_100" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Enforce DAC on FIFOs", + "value": "Disable Core Dumps for SUID programs", "remarks": "rule_set_100" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_protected_regular", + "value": "sysctl_fs_protected_fifos", "remarks": "rule_set_101" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Enforce DAC on Regular files", + "value": "Enable Kernel Parameter to Enforce DAC on FIFOs", "remarks": "rule_set_101" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_protected_symlinks", + "value": "sysctl_fs_protected_regular", "remarks": "rule_set_102" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", + "value": "Enable Kernel Parameter to Enforce DAC on Regular files", "remarks": "rule_set_102" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_fs_protected_hardlinks", + "value": "sysctl_fs_protected_symlinks", "remarks": "rule_set_103" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Kernel Parameter to Enforce DAC on Hardlinks", + "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", "remarks": "rule_set_103" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_nodev_nonroot_local_partitions", + "value": "sysctl_fs_protected_hardlinks", "remarks": "rule_set_104" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add nodev Option to Non-Root Local Partitions", + "value": "Enable Kernel Parameter to Enforce DAC on Hardlinks", "remarks": "rule_set_104" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "partition_for_boot", + "value": "mount_option_nodev_nonroot_local_partitions", "remarks": "rule_set_105" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure /boot Located On Separate Partition", + "value": "Add nodev Option to Non-Root Local Partitions", "remarks": "rule_set_105" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_boot_nosuid", + "value": "partition_for_boot", "remarks": "rule_set_106" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add nosuid Option to /boot", + "value": "Ensure /boot Located On Separate Partition", "remarks": "rule_set_106" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_boot_noexec", + "value": "mount_option_boot_nosuid", "remarks": "rule_set_107" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add noexec Option to /boot", + "value": "Add nosuid Option to /boot", "remarks": "rule_set_107" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "partition_for_opt", + "value": "mount_option_boot_noexec", "remarks": "rule_set_108" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure /opt Located On Separate Partition", + "value": "Add noexec Option to /boot", "remarks": "rule_set_108" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_opt_nosuid", + "value": "partition_for_opt", "remarks": "rule_set_109" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add nosuid Option to /opt", + "value": "Ensure /opt Located On Separate Partition", "remarks": "rule_set_109" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "systemd_tmp_mount_enabled", + "value": "mount_option_opt_nosuid", "remarks": "rule_set_110" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure tmp.mount Unit Is Enabled", + "value": "Add nosuid Option to /opt", "remarks": "rule_set_110" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_tmp_nosuid", + "value": "systemd_tmp_mount_enabled", "remarks": "rule_set_111" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add nosuid Option to /tmp", + "value": "Ensure tmp.mount Unit Is Enabled", "remarks": "rule_set_111" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_tmp_noexec", + "value": "mount_option_tmp_nosuid", "remarks": "rule_set_112" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add noexec Option to /tmp", + "value": "Add nosuid Option to /tmp", "remarks": "rule_set_112" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "partition_for_srv", + "value": "mount_option_tmp_noexec", "remarks": "rule_set_113" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure /srv Located On Separate Partition", + "value": "Add noexec Option to /tmp", "remarks": "rule_set_113" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_srv_nosuid", + "value": "partition_for_srv", "remarks": "rule_set_114" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add nosuid Option to /srv", + "value": "Ensure /srv Located On Separate Partition", "remarks": "rule_set_114" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "partition_for_home", + "value": "mount_option_srv_nosuid", "remarks": "rule_set_115" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure /home Located On Separate Partition", + "value": "Add nosuid Option to /srv", "remarks": "rule_set_115" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_home_nosuid", + "value": "partition_for_home", "remarks": "rule_set_116" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add nosuid Option to /home", + "value": "Ensure /home Located On Separate Partition", "remarks": "rule_set_116" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_home_noexec", + "value": "mount_option_home_nosuid", "remarks": "rule_set_117" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add noexec Option to /home", + "value": "Add nosuid Option to /home", "remarks": "rule_set_117" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "partition_for_usr", + "value": "mount_option_home_noexec", "remarks": "rule_set_118" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure /usr Located On Separate Partition", + "value": "Add noexec Option to /home", "remarks": "rule_set_118" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "partition_for_var", + "value": "partition_for_usr", "remarks": "rule_set_119" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure /var Located On Separate Partition", + "value": "Ensure /usr Located On Separate Partition", "remarks": "rule_set_119" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_var_nosuid", + "value": "partition_for_var", "remarks": "rule_set_120" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add nosuid Option to /var", + "value": "Ensure /var Located On Separate Partition", "remarks": "rule_set_120" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_var_noexec", + "value": "mount_option_var_nosuid", "remarks": "rule_set_121" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add noexec Option to /var", + "value": "Add nosuid Option to /var", "remarks": "rule_set_121" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "partition_for_var_log", + "value": "mount_option_var_noexec", "remarks": "rule_set_122" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure /var/log Located On Separate Partition", + "value": "Add noexec Option to /var", "remarks": "rule_set_122" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_var_log_noexec", + "value": "partition_for_var_log", "remarks": "rule_set_123" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add noexec Option to /var/log", + "value": "Ensure /var/log Located On Separate Partition", "remarks": "rule_set_123" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_var_log_nosuid", + "value": "mount_option_var_log_noexec", "remarks": "rule_set_124" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add nosuid Option to /var/log", + "value": "Add noexec Option to /var/log", "remarks": "rule_set_124" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "partition_for_var_tmp", + "value": "mount_option_var_log_nosuid", "remarks": "rule_set_125" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure /var/tmp Located On Separate Partition", + "value": "Add nosuid Option to /var/log", "remarks": "rule_set_125" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_var_tmp_nosuid", + "value": "partition_for_var_tmp", "remarks": "rule_set_126" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add nosuid Option to /var/tmp", + "value": "Ensure /var/tmp Located On Separate Partition", "remarks": "rule_set_126" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_var_tmp_noexec", + "value": "mount_option_var_tmp_nosuid", "remarks": "rule_set_127" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add noexec Option to /var/tmp", + "value": "Add nosuid Option to /var/tmp", "remarks": "rule_set_127" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "logind_session_timeout", + "value": "mount_option_var_tmp_noexec", "remarks": "rule_set_128" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Logind to terminate idle sessions after certain time of inactivity", + "value": "Add noexec Option to /var/tmp", "remarks": "rule_set_128" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_tmout", + "value": "logind_session_timeout", "remarks": "rule_set_129" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Interactive Session Timeout", + "value": "Configure Logind to terminate idle sessions after certain time of inactivity", "remarks": "rule_set_129" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_direct_root_logins", + "value": "accounts_tmout", "remarks": "rule_set_130" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Direct root Logins Not Allowed", + "value": "Set Interactive Session Timeout", "remarks": "rule_set_130" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_root_login", + "value": "no_direct_root_logins", "remarks": "rule_set_131" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Root Login", + "value": "Direct root Logins Not Allowed", "remarks": "rule_set_131" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_sudo_installed", + "value": "sshd_disable_root_login", "remarks": "rule_set_132" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install sudo Package", + "value": "Disable SSH Root Login", "remarks": "rule_set_132" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_privileged_commands_sudo", + "value": "package_sudo_installed", "remarks": "rule_set_133" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure auditd Collects Information on the Use of Privileged Commands - sudo", + "value": "Install sudo Package", "remarks": "rule_set_133" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_auditd_enabled", + "value": "audit_rules_privileged_commands_sudo", "remarks": "rule_set_134" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable auditd Service", + "value": "Ensure auditd Collects Information on the Use of Privileged Commands - sudo", "remarks": "rule_set_134" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_audit_installed", + "value": "service_auditd_enabled", "remarks": "rule_set_135" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the audit Subsystem is Installed", + "value": "Enable auditd Service", "remarks": "rule_set_135" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sudo_add_noexec", + "value": "package_audit_installed", "remarks": "rule_set_136" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Privileged Escalated Commands Cannot Execute Other Commands - sudo NOEXEC", + "value": "Ensure the audit Subsystem is Installed", "remarks": "rule_set_136" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sudo_add_requiretty", + "value": "sudo_add_noexec", "remarks": "rule_set_137" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo requiretty", + "value": "Ensure Privileged Escalated Commands Cannot Execute Other Commands - sudo NOEXEC", "remarks": "rule_set_137" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sudo_add_use_pty", + "value": "sudo_add_requiretty", "remarks": "rule_set_138" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo use_pty", + "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo requiretty", "remarks": "rule_set_138" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sudo_add_ignore_dot", + "value": "sudo_add_use_pty", "remarks": "rule_set_139" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure sudo Ignores Commands In Current Dir - sudo ignore_dot", + "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo use_pty", "remarks": "rule_set_139" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sudo_add_env_reset", + "value": "sudo_add_ignore_dot", "remarks": "rule_set_140" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure sudo Runs In A Minimal Environment - sudo env_reset", + "value": "Ensure sudo Ignores Commands In Current Dir - sudo ignore_dot", "remarks": "rule_set_140" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sudoers_no_root_target", + "value": "sudo_add_env_reset", "remarks": "rule_set_141" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Don't target root user in the sudoers file", + "value": "Ensure sudo Runs In A Minimal Environment - sudo env_reset", "remarks": "rule_set_141" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sudoers_no_command_negation", + "value": "sudoers_no_root_target", "remarks": "rule_set_142" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Don't define allowed commands in sudoers by means of exclusion", + "value": "Don't target root user in the sudoers file", "remarks": "rule_set_142" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sudoers_explicit_command_args", + "value": "sudoers_no_command_negation", "remarks": "rule_set_143" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Explicit arguments in sudo specifications", + "value": "Don't define allowed commands in sudoers by means of exclusion", "remarks": "rule_set_143" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_shadow", + "value": "sudoers_explicit_command_args", "remarks": "rule_set_144" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns shadow File", + "value": "Explicit arguments in sudo specifications", "remarks": "rule_set_144" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_shadow", + "value": "file_owner_etc_shadow", "remarks": "rule_set_145" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns shadow File", + "value": "Verify User Who Owns shadow File", "remarks": "rule_set_145" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_shadow", + "value": "file_groupowner_etc_shadow", "remarks": "rule_set_146" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on shadow File", + "value": "Verify Group Who Owns shadow File", "remarks": "rule_set_146" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_gshadow", + "value": "file_permissions_etc_shadow", "remarks": "rule_set_147" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns gshadow File", + "value": "Verify Permissions on shadow File", "remarks": "rule_set_147" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_gshadow", + "value": "file_owner_etc_gshadow", "remarks": "rule_set_148" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns gshadow File", + "value": "Verify User Who Owns gshadow File", "remarks": "rule_set_148" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_gshadow", + "value": "file_groupowner_etc_gshadow", "remarks": "rule_set_149" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on gshadow File", + "value": "Verify Group Who Owns gshadow File", "remarks": "rule_set_149" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_passwd", + "value": "file_permissions_etc_gshadow", "remarks": "rule_set_150" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns passwd File", + "value": "Verify Permissions on gshadow File", "remarks": "rule_set_150" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_passwd", + "value": "file_owner_etc_passwd", "remarks": "rule_set_151" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns passwd File", + "value": "Verify User Who Owns passwd File", "remarks": "rule_set_151" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_passwd", + "value": "file_groupowner_etc_passwd", "remarks": "rule_set_152" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on passwd File", + "value": "Verify Group Who Owns passwd File", "remarks": "rule_set_152" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_group", + "value": "file_permissions_etc_passwd", "remarks": "rule_set_153" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns group File", + "value": "Verify Permissions on passwd File", "remarks": "rule_set_153" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_group", + "value": "file_owner_etc_group", "remarks": "rule_set_154" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns group File", + "value": "Verify User Who Owns group File", "remarks": "rule_set_154" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_group", + "value": "file_groupowner_etc_group", "remarks": "rule_set_155" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on group File", + "value": "Verify Group Who Owns group File", "remarks": "rule_set_155" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_shells", + "value": "file_permissions_etc_group", "remarks": "rule_set_156" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Who Owns /etc/shells File", + "value": "Verify Permissions on group File", "remarks": "rule_set_156" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_shells", + "value": "file_owner_etc_shells", "remarks": "rule_set_157" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns /etc/shells File", + "value": "Verify Who Owns /etc/shells File", "remarks": "rule_set_157" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_shells", + "value": "file_groupowner_etc_shells", "remarks": "rule_set_158" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on /etc/shells File", + "value": "Verify Group Who Owns /etc/shells File", "remarks": "rule_set_158" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_user_dot_group_ownership", + "value": "file_permissions_etc_shells", "remarks": "rule_set_159" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "User Initialization Files Must Be Group-Owned By The Primary Group", + "value": "Verify Permissions on /etc/shells File", "remarks": "rule_set_159" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_user_dot_user_ownership", + "value": "accounts_user_dot_group_ownership", "remarks": "rule_set_160" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "User Initialization Files Must Be Owned By the Primary User", + "value": "User Initialization Files Must Be Group-Owned By The Primary Group", "remarks": "rule_set_160" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_users_home_files_groupownership", + "value": "accounts_user_dot_user_ownership", "remarks": "rule_set_161" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All User Files and Directories In The Home Directory Must Be Group-Owned By The Primary Group", + "value": "User Initialization Files Must Be Owned By the Primary User", "remarks": "rule_set_161" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_users_home_files_ownership", + "value": "accounts_users_home_files_groupownership", "remarks": "rule_set_162" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All User Files and Directories In The Home Directory Must Have a Valid Owner", + "value": "All User Files and Directories In The Home Directory Must Be Group-Owned By The Primary Group", "remarks": "rule_set_162" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_users_home_files_permissions", + "value": "accounts_users_home_files_ownership", "remarks": "rule_set_163" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All User Files and Directories In The Home Directory Must Have Mode 0750 Or Less Permissive", + "value": "All User Files and Directories In The Home Directory Must Have a Valid Owner", "remarks": "rule_set_163" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permission_user_init_files", + "value": "accounts_users_home_files_permissions", "remarks": "rule_set_164" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", + "value": "All User Files and Directories In The Home Directory Must Have Mode 0750 Or Less Permissive", "remarks": "rule_set_164" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dir_system_commands_group_root_owned", + "value": "file_permission_user_init_files", "remarks": "rule_set_165" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify that system commands directories have root as a group owner", + "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", "remarks": "rule_set_165" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dir_system_commands_root_owned", + "value": "dir_system_commands_group_root_owned", "remarks": "rule_set_166" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify that system commands directories have root ownership", + "value": "Verify that system commands directories have root as a group owner", "remarks": "rule_set_166" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupownership_system_commands_dirs", + "value": "dir_system_commands_root_owned", "remarks": "rule_set_167" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify that system commands files are group owned by root or a system account", + "value": "Verify that system commands directories have root ownership", "remarks": "rule_set_167" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_ownership_binary_dirs", + "value": "file_groupownership_system_commands_dirs", "remarks": "rule_set_168" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify that System Executables Have Root Ownership", + "value": "Verify that system commands files are group owned by root or a system account", "remarks": "rule_set_168" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_binary_dirs", + "value": "file_ownership_binary_dirs", "remarks": "rule_set_169" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify that System Executables Have Restrictive Permissions", + "value": "Verify that System Executables Have Root Ownership", "remarks": "rule_set_169" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_ownership_sshd_private_key", + "value": "file_permissions_binary_dirs", "remarks": "rule_set_170" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Ownership on SSH Server Private *_key Key Files", + "value": "Verify that System Executables Have Restrictive Permissions", "remarks": "rule_set_170" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupownership_sshd_private_key", + "value": "file_ownership_sshd_private_key", "remarks": "rule_set_171" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Ownership on SSH Server Private *_key Key Files", + "value": "Verify Ownership on SSH Server Private *_key Key Files", "remarks": "rule_set_171" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_sshd_private_key", + "value": "file_groupownership_sshd_private_key", "remarks": "rule_set_172" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on SSH Server Private *_key Key Files", + "value": "Verify Group Ownership on SSH Server Private *_key Key Files", "remarks": "rule_set_172" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_ownership_sshd_pub_key", + "value": "file_permissions_sshd_private_key", "remarks": "rule_set_173" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Ownership on SSH Server Public *.pub Key Files", + "value": "Verify Permissions on SSH Server Private *_key Key Files", "remarks": "rule_set_173" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupownership_sshd_pub_key", + "value": "file_ownership_sshd_pub_key", "remarks": "rule_set_174" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Ownership on SSH Server Public *.pub Key Files", + "value": "Verify Ownership on SSH Server Public *.pub Key Files", "remarks": "rule_set_174" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_sshd_pub_key", + "value": "file_groupownership_sshd_pub_key", "remarks": "rule_set_175" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on SSH Server Public *.pub Key Files", + "value": "Verify Group Ownership on SSH Server Public *.pub Key Files", "remarks": "rule_set_175" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_sshd_config", + "value": "file_permissions_sshd_pub_key", "remarks": "rule_set_176" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Owner on SSH Server config file", + "value": "Verify Permissions on SSH Server Public *.pub Key Files", "remarks": "rule_set_176" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_sshd_config", + "value": "file_owner_sshd_config", "remarks": "rule_set_177" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns SSH Server config file", + "value": "Verify Owner on SSH Server config file", "remarks": "rule_set_177" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_sshd_config", + "value": "file_groupowner_sshd_config", "remarks": "rule_set_178" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on SSH Server config file", + "value": "Verify Group Who Owns SSH Server config file", "remarks": "rule_set_178" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "directory_owner_etc_selinux", + "value": "file_permissions_sshd_config", "remarks": "rule_set_179" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns /etc/selinux Directory", + "value": "Verify Permissions on SSH Server config file", "remarks": "rule_set_179" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "directory_groupowner_etc_selinux", + "value": "directory_owner_etc_selinux", "remarks": "rule_set_180" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns /etc/selinux Directory", + "value": "Verify User Who Owns /etc/selinux Directory", "remarks": "rule_set_180" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "directory_permissions_etc_selinux", + "value": "directory_groupowner_etc_selinux", "remarks": "rule_set_181" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions On /etc/selinux Directory", + "value": "Verify Group Who Owns /etc/selinux Directory", "remarks": "rule_set_181" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_sestatus_conf", + "value": "directory_permissions_etc_selinux", "remarks": "rule_set_182" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns /etc/sestatus.conf File", + "value": "Verify Permissions On /etc/selinux Directory", "remarks": "rule_set_182" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_sestatus_conf", + "value": "file_owner_etc_sestatus_conf", "remarks": "rule_set_183" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns /etc/sestatus.conf File", + "value": "Verify User Who Owns /etc/sestatus.conf File", "remarks": "rule_set_183" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_sestatus_conf", + "value": "file_groupowner_etc_sestatus_conf", "remarks": "rule_set_184" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions On /etc/sestatus.conf File", + "value": "Verify Group Who Owns /etc/sestatus.conf File", "remarks": "rule_set_184" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "directory_owner_etc_ipsecd", + "value": "file_permissions_etc_sestatus_conf", "remarks": "rule_set_185" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns /etc/ipsec.d Directory", + "value": "Verify Permissions On /etc/sestatus.conf File", "remarks": "rule_set_185" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "directory_groupowner_etc_ipsecd", + "value": "directory_owner_etc_ipsecd", "remarks": "rule_set_186" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns /etc/ipsec.d Directory", + "value": "Verify User Who Owns /etc/ipsec.d Directory", "remarks": "rule_set_186" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "directory_permissions_etc_ipsecd", + "value": "directory_groupowner_etc_ipsecd", "remarks": "rule_set_187" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions On /etc/ipsec.d Directory", + "value": "Verify Group Who Owns /etc/ipsec.d Directory", "remarks": "rule_set_187" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_ipsec_conf", + "value": "directory_permissions_etc_ipsecd", "remarks": "rule_set_188" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns /etc/ipsec.conf File", + "value": "Verify Permissions On /etc/ipsec.d Directory", "remarks": "rule_set_188" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_ipsec_conf", + "value": "file_owner_etc_ipsec_conf", + "remarks": "rule_set_189" + }, + { + "name": "Rule_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Verify User Who Owns /etc/ipsec.conf File", "remarks": "rule_set_189" }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "file_groupowner_etc_ipsec_conf", + "remarks": "rule_set_190" + }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/ipsec.conf File", - "remarks": "rule_set_189" + "remarks": "rule_set_190" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_ipsec_conf", - "remarks": "rule_set_190" + "remarks": "rule_set_191" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/ipsec.conf File", - "remarks": "rule_set_190" + "remarks": "rule_set_191" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_ipsec_secrets", - "remarks": "rule_set_191" + "remarks": "rule_set_192" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/ipsec.secrets File", - "remarks": "rule_set_191" + "remarks": "rule_set_192" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_ipsec_secrets", - "remarks": "rule_set_192" + "remarks": "rule_set_193" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/ipsec.secrets File", - "remarks": "rule_set_192" + "remarks": "rule_set_193" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_ipsec_secrets", - "remarks": "rule_set_193" + "remarks": "rule_set_194" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/ipsec.secrets File", - "remarks": "rule_set_193" + "remarks": "rule_set_194" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_etc_iptables", - "remarks": "rule_set_194" + "remarks": "rule_set_195" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/iptables Directory", - "remarks": "rule_set_194" + "remarks": "rule_set_195" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_iptables", - "remarks": "rule_set_195" + "remarks": "rule_set_196" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/iptables Directory", - "remarks": "rule_set_195" + "remarks": "rule_set_196" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_iptables", - "remarks": "rule_set_196" + "remarks": "rule_set_197" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/iptables Directory", - "remarks": "rule_set_196" + "remarks": "rule_set_197" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_etc_nftables", - "remarks": "rule_set_197" + "remarks": "rule_set_198" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/nftables Directory", - "remarks": "rule_set_197" + "remarks": "rule_set_198" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_nftables", - "remarks": "rule_set_198" + "remarks": "rule_set_199" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/nftables Directory", - "remarks": "rule_set_198" + "remarks": "rule_set_199" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_nftables", - "remarks": "rule_set_199" + "remarks": "rule_set_200" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/nftables Directory", - "remarks": "rule_set_199" + "remarks": "rule_set_200" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_etc_sysctld", - "remarks": "rule_set_200" + "remarks": "rule_set_201" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/sysctl.d Directory", - "remarks": "rule_set_200" + "remarks": "rule_set_201" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_sysctld", - "remarks": "rule_set_201" + "remarks": "rule_set_202" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/sysctl.d Directory", - "remarks": "rule_set_201" + "remarks": "rule_set_202" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_sysctld", - "remarks": "rule_set_202" + "remarks": "rule_set_203" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/sysctl.d Directory", - "remarks": "rule_set_202" + "remarks": "rule_set_203" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_sudoers", - "remarks": "rule_set_203" + "remarks": "rule_set_204" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/sudoers File", - "remarks": "rule_set_203" + "remarks": "rule_set_204" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_sudoers", - "remarks": "rule_set_204" + "remarks": "rule_set_205" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/sudoers File", - "remarks": "rule_set_204" + "remarks": "rule_set_205" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_sudoers", - "remarks": "rule_set_205" + "remarks": "rule_set_206" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/sudoers File", - "remarks": "rule_set_205" + "remarks": "rule_set_206" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_etc_sudoersd", - "remarks": "rule_set_206" + "remarks": "rule_set_207" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/sudoers.d Directory", - "remarks": "rule_set_206" + "remarks": "rule_set_207" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_sudoersd", - "remarks": "rule_set_207" + "remarks": "rule_set_208" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/sudoers.d Directory", - "remarks": "rule_set_207" + "remarks": "rule_set_208" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_sudoersd", - "remarks": "rule_set_208" + "remarks": "rule_set_209" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/sudoers.d Directory", - "remarks": "rule_set_208" + "remarks": "rule_set_209" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_crypttab", - "remarks": "rule_set_209" + "remarks": "rule_set_210" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/crypttab File", - "remarks": "rule_set_209" + "remarks": "rule_set_210" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_crypttab", - "remarks": "rule_set_210" + "remarks": "rule_set_211" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/crypttab File", - "remarks": "rule_set_210" + "remarks": "rule_set_211" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_crypttab", - "remarks": "rule_set_211" + "remarks": "rule_set_212" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/crypttab File", - "remarks": "rule_set_211" + "remarks": "rule_set_212" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_chrony_keys", - "remarks": "rule_set_212" + "remarks": "rule_set_213" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/chrony.keys File", - "remarks": "rule_set_212" + "remarks": "rule_set_213" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_chrony_keys", - "remarks": "rule_set_213" + "remarks": "rule_set_214" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/chrony.keys File", - "remarks": "rule_set_213" + "remarks": "rule_set_214" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_chrony_keys", - "remarks": "rule_set_214" + "remarks": "rule_set_215" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/chrony.keys File", - "remarks": "rule_set_214" + "remarks": "rule_set_215" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "enable_pam_namespace", - "remarks": "rule_set_215" + "remarks": "rule_set_216" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Up a Private Namespace in PAM Configuration", - "remarks": "rule_set_215" + "remarks": "rule_set_216" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_polyinstantiated_tmp", - "remarks": "rule_set_216" + "remarks": "rule_set_217" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Polyinstantiation of /tmp Directories", - "remarks": "rule_set_216" + "remarks": "rule_set_217" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_polyinstantiated_var_tmp", - "remarks": "rule_set_217" + "remarks": "rule_set_218" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Polyinstantiation of /var/tmp Directories", - "remarks": "rule_set_217" + "remarks": "rule_set_218" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sebool_polyinstantiation_enabled", - "remarks": "rule_set_218" + "remarks": "rule_set_219" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the polyinstantiation_enabled SELinux Boolean", - "remarks": "rule_set_218" + "remarks": "rule_set_219" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_sssd_installed", - "remarks": "rule_set_219" + "remarks": "rule_set_220" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install the SSSD Package", - "remarks": "rule_set_219" + "remarks": "rule_set_220" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_sssd_enabled", - "remarks": "rule_set_220" + "remarks": "rule_set_221" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable the SSSD Service", - "remarks": "rule_set_220" + "remarks": "rule_set_221" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "postfix_network_listening_disabled", - "remarks": "rule_set_221" + "remarks": "rule_set_222" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Postfix Network Listening", - "remarks": "rule_set_221" + "remarks": "rule_set_222" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "postfix_client_configure_mail_alias", - "remarks": "rule_set_222" + "remarks": "rule_set_223" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure System to Forward All Mail For The Root Account", - "remarks": "rule_set_222" + "remarks": "rule_set_223" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_state", - "remarks": "rule_set_223" + "remarks": "rule_set_224" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SELinux State is Enforcing", - "remarks": "rule_set_223" + "remarks": "rule_set_224" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_224" + "remarks": "rule_set_225" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_224" + "remarks": "rule_set_225" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_build_database", - "remarks": "rule_set_225" + "remarks": "rule_set_226" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Build and Test AIDE Database", - "remarks": "rule_set_225" + "remarks": "rule_set_226" } ], "control-implementations": [ { - "uuid": "421d7b85-bfe2-498f-8869-1610062a0a12", + "uuid": "52a04cde-063c-4370-90bc-1a5462519153", "source": "trestle://profiles/rhel10-anssi-intermediary/profile.json", "description": "Control implementation for anssi_bp28_intermediary", "props": [ @@ -3559,7 +3571,7 @@ ], "implemented-requirements": [ { - "uuid": "8dfe54e6-c410-4af4-8678-5b3f9161735d", + "uuid": "4b7edf11-75c2-4a72-95f7-2bfcd3dd0b02", "control-id": "r2", "description": "The description for control-id r2.", "props": [ @@ -3572,7 +3584,7 @@ ] }, { - "uuid": "9b26c817-7733-464e-bbf2-c9d7b334e867", + "uuid": "90da44f1-fa72-454b-a3ee-fbd761f8707e", "control-id": "r3", "description": "The description for control-id r3.", "props": [ @@ -3585,7 +3597,7 @@ ] }, { - "uuid": "36b0747e-0ec0-4ab8-8486-a4737a19d025", + "uuid": "3a09f8e1-d96a-4a94-9229-5554e9e2b3b6", "control-id": "r5", "description": "No notes for control-id R5.", "props": [ @@ -3602,7 +3614,7 @@ ] }, { - "uuid": "228834a9-0947-4779-84fe-e98bc70c0bb8", + "uuid": "421e30a7-6e99-4b53-a958-549650c4ca63", "control-id": "r8", "description": "No notes for control-id R8.", "props": [ @@ -3674,7 +3686,7 @@ ] }, { - "uuid": "a908c07d-a9cf-4e1a-aa45-c3ece774e982", + "uuid": "afbc3b8d-3941-4ed3-b00f-5abd1ec9ff81", "control-id": "r9", "description": "No notes for control-id R9.", "props": [ @@ -3736,7 +3748,7 @@ ] }, { - "uuid": "58b164b6-bc24-4a59-9cce-a785af2fb8b6", + "uuid": "51ba5edb-5e68-4c79-b92e-25d37530808d", "control-id": "r11", "description": "No notes for control-id R11.", "props": [ @@ -3753,7 +3765,7 @@ ] }, { - "uuid": "6642e02c-af32-4357-be0c-3922a0ff9514", + "uuid": "05d6a0e5-f89c-47da-9eb0-adb4efd09fa3", "control-id": "r12", "description": "No notes for control-id R12.", "props": [ @@ -3880,7 +3892,7 @@ ] }, { - "uuid": "72e4778c-f70f-4c14-8460-e9269280fb4f", + "uuid": "0fb6778e-5c32-4ce4-9ca2-be479b5cd5fd", "control-id": "r13", "description": "When IPv6 is not in use, disable it, otherwise secure the IPv6 stack. This control hardens the IPv6 stack, to disable it use the related rules instead.", "props": [ @@ -3972,7 +3984,7 @@ ] }, { - "uuid": "0ab97c7f-23b1-4e71-9231-6ede73d255c6", + "uuid": "a4efc802-18bf-44df-99d4-3b54a013622a", "control-id": "r14", "description": "The rule for the /proc file system is not implemented", "props": [ @@ -4009,7 +4021,7 @@ ] }, { - "uuid": "1c5a357d-2911-4f54-b631-d4fba01f31c4", + "uuid": "de14a0c7-e694-48e7-9cc7-f9ee87844133", "control-id": "r28", "description": "No notes for control-id R28.", "props": [ @@ -4141,7 +4153,7 @@ ] }, { - "uuid": "f4ace87b-b4a9-4d8e-82df-78efa2c5a02e", + "uuid": "731c3365-42fd-4a04-b7ac-507f0973422f", "control-id": "r32", "description": "ANSSI doesn't specify the length of the inactivity period, we are choosing 10 minutes as reasonable number.", "props": [ @@ -4163,7 +4175,7 @@ ] }, { - "uuid": "5bf92f4f-3b49-4341-a1a1-93f5f330dc55", + "uuid": "dd8dc1a9-15ff-42e1-b62a-28489a9badce", "control-id": "r33", "description": "By disabling direct root logins proper accountability is ensured. Users will login first, then escalate to privileged (root) access. Change of privilege operations must be based on executables to monitor the activities performed (for example sudo). Nonetheless, the content automation cannot ensure that each administrator was given a nominative administration account separate from his normal user account.", "props": [ @@ -4205,7 +4217,7 @@ ] }, { - "uuid": "e67394e3-1b94-4211-be21-8666ec794ae3", + "uuid": "c06d1ceb-3cd2-43b3-bc37-3d3dc3b549da", "control-id": "r34", "description": "The description for control-id r34.", "props": [ @@ -4218,7 +4230,7 @@ ] }, { - "uuid": "1eb1945a-a304-4e5c-870a-dbf04cb12800", + "uuid": "3961ea2f-766b-4783-a7b9-6943ac0f5ba3", "control-id": "r35", "description": "The description for control-id r35.", "props": [ @@ -4231,7 +4243,7 @@ ] }, { - "uuid": "7ec43d17-b310-4edc-965e-574c15f0008c", + "uuid": "b014a437-acf4-4c01-bd5b-284249eade35", "control-id": "r39", "description": "No notes for control-id R39.", "props": [ @@ -4268,7 +4280,7 @@ ] }, { - "uuid": "22ce7e22-3360-4176-843e-187bebadb181", + "uuid": "3e101766-3c0e-4216-9cc0-2f918af388e3", "control-id": "r40", "description": "No notes for control-id R40.", "props": [ @@ -4285,7 +4297,7 @@ ] }, { - "uuid": "d075c804-34e8-41fa-a84b-581912e75b6e", + "uuid": "8d10d81c-c7b0-4917-aee5-85ed8c291300", "control-id": "r42", "description": "No notes for control-id R42.", "props": [ @@ -4302,7 +4314,7 @@ ] }, { - "uuid": "bfec2c5b-c7a3-4f18-b234-6fb7d159d6cf", + "uuid": "b6d17020-ac16-4732-84ac-af01269477d1", "control-id": "r43", "description": "No notes for control-id R43.", "props": [ @@ -4319,7 +4331,7 @@ ] }, { - "uuid": "882460aa-cd85-4f82-b337-8efad054cea4", + "uuid": "5c6db9a8-2334-4615-93ac-487f54fcafcb", "control-id": "r44", "description": "The description for control-id r44.", "props": [ @@ -4332,7 +4344,7 @@ ] }, { - "uuid": "a6480e57-04f0-440a-8bd8-cb7166a7c24b", + "uuid": "05331914-e479-4213-a6fd-7039fae72bbf", "control-id": "r50", "description": "No notes for control-id R50.", "props": [ @@ -4699,7 +4711,7 @@ ] }, { - "uuid": "52231c66-509c-4db5-9578-9d4cf8b3777d", + "uuid": "0081df9f-b10e-4dab-9f8d-3df3597d1aeb", "control-id": "r52", "description": "The description for control-id r52.", "props": [ @@ -4712,7 +4724,7 @@ ] }, { - "uuid": "57b0349e-5b66-4a93-bbbb-fc57c446cfb9", + "uuid": "f1cd8dce-5f27-4fc0-8987-b9a677900be7", "control-id": "r55", "description": "The approach of the selected rules is to use and configure pam_namespace module.", "props": [ @@ -4744,7 +4756,7 @@ ] }, { - "uuid": "ac3177b6-0317-48f1-beef-91444f1ee7b3", + "uuid": "9b1712a8-ffa8-4ede-8b20-729a75dcf053", "control-id": "r63", "description": "The description for control-id r63.", "props": [ @@ -4757,7 +4769,7 @@ ] }, { - "uuid": "3e9ba99d-6e9b-4771-8b7c-fe7a695b5a73", + "uuid": "932953db-7aed-496f-b917-6b152e21a8f2", "control-id": "r67", "description": "In systems where remote authentication is handled through sssd service, PAM delegates\nrequests for remote authentication to sssd service through a local Unix socket. The sssd\nservice can use IPA, AD or LDAP as a remote database containing information required for authentication.\nIn case LDAP is configured manually, there are several configuration options which should be chedked.", "props": [ @@ -4779,7 +4791,7 @@ ] }, { - "uuid": "67adf8fb-4c35-468f-a9aa-e794030e7d53", + "uuid": "9d73f398-dbb6-4350-8e64-f4ea36c061d8", "control-id": "r69", "description": "The description for control-id r69.", "props": [ @@ -4792,7 +4804,7 @@ ] }, { - "uuid": "d4d4d4c8-54aa-479a-8f59-561f757a8f0a", + "uuid": "df3aa15d-05e9-47c5-861f-f1a5f5533517", "control-id": "r70", "description": "The description for control-id r70.", "props": [ @@ -4805,7 +4817,7 @@ ] }, { - "uuid": "e1fd9971-4552-477e-8be8-3d08c46ea60b", + "uuid": "ea1adca2-76f2-48c4-8706-3d257ba6852d", "control-id": "r74", "description": "No notes for control-id R74.", "props": [ @@ -4822,7 +4834,7 @@ ] }, { - "uuid": "750e5e39-d7d0-4e73-8099-4d6f3d80866a", + "uuid": "8a98e4c4-a6c1-4d77-af7c-c95203b3d48c", "control-id": "r75", "description": "Only the alias for root user is covered by the rule. The other services cannot be reliably covered, as there is no simple way of determining what is a service account.", "props": [ @@ -4839,7 +4851,7 @@ ] }, { - "uuid": "ee437acb-1012-4edf-a71a-f8858ce9890f", + "uuid": "3445d376-15fc-4bb1-a904-0fae1778cc4d", "control-id": "r79", "description": "SELinux can provide confinement and monitoring of services, and AIDE provides basic integrity checking. System logs are configured as part of R43. Hardening of particular services should be done on a case by case basis and is not automated by this content.", "props": [ @@ -4866,7 +4878,7 @@ ] }, { - "uuid": "b22350c2-13c4-4981-9c4b-a4f58ec2e2e2", + "uuid": "1c5cfca9-5cb7-4156-bc13-5cd09683e516", "control-id": "r30", "description": "The description for control-id r30.", "props": [ @@ -4879,7 +4891,7 @@ ] }, { - "uuid": "7b0f91a3-3344-4761-9df0-02beb1e10330", + "uuid": "2036f351-8802-41af-b2c4-5fae49ccd508", "control-id": "r31", "description": "The rules selected below establish a general password strength baseline of 100 bits, based on the recommendations of the technical note \"Recommandations relatives à l'authentification multifacteur et aux mots de passe\" (https://cyber.gouv.fr/publications/recommandations-relatives-lauthentification-multifacteur-et-aux-mots-de-passe)\nThe baseline should be reviewed and tailored to the system's use case and needs.", "props": [ @@ -4951,7 +4963,7 @@ ] }, { - "uuid": "273a6cac-fab5-46c8-b612-962dd4020c2a", + "uuid": "39411655-493a-46b8-80a3-3a0c04775c79", "control-id": "r53", "description": "No notes for control-id R53.", "props": [ @@ -4973,7 +4985,7 @@ ] }, { - "uuid": "ee0efede-399d-41db-ae8d-5f2d52e8a7ac", + "uuid": "569635ea-fbfa-4c2d-8ed7-c543ff27f647", "control-id": "r54", "description": "No notes for control-id R54.", "props": [ @@ -5000,7 +5012,7 @@ ] }, { - "uuid": "445b61a2-45ca-4c64-a603-d18762f48fb6", + "uuid": "9c8c1f9f-a821-402b-ab40-c4afaa650d1b", "control-id": "r56", "description": "Only programs specifically designed to be used with setuid or setgid bits can have these privilege bits set. This requirement considers apropriate for setuid and setgid bits the binaries that are installed from recognized and authorized repositories (covered in R15). The remediation resets the sticky bit to intended value by vendor/developer, any finding after remediation should be reviewed.", "props": [ @@ -5022,7 +5034,7 @@ ] }, { - "uuid": "30f03c15-68dd-4534-9233-161e5bccdf41", + "uuid": "1ab50c3f-c338-4511-ba04-77f647bc4a18", "control-id": "r58", "description": "The description for control-id r58.", "props": [ @@ -5035,7 +5047,7 @@ ] }, { - "uuid": "26e60548-7930-4353-9f1e-9a7f9076f4be", + "uuid": "cbc3242b-4b96-4834-bff4-79f38c3b9740", "control-id": "r59", "description": "It is not trivial to distinguish an official repository from an unofficial one. We cannot draw conclusions from the repo name or URL of the repo (as they can be arbitrary or behind a proxy). One approach to check the origin of installed packages is to check the signature of the packages. If the public key of a repository is not installed, the repo is not trusted.", "props": [ @@ -5063,11 +5075,16 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_redhat_gpgkey_installed" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "package_sequoia-sq_installed" } ] }, { - "uuid": "c5ae1b5b-029e-474f-aa01-3f41e049a4f2", + "uuid": "824aeb55-cae5-4f90-b0a1-764d51282c60", "control-id": "r61", "description": "Check the vendor CVE feed and configure automatic install of security related updates.", "props": [ @@ -5099,7 +5116,7 @@ ] }, { - "uuid": "8b1c970c-ba9c-480a-a95c-0223ecb8e2c8", + "uuid": "7cfc5735-b99e-4e91-81be-7abd2bb66ee7", "control-id": "r62", "description": "The description for control-id r62.", "props": [ @@ -5137,7 +5154,7 @@ ] }, { - "uuid": "0307a843-c7c3-43d9-b5af-eb99cbfd64af", + "uuid": "730f6c09-d12f-45cc-9604-acc5eda8cf6e", "control-id": "r68", "description": "The selection of rules doesn't cover the use of hardware devices to protect the passwords.", "props": [ @@ -5174,7 +5191,7 @@ ] }, { - "uuid": "450be798-0576-43c7-9009-dd97807f240a", + "uuid": "ab5ab908-ce4e-4d47-821e-1a37ecfb1052", "control-id": "r80", "description": "The description for control-id r80.", "props": [ @@ -5541,7 +5558,7 @@ { "name": "Parameter_Value_Alternatives_17", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -5559,7 +5576,7 @@ { "name": "Parameter_Value_Alternatives_18", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -6363,4879 +6380,4903 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_dnf-automatic_installed", + "value": "package_sequoia-sq_installed", "remarks": "rule_set_023" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install dnf-automatic Package", + "value": "Install sequoia-sq Package", "remarks": "rule_set_023" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_dnf-automatic_installed", + "value": "package_sequoia-sq_installed", "remarks": "rule_set_023" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install dnf-automatic Package", + "value": "Install sequoia-sq Package", "remarks": "rule_set_023" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "timer_dnf-automatic_enabled", + "value": "package_dnf-automatic_installed", "remarks": "rule_set_024" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable dnf-automatic Timer", + "value": "Install dnf-automatic Package", "remarks": "rule_set_024" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "timer_dnf-automatic_enabled", + "value": "package_dnf-automatic_installed", "remarks": "rule_set_024" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable dnf-automatic Timer", + "value": "Install dnf-automatic Package", "remarks": "rule_set_024" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dnf-automatic_apply_updates", + "value": "timer_dnf-automatic_enabled", "remarks": "rule_set_025" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure dnf-automatic to Install Available Updates Automatically", + "value": "Enable dnf-automatic Timer", "remarks": "rule_set_025" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dnf-automatic_apply_updates", + "value": "timer_dnf-automatic_enabled", "remarks": "rule_set_025" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure dnf-automatic to Install Available Updates Automatically", + "value": "Enable dnf-automatic Timer", "remarks": "rule_set_025" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dnf-automatic_security_updates_only", + "value": "dnf-automatic_apply_updates", "remarks": "rule_set_026" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure dnf-automatic to Install Only Security Updates", + "value": "Configure dnf-automatic to Install Available Updates Automatically", "remarks": "rule_set_026" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dnf-automatic_security_updates_only", + "value": "dnf-automatic_apply_updates", "remarks": "rule_set_026" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure dnf-automatic to Install Only Security Updates", + "value": "Configure dnf-automatic to Install Available Updates Automatically", "remarks": "rule_set_026" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_kea_removed", + "value": "dnf-automatic_security_updates_only", "remarks": "rule_set_027" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall kea Package", + "value": "Configure dnf-automatic to Install Only Security Updates", "remarks": "rule_set_027" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_kea_removed", + "value": "dnf-automatic_security_updates_only", "remarks": "rule_set_027" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall kea Package", + "value": "Configure dnf-automatic to Install Only Security Updates", "remarks": "rule_set_027" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet_removed", + "value": "package_kea_removed", "remarks": "rule_set_028" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove telnet Clients", + "value": "Uninstall kea Package", "remarks": "rule_set_028" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet_removed", + "value": "package_kea_removed", "remarks": "rule_set_028" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove telnet Clients", + "value": "Uninstall kea Package", "remarks": "rule_set_028" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet-server_removed", + "value": "package_telnet_removed", "remarks": "rule_set_029" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall telnet-server Package", + "value": "Remove telnet Clients", "remarks": "rule_set_029" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet-server_removed", + "value": "package_telnet_removed", "remarks": "rule_set_029" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall telnet-server Package", + "value": "Remove telnet Clients", "remarks": "rule_set_029" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_tftp_removed", + "value": "package_telnet-server_removed", "remarks": "rule_set_030" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove tftp Daemon", + "value": "Uninstall telnet-server Package", "remarks": "rule_set_030" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_tftp_removed", + "value": "package_telnet-server_removed", "remarks": "rule_set_030" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove tftp Daemon", + "value": "Uninstall telnet-server Package", "remarks": "rule_set_030" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_tftp-server_removed", + "value": "package_tftp_removed", "remarks": "rule_set_031" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall tftp-server Package", + "value": "Remove tftp Daemon", "remarks": "rule_set_031" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_tftp-server_removed", + "value": "package_tftp_removed", "remarks": "rule_set_031" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall tftp-server Package", + "value": "Remove tftp Daemon", "remarks": "rule_set_031" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_systemauth", + "value": "package_tftp-server_removed", "remarks": "rule_set_032" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set PAM Password Hashing Algorithm - system-auth", + "value": "Uninstall tftp-server Package", "remarks": "rule_set_032" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_systemauth", + "value": "package_tftp-server_removed", "remarks": "rule_set_032" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set PAM Password Hashing Algorithm - system-auth", + "value": "Uninstall tftp-server Package", "remarks": "rule_set_032" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_unix_rounds_system_auth", + "value": "set_password_hashing_algorithm_systemauth", "remarks": "rule_set_033" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set number of Password Hashing Rounds - system-auth", + "value": "Set PAM Password Hashing Algorithm - system-auth", "remarks": "rule_set_033" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_unix_rounds_system_auth", + "value": "set_password_hashing_algorithm_systemauth", "remarks": "rule_set_033" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set number of Password Hashing Rounds - system-auth", + "value": "Set PAM Password Hashing Algorithm - system-auth", "remarks": "rule_set_033" }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "accounts_password_pam_unix_rounds_system_auth", + "remarks": "rule_set_034" + }, + { + "name": "Rule_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Set number of Password Hashing Rounds - system-auth", + "remarks": "rule_set_034" + }, + { + "name": "Check_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "accounts_password_pam_unix_rounds_system_auth", + "remarks": "rule_set_034" + }, + { + "name": "Check_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Set number of Password Hashing Rounds - system-auth", + "remarks": "rule_set_034" + }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_rounds_password_auth", - "remarks": "rule_set_034" + "remarks": "rule_set_035" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set number of Password Hashing Rounds - password-auth", - "remarks": "rule_set_034" + "remarks": "rule_set_035" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_unix_rounds_password_auth", - "remarks": "rule_set_034" + "remarks": "rule_set_035" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set number of Password Hashing Rounds - password-auth", - "remarks": "rule_set_034" + "remarks": "rule_set_035" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minclass", - "remarks": "rule_set_035" + "remarks": "rule_set_036" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", - "remarks": "rule_set_035" + "remarks": "rule_set_036" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minclass", - "remarks": "rule_set_035" + "remarks": "rule_set_036" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", - "remarks": "rule_set_035" + "remarks": "rule_set_036" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_password", - "remarks": "rule_set_036" + "remarks": "rule_set_037" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Boot Loader Password in grub2", - "remarks": "rule_set_036" + "remarks": "rule_set_037" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_password", - "remarks": "rule_set_036" + "remarks": "rule_set_037" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Boot Loader Password in grub2", - "remarks": "rule_set_036" + "remarks": "rule_set_037" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_l1tf_argument", - "remarks": "rule_set_037" + "remarks": "rule_set_038" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure L1 Terminal Fault mitigations", - "remarks": "rule_set_037" + "remarks": "rule_set_038" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_l1tf_argument", - "remarks": "rule_set_037" + "remarks": "rule_set_038" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure L1 Terminal Fault mitigations", - "remarks": "rule_set_037" + "remarks": "rule_set_038" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_page_poison_argument", - "remarks": "rule_set_038" + "remarks": "rule_set_039" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable page allocator poisoning", - "remarks": "rule_set_038" + "remarks": "rule_set_039" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_page_poison_argument", - "remarks": "rule_set_038" + "remarks": "rule_set_039" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable page allocator poisoning", - "remarks": "rule_set_038" + "remarks": "rule_set_039" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_pti_argument", - "remarks": "rule_set_039" + "remarks": "rule_set_040" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Page-Table Isolation (KPTI)", - "remarks": "rule_set_039" + "remarks": "rule_set_040" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_pti_argument", - "remarks": "rule_set_039" + "remarks": "rule_set_040" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Page-Table Isolation (KPTI)", - "remarks": "rule_set_039" + "remarks": "rule_set_040" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_slab_nomerge_argument", - "remarks": "rule_set_040" + "remarks": "rule_set_041" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable merging of slabs with similar size", - "remarks": "rule_set_040" + "remarks": "rule_set_041" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_slab_nomerge_argument", - "remarks": "rule_set_040" + "remarks": "rule_set_041" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable merging of slabs with similar size", - "remarks": "rule_set_040" + "remarks": "rule_set_041" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_slub_debug_argument", - "remarks": "rule_set_041" + "remarks": "rule_set_042" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable SLUB/SLAB allocator poisoning", - "remarks": "rule_set_041" + "remarks": "rule_set_042" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_slub_debug_argument", - "remarks": "rule_set_041" + "remarks": "rule_set_042" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable SLUB/SLAB allocator poisoning", - "remarks": "rule_set_041" + "remarks": "rule_set_042" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_spec_store_bypass_disable_argument", - "remarks": "rule_set_042" + "remarks": "rule_set_043" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Speculative Store Bypass Mitigation", - "remarks": "rule_set_042" + "remarks": "rule_set_043" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_spec_store_bypass_disable_argument", - "remarks": "rule_set_042" + "remarks": "rule_set_043" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Speculative Store Bypass Mitigation", - "remarks": "rule_set_042" + "remarks": "rule_set_043" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_spectre_v2_argument", - "remarks": "rule_set_043" + "remarks": "rule_set_044" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Spectre v2 mitigation", - "remarks": "rule_set_043" + "remarks": "rule_set_044" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_spectre_v2_argument", - "remarks": "rule_set_043" + "remarks": "rule_set_044" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enforce Spectre v2 mitigation", - "remarks": "rule_set_043" + "remarks": "rule_set_044" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_mds_argument", - "remarks": "rule_set_044" + "remarks": "rule_set_045" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Microarchitectural Data Sampling mitigation", - "remarks": "rule_set_044" + "remarks": "rule_set_045" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_mds_argument", - "remarks": "rule_set_044" + "remarks": "rule_set_045" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Microarchitectural Data Sampling mitigation", - "remarks": "rule_set_044" + "remarks": "rule_set_045" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_mce_argument", - "remarks": "rule_set_045" + "remarks": "rule_set_046" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Force kernel panic on uncorrected MCEs", - "remarks": "rule_set_045" + "remarks": "rule_set_046" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_mce_argument", - "remarks": "rule_set_045" + "remarks": "rule_set_046" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Force kernel panic on uncorrected MCEs", - "remarks": "rule_set_045" + "remarks": "rule_set_046" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_page_alloc_shuffle_argument", - "remarks": "rule_set_046" + "remarks": "rule_set_047" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable randomization of the page allocator", - "remarks": "rule_set_046" + "remarks": "rule_set_047" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_page_alloc_shuffle_argument", - "remarks": "rule_set_046" + "remarks": "rule_set_047" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable randomization of the page allocator", - "remarks": "rule_set_046" + "remarks": "rule_set_047" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_rng_core_default_quality_argument", - "remarks": "rule_set_047" + "remarks": "rule_set_048" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the confidence in TPM for entropy", - "remarks": "rule_set_047" + "remarks": "rule_set_048" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_rng_core_default_quality_argument", - "remarks": "rule_set_047" + "remarks": "rule_set_048" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the confidence in TPM for entropy", - "remarks": "rule_set_047" + "remarks": "rule_set_048" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_vm_mmap_min_addr", - "remarks": "rule_set_048" + "remarks": "rule_set_049" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent applications from mapping low portion of virtual memory", - "remarks": "rule_set_048" + "remarks": "rule_set_049" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_vm_mmap_min_addr", - "remarks": "rule_set_048" + "remarks": "rule_set_049" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent applications from mapping low portion of virtual memory", - "remarks": "rule_set_048" + "remarks": "rule_set_049" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_dmesg_restrict", - "remarks": "rule_set_049" + "remarks": "rule_set_050" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Access to Kernel Message Buffer", - "remarks": "rule_set_049" + "remarks": "rule_set_050" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_dmesg_restrict", - "remarks": "rule_set_049" + "remarks": "rule_set_050" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Access to Kernel Message Buffer", - "remarks": "rule_set_049" + "remarks": "rule_set_050" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_kptr_restrict", - "remarks": "rule_set_050" + "remarks": "rule_set_051" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Exposed Kernel Pointer Addresses Access", - "remarks": "rule_set_050" + "remarks": "rule_set_051" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_kptr_restrict", - "remarks": "rule_set_050" + "remarks": "rule_set_051" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Exposed Kernel Pointer Addresses Access", - "remarks": "rule_set_050" + "remarks": "rule_set_051" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_pid_max", - "remarks": "rule_set_051" + "remarks": "rule_set_052" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure maximum number of process identifiers", - "remarks": "rule_set_051" + "remarks": "rule_set_052" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_pid_max", - "remarks": "rule_set_051" + "remarks": "rule_set_052" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure maximum number of process identifiers", - "remarks": "rule_set_051" + "remarks": "rule_set_052" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_perf_event_max_sample_rate", - "remarks": "rule_set_052" + "remarks": "rule_set_053" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit sampling frequency of the Perf system", - "remarks": "rule_set_052" + "remarks": "rule_set_053" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_perf_event_max_sample_rate", - "remarks": "rule_set_052" + "remarks": "rule_set_053" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit sampling frequency of the Perf system", - "remarks": "rule_set_052" + "remarks": "rule_set_053" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_perf_cpu_time_max_percent", - "remarks": "rule_set_053" + "remarks": "rule_set_054" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit CPU consumption of the Perf system", - "remarks": "rule_set_053" + "remarks": "rule_set_054" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_perf_cpu_time_max_percent", - "remarks": "rule_set_053" + "remarks": "rule_set_054" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Limit CPU consumption of the Perf system", - "remarks": "rule_set_053" + "remarks": "rule_set_054" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_perf_event_paranoid", - "remarks": "rule_set_054" + "remarks": "rule_set_055" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disallow kernel profiling by unprivileged users", - "remarks": "rule_set_054" + "remarks": "rule_set_055" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_perf_event_paranoid", - "remarks": "rule_set_054" + "remarks": "rule_set_055" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disallow kernel profiling by unprivileged users", - "remarks": "rule_set_054" + "remarks": "rule_set_055" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_randomize_va_space", - "remarks": "rule_set_055" + "remarks": "rule_set_056" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Randomized Layout of Virtual Address Space", - "remarks": "rule_set_055" + "remarks": "rule_set_056" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_randomize_va_space", - "remarks": "rule_set_055" + "remarks": "rule_set_056" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Randomized Layout of Virtual Address Space", - "remarks": "rule_set_055" + "remarks": "rule_set_056" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_sysrq", - "remarks": "rule_set_056" + "remarks": "rule_set_057" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disallow magic SysRq key", - "remarks": "rule_set_056" + "remarks": "rule_set_057" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_sysrq", - "remarks": "rule_set_056" + "remarks": "rule_set_057" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disallow magic SysRq key", - "remarks": "rule_set_056" + "remarks": "rule_set_057" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_unprivileged_bpf_disabled", - "remarks": "rule_set_057" + "remarks": "rule_set_058" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Access to Network bpf() Syscall From Unprivileged Processes", - "remarks": "rule_set_057" + "remarks": "rule_set_058" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_unprivileged_bpf_disabled", - "remarks": "rule_set_057" + "remarks": "rule_set_058" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Access to Network bpf() Syscall From Unprivileged Processes", - "remarks": "rule_set_057" + "remarks": "rule_set_058" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_panic_on_oops", - "remarks": "rule_set_058" + "remarks": "rule_set_059" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Kernel panic on oops", - "remarks": "rule_set_058" + "remarks": "rule_set_059" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_panic_on_oops", - "remarks": "rule_set_058" + "remarks": "rule_set_059" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Kernel panic on oops", - "remarks": "rule_set_058" + "remarks": "rule_set_059" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_yama_ptrace_scope", - "remarks": "rule_set_059" + "remarks": "rule_set_060" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict usage of ptrace to descendant processes", - "remarks": "rule_set_059" + "remarks": "rule_set_060" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_yama_ptrace_scope", - "remarks": "rule_set_059" + "remarks": "rule_set_060" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict usage of ptrace to descendant processes", - "remarks": "rule_set_059" + "remarks": "rule_set_060" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_core_bpf_jit_harden", - "remarks": "rule_set_060" + "remarks": "rule_set_061" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Harden the operation of the BPF just-in-time compiler", - "remarks": "rule_set_060" + "remarks": "rule_set_061" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_core_bpf_jit_harden", - "remarks": "rule_set_060" + "remarks": "rule_set_061" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Harden the operation of the BPF just-in-time compiler", - "remarks": "rule_set_060" + "remarks": "rule_set_061" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_ip_forward", - "remarks": "rule_set_061" + "remarks": "rule_set_062" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IP Forwarding on IPv4 Interfaces", - "remarks": "rule_set_061" + "remarks": "rule_set_062" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_ip_forward", - "remarks": "rule_set_061" + "remarks": "rule_set_062" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IP Forwarding on IPv4 Interfaces", - "remarks": "rule_set_061" + "remarks": "rule_set_062" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_local", - "remarks": "rule_set_062" + "remarks": "rule_set_063" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting Packets Routed Between Local Interfaces", - "remarks": "rule_set_062" + "remarks": "rule_set_063" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_local", - "remarks": "rule_set_062" + "remarks": "rule_set_063" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting Packets Routed Between Local Interfaces", - "remarks": "rule_set_062" + "remarks": "rule_set_063" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_redirects", - "remarks": "rule_set_063" + "remarks": "rule_set_064" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv4 Interfaces", - "remarks": "rule_set_063" + "remarks": "rule_set_064" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_redirects", - "remarks": "rule_set_063" + "remarks": "rule_set_064" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv4 Interfaces", - "remarks": "rule_set_063" + "remarks": "rule_set_064" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_redirects", - "remarks": "rule_set_064" + "remarks": "rule_set_065" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv4 Interfaces", - "remarks": "rule_set_064" + "remarks": "rule_set_065" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_redirects", - "remarks": "rule_set_064" + "remarks": "rule_set_065" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv4 Interfaces", - "remarks": "rule_set_064" + "remarks": "rule_set_065" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_secure_redirects", - "remarks": "rule_set_065" + "remarks": "rule_set_066" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Secure ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_065" + "remarks": "rule_set_066" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_secure_redirects", - "remarks": "rule_set_065" + "remarks": "rule_set_066" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Secure ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_065" + "remarks": "rule_set_066" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_secure_redirects", - "remarks": "rule_set_066" + "remarks": "rule_set_067" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Kernel Parameter for Accepting Secure Redirects By Default", - "remarks": "rule_set_066" + "remarks": "rule_set_067" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_secure_redirects", - "remarks": "rule_set_066" + "remarks": "rule_set_067" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Kernel Parameter for Accepting Secure Redirects By Default", - "remarks": "rule_set_066" + "remarks": "rule_set_067" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_shared_media", - "remarks": "rule_set_067" + "remarks": "rule_set_068" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Sending and Accepting Shared Media Redirects for All IPv4 Interfaces", - "remarks": "rule_set_067" + "remarks": "rule_set_068" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_shared_media", - "remarks": "rule_set_067" + "remarks": "rule_set_068" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Sending and Accepting Shared Media Redirects for All IPv4 Interfaces", - "remarks": "rule_set_067" + "remarks": "rule_set_068" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_shared_media", - "remarks": "rule_set_068" + "remarks": "rule_set_069" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Sending and Accepting Shared Media Redirects by Default", - "remarks": "rule_set_068" + "remarks": "rule_set_069" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_shared_media", - "remarks": "rule_set_068" + "remarks": "rule_set_069" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Sending and Accepting Shared Media Redirects by Default", - "remarks": "rule_set_068" + "remarks": "rule_set_069" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_source_route", - "remarks": "rule_set_069" + "remarks": "rule_set_070" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces", - "remarks": "rule_set_069" + "remarks": "rule_set_070" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_accept_source_route", - "remarks": "rule_set_069" + "remarks": "rule_set_070" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces", - "remarks": "rule_set_069" + "remarks": "rule_set_070" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_source_route", - "remarks": "rule_set_070" + "remarks": "rule_set_071" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv4 Interfaces by Default", - "remarks": "rule_set_070" + "remarks": "rule_set_071" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_accept_source_route", - "remarks": "rule_set_070" + "remarks": "rule_set_071" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv4 Interfaces by Default", - "remarks": "rule_set_070" + "remarks": "rule_set_071" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_arp_filter", - "remarks": "rule_set_071" + "remarks": "rule_set_072" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure ARP filtering for All IPv4 Interfaces", - "remarks": "rule_set_071" + "remarks": "rule_set_072" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_arp_filter", - "remarks": "rule_set_071" + "remarks": "rule_set_072" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure ARP filtering for All IPv4 Interfaces", - "remarks": "rule_set_071" + "remarks": "rule_set_072" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_arp_ignore", - "remarks": "rule_set_072" + "remarks": "rule_set_073" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Response Mode of ARP Requests for All IPv4 Interfaces", - "remarks": "rule_set_072" + "remarks": "rule_set_073" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_arp_ignore", - "remarks": "rule_set_072" + "remarks": "rule_set_073" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Response Mode of ARP Requests for All IPv4 Interfaces", - "remarks": "rule_set_072" + "remarks": "rule_set_073" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_route_localnet", - "remarks": "rule_set_073" + "remarks": "rule_set_074" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent Routing External Traffic to Local Loopback on All IPv4 Interfaces", - "remarks": "rule_set_073" + "remarks": "rule_set_074" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_route_localnet", - "remarks": "rule_set_073" + "remarks": "rule_set_074" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent Routing External Traffic to Local Loopback on All IPv4 Interfaces", - "remarks": "rule_set_073" + "remarks": "rule_set_074" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_drop_gratuitous_arp", - "remarks": "rule_set_074" + "remarks": "rule_set_075" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Drop Gratuitous ARP frames on All IPv4 Interfaces", - "remarks": "rule_set_074" + "remarks": "rule_set_075" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_drop_gratuitous_arp", - "remarks": "rule_set_074" + "remarks": "rule_set_075" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Drop Gratuitous ARP frames on All IPv4 Interfaces", - "remarks": "rule_set_074" + "remarks": "rule_set_075" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_rp_filter", - "remarks": "rule_set_075" + "remarks": "rule_set_076" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces", - "remarks": "rule_set_075" + "remarks": "rule_set_076" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_rp_filter", - "remarks": "rule_set_075" + "remarks": "rule_set_076" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces", - "remarks": "rule_set_075" + "remarks": "rule_set_076" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_rp_filter", - "remarks": "rule_set_076" + "remarks": "rule_set_077" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces by Default", - "remarks": "rule_set_076" + "remarks": "rule_set_077" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_rp_filter", - "remarks": "rule_set_076" + "remarks": "rule_set_077" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use Reverse Path Filtering on all IPv4 Interfaces by Default", - "remarks": "rule_set_076" + "remarks": "rule_set_077" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_send_redirects", - "remarks": "rule_set_077" + "remarks": "rule_set_078" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_077" + "remarks": "rule_set_078" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_all_send_redirects", - "remarks": "rule_set_077" + "remarks": "rule_set_078" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces", - "remarks": "rule_set_077" + "remarks": "rule_set_078" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_send_redirects", - "remarks": "rule_set_078" + "remarks": "rule_set_079" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces by Default", - "remarks": "rule_set_078" + "remarks": "rule_set_079" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_conf_default_send_redirects", - "remarks": "rule_set_078" + "remarks": "rule_set_079" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces by Default", - "remarks": "rule_set_078" + "remarks": "rule_set_079" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses", - "remarks": "rule_set_079" + "remarks": "rule_set_080" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Ignore Bogus ICMP Error Responses on IPv4 Interfaces", - "remarks": "rule_set_079" + "remarks": "rule_set_080" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_icmp_ignore_bogus_error_responses", - "remarks": "rule_set_079" + "remarks": "rule_set_080" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Ignore Bogus ICMP Error Responses on IPv4 Interfaces", - "remarks": "rule_set_079" + "remarks": "rule_set_080" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_ip_local_port_range", - "remarks": "rule_set_080" + "remarks": "rule_set_081" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Kernel Parameter to Increase Local Port Range", - "remarks": "rule_set_080" + "remarks": "rule_set_081" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_ip_local_port_range", - "remarks": "rule_set_080" + "remarks": "rule_set_081" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Kernel Parameter to Increase Local Port Range", - "remarks": "rule_set_080" + "remarks": "rule_set_081" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_tcp_rfc1337", - "remarks": "rule_set_081" + "remarks": "rule_set_082" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use TCP RFC 1337 on IPv4 Interfaces", - "remarks": "rule_set_081" + "remarks": "rule_set_082" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_tcp_rfc1337", - "remarks": "rule_set_081" + "remarks": "rule_set_082" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use TCP RFC 1337 on IPv4 Interfaces", - "remarks": "rule_set_081" + "remarks": "rule_set_082" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_tcp_syncookies", - "remarks": "rule_set_082" + "remarks": "rule_set_083" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use TCP Syncookies on Network Interfaces", - "remarks": "rule_set_082" + "remarks": "rule_set_083" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_tcp_syncookies", - "remarks": "rule_set_082" + "remarks": "rule_set_083" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Use TCP Syncookies on Network Interfaces", - "remarks": "rule_set_082" + "remarks": "rule_set_083" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_router_solicitations", - "remarks": "rule_set_083" + "remarks": "rule_set_084" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Denying Router Solicitations on All IPv6 Interfaces", - "remarks": "rule_set_083" + "remarks": "rule_set_084" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_router_solicitations", - "remarks": "rule_set_083" + "remarks": "rule_set_084" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Denying Router Solicitations on All IPv6 Interfaces", - "remarks": "rule_set_083" + "remarks": "rule_set_084" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_router_solicitations", - "remarks": "rule_set_084" + "remarks": "rule_set_085" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Denying Router Solicitations on All IPv6 Interfaces By Default", - "remarks": "rule_set_084" + "remarks": "rule_set_085" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_router_solicitations", - "remarks": "rule_set_084" + "remarks": "rule_set_085" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Denying Router Solicitations on All IPv6 Interfaces By Default", - "remarks": "rule_set_084" + "remarks": "rule_set_085" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_ra_rtr_pref", - "remarks": "rule_set_085" + "remarks": "rule_set_086" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Router Preference in Router Advertisements on All IPv6 Interfaces", - "remarks": "rule_set_085" + "remarks": "rule_set_086" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_ra_rtr_pref", - "remarks": "rule_set_085" + "remarks": "rule_set_086" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Router Preference in Router Advertisements on All IPv6 Interfaces", - "remarks": "rule_set_085" + "remarks": "rule_set_086" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_ra_rtr_pref", - "remarks": "rule_set_086" + "remarks": "rule_set_087" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Router Preference in Router Advertisements on All IPv6 Interfaces By Default", - "remarks": "rule_set_086" + "remarks": "rule_set_087" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_ra_rtr_pref", - "remarks": "rule_set_086" + "remarks": "rule_set_087" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Router Preference in Router Advertisements on All IPv6 Interfaces By Default", - "remarks": "rule_set_086" + "remarks": "rule_set_087" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_ra_pinfo", - "remarks": "rule_set_087" + "remarks": "rule_set_088" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Prefix Information in Router Advertisements on All IPv6 Interfaces", - "remarks": "rule_set_087" + "remarks": "rule_set_088" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_ra_pinfo", - "remarks": "rule_set_087" + "remarks": "rule_set_088" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Prefix Information in Router Advertisements on All IPv6 Interfaces", - "remarks": "rule_set_087" + "remarks": "rule_set_088" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_ra_pinfo", - "remarks": "rule_set_088" + "remarks": "rule_set_089" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Prefix Information in Router Advertisements on All IPv6 Interfaces By Default", - "remarks": "rule_set_088" + "remarks": "rule_set_089" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_ra_pinfo", - "remarks": "rule_set_088" + "remarks": "rule_set_089" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Prefix Information in Router Advertisements on All IPv6 Interfaces By Default", - "remarks": "rule_set_088" + "remarks": "rule_set_089" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_ra_defrtr", - "remarks": "rule_set_089" + "remarks": "rule_set_090" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Default Router in Router Advertisements on All IPv6 Interfaces", - "remarks": "rule_set_089" + "remarks": "rule_set_090" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_ra_defrtr", - "remarks": "rule_set_089" + "remarks": "rule_set_090" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Default Router in Router Advertisements on All IPv6 Interfaces", - "remarks": "rule_set_089" + "remarks": "rule_set_090" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_ra_defrtr", - "remarks": "rule_set_090" + "remarks": "rule_set_091" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Default Router in Router Advertisements on All IPv6 Interfaces By Default", - "remarks": "rule_set_090" + "remarks": "rule_set_091" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_ra_defrtr", - "remarks": "rule_set_090" + "remarks": "rule_set_091" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Accepting Default Router in Router Advertisements on All IPv6 Interfaces By Default", - "remarks": "rule_set_090" + "remarks": "rule_set_091" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_autoconf", - "remarks": "rule_set_091" + "remarks": "rule_set_092" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Auto Configuration on All IPv6 Interfaces", - "remarks": "rule_set_091" + "remarks": "rule_set_092" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_autoconf", - "remarks": "rule_set_091" + "remarks": "rule_set_092" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Auto Configuration on All IPv6 Interfaces", - "remarks": "rule_set_091" + "remarks": "rule_set_092" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_autoconf", - "remarks": "rule_set_092" + "remarks": "rule_set_093" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Auto Configuration on All IPv6 Interfaces By Default", - "remarks": "rule_set_092" + "remarks": "rule_set_093" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_autoconf", - "remarks": "rule_set_092" + "remarks": "rule_set_093" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Auto Configuration on All IPv6 Interfaces By Default", - "remarks": "rule_set_092" + "remarks": "rule_set_093" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_redirects", - "remarks": "rule_set_093" + "remarks": "rule_set_094" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv6 Interfaces", - "remarks": "rule_set_093" + "remarks": "rule_set_094" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_redirects", - "remarks": "rule_set_093" + "remarks": "rule_set_094" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Accepting ICMP Redirects for All IPv6 Interfaces", - "remarks": "rule_set_093" + "remarks": "rule_set_094" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_redirects", - "remarks": "rule_set_094" + "remarks": "rule_set_095" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv6 Interfaces", - "remarks": "rule_set_094" + "remarks": "rule_set_095" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_redirects", - "remarks": "rule_set_094" + "remarks": "rule_set_095" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv6 Interfaces", - "remarks": "rule_set_094" + "remarks": "rule_set_095" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_source_route", - "remarks": "rule_set_095" + "remarks": "rule_set_096" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv6 Interfaces", - "remarks": "rule_set_095" + "remarks": "rule_set_096" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_accept_source_route", - "remarks": "rule_set_095" + "remarks": "rule_set_096" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv6 Interfaces", - "remarks": "rule_set_095" + "remarks": "rule_set_096" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_source_route", - "remarks": "rule_set_096" + "remarks": "rule_set_097" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv6 Interfaces by Default", - "remarks": "rule_set_096" + "remarks": "rule_set_097" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_accept_source_route", - "remarks": "rule_set_096" + "remarks": "rule_set_097" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for Accepting Source-Routed Packets on IPv6 Interfaces by Default", - "remarks": "rule_set_096" + "remarks": "rule_set_097" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_max_addresses", - "remarks": "rule_set_097" + "remarks": "rule_set_098" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Maximum Number of Autoconfigured Addresses on All IPv6 Interfaces", - "remarks": "rule_set_097" + "remarks": "rule_set_098" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_all_max_addresses", - "remarks": "rule_set_097" + "remarks": "rule_set_098" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Maximum Number of Autoconfigured Addresses on All IPv6 Interfaces", - "remarks": "rule_set_097" + "remarks": "rule_set_098" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_max_addresses", - "remarks": "rule_set_098" + "remarks": "rule_set_099" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Maximum Number of Autoconfigured Addresses on All IPv6 Interfaces By Default", - "remarks": "rule_set_098" + "remarks": "rule_set_099" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv6_conf_default_max_addresses", - "remarks": "rule_set_098" + "remarks": "rule_set_099" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Maximum Number of Autoconfigured Addresses on All IPv6 Interfaces By Default", - "remarks": "rule_set_098" + "remarks": "rule_set_099" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_suid_dumpable", - "remarks": "rule_set_099" + "remarks": "rule_set_100" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Core Dumps for SUID programs", - "remarks": "rule_set_099" + "remarks": "rule_set_100" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_suid_dumpable", - "remarks": "rule_set_099" + "remarks": "rule_set_100" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Core Dumps for SUID programs", - "remarks": "rule_set_099" + "remarks": "rule_set_100" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_fifos", - "remarks": "rule_set_100" + "remarks": "rule_set_101" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on FIFOs", - "remarks": "rule_set_100" + "remarks": "rule_set_101" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_fifos", - "remarks": "rule_set_100" + "remarks": "rule_set_101" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on FIFOs", - "remarks": "rule_set_100" + "remarks": "rule_set_101" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_regular", - "remarks": "rule_set_101" + "remarks": "rule_set_102" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Regular files", - "remarks": "rule_set_101" + "remarks": "rule_set_102" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_regular", - "remarks": "rule_set_101" + "remarks": "rule_set_102" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Regular files", - "remarks": "rule_set_101" + "remarks": "rule_set_102" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_symlinks", - "remarks": "rule_set_102" + "remarks": "rule_set_103" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", - "remarks": "rule_set_102" + "remarks": "rule_set_103" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_symlinks", - "remarks": "rule_set_102" + "remarks": "rule_set_103" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", - "remarks": "rule_set_102" + "remarks": "rule_set_103" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_hardlinks", - "remarks": "rule_set_103" + "remarks": "rule_set_104" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Hardlinks", - "remarks": "rule_set_103" + "remarks": "rule_set_104" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_hardlinks", - "remarks": "rule_set_103" + "remarks": "rule_set_104" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Hardlinks", - "remarks": "rule_set_103" + "remarks": "rule_set_104" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_nodev_nonroot_local_partitions", - "remarks": "rule_set_104" + "remarks": "rule_set_105" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nodev Option to Non-Root Local Partitions", - "remarks": "rule_set_104" + "remarks": "rule_set_105" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_nodev_nonroot_local_partitions", - "remarks": "rule_set_104" + "remarks": "rule_set_105" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nodev Option to Non-Root Local Partitions", - "remarks": "rule_set_104" + "remarks": "rule_set_105" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_boot", - "remarks": "rule_set_105" + "remarks": "rule_set_106" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /boot Located On Separate Partition", - "remarks": "rule_set_105" + "remarks": "rule_set_106" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_boot", - "remarks": "rule_set_105" + "remarks": "rule_set_106" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /boot Located On Separate Partition", - "remarks": "rule_set_105" + "remarks": "rule_set_106" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_boot_nosuid", - "remarks": "rule_set_106" + "remarks": "rule_set_107" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /boot", - "remarks": "rule_set_106" + "remarks": "rule_set_107" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_boot_nosuid", - "remarks": "rule_set_106" + "remarks": "rule_set_107" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /boot", - "remarks": "rule_set_106" + "remarks": "rule_set_107" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_boot_noexec", - "remarks": "rule_set_107" + "remarks": "rule_set_108" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add noexec Option to /boot", - "remarks": "rule_set_107" + "remarks": "rule_set_108" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_boot_noexec", - "remarks": "rule_set_107" + "remarks": "rule_set_108" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add noexec Option to /boot", - "remarks": "rule_set_107" + "remarks": "rule_set_108" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_opt", - "remarks": "rule_set_108" + "remarks": "rule_set_109" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /opt Located On Separate Partition", - "remarks": "rule_set_108" + "remarks": "rule_set_109" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_opt", - "remarks": "rule_set_108" + "remarks": "rule_set_109" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /opt Located On Separate Partition", - "remarks": "rule_set_108" + "remarks": "rule_set_109" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_opt_nosuid", - "remarks": "rule_set_109" + "remarks": "rule_set_110" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /opt", - "remarks": "rule_set_109" + "remarks": "rule_set_110" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_opt_nosuid", - "remarks": "rule_set_109" + "remarks": "rule_set_110" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /opt", - "remarks": "rule_set_109" + "remarks": "rule_set_110" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "systemd_tmp_mount_enabled", - "remarks": "rule_set_110" + "remarks": "rule_set_111" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure tmp.mount Unit Is Enabled", - "remarks": "rule_set_110" + "remarks": "rule_set_111" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "systemd_tmp_mount_enabled", - "remarks": "rule_set_110" + "remarks": "rule_set_111" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure tmp.mount Unit Is Enabled", - "remarks": "rule_set_110" + "remarks": "rule_set_111" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_tmp_nosuid", - "remarks": "rule_set_111" + "remarks": "rule_set_112" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /tmp", - "remarks": "rule_set_111" + "remarks": "rule_set_112" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_tmp_nosuid", - "remarks": "rule_set_111" + "remarks": "rule_set_112" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /tmp", - "remarks": "rule_set_111" + "remarks": "rule_set_112" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_tmp_noexec", - "remarks": "rule_set_112" + "remarks": "rule_set_113" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add noexec Option to /tmp", - "remarks": "rule_set_112" + "remarks": "rule_set_113" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_tmp_noexec", - "remarks": "rule_set_112" + "remarks": "rule_set_113" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add noexec Option to /tmp", - "remarks": "rule_set_112" + "remarks": "rule_set_113" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_srv", - "remarks": "rule_set_113" + "remarks": "rule_set_114" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /srv Located On Separate Partition", - "remarks": "rule_set_113" + "remarks": "rule_set_114" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_srv", - "remarks": "rule_set_113" + "remarks": "rule_set_114" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /srv Located On Separate Partition", - "remarks": "rule_set_113" + "remarks": "rule_set_114" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_srv_nosuid", - "remarks": "rule_set_114" + "remarks": "rule_set_115" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /srv", - "remarks": "rule_set_114" + "remarks": "rule_set_115" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_srv_nosuid", - "remarks": "rule_set_114" + "remarks": "rule_set_115" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /srv", - "remarks": "rule_set_114" + "remarks": "rule_set_115" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_home", - "remarks": "rule_set_115" + "remarks": "rule_set_116" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /home Located On Separate Partition", - "remarks": "rule_set_115" + "remarks": "rule_set_116" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_home", - "remarks": "rule_set_115" + "remarks": "rule_set_116" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /home Located On Separate Partition", - "remarks": "rule_set_115" + "remarks": "rule_set_116" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_home_nosuid", - "remarks": "rule_set_116" + "remarks": "rule_set_117" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /home", - "remarks": "rule_set_116" + "remarks": "rule_set_117" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_home_nosuid", - "remarks": "rule_set_116" + "remarks": "rule_set_117" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /home", - "remarks": "rule_set_116" + "remarks": "rule_set_117" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_home_noexec", - "remarks": "rule_set_117" + "remarks": "rule_set_118" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add noexec Option to /home", - "remarks": "rule_set_117" + "remarks": "rule_set_118" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_home_noexec", - "remarks": "rule_set_117" + "remarks": "rule_set_118" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add noexec Option to /home", - "remarks": "rule_set_117" + "remarks": "rule_set_118" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_usr", - "remarks": "rule_set_118" + "remarks": "rule_set_119" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /usr Located On Separate Partition", - "remarks": "rule_set_118" + "remarks": "rule_set_119" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_usr", - "remarks": "rule_set_118" + "remarks": "rule_set_119" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /usr Located On Separate Partition", - "remarks": "rule_set_118" + "remarks": "rule_set_119" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var", - "remarks": "rule_set_119" + "remarks": "rule_set_120" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var Located On Separate Partition", - "remarks": "rule_set_119" + "remarks": "rule_set_120" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var", - "remarks": "rule_set_119" + "remarks": "rule_set_120" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var Located On Separate Partition", - "remarks": "rule_set_119" + "remarks": "rule_set_120" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_var_nosuid", - "remarks": "rule_set_120" + "remarks": "rule_set_121" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /var", - "remarks": "rule_set_120" + "remarks": "rule_set_121" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_var_nosuid", - "remarks": "rule_set_120" + "remarks": "rule_set_121" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /var", - "remarks": "rule_set_120" + "remarks": "rule_set_121" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_var_noexec", - "remarks": "rule_set_121" + "remarks": "rule_set_122" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add noexec Option to /var", - "remarks": "rule_set_121" + "remarks": "rule_set_122" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_var_noexec", - "remarks": "rule_set_121" + "remarks": "rule_set_122" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add noexec Option to /var", - "remarks": "rule_set_121" + "remarks": "rule_set_122" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log", - "remarks": "rule_set_122" + "remarks": "rule_set_123" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log Located On Separate Partition", - "remarks": "rule_set_122" + "remarks": "rule_set_123" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log", - "remarks": "rule_set_122" + "remarks": "rule_set_123" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log Located On Separate Partition", - "remarks": "rule_set_122" + "remarks": "rule_set_123" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_var_log_noexec", - "remarks": "rule_set_123" + "remarks": "rule_set_124" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add noexec Option to /var/log", - "remarks": "rule_set_123" + "remarks": "rule_set_124" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_var_log_noexec", - "remarks": "rule_set_123" + "remarks": "rule_set_124" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add noexec Option to /var/log", - "remarks": "rule_set_123" + "remarks": "rule_set_124" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_var_log_nosuid", - "remarks": "rule_set_124" + "remarks": "rule_set_125" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /var/log", - "remarks": "rule_set_124" + "remarks": "rule_set_125" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_var_log_nosuid", - "remarks": "rule_set_124" + "remarks": "rule_set_125" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /var/log", - "remarks": "rule_set_124" + "remarks": "rule_set_125" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_tmp", - "remarks": "rule_set_125" + "remarks": "rule_set_126" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/tmp Located On Separate Partition", - "remarks": "rule_set_125" + "remarks": "rule_set_126" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_tmp", - "remarks": "rule_set_125" + "remarks": "rule_set_126" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/tmp Located On Separate Partition", - "remarks": "rule_set_125" + "remarks": "rule_set_126" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_var_tmp_nosuid", - "remarks": "rule_set_126" + "remarks": "rule_set_127" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /var/tmp", - "remarks": "rule_set_126" + "remarks": "rule_set_127" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_var_tmp_nosuid", - "remarks": "rule_set_126" + "remarks": "rule_set_127" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /var/tmp", - "remarks": "rule_set_126" + "remarks": "rule_set_127" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_var_tmp_noexec", - "remarks": "rule_set_127" + "remarks": "rule_set_128" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add noexec Option to /var/tmp", - "remarks": "rule_set_127" + "remarks": "rule_set_128" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_var_tmp_noexec", - "remarks": "rule_set_127" + "remarks": "rule_set_128" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add noexec Option to /var/tmp", - "remarks": "rule_set_127" + "remarks": "rule_set_128" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "logind_session_timeout", - "remarks": "rule_set_128" + "remarks": "rule_set_129" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Logind to terminate idle sessions after certain time of inactivity", - "remarks": "rule_set_128" + "remarks": "rule_set_129" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "logind_session_timeout", - "remarks": "rule_set_128" + "remarks": "rule_set_129" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Logind to terminate idle sessions after certain time of inactivity", - "remarks": "rule_set_128" + "remarks": "rule_set_129" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_tmout", - "remarks": "rule_set_129" + "remarks": "rule_set_130" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Interactive Session Timeout", - "remarks": "rule_set_129" + "remarks": "rule_set_130" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_tmout", - "remarks": "rule_set_129" + "remarks": "rule_set_130" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Interactive Session Timeout", - "remarks": "rule_set_129" + "remarks": "rule_set_130" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_direct_root_logins", - "remarks": "rule_set_130" + "remarks": "rule_set_131" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Direct root Logins Not Allowed", - "remarks": "rule_set_130" + "remarks": "rule_set_131" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_direct_root_logins", - "remarks": "rule_set_130" + "remarks": "rule_set_131" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Direct root Logins Not Allowed", - "remarks": "rule_set_130" + "remarks": "rule_set_131" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_root_login", - "remarks": "rule_set_131" + "remarks": "rule_set_132" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Root Login", - "remarks": "rule_set_131" + "remarks": "rule_set_132" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_root_login", - "remarks": "rule_set_131" + "remarks": "rule_set_132" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Root Login", - "remarks": "rule_set_131" + "remarks": "rule_set_132" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_sudo_installed", - "remarks": "rule_set_132" + "remarks": "rule_set_133" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install sudo Package", - "remarks": "rule_set_132" + "remarks": "rule_set_133" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_sudo_installed", - "remarks": "rule_set_132" + "remarks": "rule_set_133" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install sudo Package", - "remarks": "rule_set_132" + "remarks": "rule_set_133" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_sudo", - "remarks": "rule_set_133" + "remarks": "rule_set_134" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - sudo", - "remarks": "rule_set_133" + "remarks": "rule_set_134" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_sudo", - "remarks": "rule_set_133" + "remarks": "rule_set_134" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - sudo", - "remarks": "rule_set_133" + "remarks": "rule_set_134" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_auditd_enabled", - "remarks": "rule_set_134" + "remarks": "rule_set_135" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable auditd Service", - "remarks": "rule_set_134" + "remarks": "rule_set_135" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_auditd_enabled", - "remarks": "rule_set_134" + "remarks": "rule_set_135" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable auditd Service", - "remarks": "rule_set_134" + "remarks": "rule_set_135" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit_installed", - "remarks": "rule_set_135" + "remarks": "rule_set_136" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit Subsystem is Installed", - "remarks": "rule_set_135" + "remarks": "rule_set_136" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit_installed", - "remarks": "rule_set_135" + "remarks": "rule_set_136" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit Subsystem is Installed", - "remarks": "rule_set_135" + "remarks": "rule_set_136" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_noexec", - "remarks": "rule_set_136" + "remarks": "rule_set_137" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Privileged Escalated Commands Cannot Execute Other Commands - sudo NOEXEC", - "remarks": "rule_set_136" + "remarks": "rule_set_137" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_noexec", - "remarks": "rule_set_136" + "remarks": "rule_set_137" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Privileged Escalated Commands Cannot Execute Other Commands - sudo NOEXEC", - "remarks": "rule_set_136" + "remarks": "rule_set_137" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_requiretty", - "remarks": "rule_set_137" + "remarks": "rule_set_138" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo requiretty", - "remarks": "rule_set_137" + "remarks": "rule_set_138" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_requiretty", - "remarks": "rule_set_137" + "remarks": "rule_set_138" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo requiretty", - "remarks": "rule_set_137" + "remarks": "rule_set_138" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_use_pty", - "remarks": "rule_set_138" + "remarks": "rule_set_139" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo use_pty", - "remarks": "rule_set_138" + "remarks": "rule_set_139" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_use_pty", - "remarks": "rule_set_138" + "remarks": "rule_set_139" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Only Users Logged In To Real tty Can Execute Sudo - sudo use_pty", - "remarks": "rule_set_138" + "remarks": "rule_set_139" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_ignore_dot", - "remarks": "rule_set_139" + "remarks": "rule_set_140" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure sudo Ignores Commands In Current Dir - sudo ignore_dot", - "remarks": "rule_set_139" + "remarks": "rule_set_140" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_ignore_dot", - "remarks": "rule_set_139" + "remarks": "rule_set_140" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure sudo Ignores Commands In Current Dir - sudo ignore_dot", - "remarks": "rule_set_139" + "remarks": "rule_set_140" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_env_reset", - "remarks": "rule_set_140" + "remarks": "rule_set_141" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure sudo Runs In A Minimal Environment - sudo env_reset", - "remarks": "rule_set_140" + "remarks": "rule_set_141" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_add_env_reset", - "remarks": "rule_set_140" + "remarks": "rule_set_141" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure sudo Runs In A Minimal Environment - sudo env_reset", - "remarks": "rule_set_140" + "remarks": "rule_set_141" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudoers_no_root_target", - "remarks": "rule_set_141" + "remarks": "rule_set_142" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Don't target root user in the sudoers file", - "remarks": "rule_set_141" + "remarks": "rule_set_142" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudoers_no_root_target", - "remarks": "rule_set_141" + "remarks": "rule_set_142" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Don't target root user in the sudoers file", - "remarks": "rule_set_141" + "remarks": "rule_set_142" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudoers_no_command_negation", - "remarks": "rule_set_142" + "remarks": "rule_set_143" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Don't define allowed commands in sudoers by means of exclusion", - "remarks": "rule_set_142" + "remarks": "rule_set_143" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudoers_no_command_negation", - "remarks": "rule_set_142" + "remarks": "rule_set_143" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Don't define allowed commands in sudoers by means of exclusion", - "remarks": "rule_set_142" + "remarks": "rule_set_143" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudoers_explicit_command_args", - "remarks": "rule_set_143" + "remarks": "rule_set_144" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Explicit arguments in sudo specifications", - "remarks": "rule_set_143" + "remarks": "rule_set_144" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudoers_explicit_command_args", - "remarks": "rule_set_143" + "remarks": "rule_set_144" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Explicit arguments in sudo specifications", - "remarks": "rule_set_143" + "remarks": "rule_set_144" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shadow", - "remarks": "rule_set_144" + "remarks": "rule_set_145" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns shadow File", - "remarks": "rule_set_144" + "remarks": "rule_set_145" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shadow", - "remarks": "rule_set_144" + "remarks": "rule_set_145" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns shadow File", - "remarks": "rule_set_144" + "remarks": "rule_set_145" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shadow", - "remarks": "rule_set_145" + "remarks": "rule_set_146" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns shadow File", - "remarks": "rule_set_145" + "remarks": "rule_set_146" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shadow", - "remarks": "rule_set_145" + "remarks": "rule_set_146" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns shadow File", - "remarks": "rule_set_145" + "remarks": "rule_set_146" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shadow", - "remarks": "rule_set_146" + "remarks": "rule_set_147" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on shadow File", - "remarks": "rule_set_146" + "remarks": "rule_set_147" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shadow", - "remarks": "rule_set_146" + "remarks": "rule_set_147" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on shadow File", - "remarks": "rule_set_146" + "remarks": "rule_set_147" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_gshadow", - "remarks": "rule_set_147" + "remarks": "rule_set_148" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns gshadow File", - "remarks": "rule_set_147" + "remarks": "rule_set_148" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_gshadow", - "remarks": "rule_set_147" + "remarks": "rule_set_148" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns gshadow File", - "remarks": "rule_set_147" + "remarks": "rule_set_148" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_gshadow", - "remarks": "rule_set_148" + "remarks": "rule_set_149" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns gshadow File", - "remarks": "rule_set_148" + "remarks": "rule_set_149" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_gshadow", - "remarks": "rule_set_148" + "remarks": "rule_set_149" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns gshadow File", - "remarks": "rule_set_148" + "remarks": "rule_set_149" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_gshadow", - "remarks": "rule_set_149" + "remarks": "rule_set_150" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on gshadow File", - "remarks": "rule_set_149" + "remarks": "rule_set_150" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_gshadow", - "remarks": "rule_set_149" + "remarks": "rule_set_150" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on gshadow File", - "remarks": "rule_set_149" + "remarks": "rule_set_150" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_passwd", - "remarks": "rule_set_150" + "remarks": "rule_set_151" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns passwd File", - "remarks": "rule_set_150" + "remarks": "rule_set_151" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_passwd", - "remarks": "rule_set_150" + "remarks": "rule_set_151" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns passwd File", - "remarks": "rule_set_150" + "remarks": "rule_set_151" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_passwd", - "remarks": "rule_set_151" + "remarks": "rule_set_152" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns passwd File", - "remarks": "rule_set_151" + "remarks": "rule_set_152" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_passwd", - "remarks": "rule_set_151" + "remarks": "rule_set_152" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns passwd File", - "remarks": "rule_set_151" + "remarks": "rule_set_152" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_passwd", - "remarks": "rule_set_152" + "remarks": "rule_set_153" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on passwd File", - "remarks": "rule_set_152" + "remarks": "rule_set_153" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_passwd", - "remarks": "rule_set_152" + "remarks": "rule_set_153" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on passwd File", - "remarks": "rule_set_152" + "remarks": "rule_set_153" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_group", - "remarks": "rule_set_153" + "remarks": "rule_set_154" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns group File", - "remarks": "rule_set_153" + "remarks": "rule_set_154" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_group", - "remarks": "rule_set_153" + "remarks": "rule_set_154" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns group File", - "remarks": "rule_set_153" + "remarks": "rule_set_154" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_group", - "remarks": "rule_set_154" + "remarks": "rule_set_155" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns group File", - "remarks": "rule_set_154" + "remarks": "rule_set_155" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_group", - "remarks": "rule_set_154" + "remarks": "rule_set_155" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns group File", - "remarks": "rule_set_154" + "remarks": "rule_set_155" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_group", - "remarks": "rule_set_155" + "remarks": "rule_set_156" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on group File", - "remarks": "rule_set_155" + "remarks": "rule_set_156" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_group", - "remarks": "rule_set_155" + "remarks": "rule_set_156" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on group File", - "remarks": "rule_set_155" + "remarks": "rule_set_156" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shells", - "remarks": "rule_set_156" + "remarks": "rule_set_157" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Who Owns /etc/shells File", - "remarks": "rule_set_156" + "remarks": "rule_set_157" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shells", - "remarks": "rule_set_156" + "remarks": "rule_set_157" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Who Owns /etc/shells File", - "remarks": "rule_set_156" + "remarks": "rule_set_157" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shells", - "remarks": "rule_set_157" + "remarks": "rule_set_158" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/shells File", - "remarks": "rule_set_157" + "remarks": "rule_set_158" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shells", - "remarks": "rule_set_157" + "remarks": "rule_set_158" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/shells File", - "remarks": "rule_set_157" + "remarks": "rule_set_158" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shells", - "remarks": "rule_set_158" + "remarks": "rule_set_159" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/shells File", - "remarks": "rule_set_158" + "remarks": "rule_set_159" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shells", - "remarks": "rule_set_158" + "remarks": "rule_set_159" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/shells File", - "remarks": "rule_set_158" + "remarks": "rule_set_159" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_159" + "remarks": "rule_set_160" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_159" + "remarks": "rule_set_160" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_159" + "remarks": "rule_set_160" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_159" + "remarks": "rule_set_160" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_160" + "remarks": "rule_set_161" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_160" + "remarks": "rule_set_161" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_160" + "remarks": "rule_set_161" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_160" + "remarks": "rule_set_161" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_users_home_files_groupownership", - "remarks": "rule_set_161" + "remarks": "rule_set_162" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All User Files and Directories In The Home Directory Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_161" + "remarks": "rule_set_162" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_users_home_files_groupownership", - "remarks": "rule_set_161" + "remarks": "rule_set_162" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All User Files and Directories In The Home Directory Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_161" + "remarks": "rule_set_162" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_users_home_files_ownership", - "remarks": "rule_set_162" + "remarks": "rule_set_163" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All User Files and Directories In The Home Directory Must Have a Valid Owner", - "remarks": "rule_set_162" + "remarks": "rule_set_163" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_users_home_files_ownership", - "remarks": "rule_set_162" + "remarks": "rule_set_163" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All User Files and Directories In The Home Directory Must Have a Valid Owner", - "remarks": "rule_set_162" + "remarks": "rule_set_163" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_users_home_files_permissions", - "remarks": "rule_set_163" + "remarks": "rule_set_164" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All User Files and Directories In The Home Directory Must Have Mode 0750 Or Less Permissive", - "remarks": "rule_set_163" + "remarks": "rule_set_164" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_users_home_files_permissions", - "remarks": "rule_set_163" + "remarks": "rule_set_164" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All User Files and Directories In The Home Directory Must Have Mode 0750 Or Less Permissive", - "remarks": "rule_set_163" + "remarks": "rule_set_164" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_164" + "remarks": "rule_set_165" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_164" + "remarks": "rule_set_165" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_164" + "remarks": "rule_set_165" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_164" + "remarks": "rule_set_165" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_system_commands_group_root_owned", - "remarks": "rule_set_165" + "remarks": "rule_set_166" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that system commands directories have root as a group owner", - "remarks": "rule_set_165" + "remarks": "rule_set_166" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_system_commands_group_root_owned", - "remarks": "rule_set_165" + "remarks": "rule_set_166" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that system commands directories have root as a group owner", - "remarks": "rule_set_165" + "remarks": "rule_set_166" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_system_commands_root_owned", - "remarks": "rule_set_166" + "remarks": "rule_set_167" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that system commands directories have root ownership", - "remarks": "rule_set_166" + "remarks": "rule_set_167" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_system_commands_root_owned", - "remarks": "rule_set_166" + "remarks": "rule_set_167" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that system commands directories have root ownership", - "remarks": "rule_set_166" + "remarks": "rule_set_167" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_system_commands_dirs", - "remarks": "rule_set_167" + "remarks": "rule_set_168" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that system commands files are group owned by root or a system account", - "remarks": "rule_set_167" + "remarks": "rule_set_168" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_system_commands_dirs", - "remarks": "rule_set_167" + "remarks": "rule_set_168" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that system commands files are group owned by root or a system account", - "remarks": "rule_set_167" + "remarks": "rule_set_168" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_binary_dirs", - "remarks": "rule_set_168" + "remarks": "rule_set_169" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that System Executables Have Root Ownership", - "remarks": "rule_set_168" + "remarks": "rule_set_169" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_binary_dirs", - "remarks": "rule_set_168" + "remarks": "rule_set_169" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that System Executables Have Root Ownership", - "remarks": "rule_set_168" + "remarks": "rule_set_169" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_binary_dirs", - "remarks": "rule_set_169" + "remarks": "rule_set_170" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that System Executables Have Restrictive Permissions", - "remarks": "rule_set_169" + "remarks": "rule_set_170" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_binary_dirs", - "remarks": "rule_set_169" + "remarks": "rule_set_170" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that System Executables Have Restrictive Permissions", - "remarks": "rule_set_169" + "remarks": "rule_set_170" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_private_key", - "remarks": "rule_set_170" + "remarks": "rule_set_171" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_170" + "remarks": "rule_set_171" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_private_key", - "remarks": "rule_set_170" + "remarks": "rule_set_171" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_170" + "remarks": "rule_set_171" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_private_key", - "remarks": "rule_set_171" + "remarks": "rule_set_172" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_171" + "remarks": "rule_set_172" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_private_key", - "remarks": "rule_set_171" + "remarks": "rule_set_172" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Private *_key Key Files", - "remarks": "rule_set_171" + "remarks": "rule_set_172" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_private_key", - "remarks": "rule_set_172" + "remarks": "rule_set_173" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Private *_key Key Files", - "remarks": "rule_set_172" + "remarks": "rule_set_173" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_private_key", - "remarks": "rule_set_172" + "remarks": "rule_set_173" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Private *_key Key Files", - "remarks": "rule_set_172" + "remarks": "rule_set_173" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_pub_key", - "remarks": "rule_set_173" + "remarks": "rule_set_174" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_173" + "remarks": "rule_set_174" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_sshd_pub_key", - "remarks": "rule_set_173" + "remarks": "rule_set_174" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_173" + "remarks": "rule_set_174" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_pub_key", - "remarks": "rule_set_174" + "remarks": "rule_set_175" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_174" + "remarks": "rule_set_175" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_sshd_pub_key", - "remarks": "rule_set_174" + "remarks": "rule_set_175" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Ownership on SSH Server Public *.pub Key Files", - "remarks": "rule_set_174" + "remarks": "rule_set_175" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_pub_key", - "remarks": "rule_set_175" + "remarks": "rule_set_176" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Public *.pub Key Files", - "remarks": "rule_set_175" + "remarks": "rule_set_176" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_pub_key", - "remarks": "rule_set_175" + "remarks": "rule_set_176" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Public *.pub Key Files", - "remarks": "rule_set_175" + "remarks": "rule_set_176" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_config", - "remarks": "rule_set_176" + "remarks": "rule_set_177" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server config file", - "remarks": "rule_set_176" + "remarks": "rule_set_177" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_sshd_config", - "remarks": "rule_set_176" + "remarks": "rule_set_177" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Owner on SSH Server config file", - "remarks": "rule_set_176" + "remarks": "rule_set_177" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_config", - "remarks": "rule_set_177" + "remarks": "rule_set_178" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server config file", - "remarks": "rule_set_177" + "remarks": "rule_set_178" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_sshd_config", - "remarks": "rule_set_177" + "remarks": "rule_set_178" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns SSH Server config file", - "remarks": "rule_set_177" + "remarks": "rule_set_178" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_config", - "remarks": "rule_set_178" + "remarks": "rule_set_179" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server config file", - "remarks": "rule_set_178" + "remarks": "rule_set_179" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_config", - "remarks": "rule_set_178" + "remarks": "rule_set_179" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server config file", - "remarks": "rule_set_178" + "remarks": "rule_set_179" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_etc_selinux", - "remarks": "rule_set_179" + "remarks": "rule_set_180" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/selinux Directory", - "remarks": "rule_set_179" + "remarks": "rule_set_180" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_etc_selinux", - "remarks": "rule_set_179" + "remarks": "rule_set_180" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/selinux Directory", - "remarks": "rule_set_179" + "remarks": "rule_set_180" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_selinux", - "remarks": "rule_set_180" + "remarks": "rule_set_181" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/selinux Directory", - "remarks": "rule_set_180" + "remarks": "rule_set_181" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_selinux", - "remarks": "rule_set_180" + "remarks": "rule_set_181" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/selinux Directory", - "remarks": "rule_set_180" + "remarks": "rule_set_181" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_selinux", - "remarks": "rule_set_181" + "remarks": "rule_set_182" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/selinux Directory", - "remarks": "rule_set_181" + "remarks": "rule_set_182" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_selinux", - "remarks": "rule_set_181" + "remarks": "rule_set_182" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/selinux Directory", - "remarks": "rule_set_181" + "remarks": "rule_set_182" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_sestatus_conf", - "remarks": "rule_set_182" + "remarks": "rule_set_183" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/sestatus.conf File", - "remarks": "rule_set_182" + "remarks": "rule_set_183" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_sestatus_conf", - "remarks": "rule_set_182" + "remarks": "rule_set_183" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/sestatus.conf File", - "remarks": "rule_set_182" + "remarks": "rule_set_183" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_sestatus_conf", - "remarks": "rule_set_183" + "remarks": "rule_set_184" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/sestatus.conf File", - "remarks": "rule_set_183" + "remarks": "rule_set_184" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_sestatus_conf", - "remarks": "rule_set_183" + "remarks": "rule_set_184" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/sestatus.conf File", - "remarks": "rule_set_183" + "remarks": "rule_set_184" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_sestatus_conf", - "remarks": "rule_set_184" + "remarks": "rule_set_185" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/sestatus.conf File", - "remarks": "rule_set_184" + "remarks": "rule_set_185" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_sestatus_conf", - "remarks": "rule_set_184" + "remarks": "rule_set_185" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/sestatus.conf File", - "remarks": "rule_set_184" + "remarks": "rule_set_185" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_etc_ipsecd", - "remarks": "rule_set_185" + "remarks": "rule_set_186" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/ipsec.d Directory", - "remarks": "rule_set_185" + "remarks": "rule_set_186" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_etc_ipsecd", - "remarks": "rule_set_185" + "remarks": "rule_set_186" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/ipsec.d Directory", - "remarks": "rule_set_185" + "remarks": "rule_set_186" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_ipsecd", - "remarks": "rule_set_186" + "remarks": "rule_set_187" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/ipsec.d Directory", - "remarks": "rule_set_186" + "remarks": "rule_set_187" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_ipsecd", - "remarks": "rule_set_186" + "remarks": "rule_set_187" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/ipsec.d Directory", - "remarks": "rule_set_186" + "remarks": "rule_set_187" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_ipsecd", - "remarks": "rule_set_187" + "remarks": "rule_set_188" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/ipsec.d Directory", - "remarks": "rule_set_187" + "remarks": "rule_set_188" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_ipsecd", - "remarks": "rule_set_187" + "remarks": "rule_set_188" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/ipsec.d Directory", - "remarks": "rule_set_187" + "remarks": "rule_set_188" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_ipsec_conf", - "remarks": "rule_set_188" + "remarks": "rule_set_189" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/ipsec.conf File", - "remarks": "rule_set_188" + "remarks": "rule_set_189" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_ipsec_conf", - "remarks": "rule_set_188" + "remarks": "rule_set_189" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/ipsec.conf File", - "remarks": "rule_set_188" + "remarks": "rule_set_189" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_ipsec_conf", - "remarks": "rule_set_189" + "remarks": "rule_set_190" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/ipsec.conf File", - "remarks": "rule_set_189" + "remarks": "rule_set_190" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_ipsec_conf", - "remarks": "rule_set_189" + "remarks": "rule_set_190" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/ipsec.conf File", - "remarks": "rule_set_189" + "remarks": "rule_set_190" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_ipsec_conf", - "remarks": "rule_set_190" + "remarks": "rule_set_191" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/ipsec.conf File", - "remarks": "rule_set_190" + "remarks": "rule_set_191" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_ipsec_conf", - "remarks": "rule_set_190" + "remarks": "rule_set_191" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/ipsec.conf File", - "remarks": "rule_set_190" + "remarks": "rule_set_191" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_ipsec_secrets", - "remarks": "rule_set_191" + "remarks": "rule_set_192" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/ipsec.secrets File", - "remarks": "rule_set_191" + "remarks": "rule_set_192" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_ipsec_secrets", - "remarks": "rule_set_191" + "remarks": "rule_set_192" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/ipsec.secrets File", - "remarks": "rule_set_191" + "remarks": "rule_set_192" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_ipsec_secrets", - "remarks": "rule_set_192" + "remarks": "rule_set_193" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/ipsec.secrets File", - "remarks": "rule_set_192" + "remarks": "rule_set_193" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_ipsec_secrets", - "remarks": "rule_set_192" + "remarks": "rule_set_193" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/ipsec.secrets File", - "remarks": "rule_set_192" + "remarks": "rule_set_193" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_ipsec_secrets", - "remarks": "rule_set_193" + "remarks": "rule_set_194" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/ipsec.secrets File", - "remarks": "rule_set_193" + "remarks": "rule_set_194" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_ipsec_secrets", - "remarks": "rule_set_193" + "remarks": "rule_set_194" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/ipsec.secrets File", - "remarks": "rule_set_193" + "remarks": "rule_set_194" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_etc_iptables", - "remarks": "rule_set_194" + "remarks": "rule_set_195" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/iptables Directory", - "remarks": "rule_set_194" + "remarks": "rule_set_195" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_etc_iptables", - "remarks": "rule_set_194" + "remarks": "rule_set_195" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/iptables Directory", - "remarks": "rule_set_194" + "remarks": "rule_set_195" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_iptables", - "remarks": "rule_set_195" + "remarks": "rule_set_196" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/iptables Directory", - "remarks": "rule_set_195" + "remarks": "rule_set_196" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_iptables", - "remarks": "rule_set_195" + "remarks": "rule_set_196" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/iptables Directory", - "remarks": "rule_set_195" + "remarks": "rule_set_196" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_iptables", - "remarks": "rule_set_196" + "remarks": "rule_set_197" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/iptables Directory", - "remarks": "rule_set_196" + "remarks": "rule_set_197" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_iptables", - "remarks": "rule_set_196" + "remarks": "rule_set_197" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/iptables Directory", - "remarks": "rule_set_196" + "remarks": "rule_set_197" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_etc_nftables", - "remarks": "rule_set_197" + "remarks": "rule_set_198" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/nftables Directory", - "remarks": "rule_set_197" + "remarks": "rule_set_198" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_etc_nftables", - "remarks": "rule_set_197" + "remarks": "rule_set_198" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/nftables Directory", - "remarks": "rule_set_197" + "remarks": "rule_set_198" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_nftables", - "remarks": "rule_set_198" + "remarks": "rule_set_199" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/nftables Directory", - "remarks": "rule_set_198" + "remarks": "rule_set_199" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_nftables", - "remarks": "rule_set_198" + "remarks": "rule_set_199" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/nftables Directory", - "remarks": "rule_set_198" + "remarks": "rule_set_199" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_nftables", - "remarks": "rule_set_199" + "remarks": "rule_set_200" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/nftables Directory", - "remarks": "rule_set_199" + "remarks": "rule_set_200" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_nftables", - "remarks": "rule_set_199" + "remarks": "rule_set_200" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/nftables Directory", - "remarks": "rule_set_199" + "remarks": "rule_set_200" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_etc_sysctld", - "remarks": "rule_set_200" + "remarks": "rule_set_201" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/sysctl.d Directory", - "remarks": "rule_set_200" + "remarks": "rule_set_201" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_etc_sysctld", - "remarks": "rule_set_200" + "remarks": "rule_set_201" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/sysctl.d Directory", - "remarks": "rule_set_200" + "remarks": "rule_set_201" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_sysctld", - "remarks": "rule_set_201" + "remarks": "rule_set_202" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/sysctl.d Directory", - "remarks": "rule_set_201" + "remarks": "rule_set_202" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_sysctld", - "remarks": "rule_set_201" + "remarks": "rule_set_202" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/sysctl.d Directory", - "remarks": "rule_set_201" + "remarks": "rule_set_202" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_sysctld", - "remarks": "rule_set_202" + "remarks": "rule_set_203" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/sysctl.d Directory", - "remarks": "rule_set_202" + "remarks": "rule_set_203" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_sysctld", - "remarks": "rule_set_202" + "remarks": "rule_set_203" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/sysctl.d Directory", - "remarks": "rule_set_202" + "remarks": "rule_set_203" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_sudoers", - "remarks": "rule_set_203" + "remarks": "rule_set_204" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/sudoers File", - "remarks": "rule_set_203" + "remarks": "rule_set_204" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_sudoers", - "remarks": "rule_set_203" + "remarks": "rule_set_204" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/sudoers File", - "remarks": "rule_set_203" + "remarks": "rule_set_204" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_sudoers", - "remarks": "rule_set_204" + "remarks": "rule_set_205" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/sudoers File", - "remarks": "rule_set_204" + "remarks": "rule_set_205" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_sudoers", - "remarks": "rule_set_204" + "remarks": "rule_set_205" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/sudoers File", - "remarks": "rule_set_204" + "remarks": "rule_set_205" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_sudoers", - "remarks": "rule_set_205" + "remarks": "rule_set_206" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/sudoers File", - "remarks": "rule_set_205" + "remarks": "rule_set_206" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_sudoers", - "remarks": "rule_set_205" + "remarks": "rule_set_206" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/sudoers File", - "remarks": "rule_set_205" + "remarks": "rule_set_206" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_etc_sudoersd", - "remarks": "rule_set_206" + "remarks": "rule_set_207" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/sudoers.d Directory", - "remarks": "rule_set_206" + "remarks": "rule_set_207" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_owner_etc_sudoersd", - "remarks": "rule_set_206" + "remarks": "rule_set_207" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/sudoers.d Directory", - "remarks": "rule_set_206" + "remarks": "rule_set_207" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_sudoersd", - "remarks": "rule_set_207" + "remarks": "rule_set_208" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/sudoers.d Directory", - "remarks": "rule_set_207" + "remarks": "rule_set_208" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_groupowner_etc_sudoersd", - "remarks": "rule_set_207" + "remarks": "rule_set_208" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/sudoers.d Directory", - "remarks": "rule_set_207" + "remarks": "rule_set_208" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_sudoersd", - "remarks": "rule_set_208" + "remarks": "rule_set_209" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/sudoers.d Directory", - "remarks": "rule_set_208" + "remarks": "rule_set_209" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_etc_sudoersd", - "remarks": "rule_set_208" + "remarks": "rule_set_209" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/sudoers.d Directory", - "remarks": "rule_set_208" + "remarks": "rule_set_209" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_crypttab", - "remarks": "rule_set_209" + "remarks": "rule_set_210" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/crypttab File", - "remarks": "rule_set_209" + "remarks": "rule_set_210" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_crypttab", - "remarks": "rule_set_209" + "remarks": "rule_set_210" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/crypttab File", - "remarks": "rule_set_209" + "remarks": "rule_set_210" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_crypttab", - "remarks": "rule_set_210" + "remarks": "rule_set_211" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/crypttab File", - "remarks": "rule_set_210" + "remarks": "rule_set_211" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_crypttab", - "remarks": "rule_set_210" + "remarks": "rule_set_211" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/crypttab File", - "remarks": "rule_set_210" + "remarks": "rule_set_211" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_crypttab", - "remarks": "rule_set_211" + "remarks": "rule_set_212" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/crypttab File", - "remarks": "rule_set_211" + "remarks": "rule_set_212" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_crypttab", - "remarks": "rule_set_211" + "remarks": "rule_set_212" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/crypttab File", - "remarks": "rule_set_211" + "remarks": "rule_set_212" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_chrony_keys", - "remarks": "rule_set_212" + "remarks": "rule_set_213" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/chrony.keys File", - "remarks": "rule_set_212" + "remarks": "rule_set_213" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_chrony_keys", - "remarks": "rule_set_212" + "remarks": "rule_set_213" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/chrony.keys File", - "remarks": "rule_set_212" + "remarks": "rule_set_213" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_chrony_keys", - "remarks": "rule_set_213" + "remarks": "rule_set_214" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/chrony.keys File", - "remarks": "rule_set_213" + "remarks": "rule_set_214" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_chrony_keys", - "remarks": "rule_set_213" + "remarks": "rule_set_214" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/chrony.keys File", - "remarks": "rule_set_213" + "remarks": "rule_set_214" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_chrony_keys", - "remarks": "rule_set_214" + "remarks": "rule_set_215" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/chrony.keys File", - "remarks": "rule_set_214" + "remarks": "rule_set_215" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_chrony_keys", - "remarks": "rule_set_214" + "remarks": "rule_set_215" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions On /etc/chrony.keys File", - "remarks": "rule_set_214" + "remarks": "rule_set_215" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "enable_pam_namespace", - "remarks": "rule_set_215" + "remarks": "rule_set_216" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Up a Private Namespace in PAM Configuration", - "remarks": "rule_set_215" + "remarks": "rule_set_216" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "enable_pam_namespace", - "remarks": "rule_set_215" + "remarks": "rule_set_216" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Up a Private Namespace in PAM Configuration", - "remarks": "rule_set_215" + "remarks": "rule_set_216" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_polyinstantiated_tmp", - "remarks": "rule_set_216" + "remarks": "rule_set_217" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Polyinstantiation of /tmp Directories", - "remarks": "rule_set_216" + "remarks": "rule_set_217" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_polyinstantiated_tmp", - "remarks": "rule_set_216" + "remarks": "rule_set_217" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Polyinstantiation of /tmp Directories", - "remarks": "rule_set_216" + "remarks": "rule_set_217" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_polyinstantiated_var_tmp", - "remarks": "rule_set_217" + "remarks": "rule_set_218" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Polyinstantiation of /var/tmp Directories", - "remarks": "rule_set_217" + "remarks": "rule_set_218" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_polyinstantiated_var_tmp", - "remarks": "rule_set_217" + "remarks": "rule_set_218" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Polyinstantiation of /var/tmp Directories", - "remarks": "rule_set_217" + "remarks": "rule_set_218" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sebool_polyinstantiation_enabled", - "remarks": "rule_set_218" + "remarks": "rule_set_219" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the polyinstantiation_enabled SELinux Boolean", - "remarks": "rule_set_218" + "remarks": "rule_set_219" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sebool_polyinstantiation_enabled", - "remarks": "rule_set_218" + "remarks": "rule_set_219" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the polyinstantiation_enabled SELinux Boolean", - "remarks": "rule_set_218" + "remarks": "rule_set_219" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_sssd_installed", - "remarks": "rule_set_219" + "remarks": "rule_set_220" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install the SSSD Package", - "remarks": "rule_set_219" + "remarks": "rule_set_220" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_sssd_installed", - "remarks": "rule_set_219" + "remarks": "rule_set_220" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install the SSSD Package", - "remarks": "rule_set_219" + "remarks": "rule_set_220" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_sssd_enabled", - "remarks": "rule_set_220" + "remarks": "rule_set_221" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable the SSSD Service", - "remarks": "rule_set_220" + "remarks": "rule_set_221" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_sssd_enabled", - "remarks": "rule_set_220" + "remarks": "rule_set_221" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable the SSSD Service", - "remarks": "rule_set_220" + "remarks": "rule_set_221" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "postfix_network_listening_disabled", - "remarks": "rule_set_221" + "remarks": "rule_set_222" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Postfix Network Listening", - "remarks": "rule_set_221" + "remarks": "rule_set_222" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "postfix_network_listening_disabled", - "remarks": "rule_set_221" + "remarks": "rule_set_222" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Postfix Network Listening", - "remarks": "rule_set_221" + "remarks": "rule_set_222" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "postfix_client_configure_mail_alias", - "remarks": "rule_set_222" + "remarks": "rule_set_223" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure System to Forward All Mail For The Root Account", - "remarks": "rule_set_222" + "remarks": "rule_set_223" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "postfix_client_configure_mail_alias", - "remarks": "rule_set_222" + "remarks": "rule_set_223" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure System to Forward All Mail For The Root Account", - "remarks": "rule_set_222" + "remarks": "rule_set_223" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_state", - "remarks": "rule_set_223" + "remarks": "rule_set_224" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SELinux State is Enforcing", - "remarks": "rule_set_223" + "remarks": "rule_set_224" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_state", - "remarks": "rule_set_223" + "remarks": "rule_set_224" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SELinux State is Enforcing", - "remarks": "rule_set_223" + "remarks": "rule_set_224" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_224" + "remarks": "rule_set_225" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_224" + "remarks": "rule_set_225" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_224" + "remarks": "rule_set_225" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_224" + "remarks": "rule_set_225" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_build_database", - "remarks": "rule_set_225" + "remarks": "rule_set_226" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Build and Test AIDE Database", - "remarks": "rule_set_225" + "remarks": "rule_set_226" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_build_database", - "remarks": "rule_set_225" + "remarks": "rule_set_226" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Build and Test AIDE Database", - "remarks": "rule_set_225" + "remarks": "rule_set_226" } ], "control-implementations": [ { - "uuid": "71472b61-03f3-4d46-89d1-788002d46a72", + "uuid": "0f7c69df-afb5-49b7-8362-ca656a972141", "source": "trestle://profiles/rhel10-anssi-intermediary/profile.json", "description": "Control implementation for anssi_bp28_intermediary", "props": [ @@ -11453,7 +11494,7 @@ ], "implemented-requirements": [ { - "uuid": "5dcd3bca-76de-411c-88e5-9ce2791d9b6c", + "uuid": "dd4cfb2c-c155-4669-8137-3cfd3666d8ea", "control-id": "r2", "description": "The description for control-id r2.", "props": [ @@ -11466,7 +11507,7 @@ ] }, { - "uuid": "4aaca4f7-0621-4f34-8559-5d361e4897a2", + "uuid": "cc737702-6ecc-4935-bcac-5dee36f82adc", "control-id": "r3", "description": "The description for control-id r3.", "props": [ @@ -11479,7 +11520,7 @@ ] }, { - "uuid": "77f82688-81ae-4b6a-81fe-ca7cd47abcde", + "uuid": "6c0d6d30-d5d1-4da6-bc0f-46978ce0c9bf", "control-id": "r5", "description": "No notes for control-id R5.", "props": [ @@ -11496,7 +11537,7 @@ ] }, { - "uuid": "ac193911-54fc-43e1-bd84-5080f748395d", + "uuid": "e81a4294-8e0c-4f2e-81c4-f2279a7b1ef2", "control-id": "r8", "description": "No notes for control-id R8.", "props": [ @@ -11568,7 +11609,7 @@ ] }, { - "uuid": "6faadf2e-5693-4bbf-990e-b3e7326b6353", + "uuid": "235f0d84-f166-4f78-b7dc-2d1fac9f280d", "control-id": "r9", "description": "No notes for control-id R9.", "props": [ @@ -11630,7 +11671,7 @@ ] }, { - "uuid": "d30820e6-27e4-4aa6-81a3-2635d63384af", + "uuid": "ec31f2e5-be50-4069-b66c-28dec0869258", "control-id": "r11", "description": "No notes for control-id R11.", "props": [ @@ -11647,7 +11688,7 @@ ] }, { - "uuid": "4027b378-4dd0-4321-a9d2-a119f35ba8cd", + "uuid": "e90f9cde-90be-4a3f-ad69-ded2200b3cf8", "control-id": "r12", "description": "No notes for control-id R12.", "props": [ @@ -11774,7 +11815,7 @@ ] }, { - "uuid": "014b5ece-9397-46be-90eb-a00fda1126e0", + "uuid": "9f570931-8801-4bc1-821f-ba905bd5cde6", "control-id": "r13", "description": "When IPv6 is not in use, disable it, otherwise secure the IPv6 stack. This control hardens the IPv6 stack, to disable it use the related rules instead.", "props": [ @@ -11866,7 +11907,7 @@ ] }, { - "uuid": "3dd024c1-eb8b-4e88-8d8f-4decc9b0d39e", + "uuid": "b4031863-18c0-4907-9f4c-3aeda8856edb", "control-id": "r14", "description": "The rule for the /proc file system is not implemented", "props": [ @@ -11903,7 +11944,7 @@ ] }, { - "uuid": "a02dee67-2b2c-44de-abea-ac5025f637bb", + "uuid": "892e452b-fef7-49e1-921c-4de9091c1283", "control-id": "r28", "description": "No notes for control-id R28.", "props": [ @@ -12035,7 +12076,7 @@ ] }, { - "uuid": "503342fa-a2f3-459b-ae15-b1b40ef0fe41", + "uuid": "568715da-c5eb-4a2b-832b-0180aa2ef53f", "control-id": "r32", "description": "ANSSI doesn't specify the length of the inactivity period, we are choosing 10 minutes as reasonable number.", "props": [ @@ -12057,7 +12098,7 @@ ] }, { - "uuid": "78311c1e-b2c3-4bf3-b93a-69a6ae221f9d", + "uuid": "095b7172-4b23-4055-8548-3fb2bbc5b592", "control-id": "r33", "description": "By disabling direct root logins proper accountability is ensured. Users will login first, then escalate to privileged (root) access. Change of privilege operations must be based on executables to monitor the activities performed (for example sudo). Nonetheless, the content automation cannot ensure that each administrator was given a nominative administration account separate from his normal user account.", "props": [ @@ -12099,7 +12140,7 @@ ] }, { - "uuid": "e477d5d2-b076-4c9a-943b-de5d1491f949", + "uuid": "fef509bd-5269-43d9-a0e1-fd5419c6e78c", "control-id": "r34", "description": "The description for control-id r34.", "props": [ @@ -12112,7 +12153,7 @@ ] }, { - "uuid": "1b889836-e5fe-4c36-b185-b160adf148b9", + "uuid": "0ff02868-ad16-484f-bb37-1a48b46a271c", "control-id": "r35", "description": "The description for control-id r35.", "props": [ @@ -12125,7 +12166,7 @@ ] }, { - "uuid": "5df9fc85-b12c-488c-8f7e-c6f687023f36", + "uuid": "39609f3a-be39-4d03-bcd1-039a9a04ece0", "control-id": "r39", "description": "No notes for control-id R39.", "props": [ @@ -12162,7 +12203,7 @@ ] }, { - "uuid": "463a636f-1eee-4039-8c64-deafe6be2797", + "uuid": "e50c6a90-e095-4b44-ba17-1281af4f7495", "control-id": "r40", "description": "No notes for control-id R40.", "props": [ @@ -12179,7 +12220,7 @@ ] }, { - "uuid": "3f9aec21-de6c-46c6-8a08-2ea4d02aa718", + "uuid": "2c26f986-e856-4688-b8a9-620f6afeccd7", "control-id": "r42", "description": "No notes for control-id R42.", "props": [ @@ -12196,7 +12237,7 @@ ] }, { - "uuid": "0f7a5e9a-39d0-42c6-93da-05add99aa36c", + "uuid": "c9b20644-fd63-4b37-ac06-82087446730c", "control-id": "r43", "description": "No notes for control-id R43.", "props": [ @@ -12213,7 +12254,7 @@ ] }, { - "uuid": "6f99bbc2-dd33-454b-a938-4718ab374905", + "uuid": "653a7ae2-58e9-4b12-bf54-8c6258144109", "control-id": "r44", "description": "The description for control-id r44.", "props": [ @@ -12226,7 +12267,7 @@ ] }, { - "uuid": "bf387782-1e8c-456c-83b8-e5fa786a0e95", + "uuid": "fe91bf43-c988-4072-87e8-c7115e36f27e", "control-id": "r50", "description": "No notes for control-id R50.", "props": [ @@ -12593,7 +12634,7 @@ ] }, { - "uuid": "28e1d85b-0e8c-4ed2-824c-9b119a92f555", + "uuid": "cacbeb41-e762-4094-86db-b286b87e1382", "control-id": "r52", "description": "The description for control-id r52.", "props": [ @@ -12606,7 +12647,7 @@ ] }, { - "uuid": "786c4fdd-99a6-4bb5-a64a-3a9522e4b885", + "uuid": "a099665a-968a-46c8-92fd-2d49fea0069e", "control-id": "r55", "description": "The approach of the selected rules is to use and configure pam_namespace module.", "props": [ @@ -12638,7 +12679,7 @@ ] }, { - "uuid": "a545b123-5ea0-44e9-a053-185a04f6ff1f", + "uuid": "809945f2-c816-4e85-bb25-d31b4cc03d2f", "control-id": "r63", "description": "The description for control-id r63.", "props": [ @@ -12651,7 +12692,7 @@ ] }, { - "uuid": "165e6cd5-01fb-45a4-ba6e-0de4a49cfb97", + "uuid": "bf0c9e0f-f4d7-4476-b403-7451f134550a", "control-id": "r67", "description": "In systems where remote authentication is handled through sssd service, PAM delegates\nrequests for remote authentication to sssd service through a local Unix socket. The sssd\nservice can use IPA, AD or LDAP as a remote database containing information required for authentication.\nIn case LDAP is configured manually, there are several configuration options which should be chedked.", "props": [ @@ -12673,7 +12714,7 @@ ] }, { - "uuid": "3b1b778b-d109-461c-866c-9095f45d72a5", + "uuid": "816e942a-efc0-42e9-86d6-1428dc09c307", "control-id": "r69", "description": "The description for control-id r69.", "props": [ @@ -12686,7 +12727,7 @@ ] }, { - "uuid": "151e1448-de4d-44ab-a16d-86a97471b241", + "uuid": "dee34f85-1c75-49e8-8d7f-fb7725b391a0", "control-id": "r70", "description": "The description for control-id r70.", "props": [ @@ -12699,7 +12740,7 @@ ] }, { - "uuid": "4a886369-ce70-47e1-abeb-f8c5c660e3ea", + "uuid": "5fe4f45d-e71b-4ba1-8935-32a26f5d310e", "control-id": "r74", "description": "No notes for control-id R74.", "props": [ @@ -12716,7 +12757,7 @@ ] }, { - "uuid": "91ad07b1-fa25-4378-8b2a-c76886b99cf5", + "uuid": "43de18c9-b3d5-4fef-aea6-29f20fa14cab", "control-id": "r75", "description": "Only the alias for root user is covered by the rule. The other services cannot be reliably covered, as there is no simple way of determining what is a service account.", "props": [ @@ -12733,7 +12774,7 @@ ] }, { - "uuid": "003f4ae3-634d-4791-a102-d70c15c4858c", + "uuid": "354e1fd9-9fb9-41f7-8f22-5b450fee16b5", "control-id": "r79", "description": "SELinux can provide confinement and monitoring of services, and AIDE provides basic integrity checking. System logs are configured as part of R43. Hardening of particular services should be done on a case by case basis and is not automated by this content.", "props": [ @@ -12760,7 +12801,7 @@ ] }, { - "uuid": "60d8d31d-4782-42e4-9994-bf34d2045e0d", + "uuid": "2b6d9a58-0934-40fa-9203-b436afcbd223", "control-id": "r30", "description": "The description for control-id r30.", "props": [ @@ -12773,7 +12814,7 @@ ] }, { - "uuid": "6376d019-10dd-4a4e-885b-f6c563b44fe4", + "uuid": "59cea12e-9b6a-4985-a8fc-0f934a860035", "control-id": "r31", "description": "The rules selected below establish a general password strength baseline of 100 bits, based on the recommendations of the technical note \"Recommandations relatives à l'authentification multifacteur et aux mots de passe\" (https://cyber.gouv.fr/publications/recommandations-relatives-lauthentification-multifacteur-et-aux-mots-de-passe)\nThe baseline should be reviewed and tailored to the system's use case and needs.", "props": [ @@ -12845,7 +12886,7 @@ ] }, { - "uuid": "495aeb8c-10ac-49ab-b886-e2f26a48394c", + "uuid": "a6d994f2-30ef-46b1-936a-8d4530a29f8a", "control-id": "r53", "description": "No notes for control-id R53.", "props": [ @@ -12867,7 +12908,7 @@ ] }, { - "uuid": "1ce48b4f-8c15-4504-b67a-6671146a170b", + "uuid": "8d33bc57-48dd-4a35-a1b5-688a591a6c15", "control-id": "r54", "description": "No notes for control-id R54.", "props": [ @@ -12894,7 +12935,7 @@ ] }, { - "uuid": "1411755a-f69d-4338-88c9-a9a7a648eea4", + "uuid": "5ec7ab04-9f40-4e34-a795-0cda7422b057", "control-id": "r56", "description": "Only programs specifically designed to be used with setuid or setgid bits can have these privilege bits set. This requirement considers apropriate for setuid and setgid bits the binaries that are installed from recognized and authorized repositories (covered in R15). The remediation resets the sticky bit to intended value by vendor/developer, any finding after remediation should be reviewed.", "props": [ @@ -12916,7 +12957,7 @@ ] }, { - "uuid": "1faa444f-710d-48cc-b78d-e78e08842ac7", + "uuid": "9da52488-2f0d-4e3e-a089-12aa5b37e8b4", "control-id": "r58", "description": "The description for control-id r58.", "props": [ @@ -12929,7 +12970,7 @@ ] }, { - "uuid": "3597213b-3283-4e0a-b38a-090032f9e286", + "uuid": "e4e943be-ef11-4154-9345-d845f3ccf4d8", "control-id": "r59", "description": "It is not trivial to distinguish an official repository from an unofficial one. We cannot draw conclusions from the repo name or URL of the repo (as they can be arbitrary or behind a proxy). One approach to check the origin of installed packages is to check the signature of the packages. If the public key of a repository is not installed, the repo is not trusted.", "props": [ @@ -12957,11 +12998,16 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_redhat_gpgkey_installed" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "package_sequoia-sq_installed" } ] }, { - "uuid": "d47a102c-899e-4681-8016-44d1986d0a23", + "uuid": "8c4b52cf-bf74-47c3-bfdb-9f20cd15bce9", "control-id": "r61", "description": "Check the vendor CVE feed and configure automatic install of security related updates.", "props": [ @@ -12993,7 +13039,7 @@ ] }, { - "uuid": "34279f7a-1958-4511-8d87-1ace11c9ba46", + "uuid": "69668644-21da-43d6-9cba-1edf5f4af503", "control-id": "r62", "description": "The description for control-id r62.", "props": [ @@ -13031,7 +13077,7 @@ ] }, { - "uuid": "be1c4dce-14ef-46ab-8357-3d7d3b4aec47", + "uuid": "d9cffaba-33bf-4c2a-8fa4-6aed55808836", "control-id": "r68", "description": "The selection of rules doesn't cover the use of hardware devices to protect the passwords.", "props": [ @@ -13068,7 +13114,7 @@ ] }, { - "uuid": "35d60d50-eacc-4b99-b665-0fc5a5411972", + "uuid": "7419c5df-9a03-4f35-a8c7-293d8a8f25c1", "control-id": "r80", "description": "The description for control-id r80.", "props": [ diff --git a/component-definitions/rhel10/rhel10-anssi-minimal/component-definition.json b/component-definitions/rhel10/rhel10-anssi-minimal/component-definition.json index cd9b71ea..fc6c9fe9 100644 --- a/component-definitions/rhel10/rhel10-anssi-minimal/component-definition.json +++ b/component-definitions/rhel10/rhel10-anssi-minimal/component-definition.json @@ -3,8 +3,8 @@ "uuid": "186b75e3-6306-4419-b0a0-4f92c86067ab", "metadata": { "title": "Component definition for rhel10", - "last-modified": "2025-12-11T18:23:51.407319+00:00", - "version": "1.3", + "last-modified": "2025-12-17T11:11:28.722800+00:00", + "version": "1.4", "oscal-version": "1.1.3" }, "components": [ @@ -167,7 +167,7 @@ { "name": "Parameter_Value_Alternatives_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_00" }, { @@ -185,7 +185,7 @@ { "name": "Parameter_Value_Alternatives_8", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_00" }, { @@ -617,163 +617,175 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_dnf-automatic_installed", + "value": "package_sequoia-sq_installed", "remarks": "rule_set_23" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install dnf-automatic Package", + "value": "Install sequoia-sq Package", "remarks": "rule_set_23" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "timer_dnf-automatic_enabled", + "value": "package_dnf-automatic_installed", "remarks": "rule_set_24" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable dnf-automatic Timer", + "value": "Install dnf-automatic Package", "remarks": "rule_set_24" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dnf-automatic_apply_updates", + "value": "timer_dnf-automatic_enabled", "remarks": "rule_set_25" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure dnf-automatic to Install Available Updates Automatically", + "value": "Enable dnf-automatic Timer", "remarks": "rule_set_25" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dnf-automatic_security_updates_only", + "value": "dnf-automatic_apply_updates", "remarks": "rule_set_26" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure dnf-automatic to Install Only Security Updates", + "value": "Configure dnf-automatic to Install Available Updates Automatically", "remarks": "rule_set_26" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_kea_removed", + "value": "dnf-automatic_security_updates_only", "remarks": "rule_set_27" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall kea Package", + "value": "Configure dnf-automatic to Install Only Security Updates", "remarks": "rule_set_27" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet_removed", + "value": "package_kea_removed", "remarks": "rule_set_28" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove telnet Clients", + "value": "Uninstall kea Package", "remarks": "rule_set_28" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet-server_removed", + "value": "package_telnet_removed", "remarks": "rule_set_29" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall telnet-server Package", + "value": "Remove telnet Clients", "remarks": "rule_set_29" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_tftp_removed", + "value": "package_telnet-server_removed", "remarks": "rule_set_30" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove tftp Daemon", + "value": "Uninstall telnet-server Package", "remarks": "rule_set_30" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_tftp-server_removed", + "value": "package_tftp_removed", "remarks": "rule_set_31" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall tftp-server Package", + "value": "Remove tftp Daemon", "remarks": "rule_set_31" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_systemauth", + "value": "package_tftp-server_removed", "remarks": "rule_set_32" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set PAM Password Hashing Algorithm - system-auth", + "value": "Uninstall tftp-server Package", "remarks": "rule_set_32" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_unix_rounds_system_auth", + "value": "set_password_hashing_algorithm_systemauth", "remarks": "rule_set_33" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set number of Password Hashing Rounds - system-auth", + "value": "Set PAM Password Hashing Algorithm - system-auth", "remarks": "rule_set_33" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_unix_rounds_password_auth", + "value": "accounts_password_pam_unix_rounds_system_auth", "remarks": "rule_set_34" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set number of Password Hashing Rounds - password-auth", + "value": "Set number of Password Hashing Rounds - system-auth", "remarks": "rule_set_34" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_minclass", + "value": "accounts_password_pam_unix_rounds_password_auth", "remarks": "rule_set_35" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", + "value": "Set number of Password Hashing Rounds - password-auth", "remarks": "rule_set_35" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "accounts_password_pam_minclass", + "remarks": "rule_set_36" + }, + { + "name": "Rule_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", + "remarks": "rule_set_36" } ], "control-implementations": [ { - "uuid": "7ba97df9-886a-457a-8370-5491b0e109a6", + "uuid": "e6ac02d1-c84b-461d-bd53-cdc625801653", "source": "trestle://profiles/rhel10-anssi-minimal/profile.json", "description": "Control implementation for anssi_bp28_minimal", "props": [ @@ -895,7 +907,7 @@ ], "implemented-requirements": [ { - "uuid": "c83bac61-f9a7-485d-91d8-6c27a1175eae", + "uuid": "f6e7977d-2540-4abf-8ab7-6fe337a35130", "control-id": "r30", "description": "The description for control-id r30.", "props": [ @@ -908,7 +920,7 @@ ] }, { - "uuid": "b2820e09-a043-4d94-a4bf-be286c322176", + "uuid": "9de0f6a6-345c-4f03-a835-29ab3b60ceab", "control-id": "r31", "description": "The rules selected below establish a general password strength baseline of 100 bits, based on the recommendations of the technical note \"Recommandations relatives à l'authentification multifacteur et aux mots de passe\" (https://cyber.gouv.fr/publications/recommandations-relatives-lauthentification-multifacteur-et-aux-mots-de-passe)\nThe baseline should be reviewed and tailored to the system's use case and needs.", "props": [ @@ -980,7 +992,7 @@ ] }, { - "uuid": "e0a62f17-4a01-442f-bb31-60abddfab4a9", + "uuid": "571400bf-0af9-4fb9-ad2c-c044ebd1f5dc", "control-id": "r53", "description": "No notes for control-id R53.", "props": [ @@ -1002,7 +1014,7 @@ ] }, { - "uuid": "289341aa-ddc6-4054-b3ff-14c7939b6698", + "uuid": "b8173954-5414-45ac-b7a9-d07179bed1d0", "control-id": "r54", "description": "No notes for control-id R54.", "props": [ @@ -1029,7 +1041,7 @@ ] }, { - "uuid": "9b4bcb8b-07bb-402d-9fbb-ab6fbfe48765", + "uuid": "389b0ef4-6750-4414-ac03-3c78ad5088f5", "control-id": "r56", "description": "Only programs specifically designed to be used with setuid or setgid bits can have these privilege bits set. This requirement considers apropriate for setuid and setgid bits the binaries that are installed from recognized and authorized repositories (covered in R15). The remediation resets the sticky bit to intended value by vendor/developer, any finding after remediation should be reviewed.", "props": [ @@ -1051,7 +1063,7 @@ ] }, { - "uuid": "3232cafc-16f0-471b-bf55-98fd2a147e86", + "uuid": "feb9cdb0-3759-4ff5-9834-e7dc2300055a", "control-id": "r58", "description": "The description for control-id r58.", "props": [ @@ -1064,7 +1076,7 @@ ] }, { - "uuid": "3eb30ab8-c619-47f7-a56a-18ea15e7795c", + "uuid": "fbdecb8b-c291-4324-abdf-5e8cee2a98db", "control-id": "r59", "description": "It is not trivial to distinguish an official repository from an unofficial one. We cannot draw conclusions from the repo name or URL of the repo (as they can be arbitrary or behind a proxy). One approach to check the origin of installed packages is to check the signature of the packages. If the public key of a repository is not installed, the repo is not trusted.", "props": [ @@ -1092,11 +1104,16 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_redhat_gpgkey_installed" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "package_sequoia-sq_installed" } ] }, { - "uuid": "b7c397e2-d614-4f49-9eb2-7fe605fa8694", + "uuid": "50f5d604-cef0-4ea7-8a90-0caa322a5428", "control-id": "r61", "description": "Check the vendor CVE feed and configure automatic install of security related updates.", "props": [ @@ -1128,7 +1145,7 @@ ] }, { - "uuid": "e040b154-fd70-46e8-86ef-0adc7f12f6f0", + "uuid": "862b3bb3-3997-4670-bd0a-803766058af5", "control-id": "r62", "description": "The description for control-id r62.", "props": [ @@ -1166,7 +1183,7 @@ ] }, { - "uuid": "fb5d45e1-414c-44b0-8884-9206c9a78bd0", + "uuid": "8e84cdef-d50a-498f-9aa8-7909d325d05c", "control-id": "r68", "description": "The selection of rules doesn't cover the use of hardware devices to protect the passwords.", "props": [ @@ -1203,7 +1220,7 @@ ] }, { - "uuid": "7b9735bf-30d5-4ee0-a091-c92eb28f7a6e", + "uuid": "b8449ee9-a54d-4d87-8734-304fdb38b869", "control-id": "r80", "description": "The description for control-id r80.", "props": [ @@ -1390,7 +1407,7 @@ { "name": "Parameter_Value_Alternatives_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_00" }, { @@ -1408,7 +1425,7 @@ { "name": "Parameter_Value_Alternatives_8", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_00" }, { @@ -2104,319 +2121,343 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_dnf-automatic_installed", + "value": "package_sequoia-sq_installed", "remarks": "rule_set_23" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install dnf-automatic Package", + "value": "Install sequoia-sq Package", "remarks": "rule_set_23" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_dnf-automatic_installed", + "value": "package_sequoia-sq_installed", "remarks": "rule_set_23" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install dnf-automatic Package", + "value": "Install sequoia-sq Package", "remarks": "rule_set_23" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "timer_dnf-automatic_enabled", + "value": "package_dnf-automatic_installed", "remarks": "rule_set_24" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable dnf-automatic Timer", + "value": "Install dnf-automatic Package", "remarks": "rule_set_24" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "timer_dnf-automatic_enabled", + "value": "package_dnf-automatic_installed", "remarks": "rule_set_24" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable dnf-automatic Timer", + "value": "Install dnf-automatic Package", "remarks": "rule_set_24" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dnf-automatic_apply_updates", + "value": "timer_dnf-automatic_enabled", "remarks": "rule_set_25" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure dnf-automatic to Install Available Updates Automatically", + "value": "Enable dnf-automatic Timer", "remarks": "rule_set_25" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dnf-automatic_apply_updates", + "value": "timer_dnf-automatic_enabled", "remarks": "rule_set_25" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure dnf-automatic to Install Available Updates Automatically", + "value": "Enable dnf-automatic Timer", "remarks": "rule_set_25" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dnf-automatic_security_updates_only", + "value": "dnf-automatic_apply_updates", "remarks": "rule_set_26" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure dnf-automatic to Install Only Security Updates", + "value": "Configure dnf-automatic to Install Available Updates Automatically", "remarks": "rule_set_26" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dnf-automatic_security_updates_only", + "value": "dnf-automatic_apply_updates", "remarks": "rule_set_26" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure dnf-automatic to Install Only Security Updates", + "value": "Configure dnf-automatic to Install Available Updates Automatically", "remarks": "rule_set_26" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_kea_removed", + "value": "dnf-automatic_security_updates_only", "remarks": "rule_set_27" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall kea Package", + "value": "Configure dnf-automatic to Install Only Security Updates", "remarks": "rule_set_27" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_kea_removed", + "value": "dnf-automatic_security_updates_only", "remarks": "rule_set_27" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall kea Package", + "value": "Configure dnf-automatic to Install Only Security Updates", "remarks": "rule_set_27" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet_removed", + "value": "package_kea_removed", "remarks": "rule_set_28" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove telnet Clients", + "value": "Uninstall kea Package", "remarks": "rule_set_28" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet_removed", + "value": "package_kea_removed", "remarks": "rule_set_28" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove telnet Clients", + "value": "Uninstall kea Package", "remarks": "rule_set_28" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet-server_removed", + "value": "package_telnet_removed", "remarks": "rule_set_29" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall telnet-server Package", + "value": "Remove telnet Clients", "remarks": "rule_set_29" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_telnet-server_removed", + "value": "package_telnet_removed", "remarks": "rule_set_29" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall telnet-server Package", + "value": "Remove telnet Clients", "remarks": "rule_set_29" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_tftp_removed", + "value": "package_telnet-server_removed", "remarks": "rule_set_30" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove tftp Daemon", + "value": "Uninstall telnet-server Package", "remarks": "rule_set_30" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_tftp_removed", + "value": "package_telnet-server_removed", "remarks": "rule_set_30" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Remove tftp Daemon", + "value": "Uninstall telnet-server Package", "remarks": "rule_set_30" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_tftp-server_removed", + "value": "package_tftp_removed", "remarks": "rule_set_31" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall tftp-server Package", + "value": "Remove tftp Daemon", "remarks": "rule_set_31" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_tftp-server_removed", + "value": "package_tftp_removed", "remarks": "rule_set_31" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Uninstall tftp-server Package", + "value": "Remove tftp Daemon", "remarks": "rule_set_31" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_systemauth", + "value": "package_tftp-server_removed", "remarks": "rule_set_32" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set PAM Password Hashing Algorithm - system-auth", + "value": "Uninstall tftp-server Package", "remarks": "rule_set_32" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_systemauth", + "value": "package_tftp-server_removed", "remarks": "rule_set_32" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set PAM Password Hashing Algorithm - system-auth", + "value": "Uninstall tftp-server Package", "remarks": "rule_set_32" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_unix_rounds_system_auth", + "value": "set_password_hashing_algorithm_systemauth", "remarks": "rule_set_33" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set number of Password Hashing Rounds - system-auth", + "value": "Set PAM Password Hashing Algorithm - system-auth", "remarks": "rule_set_33" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_unix_rounds_system_auth", + "value": "set_password_hashing_algorithm_systemauth", "remarks": "rule_set_33" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set number of Password Hashing Rounds - system-auth", + "value": "Set PAM Password Hashing Algorithm - system-auth", "remarks": "rule_set_33" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_unix_rounds_password_auth", + "value": "accounts_password_pam_unix_rounds_system_auth", "remarks": "rule_set_34" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set number of Password Hashing Rounds - password-auth", + "value": "Set number of Password Hashing Rounds - system-auth", "remarks": "rule_set_34" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_unix_rounds_password_auth", + "value": "accounts_password_pam_unix_rounds_system_auth", "remarks": "rule_set_34" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set number of Password Hashing Rounds - password-auth", + "value": "Set number of Password Hashing Rounds - system-auth", "remarks": "rule_set_34" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_minclass", + "value": "accounts_password_pam_unix_rounds_password_auth", "remarks": "rule_set_35" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", + "value": "Set number of Password Hashing Rounds - password-auth", "remarks": "rule_set_35" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_minclass", + "value": "accounts_password_pam_unix_rounds_password_auth", "remarks": "rule_set_35" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", + "value": "Set number of Password Hashing Rounds - password-auth", "remarks": "rule_set_35" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "accounts_password_pam_minclass", + "remarks": "rule_set_36" + }, + { + "name": "Rule_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", + "remarks": "rule_set_36" + }, + { + "name": "Check_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "accounts_password_pam_minclass", + "remarks": "rule_set_36" + }, + { + "name": "Check_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", + "remarks": "rule_set_36" } ], "control-implementations": [ { - "uuid": "7b631344-cc71-452e-823b-29671a9eb6c0", + "uuid": "984de1f2-43d0-4459-ac94-bc5d37335840", "source": "trestle://profiles/rhel10-anssi-minimal/profile.json", "description": "Control implementation for anssi_bp28_minimal", "props": [ @@ -2538,7 +2579,7 @@ ], "implemented-requirements": [ { - "uuid": "ae60edf9-1062-4151-9e02-0fee9d46a9ad", + "uuid": "d3f89f3d-a345-4029-8d5b-da90c1a5e636", "control-id": "r30", "description": "The description for control-id r30.", "props": [ @@ -2551,7 +2592,7 @@ ] }, { - "uuid": "f1efb6a9-201a-437e-9218-fd9ac006a420", + "uuid": "a2461ebf-778d-4d6a-8d5e-bda2d9f0ce35", "control-id": "r31", "description": "The rules selected below establish a general password strength baseline of 100 bits, based on the recommendations of the technical note \"Recommandations relatives à l'authentification multifacteur et aux mots de passe\" (https://cyber.gouv.fr/publications/recommandations-relatives-lauthentification-multifacteur-et-aux-mots-de-passe)\nThe baseline should be reviewed and tailored to the system's use case and needs.", "props": [ @@ -2623,7 +2664,7 @@ ] }, { - "uuid": "a9566e67-250b-4afa-bc2f-992fd87f9913", + "uuid": "70e1da0f-50ba-4bff-96d0-c6233cb7168b", "control-id": "r53", "description": "No notes for control-id R53.", "props": [ @@ -2645,7 +2686,7 @@ ] }, { - "uuid": "122ff14d-18b8-4f8e-bbfc-cbc7c1c558f8", + "uuid": "4376c0a6-8208-42a2-b2cc-a596e8ed76e4", "control-id": "r54", "description": "No notes for control-id R54.", "props": [ @@ -2672,7 +2713,7 @@ ] }, { - "uuid": "9944b122-7586-4114-b42d-47b79f4b85ff", + "uuid": "5cf9872d-ee5e-473b-9513-0a843e3741a0", "control-id": "r56", "description": "Only programs specifically designed to be used with setuid or setgid bits can have these privilege bits set. This requirement considers apropriate for setuid and setgid bits the binaries that are installed from recognized and authorized repositories (covered in R15). The remediation resets the sticky bit to intended value by vendor/developer, any finding after remediation should be reviewed.", "props": [ @@ -2694,7 +2735,7 @@ ] }, { - "uuid": "4df4a871-87ca-4011-a488-68e2a5decfed", + "uuid": "ef59234a-cb8b-4941-947a-f02c6d98caeb", "control-id": "r58", "description": "The description for control-id r58.", "props": [ @@ -2707,7 +2748,7 @@ ] }, { - "uuid": "d5283c61-e3c8-4f0c-b49f-390f13ee2772", + "uuid": "126bb35b-d6de-4d46-a5a2-173f881b3eff", "control-id": "r59", "description": "It is not trivial to distinguish an official repository from an unofficial one. We cannot draw conclusions from the repo name or URL of the repo (as they can be arbitrary or behind a proxy). One approach to check the origin of installed packages is to check the signature of the packages. If the public key of a repository is not installed, the repo is not trusted.", "props": [ @@ -2735,11 +2776,16 @@ "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_redhat_gpgkey_installed" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "package_sequoia-sq_installed" } ] }, { - "uuid": "fc381c74-856f-4aaf-9d8b-600b1c512abd", + "uuid": "d510de38-ea5f-4380-8c5b-ce742012f7d0", "control-id": "r61", "description": "Check the vendor CVE feed and configure automatic install of security related updates.", "props": [ @@ -2771,7 +2817,7 @@ ] }, { - "uuid": "0bd39e52-e136-4e30-88ae-7ecb7adb886e", + "uuid": "8faab673-80b2-46f2-a7fa-5c6ca11e44dd", "control-id": "r62", "description": "The description for control-id r62.", "props": [ @@ -2809,7 +2855,7 @@ ] }, { - "uuid": "c3b130d8-87e4-4488-b167-1c9d123e2b2d", + "uuid": "fc862e07-1110-4d30-ab92-9cce40ed4f7c", "control-id": "r68", "description": "The selection of rules doesn't cover the use of hardware devices to protect the passwords.", "props": [ @@ -2846,7 +2892,7 @@ ] }, { - "uuid": "d58265bb-1e9d-44a6-9789-2ba926295907", + "uuid": "44a24792-aeb6-4a85-b889-36646c02c4b9", "control-id": "r80", "description": "The description for control-id r80.", "props": [ diff --git a/component-definitions/rhel10/rhel10-cis_rhel10-l1_server/component-definition.json b/component-definitions/rhel10/rhel10-cis_rhel10-l1_server/component-definition.json index fa6d835b..b505c754 100644 --- a/component-definitions/rhel10/rhel10-cis_rhel10-l1_server/component-definition.json +++ b/component-definitions/rhel10/rhel10-cis_rhel10-l1_server/component-definition.json @@ -3,8 +3,8 @@ "uuid": "c4be1cdf-5566-4add-81ec-694b72fc0910", "metadata": { "title": "Component definition for rhel10", - "last-modified": "2025-12-17T09:48:57.052147+00:00", - "version": "3.5", + "last-modified": "2025-12-17T10:47:04.607240+00:00", + "version": "3.6", "oscal-version": "1.1.3" }, "components": [ @@ -725,7 +725,7 @@ { "name": "Parameter_Value_Alternatives_38", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -743,7 +743,7 @@ { "name": "Parameter_Value_Alternatives_39", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -3851,1075 +3851,1063 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_libuserconf", + "value": "set_password_hashing_algorithm_logindefs", "remarks": "rule_set_234" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Hashing Algorithm in /etc/libuser.conf", + "value": "Set Password Hashing Algorithm in /etc/login.defs", "remarks": "rule_set_234" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_logindefs", + "value": "account_disable_post_pw_expiration", "remarks": "rule_set_235" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Hashing Algorithm in /etc/login.defs", + "value": "Set Account Expiration Following Inactivity", "remarks": "rule_set_235" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "account_disable_post_pw_expiration", + "value": "accounts_set_post_pw_existing", "remarks": "rule_set_236" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Account Expiration Following Inactivity", + "value": "Set existing passwords a period of inactivity before they been locked", "remarks": "rule_set_236" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_set_post_pw_existing", + "value": "accounts_password_last_change_is_in_past", "remarks": "rule_set_237" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set existing passwords a period of inactivity before they been locked", + "value": "Ensure all users last password change date is in the past", "remarks": "rule_set_237" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_last_change_is_in_past", + "value": "accounts_no_uid_except_zero", "remarks": "rule_set_238" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure all users last password change date is in the past", + "value": "Verify Only Root Has UID 0", "remarks": "rule_set_238" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_no_uid_except_zero", + "value": "accounts_root_gid_zero", "remarks": "rule_set_239" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Only Root Has UID 0", + "value": "Verify Root Has A Primary GID 0", "remarks": "rule_set_239" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_root_gid_zero", + "value": "groups_no_zero_gid_except_root", "remarks": "rule_set_240" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Root Has A Primary GID 0", + "value": "Verify Only Group Root Has GID 0", "remarks": "rule_set_240" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "groups_no_zero_gid_except_root", + "value": "ensure_root_password_configured", "remarks": "rule_set_241" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Only Group Root Has GID 0", + "value": "Ensure Authentication Required for Single User Mode", "remarks": "rule_set_241" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_root_password_configured", + "value": "accounts_root_path_dirs_no_write", "remarks": "rule_set_242" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Authentication Required for Single User Mode", + "value": "Ensure that Root's Path Does Not Include World or Group-Writable Directories", "remarks": "rule_set_242" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_root_path_dirs_no_write", + "value": "root_path_no_dot", "remarks": "rule_set_243" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that Root's Path Does Not Include World or Group-Writable Directories", + "value": "Ensure that Root's Path Does Not Include Relative Paths or Null Directories", "remarks": "rule_set_243" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "root_path_no_dot", + "value": "accounts_umask_root", "remarks": "rule_set_244" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that Root's Path Does Not Include Relative Paths or Null Directories", + "value": "Ensure the Root Bash Umask is Set Correctly", "remarks": "rule_set_244" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_root", + "value": "no_password_auth_for_systemaccounts", "remarks": "rule_set_245" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Root Bash Umask is Set Correctly", + "value": "Ensure that System Accounts Are Locked", "remarks": "rule_set_245" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_password_auth_for_systemaccounts", + "value": "no_shelllogin_for_systemaccounts", "remarks": "rule_set_246" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that System Accounts Are Locked", + "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", "remarks": "rule_set_246" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_shelllogin_for_systemaccounts", + "value": "no_invalid_shell_accounts_unlocked", "remarks": "rule_set_247" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", + "value": "Verify Non-Interactive Accounts Are Locked", "remarks": "rule_set_247" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_invalid_shell_accounts_unlocked", + "value": "accounts_tmout", "remarks": "rule_set_248" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Non-Interactive Accounts Are Locked", + "value": "Set Interactive Session Timeout", "remarks": "rule_set_248" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_tmout", + "value": "accounts_umask_etc_bashrc", "remarks": "rule_set_249" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Interactive Session Timeout", + "value": "Ensure the Default Bash Umask is Set Correctly", "remarks": "rule_set_249" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_bashrc", + "value": "accounts_umask_etc_login_defs", "remarks": "rule_set_250" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Bash Umask is Set Correctly", + "value": "Ensure the Default Umask is Set Correctly in login.defs", "remarks": "rule_set_250" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_login_defs", + "value": "accounts_umask_etc_profile", "remarks": "rule_set_251" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Umask is Set Correctly in login.defs", + "value": "Ensure the Default Umask is Set Correctly in /etc/profile", "remarks": "rule_set_251" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_profile", + "value": "package_aide_installed", "remarks": "rule_set_252" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Umask is Set Correctly in /etc/profile", + "value": "Install AIDE", "remarks": "rule_set_252" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_aide_installed", + "value": "aide_build_database", "remarks": "rule_set_253" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install AIDE", + "value": "Build and Test AIDE Database", "remarks": "rule_set_253" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_build_database", + "value": "aide_periodic_cron_checking", "remarks": "rule_set_254" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Build and Test AIDE Database", + "value": "Configure Periodic Execution of AIDE", "remarks": "rule_set_254" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_periodic_cron_checking", + "value": "aide_check_audit_tools", "remarks": "rule_set_255" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Periodic Execution of AIDE", + "value": "Configure AIDE to Verify the Audit Tools", "remarks": "rule_set_255" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_check_audit_tools", + "value": "service_systemd-journald_enabled", "remarks": "rule_set_256" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure AIDE to Verify the Audit Tools", + "value": "Enable systemd-journald Service", "remarks": "rule_set_256" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_systemd-journald_enabled", + "value": "ensure_journald_and_rsyslog_not_active_together", "remarks": "rule_set_257" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable systemd-journald Service", + "value": "Ensure journald and rsyslog Are Not Active Together", "remarks": "rule_set_257" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_journald_and_rsyslog_not_active_together", + "value": "package_systemd-journal-remote_installed", "remarks": "rule_set_258" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald and rsyslog Are Not Active Together", + "value": "Install systemd-journal-remote Package", "remarks": "rule_set_258" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_systemd-journal-remote_installed", + "value": "service_systemd-journal-upload_enabled", "remarks": "rule_set_259" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install systemd-journal-remote Package", + "value": "Enable systemd-journal-upload Service", "remarks": "rule_set_259" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_systemd-journal-upload_enabled", + "value": "socket_systemd-journal-remote_disabled", "remarks": "rule_set_260" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable systemd-journal-upload Service", + "value": "Disable systemd-journal-remote Socket", "remarks": "rule_set_260" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "socket_systemd-journal-remote_disabled", + "value": "journald_disable_forward_to_syslog", "remarks": "rule_set_261" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable systemd-journal-remote Socket", + "value": "Ensure journald ForwardToSyslog is disabled", "remarks": "rule_set_261" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_disable_forward_to_syslog", + "value": "journald_compress", "remarks": "rule_set_262" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald ForwardToSyslog is disabled", + "value": "Ensure journald is configured to compress large log files", "remarks": "rule_set_262" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_compress", + "value": "journald_storage", "remarks": "rule_set_263" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald is configured to compress large log files", + "value": "Ensure journald is configured to write log files to persistent disk", "remarks": "rule_set_263" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_storage", + "value": "rsyslog_files_groupownership", "remarks": "rule_set_264" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald is configured to write log files to persistent disk", + "value": "Ensure Log Files Are Owned By Appropriate Group", "remarks": "rule_set_264" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_groupownership", + "value": "rsyslog_files_ownership", "remarks": "rule_set_265" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Log Files Are Owned By Appropriate Group", + "value": "Ensure Log Files Are Owned By Appropriate User", "remarks": "rule_set_265" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_ownership", + "value": "rsyslog_files_permissions", "remarks": "rule_set_266" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Log Files Are Owned By Appropriate User", + "value": "Ensure System Log Files Have Correct Permissions", "remarks": "rule_set_266" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_permissions", + "value": "file_groupowner_etc_passwd", "remarks": "rule_set_267" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure System Log Files Have Correct Permissions", + "value": "Verify Group Who Owns passwd File", "remarks": "rule_set_267" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_passwd", + "value": "file_owner_etc_passwd", "remarks": "rule_set_268" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns passwd File", + "value": "Verify User Who Owns passwd File", "remarks": "rule_set_268" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_passwd", + "value": "file_permissions_etc_passwd", "remarks": "rule_set_269" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns passwd File", + "value": "Verify Permissions on passwd File", "remarks": "rule_set_269" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_passwd", + "value": "file_groupowner_backup_etc_passwd", "remarks": "rule_set_270" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on passwd File", + "value": "Verify Group Who Owns Backup passwd File", "remarks": "rule_set_270" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_passwd", + "value": "file_owner_backup_etc_passwd", "remarks": "rule_set_271" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup passwd File", + "value": "Verify User Who Owns Backup passwd File", "remarks": "rule_set_271" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_passwd", + "value": "file_permissions_backup_etc_passwd", "remarks": "rule_set_272" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup passwd File", + "value": "Verify Permissions on Backup passwd File", "remarks": "rule_set_272" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_passwd", + "value": "file_groupowner_etc_group", "remarks": "rule_set_273" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup passwd File", + "value": "Verify Group Who Owns group File", "remarks": "rule_set_273" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_group", + "value": "file_owner_etc_group", "remarks": "rule_set_274" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns group File", + "value": "Verify User Who Owns group File", "remarks": "rule_set_274" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_group", + "value": "file_permissions_etc_group", "remarks": "rule_set_275" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns group File", + "value": "Verify Permissions on group File", "remarks": "rule_set_275" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_group", + "value": "file_groupowner_backup_etc_group", "remarks": "rule_set_276" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on group File", + "value": "Verify Group Who Owns Backup group File", "remarks": "rule_set_276" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_group", + "value": "file_owner_backup_etc_group", "remarks": "rule_set_277" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup group File", + "value": "Verify User Who Owns Backup group File", "remarks": "rule_set_277" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_group", + "value": "file_permissions_backup_etc_group", "remarks": "rule_set_278" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup group File", + "value": "Verify Permissions on Backup group File", "remarks": "rule_set_278" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_group", + "value": "file_owner_etc_shadow", "remarks": "rule_set_279" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup group File", + "value": "Verify User Who Owns shadow File", "remarks": "rule_set_279" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_shadow", + "value": "file_groupowner_etc_shadow", "remarks": "rule_set_280" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns shadow File", + "value": "Verify Group Who Owns shadow File", "remarks": "rule_set_280" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_shadow", + "value": "file_permissions_etc_shadow", "remarks": "rule_set_281" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns shadow File", + "value": "Verify Permissions on shadow File", "remarks": "rule_set_281" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_shadow", + "value": "file_groupowner_backup_etc_shadow", "remarks": "rule_set_282" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on shadow File", + "value": "Verify User Who Owns Backup shadow File", "remarks": "rule_set_282" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_shadow", + "value": "file_owner_backup_etc_shadow", "remarks": "rule_set_283" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup shadow File", + "value": "Verify Group Who Owns Backup shadow File", "remarks": "rule_set_283" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_shadow", + "value": "file_permissions_backup_etc_shadow", "remarks": "rule_set_284" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup shadow File", + "value": "Verify Permissions on Backup shadow File", "remarks": "rule_set_284" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_shadow", + "value": "file_groupowner_etc_gshadow", "remarks": "rule_set_285" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup shadow File", + "value": "Verify Group Who Owns gshadow File", "remarks": "rule_set_285" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_gshadow", + "value": "file_owner_etc_gshadow", "remarks": "rule_set_286" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns gshadow File", + "value": "Verify User Who Owns gshadow File", "remarks": "rule_set_286" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_gshadow", + "value": "file_permissions_etc_gshadow", "remarks": "rule_set_287" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns gshadow File", + "value": "Verify Permissions on gshadow File", "remarks": "rule_set_287" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_gshadow", + "value": "file_groupowner_backup_etc_gshadow", "remarks": "rule_set_288" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on gshadow File", + "value": "Verify Group Who Owns Backup gshadow File", "remarks": "rule_set_288" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_gshadow", + "value": "file_owner_backup_etc_gshadow", "remarks": "rule_set_289" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup gshadow File", + "value": "Verify User Who Owns Backup gshadow File", "remarks": "rule_set_289" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_gshadow", + "value": "file_permissions_backup_etc_gshadow", "remarks": "rule_set_290" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup gshadow File", + "value": "Verify Permissions on Backup gshadow File", "remarks": "rule_set_290" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_gshadow", + "value": "file_groupowner_etc_shells", "remarks": "rule_set_291" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup gshadow File", + "value": "Verify Group Who Owns /etc/shells File", "remarks": "rule_set_291" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_shells", + "value": "file_owner_etc_shells", "remarks": "rule_set_292" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns /etc/shells File", + "value": "Verify Who Owns /etc/shells File", "remarks": "rule_set_292" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_shells", + "value": "file_permissions_etc_shells", "remarks": "rule_set_293" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Who Owns /etc/shells File", + "value": "Verify Permissions on /etc/shells File", "remarks": "rule_set_293" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_shells", + "value": "file_groupowner_etc_security_opasswd", "remarks": "rule_set_294" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on /etc/shells File", + "value": "Verify Group Who Owns /etc/security/opasswd File", "remarks": "rule_set_294" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_security_opasswd", + "value": "file_owner_etc_security_opasswd", "remarks": "rule_set_295" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns /etc/security/opasswd File", + "value": "Verify User Who Owns /etc/security/opasswd File", "remarks": "rule_set_295" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_security_opasswd", + "value": "file_permissions_etc_security_opasswd", "remarks": "rule_set_296" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns /etc/security/opasswd File", + "value": "Verify Permissions on /etc/security/opasswd File", "remarks": "rule_set_296" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_security_opasswd", + "value": "file_groupowner_etc_security_opasswd_old", "remarks": "rule_set_297" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on /etc/security/opasswd File", + "value": "Verify Group Who Owns /etc/security/opasswd.old File", "remarks": "rule_set_297" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_security_opasswd_old", + "value": "file_owner_etc_security_opasswd_old", "remarks": "rule_set_298" }, - { - "name": "Rule_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_298" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_security_opasswd_old", - "remarks": "rule_set_299" - }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_299" + "remarks": "rule_set_298" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd_old", - "remarks": "rule_set_300" + "remarks": "rule_set_299" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd.old File", - "remarks": "rule_set_300" + "remarks": "rule_set_299" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_301" + "remarks": "rule_set_300" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_301" + "remarks": "rule_set_300" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_302" + "remarks": "rule_set_301" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_302" + "remarks": "rule_set_301" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_unowned_by_user", - "remarks": "rule_set_303" + "remarks": "rule_set_302" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a User", - "remarks": "rule_set_303" + "remarks": "rule_set_302" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_ungroupowned", - "remarks": "rule_set_304" + "remarks": "rule_set_303" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a Group", - "remarks": "rule_set_304" + "remarks": "rule_set_303" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_all_shadowed", - "remarks": "rule_set_305" + "remarks": "rule_set_304" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify All Account Password Hashes are Shadowed", - "remarks": "rule_set_305" + "remarks": "rule_set_304" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords_etc_shadow", - "remarks": "rule_set_306" + "remarks": "rule_set_305" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure There Are No Accounts With Blank or Null Passwords", - "remarks": "rule_set_306" + "remarks": "rule_set_305" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gid_passwd_group_same", - "remarks": "rule_set_307" + "remarks": "rule_set_306" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", - "remarks": "rule_set_307" + "remarks": "rule_set_306" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_id", - "remarks": "rule_set_308" + "remarks": "rule_set_307" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique User IDs", - "remarks": "rule_set_308" + "remarks": "rule_set_307" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_id", - "remarks": "rule_set_309" + "remarks": "rule_set_308" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group ID", - "remarks": "rule_set_309" + "remarks": "rule_set_308" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_name", - "remarks": "rule_set_310" + "remarks": "rule_set_309" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique Names", - "remarks": "rule_set_310" + "remarks": "rule_set_309" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_name", - "remarks": "rule_set_311" + "remarks": "rule_set_310" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group Names", - "remarks": "rule_set_311" + "remarks": "rule_set_310" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_interactive_home_directory_exists", - "remarks": "rule_set_312" + "remarks": "rule_set_311" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive Users Home Directories Must Exist", - "remarks": "rule_set_312" + "remarks": "rule_set_311" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_home_directories", - "remarks": "rule_set_313" + "remarks": "rule_set_312" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Be Owned By The Primary User", - "remarks": "rule_set_313" + "remarks": "rule_set_312" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_home_directories", - "remarks": "rule_set_314" + "remarks": "rule_set_313" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", - "remarks": "rule_set_314" + "remarks": "rule_set_313" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_315" + "remarks": "rule_set_314" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_315" + "remarks": "rule_set_314" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_316" + "remarks": "rule_set_315" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_316" + "remarks": "rule_set_315" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_no_world_writable_programs", - "remarks": "rule_set_317" + "remarks": "rule_set_316" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Not Run World-Writable Programs", - "remarks": "rule_set_317" + "remarks": "rule_set_316" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_318" + "remarks": "rule_set_317" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_318" + "remarks": "rule_set_317" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_forward_files", - "remarks": "rule_set_319" + "remarks": "rule_set_318" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .forward Files Exist", - "remarks": "rule_set_319" + "remarks": "rule_set_318" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_netrc_files", - "remarks": "rule_set_320" + "remarks": "rule_set_319" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No netrc Files Exist", - "remarks": "rule_set_320" + "remarks": "rule_set_319" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rhost_files", - "remarks": "rule_set_321" + "remarks": "rule_set_320" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .rhost Files Exist", - "remarks": "rule_set_321" + "remarks": "rule_set_320" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_bash_history", - "remarks": "rule_set_322" + "remarks": "rule_set_321" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure User Bash History File Has Correct Permissions", - "remarks": "rule_set_322" + "remarks": "rule_set_321" } ], "control-implementations": [ { - "uuid": "f43b2c5b-94a5-42e7-94be-f891f4b1aec0", + "uuid": "62fa143e-07f6-436c-ae50-ceb0e189b99f", "source": "trestle://profiles/rhel10-cis_rhel10-l1_server/profile.json", "description": "Control implementation for cis_server_l1", "props": [ @@ -5161,13 +5149,13 @@ { "param-id": "var_password_hashing_algorithm", "values": [ - "yescrypt" + "cis_rhel10" ] }, { "param-id": "var_password_hashing_algorithm_pam", "values": [ - "yescrypt" + "cis_rhel10" ] }, { @@ -5275,7 +5263,7 @@ ], "implemented-requirements": [ { - "uuid": "1da965d2-b5dc-4362-963a-7a3cf2bd99f7", + "uuid": "92197526-6d79-459b-80c6-42463be043db", "control-id": "reload_dconf_db", "description": "This is a helper rule to reload Dconf database correctly.", "props": [ @@ -5292,7 +5280,7 @@ ] }, { - "uuid": "72a9c0a7-db03-4500-b03c-35948217a954", + "uuid": "aa930edc-363c-4010-972e-adaa1cf64fd7", "control-id": "cis_rhel10_1-1.1.1", "description": "No notes for control-id 1.1.1.1.", "props": [ @@ -5309,7 +5297,7 @@ ] }, { - "uuid": "ede88973-0e1b-45d7-8305-d7f4a6c70add", + "uuid": "14538a93-50e0-481f-963f-bbe04a64d7ef", "control-id": "cis_rhel10_1-1.1.2", "description": "No notes for control-id 1.1.1.2.", "props": [ @@ -5326,7 +5314,7 @@ ] }, { - "uuid": "6013541e-c90f-4437-9179-5f52f31b32e9", + "uuid": "3e6d8665-186f-4029-bb63-1f0ef6475f05", "control-id": "cis_rhel10_1-1.1.3", "description": "No notes for control-id 1.1.1.3.", "props": [ @@ -5343,7 +5331,7 @@ ] }, { - "uuid": "87552488-957e-4835-9e2f-f769678fe636", + "uuid": "202a5ac5-c08b-4c52-97d0-97830fe5b4dd", "control-id": "cis_rhel10_1-1.1.4", "description": "No notes for control-id 1.1.1.4.", "props": [ @@ -5360,7 +5348,7 @@ ] }, { - "uuid": "c2ff2541-2bc4-483b-a219-fae33aff6b45", + "uuid": "34b206e7-cd50-4fd6-bb5d-569705e05e54", "control-id": "cis_rhel10_1-1.1.5", "description": "No notes for control-id 1.1.1.5.", "props": [ @@ -5377,7 +5365,7 @@ ] }, { - "uuid": "7d8a1718-3471-4232-ab70-f1e4674e0e78", + "uuid": "0279e5ff-66bd-4546-84a9-181f600af5bf", "control-id": "cis_rhel10_1-1.1.9", "description": "No notes for control-id 1.1.1.9.", "props": [ @@ -5394,7 +5382,7 @@ ] }, { - "uuid": "a8a64ea5-5f4a-48cc-a070-e426952f6aa5", + "uuid": "eb40e633-a7ce-400e-a06c-8d749c61bacb", "control-id": "cis_rhel10_1-1.1.10", "description": "No notes for control-id 1.1.1.10.", "props": [ @@ -5411,7 +5399,7 @@ ] }, { - "uuid": "9fed43ca-f481-47ff-952f-5e73e2ac108c", + "uuid": "c5c3ad45-d2ca-44a3-a2d2-4b36c6ee9655", "control-id": "cis_rhel10_1-1.1.11", "description": "The description for control-id cis_rhel10_1-1.1.11.", "props": [ @@ -5424,7 +5412,7 @@ ] }, { - "uuid": "5d6f332b-8e4d-48f2-bfcf-8397311195f0", + "uuid": "52a5b408-ba90-4665-b26e-f60048745571", "control-id": "cis_rhel10_1-1.2.1.1", "description": "No notes for control-id 1.1.2.1.1.", "props": [ @@ -5441,7 +5429,7 @@ ] }, { - "uuid": "dc66ad30-d6ac-47d4-9212-5883ec62db88", + "uuid": "615ab8c1-c59d-41fd-adf1-eaef694dc5f6", "control-id": "cis_rhel10_1-1.2.1.2", "description": "No notes for control-id 1.1.2.1.2.", "props": [ @@ -5458,7 +5446,7 @@ ] }, { - "uuid": "634def42-00a2-4acd-b831-607042f64353", + "uuid": "c5f1d06e-29a3-4cd6-9e9a-39a711efc993", "control-id": "cis_rhel10_1-1.2.1.3", "description": "No notes for control-id 1.1.2.1.3.", "props": [ @@ -5475,7 +5463,7 @@ ] }, { - "uuid": "0a326b0a-96f1-4f7a-9eb4-5512970eccfa", + "uuid": "1018fa74-f2c5-4c5b-be47-c21987640b55", "control-id": "cis_rhel10_1-1.2.1.4", "description": "No notes for control-id 1.1.2.1.4.", "props": [ @@ -5492,7 +5480,7 @@ ] }, { - "uuid": "ac6e8987-eb86-4cdc-8905-c5d1c781a9e6", + "uuid": "f0082749-23b9-4d4f-97a3-f1dd5fd3a1ff", "control-id": "cis_rhel10_1-1.2.2.1", "description": "No notes for control-id 1.1.2.2.1.", "props": [ @@ -5509,7 +5497,7 @@ ] }, { - "uuid": "690d0385-ecb1-4392-83be-a7eab21303af", + "uuid": "3818de2b-f535-4722-aad3-e9dc6f7cdc49", "control-id": "cis_rhel10_1-1.2.2.2", "description": "No notes for control-id 1.1.2.2.2.", "props": [ @@ -5526,7 +5514,7 @@ ] }, { - "uuid": "6b48f8c4-3d5a-4912-98e3-551c699426bd", + "uuid": "4db56d0d-4f46-4488-ac73-b5c39eef91c5", "control-id": "cis_rhel10_1-1.2.2.3", "description": "No notes for control-id 1.1.2.2.3.", "props": [ @@ -5543,7 +5531,7 @@ ] }, { - "uuid": "d9bf5243-5259-4a1a-a0ef-f74d11d5056d", + "uuid": "6bec291f-9f2e-403d-9aae-c6b6f6cf7aa6", "control-id": "cis_rhel10_1-1.2.2.4", "description": "No notes for control-id 1.1.2.2.4.", "props": [ @@ -5560,7 +5548,7 @@ ] }, { - "uuid": "039bed01-c496-443e-9c75-9e5eec36da26", + "uuid": "45fcf839-a8c8-4f4e-bb1e-ad27983aeade", "control-id": "cis_rhel10_1-1.2.3.2", "description": "No notes for control-id 1.1.2.3.2.", "props": [ @@ -5577,7 +5565,7 @@ ] }, { - "uuid": "5f6391e9-23ac-47e2-afcb-8ab1b2ae40c8", + "uuid": "9086fabf-eb3f-4cb8-8fe6-78100cb55920", "control-id": "cis_rhel10_1-1.2.3.3", "description": "No notes for control-id 1.1.2.3.3.", "props": [ @@ -5594,7 +5582,7 @@ ] }, { - "uuid": "eb62ad01-5d79-4075-a871-2d4ead56222c", + "uuid": "c6935296-f1a8-45b0-aa7d-3b45509d62fe", "control-id": "cis_rhel10_1-1.2.4.2", "description": "No notes for control-id 1.1.2.4.2.", "props": [ @@ -5611,7 +5599,7 @@ ] }, { - "uuid": "4bf0eea2-6d39-41e7-b8ed-0dce2e88deaa", + "uuid": "a2b0619e-e871-4d5b-9374-78ccb3c6cc7f", "control-id": "cis_rhel10_1-1.2.4.3", "description": "No notes for control-id 1.1.2.4.3.", "props": [ @@ -5628,7 +5616,7 @@ ] }, { - "uuid": "e4a0ae38-ac58-4df3-9799-327e534e5140", + "uuid": "3c62d2ad-1b52-4ea5-8085-1f7529226f8f", "control-id": "cis_rhel10_1-1.2.5.2", "description": "No notes for control-id 1.1.2.5.2.", "props": [ @@ -5645,7 +5633,7 @@ ] }, { - "uuid": "391a644e-f228-4576-8371-e2ca217bddfb", + "uuid": "7842c5e4-d63c-4caa-a0c2-12a66af8a12f", "control-id": "cis_rhel10_1-1.2.5.3", "description": "No notes for control-id 1.1.2.5.3.", "props": [ @@ -5662,7 +5650,7 @@ ] }, { - "uuid": "7bc83934-ec10-4a50-9b98-9c154a679850", + "uuid": "7996bf51-980c-4b6a-bf35-5140e1270210", "control-id": "cis_rhel10_1-1.2.5.4", "description": "No notes for control-id 1.1.2.5.4.", "props": [ @@ -5679,7 +5667,7 @@ ] }, { - "uuid": "3c2cf6d1-d365-4f7c-91a3-9c4866ac5666", + "uuid": "f14b2621-c25a-4ff1-ad5b-c36e8b81fad2", "control-id": "cis_rhel10_1-1.2.6.2", "description": "No notes for control-id 1.1.2.6.2.", "props": [ @@ -5696,7 +5684,7 @@ ] }, { - "uuid": "f591fcc4-4b91-4d8f-8d7d-434eb3e92626", + "uuid": "72054d73-02f8-45c7-a4bd-5c08bef5f7c2", "control-id": "cis_rhel10_1-1.2.6.3", "description": "No notes for control-id 1.1.2.6.3.", "props": [ @@ -5713,7 +5701,7 @@ ] }, { - "uuid": "2f1431d0-3b16-4a61-9694-67990742522b", + "uuid": "da4a0bde-bf95-471d-a057-1956eff7a9ea", "control-id": "cis_rhel10_1-1.2.6.4", "description": "No notes for control-id 1.1.2.6.4.", "props": [ @@ -5730,7 +5718,7 @@ ] }, { - "uuid": "f4e837ec-9e3c-47c2-b3a7-0e68bfd5edfe", + "uuid": "fdfa696e-c3d4-41db-a6f3-4a67bf69595d", "control-id": "cis_rhel10_1-1.2.7.2", "description": "No notes for control-id 1.1.2.7.2.", "props": [ @@ -5747,7 +5735,7 @@ ] }, { - "uuid": "8ff32690-1ede-4957-a5cc-04cc5d4eff16", + "uuid": "c8804813-5f9e-4f41-82d7-a12131ef37e4", "control-id": "cis_rhel10_1-1.2.7.3", "description": "No notes for control-id 1.1.2.7.3.", "props": [ @@ -5764,7 +5752,7 @@ ] }, { - "uuid": "6c3895ae-2320-48eb-983e-619519eea874", + "uuid": "3764d57f-1696-439e-bef5-63023714f38a", "control-id": "cis_rhel10_1-1.2.7.4", "description": "No notes for control-id 1.1.2.7.4.", "props": [ @@ -5781,7 +5769,7 @@ ] }, { - "uuid": "991757cc-ecc1-4de1-a7c6-24ce09c7bf87", + "uuid": "cf4842e1-d9b9-41d2-84d5-c5f6f07fc2ff", "control-id": "cis_rhel10_1-2.1.1", "description": "The description for control-id cis_rhel10_1-2.1.1.", "props": [ @@ -5794,7 +5782,7 @@ ] }, { - "uuid": "55d5bc43-e74a-4208-8a4e-1c2f69c2189c", + "uuid": "2c43f241-bc01-435c-881a-9682a422c45d", "control-id": "cis_rhel10_1-2.1.2", "description": "No notes for control-id 1.2.1.2.", "props": [ @@ -5811,7 +5799,7 @@ ] }, { - "uuid": "6b92e353-5bda-4508-adab-59902e1a4cde", + "uuid": "a166e54b-1eb1-43df-970e-8b5a3d35427e", "control-id": "cis_rhel10_1-2.1.4", "description": "The description for control-id cis_rhel10_1-2.1.4.", "props": [ @@ -5824,7 +5812,7 @@ ] }, { - "uuid": "dce71782-a55a-4089-872b-0a8d689a2ba3", + "uuid": "55f33b29-5f0b-46ea-b6cc-93960b141da6", "control-id": "cis_rhel10_1-2.2.1", "description": "The description for control-id cis_rhel10_1-2.2.1.", "props": [ @@ -5837,7 +5825,7 @@ ] }, { - "uuid": "f181b855-e4cd-40a8-841c-1181d111399c", + "uuid": "cd0ce936-ed33-4afd-b624-aa788bdc9ea5", "control-id": "cis_rhel10_1-3.1.1", "description": "No notes for control-id 1.3.1.1.", "props": [ @@ -5854,7 +5842,7 @@ ] }, { - "uuid": "12688fea-c41e-4269-a698-35686cb03bdc", + "uuid": "b54227c5-34d0-4bb0-ac40-0bca660301c9", "control-id": "cis_rhel10_1-3.1.2", "description": "No notes for control-id 1.3.1.2.", "props": [ @@ -5871,7 +5859,7 @@ ] }, { - "uuid": "a547ee5c-6309-4f0b-8958-73bdfbb88e97", + "uuid": "dd89b374-6e71-4dee-9e40-8be138808ad7", "control-id": "cis_rhel10_1-3.1.3", "description": "No notes for control-id 1.3.1.3.", "props": [ @@ -5888,7 +5876,7 @@ ] }, { - "uuid": "4dcfc9a8-ca63-46c2-aa64-fec1378c472a", + "uuid": "b189c490-36f8-4d16-aa97-dd6f42b05cdf", "control-id": "cis_rhel10_1-3.1.4", "description": "No notes for control-id 1.3.1.4.", "props": [ @@ -5905,7 +5893,7 @@ ] }, { - "uuid": "3189cf7b-390c-4073-a6b5-02f876898130", + "uuid": "7cf75177-f03d-4b5d-b6ac-9c1ef00c34b3", "control-id": "cis_rhel10_1-3.1.7", "description": "No notes for control-id 1.3.1.7.", "props": [ @@ -5922,7 +5910,7 @@ ] }, { - "uuid": "e0fc2bb3-ae56-44b2-b202-2af18e53828d", + "uuid": "eb40ab27-6d94-43be-b67f-38a6200fde1f", "control-id": "cis_rhel10_1-3.1.8", "description": "No notes for control-id 1.3.1.8.", "props": [ @@ -5939,7 +5927,7 @@ ] }, { - "uuid": "2fcae95a-cae0-49b1-952b-4da67adf7bbe", + "uuid": "bf469399-c2b3-42d9-9907-c523d73680ec", "control-id": "cis_rhel10_1-4.1", "description": "There is no automated remediation for this rule and this is intentional.\nMore details in the rule description.", "props": [ @@ -5956,7 +5944,7 @@ ] }, { - "uuid": "52e3223a-ba07-4474-bdbd-90d4c4316ef8", + "uuid": "773882f6-3320-45f1-b2d0-0c92653009f8", "control-id": "cis_rhel10_1-4.2", "description": "This requirement demands a deeper review of the rules.", "props": [ @@ -5983,7 +5971,7 @@ ] }, { - "uuid": "f62c50a2-cc56-44a3-916a-c31d0cbfae45", + "uuid": "cc636ad3-09bf-4adb-94d1-7e0340216166", "control-id": "cis_rhel10_1-5.1", "description": "No notes for control-id 1.5.1.", "props": [ @@ -6000,7 +5988,7 @@ ] }, { - "uuid": "0e502345-fabc-4ace-a437-06671bc01ede", + "uuid": "074ae312-f5cc-40f3-82ad-bc0c04935bb3", "control-id": "cis_rhel10_1-5.2", "description": "No notes for control-id 1.5.2.", "props": [ @@ -6017,7 +6005,7 @@ ] }, { - "uuid": "7274f85b-c98d-4afe-9540-6809d36bb2f4", + "uuid": "2a8f3a6b-52d6-4745-9b47-b8e9e5bec820", "control-id": "cis_rhel10_1-5.4", "description": "No notes for control-id 1.5.4.", "props": [ @@ -6034,7 +6022,7 @@ ] }, { - "uuid": "307d7de5-e0ed-4fc9-961c-18b119245b12", + "uuid": "1a924199-bba4-4a47-8f1e-845adb325a03", "control-id": "cis_rhel10_1-5.5", "description": "No notes for control-id 1.5.5.", "props": [ @@ -6051,7 +6039,7 @@ ] }, { - "uuid": "447b8edb-6696-4830-b573-0124c8cf718c", + "uuid": "b9cb4805-eec3-4e00-9e68-ced8bccd2b25", "control-id": "cis_rhel10_1-5.6", "description": "No notes for control-id 1.5.6.", "props": [ @@ -6068,7 +6056,7 @@ ] }, { - "uuid": "2815ae42-e365-4e29-9e0b-4494d7407f69", + "uuid": "1d0acdc0-3df2-4a78-9e79-b794579bec64", "control-id": "cis_rhel10_1-5.7", "description": "No notes for control-id 1.5.7.", "props": [ @@ -6085,7 +6073,7 @@ ] }, { - "uuid": "9383e922-4468-489e-9cd7-a97b781106e2", + "uuid": "31ce1d97-2d64-4eb4-8e58-aa22e78b58c9", "control-id": "cis_rhel10_1-5.8", "description": "Address Space Layout Randomization (ASLR)", "props": [ @@ -6102,7 +6090,7 @@ ] }, { - "uuid": "00a67e09-05e4-4364-8dca-2ddec68682e5", + "uuid": "9f9f25ab-c5c2-4906-a8f7-04c7e8407719", "control-id": "cis_rhel10_1-5.9", "description": "No notes for control-id 1.5.9.", "props": [ @@ -6119,7 +6107,7 @@ ] }, { - "uuid": "06a05410-d62f-4885-b07e-5c675d6315cd", + "uuid": "f64ca893-c717-4cbd-9fd2-66f2bde8fcda", "control-id": "cis_rhel10_1-5.10", "description": "No notes for control-id 1.5.10.", "props": [ @@ -6136,7 +6124,7 @@ ] }, { - "uuid": "7ae329d3-d7d4-4899-ba61-58854af5d96a", + "uuid": "84b1f82a-64ea-4f53-a6ce-0fc62d4e164e", "control-id": "cis_rhel10_1-6.1", "description": "No notes for control-id 1.6.1.", "props": [ @@ -6153,7 +6141,7 @@ ] }, { - "uuid": "6dde4838-4a6a-478f-8f9c-6e615606d40c", + "uuid": "ea0cfa1b-93b6-44d5-b0ad-e5f684fbe4af", "control-id": "cis_rhel10_1-6.2", "description": "No notes for control-id 1.6.2.", "props": [ @@ -6170,7 +6158,7 @@ ] }, { - "uuid": "5e922942-04e6-45da-8b06-b368242cb463", + "uuid": "f0e67c19-95e3-453e-b5a4-8bb04e46953a", "control-id": "cis_rhel10_1-6.3", "description": "No notes for control-id 1.6.3.", "props": [ @@ -6187,7 +6175,7 @@ ] }, { - "uuid": "ffaa3bdb-c530-4f43-bb2b-58a77f3998a9", + "uuid": "a457532a-4fba-44ec-b412-be6274cf6b0b", "control-id": "cis_rhel10_1-6.4", "description": "No notes for control-id 1.6.4.", "props": [ @@ -6204,7 +6192,7 @@ ] }, { - "uuid": "b86b0c42-9a1e-4aae-be83-3d6ef394debc", + "uuid": "2e9a7c81-b053-4d35-b610-d2c071eef2b2", "control-id": "cis_rhel10_1-7.1", "description": "No notes for control-id 1.7.1.", "props": [ @@ -6221,7 +6209,7 @@ ] }, { - "uuid": "1f553020-0ada-49ad-afe2-15ff3037a5ec", + "uuid": "d7d3da52-3712-4f1e-b2d6-e30cdb880ad6", "control-id": "cis_rhel10_1-7.2", "description": "No notes for control-id 1.7.2.", "props": [ @@ -6238,7 +6226,7 @@ ] }, { - "uuid": "67596de1-ee97-41e5-bcef-a8760f67c596", + "uuid": "913d7045-b533-4adc-a398-b69bf30e070a", "control-id": "cis_rhel10_1-7.3", "description": "No notes for control-id 1.7.3.", "props": [ @@ -6255,7 +6243,7 @@ ] }, { - "uuid": "7daa331a-bebd-4ba3-84b2-3f1cd23c638e", + "uuid": "a5b44cbf-ad00-494b-b148-79d22a770ef5", "control-id": "cis_rhel10_1-7.4", "description": "No notes for control-id 1.7.4.", "props": [ @@ -6282,7 +6270,7 @@ ] }, { - "uuid": "bac2b680-2649-4a1a-9638-956ee7c9f3f0", + "uuid": "a2fce26f-7674-4b8a-a2c8-149123486afb", "control-id": "cis_rhel10_1-7.5", "description": "No notes for control-id 1.7.5.", "props": [ @@ -6309,7 +6297,7 @@ ] }, { - "uuid": "f46226da-30c1-4f20-968c-dc2443252c26", + "uuid": "92205dd2-4176-4f9a-976e-3202d238eeca", "control-id": "cis_rhel10_1-7.6", "description": "No notes for control-id 1.7.6.", "props": [ @@ -6336,7 +6324,7 @@ ] }, { - "uuid": "edd3a1d0-8edc-4db1-80cc-5e8ca363f122", + "uuid": "711848f0-e377-4893-bc73-c3af5f598362", "control-id": "cis_rhel10_1-8.1", "description": "No notes for control-id 1.8.1.", "props": [ @@ -6358,7 +6346,7 @@ ] }, { - "uuid": "97d2cfda-4188-48cf-a8bb-f57f2f6f55fa", + "uuid": "4d9cce8a-bc99-40a2-a73e-661c7b30ca79", "control-id": "cis_rhel10_1-8.2", "description": "No notes for control-id 1.8.2.", "props": [ @@ -6375,7 +6363,7 @@ ] }, { - "uuid": "1e4552f9-8768-4073-8256-d13165f1e341", + "uuid": "b3df9eff-4b49-4240-8431-de0fe4255371", "control-id": "cis_rhel10_1-8.3", "description": "No notes for control-id 1.8.3.", "props": [ @@ -6407,7 +6395,7 @@ ] }, { - "uuid": "16362634-4445-4697-99a6-f10bfd99ee0f", + "uuid": "0b84c14d-6309-464b-a914-60eb034c2e31", "control-id": "cis_rhel10_1-8.4", "description": "No notes for control-id 1.8.4.", "props": [ @@ -6429,7 +6417,7 @@ ] }, { - "uuid": "64bbb61e-14a1-4547-8f72-19d93bfd5442", + "uuid": "dd4c344a-249a-41b5-83b0-9a666d998e22", "control-id": "cis_rhel10_1-8.5", "description": "No notes for control-id 1.8.5.", "props": [ @@ -6446,7 +6434,7 @@ ] }, { - "uuid": "3bd5b75d-2fc1-47de-b616-83d6bdc8b950", + "uuid": "d021abb6-4eea-41d6-a802-3c9e6ebcf8f8", "control-id": "cis_rhel10_2-1.1", "description": "No notes for control-id 2.1.1.", "props": [ @@ -6463,7 +6451,7 @@ ] }, { - "uuid": "36df0e3d-34ad-4e6c-820d-0ed9acf270d9", + "uuid": "3fa4b08a-18bd-4ab2-9259-4e7c8dc2593d", "control-id": "cis_rhel10_2-1.2", "description": "No notes for control-id 2.1.2.", "props": [ @@ -6480,7 +6468,7 @@ ] }, { - "uuid": "3c2cbca7-864e-411c-84a9-173edaadf6ae", + "uuid": "1a7edd01-c5ac-46f9-9f2c-b417f273cd5a", "control-id": "cis_rhel10_2-1.4", "description": "No notes for control-id 2.1.4.", "props": [ @@ -6497,7 +6485,7 @@ ] }, { - "uuid": "6284158e-f072-43c9-8c25-3695e786c2d4", + "uuid": "d76acd68-5c00-4292-9cec-eb010ea3d39a", "control-id": "cis_rhel10_2-1.5", "description": "No notes for control-id 2.1.5.", "props": [ @@ -6514,7 +6502,7 @@ ] }, { - "uuid": "417d792a-8721-4512-9e62-481a2dcf27ae", + "uuid": "97c75ce2-77e6-4978-af97-1adb4b1a8fe0", "control-id": "cis_rhel10_2-1.6", "description": "No notes for control-id 2.1.6.", "props": [ @@ -6531,7 +6519,7 @@ ] }, { - "uuid": "29b2271b-6586-4427-910a-3c40f6cf3368", + "uuid": "dd62c635-927c-4c24-b8ea-13f1570e5ce2", "control-id": "cis_rhel10_2-1.7", "description": "No notes for control-id 2.1.7.", "props": [ @@ -6548,7 +6536,7 @@ ] }, { - "uuid": "c120f9c3-eb41-4e6d-8b46-fec09cfb1dfa", + "uuid": "0d04bc48-4c96-4e7e-99b8-49888d4346ee", "control-id": "cis_rhel10_2-1.8", "description": "No notes for control-id 2.1.8.", "props": [ @@ -6570,7 +6558,7 @@ ] }, { - "uuid": "e8c4cfe2-eb19-40c6-8af7-6792ab234d41", + "uuid": "f4c02119-5200-4e90-aaf6-c89e207836b6", "control-id": "cis_rhel10_2-1.9", "description": "Many of the libvirt packages used by Enterprise Linux virtualization are dependent on the\nnfs-utils package.", "props": [ @@ -6587,7 +6575,7 @@ ] }, { - "uuid": "24ee3b18-a6e9-459a-ac2c-26ee947b43b8", + "uuid": "395cd55e-8d6b-4771-9834-a558108c50e0", "control-id": "cis_rhel10_2-1.10", "description": "No notes for control-id 2.1.10.", "props": [ @@ -6604,7 +6592,7 @@ ] }, { - "uuid": "6f3c8893-7983-42f8-af6e-a9413a0d36ba", + "uuid": "60936ae7-0147-4ea9-b585-8003a83ed488", "control-id": "cis_rhel10_2-1.11", "description": "Many of the libvirt packages used by Enterprise Linux virtualization, and the nfs-utils\npackage used for The Network File System (NFS), are dependent on the rpcbind package.", "props": [ @@ -6621,7 +6609,7 @@ ] }, { - "uuid": "e5fe5fcc-bd27-4efe-8400-1cf4989f3c69", + "uuid": "cca80de2-5894-4886-908a-1ed71e0169c1", "control-id": "cis_rhel10_2-1.12", "description": "No notes for control-id 2.1.12.", "props": [ @@ -6638,7 +6626,7 @@ ] }, { - "uuid": "62c9cd5f-5d39-452d-8c10-5a494519823b", + "uuid": "35730f49-c03b-4202-b5f8-cd8db86d4c48", "control-id": "cis_rhel10_2-1.13", "description": "No notes for control-id 2.1.13.", "props": [ @@ -6655,7 +6643,7 @@ ] }, { - "uuid": "18e9b006-b3b3-48f5-9d77-44a3b021128f", + "uuid": "37cffd59-6f35-4bf1-b014-27373a9c3351", "control-id": "cis_rhel10_2-1.14", "description": "No notes for control-id 2.1.14.", "props": [ @@ -6672,7 +6660,7 @@ ] }, { - "uuid": "bc54f059-5500-40d8-b249-fe9b1551bff4", + "uuid": "984c2e67-cf74-48af-a635-ced579cdb54f", "control-id": "cis_rhel10_2-1.15", "description": "No notes for control-id 2.1.15.", "props": [ @@ -6689,7 +6677,7 @@ ] }, { - "uuid": "378f2476-ca92-44f4-91a5-2cabf1f210e5", + "uuid": "be8048a3-aae8-438d-9126-cb1c7f5ffa75", "control-id": "cis_rhel10_2-1.16", "description": "No notes for control-id 2.1.16.", "props": [ @@ -6706,7 +6694,7 @@ ] }, { - "uuid": "3ac214cc-c5f3-46f7-8683-698c9bddcf96", + "uuid": "c4c2bc5a-2399-40f6-9786-c0e7f5c0af31", "control-id": "cis_rhel10_2-1.17", "description": "No notes for control-id 2.1.17.", "props": [ @@ -6723,7 +6711,7 @@ ] }, { - "uuid": "82568e4c-6ef0-4fc6-b294-8b7bf42726f4", + "uuid": "7e6a12b4-90d0-4217-bdcf-4d156f09c6e7", "control-id": "cis_rhel10_2-1.18", "description": "No notes for control-id 2.1.18.", "props": [ @@ -6745,7 +6733,7 @@ ] }, { - "uuid": "eb8a0855-7a28-479c-b5de-123091af2128", + "uuid": "9610bcb9-7939-44d9-9dbe-8db998400dce", "control-id": "cis_rhel10_2-1.21", "description": "No notes for control-id 2.1.21.", "props": [ @@ -6767,7 +6755,7 @@ ] }, { - "uuid": "87ef29a7-f6a7-4df0-9f0f-749b8d76fee9", + "uuid": "35d9ef66-1240-408a-9b5d-dc07b727b6f3", "control-id": "cis_rhel10_2-1.22", "description": "The description for control-id cis_rhel10_2-1.22.", "props": [ @@ -6780,7 +6768,7 @@ ] }, { - "uuid": "5965cfe6-25cd-41d9-bb1a-164e919d1cfb", + "uuid": "d08c99bb-6dc2-4629-858d-22fad7932ae0", "control-id": "cis_rhel10_2-2.1", "description": "No notes for control-id 2.2.1.", "props": [ @@ -6797,7 +6785,7 @@ ] }, { - "uuid": "13cd9fd0-c510-4d7b-b399-b49ba3b0717c", + "uuid": "e2c56b09-0196-4afa-8550-63c49e52f824", "control-id": "cis_rhel10_2-2.3", "description": "No notes for control-id 2.2.3.", "props": [ @@ -6814,7 +6802,7 @@ ] }, { - "uuid": "41193112-38bf-45ed-83ce-da7198f6da1a", + "uuid": "b99e775a-b267-4689-b74b-c73c4ff759ad", "control-id": "cis_rhel10_2-2.4", "description": "No notes for control-id 2.2.4.", "props": [ @@ -6831,7 +6819,7 @@ ] }, { - "uuid": "5e504565-948b-4aa1-8094-db02a8805e10", + "uuid": "f076a2d8-b753-4215-ae28-0778299e76f1", "control-id": "cis_rhel10_2-3.1", "description": "No notes for control-id 2.3.1.", "props": [ @@ -6843,7 +6831,7 @@ ] }, { - "uuid": "66cc6239-2977-402e-92ff-b39dbc676693", + "uuid": "e4f672a4-0caf-4793-a2dc-d437fdeaf5b2", "control-id": "cis_rhel10_2-3.2", "description": "No notes for control-id 2.3.2.", "props": [ @@ -6860,7 +6848,7 @@ ] }, { - "uuid": "49bbd807-da2e-465e-b1dd-21326a056875", + "uuid": "f1ec17d0-4b6c-4988-8323-6609f93f4535", "control-id": "cis_rhel10_2-3.3", "description": "No notes for control-id 2.3.3.", "props": [ @@ -6877,7 +6865,7 @@ ] }, { - "uuid": "d9f340c9-5496-41f7-a20a-20860488ebec", + "uuid": "8b26039a-ca80-47b4-997b-e3022995abfb", "control-id": "cis_rhel10_2-4.1.1", "description": "No notes for control-id 2.4.1.1.", "props": [ @@ -6899,7 +6887,7 @@ ] }, { - "uuid": "120dc823-c3b3-4375-8be1-d71ec99e4fd7", + "uuid": "45c8e102-9814-4a80-8c99-ec950e2d2a75", "control-id": "cis_rhel10_2-4.1.2", "description": "No notes for control-id 2.4.1.2.", "props": [ @@ -6926,7 +6914,7 @@ ] }, { - "uuid": "aa7321e1-b646-48c7-bb4b-4d0f1095c6f4", + "uuid": "ebe9621c-a8f9-4459-a4e7-2840a80d1c1b", "control-id": "cis_rhel10_2-4.1.3", "description": "No notes for control-id 2.4.1.3.", "props": [ @@ -6953,7 +6941,7 @@ ] }, { - "uuid": "7f6dca8c-3eba-4f29-a80b-5b9308f0f459", + "uuid": "9fefd85d-22de-4061-a535-a0c7c0c4babf", "control-id": "cis_rhel10_2-4.1.4", "description": "No notes for control-id 2.4.1.4.", "props": [ @@ -6980,7 +6968,7 @@ ] }, { - "uuid": "9c9edda2-e2f7-4de9-b093-172a749de37f", + "uuid": "67c718e2-dfb0-48d7-b603-6e532a6e90ef", "control-id": "cis_rhel10_2-4.1.5", "description": "No notes for control-id 2.4.1.5.", "props": [ @@ -7007,7 +6995,7 @@ ] }, { - "uuid": "06ecfc66-69d8-4ee9-bc88-bcd9c53d8902", + "uuid": "7f87474c-9bce-4c4e-ae7c-56a2449d91be", "control-id": "cis_rhel10_2-4.1.6", "description": "No notes for control-id 2.4.1.6.", "props": [ @@ -7034,7 +7022,7 @@ ] }, { - "uuid": "1460b39b-51f1-4492-840e-23c5a2f45ea6", + "uuid": "050d1925-832d-4bd2-a4f0-b092545cdfb8", "control-id": "cis_rhel10_2-4.1.7", "description": "No notes for control-id 2.4.1.7.", "props": [ @@ -7061,7 +7049,7 @@ ] }, { - "uuid": "21dd38c1-7124-4e15-98f2-242ebd185241", + "uuid": "24464798-cb38-4c93-8616-6a121102d358", "control-id": "cis_rhel10_2-4.1.8", "description": "No notes for control-id 2.4.1.8.", "props": [ @@ -7088,7 +7076,7 @@ ] }, { - "uuid": "e99eb034-100b-4a6b-8cc2-5c61fb2cbc71", + "uuid": "1625f9a0-3950-4f3c-b29c-6c6007d9fabe", "control-id": "cis_rhel10_2-4.1.9", "description": "No notes for control-id 2.4.1.9.", "props": [ @@ -7125,7 +7113,7 @@ ] }, { - "uuid": "23106f78-3916-4a16-9661-fecf56de9162", + "uuid": "8539d515-f5c8-44de-b900-bcdb5446afad", "control-id": "cis_rhel10_2-4.2.1", "description": "No notes for control-id 2.4.2.1.", "props": [ @@ -7162,7 +7150,7 @@ ] }, { - "uuid": "a1139b7f-7e21-4106-a7e5-e06bc554c447", + "uuid": "bbbe780d-6b21-496b-902e-2fc135a7ed18", "control-id": "cis_rhel10_3-1.1", "description": "The description for control-id cis_rhel10_3-1.1.", "props": [ @@ -7175,7 +7163,7 @@ ] }, { - "uuid": "f9564e3b-191c-492c-93cd-a468098ad13d", + "uuid": "0cdf58f4-7b62-479b-8570-5c6de3a5be74", "control-id": "cis_rhel10_3-1.2", "description": "No notes for control-id 3.1.2.", "props": [ @@ -7192,7 +7180,7 @@ ] }, { - "uuid": "7285acd7-24ca-4d38-9bf6-82a056bb9d6c", + "uuid": "3e3b5e75-6b09-40c4-bb31-ec6579ade76b", "control-id": "cis_rhel10_3-1.3", "description": "No notes for control-id 3.1.3.", "props": [ @@ -7209,7 +7197,7 @@ ] }, { - "uuid": "a2634a66-4b35-4496-9940-83692783d4ef", + "uuid": "25a9967c-6f6b-478b-b610-63cde94a90c1", "control-id": "cis_rhel10_3-2.1", "description": "No notes for control-id 3.2.1.", "props": [ @@ -7226,7 +7214,7 @@ ] }, { - "uuid": "d6696b9f-f515-4125-a994-cc2c2c641308", + "uuid": "dd532042-fa5b-4774-b9ea-879e222f45ef", "control-id": "cis_rhel10_3-2.2", "description": "No notes for control-id 3.2.2.", "props": [ @@ -7243,7 +7231,7 @@ ] }, { - "uuid": "7633cc2a-78f4-42ad-8f6a-306f123e43dc", + "uuid": "c7b9f8e1-5a4a-4de2-b599-bf8037ef36bf", "control-id": "cis_rhel10_3-2.3", "description": "No notes for control-id 3.2.3.", "props": [ @@ -7260,7 +7248,7 @@ ] }, { - "uuid": "1fb9f434-b54c-43a0-aaa3-6d7378e51706", + "uuid": "381e7471-6295-4f35-878f-6c3c14e40bb3", "control-id": "cis_rhel10_3-2.4", "description": "No notes for control-id 3.2.4.", "props": [ @@ -7277,7 +7265,7 @@ ] }, { - "uuid": "5d4c99aa-7924-4044-ae98-91281b380d32", + "uuid": "005ac944-8174-4076-bd66-8172f7104152", "control-id": "cis_rhel10_3-2.5", "description": "No notes for control-id 3.2.5.", "props": [ @@ -7294,7 +7282,7 @@ ] }, { - "uuid": "4e1b00de-9fc7-4267-84c2-a09d20ab8a59", + "uuid": "8584908b-e0aa-4c67-a3c4-2681df1ddc76", "control-id": "cis_rhel10_3-2.6", "description": "No notes for control-id 3.2.6.", "props": [ @@ -7311,7 +7299,7 @@ ] }, { - "uuid": "a60c09a7-aece-4304-b371-bdaec13f278d", + "uuid": "e0f2f99b-c51f-4c47-9238-095f0a8d88be", "control-id": "cis_rhel10_3-3.1.2", "description": "No notes for control-id 3.3.1.2.", "props": [ @@ -7328,7 +7316,7 @@ ] }, { - "uuid": "59e16672-9e29-4359-af8e-3b1644d35996", + "uuid": "e8e07044-90ce-46d0-8dd7-cf884d6b4f31", "control-id": "cis_rhel10_3-3.1.3", "description": "No notes for control-id 3.3.1.3.", "props": [ @@ -7345,7 +7333,7 @@ ] }, { - "uuid": "38c96e9d-a040-4035-8acc-71a22bddf3c5", + "uuid": "dc97f925-dca9-47f4-99ff-470554189714", "control-id": "cis_rhel10_3-3.1.4", "description": "No notes for control-id 3.3.1.4.", "props": [ @@ -7362,7 +7350,7 @@ ] }, { - "uuid": "8b777583-3a06-4ffc-b85c-7669bf12b4d8", + "uuid": "d8305c8b-d23e-4d40-b090-143e90abe325", "control-id": "cis_rhel10_3-3.1.5", "description": "No notes for control-id 3.3.1.5.", "props": [ @@ -7379,7 +7367,7 @@ ] }, { - "uuid": "1a7a934a-f3bd-4686-9353-621f0fbc70f7", + "uuid": "7d3bd5fd-c739-4233-9de6-f33145ee433c", "control-id": "cis_rhel10_3-3.1.6", "description": "No notes for control-id 3.3.1.6.", "props": [ @@ -7396,7 +7384,7 @@ ] }, { - "uuid": "9f551fb5-210b-4c09-a4d6-94539943cdc8", + "uuid": "06031581-5d41-4af6-ab52-83cac9f7f76e", "control-id": "cis_rhel10_3-3.1.7", "description": "No notes for control-id 3.3.1.7.", "props": [ @@ -7413,7 +7401,7 @@ ] }, { - "uuid": "2b853312-5838-4f97-a74d-8135ea052d94", + "uuid": "ad53dbdc-f9d7-42b1-ab83-b20b148f7fbc", "control-id": "cis_rhel10_3-3.1.8", "description": "No notes for control-id 3.3.1.8.", "props": [ @@ -7430,7 +7418,7 @@ ] }, { - "uuid": "e6682fa5-26de-45b8-a25b-1aaa23889dd3", + "uuid": "71cc4e14-344d-4b5c-bd10-c9433b18abfe", "control-id": "cis_rhel10_3-3.1.9", "description": "No notes for control-id 3.3.1.9.", "props": [ @@ -7447,7 +7435,7 @@ ] }, { - "uuid": "5fa1b71a-585c-48ff-90d0-68978409cb21", + "uuid": "8016ee61-9f52-43eb-bbb6-a9b0f98d43a2", "control-id": "cis_rhel10_3-3.1.10", "description": "No notes for control-id 3.3.1.10.", "props": [ @@ -7464,7 +7452,7 @@ ] }, { - "uuid": "fba54b4f-9e1e-4116-bbe0-3feb7915d923", + "uuid": "a62bc02f-64e3-4119-b03d-f70afbb53e57", "control-id": "cis_rhel10_3-3.1.11", "description": "No notes for control-id 3.3.1.11.", "props": [ @@ -7481,7 +7469,7 @@ ] }, { - "uuid": "2e1dc80d-ff4d-4e09-a7fb-b099b0362e1b", + "uuid": "ac9fecb3-09d1-430f-a8c0-650bb013e696", "control-id": "cis_rhel10_3-3.1.12", "description": "No notes for control-id 3.3.1.12.", "props": [ @@ -7498,7 +7486,7 @@ ] }, { - "uuid": "35333647-4fc7-4f78-b548-3752439f6726", + "uuid": "5468bbd1-1270-42dd-8f89-d00a35b18559", "control-id": "cis_rhel10_3-3.1.13", "description": "No notes for control-id 3.3.1.13.", "props": [ @@ -7515,7 +7503,7 @@ ] }, { - "uuid": "21ba9f7c-2d84-4ed1-97e1-57cbbeb4c995", + "uuid": "0536b0be-c3df-4c7e-abae-e993e0ca2f7d", "control-id": "cis_rhel10_3-3.1.14", "description": "No notes for control-id 3.3.1.14.", "props": [ @@ -7532,7 +7520,7 @@ ] }, { - "uuid": "7c5f7268-3593-4afd-8348-a2ee3caad771", + "uuid": "43211110-a674-4236-9467-b003cffc7d35", "control-id": "cis_rhel10_3-3.1.15", "description": "No notes for control-id 3.3.1.15.", "props": [ @@ -7549,7 +7537,7 @@ ] }, { - "uuid": "2e0e9981-f6f1-4b62-8623-dd036b54e0ee", + "uuid": "3e8dfb1f-d919-415e-95b6-85777bdcfade", "control-id": "cis_rhel10_3-3.1.16", "description": "No notes for control-id 3.3.1.16.", "props": [ @@ -7566,7 +7554,7 @@ ] }, { - "uuid": "cfc2747b-d0ec-4eea-909e-fe6be68f49ce", + "uuid": "2be7bb07-ac47-4908-825e-b78f9b231047", "control-id": "cis_rhel10_3-3.1.17", "description": "No notes for control-id 3.3.1.17.", "props": [ @@ -7583,7 +7571,7 @@ ] }, { - "uuid": "4ebf7b69-46e8-4e89-b417-fae96e8fc35a", + "uuid": "165b8119-e729-41d9-b668-e8297afd9898", "control-id": "cis_rhel10_3-3.1.18", "description": "No notes for control-id 3.3.1.18.", "props": [ @@ -7600,7 +7588,7 @@ ] }, { - "uuid": "d3b0aca0-8925-4cdd-9506-9c30cb056514", + "uuid": "fff3edd4-55a8-4872-ad41-a664f81fa59d", "control-id": "cis_rhel10_3-3.2.1", "description": "No notes for control-id 3.3.2.1.", "props": [ @@ -7617,7 +7605,7 @@ ] }, { - "uuid": "6787d78b-f59d-4566-a5b7-da39e2657f58", + "uuid": "12cbdf91-0bcf-47cc-8298-0f9bc6b2603e", "control-id": "cis_rhel10_3-3.2.2", "description": "No notes for control-id 3.3.2.2.", "props": [ @@ -7634,7 +7622,7 @@ ] }, { - "uuid": "7565acb3-935c-44c4-84fb-8dfe0a4c1444", + "uuid": "210ea33b-18bf-4023-8527-df4a4af193db", "control-id": "cis_rhel10_3-3.2.3", "description": "No notes for control-id 3.3.2.3.", "props": [ @@ -7651,7 +7639,7 @@ ] }, { - "uuid": "8551eabd-1d9a-4eda-a6a1-bcfb551a9b92", + "uuid": "2b55afaa-3d6e-4260-8049-d4941f85be21", "control-id": "cis_rhel10_3-3.2.4", "description": "No notes for control-id 3.3.2.4.", "props": [ @@ -7668,7 +7656,7 @@ ] }, { - "uuid": "380c1338-1ed5-41e4-8ccd-96efed5421d8", + "uuid": "46202202-3579-4c86-a9b6-2be4a5f1b857", "control-id": "cis_rhel10_3-3.2.5", "description": "No notes for control-id 3.3.2.5.", "props": [ @@ -7685,7 +7673,7 @@ ] }, { - "uuid": "bf94b030-64af-4d20-8f87-3fdb8004d9c6", + "uuid": "2b0007cf-80f3-40a0-8711-0e4845eb64c0", "control-id": "cis_rhel10_3-3.2.6", "description": "No notes for control-id 3.3.2.6.", "props": [ @@ -7702,7 +7690,7 @@ ] }, { - "uuid": "8e00d1c6-001b-4fbb-9702-c218572622d8", + "uuid": "4451952a-e50a-48cf-81ac-072535af626b", "control-id": "cis_rhel10_3-3.2.7", "description": "No notes for control-id 3.3.2.7.", "props": [ @@ -7719,7 +7707,7 @@ ] }, { - "uuid": "383fefd1-ce8e-4317-a5b8-4b9808fec8b7", + "uuid": "c64cfa99-c360-42dd-9cce-c82e54999d27", "control-id": "cis_rhel10_3-3.2.8", "description": "No notes for control-id 3.3.2.8.", "props": [ @@ -7736,7 +7724,7 @@ ] }, { - "uuid": "dc7091f0-bfea-49d7-a0b6-b2dd6f2d2ded", + "uuid": "7b758b84-e0c8-4a18-b363-11828c749d8e", "control-id": "cis_rhel10_4-1.1", "description": "No notes for control-id 4.1.1.", "props": [ @@ -7753,7 +7741,7 @@ ] }, { - "uuid": "441482b2-83f7-4db9-b244-8feb3f401995", + "uuid": "bce05516-702d-4c2a-8aed-94dedfd97f38", "control-id": "cis_rhel10_4-1.2", "description": "No notes for control-id 4.1.2.", "props": [ @@ -7770,7 +7758,7 @@ ] }, { - "uuid": "df9f3044-52ab-420c-88ef-3b3c5b872a51", + "uuid": "bb7a3ad4-319b-4355-9278-ada03dfecc89", "control-id": "cis_rhel10_4-1.3", "description": "No notes for control-id 4.1.3.", "props": [ @@ -7787,7 +7775,7 @@ ] }, { - "uuid": "5391344c-2153-4b4c-9ac7-96c133030a80", + "uuid": "77c4adf1-499d-4de8-a09c-4276fab1af13", "control-id": "cis_rhel10_4-1.4", "description": "The description for control-id cis_rhel10_4-1.4.", "props": [ @@ -7800,7 +7788,7 @@ ] }, { - "uuid": "f7d90c88-8334-4685-b2a7-6697a7cb4e97", + "uuid": "1a368d0c-5331-49c2-bbc6-ec0788dee7c6", "control-id": "cis_rhel10_4-1.5", "description": "Firewalld in Red Hat Enterprise Linux 10 accepts loopback traffic by default.", "props": [ @@ -7817,7 +7805,7 @@ ] }, { - "uuid": "471e64b0-43b1-45d8-9f60-ffbce03d142d", + "uuid": "33a45dd9-44e8-4bc3-b716-fe76e3e47d73", "control-id": "cis_rhel10_4-1.6", "description": "The description for control-id cis_rhel10_4-1.6.", "props": [ @@ -7830,7 +7818,7 @@ ] }, { - "uuid": "2008c433-3e7b-4c0c-a903-83acf2203689", + "uuid": "8512f021-07ef-48be-91c4-cb5341aada83", "control-id": "cis_rhel10_4-1.7", "description": "The description for control-id cis_rhel10_4-1.7.", "props": [ @@ -7843,7 +7831,7 @@ ] }, { - "uuid": "bea953b8-7ce1-4ce0-bcb9-d33ae69a09e7", + "uuid": "1e61222f-6c58-4b43-ac63-080bc4696c28", "control-id": "cis_rhel10_5-1.1", "description": "No notes for control-id 5.1.1.", "props": [ @@ -7900,7 +7888,7 @@ ] }, { - "uuid": "792dd725-193b-4f0a-aa80-13e928ba7dcb", + "uuid": "22d87de1-7051-492f-ba8d-97be53b754dd", "control-id": "cis_rhel10_5-1.2", "description": "No notes for control-id 5.1.2.", "props": [ @@ -7927,7 +7915,7 @@ ] }, { - "uuid": "bae8416a-87cf-40a5-8a43-b7a8daa40f76", + "uuid": "616ab185-09ca-4f80-a51f-495662c26218", "control-id": "cis_rhel10_5-1.3", "description": "No notes for control-id 5.1.3.", "props": [ @@ -7954,7 +7942,7 @@ ] }, { - "uuid": "835f7248-dd36-46ae-abe1-31cab367da2b", + "uuid": "57e9cf58-d9ea-4f39-9fed-d731dcd27e0e", "control-id": "cis_rhel10_5-1.4", "description": "No notes for control-id 5.1.4.", "props": [ @@ -7971,7 +7959,7 @@ ] }, { - "uuid": "bbb41595-52a0-41f6-8f07-9f9b8fc27015", + "uuid": "c9fc6ad7-f990-4eb9-a4f2-3d9f2c261c47", "control-id": "cis_rhel10_5-1.5", "description": "No notes for control-id 5.1.5.", "props": [ @@ -7988,7 +7976,7 @@ ] }, { - "uuid": "1a644334-4eef-430f-97d6-79efab2875e5", + "uuid": "e2d33a7c-1720-4585-9ebe-cbb1224085dc", "control-id": "cis_rhel10_5-1.6", "description": "No notes for control-id 5.1.6.", "props": [ @@ -8005,7 +7993,7 @@ ] }, { - "uuid": "374ab1e1-c7b2-41df-8cd6-1f6d9bf9410e", + "uuid": "c9d0f74b-4105-49e2-aafb-474f5ea2e639", "control-id": "cis_rhel10_5-1.7", "description": "The requirement gives an example of 45 seconds, but is flexible about the values. It is only\nnecessary to ensure there is a timeout configured in alignment to the site policy.", "props": [ @@ -8027,7 +8015,7 @@ ] }, { - "uuid": "ba4b7b2b-1725-45a2-ade7-a421c78d77b6", + "uuid": "1835e118-a7c7-4c44-8592-3797019971cf", "control-id": "cis_rhel10_5-1.10", "description": "No notes for control-id 5.1.10.", "props": [ @@ -8044,7 +8032,7 @@ ] }, { - "uuid": "642d4738-c469-4678-9787-8cd88b3c8e6e", + "uuid": "5884e1c5-34cb-4996-b2e8-f2d58ae8b35f", "control-id": "cis_rhel10_5-1.11", "description": "No notes for control-id 5.1.11.", "props": [ @@ -8061,7 +8049,7 @@ ] }, { - "uuid": "0d47ed0c-8b7e-4e46-bc3b-39b57ec5d6ea", + "uuid": "a3565da7-e374-41d6-b68c-0bb13df698ff", "control-id": "cis_rhel10_5-1.12", "description": "The description for control-id cis_rhel10_5-1.12.", "props": [ @@ -8079,7 +8067,7 @@ ] }, { - "uuid": "fd845ece-a6e6-4e52-9f4d-3cc514008f4c", + "uuid": "eaa6e34a-2c65-4c89-a503-db1c2b06ed9f", "control-id": "cis_rhel10_5-1.13", "description": "No notes for control-id 5.1.13.", "props": [ @@ -8096,7 +8084,7 @@ ] }, { - "uuid": "eff8457e-cea9-422a-b8a3-d1f85435f03f", + "uuid": "7199b645-74ff-481d-b33c-665ea549ae2a", "control-id": "cis_rhel10_5-1.14", "description": "The CIS benchmark is not opinionated about which loglevel is selected here. Here, this\nprofile uses VERBOSE by default, as it allows for the capture of login and logout activity\nas well as key fingerprints.", "props": [ @@ -8113,7 +8101,7 @@ ] }, { - "uuid": "8b349148-9791-4953-8278-105108521224", + "uuid": "de429ffd-206a-4ded-b7ca-c1548339ee21", "control-id": "cis_rhel10_5-1.15", "description": "No notes for control-id 5.1.15.", "props": [ @@ -8130,7 +8118,7 @@ ] }, { - "uuid": "e48611c9-3e94-4b14-b3ef-673fbcec8258", + "uuid": "cfd4d93c-147c-4d25-a2a9-0bc1c33f7ca8", "control-id": "cis_rhel10_5-1.16", "description": "No notes for control-id 5.1.16.", "props": [ @@ -8147,7 +8135,7 @@ ] }, { - "uuid": "c1e168ba-75ab-4ed3-b603-a39dd6f8858c", + "uuid": "5918d6fc-6711-4afd-b4d3-326f9faf6e59", "control-id": "cis_rhel10_5-1.17", "description": "No notes for control-id 5.1.17.", "props": [ @@ -8164,7 +8152,7 @@ ] }, { - "uuid": "aa37c0fc-45d8-4e2e-bbcc-0f8dbdfcae8d", + "uuid": "308e67ee-5565-440f-b37f-9963611a7870", "control-id": "cis_rhel10_5-1.18", "description": "No notes for control-id 5.1.18.", "props": [ @@ -8181,7 +8169,7 @@ ] }, { - "uuid": "f3204b0d-5b55-4f6e-ad5a-9fbdb9a5db40", + "uuid": "0b2762b9-568a-4964-bcf2-5d524da92b16", "control-id": "cis_rhel10_5-1.19", "description": "No notes for control-id 5.1.19.", "props": [ @@ -8198,7 +8186,7 @@ ] }, { - "uuid": "274f0763-b506-48d6-8d96-ae6b503ab5b1", + "uuid": "e67d1253-d73a-49e1-82c8-59ede527cf7d", "control-id": "cis_rhel10_5-1.20", "description": "No notes for control-id 5.1.20.", "props": [ @@ -8215,7 +8203,7 @@ ] }, { - "uuid": "828cdd80-97f2-461d-8056-7d62e05a0aa1", + "uuid": "f926bdd7-10d1-42b9-9a89-852724807074", "control-id": "cis_rhel10_5-1.21", "description": "No notes for control-id 5.1.21.", "props": [ @@ -8232,7 +8220,7 @@ ] }, { - "uuid": "59669e25-8282-4553-91c5-c29f31be79b7", + "uuid": "6ef70ad5-af3e-4fa8-89ec-f2ee56444e1b", "control-id": "cis_rhel10_5-1.22", "description": "No notes for control-id 5.1.22.", "props": [ @@ -8249,7 +8237,7 @@ ] }, { - "uuid": "8a8330c6-feb2-439e-941d-aeb299331422", + "uuid": "5a65aeaf-5e99-439c-9c96-b4b01ddf2ed8", "control-id": "cis_rhel10_5-2.1", "description": "No notes for control-id 5.2.1.", "props": [ @@ -8266,7 +8254,7 @@ ] }, { - "uuid": "592ffa86-89ee-4e43-ac03-81ee93409f7f", + "uuid": "962bbb5d-fd75-4e0f-8291-a606b70c865b", "control-id": "cis_rhel10_5-2.2", "description": "No notes for control-id 5.2.2.", "props": [ @@ -8283,7 +8271,7 @@ ] }, { - "uuid": "3f84c97e-6712-462f-94b1-adfa7c3aeccb", + "uuid": "541cc235-7d11-4031-9f2b-ab79c64367ca", "control-id": "cis_rhel10_5-2.3", "description": "No notes for control-id 5.2.3.", "props": [ @@ -8300,7 +8288,7 @@ ] }, { - "uuid": "8455df5f-2d1b-4210-88cf-603992dee8d0", + "uuid": "36ac0f28-39a7-4aa5-a94a-5c2abe57f908", "control-id": "cis_rhel10_5-2.5", "description": "No notes for control-id 5.2.5.", "props": [ @@ -8317,7 +8305,7 @@ ] }, { - "uuid": "5341e967-f1c2-427c-aa8d-ecc09360f46e", + "uuid": "02f9329b-a21f-4838-b8e9-c30d87ef69ad", "control-id": "cis_rhel10_5-2.6", "description": "No notes for control-id 5.2.6.", "props": [ @@ -8334,7 +8322,7 @@ ] }, { - "uuid": "40f76ae8-b5ac-4c6d-9864-57b8268929c0", + "uuid": "3287f020-74a3-4cb6-8b12-1b79d1a3b41d", "control-id": "cis_rhel10_5-2.7", "description": "Members of \"wheel\" or GID 0 groups are checked by default if the group option is not set for\npam_wheel.so module. The recommendation states the group should be empty to reinforce the\nuse of \"sudo\" for privileged access. Therefore, members of these groups should be manually\nchecked or a different group should be informed.", "props": [ @@ -8356,7 +8344,7 @@ ] }, { - "uuid": "64e46386-4ef2-4cc5-abe1-79f1821105fd", + "uuid": "c32113a8-a601-40d8-9a94-fd19087d7485", "control-id": "cis_rhel10_5-3.1.1", "description": "This requirement is hard to be automated without any specific requirement. The policy even\nstates that provided commands are examples, other custom settings might be in place and the\nsettings might be different depending on site policies. The other rules will already make\nsure there is a correct autheselect profile regardless of the existing settings. It is\nnecessary to better discuss with CIS Community.", "props": [ @@ -8368,7 +8356,7 @@ ] }, { - "uuid": "3f6df11d-27b9-439d-9205-fa916b6a17f2", + "uuid": "cc87695a-6215-4673-8f8f-3698bba54e3a", "control-id": "cis_rhel10_5-3.1.2", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.1.", "props": [ @@ -8390,7 +8378,7 @@ ] }, { - "uuid": "59e78db2-e92f-4792-942c-9513f935d429", + "uuid": "75f1b8ae-24fa-408a-aec3-c7e2fb4f8444", "control-id": "cis_rhel10_5-3.1.3", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.2.", "props": [ @@ -8417,7 +8405,7 @@ ] }, { - "uuid": "074ef879-3704-4b91-9f22-406783eff878", + "uuid": "2364b1a0-9dc4-4576-818c-efda2627eed6", "control-id": "cis_rhel10_5-3.1.4", "description": "The module is properly enabled by the rules mentioned in related_rules.\nRequirements in 5.3.2.3 use these rules.", "props": [ @@ -8429,7 +8417,7 @@ ] }, { - "uuid": "1c5feabd-3c11-4e79-a5fa-3f16a6de0b92", + "uuid": "61cbd0ac-314b-47ec-a320-6456c1e4dee1", "control-id": "cis_rhel10_5-3.1.5", "description": "No notes for control-id 5.3.1.5.", "props": [ @@ -8446,7 +8434,7 @@ ] }, { - "uuid": "934b1900-13c8-49c8-97d9-77884e829abf", + "uuid": "cae7a835-4cd3-4a81-b3f5-ffcf8bfd521f", "control-id": "cis_rhel10_5-3.2.1.1", "description": "No notes for control-id 5.3.2.1.1.", "props": [ @@ -8463,7 +8451,7 @@ ] }, { - "uuid": "a4da05f8-b609-4922-a5aa-3d2826c2c650", + "uuid": "685f721e-a150-4cda-9c19-7c51b7f310b4", "control-id": "cis_rhel10_5-3.2.1.2", "description": "The policy also accepts value 0, which means the locked accounts should be manually unlocked\nby an administrator. However, it also mentions that using value 0 can facilitate a DoS\nattack to legitimate users.", "props": [ @@ -8480,7 +8468,7 @@ ] }, { - "uuid": "87ebde82-044a-4a22-a25a-99b9b3c5b58d", + "uuid": "98a3aa32-4ab0-47c4-9729-458e909f8db0", "control-id": "cis_rhel10_5-3.2.2.1", "description": "No notes for control-id 5.3.2.2.1.", "props": [ @@ -8497,7 +8485,7 @@ ] }, { - "uuid": "15e156d0-1db4-45b2-b233-2022a9860fd8", + "uuid": "00fd7c95-1c90-401e-8bd1-2b33409dfcb4", "control-id": "cis_rhel10_5-3.2.2.2", "description": "No notes for control-id 5.3.2.2.2.", "props": [ @@ -8514,7 +8502,7 @@ ] }, { - "uuid": "514952c8-a5d5-42e4-8fd0-f9f24f518e37", + "uuid": "7a021e8a-5c20-4df0-ba6c-25a6fa6c61a5", "control-id": "cis_rhel10_5-3.2.2.3", "description": "This requirement is expected to be manual. However, in previous versions of the policy\nit was already automated the configuration of \"minclass\" option. This posture was kept for\nRHEL 10 in this new version. Rules related to other options are informed in related_rules.\nIn short, minclass=4 alone can achieve the same result achieved by the combination of the\nother 4 options mentioned in the policy.", "props": [ @@ -8531,7 +8519,7 @@ ] }, { - "uuid": "149b88d5-2ee4-4228-9cc1-780e34f994b4", + "uuid": "38d3cd64-4862-4be7-93a2-61e8325a6bc8", "control-id": "cis_rhel10_5-3.2.2.4", "description": "No notes for control-id 5.3.2.2.4.", "props": [ @@ -8548,7 +8536,7 @@ ] }, { - "uuid": "d5e0f4aa-3b9e-46be-b869-909ce3fc5534", + "uuid": "fc16998a-6575-4969-8cae-43e5e9ff601b", "control-id": "cis_rhel10_5-3.2.2.5", "description": "No notes for control-id 5.3.2.2.5.", "props": [ @@ -8565,7 +8553,7 @@ ] }, { - "uuid": "a1d6ee4f-aa08-427b-895d-bde8dc1b594c", + "uuid": "c28ad803-a8e5-40fb-9202-fe1b0dddbdce", "control-id": "cis_rhel10_5-3.2.2.6", "description": "No notes for control-id 5.3.2.2.6.", "props": [ @@ -8582,7 +8570,7 @@ ] }, { - "uuid": "c9d3883c-5208-4ef2-b996-45dee904716d", + "uuid": "cf21c41d-d50c-47ba-9289-394155b45a5d", "control-id": "cis_rhel10_5-3.2.2.7", "description": "No notes for control-id 5.3.2.2.7.", "props": [ @@ -8599,7 +8587,7 @@ ] }, { - "uuid": "8eac0729-e552-46e9-a780-096b49fc81c5", + "uuid": "db7aa63a-2416-461c-8fed-de068bcaffb5", "control-id": "cis_rhel10_5-3.2.3.1", "description": "Although mentioned in the section 5.3.3.3, there is no explicit requirement to configure\nretry option of pam_pwhistory. If come in the future, the rule accounts_password_pam_retry\ncan be used.", "props": [ @@ -8621,7 +8609,7 @@ ] }, { - "uuid": "87b29fd6-7439-491b-b251-0c0ff492b619", + "uuid": "d0060417-f996-4f01-b291-096012427f44", "control-id": "cis_rhel10_5-3.2.3.2", "description": "No notes for control-id 5.3.2.3.2.", "props": [ @@ -8638,7 +8626,7 @@ ] }, { - "uuid": "af472ab5-2e3b-401d-86e2-4afb2f05e0fa", + "uuid": "ddbef876-d56b-4dc0-8259-f4a4e32713e7", "control-id": "cis_rhel10_5-3.2.3.3", "description": "In RHEL 10 pam_pwhistory is enabled via authselect feature, as required in 5.3.1.4. The\nfeature automatically set \"use_authok\" option. In any case, we don't have a rule to check\nthis option specifically.", "props": [ @@ -8655,7 +8643,7 @@ ] }, { - "uuid": "0693c6aa-d76e-4f92-ad65-1a2c31603ff5", + "uuid": "1c9876ed-a08e-4c56-81d4-9a000a37563e", "control-id": "cis_rhel10_5-3.2.4.1", "description": "The rule more specifically used in this requirement also satify the requirement 5.3.1.5.", "props": [ @@ -8672,7 +8660,7 @@ ] }, { - "uuid": "a3b5e311-ff4e-4a1a-bb4e-84d7ea872013", + "uuid": "6285585d-3398-4ad0-8f51-2c806ac5b748", "control-id": "cis_rhel10_5-3.2.4.2", "description": "Usage of pam_unix.so module together with \"remember\" option is deprecated and is not\nrecommended by this policy. Instead, it should be used remember option of pam_pwhistory\nmodule, as required in 5.3.2.3.1. See here for more details about pam_unix.so:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1778929", "props": [ @@ -8689,7 +8677,7 @@ ] }, { - "uuid": "d5040386-62a1-4871-8a75-c908b28b858b", + "uuid": "9a607215-355d-4164-9a3b-20de728eb625", "control-id": "cis_rhel10_5-3.2.4.3", "description": "Changes in logindefs mentioned in this requirement are more specifically covered by 5.4.1.4", "props": [ @@ -8711,7 +8699,7 @@ ] }, { - "uuid": "73e3cbc1-4a7d-425b-9f98-a758cf4fcf9f", + "uuid": "1885135e-e196-43b6-aac7-02d7bcd1ce2b", "control-id": "cis_rhel10_5-3.2.4.4", "description": "In RHEL 10 pam_unix is enabled by default in all authselect profiles already with the\nuse_authtok option set. In any case, we don't have a rule to check this option specifically,\nlike in 5.3.2.3.3.", "props": [ @@ -8728,7 +8716,7 @@ ] }, { - "uuid": "b2bd6696-e376-44d8-a2df-560f7cdccb0d", + "uuid": "2bb05f78-a826-4431-89ee-b6e8b9694d8d", "control-id": "cis_rhel10_5-4.1.1", "description": "No notes for control-id 5.4.1.1.", "props": [ @@ -8750,7 +8738,7 @@ ] }, { - "uuid": "a09018f2-c888-4c49-8433-caf68aa0ab2e", + "uuid": "85e82fba-680a-4e88-a2dc-09add8418923", "control-id": "cis_rhel10_5-4.1.3", "description": "No notes for control-id 5.4.1.3.", "props": [ @@ -8772,20 +8760,15 @@ ] }, { - "uuid": "724f57f0-2639-459b-bdbd-38eb480bd83a", + "uuid": "75bd666d-e463-468c-93d6-802a9b1c136c", "control-id": "cis_rhel10_5-4.1.4", - "description": "There's a \"new\" set of options in /etc/login.defs file to define the number of iterations\nperformed during the hashing process.", + "description": "No notes for control-id 5.4.1.4.", "props": [ { "name": "implementation-status", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "implemented" }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_libuserconf" - }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", @@ -8794,7 +8777,7 @@ ] }, { - "uuid": "6338f465-2bdc-4cd7-861a-12fd06c36fc8", + "uuid": "13b79e37-0176-4cc9-8eaf-c473a9ecaeef", "control-id": "cis_rhel10_5-4.1.5", "description": "No notes for control-id 5.4.1.5.", "props": [ @@ -8816,7 +8799,7 @@ ] }, { - "uuid": "c4d3c10c-d351-40b5-b969-a65af353fe3f", + "uuid": "4275e8ed-6f54-4bcf-bca4-58ff66fd311a", "control-id": "cis_rhel10_5-4.1.6", "description": "No notes for control-id 5.4.1.6.", "props": [ @@ -8833,7 +8816,7 @@ ] }, { - "uuid": "b65949c9-7316-421f-b671-614152b30011", + "uuid": "d846056e-7f1b-492c-a74c-d827af2d16a4", "control-id": "cis_rhel10_5-4.2.1", "description": "No notes for control-id 5.4.2.1.", "props": [ @@ -8850,7 +8833,7 @@ ] }, { - "uuid": "8ecee370-fb00-4c13-b332-243046e3d291", + "uuid": "69a66688-7166-4293-9f58-563bb08e7229", "control-id": "cis_rhel10_5-4.2.2", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -8867,7 +8850,7 @@ ] }, { - "uuid": "7f05eb63-32a5-4480-8ff0-06fe9fb78ad9", + "uuid": "d7b59233-5339-43b7-b210-eb72da80a016", "control-id": "cis_rhel10_5-4.2.3", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -8884,7 +8867,7 @@ ] }, { - "uuid": "85ff8400-c171-4937-8e42-2395f384f520", + "uuid": "7c9b824f-3203-4247-8312-0beecff0bd08", "control-id": "cis_rhel10_5-4.2.4", "description": "No notes for control-id 5.4.2.4.", "props": [ @@ -8901,7 +8884,7 @@ ] }, { - "uuid": "dc19c1fa-c21d-4d84-b356-944e6945569f", + "uuid": "1a159744-ebe3-4d0c-8ea0-aeb561c1f4b9", "control-id": "cis_rhel10_5-4.2.5", "description": "No notes for control-id 5.4.2.5.", "props": [ @@ -8923,7 +8906,7 @@ ] }, { - "uuid": "ef5af83f-7fb4-4068-9e5b-91683617046b", + "uuid": "623c588b-6fa2-42dd-894e-19dc978f610b", "control-id": "cis_rhel10_5-4.2.6", "description": "No notes for control-id 5.4.2.6.", "props": [ @@ -8940,7 +8923,7 @@ ] }, { - "uuid": "fbce1357-9300-430d-ba3c-57a365a0ee20", + "uuid": "02c7c511-e1c9-4583-af97-f889c1937a64", "control-id": "cis_rhel10_5-4.2.7", "description": "No notes for control-id 5.4.2.7.", "props": [ @@ -8962,7 +8945,7 @@ ] }, { - "uuid": "8f0a8564-b090-41d4-b86e-27c427451fca", + "uuid": "80754774-1bdc-4c57-86f1-19dacec98652", "control-id": "cis_rhel10_5-4.2.8", "description": "No notes for control-id 5.4.2.8.", "props": [ @@ -8979,7 +8962,7 @@ ] }, { - "uuid": "314b8d68-6420-440f-b4ca-3e2c5b74f33e", + "uuid": "9e5ed00f-6e35-4436-a16d-9c2472335b19", "control-id": "cis_rhel10_5-4.3.2", "description": "No notes for control-id 5.4.3.2.", "props": [ @@ -8996,7 +8979,7 @@ ] }, { - "uuid": "9c9be71d-517a-4ea3-907a-a89b64532157", + "uuid": "31e431ad-24f5-4b38-928a-c62e7da38141", "control-id": "cis_rhel10_5-4.3.3", "description": "No notes for control-id 5.4.3.3.", "props": [ @@ -9023,7 +9006,7 @@ ] }, { - "uuid": "0de4d8f8-cee5-42bd-bece-9fd1c9781bda", + "uuid": "af37dbd8-ee07-4bd6-b67c-17b0ea266fb7", "control-id": "cis_rhel10_6-1.1", "description": "No notes for control-id 6.1.1.", "props": [ @@ -9045,7 +9028,7 @@ ] }, { - "uuid": "9f1f2521-a9d3-4b7e-b78b-1d96d30d4c72", + "uuid": "f4139eeb-2586-472a-81ef-a1c1057ab458", "control-id": "cis_rhel10_6-1.2", "description": "No notes for control-id 6.1.2.", "props": [ @@ -9062,7 +9045,7 @@ ] }, { - "uuid": "0d175fa4-755d-4edf-9878-29008d13260e", + "uuid": "dcd29f35-d21f-4d0c-9f67-fe56c918c1dd", "control-id": "cis_rhel10_6-1.3", "description": "No notes for control-id 6.1.3.", "props": [ @@ -9079,7 +9062,7 @@ ] }, { - "uuid": "37533e7a-3458-4a8b-934f-56ff5fc1fa5f", + "uuid": "0d20bc6f-0d51-483a-8ab6-f0d19b0adf56", "control-id": "cis_rhel10_6-2.1.1", "description": "No notes for control-id 6.2.1.1.", "props": [ @@ -9096,7 +9079,7 @@ ] }, { - "uuid": "699b2ab1-e1cf-42b7-9702-971731828a13", + "uuid": "36babe28-70c0-48bd-ade6-bccff3787653", "control-id": "cis_rhel10_6-2.1.2", "description": "The description for control-id cis_rhel10_6-2.1.2.", "props": [ @@ -9109,7 +9092,7 @@ ] }, { - "uuid": "fcb0f5ee-4fce-4804-b4c0-f5705a9adf4c", + "uuid": "f8e04f80-b516-4a68-8f09-db0428392bea", "control-id": "cis_rhel10_6-2.1.3", "description": "The description for control-id cis_rhel10_6-2.1.3.", "props": [ @@ -9122,7 +9105,7 @@ ] }, { - "uuid": "b93568df-8907-41ab-9693-c8ba8c40b6ef", + "uuid": "aad55703-dfb4-4570-9262-ec234add1474", "control-id": "cis_rhel10_6-2.1.4", "description": "No notes for control-id 6.2.1.4.", "props": [ @@ -9139,7 +9122,7 @@ ] }, { - "uuid": "35fcffa5-0830-45e8-a7cf-a8a4c0a041d3", + "uuid": "0afb4d08-f50b-4740-bfd7-8910d6d5da3a", "control-id": "cis_rhel10_6-2.2.1.1", "description": "No notes for control-id 6.2.2.1.1.", "props": [ @@ -9156,7 +9139,7 @@ ] }, { - "uuid": "48c6a085-e8ed-4025-8915-df23c9056db5", + "uuid": "81b591c1-cdc0-4639-9a40-a2e7a607d971", "control-id": "cis_rhel10_6-2.2.1.2", "description": "The description for control-id cis_rhel10_6-2.2.1.2.", "props": [ @@ -9169,7 +9152,7 @@ ] }, { - "uuid": "a5a3afd4-cd7b-452b-907a-86b7e77b876e", + "uuid": "7e06fe24-f5ff-4600-b20d-ac7731febce1", "control-id": "cis_rhel10_6-2.2.1.3", "description": "No notes for control-id 6.2.2.1.3.", "props": [ @@ -9186,7 +9169,7 @@ ] }, { - "uuid": "6b7dac15-a52d-49e8-ac81-0e755d0943cb", + "uuid": "a9ed9a07-680f-45ab-a4bb-0f3f2d7e279a", "control-id": "cis_rhel10_6-2.2.1.4", "description": "No notes for control-id 6.2.2.1.4.", "props": [ @@ -9203,7 +9186,7 @@ ] }, { - "uuid": "3cf344c5-bdf9-40a7-a588-7d3ac0be4e1a", + "uuid": "07948077-4b5c-4e30-be1a-94a11e335e6c", "control-id": "cis_rhel10_6-2.2.2", "description": "No notes for control-id 6.2.2.2.", "props": [ @@ -9220,7 +9203,7 @@ ] }, { - "uuid": "e46ac01a-f56b-406a-8415-d796b369d30e", + "uuid": "8dbe3f4c-ebb3-437b-8f70-8047f7f3c5a6", "control-id": "cis_rhel10_6-2.2.3", "description": "No notes for control-id 6.2.2.3.", "props": [ @@ -9237,7 +9220,7 @@ ] }, { - "uuid": "0282d197-e276-40d9-94ba-7094fbe2471d", + "uuid": "115358e7-f60c-4574-80e5-7723b87c0cd3", "control-id": "cis_rhel10_6-2.2.4", "description": "No notes for control-id 6.2.2.4.", "props": [ @@ -9254,7 +9237,7 @@ ] }, { - "uuid": "3062d8a7-a9a6-4865-9c43-44c85c775dd3", + "uuid": "68e6c3d5-3bd5-4178-bb42-d14908571b6b", "control-id": "cis_rhel10_6-2.3.1", "description": "No notes for control-id 6.2.3.1.", "props": [ @@ -9266,7 +9249,7 @@ ] }, { - "uuid": "965a8a96-379b-49c9-aa2c-fd98143c90c5", + "uuid": "1fc81c03-2179-4a3a-b652-bbcfaf359c99", "control-id": "cis_rhel10_6-2.3.2", "description": "No notes for control-id 6.2.3.2.", "props": [ @@ -9278,7 +9261,7 @@ ] }, { - "uuid": "58bd4603-259e-4d69-b014-620f75aa1de7", + "uuid": "e251e1cb-2b3a-4559-99e4-9b72f340148d", "control-id": "cis_rhel10_6-2.3.3", "description": "No notes for control-id 6.2.3.3.", "props": [ @@ -9290,7 +9273,7 @@ ] }, { - "uuid": "01028ab5-be1d-4aa9-a895-1fe3bea44919", + "uuid": "d89eb4d3-916d-45dd-99fa-cff3729eaa7d", "control-id": "cis_rhel10_6-2.3.4", "description": "No notes for control-id 6.2.3.4.", "props": [ @@ -9302,7 +9285,7 @@ ] }, { - "uuid": "8649ee5c-bce7-4c5c-99a1-1fa2b4d41a14", + "uuid": "63c948f1-52a0-4e61-8d9b-4243d6744d8c", "control-id": "cis_rhel10_6-2.3.5", "description": "The description for control-id cis_rhel10_6-2.3.5.", "props": [ @@ -9315,7 +9298,7 @@ ] }, { - "uuid": "62766904-6681-4b88-8a08-f39a058987cb", + "uuid": "474d9579-cf60-47df-8c88-515eab585190", "control-id": "cis_rhel10_6-2.3.6", "description": "The description for control-id cis_rhel10_6-2.3.6.", "props": [ @@ -9328,7 +9311,7 @@ ] }, { - "uuid": "46f1649b-87af-4968-aa50-3921e6d5aa0c", + "uuid": "5261397b-a940-4765-a975-48860289593c", "control-id": "cis_rhel10_6-2.3.7", "description": "No notes for control-id 6.2.3.7.", "props": [ @@ -9340,7 +9323,7 @@ ] }, { - "uuid": "8b800f28-a37e-480d-b327-0a383406a383", + "uuid": "68fb67a5-4bb8-43ae-8538-d5b6afd1a520", "control-id": "cis_rhel10_6-2.3.8", "description": "The description for control-id cis_rhel10_6-2.3.8.", "props": [ @@ -9353,7 +9336,7 @@ ] }, { - "uuid": "5fd931aa-49bb-459d-a2d8-3e09b8f9bd1f", + "uuid": "0297126d-93b3-47d3-8870-0940091d78b5", "control-id": "cis_rhel10_6-2.4.1", "description": "It is not harmful to run these rules even if rsyslog is not installed or active.", "props": [ @@ -9380,7 +9363,7 @@ ] }, { - "uuid": "649b611d-6872-4a43-b9c4-c43e58b83ccf", + "uuid": "9967afd9-1412-4113-892f-d3b28f70ffe2", "control-id": "cis_rhel10_7-1.1", "description": "No notes for control-id 7.1.1.", "props": [ @@ -9407,7 +9390,7 @@ ] }, { - "uuid": "465ab414-5bd8-46de-87a3-818fd050fe86", + "uuid": "4f0b7981-764c-44e8-b8b0-f1ba8ac4266f", "control-id": "cis_rhel10_7-1.2", "description": "No notes for control-id 7.1.2.", "props": [ @@ -9434,7 +9417,7 @@ ] }, { - "uuid": "647c055f-87a2-44fc-a0f8-1a46359732a6", + "uuid": "fc89082a-e324-4e8b-a224-6be3442233c1", "control-id": "cis_rhel10_7-1.3", "description": "No notes for control-id 7.1.3.", "props": [ @@ -9461,7 +9444,7 @@ ] }, { - "uuid": "a719a274-872f-4902-bf6b-4eea19a0317c", + "uuid": "805f6779-39d7-4c01-ace4-db0dcec96e9a", "control-id": "cis_rhel10_7-1.4", "description": "No notes for control-id 7.1.4.", "props": [ @@ -9488,7 +9471,7 @@ ] }, { - "uuid": "7f79385a-f891-4299-ad22-7abb9ad44432", + "uuid": "070986b5-dbbb-4daa-a413-6a4339e03e28", "control-id": "cis_rhel10_7-1.5", "description": "No notes for control-id 7.1.5.", "props": [ @@ -9515,7 +9498,7 @@ ] }, { - "uuid": "909163e6-80dc-489e-b3fc-5b9aaa898d5f", + "uuid": "092af746-200a-44c1-937b-d2154a651932", "control-id": "cis_rhel10_7-1.6", "description": "No notes for control-id 7.1.6.", "props": [ @@ -9542,7 +9525,7 @@ ] }, { - "uuid": "8aa0ff6b-4aea-4e97-8915-3852c24a50e0", + "uuid": "e2618589-6a6f-45dc-b75f-deb262db0616", "control-id": "cis_rhel10_7-1.7", "description": "No notes for control-id 7.1.7.", "props": [ @@ -9569,7 +9552,7 @@ ] }, { - "uuid": "71cf21cf-35b0-4686-be98-eaaf37163aaa", + "uuid": "98c71397-028c-4b6a-a1ac-c0d6c02bc79a", "control-id": "cis_rhel10_7-1.8", "description": "No notes for control-id 7.1.8.", "props": [ @@ -9596,7 +9579,7 @@ ] }, { - "uuid": "4b5ca264-b102-4803-90be-9186f06c66d9", + "uuid": "9fe32b09-74e5-44cf-97d8-3fa83356cba6", "control-id": "cis_rhel10_7-1.9", "description": "No notes for control-id 7.1.9.", "props": [ @@ -9623,7 +9606,7 @@ ] }, { - "uuid": "99ee21ce-6acd-43d6-9163-9ce1481338e7", + "uuid": "95839387-55cc-4f17-8cd7-9ac744886234", "control-id": "cis_rhel10_7-1.10", "description": "No notes for control-id 7.1.10.", "props": [ @@ -9665,7 +9648,7 @@ ] }, { - "uuid": "e5c1fa3e-b15c-4988-8565-299612301f6d", + "uuid": "8409eaad-0022-4609-9a8e-6c5914494913", "control-id": "cis_rhel10_7-1.11", "description": "No notes for control-id 7.1.11.", "props": [ @@ -9687,7 +9670,7 @@ ] }, { - "uuid": "8acfeee9-b9e1-4a7d-ade5-bf3270eb6f31", + "uuid": "8b72ed5c-f08f-40af-a2b1-6e0a08029df0", "control-id": "cis_rhel10_7-1.12", "description": "No notes for control-id 7.1.12.", "props": [ @@ -9709,7 +9692,7 @@ ] }, { - "uuid": "c74092b6-95c2-466d-820a-45f9e50a472d", + "uuid": "a10bf533-dfe3-4849-845e-0b7a3753aec6", "control-id": "cis_rhel10_7-1.13", "description": "The description for control-id cis_rhel10_7-1.13.", "props": [ @@ -9722,7 +9705,7 @@ ] }, { - "uuid": "a98e0a68-bb36-451f-a634-1aafa67f39a8", + "uuid": "0de49c53-9b0e-4cfb-99c6-bfabe2c74372", "control-id": "cis_rhel10_7-2.1", "description": "No notes for control-id 7.2.1.", "props": [ @@ -9739,7 +9722,7 @@ ] }, { - "uuid": "440f2c71-77f7-4dcf-acae-d286ebd763d4", + "uuid": "9be05aaf-6af4-4272-a84c-a3ada2e5ff9b", "control-id": "cis_rhel10_7-2.2", "description": "No notes for control-id 7.2.2.", "props": [ @@ -9756,7 +9739,7 @@ ] }, { - "uuid": "1634920c-4a44-4abe-944a-8d24f1b1ecb0", + "uuid": "34940517-709e-4b94-8f00-322404de2b29", "control-id": "cis_rhel10_7-2.3", "description": "No notes for control-id 7.2.3.", "props": [ @@ -9773,7 +9756,7 @@ ] }, { - "uuid": "14c7a83d-415c-4b22-8fd6-724d75fce2e7", + "uuid": "9f2cc62a-f35f-443e-ae2c-85d4a802a1c8", "control-id": "cis_rhel10_7-2.4", "description": "No notes for control-id 7.2.4.", "props": [ @@ -9790,7 +9773,7 @@ ] }, { - "uuid": "209ad33c-9e9b-4b8d-838f-439dd4b6e620", + "uuid": "bad96c19-5dce-41a9-8d43-2b9e3cea3681", "control-id": "cis_rhel10_7-2.5", "description": "No notes for control-id 7.2.5.", "props": [ @@ -9807,7 +9790,7 @@ ] }, { - "uuid": "45acef36-1cb4-42fc-93a5-354e13d65c88", + "uuid": "f524c6d6-2508-4c68-b4e8-b086566e1154", "control-id": "cis_rhel10_7-2.6", "description": "No notes for control-id 7.2.6.", "props": [ @@ -9824,7 +9807,7 @@ ] }, { - "uuid": "1918c54b-03ff-458d-a297-bcf9fce862d5", + "uuid": "922e8352-0eae-4b1d-a0f1-5be2a12fffb1", "control-id": "cis_rhel10_7-2.7", "description": "No notes for control-id 7.2.7.", "props": [ @@ -9841,7 +9824,7 @@ ] }, { - "uuid": "010607f1-a0fc-4544-a08b-ea7718b61377", + "uuid": "5bc4a76c-3516-43be-8804-f82481b78456", "control-id": "cis_rhel10_7-2.8", "description": "No notes for control-id 7.2.8.", "props": [ @@ -9868,7 +9851,7 @@ ] }, { - "uuid": "4bfd384b-b5c5-4ff4-ba7c-40427274534a", + "uuid": "bacfbca3-e912-4c8a-ae68-bf87a8c96d96", "control-id": "cis_rhel10_7-2.9", "description": "No notes for control-id 7.2.9.", "props": [ @@ -10652,7 +10635,7 @@ { "name": "Parameter_Value_Alternatives_38", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -10670,7 +10653,7 @@ { "name": "Parameter_Value_Alternatives_39", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -16574,2143 +16557,2119 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_libuserconf", + "value": "set_password_hashing_algorithm_logindefs", "remarks": "rule_set_234" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Hashing Algorithm in /etc/libuser.conf", + "value": "Set Password Hashing Algorithm in /etc/login.defs", "remarks": "rule_set_234" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_libuserconf", + "value": "set_password_hashing_algorithm_logindefs", "remarks": "rule_set_234" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Hashing Algorithm in /etc/libuser.conf", + "value": "Set Password Hashing Algorithm in /etc/login.defs", "remarks": "rule_set_234" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_logindefs", + "value": "account_disable_post_pw_expiration", "remarks": "rule_set_235" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Hashing Algorithm in /etc/login.defs", + "value": "Set Account Expiration Following Inactivity", "remarks": "rule_set_235" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_logindefs", + "value": "account_disable_post_pw_expiration", "remarks": "rule_set_235" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Hashing Algorithm in /etc/login.defs", + "value": "Set Account Expiration Following Inactivity", "remarks": "rule_set_235" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "account_disable_post_pw_expiration", + "value": "accounts_set_post_pw_existing", "remarks": "rule_set_236" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Account Expiration Following Inactivity", + "value": "Set existing passwords a period of inactivity before they been locked", "remarks": "rule_set_236" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "account_disable_post_pw_expiration", + "value": "accounts_set_post_pw_existing", "remarks": "rule_set_236" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Account Expiration Following Inactivity", + "value": "Set existing passwords a period of inactivity before they been locked", "remarks": "rule_set_236" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_set_post_pw_existing", + "value": "accounts_password_last_change_is_in_past", "remarks": "rule_set_237" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set existing passwords a period of inactivity before they been locked", + "value": "Ensure all users last password change date is in the past", "remarks": "rule_set_237" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_set_post_pw_existing", + "value": "accounts_password_last_change_is_in_past", "remarks": "rule_set_237" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set existing passwords a period of inactivity before they been locked", + "value": "Ensure all users last password change date is in the past", "remarks": "rule_set_237" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_last_change_is_in_past", + "value": "accounts_no_uid_except_zero", "remarks": "rule_set_238" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure all users last password change date is in the past", + "value": "Verify Only Root Has UID 0", "remarks": "rule_set_238" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_last_change_is_in_past", + "value": "accounts_no_uid_except_zero", "remarks": "rule_set_238" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure all users last password change date is in the past", + "value": "Verify Only Root Has UID 0", "remarks": "rule_set_238" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_no_uid_except_zero", + "value": "accounts_root_gid_zero", "remarks": "rule_set_239" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Only Root Has UID 0", + "value": "Verify Root Has A Primary GID 0", "remarks": "rule_set_239" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_no_uid_except_zero", + "value": "accounts_root_gid_zero", "remarks": "rule_set_239" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Only Root Has UID 0", + "value": "Verify Root Has A Primary GID 0", "remarks": "rule_set_239" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_root_gid_zero", + "value": "groups_no_zero_gid_except_root", "remarks": "rule_set_240" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Root Has A Primary GID 0", + "value": "Verify Only Group Root Has GID 0", "remarks": "rule_set_240" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_root_gid_zero", + "value": "groups_no_zero_gid_except_root", "remarks": "rule_set_240" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Root Has A Primary GID 0", + "value": "Verify Only Group Root Has GID 0", "remarks": "rule_set_240" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "groups_no_zero_gid_except_root", + "value": "ensure_root_password_configured", "remarks": "rule_set_241" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Only Group Root Has GID 0", + "value": "Ensure Authentication Required for Single User Mode", "remarks": "rule_set_241" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "groups_no_zero_gid_except_root", + "value": "ensure_root_password_configured", "remarks": "rule_set_241" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Only Group Root Has GID 0", + "value": "Ensure Authentication Required for Single User Mode", "remarks": "rule_set_241" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_root_password_configured", + "value": "accounts_root_path_dirs_no_write", "remarks": "rule_set_242" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Authentication Required for Single User Mode", + "value": "Ensure that Root's Path Does Not Include World or Group-Writable Directories", "remarks": "rule_set_242" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_root_password_configured", + "value": "accounts_root_path_dirs_no_write", "remarks": "rule_set_242" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Authentication Required for Single User Mode", + "value": "Ensure that Root's Path Does Not Include World or Group-Writable Directories", "remarks": "rule_set_242" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_root_path_dirs_no_write", + "value": "root_path_no_dot", "remarks": "rule_set_243" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that Root's Path Does Not Include World or Group-Writable Directories", + "value": "Ensure that Root's Path Does Not Include Relative Paths or Null Directories", "remarks": "rule_set_243" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_root_path_dirs_no_write", + "value": "root_path_no_dot", "remarks": "rule_set_243" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that Root's Path Does Not Include World or Group-Writable Directories", + "value": "Ensure that Root's Path Does Not Include Relative Paths or Null Directories", "remarks": "rule_set_243" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "root_path_no_dot", + "value": "accounts_umask_root", "remarks": "rule_set_244" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that Root's Path Does Not Include Relative Paths or Null Directories", + "value": "Ensure the Root Bash Umask is Set Correctly", "remarks": "rule_set_244" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "root_path_no_dot", + "value": "accounts_umask_root", "remarks": "rule_set_244" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that Root's Path Does Not Include Relative Paths or Null Directories", + "value": "Ensure the Root Bash Umask is Set Correctly", "remarks": "rule_set_244" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_root", + "value": "no_password_auth_for_systemaccounts", "remarks": "rule_set_245" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Root Bash Umask is Set Correctly", + "value": "Ensure that System Accounts Are Locked", "remarks": "rule_set_245" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_root", + "value": "no_password_auth_for_systemaccounts", "remarks": "rule_set_245" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Root Bash Umask is Set Correctly", + "value": "Ensure that System Accounts Are Locked", "remarks": "rule_set_245" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_password_auth_for_systemaccounts", + "value": "no_shelllogin_for_systemaccounts", "remarks": "rule_set_246" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that System Accounts Are Locked", + "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", "remarks": "rule_set_246" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_password_auth_for_systemaccounts", + "value": "no_shelllogin_for_systemaccounts", "remarks": "rule_set_246" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that System Accounts Are Locked", + "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", "remarks": "rule_set_246" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_shelllogin_for_systemaccounts", + "value": "no_invalid_shell_accounts_unlocked", "remarks": "rule_set_247" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", + "value": "Verify Non-Interactive Accounts Are Locked", "remarks": "rule_set_247" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_shelllogin_for_systemaccounts", + "value": "no_invalid_shell_accounts_unlocked", "remarks": "rule_set_247" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", + "value": "Verify Non-Interactive Accounts Are Locked", "remarks": "rule_set_247" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_invalid_shell_accounts_unlocked", + "value": "accounts_tmout", "remarks": "rule_set_248" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Non-Interactive Accounts Are Locked", + "value": "Set Interactive Session Timeout", "remarks": "rule_set_248" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_invalid_shell_accounts_unlocked", + "value": "accounts_tmout", "remarks": "rule_set_248" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Non-Interactive Accounts Are Locked", + "value": "Set Interactive Session Timeout", "remarks": "rule_set_248" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_tmout", + "value": "accounts_umask_etc_bashrc", "remarks": "rule_set_249" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Interactive Session Timeout", + "value": "Ensure the Default Bash Umask is Set Correctly", "remarks": "rule_set_249" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_tmout", + "value": "accounts_umask_etc_bashrc", "remarks": "rule_set_249" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Interactive Session Timeout", + "value": "Ensure the Default Bash Umask is Set Correctly", "remarks": "rule_set_249" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_bashrc", + "value": "accounts_umask_etc_login_defs", "remarks": "rule_set_250" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Bash Umask is Set Correctly", + "value": "Ensure the Default Umask is Set Correctly in login.defs", "remarks": "rule_set_250" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_bashrc", + "value": "accounts_umask_etc_login_defs", "remarks": "rule_set_250" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Bash Umask is Set Correctly", + "value": "Ensure the Default Umask is Set Correctly in login.defs", "remarks": "rule_set_250" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_login_defs", + "value": "accounts_umask_etc_profile", "remarks": "rule_set_251" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Umask is Set Correctly in login.defs", + "value": "Ensure the Default Umask is Set Correctly in /etc/profile", "remarks": "rule_set_251" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_login_defs", + "value": "accounts_umask_etc_profile", "remarks": "rule_set_251" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Umask is Set Correctly in login.defs", + "value": "Ensure the Default Umask is Set Correctly in /etc/profile", "remarks": "rule_set_251" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_profile", + "value": "package_aide_installed", "remarks": "rule_set_252" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Umask is Set Correctly in /etc/profile", + "value": "Install AIDE", "remarks": "rule_set_252" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_profile", + "value": "package_aide_installed", "remarks": "rule_set_252" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Umask is Set Correctly in /etc/profile", - "remarks": "rule_set_252" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_aide_installed", - "remarks": "rule_set_253" - }, - { - "name": "Rule_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_253" - }, - { - "name": "Check_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_aide_installed", - "remarks": "rule_set_253" - }, - { - "name": "Check_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install AIDE", - "remarks": "rule_set_253" + "remarks": "rule_set_252" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_build_database", - "remarks": "rule_set_254" + "remarks": "rule_set_253" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Build and Test AIDE Database", - "remarks": "rule_set_254" + "remarks": "rule_set_253" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_build_database", - "remarks": "rule_set_254" + "remarks": "rule_set_253" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Build and Test AIDE Database", - "remarks": "rule_set_254" + "remarks": "rule_set_253" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_periodic_cron_checking", - "remarks": "rule_set_255" + "remarks": "rule_set_254" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Periodic Execution of AIDE", - "remarks": "rule_set_255" + "remarks": "rule_set_254" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_periodic_cron_checking", - "remarks": "rule_set_255" + "remarks": "rule_set_254" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Periodic Execution of AIDE", - "remarks": "rule_set_255" + "remarks": "rule_set_254" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_check_audit_tools", - "remarks": "rule_set_256" + "remarks": "rule_set_255" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure AIDE to Verify the Audit Tools", - "remarks": "rule_set_256" + "remarks": "rule_set_255" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_check_audit_tools", - "remarks": "rule_set_256" + "remarks": "rule_set_255" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure AIDE to Verify the Audit Tools", - "remarks": "rule_set_256" + "remarks": "rule_set_255" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journald_enabled", - "remarks": "rule_set_257" + "remarks": "rule_set_256" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journald Service", - "remarks": "rule_set_257" + "remarks": "rule_set_256" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journald_enabled", - "remarks": "rule_set_257" + "remarks": "rule_set_256" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journald Service", - "remarks": "rule_set_257" + "remarks": "rule_set_256" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_journald_and_rsyslog_not_active_together", - "remarks": "rule_set_258" + "remarks": "rule_set_257" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald and rsyslog Are Not Active Together", - "remarks": "rule_set_258" + "remarks": "rule_set_257" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_journald_and_rsyslog_not_active_together", - "remarks": "rule_set_258" + "remarks": "rule_set_257" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald and rsyslog Are Not Active Together", - "remarks": "rule_set_258" + "remarks": "rule_set_257" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_systemd-journal-remote_installed", - "remarks": "rule_set_259" + "remarks": "rule_set_258" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install systemd-journal-remote Package", - "remarks": "rule_set_259" + "remarks": "rule_set_258" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_systemd-journal-remote_installed", - "remarks": "rule_set_259" + "remarks": "rule_set_258" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install systemd-journal-remote Package", - "remarks": "rule_set_259" + "remarks": "rule_set_258" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journal-upload_enabled", - "remarks": "rule_set_260" + "remarks": "rule_set_259" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journal-upload Service", - "remarks": "rule_set_260" + "remarks": "rule_set_259" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journal-upload_enabled", - "remarks": "rule_set_260" + "remarks": "rule_set_259" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journal-upload Service", - "remarks": "rule_set_260" + "remarks": "rule_set_259" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "socket_systemd-journal-remote_disabled", - "remarks": "rule_set_261" + "remarks": "rule_set_260" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable systemd-journal-remote Socket", - "remarks": "rule_set_261" + "remarks": "rule_set_260" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "socket_systemd-journal-remote_disabled", - "remarks": "rule_set_261" + "remarks": "rule_set_260" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable systemd-journal-remote Socket", - "remarks": "rule_set_261" + "remarks": "rule_set_260" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_disable_forward_to_syslog", - "remarks": "rule_set_262" + "remarks": "rule_set_261" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald ForwardToSyslog is disabled", - "remarks": "rule_set_262" + "remarks": "rule_set_261" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_disable_forward_to_syslog", - "remarks": "rule_set_262" + "remarks": "rule_set_261" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald ForwardToSyslog is disabled", - "remarks": "rule_set_262" + "remarks": "rule_set_261" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_compress", - "remarks": "rule_set_263" + "remarks": "rule_set_262" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to compress large log files", - "remarks": "rule_set_263" + "remarks": "rule_set_262" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_compress", - "remarks": "rule_set_263" + "remarks": "rule_set_262" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to compress large log files", - "remarks": "rule_set_263" + "remarks": "rule_set_262" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_storage", - "remarks": "rule_set_264" + "remarks": "rule_set_263" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to write log files to persistent disk", - "remarks": "rule_set_264" + "remarks": "rule_set_263" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_storage", - "remarks": "rule_set_264" + "remarks": "rule_set_263" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to write log files to persistent disk", - "remarks": "rule_set_264" + "remarks": "rule_set_263" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_265" + "remarks": "rule_set_264" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_265" + "remarks": "rule_set_264" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_265" + "remarks": "rule_set_264" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_265" + "remarks": "rule_set_264" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_266" + "remarks": "rule_set_265" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_266" + "remarks": "rule_set_265" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_266" + "remarks": "rule_set_265" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_266" + "remarks": "rule_set_265" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_267" + "remarks": "rule_set_266" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_267" + "remarks": "rule_set_266" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_267" + "remarks": "rule_set_266" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_267" + "remarks": "rule_set_266" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_passwd", - "remarks": "rule_set_268" + "remarks": "rule_set_267" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns passwd File", - "remarks": "rule_set_268" + "remarks": "rule_set_267" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_passwd", - "remarks": "rule_set_268" + "remarks": "rule_set_267" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns passwd File", - "remarks": "rule_set_268" + "remarks": "rule_set_267" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_passwd", - "remarks": "rule_set_269" + "remarks": "rule_set_268" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns passwd File", - "remarks": "rule_set_269" + "remarks": "rule_set_268" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_passwd", - "remarks": "rule_set_269" + "remarks": "rule_set_268" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns passwd File", - "remarks": "rule_set_269" + "remarks": "rule_set_268" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_passwd", - "remarks": "rule_set_270" + "remarks": "rule_set_269" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on passwd File", - "remarks": "rule_set_270" + "remarks": "rule_set_269" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_passwd", - "remarks": "rule_set_270" + "remarks": "rule_set_269" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on passwd File", - "remarks": "rule_set_270" + "remarks": "rule_set_269" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_passwd", - "remarks": "rule_set_271" + "remarks": "rule_set_270" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup passwd File", - "remarks": "rule_set_271" + "remarks": "rule_set_270" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_passwd", - "remarks": "rule_set_271" + "remarks": "rule_set_270" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup passwd File", - "remarks": "rule_set_271" + "remarks": "rule_set_270" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_passwd", - "remarks": "rule_set_272" + "remarks": "rule_set_271" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup passwd File", - "remarks": "rule_set_272" + "remarks": "rule_set_271" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_passwd", - "remarks": "rule_set_272" + "remarks": "rule_set_271" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup passwd File", - "remarks": "rule_set_272" + "remarks": "rule_set_271" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_passwd", - "remarks": "rule_set_273" + "remarks": "rule_set_272" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup passwd File", - "remarks": "rule_set_273" + "remarks": "rule_set_272" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_passwd", - "remarks": "rule_set_273" + "remarks": "rule_set_272" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup passwd File", - "remarks": "rule_set_273" + "remarks": "rule_set_272" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_group", - "remarks": "rule_set_274" + "remarks": "rule_set_273" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns group File", - "remarks": "rule_set_274" + "remarks": "rule_set_273" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_group", - "remarks": "rule_set_274" + "remarks": "rule_set_273" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns group File", - "remarks": "rule_set_274" + "remarks": "rule_set_273" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_group", - "remarks": "rule_set_275" + "remarks": "rule_set_274" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns group File", - "remarks": "rule_set_275" + "remarks": "rule_set_274" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_group", - "remarks": "rule_set_275" + "remarks": "rule_set_274" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns group File", - "remarks": "rule_set_275" + "remarks": "rule_set_274" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_group", - "remarks": "rule_set_276" + "remarks": "rule_set_275" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on group File", - "remarks": "rule_set_276" + "remarks": "rule_set_275" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_group", - "remarks": "rule_set_276" + "remarks": "rule_set_275" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on group File", - "remarks": "rule_set_276" + "remarks": "rule_set_275" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_group", - "remarks": "rule_set_277" + "remarks": "rule_set_276" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup group File", - "remarks": "rule_set_277" + "remarks": "rule_set_276" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_group", - "remarks": "rule_set_277" + "remarks": "rule_set_276" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup group File", - "remarks": "rule_set_277" + "remarks": "rule_set_276" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_group", - "remarks": "rule_set_278" + "remarks": "rule_set_277" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup group File", - "remarks": "rule_set_278" + "remarks": "rule_set_277" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_group", - "remarks": "rule_set_278" + "remarks": "rule_set_277" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup group File", - "remarks": "rule_set_278" + "remarks": "rule_set_277" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_group", - "remarks": "rule_set_279" + "remarks": "rule_set_278" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup group File", - "remarks": "rule_set_279" + "remarks": "rule_set_278" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_group", - "remarks": "rule_set_279" + "remarks": "rule_set_278" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup group File", - "remarks": "rule_set_279" + "remarks": "rule_set_278" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shadow", - "remarks": "rule_set_280" + "remarks": "rule_set_279" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns shadow File", - "remarks": "rule_set_280" + "remarks": "rule_set_279" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shadow", - "remarks": "rule_set_280" + "remarks": "rule_set_279" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns shadow File", - "remarks": "rule_set_280" + "remarks": "rule_set_279" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shadow", - "remarks": "rule_set_281" + "remarks": "rule_set_280" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns shadow File", - "remarks": "rule_set_281" + "remarks": "rule_set_280" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shadow", - "remarks": "rule_set_281" + "remarks": "rule_set_280" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns shadow File", - "remarks": "rule_set_281" + "remarks": "rule_set_280" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shadow", - "remarks": "rule_set_282" + "remarks": "rule_set_281" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on shadow File", - "remarks": "rule_set_282" + "remarks": "rule_set_281" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shadow", - "remarks": "rule_set_282" + "remarks": "rule_set_281" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on shadow File", - "remarks": "rule_set_282" + "remarks": "rule_set_281" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_shadow", - "remarks": "rule_set_283" + "remarks": "rule_set_282" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup shadow File", - "remarks": "rule_set_283" + "remarks": "rule_set_282" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_shadow", - "remarks": "rule_set_283" + "remarks": "rule_set_282" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup shadow File", - "remarks": "rule_set_283" + "remarks": "rule_set_282" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_shadow", - "remarks": "rule_set_284" + "remarks": "rule_set_283" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup shadow File", - "remarks": "rule_set_284" + "remarks": "rule_set_283" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_shadow", - "remarks": "rule_set_284" + "remarks": "rule_set_283" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup shadow File", - "remarks": "rule_set_284" + "remarks": "rule_set_283" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_shadow", - "remarks": "rule_set_285" + "remarks": "rule_set_284" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup shadow File", - "remarks": "rule_set_285" + "remarks": "rule_set_284" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_shadow", - "remarks": "rule_set_285" + "remarks": "rule_set_284" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup shadow File", - "remarks": "rule_set_285" + "remarks": "rule_set_284" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_gshadow", - "remarks": "rule_set_286" + "remarks": "rule_set_285" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns gshadow File", - "remarks": "rule_set_286" + "remarks": "rule_set_285" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_gshadow", - "remarks": "rule_set_286" + "remarks": "rule_set_285" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns gshadow File", - "remarks": "rule_set_286" + "remarks": "rule_set_285" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_gshadow", - "remarks": "rule_set_287" + "remarks": "rule_set_286" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns gshadow File", - "remarks": "rule_set_287" + "remarks": "rule_set_286" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_gshadow", - "remarks": "rule_set_287" + "remarks": "rule_set_286" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns gshadow File", - "remarks": "rule_set_287" + "remarks": "rule_set_286" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_gshadow", - "remarks": "rule_set_288" + "remarks": "rule_set_287" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on gshadow File", - "remarks": "rule_set_288" + "remarks": "rule_set_287" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_gshadow", - "remarks": "rule_set_288" + "remarks": "rule_set_287" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on gshadow File", - "remarks": "rule_set_288" + "remarks": "rule_set_287" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_gshadow", - "remarks": "rule_set_289" + "remarks": "rule_set_288" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup gshadow File", - "remarks": "rule_set_289" + "remarks": "rule_set_288" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_gshadow", - "remarks": "rule_set_289" + "remarks": "rule_set_288" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup gshadow File", - "remarks": "rule_set_289" + "remarks": "rule_set_288" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_gshadow", - "remarks": "rule_set_290" + "remarks": "rule_set_289" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup gshadow File", - "remarks": "rule_set_290" + "remarks": "rule_set_289" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_gshadow", - "remarks": "rule_set_290" + "remarks": "rule_set_289" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup gshadow File", - "remarks": "rule_set_290" + "remarks": "rule_set_289" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_gshadow", - "remarks": "rule_set_291" + "remarks": "rule_set_290" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup gshadow File", - "remarks": "rule_set_291" + "remarks": "rule_set_290" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_gshadow", - "remarks": "rule_set_291" + "remarks": "rule_set_290" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup gshadow File", - "remarks": "rule_set_291" + "remarks": "rule_set_290" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shells", - "remarks": "rule_set_292" + "remarks": "rule_set_291" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/shells File", - "remarks": "rule_set_292" + "remarks": "rule_set_291" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shells", - "remarks": "rule_set_292" + "remarks": "rule_set_291" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/shells File", - "remarks": "rule_set_292" + "remarks": "rule_set_291" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shells", - "remarks": "rule_set_293" + "remarks": "rule_set_292" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Who Owns /etc/shells File", - "remarks": "rule_set_293" + "remarks": "rule_set_292" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shells", - "remarks": "rule_set_293" + "remarks": "rule_set_292" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Who Owns /etc/shells File", - "remarks": "rule_set_293" + "remarks": "rule_set_292" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shells", - "remarks": "rule_set_294" + "remarks": "rule_set_293" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/shells File", - "remarks": "rule_set_294" + "remarks": "rule_set_293" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shells", - "remarks": "rule_set_294" + "remarks": "rule_set_293" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/shells File", - "remarks": "rule_set_294" + "remarks": "rule_set_293" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd", - "remarks": "rule_set_295" + "remarks": "rule_set_294" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd File", - "remarks": "rule_set_295" + "remarks": "rule_set_294" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd", - "remarks": "rule_set_295" + "remarks": "rule_set_294" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd File", - "remarks": "rule_set_295" + "remarks": "rule_set_294" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd", - "remarks": "rule_set_296" + "remarks": "rule_set_295" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd File", - "remarks": "rule_set_296" + "remarks": "rule_set_295" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd", - "remarks": "rule_set_296" + "remarks": "rule_set_295" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd File", - "remarks": "rule_set_296" + "remarks": "rule_set_295" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd", - "remarks": "rule_set_297" + "remarks": "rule_set_296" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd File", - "remarks": "rule_set_297" + "remarks": "rule_set_296" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd", - "remarks": "rule_set_297" + "remarks": "rule_set_296" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd File", - "remarks": "rule_set_297" + "remarks": "rule_set_296" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd_old", - "remarks": "rule_set_298" + "remarks": "rule_set_297" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_298" + "remarks": "rule_set_297" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd_old", - "remarks": "rule_set_298" + "remarks": "rule_set_297" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_298" + "remarks": "rule_set_297" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd_old", - "remarks": "rule_set_299" + "remarks": "rule_set_298" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_299" + "remarks": "rule_set_298" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd_old", - "remarks": "rule_set_299" + "remarks": "rule_set_298" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_299" + "remarks": "rule_set_298" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd_old", - "remarks": "rule_set_300" + "remarks": "rule_set_299" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd.old File", - "remarks": "rule_set_300" + "remarks": "rule_set_299" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd_old", - "remarks": "rule_set_300" + "remarks": "rule_set_299" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd.old File", - "remarks": "rule_set_300" + "remarks": "rule_set_299" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_301" + "remarks": "rule_set_300" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_301" + "remarks": "rule_set_300" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_301" + "remarks": "rule_set_300" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_301" + "remarks": "rule_set_300" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_302" + "remarks": "rule_set_301" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_302" + "remarks": "rule_set_301" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_302" + "remarks": "rule_set_301" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_302" + "remarks": "rule_set_301" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_unowned_by_user", - "remarks": "rule_set_303" + "remarks": "rule_set_302" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a User", - "remarks": "rule_set_303" + "remarks": "rule_set_302" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_unowned_by_user", - "remarks": "rule_set_303" + "remarks": "rule_set_302" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a User", - "remarks": "rule_set_303" + "remarks": "rule_set_302" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_ungroupowned", - "remarks": "rule_set_304" + "remarks": "rule_set_303" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a Group", - "remarks": "rule_set_304" + "remarks": "rule_set_303" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_ungroupowned", - "remarks": "rule_set_304" + "remarks": "rule_set_303" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a Group", - "remarks": "rule_set_304" + "remarks": "rule_set_303" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_all_shadowed", - "remarks": "rule_set_305" + "remarks": "rule_set_304" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify All Account Password Hashes are Shadowed", - "remarks": "rule_set_305" + "remarks": "rule_set_304" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_all_shadowed", - "remarks": "rule_set_305" + "remarks": "rule_set_304" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify All Account Password Hashes are Shadowed", - "remarks": "rule_set_305" + "remarks": "rule_set_304" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords_etc_shadow", - "remarks": "rule_set_306" + "remarks": "rule_set_305" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure There Are No Accounts With Blank or Null Passwords", - "remarks": "rule_set_306" + "remarks": "rule_set_305" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords_etc_shadow", - "remarks": "rule_set_306" + "remarks": "rule_set_305" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure There Are No Accounts With Blank or Null Passwords", - "remarks": "rule_set_306" + "remarks": "rule_set_305" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gid_passwd_group_same", - "remarks": "rule_set_307" + "remarks": "rule_set_306" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", - "remarks": "rule_set_307" + "remarks": "rule_set_306" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gid_passwd_group_same", - "remarks": "rule_set_307" + "remarks": "rule_set_306" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", - "remarks": "rule_set_307" + "remarks": "rule_set_306" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_id", - "remarks": "rule_set_308" + "remarks": "rule_set_307" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique User IDs", - "remarks": "rule_set_308" + "remarks": "rule_set_307" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_id", - "remarks": "rule_set_308" + "remarks": "rule_set_307" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique User IDs", - "remarks": "rule_set_308" + "remarks": "rule_set_307" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_id", - "remarks": "rule_set_309" + "remarks": "rule_set_308" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group ID", - "remarks": "rule_set_309" + "remarks": "rule_set_308" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_id", - "remarks": "rule_set_309" + "remarks": "rule_set_308" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group ID", - "remarks": "rule_set_309" + "remarks": "rule_set_308" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_name", - "remarks": "rule_set_310" + "remarks": "rule_set_309" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique Names", - "remarks": "rule_set_310" + "remarks": "rule_set_309" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_name", - "remarks": "rule_set_310" + "remarks": "rule_set_309" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique Names", - "remarks": "rule_set_310" + "remarks": "rule_set_309" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_name", - "remarks": "rule_set_311" + "remarks": "rule_set_310" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group Names", - "remarks": "rule_set_311" + "remarks": "rule_set_310" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_name", - "remarks": "rule_set_311" + "remarks": "rule_set_310" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group Names", - "remarks": "rule_set_311" + "remarks": "rule_set_310" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_interactive_home_directory_exists", - "remarks": "rule_set_312" + "remarks": "rule_set_311" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive Users Home Directories Must Exist", - "remarks": "rule_set_312" + "remarks": "rule_set_311" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_interactive_home_directory_exists", - "remarks": "rule_set_312" + "remarks": "rule_set_311" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive Users Home Directories Must Exist", - "remarks": "rule_set_312" + "remarks": "rule_set_311" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_home_directories", - "remarks": "rule_set_313" + "remarks": "rule_set_312" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Be Owned By The Primary User", - "remarks": "rule_set_313" + "remarks": "rule_set_312" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_home_directories", - "remarks": "rule_set_313" + "remarks": "rule_set_312" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Be Owned By The Primary User", - "remarks": "rule_set_313" + "remarks": "rule_set_312" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_home_directories", - "remarks": "rule_set_314" + "remarks": "rule_set_313" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", - "remarks": "rule_set_314" + "remarks": "rule_set_313" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_home_directories", - "remarks": "rule_set_314" + "remarks": "rule_set_313" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", - "remarks": "rule_set_314" + "remarks": "rule_set_313" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_315" + "remarks": "rule_set_314" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_315" + "remarks": "rule_set_314" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_315" + "remarks": "rule_set_314" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_315" + "remarks": "rule_set_314" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_316" + "remarks": "rule_set_315" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_316" + "remarks": "rule_set_315" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_316" + "remarks": "rule_set_315" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_316" + "remarks": "rule_set_315" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_no_world_writable_programs", - "remarks": "rule_set_317" + "remarks": "rule_set_316" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Not Run World-Writable Programs", - "remarks": "rule_set_317" + "remarks": "rule_set_316" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_no_world_writable_programs", - "remarks": "rule_set_317" + "remarks": "rule_set_316" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Not Run World-Writable Programs", - "remarks": "rule_set_317" + "remarks": "rule_set_316" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_318" + "remarks": "rule_set_317" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_318" + "remarks": "rule_set_317" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_318" + "remarks": "rule_set_317" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_318" + "remarks": "rule_set_317" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_forward_files", - "remarks": "rule_set_319" + "remarks": "rule_set_318" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .forward Files Exist", - "remarks": "rule_set_319" + "remarks": "rule_set_318" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_forward_files", - "remarks": "rule_set_319" + "remarks": "rule_set_318" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .forward Files Exist", - "remarks": "rule_set_319" + "remarks": "rule_set_318" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_netrc_files", - "remarks": "rule_set_320" + "remarks": "rule_set_319" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No netrc Files Exist", - "remarks": "rule_set_320" + "remarks": "rule_set_319" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_netrc_files", - "remarks": "rule_set_320" + "remarks": "rule_set_319" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No netrc Files Exist", - "remarks": "rule_set_320" + "remarks": "rule_set_319" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rhost_files", - "remarks": "rule_set_321" + "remarks": "rule_set_320" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .rhost Files Exist", - "remarks": "rule_set_321" + "remarks": "rule_set_320" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rhost_files", - "remarks": "rule_set_321" + "remarks": "rule_set_320" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .rhost Files Exist", - "remarks": "rule_set_321" + "remarks": "rule_set_320" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_bash_history", - "remarks": "rule_set_322" + "remarks": "rule_set_321" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure User Bash History File Has Correct Permissions", - "remarks": "rule_set_322" + "remarks": "rule_set_321" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_bash_history", - "remarks": "rule_set_322" + "remarks": "rule_set_321" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure User Bash History File Has Correct Permissions", - "remarks": "rule_set_322" + "remarks": "rule_set_321" } ], "control-implementations": [ { - "uuid": "f3ac2c1e-e229-4c23-89bd-830eb50ee650", + "uuid": "7cfb076c-9218-4205-94df-95eb210d1dfa", "source": "trestle://profiles/rhel10-cis_rhel10-l1_server/profile.json", "description": "Control implementation for cis_server_l1", "props": [ @@ -18952,13 +18911,13 @@ { "param-id": "var_password_hashing_algorithm", "values": [ - "yescrypt" + "cis_rhel10" ] }, { "param-id": "var_password_hashing_algorithm_pam", "values": [ - "yescrypt" + "cis_rhel10" ] }, { @@ -19066,7 +19025,7 @@ ], "implemented-requirements": [ { - "uuid": "98f0bc67-acbf-4e3c-9079-fdeb32100031", + "uuid": "5b7f80ee-922f-4a3d-8a05-394d866053d7", "control-id": "reload_dconf_db", "description": "This is a helper rule to reload Dconf database correctly.", "props": [ @@ -19083,7 +19042,7 @@ ] }, { - "uuid": "478ecade-2db9-4bc2-960c-b6ec8cf1d3f9", + "uuid": "17d78aff-db92-4d8f-b9f2-3236713706a3", "control-id": "cis_rhel10_1-1.1.1", "description": "No notes for control-id 1.1.1.1.", "props": [ @@ -19100,7 +19059,7 @@ ] }, { - "uuid": "c9d68520-56f7-49eb-916f-37c3b19d3f63", + "uuid": "1214ba16-3405-4e82-bf9f-1d24262156a2", "control-id": "cis_rhel10_1-1.1.2", "description": "No notes for control-id 1.1.1.2.", "props": [ @@ -19117,7 +19076,7 @@ ] }, { - "uuid": "492f2949-31da-45e6-a24a-8015203f5ce4", + "uuid": "86b5c0c9-8cc9-43df-90e6-3ba829e1a9c2", "control-id": "cis_rhel10_1-1.1.3", "description": "No notes for control-id 1.1.1.3.", "props": [ @@ -19134,7 +19093,7 @@ ] }, { - "uuid": "f7e57b58-7ace-41a9-b233-4c87375eede5", + "uuid": "e7ca054c-83d0-43bd-aca1-85f3e788c40e", "control-id": "cis_rhel10_1-1.1.4", "description": "No notes for control-id 1.1.1.4.", "props": [ @@ -19151,7 +19110,7 @@ ] }, { - "uuid": "25ace639-fe0d-44e9-b9ab-cc016eeee843", + "uuid": "e5183b2b-4bae-4ea5-837a-64347d270569", "control-id": "cis_rhel10_1-1.1.5", "description": "No notes for control-id 1.1.1.5.", "props": [ @@ -19168,7 +19127,7 @@ ] }, { - "uuid": "c6866d93-573e-462a-a55c-5d5081890d31", + "uuid": "90e3e1c9-5f6e-4368-ad37-22efda1b4d2d", "control-id": "cis_rhel10_1-1.1.9", "description": "No notes for control-id 1.1.1.9.", "props": [ @@ -19185,7 +19144,7 @@ ] }, { - "uuid": "0b5c9b86-1b6e-411f-a047-1015e2d86249", + "uuid": "4c64ef9d-ffbd-4a20-88cf-23774da49df9", "control-id": "cis_rhel10_1-1.1.10", "description": "No notes for control-id 1.1.1.10.", "props": [ @@ -19202,7 +19161,7 @@ ] }, { - "uuid": "f6814b0e-86c7-454f-8e8b-8b356e32c77d", + "uuid": "5d645bac-3352-491a-b4dd-a6fcd52f9a25", "control-id": "cis_rhel10_1-1.1.11", "description": "The description for control-id cis_rhel10_1-1.1.11.", "props": [ @@ -19215,7 +19174,7 @@ ] }, { - "uuid": "56b8672a-35a7-4484-961b-224a57a846d8", + "uuid": "09e658e8-e426-4d68-9c31-9dc0e08dc848", "control-id": "cis_rhel10_1-1.2.1.1", "description": "No notes for control-id 1.1.2.1.1.", "props": [ @@ -19232,7 +19191,7 @@ ] }, { - "uuid": "26e12209-b8dc-4bf9-b4cd-f0b80e126d82", + "uuid": "ae31139c-c509-4d1e-a2ed-b1da94de305e", "control-id": "cis_rhel10_1-1.2.1.2", "description": "No notes for control-id 1.1.2.1.2.", "props": [ @@ -19249,7 +19208,7 @@ ] }, { - "uuid": "0efabbab-6a08-484d-9f4a-c6de586a7743", + "uuid": "3c985f91-4234-4e4b-aba0-ffb4a455aecd", "control-id": "cis_rhel10_1-1.2.1.3", "description": "No notes for control-id 1.1.2.1.3.", "props": [ @@ -19266,7 +19225,7 @@ ] }, { - "uuid": "5ea8a491-1144-4387-ba74-4b389f90dfb7", + "uuid": "bc0ab7df-1872-4002-aa80-2495ee7a6e16", "control-id": "cis_rhel10_1-1.2.1.4", "description": "No notes for control-id 1.1.2.1.4.", "props": [ @@ -19283,7 +19242,7 @@ ] }, { - "uuid": "cdb0157a-28a4-4f16-9d1c-e7b8f9850823", + "uuid": "bc28dae7-6419-491c-8bc1-f19aea7504c8", "control-id": "cis_rhel10_1-1.2.2.1", "description": "No notes for control-id 1.1.2.2.1.", "props": [ @@ -19300,7 +19259,7 @@ ] }, { - "uuid": "f6b879c1-ebcb-4a70-9b4b-51e8daeac559", + "uuid": "87305e7f-25fe-47b4-918b-5e18f2d04391", "control-id": "cis_rhel10_1-1.2.2.2", "description": "No notes for control-id 1.1.2.2.2.", "props": [ @@ -19317,7 +19276,7 @@ ] }, { - "uuid": "3fdd46fc-2bfc-4110-a889-b8209f9f962a", + "uuid": "faad5dfa-6b02-4f37-8526-81fe1e92005a", "control-id": "cis_rhel10_1-1.2.2.3", "description": "No notes for control-id 1.1.2.2.3.", "props": [ @@ -19334,7 +19293,7 @@ ] }, { - "uuid": "71feb535-b1d2-4a05-b014-6f0d45886e9d", + "uuid": "26a9e8db-0af6-4fea-9b77-0026032ca40c", "control-id": "cis_rhel10_1-1.2.2.4", "description": "No notes for control-id 1.1.2.2.4.", "props": [ @@ -19351,7 +19310,7 @@ ] }, { - "uuid": "bef3fd00-b07e-451a-a590-0a1ada9c83e5", + "uuid": "86ba0a65-f23a-4b11-ae8d-10e66d7c3450", "control-id": "cis_rhel10_1-1.2.3.2", "description": "No notes for control-id 1.1.2.3.2.", "props": [ @@ -19368,7 +19327,7 @@ ] }, { - "uuid": "2cea4b5a-2ea1-4dfe-858d-563db9ef204d", + "uuid": "bae60d71-1db4-4766-98f4-447bd6b55c8a", "control-id": "cis_rhel10_1-1.2.3.3", "description": "No notes for control-id 1.1.2.3.3.", "props": [ @@ -19385,7 +19344,7 @@ ] }, { - "uuid": "81c40182-3aa6-43fb-8828-bb94dec73a7b", + "uuid": "d7823a77-cb07-470c-b61d-bd67b55b0069", "control-id": "cis_rhel10_1-1.2.4.2", "description": "No notes for control-id 1.1.2.4.2.", "props": [ @@ -19402,7 +19361,7 @@ ] }, { - "uuid": "7b1d79be-1481-4cd9-b974-1ca718a9390b", + "uuid": "f0b728c9-0fe5-4de1-ba30-f303dded21ca", "control-id": "cis_rhel10_1-1.2.4.3", "description": "No notes for control-id 1.1.2.4.3.", "props": [ @@ -19419,7 +19378,7 @@ ] }, { - "uuid": "e30efd3e-4c01-4240-9bf3-990fe99d4e5a", + "uuid": "abed6e33-b4dc-4e37-88ad-7bbe2c508ae4", "control-id": "cis_rhel10_1-1.2.5.2", "description": "No notes for control-id 1.1.2.5.2.", "props": [ @@ -19436,7 +19395,7 @@ ] }, { - "uuid": "91dc2358-ce73-45b3-8a87-a4c6c5eb430f", + "uuid": "d3a87ec2-d1ae-41d1-8dd2-140d403f6c65", "control-id": "cis_rhel10_1-1.2.5.3", "description": "No notes for control-id 1.1.2.5.3.", "props": [ @@ -19453,7 +19412,7 @@ ] }, { - "uuid": "a552ef3c-3d08-43f1-8cab-3dda49d7c951", + "uuid": "119181b1-2bf0-4366-a45b-8c7a1acdb103", "control-id": "cis_rhel10_1-1.2.5.4", "description": "No notes for control-id 1.1.2.5.4.", "props": [ @@ -19470,7 +19429,7 @@ ] }, { - "uuid": "ff44ad46-327a-4a12-bf8d-040d24cd6f3b", + "uuid": "2eb6e99b-f9a2-442e-8b55-b80a101c3f95", "control-id": "cis_rhel10_1-1.2.6.2", "description": "No notes for control-id 1.1.2.6.2.", "props": [ @@ -19487,7 +19446,7 @@ ] }, { - "uuid": "2a1163f9-be42-42a8-bafd-7632fa8e2ab2", + "uuid": "a1bac857-b77a-46e2-8337-78929c8fb88b", "control-id": "cis_rhel10_1-1.2.6.3", "description": "No notes for control-id 1.1.2.6.3.", "props": [ @@ -19504,7 +19463,7 @@ ] }, { - "uuid": "e0552467-8621-429c-bfd6-7acae4894b16", + "uuid": "5158983b-85f9-4200-bc0e-1621db004a23", "control-id": "cis_rhel10_1-1.2.6.4", "description": "No notes for control-id 1.1.2.6.4.", "props": [ @@ -19521,7 +19480,7 @@ ] }, { - "uuid": "d7529979-ad50-4f45-8389-6eb7ba1f5317", + "uuid": "54c8f84f-b9be-42a5-815b-694124de6265", "control-id": "cis_rhel10_1-1.2.7.2", "description": "No notes for control-id 1.1.2.7.2.", "props": [ @@ -19538,7 +19497,7 @@ ] }, { - "uuid": "56882756-9dba-475f-84b0-9b5010266dff", + "uuid": "6c80b5e5-f7de-4ddf-b674-65934f1d547c", "control-id": "cis_rhel10_1-1.2.7.3", "description": "No notes for control-id 1.1.2.7.3.", "props": [ @@ -19555,7 +19514,7 @@ ] }, { - "uuid": "96612212-66cf-4cb2-81d4-da6c1dbb01c4", + "uuid": "60c4b93e-00c7-4ba7-81ca-dbf41f684e36", "control-id": "cis_rhel10_1-1.2.7.4", "description": "No notes for control-id 1.1.2.7.4.", "props": [ @@ -19572,7 +19531,7 @@ ] }, { - "uuid": "7df508d5-b0f2-4587-9e46-90204a95476a", + "uuid": "6f4ce241-f620-4b28-a25b-755e058a5933", "control-id": "cis_rhel10_1-2.1.1", "description": "The description for control-id cis_rhel10_1-2.1.1.", "props": [ @@ -19585,7 +19544,7 @@ ] }, { - "uuid": "4a58e8c7-70f5-476e-a8dc-509e5109d527", + "uuid": "d73e91e6-6fb7-4d39-a68a-7960fa05acc4", "control-id": "cis_rhel10_1-2.1.2", "description": "No notes for control-id 1.2.1.2.", "props": [ @@ -19602,7 +19561,7 @@ ] }, { - "uuid": "ec4d5f00-baba-4387-a441-f81c3f409803", + "uuid": "8eca37af-defa-475c-adf1-d6ea361bde86", "control-id": "cis_rhel10_1-2.1.4", "description": "The description for control-id cis_rhel10_1-2.1.4.", "props": [ @@ -19615,7 +19574,7 @@ ] }, { - "uuid": "ee122bca-4c8b-46af-9db7-531638dff4e7", + "uuid": "b422c647-1090-46df-be84-b5b7cde64b26", "control-id": "cis_rhel10_1-2.2.1", "description": "The description for control-id cis_rhel10_1-2.2.1.", "props": [ @@ -19628,7 +19587,7 @@ ] }, { - "uuid": "5a27cf61-8c97-4365-9c51-0f3be29b2c44", + "uuid": "8e39f6e2-a146-4604-a6af-b05bb5b6c19f", "control-id": "cis_rhel10_1-3.1.1", "description": "No notes for control-id 1.3.1.1.", "props": [ @@ -19645,7 +19604,7 @@ ] }, { - "uuid": "9a13b136-4d33-421e-a1c3-63e0fe525c17", + "uuid": "f5d01a6b-4d76-46bd-8e47-9b5f71aa8635", "control-id": "cis_rhel10_1-3.1.2", "description": "No notes for control-id 1.3.1.2.", "props": [ @@ -19662,7 +19621,7 @@ ] }, { - "uuid": "7ea91733-b582-4106-a742-a816cfc35673", + "uuid": "bad090e4-197a-4ce6-8977-2b775e431d64", "control-id": "cis_rhel10_1-3.1.3", "description": "No notes for control-id 1.3.1.3.", "props": [ @@ -19679,7 +19638,7 @@ ] }, { - "uuid": "a7d2d661-ead2-4481-94c6-e68a43528105", + "uuid": "9308f8b9-9b6b-4989-ba3c-567d345b84a0", "control-id": "cis_rhel10_1-3.1.4", "description": "No notes for control-id 1.3.1.4.", "props": [ @@ -19696,7 +19655,7 @@ ] }, { - "uuid": "2e657b12-d4d2-41c7-be52-d60908391d52", + "uuid": "986739e3-7ea7-40e0-bdbe-7c99c760d198", "control-id": "cis_rhel10_1-3.1.7", "description": "No notes for control-id 1.3.1.7.", "props": [ @@ -19713,7 +19672,7 @@ ] }, { - "uuid": "54593676-a28d-40ea-882c-c440b3315c81", + "uuid": "01e88f5e-42ce-493c-beb7-5059c47b40f3", "control-id": "cis_rhel10_1-3.1.8", "description": "No notes for control-id 1.3.1.8.", "props": [ @@ -19730,7 +19689,7 @@ ] }, { - "uuid": "7c11396a-2e15-4d51-92c6-4065564c0a65", + "uuid": "8de34404-acc3-4f26-98e7-153a880bc54a", "control-id": "cis_rhel10_1-4.1", "description": "There is no automated remediation for this rule and this is intentional.\nMore details in the rule description.", "props": [ @@ -19747,7 +19706,7 @@ ] }, { - "uuid": "d0d38111-1215-4360-84da-da13ed44d07d", + "uuid": "4e91d7b0-fc99-4c5a-bc25-3bd7803f5f18", "control-id": "cis_rhel10_1-4.2", "description": "This requirement demands a deeper review of the rules.", "props": [ @@ -19774,7 +19733,7 @@ ] }, { - "uuid": "69973712-65de-4676-a261-0620cc481ba9", + "uuid": "feef1725-ecb6-4635-9d3a-dea4c4df8584", "control-id": "cis_rhel10_1-5.1", "description": "No notes for control-id 1.5.1.", "props": [ @@ -19791,7 +19750,7 @@ ] }, { - "uuid": "f2752436-e8c3-47b3-97bb-91d77c1c4c90", + "uuid": "c7c09893-a1ab-410c-ad58-ad743c6dfd47", "control-id": "cis_rhel10_1-5.2", "description": "No notes for control-id 1.5.2.", "props": [ @@ -19808,7 +19767,7 @@ ] }, { - "uuid": "da1c437d-d18d-4aea-920e-04395eb05080", + "uuid": "c06d4196-e9a5-4537-b22e-3c4c4bef3c87", "control-id": "cis_rhel10_1-5.4", "description": "No notes for control-id 1.5.4.", "props": [ @@ -19825,7 +19784,7 @@ ] }, { - "uuid": "f2cafcbc-1240-425d-b431-05fc63ac48b2", + "uuid": "aeaebe1d-b0c4-494a-8155-f8c1c0605b7b", "control-id": "cis_rhel10_1-5.5", "description": "No notes for control-id 1.5.5.", "props": [ @@ -19842,7 +19801,7 @@ ] }, { - "uuid": "24bc5e19-30a8-4865-832a-efb57290237f", + "uuid": "3ab63734-3402-4a91-bd47-750df061f983", "control-id": "cis_rhel10_1-5.6", "description": "No notes for control-id 1.5.6.", "props": [ @@ -19859,7 +19818,7 @@ ] }, { - "uuid": "c3c97db4-102c-491a-a169-5f46085209c9", + "uuid": "42558dc8-eaee-4407-85a1-0ed398cbe9da", "control-id": "cis_rhel10_1-5.7", "description": "No notes for control-id 1.5.7.", "props": [ @@ -19876,7 +19835,7 @@ ] }, { - "uuid": "a84a0a85-4be1-42ad-b980-2cee7ddbcd70", + "uuid": "2d046132-650c-444c-ac9c-95f60465d193", "control-id": "cis_rhel10_1-5.8", "description": "Address Space Layout Randomization (ASLR)", "props": [ @@ -19893,7 +19852,7 @@ ] }, { - "uuid": "49844577-08ab-4f34-932c-d0a2bcca2a21", + "uuid": "9e58d27d-d096-404c-bba5-686dfbbcc731", "control-id": "cis_rhel10_1-5.9", "description": "No notes for control-id 1.5.9.", "props": [ @@ -19910,7 +19869,7 @@ ] }, { - "uuid": "4b73948d-3e7a-4d76-bb74-929f1a4c6154", + "uuid": "f1921d37-0b99-4538-b504-2f40a067c2d6", "control-id": "cis_rhel10_1-5.10", "description": "No notes for control-id 1.5.10.", "props": [ @@ -19927,7 +19886,7 @@ ] }, { - "uuid": "9ac3df5e-dcf2-436a-a34d-3ec90cea555c", + "uuid": "bf9f8a45-5bcf-4f33-9090-2ce651a35d3e", "control-id": "cis_rhel10_1-6.1", "description": "No notes for control-id 1.6.1.", "props": [ @@ -19944,7 +19903,7 @@ ] }, { - "uuid": "3a643756-115c-44ed-9e3c-b559663c61c1", + "uuid": "7bad54e5-cfe6-4b05-8ef0-8a5c19129fbf", "control-id": "cis_rhel10_1-6.2", "description": "No notes for control-id 1.6.2.", "props": [ @@ -19961,7 +19920,7 @@ ] }, { - "uuid": "a25f688e-c293-4ce8-b2fe-279a43506dbd", + "uuid": "f1051a16-386a-4300-abf1-a9a2c781065d", "control-id": "cis_rhel10_1-6.3", "description": "No notes for control-id 1.6.3.", "props": [ @@ -19978,7 +19937,7 @@ ] }, { - "uuid": "67958b8d-fc6f-496e-a4a9-ab333c20c674", + "uuid": "44cfaf7d-f584-42d7-aec5-d69c953d54a5", "control-id": "cis_rhel10_1-6.4", "description": "No notes for control-id 1.6.4.", "props": [ @@ -19995,7 +19954,7 @@ ] }, { - "uuid": "67d7d903-6ca5-4727-986b-544bb84c44f7", + "uuid": "8a6356ca-57cd-40c5-a2a6-31335acda279", "control-id": "cis_rhel10_1-7.1", "description": "No notes for control-id 1.7.1.", "props": [ @@ -20012,7 +19971,7 @@ ] }, { - "uuid": "0dc543d8-1798-493d-8719-576d8d4c586f", + "uuid": "793f494e-5b1a-406b-9666-d6a6a5f33c08", "control-id": "cis_rhel10_1-7.2", "description": "No notes for control-id 1.7.2.", "props": [ @@ -20029,7 +19988,7 @@ ] }, { - "uuid": "860c9456-7481-40cc-b704-96f328d775eb", + "uuid": "a10152c8-0bab-4f3b-bcc1-2c25ad079aec", "control-id": "cis_rhel10_1-7.3", "description": "No notes for control-id 1.7.3.", "props": [ @@ -20046,7 +20005,7 @@ ] }, { - "uuid": "94d49814-cbe8-43be-b5d5-67de1b99a64e", + "uuid": "3b784780-f7d0-409f-b01c-8d544bc50208", "control-id": "cis_rhel10_1-7.4", "description": "No notes for control-id 1.7.4.", "props": [ @@ -20073,7 +20032,7 @@ ] }, { - "uuid": "77b28103-e2ab-484a-8f92-21919d6bb5ec", + "uuid": "37642fbc-26df-4ebb-8356-58d135302228", "control-id": "cis_rhel10_1-7.5", "description": "No notes for control-id 1.7.5.", "props": [ @@ -20100,7 +20059,7 @@ ] }, { - "uuid": "4c6502b8-3825-4935-bc91-e440029e119c", + "uuid": "795d9bcf-f3cb-4b64-9860-a2888196eb89", "control-id": "cis_rhel10_1-7.6", "description": "No notes for control-id 1.7.6.", "props": [ @@ -20127,7 +20086,7 @@ ] }, { - "uuid": "89431794-e274-450c-8f15-2157e030ad2a", + "uuid": "147999b0-4c29-4231-a32f-7080cc5d9289", "control-id": "cis_rhel10_1-8.1", "description": "No notes for control-id 1.8.1.", "props": [ @@ -20149,7 +20108,7 @@ ] }, { - "uuid": "340cc296-3118-4d5e-a043-8117048debe2", + "uuid": "aaf291a0-ff60-450f-a1fb-5122313f6dea", "control-id": "cis_rhel10_1-8.2", "description": "No notes for control-id 1.8.2.", "props": [ @@ -20166,7 +20125,7 @@ ] }, { - "uuid": "ec298996-f9e5-4ea4-afce-a4911d454567", + "uuid": "7223f885-6285-41b9-8948-e6b65a578734", "control-id": "cis_rhel10_1-8.3", "description": "No notes for control-id 1.8.3.", "props": [ @@ -20198,7 +20157,7 @@ ] }, { - "uuid": "4ca59c9b-de27-4caa-a875-2c656766b816", + "uuid": "6b86bb85-4c59-46ec-814c-97855f7015fb", "control-id": "cis_rhel10_1-8.4", "description": "No notes for control-id 1.8.4.", "props": [ @@ -20220,7 +20179,7 @@ ] }, { - "uuid": "0f6057c8-86bd-44a9-a320-6abc2a78b989", + "uuid": "3aca1a3e-280a-4f7f-8fc5-d549d064ea9e", "control-id": "cis_rhel10_1-8.5", "description": "No notes for control-id 1.8.5.", "props": [ @@ -20237,7 +20196,7 @@ ] }, { - "uuid": "e43723b4-6e92-4b89-a8bd-7ff57cfef7c7", + "uuid": "c5f684cc-f1a2-42a2-9de8-9c5cc6dbbbff", "control-id": "cis_rhel10_2-1.1", "description": "No notes for control-id 2.1.1.", "props": [ @@ -20254,7 +20213,7 @@ ] }, { - "uuid": "cdfab7ed-05c4-4a20-b091-b931596f12ef", + "uuid": "a4f9c995-d921-4ded-8ac7-84c09bf944f4", "control-id": "cis_rhel10_2-1.2", "description": "No notes for control-id 2.1.2.", "props": [ @@ -20271,7 +20230,7 @@ ] }, { - "uuid": "cfd51a84-6110-4a0d-a4be-66bcdb069b66", + "uuid": "7840020c-a27f-4350-8c11-4b67715080ea", "control-id": "cis_rhel10_2-1.4", "description": "No notes for control-id 2.1.4.", "props": [ @@ -20288,7 +20247,7 @@ ] }, { - "uuid": "f5a43375-c1dc-40a5-82df-e47eb53ac764", + "uuid": "0ca1f046-917b-4425-ab4c-5aa02f25eb5a", "control-id": "cis_rhel10_2-1.5", "description": "No notes for control-id 2.1.5.", "props": [ @@ -20305,7 +20264,7 @@ ] }, { - "uuid": "eb540af6-866e-4323-9950-a9307827f5a4", + "uuid": "35ee995d-33f3-4a04-94f3-590c88c1f89e", "control-id": "cis_rhel10_2-1.6", "description": "No notes for control-id 2.1.6.", "props": [ @@ -20322,7 +20281,7 @@ ] }, { - "uuid": "7860459c-f361-4103-8ec1-515aeca7452d", + "uuid": "df6c8ea7-0bb0-44f9-832e-7795e1da5d63", "control-id": "cis_rhel10_2-1.7", "description": "No notes for control-id 2.1.7.", "props": [ @@ -20339,7 +20298,7 @@ ] }, { - "uuid": "6c690fa9-4acd-4e44-94b4-30c1ed555ee6", + "uuid": "e973f392-7c2d-4a67-973e-55f886427953", "control-id": "cis_rhel10_2-1.8", "description": "No notes for control-id 2.1.8.", "props": [ @@ -20361,7 +20320,7 @@ ] }, { - "uuid": "b9f14cb5-7cbe-483f-8561-ba0da484ba15", + "uuid": "4942423c-2097-4476-8551-8a744ea0ef14", "control-id": "cis_rhel10_2-1.9", "description": "Many of the libvirt packages used by Enterprise Linux virtualization are dependent on the\nnfs-utils package.", "props": [ @@ -20378,7 +20337,7 @@ ] }, { - "uuid": "3c8e3a0d-9cb1-4c4d-ad30-da562b8cbe24", + "uuid": "467cd09a-f705-4a04-9ef3-7512b8ae5e56", "control-id": "cis_rhel10_2-1.10", "description": "No notes for control-id 2.1.10.", "props": [ @@ -20395,7 +20354,7 @@ ] }, { - "uuid": "305592f7-7b5d-40e0-9142-cd4b9198041e", + "uuid": "b51bd4df-f824-4774-a15b-2456737755ee", "control-id": "cis_rhel10_2-1.11", "description": "Many of the libvirt packages used by Enterprise Linux virtualization, and the nfs-utils\npackage used for The Network File System (NFS), are dependent on the rpcbind package.", "props": [ @@ -20412,7 +20371,7 @@ ] }, { - "uuid": "b8e307ef-ec80-4855-b22f-8f9422f2b7fe", + "uuid": "3a6d8ac6-cf91-47d4-8bdd-117e7ceac059", "control-id": "cis_rhel10_2-1.12", "description": "No notes for control-id 2.1.12.", "props": [ @@ -20429,7 +20388,7 @@ ] }, { - "uuid": "f0610c01-1614-4631-8295-a31d8ec75ada", + "uuid": "fcf3f887-9b67-434c-a68e-c4d0d0978075", "control-id": "cis_rhel10_2-1.13", "description": "No notes for control-id 2.1.13.", "props": [ @@ -20446,7 +20405,7 @@ ] }, { - "uuid": "ff3d489e-d364-408d-8b63-7181ef1c6c27", + "uuid": "bbd5f879-a361-427e-a243-ddc51a43d944", "control-id": "cis_rhel10_2-1.14", "description": "No notes for control-id 2.1.14.", "props": [ @@ -20463,7 +20422,7 @@ ] }, { - "uuid": "76e18e95-d464-432c-933d-9c62a1e6e161", + "uuid": "f0e5d49e-462f-4cce-a412-420c2a27b840", "control-id": "cis_rhel10_2-1.15", "description": "No notes for control-id 2.1.15.", "props": [ @@ -20480,7 +20439,7 @@ ] }, { - "uuid": "e212d280-8b7d-4851-82cf-1e1e4f020475", + "uuid": "639acc98-5560-432b-9416-a67a671146ff", "control-id": "cis_rhel10_2-1.16", "description": "No notes for control-id 2.1.16.", "props": [ @@ -20497,7 +20456,7 @@ ] }, { - "uuid": "1d160fbe-12bf-4c77-b918-b0b4d1f0f566", + "uuid": "0cb62ac1-1231-4643-a2a0-b0da48098b73", "control-id": "cis_rhel10_2-1.17", "description": "No notes for control-id 2.1.17.", "props": [ @@ -20514,7 +20473,7 @@ ] }, { - "uuid": "cf12d2ec-265f-49a2-b6b4-7b667f4e2ae8", + "uuid": "4a5201e9-25d5-48e7-8ba9-b4cbb08e3625", "control-id": "cis_rhel10_2-1.18", "description": "No notes for control-id 2.1.18.", "props": [ @@ -20536,7 +20495,7 @@ ] }, { - "uuid": "b1e3ead8-9b4f-47b0-ab6b-b0578d917f31", + "uuid": "bc000dea-3a8b-4ac5-935f-474a8c865c99", "control-id": "cis_rhel10_2-1.21", "description": "No notes for control-id 2.1.21.", "props": [ @@ -20558,7 +20517,7 @@ ] }, { - "uuid": "b49bec56-64f9-4251-895e-a3a03663dc1d", + "uuid": "a1f9e4b8-68fe-42fe-bb56-64f79977d8d4", "control-id": "cis_rhel10_2-1.22", "description": "The description for control-id cis_rhel10_2-1.22.", "props": [ @@ -20571,7 +20530,7 @@ ] }, { - "uuid": "6c5d2139-61fb-4772-8f08-6b263af3c992", + "uuid": "249eabb1-1f59-4df6-8ebc-cac3fdbdd7e7", "control-id": "cis_rhel10_2-2.1", "description": "No notes for control-id 2.2.1.", "props": [ @@ -20588,7 +20547,7 @@ ] }, { - "uuid": "4102704f-13ff-441f-9293-def5a29b4a39", + "uuid": "197772a4-25a6-4ef6-86c8-1d57369588e9", "control-id": "cis_rhel10_2-2.3", "description": "No notes for control-id 2.2.3.", "props": [ @@ -20605,7 +20564,7 @@ ] }, { - "uuid": "5986d3a4-9832-4ee6-a3d9-60b5196c2d5a", + "uuid": "51e5c2c2-230f-403d-9723-b2877459e00f", "control-id": "cis_rhel10_2-2.4", "description": "No notes for control-id 2.2.4.", "props": [ @@ -20622,7 +20581,7 @@ ] }, { - "uuid": "b970cb26-e645-4bdb-a7e3-7980e7f96776", + "uuid": "559512d2-128f-4a12-8162-c8c6ebb5145e", "control-id": "cis_rhel10_2-3.1", "description": "No notes for control-id 2.3.1.", "props": [ @@ -20634,7 +20593,7 @@ ] }, { - "uuid": "afc2bd91-3a5d-4b7f-ba3e-ce3a8a2a10fa", + "uuid": "b25568b1-931b-45de-9aad-9da11c9fe20f", "control-id": "cis_rhel10_2-3.2", "description": "No notes for control-id 2.3.2.", "props": [ @@ -20651,7 +20610,7 @@ ] }, { - "uuid": "140044bc-540c-481f-a212-8d9b543c3218", + "uuid": "0c2ec6ad-d42c-43a7-98e3-2fafeab6d77f", "control-id": "cis_rhel10_2-3.3", "description": "No notes for control-id 2.3.3.", "props": [ @@ -20668,7 +20627,7 @@ ] }, { - "uuid": "e799b36d-568b-4f96-a66d-193145086503", + "uuid": "7dcf2c6e-a5d0-4240-88bc-a5a36e05b470", "control-id": "cis_rhel10_2-4.1.1", "description": "No notes for control-id 2.4.1.1.", "props": [ @@ -20690,7 +20649,7 @@ ] }, { - "uuid": "7c3ba555-9061-4387-b71d-98d200f63596", + "uuid": "032067ef-bf4f-43e9-a7c9-48b1c51ebec3", "control-id": "cis_rhel10_2-4.1.2", "description": "No notes for control-id 2.4.1.2.", "props": [ @@ -20717,7 +20676,7 @@ ] }, { - "uuid": "d6342619-a495-4b57-a0e3-ec7ec709d5b3", + "uuid": "d1b7b5db-dce7-459f-9786-1ba708c9e947", "control-id": "cis_rhel10_2-4.1.3", "description": "No notes for control-id 2.4.1.3.", "props": [ @@ -20744,7 +20703,7 @@ ] }, { - "uuid": "8c48163e-2f17-46e1-95b8-08735955c0b9", + "uuid": "dff38fd6-0808-4546-babb-e3765e05b0f3", "control-id": "cis_rhel10_2-4.1.4", "description": "No notes for control-id 2.4.1.4.", "props": [ @@ -20771,7 +20730,7 @@ ] }, { - "uuid": "d94363e2-7241-4a96-a5fd-3ff43c2c24ff", + "uuid": "a080babd-e1d6-43cb-b7d8-7c6fb51e9fbc", "control-id": "cis_rhel10_2-4.1.5", "description": "No notes for control-id 2.4.1.5.", "props": [ @@ -20798,7 +20757,7 @@ ] }, { - "uuid": "3c67389a-1a80-4014-a4ac-bb3512226103", + "uuid": "ec5435f0-0d27-46d5-bf99-0d37da6f4029", "control-id": "cis_rhel10_2-4.1.6", "description": "No notes for control-id 2.4.1.6.", "props": [ @@ -20825,7 +20784,7 @@ ] }, { - "uuid": "8b991405-f7a5-4aff-afd9-12cacb367bd7", + "uuid": "b83c365e-2fea-49af-9adb-f0adf6647a31", "control-id": "cis_rhel10_2-4.1.7", "description": "No notes for control-id 2.4.1.7.", "props": [ @@ -20852,7 +20811,7 @@ ] }, { - "uuid": "24c40120-4ce5-4e21-882f-73fb5b76aa72", + "uuid": "0a706d1e-c104-401f-b68c-b39c1b578872", "control-id": "cis_rhel10_2-4.1.8", "description": "No notes for control-id 2.4.1.8.", "props": [ @@ -20879,7 +20838,7 @@ ] }, { - "uuid": "eacbe871-c212-4ef4-8456-497baac7a9ef", + "uuid": "99053405-9478-41d3-84d3-3d3483ea8769", "control-id": "cis_rhel10_2-4.1.9", "description": "No notes for control-id 2.4.1.9.", "props": [ @@ -20916,7 +20875,7 @@ ] }, { - "uuid": "98e2416c-2453-49f3-8fb1-80ae915373be", + "uuid": "05598bf2-a31f-45b8-85bb-f2eaf2ff245a", "control-id": "cis_rhel10_2-4.2.1", "description": "No notes for control-id 2.4.2.1.", "props": [ @@ -20953,7 +20912,7 @@ ] }, { - "uuid": "1102779e-7dbc-4cf8-988f-bc48121576e9", + "uuid": "b64ee000-6a3a-4250-acd8-820bc4763eda", "control-id": "cis_rhel10_3-1.1", "description": "The description for control-id cis_rhel10_3-1.1.", "props": [ @@ -20966,7 +20925,7 @@ ] }, { - "uuid": "3c15a76b-9ea7-49f0-b18c-036d9eaa2aa6", + "uuid": "a084ddf9-635e-49ca-912e-9684a5a6dced", "control-id": "cis_rhel10_3-1.2", "description": "No notes for control-id 3.1.2.", "props": [ @@ -20983,7 +20942,7 @@ ] }, { - "uuid": "ca53c3dc-b745-4477-89c9-bcb669d52ff5", + "uuid": "321eb86d-fd65-4c1c-a586-ec271f1790ee", "control-id": "cis_rhel10_3-1.3", "description": "No notes for control-id 3.1.3.", "props": [ @@ -21000,7 +20959,7 @@ ] }, { - "uuid": "1b58f56f-1bdb-41ef-8e46-0c1b57f2a5b8", + "uuid": "8f6a9bb5-5321-4471-a872-faba95a8b1c9", "control-id": "cis_rhel10_3-2.1", "description": "No notes for control-id 3.2.1.", "props": [ @@ -21017,7 +20976,7 @@ ] }, { - "uuid": "533dea96-8e1a-48f2-b4a6-c511f453ab16", + "uuid": "39b730c1-c7bf-4fc6-ba3a-e980ac8ed49c", "control-id": "cis_rhel10_3-2.2", "description": "No notes for control-id 3.2.2.", "props": [ @@ -21034,7 +20993,7 @@ ] }, { - "uuid": "e3f95caf-24ec-4df0-8868-5c6d88b2af1b", + "uuid": "4bb37cd4-435f-4965-8577-d8d37cde2d57", "control-id": "cis_rhel10_3-2.3", "description": "No notes for control-id 3.2.3.", "props": [ @@ -21051,7 +21010,7 @@ ] }, { - "uuid": "07a64e35-d9c8-40fa-a630-c8d4787f9cb5", + "uuid": "07b9dd57-9de4-48f6-99f7-12d842870766", "control-id": "cis_rhel10_3-2.4", "description": "No notes for control-id 3.2.4.", "props": [ @@ -21068,7 +21027,7 @@ ] }, { - "uuid": "7b740002-b942-4fbd-a8e4-ea59a60245ee", + "uuid": "68f03f1d-644f-4759-8815-ebb15af59dce", "control-id": "cis_rhel10_3-2.5", "description": "No notes for control-id 3.2.5.", "props": [ @@ -21085,7 +21044,7 @@ ] }, { - "uuid": "40985f96-51b2-4add-8579-131f932e5cd4", + "uuid": "724de882-8fea-4cd9-8faf-0fbb775b8570", "control-id": "cis_rhel10_3-2.6", "description": "No notes for control-id 3.2.6.", "props": [ @@ -21102,7 +21061,7 @@ ] }, { - "uuid": "46ae1353-32c4-4019-9546-8469ffd6de50", + "uuid": "822c5531-aff9-43c5-a511-cf81119ba50f", "control-id": "cis_rhel10_3-3.1.2", "description": "No notes for control-id 3.3.1.2.", "props": [ @@ -21119,7 +21078,7 @@ ] }, { - "uuid": "3fa60f5a-1774-4627-812b-94f6ba0b8e8b", + "uuid": "1c07711f-40bb-4f75-b5ca-12f3bdd4c8e8", "control-id": "cis_rhel10_3-3.1.3", "description": "No notes for control-id 3.3.1.3.", "props": [ @@ -21136,7 +21095,7 @@ ] }, { - "uuid": "fe0e1a18-a641-41b8-9981-66b8ae85380c", + "uuid": "aa6723d3-3f32-484c-845c-80bf0ebbd5b5", "control-id": "cis_rhel10_3-3.1.4", "description": "No notes for control-id 3.3.1.4.", "props": [ @@ -21153,7 +21112,7 @@ ] }, { - "uuid": "87e2e034-d748-4dcc-b82d-b7151297a61f", + "uuid": "778e764e-c0b1-41cb-a7b2-11320cc4c671", "control-id": "cis_rhel10_3-3.1.5", "description": "No notes for control-id 3.3.1.5.", "props": [ @@ -21170,7 +21129,7 @@ ] }, { - "uuid": "bd41c77e-750b-4501-b1bd-e8d8b51d9e3b", + "uuid": "62d65362-9856-4fc0-8451-6a1b5d596d51", "control-id": "cis_rhel10_3-3.1.6", "description": "No notes for control-id 3.3.1.6.", "props": [ @@ -21187,7 +21146,7 @@ ] }, { - "uuid": "ebd7c24e-bf6a-437e-8600-e25927a90e75", + "uuid": "7469ac57-ddc7-47ae-a318-cb50bda4dde0", "control-id": "cis_rhel10_3-3.1.7", "description": "No notes for control-id 3.3.1.7.", "props": [ @@ -21204,7 +21163,7 @@ ] }, { - "uuid": "904bc205-d9a3-4884-8e52-dc6ee29525b2", + "uuid": "1676e47d-fd72-4abf-8d73-81b30d00eddc", "control-id": "cis_rhel10_3-3.1.8", "description": "No notes for control-id 3.3.1.8.", "props": [ @@ -21221,7 +21180,7 @@ ] }, { - "uuid": "d7e4a3e9-139f-4e1e-a03f-b8c85acd7961", + "uuid": "b1fa050b-107c-4380-a9e7-d3e95ecc4faf", "control-id": "cis_rhel10_3-3.1.9", "description": "No notes for control-id 3.3.1.9.", "props": [ @@ -21238,7 +21197,7 @@ ] }, { - "uuid": "d9eb80af-c199-4c23-90f1-04cf1500f7b3", + "uuid": "8febd3a6-e8fa-4d8b-8f17-ec7ffcb5bf9f", "control-id": "cis_rhel10_3-3.1.10", "description": "No notes for control-id 3.3.1.10.", "props": [ @@ -21255,7 +21214,7 @@ ] }, { - "uuid": "ccb7fa8e-7b5d-4657-82ac-b8b03ea0c828", + "uuid": "f6082843-9525-4f8d-9280-ba8c015616ae", "control-id": "cis_rhel10_3-3.1.11", "description": "No notes for control-id 3.3.1.11.", "props": [ @@ -21272,7 +21231,7 @@ ] }, { - "uuid": "2de3c8b2-879f-4d45-976d-525894f1483f", + "uuid": "3917aaca-2c32-452d-9437-b0bd104c9bac", "control-id": "cis_rhel10_3-3.1.12", "description": "No notes for control-id 3.3.1.12.", "props": [ @@ -21289,7 +21248,7 @@ ] }, { - "uuid": "5431bb09-273a-4886-a1a9-0ea8a11d1483", + "uuid": "a31ae7b8-e204-48be-9afb-42b626b72ff5", "control-id": "cis_rhel10_3-3.1.13", "description": "No notes for control-id 3.3.1.13.", "props": [ @@ -21306,7 +21265,7 @@ ] }, { - "uuid": "bb6f5369-1e17-4c6a-a958-0d6229b3f218", + "uuid": "e3ad3a42-5377-4f1e-a276-5be252f4f89f", "control-id": "cis_rhel10_3-3.1.14", "description": "No notes for control-id 3.3.1.14.", "props": [ @@ -21323,7 +21282,7 @@ ] }, { - "uuid": "1359e58b-1386-4d11-a4ab-996dce4dd6fb", + "uuid": "a8bea9b7-7d20-4409-b0ee-e145191b7a87", "control-id": "cis_rhel10_3-3.1.15", "description": "No notes for control-id 3.3.1.15.", "props": [ @@ -21340,7 +21299,7 @@ ] }, { - "uuid": "58ad30e7-7363-4cf4-93df-d28da6932391", + "uuid": "be62bc09-cc71-493a-8f92-68e174ac41ba", "control-id": "cis_rhel10_3-3.1.16", "description": "No notes for control-id 3.3.1.16.", "props": [ @@ -21357,7 +21316,7 @@ ] }, { - "uuid": "a35b5319-b8da-4058-8698-e5c59c2bb222", + "uuid": "61e71706-b3c5-4ecd-873c-5c20cdc23d97", "control-id": "cis_rhel10_3-3.1.17", "description": "No notes for control-id 3.3.1.17.", "props": [ @@ -21374,7 +21333,7 @@ ] }, { - "uuid": "2de3e703-0571-4ec4-905e-12625adfc784", + "uuid": "f50ecdb4-2055-4417-93a8-3798f9885612", "control-id": "cis_rhel10_3-3.1.18", "description": "No notes for control-id 3.3.1.18.", "props": [ @@ -21391,7 +21350,7 @@ ] }, { - "uuid": "ed4fd7ef-ed70-474d-b131-3e6b402f79f2", + "uuid": "a69b56b6-7f19-4203-9831-cce021417ebb", "control-id": "cis_rhel10_3-3.2.1", "description": "No notes for control-id 3.3.2.1.", "props": [ @@ -21408,7 +21367,7 @@ ] }, { - "uuid": "46fa30c5-08e9-4fd3-b6eb-55c381a866e6", + "uuid": "6193a728-7f72-48d1-9539-dc45a2bd5f25", "control-id": "cis_rhel10_3-3.2.2", "description": "No notes for control-id 3.3.2.2.", "props": [ @@ -21425,7 +21384,7 @@ ] }, { - "uuid": "2e8137ad-2d5f-4ad6-9061-4b7ae6c55c12", + "uuid": "3dc618d2-93cc-43b4-bc84-2f4bc9194b57", "control-id": "cis_rhel10_3-3.2.3", "description": "No notes for control-id 3.3.2.3.", "props": [ @@ -21442,7 +21401,7 @@ ] }, { - "uuid": "eed89b9b-fe1f-469e-89a9-9731e824c581", + "uuid": "a416d70b-184e-492d-94eb-e755a14f169e", "control-id": "cis_rhel10_3-3.2.4", "description": "No notes for control-id 3.3.2.4.", "props": [ @@ -21459,7 +21418,7 @@ ] }, { - "uuid": "0b10c174-ad24-4a30-a91f-6421d7c8fece", + "uuid": "a4bf5a8b-db52-42f2-b8a1-e0e00075e35e", "control-id": "cis_rhel10_3-3.2.5", "description": "No notes for control-id 3.3.2.5.", "props": [ @@ -21476,7 +21435,7 @@ ] }, { - "uuid": "f136d758-4fc8-492a-8165-50d6e9aa9502", + "uuid": "f6b33dff-46bc-4576-a936-18eabf062840", "control-id": "cis_rhel10_3-3.2.6", "description": "No notes for control-id 3.3.2.6.", "props": [ @@ -21493,7 +21452,7 @@ ] }, { - "uuid": "4fd4abb9-b531-45b2-b91d-70d362f7e00e", + "uuid": "61833840-4faf-43e5-8326-879a479b485b", "control-id": "cis_rhel10_3-3.2.7", "description": "No notes for control-id 3.3.2.7.", "props": [ @@ -21510,7 +21469,7 @@ ] }, { - "uuid": "51b41b6f-1859-496c-bd6e-295fd8c5a63a", + "uuid": "9bdb17b6-dc59-4b4d-bf7f-0215069f53fe", "control-id": "cis_rhel10_3-3.2.8", "description": "No notes for control-id 3.3.2.8.", "props": [ @@ -21527,7 +21486,7 @@ ] }, { - "uuid": "c51de2ac-e704-42c5-9650-c9037743b512", + "uuid": "db626037-1744-4355-81c5-0b29df707139", "control-id": "cis_rhel10_4-1.1", "description": "No notes for control-id 4.1.1.", "props": [ @@ -21544,7 +21503,7 @@ ] }, { - "uuid": "87888254-b907-4540-83c2-ce80012ee6a1", + "uuid": "0afc1a4c-fa76-4082-a9b4-82031281384a", "control-id": "cis_rhel10_4-1.2", "description": "No notes for control-id 4.1.2.", "props": [ @@ -21561,7 +21520,7 @@ ] }, { - "uuid": "7baa016e-5594-49df-bb7b-be7349ae4258", + "uuid": "779caed4-cc43-4ed4-987f-2adca33bb65c", "control-id": "cis_rhel10_4-1.3", "description": "No notes for control-id 4.1.3.", "props": [ @@ -21578,7 +21537,7 @@ ] }, { - "uuid": "917da962-1a13-49f0-8a82-95196f582032", + "uuid": "f76d5f09-698a-42c6-936b-a7a4081f81c9", "control-id": "cis_rhel10_4-1.4", "description": "The description for control-id cis_rhel10_4-1.4.", "props": [ @@ -21591,7 +21550,7 @@ ] }, { - "uuid": "66412846-e1d4-4c9d-941d-b7243fd19339", + "uuid": "1d851c29-ee89-4746-a1ed-992f15e0cd13", "control-id": "cis_rhel10_4-1.5", "description": "Firewalld in Red Hat Enterprise Linux 10 accepts loopback traffic by default.", "props": [ @@ -21608,7 +21567,7 @@ ] }, { - "uuid": "524178ec-3870-476a-a097-643213793052", + "uuid": "86538749-8ab4-4c3c-8205-86ccb2a6b6c2", "control-id": "cis_rhel10_4-1.6", "description": "The description for control-id cis_rhel10_4-1.6.", "props": [ @@ -21621,7 +21580,7 @@ ] }, { - "uuid": "1bfe5579-2a97-4ae6-ac97-a4d8f23bf530", + "uuid": "c9d34709-322c-43c4-82b8-aafc339a8866", "control-id": "cis_rhel10_4-1.7", "description": "The description for control-id cis_rhel10_4-1.7.", "props": [ @@ -21634,7 +21593,7 @@ ] }, { - "uuid": "d86d5ef5-63fb-44e8-a736-6bd273f4e2df", + "uuid": "b091e0cd-bd32-42bb-9c8b-2b900f94af92", "control-id": "cis_rhel10_5-1.1", "description": "No notes for control-id 5.1.1.", "props": [ @@ -21691,7 +21650,7 @@ ] }, { - "uuid": "b5321694-9518-4d19-bc80-28747e1777d9", + "uuid": "8a5420ab-d857-4b9f-b716-1b33ca8b8f4f", "control-id": "cis_rhel10_5-1.2", "description": "No notes for control-id 5.1.2.", "props": [ @@ -21718,7 +21677,7 @@ ] }, { - "uuid": "76ce892d-6de9-440c-a342-149e94f0090b", + "uuid": "c111a81b-bd06-4e76-9872-11d4cd79fff6", "control-id": "cis_rhel10_5-1.3", "description": "No notes for control-id 5.1.3.", "props": [ @@ -21745,7 +21704,7 @@ ] }, { - "uuid": "044ad670-51d2-49ec-9d8c-6fc102dd310e", + "uuid": "f2139bae-8be9-41b1-bfe5-0e264a22c4de", "control-id": "cis_rhel10_5-1.4", "description": "No notes for control-id 5.1.4.", "props": [ @@ -21762,7 +21721,7 @@ ] }, { - "uuid": "1dfcdf4c-dc24-40d4-9249-da223b71c93c", + "uuid": "3d71e6b9-1d5b-4f65-9ed5-71221517d4cb", "control-id": "cis_rhel10_5-1.5", "description": "No notes for control-id 5.1.5.", "props": [ @@ -21779,7 +21738,7 @@ ] }, { - "uuid": "35480c5f-5fc6-4759-b2c0-32006772392d", + "uuid": "f4d55863-2e0e-4c01-b514-125ffa884204", "control-id": "cis_rhel10_5-1.6", "description": "No notes for control-id 5.1.6.", "props": [ @@ -21796,7 +21755,7 @@ ] }, { - "uuid": "115a2303-2c36-4bb5-af4b-94f092e0bb30", + "uuid": "a3a3f58b-06db-44a3-ae20-9e801ac8c2c6", "control-id": "cis_rhel10_5-1.7", "description": "The requirement gives an example of 45 seconds, but is flexible about the values. It is only\nnecessary to ensure there is a timeout configured in alignment to the site policy.", "props": [ @@ -21818,7 +21777,7 @@ ] }, { - "uuid": "d1562db2-81de-45c0-ba6e-00084e611ab9", + "uuid": "60f309cb-542e-4f1d-bbd1-219ad07b1ca3", "control-id": "cis_rhel10_5-1.10", "description": "No notes for control-id 5.1.10.", "props": [ @@ -21835,7 +21794,7 @@ ] }, { - "uuid": "0d59b748-560b-4f0b-82ac-1772dea2b23c", + "uuid": "0cdcf01b-2c92-4ea5-a7c2-d2cf2f24b012", "control-id": "cis_rhel10_5-1.11", "description": "No notes for control-id 5.1.11.", "props": [ @@ -21852,7 +21811,7 @@ ] }, { - "uuid": "e01f83a6-1448-4892-a750-342143287cb8", + "uuid": "a51e4a47-6f99-44f6-aab0-3184ab6356de", "control-id": "cis_rhel10_5-1.12", "description": "The description for control-id cis_rhel10_5-1.12.", "props": [ @@ -21870,7 +21829,7 @@ ] }, { - "uuid": "50eb8931-8ba3-4744-be41-d8810099859a", + "uuid": "7aa04b3d-7bde-48bf-b184-b0f6f016ef77", "control-id": "cis_rhel10_5-1.13", "description": "No notes for control-id 5.1.13.", "props": [ @@ -21887,7 +21846,7 @@ ] }, { - "uuid": "0347eeb8-effd-44d5-977e-4aaf9c395f14", + "uuid": "516daa78-00fd-478d-afe5-50b2b565ab67", "control-id": "cis_rhel10_5-1.14", "description": "The CIS benchmark is not opinionated about which loglevel is selected here. Here, this\nprofile uses VERBOSE by default, as it allows for the capture of login and logout activity\nas well as key fingerprints.", "props": [ @@ -21904,7 +21863,7 @@ ] }, { - "uuid": "f0058375-f598-46a0-a7c3-e50042413a7a", + "uuid": "75819807-942e-46cd-88a2-e8d5be137309", "control-id": "cis_rhel10_5-1.15", "description": "No notes for control-id 5.1.15.", "props": [ @@ -21921,7 +21880,7 @@ ] }, { - "uuid": "8a343c7c-10b0-41ba-a783-b115c813ef72", + "uuid": "dd424e52-d7ae-41cb-b391-fd6b199d1104", "control-id": "cis_rhel10_5-1.16", "description": "No notes for control-id 5.1.16.", "props": [ @@ -21938,7 +21897,7 @@ ] }, { - "uuid": "dd719fb3-a9ce-4f4c-8af0-76a85d1feac1", + "uuid": "a6c86127-d83f-4526-9ae9-a2d38f35eb8b", "control-id": "cis_rhel10_5-1.17", "description": "No notes for control-id 5.1.17.", "props": [ @@ -21955,7 +21914,7 @@ ] }, { - "uuid": "c63b5b9e-e60f-4f61-95e1-c61c01175208", + "uuid": "0d75f773-4695-47d4-ad92-022fb8c36ba2", "control-id": "cis_rhel10_5-1.18", "description": "No notes for control-id 5.1.18.", "props": [ @@ -21972,7 +21931,7 @@ ] }, { - "uuid": "3a13b1a4-f0fc-40e6-a309-f158262738eb", + "uuid": "b8308536-3275-476e-ab16-ae321e65be52", "control-id": "cis_rhel10_5-1.19", "description": "No notes for control-id 5.1.19.", "props": [ @@ -21989,7 +21948,7 @@ ] }, { - "uuid": "98c14e54-6a73-44fe-9823-469863291829", + "uuid": "fa9473a4-3cad-40fe-bd15-250cd0078bad", "control-id": "cis_rhel10_5-1.20", "description": "No notes for control-id 5.1.20.", "props": [ @@ -22006,7 +21965,7 @@ ] }, { - "uuid": "210ca035-ec9a-483d-94d0-0809f8edb4d1", + "uuid": "a0c9c69b-701a-4706-af67-ec48e588ab7d", "control-id": "cis_rhel10_5-1.21", "description": "No notes for control-id 5.1.21.", "props": [ @@ -22023,7 +21982,7 @@ ] }, { - "uuid": "bb567608-5a41-4a7a-b750-12de15fd3c9f", + "uuid": "96bc417c-7a76-4c83-b095-f60484be7178", "control-id": "cis_rhel10_5-1.22", "description": "No notes for control-id 5.1.22.", "props": [ @@ -22040,7 +21999,7 @@ ] }, { - "uuid": "d7bdffde-78ff-41f3-990f-37ff73fd9806", + "uuid": "4a4ea2ec-11fb-4584-b65f-1a832ad4d395", "control-id": "cis_rhel10_5-2.1", "description": "No notes for control-id 5.2.1.", "props": [ @@ -22057,7 +22016,7 @@ ] }, { - "uuid": "2893ea0e-3798-4da2-a5fe-e6bae67f7b6f", + "uuid": "54fa8cd8-11d7-44e2-83cc-9be727f571b6", "control-id": "cis_rhel10_5-2.2", "description": "No notes for control-id 5.2.2.", "props": [ @@ -22074,7 +22033,7 @@ ] }, { - "uuid": "876eab91-d1c2-41f2-b4e4-fa4964e77846", + "uuid": "ffcf316a-f6d3-4323-bbdf-8206aafbf552", "control-id": "cis_rhel10_5-2.3", "description": "No notes for control-id 5.2.3.", "props": [ @@ -22091,7 +22050,7 @@ ] }, { - "uuid": "5e34a9c1-ec77-49ac-9aa7-0ce7ce235cd2", + "uuid": "bec188a1-95b2-4ee7-a97c-8f049746b2fa", "control-id": "cis_rhel10_5-2.5", "description": "No notes for control-id 5.2.5.", "props": [ @@ -22108,7 +22067,7 @@ ] }, { - "uuid": "9698d9d3-c2f1-486f-8d39-39d26b997b5e", + "uuid": "ba14628c-006f-4772-8db4-29206db2b314", "control-id": "cis_rhel10_5-2.6", "description": "No notes for control-id 5.2.6.", "props": [ @@ -22125,7 +22084,7 @@ ] }, { - "uuid": "5d00fad0-7b02-4fb0-9015-6bf39bf86e14", + "uuid": "3c2663c5-ea4c-4b2e-b6e8-e9c6c2213eb0", "control-id": "cis_rhel10_5-2.7", "description": "Members of \"wheel\" or GID 0 groups are checked by default if the group option is not set for\npam_wheel.so module. The recommendation states the group should be empty to reinforce the\nuse of \"sudo\" for privileged access. Therefore, members of these groups should be manually\nchecked or a different group should be informed.", "props": [ @@ -22147,7 +22106,7 @@ ] }, { - "uuid": "ebd949ce-002e-493a-8ac6-21d8cfdafdec", + "uuid": "33ece393-4483-45e1-9a8b-990e45122328", "control-id": "cis_rhel10_5-3.1.1", "description": "This requirement is hard to be automated without any specific requirement. The policy even\nstates that provided commands are examples, other custom settings might be in place and the\nsettings might be different depending on site policies. The other rules will already make\nsure there is a correct autheselect profile regardless of the existing settings. It is\nnecessary to better discuss with CIS Community.", "props": [ @@ -22159,7 +22118,7 @@ ] }, { - "uuid": "a608bed0-2657-4a6d-9a63-18ae98691238", + "uuid": "07ac5b9d-a1ea-4830-b8d3-a9e9bc578331", "control-id": "cis_rhel10_5-3.1.2", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.1.", "props": [ @@ -22181,7 +22140,7 @@ ] }, { - "uuid": "9787f74d-71c5-4f2a-a8d8-9fd875a745f6", + "uuid": "c96a436d-bfe8-4732-a1ae-c2a58706b92e", "control-id": "cis_rhel10_5-3.1.3", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.2.", "props": [ @@ -22208,7 +22167,7 @@ ] }, { - "uuid": "3ed4cb55-c101-43e9-a24a-1b23aa210b3c", + "uuid": "e29ed719-4cb5-4d69-9c38-cbaa1d118c48", "control-id": "cis_rhel10_5-3.1.4", "description": "The module is properly enabled by the rules mentioned in related_rules.\nRequirements in 5.3.2.3 use these rules.", "props": [ @@ -22220,7 +22179,7 @@ ] }, { - "uuid": "360a13ea-c74f-4866-86bf-b33cb74c9dbc", + "uuid": "e9d9c2cf-6a7c-4465-af95-7e4e382f9154", "control-id": "cis_rhel10_5-3.1.5", "description": "No notes for control-id 5.3.1.5.", "props": [ @@ -22237,7 +22196,7 @@ ] }, { - "uuid": "18d6fe14-1427-4559-a171-659ca1af0c60", + "uuid": "2eeffbf6-5b14-45a0-85d5-02bf8f38c2f6", "control-id": "cis_rhel10_5-3.2.1.1", "description": "No notes for control-id 5.3.2.1.1.", "props": [ @@ -22254,7 +22213,7 @@ ] }, { - "uuid": "06ff6753-fc6c-4c00-8d30-493312deb3b5", + "uuid": "0067b910-7f9a-4b78-869e-10233449f618", "control-id": "cis_rhel10_5-3.2.1.2", "description": "The policy also accepts value 0, which means the locked accounts should be manually unlocked\nby an administrator. However, it also mentions that using value 0 can facilitate a DoS\nattack to legitimate users.", "props": [ @@ -22271,7 +22230,7 @@ ] }, { - "uuid": "506b95c3-09bb-44ae-b318-bedabed7c801", + "uuid": "aee218b6-3b30-43c3-b1f5-e765bb6a9747", "control-id": "cis_rhel10_5-3.2.2.1", "description": "No notes for control-id 5.3.2.2.1.", "props": [ @@ -22288,7 +22247,7 @@ ] }, { - "uuid": "bea2bf54-c67f-47c6-be87-e0a6671f4cff", + "uuid": "d09a5c71-accb-44b2-9352-0d3de7969b22", "control-id": "cis_rhel10_5-3.2.2.2", "description": "No notes for control-id 5.3.2.2.2.", "props": [ @@ -22305,7 +22264,7 @@ ] }, { - "uuid": "d4c14004-572d-4d70-b409-5c9825ed9498", + "uuid": "c13f7b57-eb2a-4f63-9981-8015d371b65c", "control-id": "cis_rhel10_5-3.2.2.3", "description": "This requirement is expected to be manual. However, in previous versions of the policy\nit was already automated the configuration of \"minclass\" option. This posture was kept for\nRHEL 10 in this new version. Rules related to other options are informed in related_rules.\nIn short, minclass=4 alone can achieve the same result achieved by the combination of the\nother 4 options mentioned in the policy.", "props": [ @@ -22322,7 +22281,7 @@ ] }, { - "uuid": "4a44b60f-b479-431a-863a-afd8d4a67785", + "uuid": "2ebe6cb3-acd9-4023-aee9-aea8f8374786", "control-id": "cis_rhel10_5-3.2.2.4", "description": "No notes for control-id 5.3.2.2.4.", "props": [ @@ -22339,7 +22298,7 @@ ] }, { - "uuid": "d23e7982-9451-49fc-b352-d668f74f62ad", + "uuid": "74d7cdee-ac59-4ee7-9d58-645ec9d800aa", "control-id": "cis_rhel10_5-3.2.2.5", "description": "No notes for control-id 5.3.2.2.5.", "props": [ @@ -22356,7 +22315,7 @@ ] }, { - "uuid": "d05431d6-8600-4b79-b2a9-27a06474abb3", + "uuid": "f22b2584-9ae3-46e9-b6eb-024b8933987d", "control-id": "cis_rhel10_5-3.2.2.6", "description": "No notes for control-id 5.3.2.2.6.", "props": [ @@ -22373,7 +22332,7 @@ ] }, { - "uuid": "8c7e042b-9cbe-4e8c-82dd-e2f4d272f0e5", + "uuid": "2d0d6e6c-92d8-484b-a976-a5aad035ffd9", "control-id": "cis_rhel10_5-3.2.2.7", "description": "No notes for control-id 5.3.2.2.7.", "props": [ @@ -22390,7 +22349,7 @@ ] }, { - "uuid": "5c77855e-d67a-4f4f-a644-a6473cefa92f", + "uuid": "842022e7-d052-4b48-9d47-820d60107801", "control-id": "cis_rhel10_5-3.2.3.1", "description": "Although mentioned in the section 5.3.3.3, there is no explicit requirement to configure\nretry option of pam_pwhistory. If come in the future, the rule accounts_password_pam_retry\ncan be used.", "props": [ @@ -22412,7 +22371,7 @@ ] }, { - "uuid": "b512a6b3-e0a9-4bff-b55a-bf97c895057c", + "uuid": "68ec9b1c-42a8-419c-b4d5-d96fa6a00980", "control-id": "cis_rhel10_5-3.2.3.2", "description": "No notes for control-id 5.3.2.3.2.", "props": [ @@ -22429,7 +22388,7 @@ ] }, { - "uuid": "baa18be1-d7c0-423c-8829-8daaa63a4a70", + "uuid": "bd13c6e0-602f-4c6d-bae6-b223576e6fb7", "control-id": "cis_rhel10_5-3.2.3.3", "description": "In RHEL 10 pam_pwhistory is enabled via authselect feature, as required in 5.3.1.4. The\nfeature automatically set \"use_authok\" option. In any case, we don't have a rule to check\nthis option specifically.", "props": [ @@ -22446,7 +22405,7 @@ ] }, { - "uuid": "48a3cb56-ccf6-40b4-a962-751ad070fe2f", + "uuid": "86b3533e-fcbc-473b-b561-c45d045019d5", "control-id": "cis_rhel10_5-3.2.4.1", "description": "The rule more specifically used in this requirement also satify the requirement 5.3.1.5.", "props": [ @@ -22463,7 +22422,7 @@ ] }, { - "uuid": "4877034a-e71c-4ffe-9027-cc97ef9478d8", + "uuid": "021bb5bf-443c-4d8c-b524-6ede36dbaef6", "control-id": "cis_rhel10_5-3.2.4.2", "description": "Usage of pam_unix.so module together with \"remember\" option is deprecated and is not\nrecommended by this policy. Instead, it should be used remember option of pam_pwhistory\nmodule, as required in 5.3.2.3.1. See here for more details about pam_unix.so:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1778929", "props": [ @@ -22480,7 +22439,7 @@ ] }, { - "uuid": "8166969d-ca41-497a-b406-6e41b973ea37", + "uuid": "041f7ef1-59cf-469d-b136-ca1622a31c3a", "control-id": "cis_rhel10_5-3.2.4.3", "description": "Changes in logindefs mentioned in this requirement are more specifically covered by 5.4.1.4", "props": [ @@ -22502,7 +22461,7 @@ ] }, { - "uuid": "afded8e5-c740-4aeb-9014-71a196832175", + "uuid": "669dc36b-b4f2-4dc9-be15-24932eff0fe6", "control-id": "cis_rhel10_5-3.2.4.4", "description": "In RHEL 10 pam_unix is enabled by default in all authselect profiles already with the\nuse_authtok option set. In any case, we don't have a rule to check this option specifically,\nlike in 5.3.2.3.3.", "props": [ @@ -22519,7 +22478,7 @@ ] }, { - "uuid": "19f25445-537b-4972-91f5-0696d113a950", + "uuid": "67327dad-50c4-4f6a-b8e6-fe1751fefa3a", "control-id": "cis_rhel10_5-4.1.1", "description": "No notes for control-id 5.4.1.1.", "props": [ @@ -22541,7 +22500,7 @@ ] }, { - "uuid": "3d71905f-24c4-452c-b51c-c2ddc7c892a9", + "uuid": "3844718a-ab02-4fe6-aad0-efdf5d434445", "control-id": "cis_rhel10_5-4.1.3", "description": "No notes for control-id 5.4.1.3.", "props": [ @@ -22563,20 +22522,15 @@ ] }, { - "uuid": "871cb23e-ee07-4719-a1a6-4c126993b76f", + "uuid": "bdf9faba-0e08-43f0-9ec9-ca1e1f414376", "control-id": "cis_rhel10_5-4.1.4", - "description": "There's a \"new\" set of options in /etc/login.defs file to define the number of iterations\nperformed during the hashing process.", + "description": "No notes for control-id 5.4.1.4.", "props": [ { "name": "implementation-status", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "implemented" }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_libuserconf" - }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", @@ -22585,7 +22539,7 @@ ] }, { - "uuid": "bd4a9f23-cea1-4a58-9d01-45ff51b976e2", + "uuid": "6d5365e4-201b-466c-98ce-045064f8a65b", "control-id": "cis_rhel10_5-4.1.5", "description": "No notes for control-id 5.4.1.5.", "props": [ @@ -22607,7 +22561,7 @@ ] }, { - "uuid": "268d6911-13d6-4481-8ff6-06f4b1c0e02c", + "uuid": "ad18a552-c1bb-4961-bc8a-baca36dd5978", "control-id": "cis_rhel10_5-4.1.6", "description": "No notes for control-id 5.4.1.6.", "props": [ @@ -22624,7 +22578,7 @@ ] }, { - "uuid": "2abfbe95-c89a-4303-b0c4-67a36d68008f", + "uuid": "cc0701b2-2d8b-4b7c-adea-f448c45ceaeb", "control-id": "cis_rhel10_5-4.2.1", "description": "No notes for control-id 5.4.2.1.", "props": [ @@ -22641,7 +22595,7 @@ ] }, { - "uuid": "a42cdea5-4d7c-46d0-bf0c-4d35ae71c126", + "uuid": "c8ba31f4-7131-4d7d-9fc2-06d05dc1421e", "control-id": "cis_rhel10_5-4.2.2", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -22658,7 +22612,7 @@ ] }, { - "uuid": "d136a7dc-a69c-4dd7-9627-53633d0e1f00", + "uuid": "ee4f146c-7169-49df-a215-6bc10fcb904f", "control-id": "cis_rhel10_5-4.2.3", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -22675,7 +22629,7 @@ ] }, { - "uuid": "056fe021-c2fc-4ed9-b283-48c467850947", + "uuid": "a2d486a1-48dd-484b-a2bf-49bd5baf8369", "control-id": "cis_rhel10_5-4.2.4", "description": "No notes for control-id 5.4.2.4.", "props": [ @@ -22692,7 +22646,7 @@ ] }, { - "uuid": "60b08a6b-6669-4514-8830-71bb57f35030", + "uuid": "2ebb0565-49d6-43fc-91e5-898a3d0f3ee1", "control-id": "cis_rhel10_5-4.2.5", "description": "No notes for control-id 5.4.2.5.", "props": [ @@ -22714,7 +22668,7 @@ ] }, { - "uuid": "0862eec2-9a8c-4d85-a886-0eae634b8557", + "uuid": "b75ab93c-29a1-45cc-8d79-24a7880df3c0", "control-id": "cis_rhel10_5-4.2.6", "description": "No notes for control-id 5.4.2.6.", "props": [ @@ -22731,7 +22685,7 @@ ] }, { - "uuid": "edcae66b-5355-46f9-8f16-2ce0eb3f57a7", + "uuid": "237705ad-05b4-48c0-96d9-afb941490d73", "control-id": "cis_rhel10_5-4.2.7", "description": "No notes for control-id 5.4.2.7.", "props": [ @@ -22753,7 +22707,7 @@ ] }, { - "uuid": "0e60ad09-36fd-4ab2-b102-b6d41d279d43", + "uuid": "30ac192e-df06-48c0-865b-a3482b246ab9", "control-id": "cis_rhel10_5-4.2.8", "description": "No notes for control-id 5.4.2.8.", "props": [ @@ -22770,7 +22724,7 @@ ] }, { - "uuid": "08b3ae90-1911-45cd-9ec3-897c37d420ce", + "uuid": "3c15a061-1434-4616-bc4a-b228420e9c30", "control-id": "cis_rhel10_5-4.3.2", "description": "No notes for control-id 5.4.3.2.", "props": [ @@ -22787,7 +22741,7 @@ ] }, { - "uuid": "4e904cb1-ee0f-45b8-9705-96d65f41ac77", + "uuid": "2651a203-9019-452e-9e2b-2b638c906f21", "control-id": "cis_rhel10_5-4.3.3", "description": "No notes for control-id 5.4.3.3.", "props": [ @@ -22814,7 +22768,7 @@ ] }, { - "uuid": "63d44344-222d-4431-bf4e-db5e45de35b9", + "uuid": "220f6f2c-9c8f-4aad-978f-7381241baf17", "control-id": "cis_rhel10_6-1.1", "description": "No notes for control-id 6.1.1.", "props": [ @@ -22836,7 +22790,7 @@ ] }, { - "uuid": "f8d0b97e-50cc-4160-8ad5-750f552fb563", + "uuid": "b8a14f99-dee6-4482-a012-fa59e18af8cb", "control-id": "cis_rhel10_6-1.2", "description": "No notes for control-id 6.1.2.", "props": [ @@ -22853,7 +22807,7 @@ ] }, { - "uuid": "233372a2-cace-4ada-9115-97e58b83f31d", + "uuid": "1b1df585-9b9d-4401-aaec-ddb9150ea4a3", "control-id": "cis_rhel10_6-1.3", "description": "No notes for control-id 6.1.3.", "props": [ @@ -22870,7 +22824,7 @@ ] }, { - "uuid": "3d017d4a-f617-43f9-a106-636f91f5170f", + "uuid": "847540c2-7f91-4da7-9002-cc9c8c73af46", "control-id": "cis_rhel10_6-2.1.1", "description": "No notes for control-id 6.2.1.1.", "props": [ @@ -22887,7 +22841,7 @@ ] }, { - "uuid": "fbe7cfb6-3b9f-4048-aa01-8d835dc03ef9", + "uuid": "3bb56d85-33e8-45a6-accd-e8a99909379a", "control-id": "cis_rhel10_6-2.1.2", "description": "The description for control-id cis_rhel10_6-2.1.2.", "props": [ @@ -22900,7 +22854,7 @@ ] }, { - "uuid": "e3f31a2f-0c70-4ec8-ae05-5ce8ebe82244", + "uuid": "91e7bbb1-4867-4bcd-8ac0-e9ea4d7eb281", "control-id": "cis_rhel10_6-2.1.3", "description": "The description for control-id cis_rhel10_6-2.1.3.", "props": [ @@ -22913,7 +22867,7 @@ ] }, { - "uuid": "0604bba3-1170-46f6-aba0-bcc84651ecdf", + "uuid": "206c928e-d6db-4940-8821-fc96299ad940", "control-id": "cis_rhel10_6-2.1.4", "description": "No notes for control-id 6.2.1.4.", "props": [ @@ -22930,7 +22884,7 @@ ] }, { - "uuid": "c9170ee7-a17e-4d85-9684-d4157bdaabb8", + "uuid": "653a7d18-cd57-4e2d-8722-1a82fc56a19d", "control-id": "cis_rhel10_6-2.2.1.1", "description": "No notes for control-id 6.2.2.1.1.", "props": [ @@ -22947,7 +22901,7 @@ ] }, { - "uuid": "c5a0bd06-756b-4c42-a8b8-3fc696b80330", + "uuid": "c9e6f9fc-b5bc-4bf6-a128-a746ca09c0f5", "control-id": "cis_rhel10_6-2.2.1.2", "description": "The description for control-id cis_rhel10_6-2.2.1.2.", "props": [ @@ -22960,7 +22914,7 @@ ] }, { - "uuid": "e040f7f7-ddfe-4a79-911d-fd3bfef8d667", + "uuid": "01171f1b-0cef-4a6c-9a6d-ee16af6665f1", "control-id": "cis_rhel10_6-2.2.1.3", "description": "No notes for control-id 6.2.2.1.3.", "props": [ @@ -22977,7 +22931,7 @@ ] }, { - "uuid": "5f0b8372-e58d-4270-a86a-d15d8e0fe5c4", + "uuid": "013ecd8e-21ea-44b0-81dc-f43f1f473740", "control-id": "cis_rhel10_6-2.2.1.4", "description": "No notes for control-id 6.2.2.1.4.", "props": [ @@ -22994,7 +22948,7 @@ ] }, { - "uuid": "7ae73fcc-5bdf-4bbd-b993-ff2a751efa9b", + "uuid": "f01cc36c-81b7-4983-b984-c2bf4f9caccd", "control-id": "cis_rhel10_6-2.2.2", "description": "No notes for control-id 6.2.2.2.", "props": [ @@ -23011,7 +22965,7 @@ ] }, { - "uuid": "199aca39-21b2-488d-9b80-21bf4b44e943", + "uuid": "8b267292-fb92-4e15-a560-661e43472c20", "control-id": "cis_rhel10_6-2.2.3", "description": "No notes for control-id 6.2.2.3.", "props": [ @@ -23028,7 +22982,7 @@ ] }, { - "uuid": "8393a699-19fc-4d91-81d1-e3051c01ae3c", + "uuid": "991bb43f-fd8a-438d-8f04-edf5043da129", "control-id": "cis_rhel10_6-2.2.4", "description": "No notes for control-id 6.2.2.4.", "props": [ @@ -23045,7 +22999,7 @@ ] }, { - "uuid": "57052ad8-000f-4797-8d1f-3014454ab978", + "uuid": "dffd00a3-218e-496c-9d7b-e0dea4203b61", "control-id": "cis_rhel10_6-2.3.1", "description": "No notes for control-id 6.2.3.1.", "props": [ @@ -23057,7 +23011,7 @@ ] }, { - "uuid": "fac5658a-c2b6-4bfc-a3ab-912416234950", + "uuid": "8662ac05-2795-4ad0-8a6a-01411aa4dadd", "control-id": "cis_rhel10_6-2.3.2", "description": "No notes for control-id 6.2.3.2.", "props": [ @@ -23069,7 +23023,7 @@ ] }, { - "uuid": "ea814f8d-5f81-4f8e-94de-8466aba2c876", + "uuid": "61c8e099-ab06-4996-a867-be86ab262b7d", "control-id": "cis_rhel10_6-2.3.3", "description": "No notes for control-id 6.2.3.3.", "props": [ @@ -23081,7 +23035,7 @@ ] }, { - "uuid": "37422cdb-7709-4009-a7b4-565ad6cbfddc", + "uuid": "c194e6a6-3ac5-49eb-921a-2a09afed5d12", "control-id": "cis_rhel10_6-2.3.4", "description": "No notes for control-id 6.2.3.4.", "props": [ @@ -23093,7 +23047,7 @@ ] }, { - "uuid": "babc7ed6-f03e-47d1-b3f6-6652c5dc6f03", + "uuid": "732835c3-a289-4b97-8bda-565639a18ef6", "control-id": "cis_rhel10_6-2.3.5", "description": "The description for control-id cis_rhel10_6-2.3.5.", "props": [ @@ -23106,7 +23060,7 @@ ] }, { - "uuid": "45255bef-e510-4119-90c4-c062a6e2dc7d", + "uuid": "4db28cf1-a5cb-4827-bbdd-c73d3165fd41", "control-id": "cis_rhel10_6-2.3.6", "description": "The description for control-id cis_rhel10_6-2.3.6.", "props": [ @@ -23119,7 +23073,7 @@ ] }, { - "uuid": "f9e1fc2e-2240-4a79-8164-7664856d5298", + "uuid": "fa3a565c-79fb-4e4b-bd0d-4fe0deca2094", "control-id": "cis_rhel10_6-2.3.7", "description": "No notes for control-id 6.2.3.7.", "props": [ @@ -23131,7 +23085,7 @@ ] }, { - "uuid": "5298dd16-cef8-4019-8e24-edb0e21980b3", + "uuid": "0996814f-70be-467b-9e01-0410c0b0e1f8", "control-id": "cis_rhel10_6-2.3.8", "description": "The description for control-id cis_rhel10_6-2.3.8.", "props": [ @@ -23144,7 +23098,7 @@ ] }, { - "uuid": "05530ffa-4ea3-497c-a243-e1eb550a4fa1", + "uuid": "31c097c0-0569-400e-b107-a232bd863dca", "control-id": "cis_rhel10_6-2.4.1", "description": "It is not harmful to run these rules even if rsyslog is not installed or active.", "props": [ @@ -23171,7 +23125,7 @@ ] }, { - "uuid": "62aaf6a3-dafe-49b4-b123-becafd68c18c", + "uuid": "b42c00bb-db99-4f99-ade8-e14b5b83f039", "control-id": "cis_rhel10_7-1.1", "description": "No notes for control-id 7.1.1.", "props": [ @@ -23198,7 +23152,7 @@ ] }, { - "uuid": "8989da26-3c6f-44de-a8c7-d6e10d41f31f", + "uuid": "515527c2-e7ed-48c3-8e2a-47e8875a0996", "control-id": "cis_rhel10_7-1.2", "description": "No notes for control-id 7.1.2.", "props": [ @@ -23225,7 +23179,7 @@ ] }, { - "uuid": "7e6cbf46-f0ba-49bf-a75a-16a946166163", + "uuid": "1fc6a2da-a860-4bcd-8e29-d2e16bc7f4b1", "control-id": "cis_rhel10_7-1.3", "description": "No notes for control-id 7.1.3.", "props": [ @@ -23252,7 +23206,7 @@ ] }, { - "uuid": "3d75b0ee-bf8a-4e1c-96cc-fe3c1766aad3", + "uuid": "29c06752-e6bd-46dd-8e17-2879dbea8410", "control-id": "cis_rhel10_7-1.4", "description": "No notes for control-id 7.1.4.", "props": [ @@ -23279,7 +23233,7 @@ ] }, { - "uuid": "a9678204-5266-4bdd-a6ab-a649d0b1fd86", + "uuid": "81679619-30ff-498e-92b2-a46ccdc32c3e", "control-id": "cis_rhel10_7-1.5", "description": "No notes for control-id 7.1.5.", "props": [ @@ -23306,7 +23260,7 @@ ] }, { - "uuid": "e6aaefc4-2fbf-48c2-8458-8ff0ddf4715c", + "uuid": "96016956-671b-4658-beb2-5f8e029b541a", "control-id": "cis_rhel10_7-1.6", "description": "No notes for control-id 7.1.6.", "props": [ @@ -23333,7 +23287,7 @@ ] }, { - "uuid": "b147d08f-3209-4bbc-9ef2-7addc1b29b17", + "uuid": "04002acb-815d-49f8-8aec-6a0f59d63653", "control-id": "cis_rhel10_7-1.7", "description": "No notes for control-id 7.1.7.", "props": [ @@ -23360,7 +23314,7 @@ ] }, { - "uuid": "f4aca3c2-2319-4454-b162-6e4a069aef12", + "uuid": "0c1aefcc-dca0-40d5-ab60-48a289c57f54", "control-id": "cis_rhel10_7-1.8", "description": "No notes for control-id 7.1.8.", "props": [ @@ -23387,7 +23341,7 @@ ] }, { - "uuid": "ecc3299c-9410-4036-8ec4-fdb229f50628", + "uuid": "50a1169a-f5f0-4001-8189-aa7827216d23", "control-id": "cis_rhel10_7-1.9", "description": "No notes for control-id 7.1.9.", "props": [ @@ -23414,7 +23368,7 @@ ] }, { - "uuid": "6ac046df-ee0f-40f2-b328-d52aa9033bcc", + "uuid": "24559b73-6258-478d-bfd6-f1d993afca31", "control-id": "cis_rhel10_7-1.10", "description": "No notes for control-id 7.1.10.", "props": [ @@ -23456,7 +23410,7 @@ ] }, { - "uuid": "5c4756aa-446e-4a38-8be5-2ba70f3cbd8e", + "uuid": "fa9d91c6-a77c-4c53-931d-4965619b7fcc", "control-id": "cis_rhel10_7-1.11", "description": "No notes for control-id 7.1.11.", "props": [ @@ -23478,7 +23432,7 @@ ] }, { - "uuid": "53cbc30d-22a9-4522-a1ac-8f55ecf95b3f", + "uuid": "cabe499e-bacb-4821-951a-a9e923185eda", "control-id": "cis_rhel10_7-1.12", "description": "No notes for control-id 7.1.12.", "props": [ @@ -23500,7 +23454,7 @@ ] }, { - "uuid": "e642ba3e-1304-4cc2-8df0-abc3e138e34d", + "uuid": "f017afc0-4046-4464-a2fa-0e240cad6ab4", "control-id": "cis_rhel10_7-1.13", "description": "The description for control-id cis_rhel10_7-1.13.", "props": [ @@ -23513,7 +23467,7 @@ ] }, { - "uuid": "9886d88b-776b-4f3f-9339-93ec2764744b", + "uuid": "076029cb-95a5-4add-88a0-e3ffc5063592", "control-id": "cis_rhel10_7-2.1", "description": "No notes for control-id 7.2.1.", "props": [ @@ -23530,7 +23484,7 @@ ] }, { - "uuid": "361a1583-2d95-41b0-9151-0037f797e355", + "uuid": "68ac2dea-4834-403b-bb3f-47d11abe7c3a", "control-id": "cis_rhel10_7-2.2", "description": "No notes for control-id 7.2.2.", "props": [ @@ -23547,7 +23501,7 @@ ] }, { - "uuid": "1a26f564-e8db-4549-ac3e-c143a0ced972", + "uuid": "6ecf6508-4be4-46e2-9982-deaf29cb2aff", "control-id": "cis_rhel10_7-2.3", "description": "No notes for control-id 7.2.3.", "props": [ @@ -23564,7 +23518,7 @@ ] }, { - "uuid": "f5d0f325-487b-42dd-92b0-f6bb062144b2", + "uuid": "b2fd7ef9-dee5-4a51-9800-a6d3e3694241", "control-id": "cis_rhel10_7-2.4", "description": "No notes for control-id 7.2.4.", "props": [ @@ -23581,7 +23535,7 @@ ] }, { - "uuid": "064c3782-343f-4e0b-a94f-841ef36c19f8", + "uuid": "b9eed367-7113-461c-818b-0e67f9e0a443", "control-id": "cis_rhel10_7-2.5", "description": "No notes for control-id 7.2.5.", "props": [ @@ -23598,7 +23552,7 @@ ] }, { - "uuid": "f36e4b8a-27c9-4e7e-9623-baf1e77ad1af", + "uuid": "f393e2e9-538e-4d54-b477-807b998bf29d", "control-id": "cis_rhel10_7-2.6", "description": "No notes for control-id 7.2.6.", "props": [ @@ -23615,7 +23569,7 @@ ] }, { - "uuid": "33802a9a-1819-4c0a-b698-00683f79ed67", + "uuid": "2311dbe6-10d9-47d5-9fbf-8554e3fb0f88", "control-id": "cis_rhel10_7-2.7", "description": "No notes for control-id 7.2.7.", "props": [ @@ -23632,7 +23586,7 @@ ] }, { - "uuid": "e372e2c6-696f-436e-85ad-f90ca048c2a7", + "uuid": "08b9dc78-f49d-4ee9-ac35-bb37b1405f7b", "control-id": "cis_rhel10_7-2.8", "description": "No notes for control-id 7.2.8.", "props": [ @@ -23659,7 +23613,7 @@ ] }, { - "uuid": "dfc8ce5a-aee3-4831-be7b-cc25cc19fcb3", + "uuid": "90a7a9eb-8053-43fe-a5c1-a09935ef86b9", "control-id": "cis_rhel10_7-2.9", "description": "No notes for control-id 7.2.9.", "props": [ diff --git a/component-definitions/rhel10/rhel10-cis_rhel10-l1_workstation/component-definition.json b/component-definitions/rhel10/rhel10-cis_rhel10-l1_workstation/component-definition.json index 006b500c..5c948858 100644 --- a/component-definitions/rhel10/rhel10-cis_rhel10-l1_workstation/component-definition.json +++ b/component-definitions/rhel10/rhel10-cis_rhel10-l1_workstation/component-definition.json @@ -3,8 +3,8 @@ "uuid": "f215e0d6-22bf-45fa-955c-4bc760e0ee55", "metadata": { "title": "Component definition for rhel10", - "last-modified": "2025-12-17T09:49:49.063362+00:00", - "version": "3.5", + "last-modified": "2025-12-17T10:47:54.863368+00:00", + "version": "3.6", "oscal-version": "1.1.3" }, "components": [ @@ -725,7 +725,7 @@ { "name": "Parameter_Value_Alternatives_38", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -743,7 +743,7 @@ { "name": "Parameter_Value_Alternatives_39", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -3767,1075 +3767,1063 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_libuserconf", + "value": "set_password_hashing_algorithm_logindefs", "remarks": "rule_set_227" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Hashing Algorithm in /etc/libuser.conf", + "value": "Set Password Hashing Algorithm in /etc/login.defs", "remarks": "rule_set_227" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_logindefs", + "value": "account_disable_post_pw_expiration", "remarks": "rule_set_228" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Hashing Algorithm in /etc/login.defs", + "value": "Set Account Expiration Following Inactivity", "remarks": "rule_set_228" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "account_disable_post_pw_expiration", + "value": "accounts_set_post_pw_existing", "remarks": "rule_set_229" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Account Expiration Following Inactivity", + "value": "Set existing passwords a period of inactivity before they been locked", "remarks": "rule_set_229" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_set_post_pw_existing", + "value": "accounts_password_last_change_is_in_past", "remarks": "rule_set_230" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set existing passwords a period of inactivity before they been locked", + "value": "Ensure all users last password change date is in the past", "remarks": "rule_set_230" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_last_change_is_in_past", + "value": "accounts_no_uid_except_zero", "remarks": "rule_set_231" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure all users last password change date is in the past", + "value": "Verify Only Root Has UID 0", "remarks": "rule_set_231" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_no_uid_except_zero", + "value": "accounts_root_gid_zero", "remarks": "rule_set_232" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Only Root Has UID 0", + "value": "Verify Root Has A Primary GID 0", "remarks": "rule_set_232" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_root_gid_zero", + "value": "groups_no_zero_gid_except_root", "remarks": "rule_set_233" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Root Has A Primary GID 0", + "value": "Verify Only Group Root Has GID 0", "remarks": "rule_set_233" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "groups_no_zero_gid_except_root", + "value": "ensure_root_password_configured", "remarks": "rule_set_234" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Only Group Root Has GID 0", + "value": "Ensure Authentication Required for Single User Mode", "remarks": "rule_set_234" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_root_password_configured", + "value": "accounts_root_path_dirs_no_write", "remarks": "rule_set_235" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Authentication Required for Single User Mode", + "value": "Ensure that Root's Path Does Not Include World or Group-Writable Directories", "remarks": "rule_set_235" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_root_path_dirs_no_write", + "value": "root_path_no_dot", "remarks": "rule_set_236" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that Root's Path Does Not Include World or Group-Writable Directories", + "value": "Ensure that Root's Path Does Not Include Relative Paths or Null Directories", "remarks": "rule_set_236" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "root_path_no_dot", + "value": "accounts_umask_root", "remarks": "rule_set_237" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that Root's Path Does Not Include Relative Paths or Null Directories", + "value": "Ensure the Root Bash Umask is Set Correctly", "remarks": "rule_set_237" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_root", + "value": "no_password_auth_for_systemaccounts", "remarks": "rule_set_238" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Root Bash Umask is Set Correctly", + "value": "Ensure that System Accounts Are Locked", "remarks": "rule_set_238" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_password_auth_for_systemaccounts", + "value": "no_shelllogin_for_systemaccounts", "remarks": "rule_set_239" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that System Accounts Are Locked", + "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", "remarks": "rule_set_239" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_shelllogin_for_systemaccounts", + "value": "no_invalid_shell_accounts_unlocked", "remarks": "rule_set_240" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", + "value": "Verify Non-Interactive Accounts Are Locked", "remarks": "rule_set_240" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_invalid_shell_accounts_unlocked", + "value": "accounts_tmout", "remarks": "rule_set_241" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Non-Interactive Accounts Are Locked", + "value": "Set Interactive Session Timeout", "remarks": "rule_set_241" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_tmout", + "value": "accounts_umask_etc_bashrc", "remarks": "rule_set_242" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Interactive Session Timeout", + "value": "Ensure the Default Bash Umask is Set Correctly", "remarks": "rule_set_242" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_bashrc", + "value": "accounts_umask_etc_login_defs", "remarks": "rule_set_243" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Bash Umask is Set Correctly", + "value": "Ensure the Default Umask is Set Correctly in login.defs", "remarks": "rule_set_243" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_login_defs", + "value": "accounts_umask_etc_profile", "remarks": "rule_set_244" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Umask is Set Correctly in login.defs", + "value": "Ensure the Default Umask is Set Correctly in /etc/profile", "remarks": "rule_set_244" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_profile", + "value": "package_aide_installed", "remarks": "rule_set_245" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Umask is Set Correctly in /etc/profile", + "value": "Install AIDE", "remarks": "rule_set_245" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_aide_installed", + "value": "aide_build_database", "remarks": "rule_set_246" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install AIDE", + "value": "Build and Test AIDE Database", "remarks": "rule_set_246" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_build_database", + "value": "aide_periodic_cron_checking", "remarks": "rule_set_247" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Build and Test AIDE Database", + "value": "Configure Periodic Execution of AIDE", "remarks": "rule_set_247" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_periodic_cron_checking", + "value": "aide_check_audit_tools", "remarks": "rule_set_248" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Periodic Execution of AIDE", + "value": "Configure AIDE to Verify the Audit Tools", "remarks": "rule_set_248" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_check_audit_tools", + "value": "service_systemd-journald_enabled", "remarks": "rule_set_249" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure AIDE to Verify the Audit Tools", + "value": "Enable systemd-journald Service", "remarks": "rule_set_249" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_systemd-journald_enabled", + "value": "ensure_journald_and_rsyslog_not_active_together", "remarks": "rule_set_250" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable systemd-journald Service", + "value": "Ensure journald and rsyslog Are Not Active Together", "remarks": "rule_set_250" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_journald_and_rsyslog_not_active_together", + "value": "package_systemd-journal-remote_installed", "remarks": "rule_set_251" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald and rsyslog Are Not Active Together", + "value": "Install systemd-journal-remote Package", "remarks": "rule_set_251" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_systemd-journal-remote_installed", + "value": "service_systemd-journal-upload_enabled", "remarks": "rule_set_252" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install systemd-journal-remote Package", + "value": "Enable systemd-journal-upload Service", "remarks": "rule_set_252" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_systemd-journal-upload_enabled", + "value": "socket_systemd-journal-remote_disabled", "remarks": "rule_set_253" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable systemd-journal-upload Service", + "value": "Disable systemd-journal-remote Socket", "remarks": "rule_set_253" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "socket_systemd-journal-remote_disabled", + "value": "journald_disable_forward_to_syslog", "remarks": "rule_set_254" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable systemd-journal-remote Socket", + "value": "Ensure journald ForwardToSyslog is disabled", "remarks": "rule_set_254" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_disable_forward_to_syslog", + "value": "journald_compress", "remarks": "rule_set_255" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald ForwardToSyslog is disabled", + "value": "Ensure journald is configured to compress large log files", "remarks": "rule_set_255" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_compress", + "value": "journald_storage", "remarks": "rule_set_256" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald is configured to compress large log files", + "value": "Ensure journald is configured to write log files to persistent disk", "remarks": "rule_set_256" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_storage", + "value": "rsyslog_files_groupownership", "remarks": "rule_set_257" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald is configured to write log files to persistent disk", + "value": "Ensure Log Files Are Owned By Appropriate Group", "remarks": "rule_set_257" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_groupownership", + "value": "rsyslog_files_ownership", "remarks": "rule_set_258" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Log Files Are Owned By Appropriate Group", + "value": "Ensure Log Files Are Owned By Appropriate User", "remarks": "rule_set_258" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_ownership", + "value": "rsyslog_files_permissions", "remarks": "rule_set_259" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Log Files Are Owned By Appropriate User", + "value": "Ensure System Log Files Have Correct Permissions", "remarks": "rule_set_259" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_permissions", + "value": "file_groupowner_etc_passwd", "remarks": "rule_set_260" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure System Log Files Have Correct Permissions", + "value": "Verify Group Who Owns passwd File", "remarks": "rule_set_260" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_passwd", + "value": "file_owner_etc_passwd", "remarks": "rule_set_261" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns passwd File", + "value": "Verify User Who Owns passwd File", "remarks": "rule_set_261" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_passwd", + "value": "file_permissions_etc_passwd", "remarks": "rule_set_262" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns passwd File", + "value": "Verify Permissions on passwd File", "remarks": "rule_set_262" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_passwd", + "value": "file_groupowner_backup_etc_passwd", "remarks": "rule_set_263" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on passwd File", + "value": "Verify Group Who Owns Backup passwd File", "remarks": "rule_set_263" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_passwd", + "value": "file_owner_backup_etc_passwd", "remarks": "rule_set_264" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup passwd File", + "value": "Verify User Who Owns Backup passwd File", "remarks": "rule_set_264" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_passwd", + "value": "file_permissions_backup_etc_passwd", "remarks": "rule_set_265" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup passwd File", + "value": "Verify Permissions on Backup passwd File", "remarks": "rule_set_265" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_passwd", + "value": "file_groupowner_etc_group", "remarks": "rule_set_266" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup passwd File", + "value": "Verify Group Who Owns group File", "remarks": "rule_set_266" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_group", + "value": "file_owner_etc_group", "remarks": "rule_set_267" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns group File", + "value": "Verify User Who Owns group File", "remarks": "rule_set_267" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_group", + "value": "file_permissions_etc_group", "remarks": "rule_set_268" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns group File", + "value": "Verify Permissions on group File", "remarks": "rule_set_268" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_group", + "value": "file_groupowner_backup_etc_group", "remarks": "rule_set_269" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on group File", + "value": "Verify Group Who Owns Backup group File", "remarks": "rule_set_269" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_group", + "value": "file_owner_backup_etc_group", "remarks": "rule_set_270" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup group File", + "value": "Verify User Who Owns Backup group File", "remarks": "rule_set_270" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_group", + "value": "file_permissions_backup_etc_group", "remarks": "rule_set_271" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup group File", + "value": "Verify Permissions on Backup group File", "remarks": "rule_set_271" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_group", + "value": "file_owner_etc_shadow", "remarks": "rule_set_272" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup group File", + "value": "Verify User Who Owns shadow File", "remarks": "rule_set_272" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_shadow", + "value": "file_groupowner_etc_shadow", "remarks": "rule_set_273" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns shadow File", + "value": "Verify Group Who Owns shadow File", "remarks": "rule_set_273" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_shadow", + "value": "file_permissions_etc_shadow", "remarks": "rule_set_274" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns shadow File", + "value": "Verify Permissions on shadow File", "remarks": "rule_set_274" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_shadow", + "value": "file_groupowner_backup_etc_shadow", "remarks": "rule_set_275" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on shadow File", + "value": "Verify User Who Owns Backup shadow File", "remarks": "rule_set_275" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_shadow", + "value": "file_owner_backup_etc_shadow", "remarks": "rule_set_276" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup shadow File", + "value": "Verify Group Who Owns Backup shadow File", "remarks": "rule_set_276" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_shadow", + "value": "file_permissions_backup_etc_shadow", "remarks": "rule_set_277" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup shadow File", + "value": "Verify Permissions on Backup shadow File", "remarks": "rule_set_277" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_shadow", + "value": "file_groupowner_etc_gshadow", "remarks": "rule_set_278" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup shadow File", + "value": "Verify Group Who Owns gshadow File", "remarks": "rule_set_278" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_gshadow", + "value": "file_owner_etc_gshadow", "remarks": "rule_set_279" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns gshadow File", + "value": "Verify User Who Owns gshadow File", "remarks": "rule_set_279" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_gshadow", + "value": "file_permissions_etc_gshadow", "remarks": "rule_set_280" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns gshadow File", + "value": "Verify Permissions on gshadow File", "remarks": "rule_set_280" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_gshadow", + "value": "file_groupowner_backup_etc_gshadow", "remarks": "rule_set_281" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on gshadow File", + "value": "Verify Group Who Owns Backup gshadow File", "remarks": "rule_set_281" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_gshadow", + "value": "file_owner_backup_etc_gshadow", "remarks": "rule_set_282" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup gshadow File", + "value": "Verify User Who Owns Backup gshadow File", "remarks": "rule_set_282" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_gshadow", + "value": "file_permissions_backup_etc_gshadow", "remarks": "rule_set_283" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup gshadow File", + "value": "Verify Permissions on Backup gshadow File", "remarks": "rule_set_283" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_gshadow", + "value": "file_groupowner_etc_shells", "remarks": "rule_set_284" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup gshadow File", + "value": "Verify Group Who Owns /etc/shells File", "remarks": "rule_set_284" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_shells", + "value": "file_owner_etc_shells", "remarks": "rule_set_285" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns /etc/shells File", + "value": "Verify Who Owns /etc/shells File", "remarks": "rule_set_285" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_shells", + "value": "file_permissions_etc_shells", "remarks": "rule_set_286" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Who Owns /etc/shells File", + "value": "Verify Permissions on /etc/shells File", "remarks": "rule_set_286" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_shells", + "value": "file_groupowner_etc_security_opasswd", "remarks": "rule_set_287" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on /etc/shells File", + "value": "Verify Group Who Owns /etc/security/opasswd File", "remarks": "rule_set_287" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_security_opasswd", + "value": "file_owner_etc_security_opasswd", "remarks": "rule_set_288" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns /etc/security/opasswd File", + "value": "Verify User Who Owns /etc/security/opasswd File", "remarks": "rule_set_288" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_security_opasswd", + "value": "file_permissions_etc_security_opasswd", "remarks": "rule_set_289" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns /etc/security/opasswd File", + "value": "Verify Permissions on /etc/security/opasswd File", "remarks": "rule_set_289" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_security_opasswd", + "value": "file_groupowner_etc_security_opasswd_old", "remarks": "rule_set_290" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on /etc/security/opasswd File", + "value": "Verify Group Who Owns /etc/security/opasswd.old File", "remarks": "rule_set_290" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_security_opasswd_old", + "value": "file_owner_etc_security_opasswd_old", "remarks": "rule_set_291" }, - { - "name": "Rule_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_291" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_security_opasswd_old", - "remarks": "rule_set_292" - }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_292" + "remarks": "rule_set_291" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd_old", - "remarks": "rule_set_293" + "remarks": "rule_set_292" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd.old File", - "remarks": "rule_set_293" + "remarks": "rule_set_292" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_294" + "remarks": "rule_set_293" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_294" + "remarks": "rule_set_293" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_295" + "remarks": "rule_set_294" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_295" + "remarks": "rule_set_294" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_unowned_by_user", - "remarks": "rule_set_296" + "remarks": "rule_set_295" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a User", - "remarks": "rule_set_296" + "remarks": "rule_set_295" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_ungroupowned", - "remarks": "rule_set_297" + "remarks": "rule_set_296" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a Group", - "remarks": "rule_set_297" + "remarks": "rule_set_296" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_all_shadowed", - "remarks": "rule_set_298" + "remarks": "rule_set_297" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify All Account Password Hashes are Shadowed", - "remarks": "rule_set_298" + "remarks": "rule_set_297" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords_etc_shadow", - "remarks": "rule_set_299" + "remarks": "rule_set_298" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure There Are No Accounts With Blank or Null Passwords", - "remarks": "rule_set_299" + "remarks": "rule_set_298" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gid_passwd_group_same", - "remarks": "rule_set_300" + "remarks": "rule_set_299" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", - "remarks": "rule_set_300" + "remarks": "rule_set_299" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_id", - "remarks": "rule_set_301" + "remarks": "rule_set_300" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique User IDs", - "remarks": "rule_set_301" + "remarks": "rule_set_300" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_id", - "remarks": "rule_set_302" + "remarks": "rule_set_301" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group ID", - "remarks": "rule_set_302" + "remarks": "rule_set_301" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_name", - "remarks": "rule_set_303" + "remarks": "rule_set_302" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique Names", - "remarks": "rule_set_303" + "remarks": "rule_set_302" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_name", - "remarks": "rule_set_304" + "remarks": "rule_set_303" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group Names", - "remarks": "rule_set_304" + "remarks": "rule_set_303" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_interactive_home_directory_exists", - "remarks": "rule_set_305" + "remarks": "rule_set_304" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive Users Home Directories Must Exist", - "remarks": "rule_set_305" + "remarks": "rule_set_304" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_home_directories", - "remarks": "rule_set_306" + "remarks": "rule_set_305" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Be Owned By The Primary User", - "remarks": "rule_set_306" + "remarks": "rule_set_305" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_home_directories", - "remarks": "rule_set_307" + "remarks": "rule_set_306" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", - "remarks": "rule_set_307" + "remarks": "rule_set_306" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_308" + "remarks": "rule_set_307" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_308" + "remarks": "rule_set_307" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_309" + "remarks": "rule_set_308" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_309" + "remarks": "rule_set_308" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_no_world_writable_programs", - "remarks": "rule_set_310" + "remarks": "rule_set_309" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Not Run World-Writable Programs", - "remarks": "rule_set_310" + "remarks": "rule_set_309" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_311" + "remarks": "rule_set_310" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_311" + "remarks": "rule_set_310" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_forward_files", - "remarks": "rule_set_312" + "remarks": "rule_set_311" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .forward Files Exist", - "remarks": "rule_set_312" + "remarks": "rule_set_311" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_netrc_files", - "remarks": "rule_set_313" + "remarks": "rule_set_312" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No netrc Files Exist", - "remarks": "rule_set_313" + "remarks": "rule_set_312" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rhost_files", - "remarks": "rule_set_314" + "remarks": "rule_set_313" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .rhost Files Exist", - "remarks": "rule_set_314" + "remarks": "rule_set_313" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_bash_history", - "remarks": "rule_set_315" + "remarks": "rule_set_314" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure User Bash History File Has Correct Permissions", - "remarks": "rule_set_315" + "remarks": "rule_set_314" } ], "control-implementations": [ { - "uuid": "b029238d-3efa-4596-8215-c9e1b76b84d4", + "uuid": "e533c784-0c12-440e-b6bd-3d407e67c998", "source": "trestle://profiles/rhel10-cis_rhel10-l1_workstation/profile.json", "description": "Control implementation for cis_workstation_l1", "props": [ @@ -5077,13 +5065,13 @@ { "param-id": "var_password_hashing_algorithm", "values": [ - "yescrypt" + "cis_rhel10" ] }, { "param-id": "var_password_hashing_algorithm_pam", "values": [ - "yescrypt" + "cis_rhel10" ] }, { @@ -5191,7 +5179,7 @@ ], "implemented-requirements": [ { - "uuid": "9ad19306-d700-4d62-bf57-f287fcf460a9", + "uuid": "51fcb8f0-ecc4-4386-ac8f-c21cc7bc2f80", "control-id": "reload_dconf_db", "description": "This is a helper rule to reload Dconf database correctly.", "props": [ @@ -5208,7 +5196,7 @@ ] }, { - "uuid": "489f72e9-41ac-48c6-a513-5f8ff1db29a7", + "uuid": "e06cfe14-c0c1-4fee-a186-ed5075581f41", "control-id": "cis_rhel10_1-1.1.1", "description": "No notes for control-id 1.1.1.1.", "props": [ @@ -5225,7 +5213,7 @@ ] }, { - "uuid": "da9d551b-6404-430e-bb6e-5b99ea68a26c", + "uuid": "586741e6-4359-45eb-b87e-a649d8cc628c", "control-id": "cis_rhel10_1-1.1.2", "description": "No notes for control-id 1.1.1.2.", "props": [ @@ -5242,7 +5230,7 @@ ] }, { - "uuid": "9ff5ec21-2a48-4164-aaab-b9fb884a4634", + "uuid": "44da5942-cfc8-4151-8e41-1b22d588847c", "control-id": "cis_rhel10_1-1.1.3", "description": "No notes for control-id 1.1.1.3.", "props": [ @@ -5259,7 +5247,7 @@ ] }, { - "uuid": "9129bb74-81b5-4488-b0ae-1167f2909060", + "uuid": "75014019-8c55-4343-99dc-88af74abec81", "control-id": "cis_rhel10_1-1.1.4", "description": "No notes for control-id 1.1.1.4.", "props": [ @@ -5276,7 +5264,7 @@ ] }, { - "uuid": "fe9dc8e0-ff81-44ae-a8d9-007f87b97d74", + "uuid": "ee906330-9a74-42a3-a2ac-7766765a8e2e", "control-id": "cis_rhel10_1-1.1.5", "description": "No notes for control-id 1.1.1.5.", "props": [ @@ -5293,7 +5281,7 @@ ] }, { - "uuid": "502edba8-397e-4c01-a115-d401913210ed", + "uuid": "a5302782-ed8f-432b-9042-618865259299", "control-id": "cis_rhel10_1-1.1.11", "description": "The description for control-id cis_rhel10_1-1.1.11.", "props": [ @@ -5306,7 +5294,7 @@ ] }, { - "uuid": "1f334f5b-ee3d-4ddb-aa59-0a85618ea5f8", + "uuid": "f579c103-7f76-4b97-9643-6b04277ed0e1", "control-id": "cis_rhel10_1-1.2.1.1", "description": "No notes for control-id 1.1.2.1.1.", "props": [ @@ -5323,7 +5311,7 @@ ] }, { - "uuid": "4004e995-a2db-4891-9e6b-fdb446aa23dd", + "uuid": "d7752397-ecc5-4277-be9e-4a324e7a3c73", "control-id": "cis_rhel10_1-1.2.1.2", "description": "No notes for control-id 1.1.2.1.2.", "props": [ @@ -5340,7 +5328,7 @@ ] }, { - "uuid": "8a573300-40b4-4c02-926e-e43c71503905", + "uuid": "f08c4c45-c8e2-4434-97f5-5950ce96646f", "control-id": "cis_rhel10_1-1.2.1.3", "description": "No notes for control-id 1.1.2.1.3.", "props": [ @@ -5357,7 +5345,7 @@ ] }, { - "uuid": "1d702e74-5158-40cc-a978-3380c16331e2", + "uuid": "2ffa8dab-e25f-4be1-8dff-5201d25e0fbd", "control-id": "cis_rhel10_1-1.2.1.4", "description": "No notes for control-id 1.1.2.1.4.", "props": [ @@ -5374,7 +5362,7 @@ ] }, { - "uuid": "eb3505be-3f2a-4133-88f4-78cc9e39fd46", + "uuid": "ee95aa3b-4f7e-467a-bcb1-e6bd40255a8e", "control-id": "cis_rhel10_1-1.2.2.1", "description": "No notes for control-id 1.1.2.2.1.", "props": [ @@ -5391,7 +5379,7 @@ ] }, { - "uuid": "f253a9d9-e712-4702-81ea-0a05af586959", + "uuid": "8ba58a92-a199-49c2-bc1c-ab0ee081b2ae", "control-id": "cis_rhel10_1-1.2.2.2", "description": "No notes for control-id 1.1.2.2.2.", "props": [ @@ -5408,7 +5396,7 @@ ] }, { - "uuid": "2a403bce-0f88-41b5-a659-336ba8b4fdfd", + "uuid": "c8fb272e-b178-4283-b9b4-3955df56b260", "control-id": "cis_rhel10_1-1.2.2.3", "description": "No notes for control-id 1.1.2.2.3.", "props": [ @@ -5425,7 +5413,7 @@ ] }, { - "uuid": "b84135ab-3a97-4b8d-98eb-bd54204d8526", + "uuid": "ed68ed5a-3832-4ac8-bcb8-6b7835ca68da", "control-id": "cis_rhel10_1-1.2.2.4", "description": "No notes for control-id 1.1.2.2.4.", "props": [ @@ -5442,7 +5430,7 @@ ] }, { - "uuid": "8b81d301-187b-45c3-aa7c-07ebcd9b60ca", + "uuid": "43b7c55c-e79d-4d40-a3ef-084030e9df6c", "control-id": "cis_rhel10_1-1.2.3.2", "description": "No notes for control-id 1.1.2.3.2.", "props": [ @@ -5459,7 +5447,7 @@ ] }, { - "uuid": "90aef432-962f-4b0e-948d-a7463396ac09", + "uuid": "4904f3db-0714-47e4-9a4a-99a8113dae4d", "control-id": "cis_rhel10_1-1.2.3.3", "description": "No notes for control-id 1.1.2.3.3.", "props": [ @@ -5476,7 +5464,7 @@ ] }, { - "uuid": "e3c8e268-00aa-4c61-bc65-c8259cffea87", + "uuid": "f6127d4d-397e-42e4-bd2a-6a4811c9e055", "control-id": "cis_rhel10_1-1.2.4.2", "description": "No notes for control-id 1.1.2.4.2.", "props": [ @@ -5493,7 +5481,7 @@ ] }, { - "uuid": "4b7ee016-f5a4-473b-9f9b-c68e7553d535", + "uuid": "2f1fc588-e806-4d5a-94f2-5984dab392f1", "control-id": "cis_rhel10_1-1.2.4.3", "description": "No notes for control-id 1.1.2.4.3.", "props": [ @@ -5510,7 +5498,7 @@ ] }, { - "uuid": "f3d2592d-9f87-46ad-8edd-df3aae88174d", + "uuid": "82147aad-93a4-4d4e-a0bc-96a7a1937312", "control-id": "cis_rhel10_1-1.2.5.2", "description": "No notes for control-id 1.1.2.5.2.", "props": [ @@ -5527,7 +5515,7 @@ ] }, { - "uuid": "92350613-b0ba-4023-9a25-b51c69d99b30", + "uuid": "62d2461c-4e64-4d33-a789-55bc3d9a6728", "control-id": "cis_rhel10_1-1.2.5.3", "description": "No notes for control-id 1.1.2.5.3.", "props": [ @@ -5544,7 +5532,7 @@ ] }, { - "uuid": "ccdbe9c1-4071-48a3-bc71-c7392c08bf77", + "uuid": "55b8c7f2-b618-4ab4-9ed9-2cb9205e213c", "control-id": "cis_rhel10_1-1.2.5.4", "description": "No notes for control-id 1.1.2.5.4.", "props": [ @@ -5561,7 +5549,7 @@ ] }, { - "uuid": "65800d30-c5a1-4093-8bb1-e30507e5d3ca", + "uuid": "507a8ccb-e3df-4087-aea3-50f9ef808520", "control-id": "cis_rhel10_1-1.2.6.2", "description": "No notes for control-id 1.1.2.6.2.", "props": [ @@ -5578,7 +5566,7 @@ ] }, { - "uuid": "b052dd62-1dd6-4f49-b013-5e90b9357218", + "uuid": "354a47f1-cd6b-4d64-b78b-aa2914e151e9", "control-id": "cis_rhel10_1-1.2.6.3", "description": "No notes for control-id 1.1.2.6.3.", "props": [ @@ -5595,7 +5583,7 @@ ] }, { - "uuid": "97aea8de-3612-4801-9c70-99abc4ef864b", + "uuid": "eb5f891c-45e0-45c0-89f1-acc7e24a12ad", "control-id": "cis_rhel10_1-1.2.6.4", "description": "No notes for control-id 1.1.2.6.4.", "props": [ @@ -5612,7 +5600,7 @@ ] }, { - "uuid": "54a1e84b-def8-4858-b1a2-e78d330a1635", + "uuid": "0142a17e-919f-456d-9fbc-c365722562a2", "control-id": "cis_rhel10_1-1.2.7.2", "description": "No notes for control-id 1.1.2.7.2.", "props": [ @@ -5629,7 +5617,7 @@ ] }, { - "uuid": "d6f23560-dd11-466a-ac7f-34f125bd374f", + "uuid": "9f7b4c05-b83f-4bfe-bc1e-50383ab49475", "control-id": "cis_rhel10_1-1.2.7.3", "description": "No notes for control-id 1.1.2.7.3.", "props": [ @@ -5646,7 +5634,7 @@ ] }, { - "uuid": "dcf9cc15-2742-4583-b267-4c41be82118a", + "uuid": "b87b39c0-ec6a-44d8-a98c-d2e0a2c0d4fa", "control-id": "cis_rhel10_1-1.2.7.4", "description": "No notes for control-id 1.1.2.7.4.", "props": [ @@ -5663,7 +5651,7 @@ ] }, { - "uuid": "99f990e8-6904-41e0-ae76-f2b31d4ba07a", + "uuid": "9c44cc59-dffa-40b8-a616-894e2d639425", "control-id": "cis_rhel10_1-2.1.1", "description": "The description for control-id cis_rhel10_1-2.1.1.", "props": [ @@ -5676,7 +5664,7 @@ ] }, { - "uuid": "59934cbe-1d20-427c-a1e7-a5561f2b7848", + "uuid": "1022f249-c3c2-4c80-87a5-7ac281a0f05e", "control-id": "cis_rhel10_1-2.1.2", "description": "No notes for control-id 1.2.1.2.", "props": [ @@ -5693,7 +5681,7 @@ ] }, { - "uuid": "914e8918-ae50-4548-815e-0a1c2a740f2c", + "uuid": "110bea66-4702-46d9-9b1f-1b95bd54ca80", "control-id": "cis_rhel10_1-2.1.4", "description": "The description for control-id cis_rhel10_1-2.1.4.", "props": [ @@ -5706,7 +5694,7 @@ ] }, { - "uuid": "509c8a66-c2d6-4976-83b0-180a066f7218", + "uuid": "272282f4-77c1-429d-9b03-f43d2838050b", "control-id": "cis_rhel10_1-2.2.1", "description": "The description for control-id cis_rhel10_1-2.2.1.", "props": [ @@ -5719,7 +5707,7 @@ ] }, { - "uuid": "8c361f1a-987e-4027-a19f-161e519d76d6", + "uuid": "cb589d54-df0e-4e87-976e-e762e81f632f", "control-id": "cis_rhel10_1-3.1.1", "description": "No notes for control-id 1.3.1.1.", "props": [ @@ -5736,7 +5724,7 @@ ] }, { - "uuid": "4813fc13-ad79-4816-9936-36ac3565db8c", + "uuid": "b4fa1267-0789-4781-85c2-848f68615047", "control-id": "cis_rhel10_1-3.1.2", "description": "No notes for control-id 1.3.1.2.", "props": [ @@ -5753,7 +5741,7 @@ ] }, { - "uuid": "bb71f338-2e32-4d09-ac6c-66e94c70e974", + "uuid": "d317560c-4a81-46aa-b366-dc70c47547a8", "control-id": "cis_rhel10_1-3.1.3", "description": "No notes for control-id 1.3.1.3.", "props": [ @@ -5770,7 +5758,7 @@ ] }, { - "uuid": "df80b61f-27b1-406b-9ca8-a5b7deb99b32", + "uuid": "ccdf6d9b-dea3-41aa-b119-40922d6c6c1f", "control-id": "cis_rhel10_1-3.1.4", "description": "No notes for control-id 1.3.1.4.", "props": [ @@ -5787,7 +5775,7 @@ ] }, { - "uuid": "c93f5c5d-c302-4645-a5ad-addfdf217d5f", + "uuid": "1ae9ca30-07d5-4e9c-871a-97e4bcbb9a49", "control-id": "cis_rhel10_1-3.1.7", "description": "No notes for control-id 1.3.1.7.", "props": [ @@ -5804,7 +5792,7 @@ ] }, { - "uuid": "30aba0c4-62d4-4cdd-a31e-67f4b87f5edd", + "uuid": "2d3331d5-8c88-49e8-8018-199c4d2000ae", "control-id": "cis_rhel10_1-4.1", "description": "There is no automated remediation for this rule and this is intentional.\nMore details in the rule description.", "props": [ @@ -5821,7 +5809,7 @@ ] }, { - "uuid": "65593862-b124-4703-97ec-fbe9544fc9b6", + "uuid": "10dff3cd-8815-49bb-9da1-674fa7535340", "control-id": "cis_rhel10_1-4.2", "description": "This requirement demands a deeper review of the rules.", "props": [ @@ -5848,7 +5836,7 @@ ] }, { - "uuid": "f5d1d3b9-4ed5-426d-bff0-5f93e782b794", + "uuid": "d8aaf154-ab72-4c5e-b10a-750748c3cad9", "control-id": "cis_rhel10_1-5.1", "description": "No notes for control-id 1.5.1.", "props": [ @@ -5865,7 +5853,7 @@ ] }, { - "uuid": "150f91b0-4f59-465c-98e6-d9d40ab212ea", + "uuid": "4fa164ea-d237-46b1-9e0f-cf16de3e45c6", "control-id": "cis_rhel10_1-5.2", "description": "No notes for control-id 1.5.2.", "props": [ @@ -5882,7 +5870,7 @@ ] }, { - "uuid": "95e11ba9-9a8b-4a3a-97ec-0348b76430a0", + "uuid": "fc671bbd-3eb5-47eb-8e7e-adf0d64b17ca", "control-id": "cis_rhel10_1-5.4", "description": "No notes for control-id 1.5.4.", "props": [ @@ -5899,7 +5887,7 @@ ] }, { - "uuid": "837ccd37-58cb-43fe-b02a-e2ca015644b9", + "uuid": "a5ccd87c-7235-44ea-b718-aa2c509ea09b", "control-id": "cis_rhel10_1-5.5", "description": "No notes for control-id 1.5.5.", "props": [ @@ -5916,7 +5904,7 @@ ] }, { - "uuid": "750c29c8-c1c3-473f-9efb-860188d85f21", + "uuid": "4dd0774e-0411-4bd4-ad6a-16862c66b8da", "control-id": "cis_rhel10_1-5.6", "description": "No notes for control-id 1.5.6.", "props": [ @@ -5933,7 +5921,7 @@ ] }, { - "uuid": "864a5e3d-76a3-4964-9642-8ab4e9284fba", + "uuid": "d39b0b6f-b195-4b7e-84e8-dbb24e541aa9", "control-id": "cis_rhel10_1-5.7", "description": "No notes for control-id 1.5.7.", "props": [ @@ -5950,7 +5938,7 @@ ] }, { - "uuid": "3a3dd4f4-b01b-406e-a1ee-d0f05624e340", + "uuid": "459269d4-42b6-4ed8-bf72-4e56126b22dc", "control-id": "cis_rhel10_1-5.8", "description": "Address Space Layout Randomization (ASLR)", "props": [ @@ -5967,7 +5955,7 @@ ] }, { - "uuid": "1b899a6d-7626-4af3-8faa-629df7de5f3c", + "uuid": "7973a6b6-95be-49e4-8a1f-d05dac18560f", "control-id": "cis_rhel10_1-5.9", "description": "No notes for control-id 1.5.9.", "props": [ @@ -5984,7 +5972,7 @@ ] }, { - "uuid": "469be95d-eaa4-4687-9456-baf1710e5eef", + "uuid": "3180a71d-d0fb-4e92-ad8d-c61f96166655", "control-id": "cis_rhel10_1-5.10", "description": "No notes for control-id 1.5.10.", "props": [ @@ -6001,7 +5989,7 @@ ] }, { - "uuid": "69198e9e-0131-4be5-9435-3bdcc5b22648", + "uuid": "88502a01-413e-40d2-b479-11a7e7a51075", "control-id": "cis_rhel10_1-6.1", "description": "No notes for control-id 1.6.1.", "props": [ @@ -6018,7 +6006,7 @@ ] }, { - "uuid": "d9838986-b4bd-4f8a-8cda-8cadcd4b1bd0", + "uuid": "68b5b890-83c0-48a3-a6d1-8434c4522340", "control-id": "cis_rhel10_1-6.2", "description": "No notes for control-id 1.6.2.", "props": [ @@ -6035,7 +6023,7 @@ ] }, { - "uuid": "693900ce-e02f-462d-9920-b4d16a75f0ba", + "uuid": "a74a1974-d1b5-420d-a376-c39a970e17ec", "control-id": "cis_rhel10_1-6.3", "description": "No notes for control-id 1.6.3.", "props": [ @@ -6052,7 +6040,7 @@ ] }, { - "uuid": "57b2c8e3-a852-4604-9315-9e177626f12d", + "uuid": "1cbb96f6-e4cd-45db-a334-619906ae5448", "control-id": "cis_rhel10_1-6.4", "description": "No notes for control-id 1.6.4.", "props": [ @@ -6069,7 +6057,7 @@ ] }, { - "uuid": "09c5560b-73c4-4430-ab9e-95a80251b5c4", + "uuid": "f2038889-2b93-49f9-bb98-2e043f8a7bfb", "control-id": "cis_rhel10_1-7.1", "description": "No notes for control-id 1.7.1.", "props": [ @@ -6086,7 +6074,7 @@ ] }, { - "uuid": "0090fa9b-40ac-4b80-af50-0796dcee9d38", + "uuid": "93f911b7-fb05-4f72-aa1f-cc854ad14333", "control-id": "cis_rhel10_1-7.2", "description": "No notes for control-id 1.7.2.", "props": [ @@ -6103,7 +6091,7 @@ ] }, { - "uuid": "9e66e776-e43d-4d96-b3e8-4908f6ff2ab2", + "uuid": "cceee787-fc5d-495c-96ce-71f38dbf5bc8", "control-id": "cis_rhel10_1-7.3", "description": "No notes for control-id 1.7.3.", "props": [ @@ -6120,7 +6108,7 @@ ] }, { - "uuid": "d316c7bc-df08-48dd-84c7-3cc09622350d", + "uuid": "546dbc49-b376-4066-986f-f2e6497b9a51", "control-id": "cis_rhel10_1-7.4", "description": "No notes for control-id 1.7.4.", "props": [ @@ -6147,7 +6135,7 @@ ] }, { - "uuid": "3a1460ea-f103-4e80-a72f-e373c0e0ec37", + "uuid": "97c15183-d6ca-4c6d-97a6-0448e73ce9a5", "control-id": "cis_rhel10_1-7.5", "description": "No notes for control-id 1.7.5.", "props": [ @@ -6174,7 +6162,7 @@ ] }, { - "uuid": "64d97c56-767d-4d54-af70-e0f7c75bd156", + "uuid": "dd96525e-fb07-419e-85bd-74e1424af9d2", "control-id": "cis_rhel10_1-7.6", "description": "No notes for control-id 1.7.6.", "props": [ @@ -6201,7 +6189,7 @@ ] }, { - "uuid": "dae48f23-e189-4dcb-a012-3d02ebd88abc", + "uuid": "abfff4cb-3904-4f2f-9f3f-be60f8fb2154", "control-id": "cis_rhel10_1-8.1", "description": "No notes for control-id 1.8.1.", "props": [ @@ -6223,7 +6211,7 @@ ] }, { - "uuid": "6192bf9a-a3d5-4d71-a75b-ae44041998d6", + "uuid": "c2f8260e-594a-4ca9-921e-51894739e12a", "control-id": "cis_rhel10_1-8.2", "description": "No notes for control-id 1.8.2.", "props": [ @@ -6240,7 +6228,7 @@ ] }, { - "uuid": "a9043180-be84-46b0-b951-cdab361439c0", + "uuid": "dbc7bea4-a378-476f-8dee-2287d64b53c8", "control-id": "cis_rhel10_1-8.3", "description": "No notes for control-id 1.8.3.", "props": [ @@ -6272,7 +6260,7 @@ ] }, { - "uuid": "8d1773d9-3166-4ecd-b557-e19ccb49d5af", + "uuid": "e6f2f3c8-541e-4104-b9e8-a7f5895ad40e", "control-id": "cis_rhel10_1-8.5", "description": "No notes for control-id 1.8.5.", "props": [ @@ -6289,7 +6277,7 @@ ] }, { - "uuid": "a5079e84-3610-4575-b885-02680317c513", + "uuid": "256346ec-aad8-403b-b38a-c5693774b669", "control-id": "cis_rhel10_2-1.4", "description": "No notes for control-id 2.1.4.", "props": [ @@ -6306,7 +6294,7 @@ ] }, { - "uuid": "3650d56f-5cdb-4a81-b366-928267495995", + "uuid": "71d880b9-0316-44c8-9bfa-5f6f4b29cbd7", "control-id": "cis_rhel10_2-1.5", "description": "No notes for control-id 2.1.5.", "props": [ @@ -6323,7 +6311,7 @@ ] }, { - "uuid": "265e6d3b-7bef-4282-ad5e-bdc3653ce294", + "uuid": "24313e60-a063-436a-8863-8a89b0f71982", "control-id": "cis_rhel10_2-1.6", "description": "No notes for control-id 2.1.6.", "props": [ @@ -6340,7 +6328,7 @@ ] }, { - "uuid": "281df587-bcff-4294-95e6-04bdf38f3463", + "uuid": "36ff28dc-8ab6-4782-85b9-27149113ee0c", "control-id": "cis_rhel10_2-1.7", "description": "No notes for control-id 2.1.7.", "props": [ @@ -6357,7 +6345,7 @@ ] }, { - "uuid": "a92334ee-b535-48d0-ab38-92d9817fee11", + "uuid": "e6007a29-02c2-4f05-991a-ad894fc03599", "control-id": "cis_rhel10_2-1.8", "description": "No notes for control-id 2.1.8.", "props": [ @@ -6379,7 +6367,7 @@ ] }, { - "uuid": "fa76e796-b331-46f3-bd58-3008f959edb9", + "uuid": "9a7c0001-8a0b-490a-b4a3-b5012354a3ba", "control-id": "cis_rhel10_2-1.9", "description": "Many of the libvirt packages used by Enterprise Linux virtualization are dependent on the\nnfs-utils package.", "props": [ @@ -6396,7 +6384,7 @@ ] }, { - "uuid": "8128e671-a612-4007-b207-c27228fc3f48", + "uuid": "dd357c6f-713b-445a-a3f3-8d39abe5597f", "control-id": "cis_rhel10_2-1.11", "description": "Many of the libvirt packages used by Enterprise Linux virtualization, and the nfs-utils\npackage used for The Network File System (NFS), are dependent on the rpcbind package.", "props": [ @@ -6413,7 +6401,7 @@ ] }, { - "uuid": "8cb70d97-3d9b-4731-9506-034636334f54", + "uuid": "a9bdd183-0c06-46e1-8e9e-f19cd1530c14", "control-id": "cis_rhel10_2-1.12", "description": "No notes for control-id 2.1.12.", "props": [ @@ -6430,7 +6418,7 @@ ] }, { - "uuid": "ed00fac7-8b80-4ba7-b710-13d60018a954", + "uuid": "8a5d00d2-d613-4da5-90e8-cb467639941c", "control-id": "cis_rhel10_2-1.13", "description": "No notes for control-id 2.1.13.", "props": [ @@ -6447,7 +6435,7 @@ ] }, { - "uuid": "ea6eee82-9def-4d14-87a7-c88f3e7a3423", + "uuid": "9e422205-6ca6-4d73-8cec-251fa76437e8", "control-id": "cis_rhel10_2-1.14", "description": "No notes for control-id 2.1.14.", "props": [ @@ -6464,7 +6452,7 @@ ] }, { - "uuid": "655d8951-c890-4d4e-9d5f-e95b8ccb413e", + "uuid": "822a1175-19aa-451b-bbbe-50711d76e81a", "control-id": "cis_rhel10_2-1.15", "description": "No notes for control-id 2.1.15.", "props": [ @@ -6481,7 +6469,7 @@ ] }, { - "uuid": "18c6aa46-238f-4836-a415-c9106876be6d", + "uuid": "c6a2b298-0f79-42b1-90de-89e95fc695af", "control-id": "cis_rhel10_2-1.16", "description": "No notes for control-id 2.1.16.", "props": [ @@ -6498,7 +6486,7 @@ ] }, { - "uuid": "033241b6-647c-41ad-843c-40b7d1b2ed6b", + "uuid": "8ae9ae0d-fe85-4b4d-abaa-74a6f8eb7e63", "control-id": "cis_rhel10_2-1.17", "description": "No notes for control-id 2.1.17.", "props": [ @@ -6515,7 +6503,7 @@ ] }, { - "uuid": "04d99192-d54c-4d67-848e-8e0474b26c47", + "uuid": "6dd60ef4-9ada-4952-8247-8dfec607729e", "control-id": "cis_rhel10_2-1.18", "description": "No notes for control-id 2.1.18.", "props": [ @@ -6537,7 +6525,7 @@ ] }, { - "uuid": "9a38a9ab-3db8-4214-8e14-ab6b9e6e830c", + "uuid": "a7b051f4-c193-43b2-904f-4618c240a7b2", "control-id": "cis_rhel10_2-1.21", "description": "No notes for control-id 2.1.21.", "props": [ @@ -6559,7 +6547,7 @@ ] }, { - "uuid": "f5ef1639-0d4d-4a96-b77b-9bb5f078b3f1", + "uuid": "25c75543-249d-48af-b69e-16d2bf1603d0", "control-id": "cis_rhel10_2-1.22", "description": "The description for control-id cis_rhel10_2-1.22.", "props": [ @@ -6572,7 +6560,7 @@ ] }, { - "uuid": "86beac66-73fd-428f-9d58-e4c627287f5c", + "uuid": "e625f25f-5c9b-44b7-aee2-a20d80715e0e", "control-id": "cis_rhel10_2-2.1", "description": "No notes for control-id 2.2.1.", "props": [ @@ -6589,7 +6577,7 @@ ] }, { - "uuid": "6257d647-ec01-4e01-b3a5-165895d52b1f", + "uuid": "e84c3d64-45c8-45f5-8b1f-6279a10d16ad", "control-id": "cis_rhel10_2-2.3", "description": "No notes for control-id 2.2.3.", "props": [ @@ -6606,7 +6594,7 @@ ] }, { - "uuid": "f9c435f4-6469-4bbf-abe6-7ca27331ba4c", + "uuid": "c72c63ce-1d7b-4e69-9a60-152eec55cf12", "control-id": "cis_rhel10_2-2.4", "description": "No notes for control-id 2.2.4.", "props": [ @@ -6623,7 +6611,7 @@ ] }, { - "uuid": "9a2192a3-5d9b-4026-ad22-41148e938503", + "uuid": "33d995f6-2319-4df5-a6e0-2d6e929992c3", "control-id": "cis_rhel10_2-3.1", "description": "No notes for control-id 2.3.1.", "props": [ @@ -6635,7 +6623,7 @@ ] }, { - "uuid": "daaef24a-4e67-4533-b92e-5605bd4bd121", + "uuid": "aa96c378-2122-4f7d-9848-a16bd15073c0", "control-id": "cis_rhel10_2-3.2", "description": "No notes for control-id 2.3.2.", "props": [ @@ -6652,7 +6640,7 @@ ] }, { - "uuid": "cbaed93b-d133-4f24-8c57-c79692171960", + "uuid": "d43de4e3-2d74-4939-b5b6-3d5754a4b58f", "control-id": "cis_rhel10_2-3.3", "description": "No notes for control-id 2.3.3.", "props": [ @@ -6669,7 +6657,7 @@ ] }, { - "uuid": "f5e4e4e4-6f83-4467-b080-d926cacb6922", + "uuid": "2be62664-3a87-40d0-bcf9-721080081a5a", "control-id": "cis_rhel10_2-4.1.1", "description": "No notes for control-id 2.4.1.1.", "props": [ @@ -6691,7 +6679,7 @@ ] }, { - "uuid": "aeb6e4be-fabc-42fb-aee1-b00173d80153", + "uuid": "242f3bbd-5475-4a50-8974-28aaa304345f", "control-id": "cis_rhel10_2-4.1.2", "description": "No notes for control-id 2.4.1.2.", "props": [ @@ -6718,7 +6706,7 @@ ] }, { - "uuid": "8bc3cd81-a312-46ed-ace1-bd0de62363d0", + "uuid": "50830d5d-2510-4f02-9472-a969be57e64e", "control-id": "cis_rhel10_2-4.1.3", "description": "No notes for control-id 2.4.1.3.", "props": [ @@ -6745,7 +6733,7 @@ ] }, { - "uuid": "78ded343-350d-434e-b6a5-e56704257a1c", + "uuid": "44ad82c2-5ea9-46b7-93a3-5280363324f2", "control-id": "cis_rhel10_2-4.1.4", "description": "No notes for control-id 2.4.1.4.", "props": [ @@ -6772,7 +6760,7 @@ ] }, { - "uuid": "41d410d8-07b1-4080-b8f5-7dcad910bcbb", + "uuid": "271acc14-f460-4401-8760-943bc435fade", "control-id": "cis_rhel10_2-4.1.5", "description": "No notes for control-id 2.4.1.5.", "props": [ @@ -6799,7 +6787,7 @@ ] }, { - "uuid": "fe0d86c8-722d-4d42-8f61-d1b6f7852f18", + "uuid": "d8f9b97b-694e-43eb-b644-6c8c21571fd0", "control-id": "cis_rhel10_2-4.1.6", "description": "No notes for control-id 2.4.1.6.", "props": [ @@ -6826,7 +6814,7 @@ ] }, { - "uuid": "94fcd369-0a62-420c-ace9-d4ec6fcc238b", + "uuid": "70119f3a-cd86-451d-848d-0fa731062742", "control-id": "cis_rhel10_2-4.1.7", "description": "No notes for control-id 2.4.1.7.", "props": [ @@ -6853,7 +6841,7 @@ ] }, { - "uuid": "eb5f1bfd-92f7-4625-997d-55c27bd13e7d", + "uuid": "6e6437e9-acce-4dca-988a-52bb09594bb1", "control-id": "cis_rhel10_2-4.1.8", "description": "No notes for control-id 2.4.1.8.", "props": [ @@ -6880,7 +6868,7 @@ ] }, { - "uuid": "662d508a-9a4a-4032-b110-8f2e17d8e978", + "uuid": "2b66b9f1-9e88-4a7d-a8a5-adffc02355b2", "control-id": "cis_rhel10_2-4.1.9", "description": "No notes for control-id 2.4.1.9.", "props": [ @@ -6917,7 +6905,7 @@ ] }, { - "uuid": "084bb709-d4e2-4656-9e31-49cf2a161d30", + "uuid": "da78c819-9056-43b4-bfe4-f4bb6ab07145", "control-id": "cis_rhel10_2-4.2.1", "description": "No notes for control-id 2.4.2.1.", "props": [ @@ -6954,7 +6942,7 @@ ] }, { - "uuid": "3defa44b-2458-4b48-b73a-3f65e081af43", + "uuid": "33d53f7f-3b24-40e9-9f21-d4ca723a2714", "control-id": "cis_rhel10_3-1.1", "description": "The description for control-id cis_rhel10_3-1.1.", "props": [ @@ -6967,7 +6955,7 @@ ] }, { - "uuid": "92016b32-2493-4f66-93aa-dcc3d20366ad", + "uuid": "4b0b4667-828e-45e9-b17e-35f0380f36e7", "control-id": "cis_rhel10_3-2.1", "description": "No notes for control-id 3.2.1.", "props": [ @@ -6984,7 +6972,7 @@ ] }, { - "uuid": "35629d72-be88-4643-b966-5fd5342149af", + "uuid": "402467f8-d6a9-4d6e-a1ae-515e92270921", "control-id": "cis_rhel10_3-2.2", "description": "No notes for control-id 3.2.2.", "props": [ @@ -7001,7 +6989,7 @@ ] }, { - "uuid": "7dbab098-f782-4c2c-a20a-84f16ef709b6", + "uuid": "97ce5b79-b0fa-4134-a25b-7f849adc64e4", "control-id": "cis_rhel10_3-2.3", "description": "No notes for control-id 3.2.3.", "props": [ @@ -7018,7 +7006,7 @@ ] }, { - "uuid": "97d7c8fc-e9b6-4dbd-bbb3-942e4871c165", + "uuid": "a1a6eb7f-cba1-4d80-985b-8592a27b715e", "control-id": "cis_rhel10_3-2.4", "description": "No notes for control-id 3.2.4.", "props": [ @@ -7035,7 +7023,7 @@ ] }, { - "uuid": "37c08f01-7267-417c-8aee-30320c8f4e71", + "uuid": "388a3bca-6e75-4c40-b435-2c3d08a19a91", "control-id": "cis_rhel10_3-2.5", "description": "No notes for control-id 3.2.5.", "props": [ @@ -7052,7 +7040,7 @@ ] }, { - "uuid": "efb92464-f4b8-4577-923c-b1ddf8c3f45c", + "uuid": "e5da3edb-7374-4e34-9772-05b94f0479b1", "control-id": "cis_rhel10_3-2.6", "description": "No notes for control-id 3.2.6.", "props": [ @@ -7069,7 +7057,7 @@ ] }, { - "uuid": "25eaa037-9e07-4a04-968a-1e23cf701915", + "uuid": "d7822713-1af8-4b24-b775-d517a7489c02", "control-id": "cis_rhel10_3-3.1.1", "description": "No notes for control-id 3.3.1.1.", "props": [ @@ -7086,7 +7074,7 @@ ] }, { - "uuid": "1c9efc39-3f62-4bb0-a767-0520034bad56", + "uuid": "4a96ea2c-ff01-4d2b-8dec-0bfe7fde4da8", "control-id": "cis_rhel10_3-3.1.2", "description": "No notes for control-id 3.3.1.2.", "props": [ @@ -7103,7 +7091,7 @@ ] }, { - "uuid": "cff7efa2-b281-4328-af28-59d9688ba3c5", + "uuid": "8d952925-a699-4883-a68a-fa476275632f", "control-id": "cis_rhel10_3-3.1.3", "description": "No notes for control-id 3.3.1.3.", "props": [ @@ -7120,7 +7108,7 @@ ] }, { - "uuid": "b9b29d8d-953e-4427-82be-2144f2945e72", + "uuid": "efb163a4-4950-419e-98ac-c4f48febd09d", "control-id": "cis_rhel10_3-3.1.4", "description": "No notes for control-id 3.3.1.4.", "props": [ @@ -7137,7 +7125,7 @@ ] }, { - "uuid": "a1805fb9-7b7b-4b4e-88da-54f8375a9d74", + "uuid": "8d00de9f-4340-44e2-8ad9-0468fbff08da", "control-id": "cis_rhel10_3-3.1.5", "description": "No notes for control-id 3.3.1.5.", "props": [ @@ -7154,7 +7142,7 @@ ] }, { - "uuid": "1c11e147-52dd-4f37-ac91-da843cbaa6a9", + "uuid": "e82be7ff-64ee-4a4f-b7b8-96b7a5143fd5", "control-id": "cis_rhel10_3-3.1.6", "description": "No notes for control-id 3.3.1.6.", "props": [ @@ -7171,7 +7159,7 @@ ] }, { - "uuid": "a1e587d9-8ffa-4d6e-bc67-ec3b5007bfea", + "uuid": "1b8865c7-e637-470e-b3cb-af04be2e6ed9", "control-id": "cis_rhel10_3-3.1.7", "description": "No notes for control-id 3.3.1.7.", "props": [ @@ -7188,7 +7176,7 @@ ] }, { - "uuid": "4b2f8ab1-ee3a-4137-8eb2-02de325102eb", + "uuid": "e30c5a2a-13bc-4aa1-a9f1-70b1efe7dac2", "control-id": "cis_rhel10_3-3.1.8", "description": "No notes for control-id 3.3.1.8.", "props": [ @@ -7205,7 +7193,7 @@ ] }, { - "uuid": "a92bf683-788f-4874-b041-2c0e54fc7889", + "uuid": "febfcc9e-5581-4f2c-aae6-adf62ee63057", "control-id": "cis_rhel10_3-3.1.9", "description": "No notes for control-id 3.3.1.9.", "props": [ @@ -7222,7 +7210,7 @@ ] }, { - "uuid": "20d82643-184b-4964-ad43-9631298308e6", + "uuid": "56e08402-da3e-434e-83da-850b041d75b1", "control-id": "cis_rhel10_3-3.1.10", "description": "No notes for control-id 3.3.1.10.", "props": [ @@ -7239,7 +7227,7 @@ ] }, { - "uuid": "418a7273-57ea-4f46-b44d-6f5e295be75d", + "uuid": "a0c16d86-c43e-40cc-9683-28829df67462", "control-id": "cis_rhel10_3-3.1.11", "description": "No notes for control-id 3.3.1.11.", "props": [ @@ -7256,7 +7244,7 @@ ] }, { - "uuid": "2cdb59bf-cea2-45c4-9a6d-8c0946c675a6", + "uuid": "1fbe24ea-3b7d-42f5-8405-cb3b3ae49747", "control-id": "cis_rhel10_3-3.1.12", "description": "No notes for control-id 3.3.1.12.", "props": [ @@ -7273,7 +7261,7 @@ ] }, { - "uuid": "37b4a0fb-dca4-4654-800f-c4e98d2817e6", + "uuid": "74e592b2-d2c4-44b3-99bc-d99296ccd6a5", "control-id": "cis_rhel10_3-3.1.13", "description": "No notes for control-id 3.3.1.13.", "props": [ @@ -7290,7 +7278,7 @@ ] }, { - "uuid": "2798f1f1-1d87-49eb-ab2e-6740e5968595", + "uuid": "c68bc5af-2c6b-42a8-9c56-ad197d248db8", "control-id": "cis_rhel10_3-3.1.14", "description": "No notes for control-id 3.3.1.14.", "props": [ @@ -7307,7 +7295,7 @@ ] }, { - "uuid": "c8c5c3fb-4a99-4f9e-9f49-b8b686b93810", + "uuid": "ce97397e-37ca-40af-9b6d-d8b89cd58644", "control-id": "cis_rhel10_3-3.1.15", "description": "No notes for control-id 3.3.1.15.", "props": [ @@ -7324,7 +7312,7 @@ ] }, { - "uuid": "97461dca-c98d-4ab1-9b05-4f1279999858", + "uuid": "6f287b55-011b-4b52-9076-d2b0c55e5ed6", "control-id": "cis_rhel10_3-3.1.16", "description": "No notes for control-id 3.3.1.16.", "props": [ @@ -7341,7 +7329,7 @@ ] }, { - "uuid": "54253eda-99c2-4154-96b4-8209e75b7a90", + "uuid": "451b5990-3d13-434d-aa35-2eb3e34ab390", "control-id": "cis_rhel10_3-3.1.17", "description": "No notes for control-id 3.3.1.17.", "props": [ @@ -7358,7 +7346,7 @@ ] }, { - "uuid": "fa6cb605-e505-4bf2-bbf3-7cd7491c7217", + "uuid": "8a7f0754-ec1d-4177-b14a-3eea74f512c6", "control-id": "cis_rhel10_3-3.1.18", "description": "No notes for control-id 3.3.1.18.", "props": [ @@ -7375,7 +7363,7 @@ ] }, { - "uuid": "5f5c05e0-a50a-4d1a-bc03-0e9f6f7170ce", + "uuid": "33536018-e1b4-4430-aabe-a01b34f479d6", "control-id": "cis_rhel10_3-3.2.1", "description": "No notes for control-id 3.3.2.1.", "props": [ @@ -7392,7 +7380,7 @@ ] }, { - "uuid": "0253ec42-fbcd-4cb2-ace3-c375884acfe0", + "uuid": "00b69504-6781-40a2-a540-bca1cd5307df", "control-id": "cis_rhel10_3-3.2.2", "description": "No notes for control-id 3.3.2.2.", "props": [ @@ -7409,7 +7397,7 @@ ] }, { - "uuid": "b18973d4-3476-4155-8a41-07de21bcf1ed", + "uuid": "eb119344-6c2d-471a-bff5-7b416c3b8bec", "control-id": "cis_rhel10_3-3.2.3", "description": "No notes for control-id 3.3.2.3.", "props": [ @@ -7426,7 +7414,7 @@ ] }, { - "uuid": "c5e75b61-da94-4032-9f8c-ba9a9af57046", + "uuid": "11205d67-677d-4dc2-bc19-8f78008c7049", "control-id": "cis_rhel10_3-3.2.4", "description": "No notes for control-id 3.3.2.4.", "props": [ @@ -7443,7 +7431,7 @@ ] }, { - "uuid": "1511892b-5ed1-4998-93d4-4c867f6906f7", + "uuid": "7c46ff2d-39bb-498f-8201-c6828db22c59", "control-id": "cis_rhel10_3-3.2.5", "description": "No notes for control-id 3.3.2.5.", "props": [ @@ -7460,7 +7448,7 @@ ] }, { - "uuid": "86b4f878-3d9c-4c72-b028-a27369adf2c8", + "uuid": "2dba4ab8-4a1c-4b4e-9c86-3cdecb670b21", "control-id": "cis_rhel10_3-3.2.6", "description": "No notes for control-id 3.3.2.6.", "props": [ @@ -7477,7 +7465,7 @@ ] }, { - "uuid": "2c2da550-f3a5-44a6-bf46-729ed6b1bf66", + "uuid": "b60ee3fd-7572-4342-8ac4-f0c90c2ee990", "control-id": "cis_rhel10_3-3.2.7", "description": "No notes for control-id 3.3.2.7.", "props": [ @@ -7494,7 +7482,7 @@ ] }, { - "uuid": "7d44c3b9-b1e5-4ae9-a83a-1a21043b331c", + "uuid": "1fb4d2fa-262b-4a5e-b960-840c20c5859e", "control-id": "cis_rhel10_3-3.2.8", "description": "No notes for control-id 3.3.2.8.", "props": [ @@ -7511,7 +7499,7 @@ ] }, { - "uuid": "7b2b4146-ce6b-4d26-ad41-9f51aa590058", + "uuid": "65574c1e-127b-4ed2-ab4a-60ed947668e6", "control-id": "cis_rhel10_4-1.1", "description": "No notes for control-id 4.1.1.", "props": [ @@ -7528,7 +7516,7 @@ ] }, { - "uuid": "66945764-2086-48b5-91f5-680626ec1ed1", + "uuid": "b448ee51-28a0-4def-a5fe-fa2e75ed8472", "control-id": "cis_rhel10_4-1.2", "description": "No notes for control-id 4.1.2.", "props": [ @@ -7545,7 +7533,7 @@ ] }, { - "uuid": "903ffd8e-667c-4317-a919-e3add1a1e059", + "uuid": "c3881bf0-7d1e-423d-8f4c-c18fe3771934", "control-id": "cis_rhel10_4-1.3", "description": "No notes for control-id 4.1.3.", "props": [ @@ -7562,7 +7550,7 @@ ] }, { - "uuid": "adf38a8f-d898-4516-b995-0aa6dc18590e", + "uuid": "01cfacf1-245d-448c-9dbc-c25bc4ebceba", "control-id": "cis_rhel10_4-1.4", "description": "The description for control-id cis_rhel10_4-1.4.", "props": [ @@ -7575,7 +7563,7 @@ ] }, { - "uuid": "2d865a0f-a2da-4f5d-9165-bb72aed13513", + "uuid": "c3f6f184-4c93-4a58-acf3-7d4605bcfdf3", "control-id": "cis_rhel10_4-1.5", "description": "Firewalld in Red Hat Enterprise Linux 10 accepts loopback traffic by default.", "props": [ @@ -7592,7 +7580,7 @@ ] }, { - "uuid": "52583cc6-c391-4c8f-bdc4-15e1517a52af", + "uuid": "9c0b44d4-3564-4e97-ac76-414e9e78aa0e", "control-id": "cis_rhel10_4-1.6", "description": "The description for control-id cis_rhel10_4-1.6.", "props": [ @@ -7605,7 +7593,7 @@ ] }, { - "uuid": "cb6541a5-213d-4bea-95b7-cb3e2dd9f5a2", + "uuid": "cff34c3c-c2b1-4ffb-905e-49297fad5892", "control-id": "cis_rhel10_4-1.7", "description": "The description for control-id cis_rhel10_4-1.7.", "props": [ @@ -7618,7 +7606,7 @@ ] }, { - "uuid": "2219e9c8-9be5-4bef-ad94-748b4fe55920", + "uuid": "07a47fa5-9503-4411-a1fa-2e628447078c", "control-id": "cis_rhel10_5-1.1", "description": "No notes for control-id 5.1.1.", "props": [ @@ -7675,7 +7663,7 @@ ] }, { - "uuid": "81883721-036e-436b-9b05-adb3ca394a28", + "uuid": "54f6be2b-96aa-4feb-b5d5-8285878ee897", "control-id": "cis_rhel10_5-1.2", "description": "No notes for control-id 5.1.2.", "props": [ @@ -7702,7 +7690,7 @@ ] }, { - "uuid": "576100bf-4c68-4a94-8908-a2d2606cbabb", + "uuid": "1cf5baff-cd2b-4041-850b-5cb13316e93a", "control-id": "cis_rhel10_5-1.3", "description": "No notes for control-id 5.1.3.", "props": [ @@ -7729,7 +7717,7 @@ ] }, { - "uuid": "10608536-a0bc-4f3d-a7bb-fccf8be233f5", + "uuid": "c00070ff-bd15-4000-8966-1cb0107650fc", "control-id": "cis_rhel10_5-1.4", "description": "No notes for control-id 5.1.4.", "props": [ @@ -7746,7 +7734,7 @@ ] }, { - "uuid": "83fb981c-74dd-43b3-a5a3-f4a7f264cbff", + "uuid": "9c1b820c-72ae-470e-b2ab-bf72a7bf78ad", "control-id": "cis_rhel10_5-1.5", "description": "No notes for control-id 5.1.5.", "props": [ @@ -7763,7 +7751,7 @@ ] }, { - "uuid": "c13b7b6a-30fc-440c-9b35-4d9b5832f9d9", + "uuid": "1610bd2e-7c4a-4f0a-b430-ff03699ccc92", "control-id": "cis_rhel10_5-1.6", "description": "No notes for control-id 5.1.6.", "props": [ @@ -7780,7 +7768,7 @@ ] }, { - "uuid": "cee8d752-dafc-47a5-97cc-41938a55a05b", + "uuid": "598c7a0b-2611-4406-97cf-8c8cd6fe5093", "control-id": "cis_rhel10_5-1.7", "description": "The requirement gives an example of 45 seconds, but is flexible about the values. It is only\nnecessary to ensure there is a timeout configured in alignment to the site policy.", "props": [ @@ -7802,7 +7790,7 @@ ] }, { - "uuid": "e203c9c5-bf3f-47c3-bcec-49d9ca74a6a3", + "uuid": "5107fe10-5ae3-4bbc-b506-93b6b48aad19", "control-id": "cis_rhel10_5-1.8", "description": "No notes for control-id 5.1.8.", "props": [ @@ -7819,7 +7807,7 @@ ] }, { - "uuid": "327262bf-c432-4011-890d-08e6712d3204", + "uuid": "3e5127cf-664e-4515-b418-60ced3cf05c7", "control-id": "cis_rhel10_5-1.9", "description": "No notes for control-id 5.1.9.", "props": [ @@ -7836,7 +7824,7 @@ ] }, { - "uuid": "85046a6b-65e4-4d6f-a9a0-309e74339a84", + "uuid": "ba5b4f58-b9c8-4df4-adcf-50a0a47929ca", "control-id": "cis_rhel10_5-1.10", "description": "No notes for control-id 5.1.10.", "props": [ @@ -7853,7 +7841,7 @@ ] }, { - "uuid": "ea410163-aa82-4fa3-bdfd-372e68c01369", + "uuid": "1290c164-d491-46b3-ba22-6f42397938a2", "control-id": "cis_rhel10_5-1.11", "description": "No notes for control-id 5.1.11.", "props": [ @@ -7870,7 +7858,7 @@ ] }, { - "uuid": "a827dd31-ebb7-4e47-9f8c-f477bbfe0043", + "uuid": "c565e247-781d-472d-b7a1-50afe39b4395", "control-id": "cis_rhel10_5-1.12", "description": "The description for control-id cis_rhel10_5-1.12.", "props": [ @@ -7888,7 +7876,7 @@ ] }, { - "uuid": "bb5a6848-18ed-49e0-b025-dd804b726e3a", + "uuid": "73a32e27-4bc7-45cb-84b6-123091c12471", "control-id": "cis_rhel10_5-1.13", "description": "No notes for control-id 5.1.13.", "props": [ @@ -7905,7 +7893,7 @@ ] }, { - "uuid": "c5cdbcd0-808a-4ba0-961c-7baefba83711", + "uuid": "9a56c456-7833-4725-9466-cbca0b152e2a", "control-id": "cis_rhel10_5-1.14", "description": "The CIS benchmark is not opinionated about which loglevel is selected here. Here, this\nprofile uses VERBOSE by default, as it allows for the capture of login and logout activity\nas well as key fingerprints.", "props": [ @@ -7922,7 +7910,7 @@ ] }, { - "uuid": "692bc72f-b74a-4bad-b5f3-5e60ba0b5d0d", + "uuid": "a2cb93e8-29d4-4209-b2b6-a8556fb21279", "control-id": "cis_rhel10_5-1.15", "description": "No notes for control-id 5.1.15.", "props": [ @@ -7939,7 +7927,7 @@ ] }, { - "uuid": "42c3d5ca-d871-4c00-aae8-59484bacd335", + "uuid": "2ae32f73-6844-442f-ba2c-b7120bec667b", "control-id": "cis_rhel10_5-1.16", "description": "No notes for control-id 5.1.16.", "props": [ @@ -7956,7 +7944,7 @@ ] }, { - "uuid": "fdd6b1e5-1bba-49e0-aff2-31fd904a7c40", + "uuid": "72eb130a-88e4-4925-8789-b73e250b7155", "control-id": "cis_rhel10_5-1.17", "description": "No notes for control-id 5.1.17.", "props": [ @@ -7973,7 +7961,7 @@ ] }, { - "uuid": "21bbd92f-5695-4dbf-bed8-e60277505aff", + "uuid": "29042c19-e891-4089-ae2e-1701b7a59d8d", "control-id": "cis_rhel10_5-1.18", "description": "No notes for control-id 5.1.18.", "props": [ @@ -7990,7 +7978,7 @@ ] }, { - "uuid": "7bd9ca60-99a2-480c-84dd-0fe9f624522b", + "uuid": "a60b3596-0da0-4858-9bb9-105d8456fb38", "control-id": "cis_rhel10_5-1.19", "description": "No notes for control-id 5.1.19.", "props": [ @@ -8007,7 +7995,7 @@ ] }, { - "uuid": "11991111-5c59-4eb5-b5ab-3000c6448e83", + "uuid": "73fb301b-92f0-4079-aa19-d0b00b6d5823", "control-id": "cis_rhel10_5-1.20", "description": "No notes for control-id 5.1.20.", "props": [ @@ -8024,7 +8012,7 @@ ] }, { - "uuid": "70196ca1-8674-4813-90c5-0bcc18afe963", + "uuid": "9f052ebe-bf49-485c-9791-1cb8143aa200", "control-id": "cis_rhel10_5-1.21", "description": "No notes for control-id 5.1.21.", "props": [ @@ -8041,7 +8029,7 @@ ] }, { - "uuid": "fa1a11de-82c4-4438-b092-368af676367b", + "uuid": "d4389002-736c-4634-ba88-c0239dd930ea", "control-id": "cis_rhel10_5-1.22", "description": "No notes for control-id 5.1.22.", "props": [ @@ -8058,7 +8046,7 @@ ] }, { - "uuid": "ce314eb1-4a84-4505-8b25-5ce03ce4d947", + "uuid": "2f0001d6-cb93-4a33-a8dd-6a65ae3c3866", "control-id": "cis_rhel10_5-2.1", "description": "No notes for control-id 5.2.1.", "props": [ @@ -8075,7 +8063,7 @@ ] }, { - "uuid": "aa2c0142-812f-4881-99dc-cd501e1d2946", + "uuid": "cd80f1d1-9724-4656-a616-bb100eec26c7", "control-id": "cis_rhel10_5-2.2", "description": "No notes for control-id 5.2.2.", "props": [ @@ -8092,7 +8080,7 @@ ] }, { - "uuid": "29890b50-02f1-4db1-885c-cc9792e10680", + "uuid": "f5452c55-c4c0-49ca-988e-ca0d8a2c87f9", "control-id": "cis_rhel10_5-2.3", "description": "No notes for control-id 5.2.3.", "props": [ @@ -8109,7 +8097,7 @@ ] }, { - "uuid": "088e7430-03eb-40d5-8bd3-4ab8904e5169", + "uuid": "effad9e8-1610-49c9-9576-12650f0ed913", "control-id": "cis_rhel10_5-2.5", "description": "No notes for control-id 5.2.5.", "props": [ @@ -8126,7 +8114,7 @@ ] }, { - "uuid": "83e5a4f9-bb6a-40e8-8453-ca088b0b7e9a", + "uuid": "d49937e6-2083-4de7-8c7a-c6c7afcc193a", "control-id": "cis_rhel10_5-2.6", "description": "No notes for control-id 5.2.6.", "props": [ @@ -8143,7 +8131,7 @@ ] }, { - "uuid": "d4669426-665f-44ef-a2f0-364464f0f102", + "uuid": "d24a6cda-d42a-477c-bad6-b15e38ceb1db", "control-id": "cis_rhel10_5-2.7", "description": "Members of \"wheel\" or GID 0 groups are checked by default if the group option is not set for\npam_wheel.so module. The recommendation states the group should be empty to reinforce the\nuse of \"sudo\" for privileged access. Therefore, members of these groups should be manually\nchecked or a different group should be informed.", "props": [ @@ -8165,7 +8153,7 @@ ] }, { - "uuid": "8b1071b3-4ac2-4355-b6f2-61f3dc6c1ebc", + "uuid": "ab3f6d0c-2b9a-4250-9660-e2867ef78f0b", "control-id": "cis_rhel10_5-3.1.1", "description": "This requirement is hard to be automated without any specific requirement. The policy even\nstates that provided commands are examples, other custom settings might be in place and the\nsettings might be different depending on site policies. The other rules will already make\nsure there is a correct autheselect profile regardless of the existing settings. It is\nnecessary to better discuss with CIS Community.", "props": [ @@ -8177,7 +8165,7 @@ ] }, { - "uuid": "b1a67b61-a6d9-4a97-96db-1bda54e98d6f", + "uuid": "2a498765-c80b-479b-9aa9-cf5a47d72eb8", "control-id": "cis_rhel10_5-3.1.2", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.1.", "props": [ @@ -8199,7 +8187,7 @@ ] }, { - "uuid": "69691ef7-c2db-41f5-9cf5-a0766548f131", + "uuid": "ae18bb5b-f100-4f4a-8b16-384c0eafcfcf", "control-id": "cis_rhel10_5-3.1.3", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.2.", "props": [ @@ -8226,7 +8214,7 @@ ] }, { - "uuid": "e499b0a8-f2e8-4896-807e-d48b60ae4e3f", + "uuid": "e5dd7f11-9a14-46e7-8944-83e191822c89", "control-id": "cis_rhel10_5-3.1.4", "description": "The module is properly enabled by the rules mentioned in related_rules.\nRequirements in 5.3.2.3 use these rules.", "props": [ @@ -8238,7 +8226,7 @@ ] }, { - "uuid": "a8391b69-c011-47fb-977d-3863b74d2932", + "uuid": "33158e2c-13c8-4213-b521-0a3a5a910f3c", "control-id": "cis_rhel10_5-3.1.5", "description": "No notes for control-id 5.3.1.5.", "props": [ @@ -8255,7 +8243,7 @@ ] }, { - "uuid": "0c07dfe1-6a4c-440a-a115-632b6b24b72a", + "uuid": "35567e82-338c-484e-b91e-317e06e9fd7d", "control-id": "cis_rhel10_5-3.2.1.1", "description": "No notes for control-id 5.3.2.1.1.", "props": [ @@ -8272,7 +8260,7 @@ ] }, { - "uuid": "9be194fe-c542-4bd7-8d63-84bbe6e611ef", + "uuid": "b862baf9-e95f-419f-9561-5eb96ed41f91", "control-id": "cis_rhel10_5-3.2.1.2", "description": "The policy also accepts value 0, which means the locked accounts should be manually unlocked\nby an administrator. However, it also mentions that using value 0 can facilitate a DoS\nattack to legitimate users.", "props": [ @@ -8289,7 +8277,7 @@ ] }, { - "uuid": "c744cc32-79b6-44b5-abab-8201710c334d", + "uuid": "ea437d53-c26a-4980-8bf3-1fe09b36288b", "control-id": "cis_rhel10_5-3.2.2.1", "description": "No notes for control-id 5.3.2.2.1.", "props": [ @@ -8306,7 +8294,7 @@ ] }, { - "uuid": "7b07f998-305d-4638-a5da-bba3d5260869", + "uuid": "376e2ea5-3d87-4791-a0c2-26551a6f8399", "control-id": "cis_rhel10_5-3.2.2.2", "description": "No notes for control-id 5.3.2.2.2.", "props": [ @@ -8323,7 +8311,7 @@ ] }, { - "uuid": "d54c2837-851d-4b18-b20e-f0a8b9299e63", + "uuid": "e396afad-68b7-4286-add3-daca333f79a6", "control-id": "cis_rhel10_5-3.2.2.3", "description": "This requirement is expected to be manual. However, in previous versions of the policy\nit was already automated the configuration of \"minclass\" option. This posture was kept for\nRHEL 10 in this new version. Rules related to other options are informed in related_rules.\nIn short, minclass=4 alone can achieve the same result achieved by the combination of the\nother 4 options mentioned in the policy.", "props": [ @@ -8340,7 +8328,7 @@ ] }, { - "uuid": "f71f746c-debe-498b-baaf-692a6e45e264", + "uuid": "91dac91b-bb32-47e1-8217-307337646217", "control-id": "cis_rhel10_5-3.2.2.4", "description": "No notes for control-id 5.3.2.2.4.", "props": [ @@ -8357,7 +8345,7 @@ ] }, { - "uuid": "37919992-647a-4627-9a5c-7e52c346e4a0", + "uuid": "81a8d363-0dfd-414b-b43c-d3b618850a5b", "control-id": "cis_rhel10_5-3.2.2.5", "description": "No notes for control-id 5.3.2.2.5.", "props": [ @@ -8374,7 +8362,7 @@ ] }, { - "uuid": "7ec82898-6f15-4845-ad7a-5756e9e7b50e", + "uuid": "e5a9e733-fb62-417b-9b91-a23a90389987", "control-id": "cis_rhel10_5-3.2.2.6", "description": "No notes for control-id 5.3.2.2.6.", "props": [ @@ -8391,7 +8379,7 @@ ] }, { - "uuid": "d24d763e-ea64-48b0-a805-385314757fda", + "uuid": "4a663833-3342-4f31-b8da-7ad5cbb0e718", "control-id": "cis_rhel10_5-3.2.2.7", "description": "No notes for control-id 5.3.2.2.7.", "props": [ @@ -8408,7 +8396,7 @@ ] }, { - "uuid": "4905a0bf-4b9d-486b-ab67-1eb2fc2b634f", + "uuid": "2e71542c-8057-4dbd-b44c-6e4c439e4dc6", "control-id": "cis_rhel10_5-3.2.3.1", "description": "Although mentioned in the section 5.3.3.3, there is no explicit requirement to configure\nretry option of pam_pwhistory. If come in the future, the rule accounts_password_pam_retry\ncan be used.", "props": [ @@ -8430,7 +8418,7 @@ ] }, { - "uuid": "21dff016-f1a3-433e-a64f-5e31327e59a9", + "uuid": "1e0fab66-4941-404b-aa08-e4c80cc1980b", "control-id": "cis_rhel10_5-3.2.3.2", "description": "No notes for control-id 5.3.2.3.2.", "props": [ @@ -8447,7 +8435,7 @@ ] }, { - "uuid": "ee680ffc-0054-48ce-8d33-c1d4a8e5fdab", + "uuid": "677b6b92-8c7a-4c98-bf4c-5bda2b6a4318", "control-id": "cis_rhel10_5-3.2.3.3", "description": "In RHEL 10 pam_pwhistory is enabled via authselect feature, as required in 5.3.1.4. The\nfeature automatically set \"use_authok\" option. In any case, we don't have a rule to check\nthis option specifically.", "props": [ @@ -8464,7 +8452,7 @@ ] }, { - "uuid": "51ed6157-1d89-4835-9bdf-2c539a771796", + "uuid": "4dde3bf7-ca23-475c-a4f9-a8499c84c6f5", "control-id": "cis_rhel10_5-3.2.4.1", "description": "The rule more specifically used in this requirement also satify the requirement 5.3.1.5.", "props": [ @@ -8481,7 +8469,7 @@ ] }, { - "uuid": "f9e9fb8e-1fbd-4864-b0f5-f94fa716e67d", + "uuid": "07dd0a2e-8534-45bf-83fa-0f02e0f82fad", "control-id": "cis_rhel10_5-3.2.4.2", "description": "Usage of pam_unix.so module together with \"remember\" option is deprecated and is not\nrecommended by this policy. Instead, it should be used remember option of pam_pwhistory\nmodule, as required in 5.3.2.3.1. See here for more details about pam_unix.so:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1778929", "props": [ @@ -8498,7 +8486,7 @@ ] }, { - "uuid": "2b7cc86e-45d0-4bb1-a8ef-7e7bef6db2af", + "uuid": "63f1e4d1-64f7-4ca9-92eb-7c47b720a804", "control-id": "cis_rhel10_5-3.2.4.3", "description": "Changes in logindefs mentioned in this requirement are more specifically covered by 5.4.1.4", "props": [ @@ -8520,7 +8508,7 @@ ] }, { - "uuid": "4e5296da-293b-4530-bfa3-9a4e67e13dc4", + "uuid": "94fd466d-87ee-48b0-a2d1-08c9b0b9b82d", "control-id": "cis_rhel10_5-3.2.4.4", "description": "In RHEL 10 pam_unix is enabled by default in all authselect profiles already with the\nuse_authtok option set. In any case, we don't have a rule to check this option specifically,\nlike in 5.3.2.3.3.", "props": [ @@ -8537,7 +8525,7 @@ ] }, { - "uuid": "6457d5cb-1d2b-4711-b05d-ab5dfff5ec8e", + "uuid": "69e54ddc-4fa5-4485-b7e6-2ab4437e47e4", "control-id": "cis_rhel10_5-4.1.1", "description": "No notes for control-id 5.4.1.1.", "props": [ @@ -8559,7 +8547,7 @@ ] }, { - "uuid": "438db027-e785-4b91-8f67-4193ddbbcdce", + "uuid": "d9a537e0-2bcb-40ab-aad5-b12dc978bc38", "control-id": "cis_rhel10_5-4.1.3", "description": "No notes for control-id 5.4.1.3.", "props": [ @@ -8581,20 +8569,15 @@ ] }, { - "uuid": "e926e69b-19ba-4373-9858-4e16d9c73850", + "uuid": "e5d52ed1-414f-4240-a2e5-b7ecffd77e32", "control-id": "cis_rhel10_5-4.1.4", - "description": "There's a \"new\" set of options in /etc/login.defs file to define the number of iterations\nperformed during the hashing process.", + "description": "No notes for control-id 5.4.1.4.", "props": [ { "name": "implementation-status", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "implemented" }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_libuserconf" - }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", @@ -8603,7 +8586,7 @@ ] }, { - "uuid": "efb53747-9fcb-428d-8bab-44ce2453a274", + "uuid": "d834aeb5-e6c2-487e-896b-8c912539a711", "control-id": "cis_rhel10_5-4.1.5", "description": "No notes for control-id 5.4.1.5.", "props": [ @@ -8625,7 +8608,7 @@ ] }, { - "uuid": "ff6788a5-5098-45d0-95e3-eeee957980fc", + "uuid": "7e999dbb-868e-44cf-a645-dd83e82ed7d7", "control-id": "cis_rhel10_5-4.1.6", "description": "No notes for control-id 5.4.1.6.", "props": [ @@ -8642,7 +8625,7 @@ ] }, { - "uuid": "5de0b308-307f-4510-8332-68895d4a76de", + "uuid": "6a7ce269-c257-4e81-a17e-0c7bd218112d", "control-id": "cis_rhel10_5-4.2.1", "description": "No notes for control-id 5.4.2.1.", "props": [ @@ -8659,7 +8642,7 @@ ] }, { - "uuid": "8d9ba9d5-ef5e-433f-97f2-69397d72f641", + "uuid": "0b200651-fb84-450b-9ef6-e327635f7d4b", "control-id": "cis_rhel10_5-4.2.2", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -8676,7 +8659,7 @@ ] }, { - "uuid": "b6583a81-b5c2-4937-a08f-a55e23fdfa0f", + "uuid": "650aba1c-ac0e-404d-80d8-387fb538d6f2", "control-id": "cis_rhel10_5-4.2.3", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -8693,7 +8676,7 @@ ] }, { - "uuid": "43812602-92ae-4b96-b01d-20fec457fc34", + "uuid": "d64d02d5-b077-47ff-a764-9e360f101723", "control-id": "cis_rhel10_5-4.2.4", "description": "No notes for control-id 5.4.2.4.", "props": [ @@ -8710,7 +8693,7 @@ ] }, { - "uuid": "6446fd90-031b-4fdb-8182-cfcd7fb2ca5d", + "uuid": "5b656e57-0165-420f-a660-6973e4ebe188", "control-id": "cis_rhel10_5-4.2.5", "description": "No notes for control-id 5.4.2.5.", "props": [ @@ -8732,7 +8715,7 @@ ] }, { - "uuid": "ed4c578b-c5fb-4085-8f6e-45632e0ebe6e", + "uuid": "c48b4857-0c84-4f46-be8f-7b0ea9dd166e", "control-id": "cis_rhel10_5-4.2.6", "description": "No notes for control-id 5.4.2.6.", "props": [ @@ -8749,7 +8732,7 @@ ] }, { - "uuid": "741301bb-45b5-4cf6-a278-d31ca2c8e763", + "uuid": "41d3984a-792e-4170-9395-9aac4e99080d", "control-id": "cis_rhel10_5-4.2.7", "description": "No notes for control-id 5.4.2.7.", "props": [ @@ -8771,7 +8754,7 @@ ] }, { - "uuid": "7f958c43-f153-4232-b0eb-031429d33f22", + "uuid": "dbee3d8f-62f2-4c82-bdab-c8a7a2b013c0", "control-id": "cis_rhel10_5-4.2.8", "description": "No notes for control-id 5.4.2.8.", "props": [ @@ -8788,7 +8771,7 @@ ] }, { - "uuid": "b67701a7-e6e8-401d-bfa0-27778082e727", + "uuid": "033faad0-11b9-4d72-a57b-6eccc02b6afa", "control-id": "cis_rhel10_5-4.3.2", "description": "No notes for control-id 5.4.3.2.", "props": [ @@ -8805,7 +8788,7 @@ ] }, { - "uuid": "0a741c75-9329-4a4d-a663-8204a7da59ea", + "uuid": "99c62a9c-004e-4a6f-8262-c4fa3266d1e0", "control-id": "cis_rhel10_5-4.3.3", "description": "No notes for control-id 5.4.3.3.", "props": [ @@ -8832,7 +8815,7 @@ ] }, { - "uuid": "877c852f-77c8-420b-9708-64736c2601d0", + "uuid": "13a506c8-691b-4640-bb0a-4b75d4e8b72e", "control-id": "cis_rhel10_6-1.1", "description": "No notes for control-id 6.1.1.", "props": [ @@ -8854,7 +8837,7 @@ ] }, { - "uuid": "9a47c3e6-fc25-4d35-a174-05677a9f4846", + "uuid": "dea927b6-857e-40c9-bc33-a6bb67095868", "control-id": "cis_rhel10_6-1.2", "description": "No notes for control-id 6.1.2.", "props": [ @@ -8871,7 +8854,7 @@ ] }, { - "uuid": "c699ff26-e7e5-4acf-a69b-3dbf144c8084", + "uuid": "ef8e782a-300e-43d1-978c-3872560b6b83", "control-id": "cis_rhel10_6-1.3", "description": "No notes for control-id 6.1.3.", "props": [ @@ -8888,7 +8871,7 @@ ] }, { - "uuid": "685f7db8-f345-4613-9e17-49f0d2dd9101", + "uuid": "649f682e-6b04-44b0-9efc-3a94adc39371", "control-id": "cis_rhel10_6-2.1.1", "description": "No notes for control-id 6.2.1.1.", "props": [ @@ -8905,7 +8888,7 @@ ] }, { - "uuid": "9d31c1df-87d3-408b-ada7-fb25c07e29a7", + "uuid": "217a2727-e91f-441c-b9cc-855902a471f6", "control-id": "cis_rhel10_6-2.1.2", "description": "The description for control-id cis_rhel10_6-2.1.2.", "props": [ @@ -8918,7 +8901,7 @@ ] }, { - "uuid": "bfcf2aff-9e0e-40ae-a488-b68bf0d16361", + "uuid": "f1db3bb0-ed2c-4594-8d64-44d363a66375", "control-id": "cis_rhel10_6-2.1.3", "description": "The description for control-id cis_rhel10_6-2.1.3.", "props": [ @@ -8931,7 +8914,7 @@ ] }, { - "uuid": "8a34e2fc-063d-4a8c-a514-e8f0e7434695", + "uuid": "3ae0b409-74a4-4f47-8ece-ee2cb6451a11", "control-id": "cis_rhel10_6-2.1.4", "description": "No notes for control-id 6.2.1.4.", "props": [ @@ -8948,7 +8931,7 @@ ] }, { - "uuid": "da1b83ec-fb7e-4d4b-972b-1638e7929a68", + "uuid": "72f7aec5-b877-43ad-a82d-3b834379cca3", "control-id": "cis_rhel10_6-2.2.1.1", "description": "No notes for control-id 6.2.2.1.1.", "props": [ @@ -8965,7 +8948,7 @@ ] }, { - "uuid": "77aa15f2-87e6-4402-b230-2a006be8fab2", + "uuid": "89d49aec-a45f-467d-84e7-1cd235e7cd56", "control-id": "cis_rhel10_6-2.2.1.2", "description": "The description for control-id cis_rhel10_6-2.2.1.2.", "props": [ @@ -8978,7 +8961,7 @@ ] }, { - "uuid": "6357e3fe-0a6e-4659-a6f0-3823aa808eb0", + "uuid": "806e483a-f792-4cb1-a550-891359a63c13", "control-id": "cis_rhel10_6-2.2.1.3", "description": "No notes for control-id 6.2.2.1.3.", "props": [ @@ -8995,7 +8978,7 @@ ] }, { - "uuid": "45213e87-fbc3-4fac-8da0-f3cbd39e88c1", + "uuid": "c8b063b1-3528-498a-a1c7-5162790aa53b", "control-id": "cis_rhel10_6-2.2.1.4", "description": "No notes for control-id 6.2.2.1.4.", "props": [ @@ -9012,7 +8995,7 @@ ] }, { - "uuid": "14b5550e-39e7-4e4e-94eb-7f031eccbb27", + "uuid": "45676999-fde5-44c5-95c7-e746d97a8004", "control-id": "cis_rhel10_6-2.2.2", "description": "No notes for control-id 6.2.2.2.", "props": [ @@ -9029,7 +9012,7 @@ ] }, { - "uuid": "93344c38-2410-4473-8431-655d8248d985", + "uuid": "a2aded40-86ca-4c80-a4ab-d6c12b3925af", "control-id": "cis_rhel10_6-2.2.3", "description": "No notes for control-id 6.2.2.3.", "props": [ @@ -9046,7 +9029,7 @@ ] }, { - "uuid": "15b72932-0b70-434d-8d70-503f1c1e284a", + "uuid": "39f3b710-213c-40d6-8ac8-d12614079d8e", "control-id": "cis_rhel10_6-2.2.4", "description": "No notes for control-id 6.2.2.4.", "props": [ @@ -9063,7 +9046,7 @@ ] }, { - "uuid": "1e3d9e1c-a81e-4c09-9170-2128ca558b8c", + "uuid": "17a82860-89cf-4e67-81bc-e7d3b73f6f39", "control-id": "cis_rhel10_6-2.3.1", "description": "No notes for control-id 6.2.3.1.", "props": [ @@ -9075,7 +9058,7 @@ ] }, { - "uuid": "74e34f95-72f9-48b1-afa8-b2ac629b64f8", + "uuid": "63ffa128-eb8d-4f3c-9040-52ab5a41521c", "control-id": "cis_rhel10_6-2.3.2", "description": "No notes for control-id 6.2.3.2.", "props": [ @@ -9087,7 +9070,7 @@ ] }, { - "uuid": "a8ce2e12-f6fb-4aa4-b120-ead6c835b628", + "uuid": "002e9d3e-0d95-4a9b-a2b1-361edac0793e", "control-id": "cis_rhel10_6-2.3.3", "description": "No notes for control-id 6.2.3.3.", "props": [ @@ -9099,7 +9082,7 @@ ] }, { - "uuid": "7159f98f-8f61-4812-aed7-6e7c3392fd9b", + "uuid": "697a938b-cfe2-4eed-b9a8-6228d725fe9f", "control-id": "cis_rhel10_6-2.3.4", "description": "No notes for control-id 6.2.3.4.", "props": [ @@ -9111,7 +9094,7 @@ ] }, { - "uuid": "cc93c737-672d-4452-bc56-f27713de709c", + "uuid": "298396a8-486e-49be-aa5c-4a7137090b0c", "control-id": "cis_rhel10_6-2.3.5", "description": "The description for control-id cis_rhel10_6-2.3.5.", "props": [ @@ -9124,7 +9107,7 @@ ] }, { - "uuid": "e4fe326e-a11a-44ae-89df-632b311b26cd", + "uuid": "81a51350-a047-4b9f-9ed5-cedc9d32eb7b", "control-id": "cis_rhel10_6-2.3.6", "description": "The description for control-id cis_rhel10_6-2.3.6.", "props": [ @@ -9137,7 +9120,7 @@ ] }, { - "uuid": "0f9db0c3-4532-4fd7-b705-f4d3625a6109", + "uuid": "1bc3957a-408a-4546-8d2d-b100ae332703", "control-id": "cis_rhel10_6-2.3.7", "description": "No notes for control-id 6.2.3.7.", "props": [ @@ -9149,7 +9132,7 @@ ] }, { - "uuid": "32fc4bc1-5b26-416f-854d-38976b76330e", + "uuid": "655126eb-132f-47d2-9489-8f5900f48d0a", "control-id": "cis_rhel10_6-2.3.8", "description": "The description for control-id cis_rhel10_6-2.3.8.", "props": [ @@ -9162,7 +9145,7 @@ ] }, { - "uuid": "d6509c22-8762-442b-ac26-19eaa27cba13", + "uuid": "ec594c20-f26b-4cb4-bf1c-907407ee5d29", "control-id": "cis_rhel10_6-2.4.1", "description": "It is not harmful to run these rules even if rsyslog is not installed or active.", "props": [ @@ -9189,7 +9172,7 @@ ] }, { - "uuid": "653e4fb9-46c3-44e8-96b5-9b8e652be5a6", + "uuid": "6dad4b28-1b26-47a9-a8f3-d03a750c108d", "control-id": "cis_rhel10_7-1.1", "description": "No notes for control-id 7.1.1.", "props": [ @@ -9216,7 +9199,7 @@ ] }, { - "uuid": "6320fe27-3972-4872-abff-8dc9bbf74b05", + "uuid": "953b185d-8198-47d4-beca-e6836c0b3464", "control-id": "cis_rhel10_7-1.2", "description": "No notes for control-id 7.1.2.", "props": [ @@ -9243,7 +9226,7 @@ ] }, { - "uuid": "dcbc6950-fd41-4a40-b2cc-802763ede2e1", + "uuid": "06cde94a-d5da-4e6e-8c02-25a559cf64e6", "control-id": "cis_rhel10_7-1.3", "description": "No notes for control-id 7.1.3.", "props": [ @@ -9270,7 +9253,7 @@ ] }, { - "uuid": "688ca61b-d8d3-4f95-a130-a213873c50ed", + "uuid": "89fde16c-038c-43d4-a219-b75466bb3bac", "control-id": "cis_rhel10_7-1.4", "description": "No notes for control-id 7.1.4.", "props": [ @@ -9297,7 +9280,7 @@ ] }, { - "uuid": "11e6006c-393b-4170-8eef-432dc8ca9923", + "uuid": "ed11f852-50df-477f-91fa-78965ecb359c", "control-id": "cis_rhel10_7-1.5", "description": "No notes for control-id 7.1.5.", "props": [ @@ -9324,7 +9307,7 @@ ] }, { - "uuid": "90a73143-5291-4a55-b0f0-1ac1a52f2009", + "uuid": "7d1f5af3-3842-4116-b650-58bcdcd427f2", "control-id": "cis_rhel10_7-1.6", "description": "No notes for control-id 7.1.6.", "props": [ @@ -9351,7 +9334,7 @@ ] }, { - "uuid": "6fb4d85d-0ce2-401b-8d10-bcd319fe03e5", + "uuid": "3968df96-2bc2-4e27-b67a-92027d50f8bd", "control-id": "cis_rhel10_7-1.7", "description": "No notes for control-id 7.1.7.", "props": [ @@ -9378,7 +9361,7 @@ ] }, { - "uuid": "a6672987-fd79-4710-b8bf-4ba61b56eb67", + "uuid": "a05b9cf7-2422-4e3b-8a15-8f3064436f75", "control-id": "cis_rhel10_7-1.8", "description": "No notes for control-id 7.1.8.", "props": [ @@ -9405,7 +9388,7 @@ ] }, { - "uuid": "213c5eab-9e7b-453a-b19f-c68b6056a324", + "uuid": "29d3b5f9-30b4-4546-9a57-c6d4e1d2bbcf", "control-id": "cis_rhel10_7-1.9", "description": "No notes for control-id 7.1.9.", "props": [ @@ -9432,7 +9415,7 @@ ] }, { - "uuid": "357b3317-381c-4f37-8e2e-137ddc1722b9", + "uuid": "cbffda21-9f83-4312-986b-8d73a99643fb", "control-id": "cis_rhel10_7-1.10", "description": "No notes for control-id 7.1.10.", "props": [ @@ -9474,7 +9457,7 @@ ] }, { - "uuid": "4244a08f-93b8-4a9d-ab7e-cf6820d28bbc", + "uuid": "0538998c-d038-4971-861f-5d17bfc6af40", "control-id": "cis_rhel10_7-1.11", "description": "No notes for control-id 7.1.11.", "props": [ @@ -9496,7 +9479,7 @@ ] }, { - "uuid": "94bfcf06-3ea1-4712-ad97-8c36536b7387", + "uuid": "ac7a0cca-f526-458c-a013-518eadad68f4", "control-id": "cis_rhel10_7-1.12", "description": "No notes for control-id 7.1.12.", "props": [ @@ -9518,7 +9501,7 @@ ] }, { - "uuid": "2ac82131-4614-4e83-85f2-dd58d25501f1", + "uuid": "7a8b421a-9088-4f04-a03c-60f684fb25a6", "control-id": "cis_rhel10_7-1.13", "description": "The description for control-id cis_rhel10_7-1.13.", "props": [ @@ -9531,7 +9514,7 @@ ] }, { - "uuid": "d520c2db-f6a0-4009-8e22-c52a0edcffb6", + "uuid": "86afa457-f1ce-4958-aa42-a0455bb1d966", "control-id": "cis_rhel10_7-2.1", "description": "No notes for control-id 7.2.1.", "props": [ @@ -9548,7 +9531,7 @@ ] }, { - "uuid": "1ce969ff-7a35-4261-b832-e727f5a4bb32", + "uuid": "e4159c31-c62c-4e1f-b1e1-994b766ff6b0", "control-id": "cis_rhel10_7-2.2", "description": "No notes for control-id 7.2.2.", "props": [ @@ -9565,7 +9548,7 @@ ] }, { - "uuid": "d2dde22d-4f6f-490d-abff-f9088acec7b5", + "uuid": "71fdbd6e-efa8-4aef-a885-a683a854dc19", "control-id": "cis_rhel10_7-2.3", "description": "No notes for control-id 7.2.3.", "props": [ @@ -9582,7 +9565,7 @@ ] }, { - "uuid": "85eeb3d9-d68d-4411-bc78-fed35f5ff821", + "uuid": "5ed26172-7794-4f8d-81db-490b166fca97", "control-id": "cis_rhel10_7-2.4", "description": "No notes for control-id 7.2.4.", "props": [ @@ -9599,7 +9582,7 @@ ] }, { - "uuid": "9b956a74-a639-4ae8-bd39-05afb84a0f21", + "uuid": "81625973-2d57-4b26-8059-70c873efbc38", "control-id": "cis_rhel10_7-2.5", "description": "No notes for control-id 7.2.5.", "props": [ @@ -9616,7 +9599,7 @@ ] }, { - "uuid": "74ef3508-3729-46e4-94e1-34f0b82d7619", + "uuid": "dd83548d-02ca-4254-ab68-2e387e06119e", "control-id": "cis_rhel10_7-2.6", "description": "No notes for control-id 7.2.6.", "props": [ @@ -9633,7 +9616,7 @@ ] }, { - "uuid": "3c584a11-13b6-4b5f-80cf-cbe04e183dc5", + "uuid": "1fc6f891-c551-4fe3-88fa-6702599f19ad", "control-id": "cis_rhel10_7-2.7", "description": "No notes for control-id 7.2.7.", "props": [ @@ -9650,7 +9633,7 @@ ] }, { - "uuid": "ef8b1209-02c0-411a-9db5-43ca02917b69", + "uuid": "04387809-578b-4e9e-9df4-71e95b1a3a15", "control-id": "cis_rhel10_7-2.8", "description": "No notes for control-id 7.2.8.", "props": [ @@ -9677,7 +9660,7 @@ ] }, { - "uuid": "0f48b107-26be-42e3-a9dc-183bd684df73", + "uuid": "abdad12d-2b65-481f-a422-e750b19161fc", "control-id": "cis_rhel10_7-2.9", "description": "No notes for control-id 7.2.9.", "props": [ @@ -10461,7 +10444,7 @@ { "name": "Parameter_Value_Alternatives_38", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -10479,7 +10462,7 @@ { "name": "Parameter_Value_Alternatives_39", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -16215,2143 +16198,2119 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_libuserconf", + "value": "set_password_hashing_algorithm_logindefs", "remarks": "rule_set_227" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Hashing Algorithm in /etc/libuser.conf", + "value": "Set Password Hashing Algorithm in /etc/login.defs", "remarks": "rule_set_227" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_libuserconf", + "value": "set_password_hashing_algorithm_logindefs", "remarks": "rule_set_227" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Hashing Algorithm in /etc/libuser.conf", + "value": "Set Password Hashing Algorithm in /etc/login.defs", "remarks": "rule_set_227" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_logindefs", + "value": "account_disable_post_pw_expiration", "remarks": "rule_set_228" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Hashing Algorithm in /etc/login.defs", + "value": "Set Account Expiration Following Inactivity", "remarks": "rule_set_228" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_logindefs", + "value": "account_disable_post_pw_expiration", "remarks": "rule_set_228" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Hashing Algorithm in /etc/login.defs", + "value": "Set Account Expiration Following Inactivity", "remarks": "rule_set_228" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "account_disable_post_pw_expiration", + "value": "accounts_set_post_pw_existing", "remarks": "rule_set_229" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Account Expiration Following Inactivity", + "value": "Set existing passwords a period of inactivity before they been locked", "remarks": "rule_set_229" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "account_disable_post_pw_expiration", + "value": "accounts_set_post_pw_existing", "remarks": "rule_set_229" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Account Expiration Following Inactivity", + "value": "Set existing passwords a period of inactivity before they been locked", "remarks": "rule_set_229" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_set_post_pw_existing", + "value": "accounts_password_last_change_is_in_past", "remarks": "rule_set_230" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set existing passwords a period of inactivity before they been locked", + "value": "Ensure all users last password change date is in the past", "remarks": "rule_set_230" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_set_post_pw_existing", + "value": "accounts_password_last_change_is_in_past", "remarks": "rule_set_230" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set existing passwords a period of inactivity before they been locked", + "value": "Ensure all users last password change date is in the past", "remarks": "rule_set_230" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_last_change_is_in_past", + "value": "accounts_no_uid_except_zero", "remarks": "rule_set_231" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure all users last password change date is in the past", + "value": "Verify Only Root Has UID 0", "remarks": "rule_set_231" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_last_change_is_in_past", + "value": "accounts_no_uid_except_zero", "remarks": "rule_set_231" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure all users last password change date is in the past", + "value": "Verify Only Root Has UID 0", "remarks": "rule_set_231" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_no_uid_except_zero", + "value": "accounts_root_gid_zero", "remarks": "rule_set_232" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Only Root Has UID 0", + "value": "Verify Root Has A Primary GID 0", "remarks": "rule_set_232" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_no_uid_except_zero", + "value": "accounts_root_gid_zero", "remarks": "rule_set_232" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Only Root Has UID 0", + "value": "Verify Root Has A Primary GID 0", "remarks": "rule_set_232" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_root_gid_zero", + "value": "groups_no_zero_gid_except_root", "remarks": "rule_set_233" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Root Has A Primary GID 0", + "value": "Verify Only Group Root Has GID 0", "remarks": "rule_set_233" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_root_gid_zero", + "value": "groups_no_zero_gid_except_root", "remarks": "rule_set_233" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Root Has A Primary GID 0", + "value": "Verify Only Group Root Has GID 0", "remarks": "rule_set_233" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "groups_no_zero_gid_except_root", + "value": "ensure_root_password_configured", "remarks": "rule_set_234" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Only Group Root Has GID 0", + "value": "Ensure Authentication Required for Single User Mode", "remarks": "rule_set_234" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "groups_no_zero_gid_except_root", + "value": "ensure_root_password_configured", "remarks": "rule_set_234" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Only Group Root Has GID 0", + "value": "Ensure Authentication Required for Single User Mode", "remarks": "rule_set_234" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_root_password_configured", + "value": "accounts_root_path_dirs_no_write", "remarks": "rule_set_235" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Authentication Required for Single User Mode", + "value": "Ensure that Root's Path Does Not Include World or Group-Writable Directories", "remarks": "rule_set_235" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_root_password_configured", + "value": "accounts_root_path_dirs_no_write", "remarks": "rule_set_235" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Authentication Required for Single User Mode", + "value": "Ensure that Root's Path Does Not Include World or Group-Writable Directories", "remarks": "rule_set_235" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_root_path_dirs_no_write", + "value": "root_path_no_dot", "remarks": "rule_set_236" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that Root's Path Does Not Include World or Group-Writable Directories", + "value": "Ensure that Root's Path Does Not Include Relative Paths or Null Directories", "remarks": "rule_set_236" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_root_path_dirs_no_write", + "value": "root_path_no_dot", "remarks": "rule_set_236" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that Root's Path Does Not Include World or Group-Writable Directories", + "value": "Ensure that Root's Path Does Not Include Relative Paths or Null Directories", "remarks": "rule_set_236" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "root_path_no_dot", + "value": "accounts_umask_root", "remarks": "rule_set_237" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that Root's Path Does Not Include Relative Paths or Null Directories", + "value": "Ensure the Root Bash Umask is Set Correctly", "remarks": "rule_set_237" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "root_path_no_dot", + "value": "accounts_umask_root", "remarks": "rule_set_237" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that Root's Path Does Not Include Relative Paths or Null Directories", + "value": "Ensure the Root Bash Umask is Set Correctly", "remarks": "rule_set_237" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_root", + "value": "no_password_auth_for_systemaccounts", "remarks": "rule_set_238" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Root Bash Umask is Set Correctly", + "value": "Ensure that System Accounts Are Locked", "remarks": "rule_set_238" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_root", + "value": "no_password_auth_for_systemaccounts", "remarks": "rule_set_238" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Root Bash Umask is Set Correctly", + "value": "Ensure that System Accounts Are Locked", "remarks": "rule_set_238" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_password_auth_for_systemaccounts", + "value": "no_shelllogin_for_systemaccounts", "remarks": "rule_set_239" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that System Accounts Are Locked", + "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", "remarks": "rule_set_239" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_password_auth_for_systemaccounts", + "value": "no_shelllogin_for_systemaccounts", "remarks": "rule_set_239" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that System Accounts Are Locked", + "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", "remarks": "rule_set_239" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_shelllogin_for_systemaccounts", + "value": "no_invalid_shell_accounts_unlocked", "remarks": "rule_set_240" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", + "value": "Verify Non-Interactive Accounts Are Locked", "remarks": "rule_set_240" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_shelllogin_for_systemaccounts", + "value": "no_invalid_shell_accounts_unlocked", "remarks": "rule_set_240" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", + "value": "Verify Non-Interactive Accounts Are Locked", "remarks": "rule_set_240" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_invalid_shell_accounts_unlocked", + "value": "accounts_tmout", "remarks": "rule_set_241" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Non-Interactive Accounts Are Locked", + "value": "Set Interactive Session Timeout", "remarks": "rule_set_241" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_invalid_shell_accounts_unlocked", + "value": "accounts_tmout", "remarks": "rule_set_241" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Non-Interactive Accounts Are Locked", + "value": "Set Interactive Session Timeout", "remarks": "rule_set_241" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_tmout", + "value": "accounts_umask_etc_bashrc", "remarks": "rule_set_242" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Interactive Session Timeout", + "value": "Ensure the Default Bash Umask is Set Correctly", "remarks": "rule_set_242" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_tmout", + "value": "accounts_umask_etc_bashrc", "remarks": "rule_set_242" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Interactive Session Timeout", + "value": "Ensure the Default Bash Umask is Set Correctly", "remarks": "rule_set_242" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_bashrc", + "value": "accounts_umask_etc_login_defs", "remarks": "rule_set_243" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Bash Umask is Set Correctly", + "value": "Ensure the Default Umask is Set Correctly in login.defs", "remarks": "rule_set_243" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_bashrc", + "value": "accounts_umask_etc_login_defs", "remarks": "rule_set_243" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Bash Umask is Set Correctly", + "value": "Ensure the Default Umask is Set Correctly in login.defs", "remarks": "rule_set_243" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_login_defs", + "value": "accounts_umask_etc_profile", "remarks": "rule_set_244" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Umask is Set Correctly in login.defs", + "value": "Ensure the Default Umask is Set Correctly in /etc/profile", "remarks": "rule_set_244" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_login_defs", + "value": "accounts_umask_etc_profile", "remarks": "rule_set_244" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Umask is Set Correctly in login.defs", + "value": "Ensure the Default Umask is Set Correctly in /etc/profile", "remarks": "rule_set_244" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_profile", + "value": "package_aide_installed", "remarks": "rule_set_245" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Umask is Set Correctly in /etc/profile", + "value": "Install AIDE", "remarks": "rule_set_245" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_profile", + "value": "package_aide_installed", "remarks": "rule_set_245" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Umask is Set Correctly in /etc/profile", - "remarks": "rule_set_245" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_aide_installed", - "remarks": "rule_set_246" - }, - { - "name": "Rule_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_246" - }, - { - "name": "Check_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_aide_installed", - "remarks": "rule_set_246" - }, - { - "name": "Check_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install AIDE", - "remarks": "rule_set_246" + "remarks": "rule_set_245" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_build_database", - "remarks": "rule_set_247" + "remarks": "rule_set_246" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Build and Test AIDE Database", - "remarks": "rule_set_247" + "remarks": "rule_set_246" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_build_database", - "remarks": "rule_set_247" + "remarks": "rule_set_246" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Build and Test AIDE Database", - "remarks": "rule_set_247" + "remarks": "rule_set_246" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_periodic_cron_checking", - "remarks": "rule_set_248" + "remarks": "rule_set_247" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Periodic Execution of AIDE", - "remarks": "rule_set_248" + "remarks": "rule_set_247" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_periodic_cron_checking", - "remarks": "rule_set_248" + "remarks": "rule_set_247" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Periodic Execution of AIDE", - "remarks": "rule_set_248" + "remarks": "rule_set_247" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_check_audit_tools", - "remarks": "rule_set_249" + "remarks": "rule_set_248" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure AIDE to Verify the Audit Tools", - "remarks": "rule_set_249" + "remarks": "rule_set_248" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_check_audit_tools", - "remarks": "rule_set_249" + "remarks": "rule_set_248" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure AIDE to Verify the Audit Tools", - "remarks": "rule_set_249" + "remarks": "rule_set_248" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journald_enabled", - "remarks": "rule_set_250" + "remarks": "rule_set_249" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journald Service", - "remarks": "rule_set_250" + "remarks": "rule_set_249" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journald_enabled", - "remarks": "rule_set_250" + "remarks": "rule_set_249" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journald Service", - "remarks": "rule_set_250" + "remarks": "rule_set_249" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_journald_and_rsyslog_not_active_together", - "remarks": "rule_set_251" + "remarks": "rule_set_250" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald and rsyslog Are Not Active Together", - "remarks": "rule_set_251" + "remarks": "rule_set_250" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_journald_and_rsyslog_not_active_together", - "remarks": "rule_set_251" + "remarks": "rule_set_250" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald and rsyslog Are Not Active Together", - "remarks": "rule_set_251" + "remarks": "rule_set_250" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_systemd-journal-remote_installed", - "remarks": "rule_set_252" + "remarks": "rule_set_251" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install systemd-journal-remote Package", - "remarks": "rule_set_252" + "remarks": "rule_set_251" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_systemd-journal-remote_installed", - "remarks": "rule_set_252" + "remarks": "rule_set_251" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install systemd-journal-remote Package", - "remarks": "rule_set_252" + "remarks": "rule_set_251" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journal-upload_enabled", - "remarks": "rule_set_253" + "remarks": "rule_set_252" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journal-upload Service", - "remarks": "rule_set_253" + "remarks": "rule_set_252" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journal-upload_enabled", - "remarks": "rule_set_253" + "remarks": "rule_set_252" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journal-upload Service", - "remarks": "rule_set_253" + "remarks": "rule_set_252" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "socket_systemd-journal-remote_disabled", - "remarks": "rule_set_254" + "remarks": "rule_set_253" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable systemd-journal-remote Socket", - "remarks": "rule_set_254" + "remarks": "rule_set_253" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "socket_systemd-journal-remote_disabled", - "remarks": "rule_set_254" + "remarks": "rule_set_253" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable systemd-journal-remote Socket", - "remarks": "rule_set_254" + "remarks": "rule_set_253" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_disable_forward_to_syslog", - "remarks": "rule_set_255" + "remarks": "rule_set_254" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald ForwardToSyslog is disabled", - "remarks": "rule_set_255" + "remarks": "rule_set_254" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_disable_forward_to_syslog", - "remarks": "rule_set_255" + "remarks": "rule_set_254" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald ForwardToSyslog is disabled", - "remarks": "rule_set_255" + "remarks": "rule_set_254" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_compress", - "remarks": "rule_set_256" + "remarks": "rule_set_255" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to compress large log files", - "remarks": "rule_set_256" + "remarks": "rule_set_255" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_compress", - "remarks": "rule_set_256" + "remarks": "rule_set_255" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to compress large log files", - "remarks": "rule_set_256" + "remarks": "rule_set_255" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_storage", - "remarks": "rule_set_257" + "remarks": "rule_set_256" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to write log files to persistent disk", - "remarks": "rule_set_257" + "remarks": "rule_set_256" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_storage", - "remarks": "rule_set_257" + "remarks": "rule_set_256" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to write log files to persistent disk", - "remarks": "rule_set_257" + "remarks": "rule_set_256" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_258" + "remarks": "rule_set_257" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_258" + "remarks": "rule_set_257" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_258" + "remarks": "rule_set_257" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_258" + "remarks": "rule_set_257" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_259" + "remarks": "rule_set_258" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_259" + "remarks": "rule_set_258" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_259" + "remarks": "rule_set_258" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_259" + "remarks": "rule_set_258" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_260" + "remarks": "rule_set_259" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_260" + "remarks": "rule_set_259" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_260" + "remarks": "rule_set_259" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_260" + "remarks": "rule_set_259" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_passwd", - "remarks": "rule_set_261" + "remarks": "rule_set_260" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns passwd File", - "remarks": "rule_set_261" + "remarks": "rule_set_260" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_passwd", - "remarks": "rule_set_261" + "remarks": "rule_set_260" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns passwd File", - "remarks": "rule_set_261" + "remarks": "rule_set_260" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_passwd", - "remarks": "rule_set_262" + "remarks": "rule_set_261" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns passwd File", - "remarks": "rule_set_262" + "remarks": "rule_set_261" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_passwd", - "remarks": "rule_set_262" + "remarks": "rule_set_261" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns passwd File", - "remarks": "rule_set_262" + "remarks": "rule_set_261" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_passwd", - "remarks": "rule_set_263" + "remarks": "rule_set_262" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on passwd File", - "remarks": "rule_set_263" + "remarks": "rule_set_262" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_passwd", - "remarks": "rule_set_263" + "remarks": "rule_set_262" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on passwd File", - "remarks": "rule_set_263" + "remarks": "rule_set_262" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_passwd", - "remarks": "rule_set_264" + "remarks": "rule_set_263" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup passwd File", - "remarks": "rule_set_264" + "remarks": "rule_set_263" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_passwd", - "remarks": "rule_set_264" + "remarks": "rule_set_263" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup passwd File", - "remarks": "rule_set_264" + "remarks": "rule_set_263" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_passwd", - "remarks": "rule_set_265" + "remarks": "rule_set_264" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup passwd File", - "remarks": "rule_set_265" + "remarks": "rule_set_264" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_passwd", - "remarks": "rule_set_265" + "remarks": "rule_set_264" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup passwd File", - "remarks": "rule_set_265" + "remarks": "rule_set_264" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_passwd", - "remarks": "rule_set_266" + "remarks": "rule_set_265" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup passwd File", - "remarks": "rule_set_266" + "remarks": "rule_set_265" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_passwd", - "remarks": "rule_set_266" + "remarks": "rule_set_265" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup passwd File", - "remarks": "rule_set_266" + "remarks": "rule_set_265" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_group", - "remarks": "rule_set_267" + "remarks": "rule_set_266" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns group File", - "remarks": "rule_set_267" + "remarks": "rule_set_266" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_group", - "remarks": "rule_set_267" + "remarks": "rule_set_266" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns group File", - "remarks": "rule_set_267" + "remarks": "rule_set_266" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_group", - "remarks": "rule_set_268" + "remarks": "rule_set_267" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns group File", - "remarks": "rule_set_268" + "remarks": "rule_set_267" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_group", - "remarks": "rule_set_268" + "remarks": "rule_set_267" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns group File", - "remarks": "rule_set_268" + "remarks": "rule_set_267" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_group", - "remarks": "rule_set_269" + "remarks": "rule_set_268" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on group File", - "remarks": "rule_set_269" + "remarks": "rule_set_268" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_group", - "remarks": "rule_set_269" + "remarks": "rule_set_268" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on group File", - "remarks": "rule_set_269" + "remarks": "rule_set_268" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_group", - "remarks": "rule_set_270" + "remarks": "rule_set_269" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup group File", - "remarks": "rule_set_270" + "remarks": "rule_set_269" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_group", - "remarks": "rule_set_270" + "remarks": "rule_set_269" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup group File", - "remarks": "rule_set_270" + "remarks": "rule_set_269" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_group", - "remarks": "rule_set_271" + "remarks": "rule_set_270" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup group File", - "remarks": "rule_set_271" + "remarks": "rule_set_270" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_group", - "remarks": "rule_set_271" + "remarks": "rule_set_270" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup group File", - "remarks": "rule_set_271" + "remarks": "rule_set_270" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_group", - "remarks": "rule_set_272" + "remarks": "rule_set_271" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup group File", - "remarks": "rule_set_272" + "remarks": "rule_set_271" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_group", - "remarks": "rule_set_272" + "remarks": "rule_set_271" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup group File", - "remarks": "rule_set_272" + "remarks": "rule_set_271" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shadow", - "remarks": "rule_set_273" + "remarks": "rule_set_272" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns shadow File", - "remarks": "rule_set_273" + "remarks": "rule_set_272" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shadow", - "remarks": "rule_set_273" + "remarks": "rule_set_272" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns shadow File", - "remarks": "rule_set_273" + "remarks": "rule_set_272" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shadow", - "remarks": "rule_set_274" + "remarks": "rule_set_273" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns shadow File", - "remarks": "rule_set_274" + "remarks": "rule_set_273" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shadow", - "remarks": "rule_set_274" + "remarks": "rule_set_273" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns shadow File", - "remarks": "rule_set_274" + "remarks": "rule_set_273" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shadow", - "remarks": "rule_set_275" + "remarks": "rule_set_274" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on shadow File", - "remarks": "rule_set_275" + "remarks": "rule_set_274" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shadow", - "remarks": "rule_set_275" + "remarks": "rule_set_274" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on shadow File", - "remarks": "rule_set_275" + "remarks": "rule_set_274" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_shadow", - "remarks": "rule_set_276" + "remarks": "rule_set_275" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup shadow File", - "remarks": "rule_set_276" + "remarks": "rule_set_275" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_shadow", - "remarks": "rule_set_276" + "remarks": "rule_set_275" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup shadow File", - "remarks": "rule_set_276" + "remarks": "rule_set_275" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_shadow", - "remarks": "rule_set_277" + "remarks": "rule_set_276" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup shadow File", - "remarks": "rule_set_277" + "remarks": "rule_set_276" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_shadow", - "remarks": "rule_set_277" + "remarks": "rule_set_276" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup shadow File", - "remarks": "rule_set_277" + "remarks": "rule_set_276" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_shadow", - "remarks": "rule_set_278" + "remarks": "rule_set_277" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup shadow File", - "remarks": "rule_set_278" + "remarks": "rule_set_277" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_shadow", - "remarks": "rule_set_278" + "remarks": "rule_set_277" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup shadow File", - "remarks": "rule_set_278" + "remarks": "rule_set_277" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_gshadow", - "remarks": "rule_set_279" + "remarks": "rule_set_278" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns gshadow File", - "remarks": "rule_set_279" + "remarks": "rule_set_278" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_gshadow", - "remarks": "rule_set_279" + "remarks": "rule_set_278" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns gshadow File", - "remarks": "rule_set_279" + "remarks": "rule_set_278" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_gshadow", - "remarks": "rule_set_280" + "remarks": "rule_set_279" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns gshadow File", - "remarks": "rule_set_280" + "remarks": "rule_set_279" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_gshadow", - "remarks": "rule_set_280" + "remarks": "rule_set_279" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns gshadow File", - "remarks": "rule_set_280" + "remarks": "rule_set_279" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_gshadow", - "remarks": "rule_set_281" + "remarks": "rule_set_280" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on gshadow File", - "remarks": "rule_set_281" + "remarks": "rule_set_280" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_gshadow", - "remarks": "rule_set_281" + "remarks": "rule_set_280" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on gshadow File", - "remarks": "rule_set_281" + "remarks": "rule_set_280" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_gshadow", - "remarks": "rule_set_282" + "remarks": "rule_set_281" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup gshadow File", - "remarks": "rule_set_282" + "remarks": "rule_set_281" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_gshadow", - "remarks": "rule_set_282" + "remarks": "rule_set_281" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup gshadow File", - "remarks": "rule_set_282" + "remarks": "rule_set_281" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_gshadow", - "remarks": "rule_set_283" + "remarks": "rule_set_282" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup gshadow File", - "remarks": "rule_set_283" + "remarks": "rule_set_282" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_gshadow", - "remarks": "rule_set_283" + "remarks": "rule_set_282" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup gshadow File", - "remarks": "rule_set_283" + "remarks": "rule_set_282" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_gshadow", - "remarks": "rule_set_284" + "remarks": "rule_set_283" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup gshadow File", - "remarks": "rule_set_284" + "remarks": "rule_set_283" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_gshadow", - "remarks": "rule_set_284" + "remarks": "rule_set_283" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup gshadow File", - "remarks": "rule_set_284" + "remarks": "rule_set_283" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shells", - "remarks": "rule_set_285" + "remarks": "rule_set_284" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/shells File", - "remarks": "rule_set_285" + "remarks": "rule_set_284" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shells", - "remarks": "rule_set_285" + "remarks": "rule_set_284" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/shells File", - "remarks": "rule_set_285" + "remarks": "rule_set_284" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shells", - "remarks": "rule_set_286" + "remarks": "rule_set_285" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Who Owns /etc/shells File", - "remarks": "rule_set_286" + "remarks": "rule_set_285" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shells", - "remarks": "rule_set_286" + "remarks": "rule_set_285" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Who Owns /etc/shells File", - "remarks": "rule_set_286" + "remarks": "rule_set_285" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shells", - "remarks": "rule_set_287" + "remarks": "rule_set_286" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/shells File", - "remarks": "rule_set_287" + "remarks": "rule_set_286" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shells", - "remarks": "rule_set_287" + "remarks": "rule_set_286" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/shells File", - "remarks": "rule_set_287" + "remarks": "rule_set_286" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd", - "remarks": "rule_set_288" + "remarks": "rule_set_287" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd File", - "remarks": "rule_set_288" + "remarks": "rule_set_287" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd", - "remarks": "rule_set_288" + "remarks": "rule_set_287" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd File", - "remarks": "rule_set_288" + "remarks": "rule_set_287" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd", - "remarks": "rule_set_289" + "remarks": "rule_set_288" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd File", - "remarks": "rule_set_289" + "remarks": "rule_set_288" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd", - "remarks": "rule_set_289" + "remarks": "rule_set_288" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd File", - "remarks": "rule_set_289" + "remarks": "rule_set_288" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd", - "remarks": "rule_set_290" + "remarks": "rule_set_289" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd File", - "remarks": "rule_set_290" + "remarks": "rule_set_289" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd", - "remarks": "rule_set_290" + "remarks": "rule_set_289" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd File", - "remarks": "rule_set_290" + "remarks": "rule_set_289" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd_old", - "remarks": "rule_set_291" + "remarks": "rule_set_290" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_291" + "remarks": "rule_set_290" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd_old", - "remarks": "rule_set_291" + "remarks": "rule_set_290" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_291" + "remarks": "rule_set_290" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd_old", - "remarks": "rule_set_292" + "remarks": "rule_set_291" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_292" + "remarks": "rule_set_291" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd_old", - "remarks": "rule_set_292" + "remarks": "rule_set_291" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_292" + "remarks": "rule_set_291" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd_old", - "remarks": "rule_set_293" + "remarks": "rule_set_292" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd.old File", - "remarks": "rule_set_293" + "remarks": "rule_set_292" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd_old", - "remarks": "rule_set_293" + "remarks": "rule_set_292" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd.old File", - "remarks": "rule_set_293" + "remarks": "rule_set_292" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_294" + "remarks": "rule_set_293" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_294" + "remarks": "rule_set_293" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_294" + "remarks": "rule_set_293" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_294" + "remarks": "rule_set_293" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_295" + "remarks": "rule_set_294" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_295" + "remarks": "rule_set_294" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_295" + "remarks": "rule_set_294" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_295" + "remarks": "rule_set_294" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_unowned_by_user", - "remarks": "rule_set_296" + "remarks": "rule_set_295" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a User", - "remarks": "rule_set_296" + "remarks": "rule_set_295" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_unowned_by_user", - "remarks": "rule_set_296" + "remarks": "rule_set_295" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a User", - "remarks": "rule_set_296" + "remarks": "rule_set_295" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_ungroupowned", - "remarks": "rule_set_297" + "remarks": "rule_set_296" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a Group", - "remarks": "rule_set_297" + "remarks": "rule_set_296" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_ungroupowned", - "remarks": "rule_set_297" + "remarks": "rule_set_296" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a Group", - "remarks": "rule_set_297" + "remarks": "rule_set_296" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_all_shadowed", - "remarks": "rule_set_298" + "remarks": "rule_set_297" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify All Account Password Hashes are Shadowed", - "remarks": "rule_set_298" + "remarks": "rule_set_297" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_all_shadowed", - "remarks": "rule_set_298" + "remarks": "rule_set_297" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify All Account Password Hashes are Shadowed", - "remarks": "rule_set_298" + "remarks": "rule_set_297" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords_etc_shadow", - "remarks": "rule_set_299" + "remarks": "rule_set_298" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure There Are No Accounts With Blank or Null Passwords", - "remarks": "rule_set_299" + "remarks": "rule_set_298" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords_etc_shadow", - "remarks": "rule_set_299" + "remarks": "rule_set_298" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure There Are No Accounts With Blank or Null Passwords", - "remarks": "rule_set_299" + "remarks": "rule_set_298" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gid_passwd_group_same", - "remarks": "rule_set_300" + "remarks": "rule_set_299" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", - "remarks": "rule_set_300" + "remarks": "rule_set_299" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gid_passwd_group_same", - "remarks": "rule_set_300" + "remarks": "rule_set_299" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", - "remarks": "rule_set_300" + "remarks": "rule_set_299" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_id", - "remarks": "rule_set_301" + "remarks": "rule_set_300" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique User IDs", - "remarks": "rule_set_301" + "remarks": "rule_set_300" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_id", - "remarks": "rule_set_301" + "remarks": "rule_set_300" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique User IDs", - "remarks": "rule_set_301" + "remarks": "rule_set_300" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_id", - "remarks": "rule_set_302" + "remarks": "rule_set_301" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group ID", - "remarks": "rule_set_302" + "remarks": "rule_set_301" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_id", - "remarks": "rule_set_302" + "remarks": "rule_set_301" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group ID", - "remarks": "rule_set_302" + "remarks": "rule_set_301" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_name", - "remarks": "rule_set_303" + "remarks": "rule_set_302" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique Names", - "remarks": "rule_set_303" + "remarks": "rule_set_302" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_name", - "remarks": "rule_set_303" + "remarks": "rule_set_302" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique Names", - "remarks": "rule_set_303" + "remarks": "rule_set_302" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_name", - "remarks": "rule_set_304" + "remarks": "rule_set_303" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group Names", - "remarks": "rule_set_304" + "remarks": "rule_set_303" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_name", - "remarks": "rule_set_304" + "remarks": "rule_set_303" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group Names", - "remarks": "rule_set_304" + "remarks": "rule_set_303" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_interactive_home_directory_exists", - "remarks": "rule_set_305" + "remarks": "rule_set_304" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive Users Home Directories Must Exist", - "remarks": "rule_set_305" + "remarks": "rule_set_304" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_interactive_home_directory_exists", - "remarks": "rule_set_305" + "remarks": "rule_set_304" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive Users Home Directories Must Exist", - "remarks": "rule_set_305" + "remarks": "rule_set_304" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_home_directories", - "remarks": "rule_set_306" + "remarks": "rule_set_305" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Be Owned By The Primary User", - "remarks": "rule_set_306" + "remarks": "rule_set_305" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_home_directories", - "remarks": "rule_set_306" + "remarks": "rule_set_305" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Be Owned By The Primary User", - "remarks": "rule_set_306" + "remarks": "rule_set_305" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_home_directories", - "remarks": "rule_set_307" + "remarks": "rule_set_306" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", - "remarks": "rule_set_307" + "remarks": "rule_set_306" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_home_directories", - "remarks": "rule_set_307" + "remarks": "rule_set_306" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", - "remarks": "rule_set_307" + "remarks": "rule_set_306" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_308" + "remarks": "rule_set_307" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_308" + "remarks": "rule_set_307" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_308" + "remarks": "rule_set_307" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_308" + "remarks": "rule_set_307" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_309" + "remarks": "rule_set_308" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_309" + "remarks": "rule_set_308" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_309" + "remarks": "rule_set_308" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_309" + "remarks": "rule_set_308" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_no_world_writable_programs", - "remarks": "rule_set_310" + "remarks": "rule_set_309" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Not Run World-Writable Programs", - "remarks": "rule_set_310" + "remarks": "rule_set_309" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_no_world_writable_programs", - "remarks": "rule_set_310" + "remarks": "rule_set_309" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Not Run World-Writable Programs", - "remarks": "rule_set_310" + "remarks": "rule_set_309" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_311" + "remarks": "rule_set_310" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_311" + "remarks": "rule_set_310" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_311" + "remarks": "rule_set_310" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_311" + "remarks": "rule_set_310" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_forward_files", - "remarks": "rule_set_312" + "remarks": "rule_set_311" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .forward Files Exist", - "remarks": "rule_set_312" + "remarks": "rule_set_311" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_forward_files", - "remarks": "rule_set_312" + "remarks": "rule_set_311" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .forward Files Exist", - "remarks": "rule_set_312" + "remarks": "rule_set_311" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_netrc_files", - "remarks": "rule_set_313" + "remarks": "rule_set_312" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No netrc Files Exist", - "remarks": "rule_set_313" + "remarks": "rule_set_312" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_netrc_files", - "remarks": "rule_set_313" + "remarks": "rule_set_312" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No netrc Files Exist", - "remarks": "rule_set_313" + "remarks": "rule_set_312" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rhost_files", - "remarks": "rule_set_314" + "remarks": "rule_set_313" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .rhost Files Exist", - "remarks": "rule_set_314" + "remarks": "rule_set_313" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rhost_files", - "remarks": "rule_set_314" + "remarks": "rule_set_313" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .rhost Files Exist", - "remarks": "rule_set_314" + "remarks": "rule_set_313" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_bash_history", - "remarks": "rule_set_315" + "remarks": "rule_set_314" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure User Bash History File Has Correct Permissions", - "remarks": "rule_set_315" + "remarks": "rule_set_314" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_bash_history", - "remarks": "rule_set_315" + "remarks": "rule_set_314" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure User Bash History File Has Correct Permissions", - "remarks": "rule_set_315" + "remarks": "rule_set_314" } ], "control-implementations": [ { - "uuid": "ebee22c1-0d03-4c73-886d-8c5f5abbfbe1", + "uuid": "92677bf4-b6dc-483d-8f29-d9f2735af874", "source": "trestle://profiles/rhel10-cis_rhel10-l1_workstation/profile.json", "description": "Control implementation for cis_workstation_l1", "props": [ @@ -18593,13 +18552,13 @@ { "param-id": "var_password_hashing_algorithm", "values": [ - "yescrypt" + "cis_rhel10" ] }, { "param-id": "var_password_hashing_algorithm_pam", "values": [ - "yescrypt" + "cis_rhel10" ] }, { @@ -18707,7 +18666,7 @@ ], "implemented-requirements": [ { - "uuid": "0b7652e2-5098-4a6d-bbdb-31b0d3ff0eb7", + "uuid": "a7b046ca-a581-4be4-b5c7-7fcd16cb0055", "control-id": "reload_dconf_db", "description": "This is a helper rule to reload Dconf database correctly.", "props": [ @@ -18724,7 +18683,7 @@ ] }, { - "uuid": "b1826270-3bf6-4a1b-b0e1-88e4ea7fe3bd", + "uuid": "88aa8ea7-54e6-4547-95b9-420fa7f05d39", "control-id": "cis_rhel10_1-1.1.1", "description": "No notes for control-id 1.1.1.1.", "props": [ @@ -18741,7 +18700,7 @@ ] }, { - "uuid": "ecf123ba-7a7e-4020-9aee-db497a643184", + "uuid": "5b0b7cf3-5aff-4226-b7d2-72e1e2517987", "control-id": "cis_rhel10_1-1.1.2", "description": "No notes for control-id 1.1.1.2.", "props": [ @@ -18758,7 +18717,7 @@ ] }, { - "uuid": "a29c6a54-2cb8-4d71-9e44-88278528a3da", + "uuid": "c9c96e38-b66e-43cf-b65a-fe343ab07ae2", "control-id": "cis_rhel10_1-1.1.3", "description": "No notes for control-id 1.1.1.3.", "props": [ @@ -18775,7 +18734,7 @@ ] }, { - "uuid": "67f355f0-ed18-4424-afed-bdd95efac372", + "uuid": "44d37587-b66e-421e-8763-9ce1cfd1f932", "control-id": "cis_rhel10_1-1.1.4", "description": "No notes for control-id 1.1.1.4.", "props": [ @@ -18792,7 +18751,7 @@ ] }, { - "uuid": "1eca06ce-689a-4bbd-8740-ee44a98a97e7", + "uuid": "58ed101f-c785-41d6-9d5c-2884a1625647", "control-id": "cis_rhel10_1-1.1.5", "description": "No notes for control-id 1.1.1.5.", "props": [ @@ -18809,7 +18768,7 @@ ] }, { - "uuid": "5cc5161c-5227-4021-a0bd-6f83c038124a", + "uuid": "6334692c-efeb-4666-a048-b571468782e7", "control-id": "cis_rhel10_1-1.1.11", "description": "The description for control-id cis_rhel10_1-1.1.11.", "props": [ @@ -18822,7 +18781,7 @@ ] }, { - "uuid": "e3c39b07-fedf-45ae-84a7-260382a755a7", + "uuid": "8ab95994-91c9-43e7-a9e8-8518daba0bf7", "control-id": "cis_rhel10_1-1.2.1.1", "description": "No notes for control-id 1.1.2.1.1.", "props": [ @@ -18839,7 +18798,7 @@ ] }, { - "uuid": "c7feb2e7-f071-43d2-971a-74bd38627aa4", + "uuid": "ec43cb0d-8e85-4aa7-815e-ac53417a3f61", "control-id": "cis_rhel10_1-1.2.1.2", "description": "No notes for control-id 1.1.2.1.2.", "props": [ @@ -18856,7 +18815,7 @@ ] }, { - "uuid": "754f68bf-3110-4d46-a823-9137de41c6d8", + "uuid": "31bfb3a4-3f8d-4e0b-b764-f5adb9d5c632", "control-id": "cis_rhel10_1-1.2.1.3", "description": "No notes for control-id 1.1.2.1.3.", "props": [ @@ -18873,7 +18832,7 @@ ] }, { - "uuid": "7f37219f-9ad7-467e-9dae-ea98f8986622", + "uuid": "a2e28ed8-7a99-4bf3-bca6-bc790de7438c", "control-id": "cis_rhel10_1-1.2.1.4", "description": "No notes for control-id 1.1.2.1.4.", "props": [ @@ -18890,7 +18849,7 @@ ] }, { - "uuid": "cfa947b5-5281-418d-9042-513819b7bb88", + "uuid": "e6758382-d3be-40a6-8398-3819f926484d", "control-id": "cis_rhel10_1-1.2.2.1", "description": "No notes for control-id 1.1.2.2.1.", "props": [ @@ -18907,7 +18866,7 @@ ] }, { - "uuid": "2584307f-4ec4-405c-a949-953532d7c777", + "uuid": "51b1ffca-093f-45e3-9728-6bc7135cbc58", "control-id": "cis_rhel10_1-1.2.2.2", "description": "No notes for control-id 1.1.2.2.2.", "props": [ @@ -18924,7 +18883,7 @@ ] }, { - "uuid": "ccc5e569-edf4-4a6e-b27b-7ba06f97b20d", + "uuid": "24187955-c825-4344-a2e1-3b9e244deb4c", "control-id": "cis_rhel10_1-1.2.2.3", "description": "No notes for control-id 1.1.2.2.3.", "props": [ @@ -18941,7 +18900,7 @@ ] }, { - "uuid": "39af04d4-1679-4e4c-8215-94b0663a9535", + "uuid": "8a224161-d13d-4a31-93b1-be0167cd4d8b", "control-id": "cis_rhel10_1-1.2.2.4", "description": "No notes for control-id 1.1.2.2.4.", "props": [ @@ -18958,7 +18917,7 @@ ] }, { - "uuid": "aaf628af-53c1-4a8e-a35b-f5f1abdadd1d", + "uuid": "5cfa0414-3756-44c8-a805-57904d2e7db2", "control-id": "cis_rhel10_1-1.2.3.2", "description": "No notes for control-id 1.1.2.3.2.", "props": [ @@ -18975,7 +18934,7 @@ ] }, { - "uuid": "bf3218d2-bc65-4f2b-824d-a968be97d31e", + "uuid": "74cdd9c4-65ff-4c56-a034-4358a0eca5dc", "control-id": "cis_rhel10_1-1.2.3.3", "description": "No notes for control-id 1.1.2.3.3.", "props": [ @@ -18992,7 +18951,7 @@ ] }, { - "uuid": "9f76ee6c-82eb-45fd-9abd-7f1e114cc129", + "uuid": "d7cdf0b7-95bb-4d97-bea3-b96388c5eb58", "control-id": "cis_rhel10_1-1.2.4.2", "description": "No notes for control-id 1.1.2.4.2.", "props": [ @@ -19009,7 +18968,7 @@ ] }, { - "uuid": "90560900-88a8-43fd-9052-4d804cd1810a", + "uuid": "f67b13fa-6f60-42a8-9c90-972b2af86ddc", "control-id": "cis_rhel10_1-1.2.4.3", "description": "No notes for control-id 1.1.2.4.3.", "props": [ @@ -19026,7 +18985,7 @@ ] }, { - "uuid": "557ce22f-b666-4995-8ff5-ceb549b9de95", + "uuid": "f8bd2c51-842d-40fe-b536-920e0e03f4c9", "control-id": "cis_rhel10_1-1.2.5.2", "description": "No notes for control-id 1.1.2.5.2.", "props": [ @@ -19043,7 +19002,7 @@ ] }, { - "uuid": "8f86d45f-28b5-47dc-8b02-19b24d67be7f", + "uuid": "28547804-eacc-43bb-a461-d3157398a9e1", "control-id": "cis_rhel10_1-1.2.5.3", "description": "No notes for control-id 1.1.2.5.3.", "props": [ @@ -19060,7 +19019,7 @@ ] }, { - "uuid": "83359ef3-e2a6-41a6-9ab0-8f042c57bea1", + "uuid": "3b630198-3dac-40f0-9741-8f0d07b4cd73", "control-id": "cis_rhel10_1-1.2.5.4", "description": "No notes for control-id 1.1.2.5.4.", "props": [ @@ -19077,7 +19036,7 @@ ] }, { - "uuid": "778114f5-9771-4032-8f8a-8893358af895", + "uuid": "8e602c0f-1595-492f-860c-f8b1e8d1f1df", "control-id": "cis_rhel10_1-1.2.6.2", "description": "No notes for control-id 1.1.2.6.2.", "props": [ @@ -19094,7 +19053,7 @@ ] }, { - "uuid": "a2f033ee-227b-47b5-9bc8-87393a37a823", + "uuid": "baba4554-3e35-42b0-8323-b6d2cdf990d5", "control-id": "cis_rhel10_1-1.2.6.3", "description": "No notes for control-id 1.1.2.6.3.", "props": [ @@ -19111,7 +19070,7 @@ ] }, { - "uuid": "6888b448-cc16-4355-aba0-88b131f23023", + "uuid": "d01b2a20-9b0c-4c73-aab5-b7f78f84a3e1", "control-id": "cis_rhel10_1-1.2.6.4", "description": "No notes for control-id 1.1.2.6.4.", "props": [ @@ -19128,7 +19087,7 @@ ] }, { - "uuid": "04f09c07-f39c-461c-b79f-1cc85e3ed497", + "uuid": "de52f3c7-044a-4e36-b6e7-047db770bf0c", "control-id": "cis_rhel10_1-1.2.7.2", "description": "No notes for control-id 1.1.2.7.2.", "props": [ @@ -19145,7 +19104,7 @@ ] }, { - "uuid": "698f6c6a-b429-42ca-bc37-bf2e6c270fc1", + "uuid": "44c4b736-7c5b-4300-a517-d4608a81d95d", "control-id": "cis_rhel10_1-1.2.7.3", "description": "No notes for control-id 1.1.2.7.3.", "props": [ @@ -19162,7 +19121,7 @@ ] }, { - "uuid": "0a7af1be-2309-4b9e-b87b-2bcd8f0a9b39", + "uuid": "e0fd98bb-cf49-40fb-8c87-519158eedb6e", "control-id": "cis_rhel10_1-1.2.7.4", "description": "No notes for control-id 1.1.2.7.4.", "props": [ @@ -19179,7 +19138,7 @@ ] }, { - "uuid": "ad5c228f-16ba-4df1-9870-42bb6e9e0859", + "uuid": "c3cbe59f-09d2-489b-aeb5-e2fcdc240512", "control-id": "cis_rhel10_1-2.1.1", "description": "The description for control-id cis_rhel10_1-2.1.1.", "props": [ @@ -19192,7 +19151,7 @@ ] }, { - "uuid": "e413e9c8-cd00-47d2-9ad8-b6b06e10a8b6", + "uuid": "e369d7c3-ec5c-4db1-87aa-68a1a8142eee", "control-id": "cis_rhel10_1-2.1.2", "description": "No notes for control-id 1.2.1.2.", "props": [ @@ -19209,7 +19168,7 @@ ] }, { - "uuid": "0e013d7f-bd72-4805-a99a-5108c95658f8", + "uuid": "b80d499c-20f0-460d-a0d7-0020f9f8db12", "control-id": "cis_rhel10_1-2.1.4", "description": "The description for control-id cis_rhel10_1-2.1.4.", "props": [ @@ -19222,7 +19181,7 @@ ] }, { - "uuid": "75f07384-47cb-45e3-94c0-17d90a3d4f9a", + "uuid": "55f0e089-fec6-4d5a-9fd2-bfe34549c999", "control-id": "cis_rhel10_1-2.2.1", "description": "The description for control-id cis_rhel10_1-2.2.1.", "props": [ @@ -19235,7 +19194,7 @@ ] }, { - "uuid": "59146a7f-e285-4b7a-95df-e97e2e56e76a", + "uuid": "743e72d4-15d6-4cab-8fc5-10c4b7fcb9de", "control-id": "cis_rhel10_1-3.1.1", "description": "No notes for control-id 1.3.1.1.", "props": [ @@ -19252,7 +19211,7 @@ ] }, { - "uuid": "ea587aff-6e99-492e-ba9a-e90a7d7858eb", + "uuid": "5c3628be-84bf-42e9-bd90-40d0741cf365", "control-id": "cis_rhel10_1-3.1.2", "description": "No notes for control-id 1.3.1.2.", "props": [ @@ -19269,7 +19228,7 @@ ] }, { - "uuid": "23e3428e-3842-4d21-8922-01aa1f04d811", + "uuid": "83eb4c28-633e-48b5-8f93-aca12477ca72", "control-id": "cis_rhel10_1-3.1.3", "description": "No notes for control-id 1.3.1.3.", "props": [ @@ -19286,7 +19245,7 @@ ] }, { - "uuid": "e11d1265-9302-4be5-b260-e29367abc785", + "uuid": "b6f510b6-b424-43d9-91d6-71a8d9d5bb3d", "control-id": "cis_rhel10_1-3.1.4", "description": "No notes for control-id 1.3.1.4.", "props": [ @@ -19303,7 +19262,7 @@ ] }, { - "uuid": "795484f7-9d41-4c9d-9ee6-73fff343afe8", + "uuid": "e0c618c2-71c1-4972-b42e-75715cbe9ce4", "control-id": "cis_rhel10_1-3.1.7", "description": "No notes for control-id 1.3.1.7.", "props": [ @@ -19320,7 +19279,7 @@ ] }, { - "uuid": "9fbb6969-7b28-4e8a-99ac-a4de9df9532b", + "uuid": "b598806a-29f2-4085-8985-c7c22de5a6d0", "control-id": "cis_rhel10_1-4.1", "description": "There is no automated remediation for this rule and this is intentional.\nMore details in the rule description.", "props": [ @@ -19337,7 +19296,7 @@ ] }, { - "uuid": "4f77510e-bd66-48c5-87c4-c5175a8b3266", + "uuid": "3376bfe9-f544-4650-b7da-1f73325e1041", "control-id": "cis_rhel10_1-4.2", "description": "This requirement demands a deeper review of the rules.", "props": [ @@ -19364,7 +19323,7 @@ ] }, { - "uuid": "f954467b-8235-4b98-8e6c-f6fb3c005265", + "uuid": "203913bd-cd28-40ed-b3b2-a9086a66fff3", "control-id": "cis_rhel10_1-5.1", "description": "No notes for control-id 1.5.1.", "props": [ @@ -19381,7 +19340,7 @@ ] }, { - "uuid": "e76b398a-4b08-4775-b466-017c34ad9078", + "uuid": "8b49ed12-1dec-49b1-b65c-93c2079e24aa", "control-id": "cis_rhel10_1-5.2", "description": "No notes for control-id 1.5.2.", "props": [ @@ -19398,7 +19357,7 @@ ] }, { - "uuid": "82cf8c2b-8b5e-40e7-a9d2-357d79fa4b2e", + "uuid": "c9fc7646-3672-48fa-a04c-ca0bf1a5ea35", "control-id": "cis_rhel10_1-5.4", "description": "No notes for control-id 1.5.4.", "props": [ @@ -19415,7 +19374,7 @@ ] }, { - "uuid": "595bc4c9-35fc-43be-86b2-fa7940c810c9", + "uuid": "56cbf1dd-de5b-417c-80ff-0c3159d5533d", "control-id": "cis_rhel10_1-5.5", "description": "No notes for control-id 1.5.5.", "props": [ @@ -19432,7 +19391,7 @@ ] }, { - "uuid": "be94c7f5-b28f-487b-bb4a-0804986acaa0", + "uuid": "9527784a-bf29-43cf-8f49-54b8d4554502", "control-id": "cis_rhel10_1-5.6", "description": "No notes for control-id 1.5.6.", "props": [ @@ -19449,7 +19408,7 @@ ] }, { - "uuid": "0d502d1d-72cc-4c06-9f81-50bc6de84e12", + "uuid": "aa7de458-b1f5-4bbd-a315-cb8bd17dd66a", "control-id": "cis_rhel10_1-5.7", "description": "No notes for control-id 1.5.7.", "props": [ @@ -19466,7 +19425,7 @@ ] }, { - "uuid": "18249eb3-4ed7-4350-8666-a077102a65fd", + "uuid": "73df987e-ed4d-4602-a744-b44c39634797", "control-id": "cis_rhel10_1-5.8", "description": "Address Space Layout Randomization (ASLR)", "props": [ @@ -19483,7 +19442,7 @@ ] }, { - "uuid": "9e0b78e8-6a55-446d-8c87-40a65a67ebdb", + "uuid": "dfd7c767-add4-41ae-b906-45e10fa71fc0", "control-id": "cis_rhel10_1-5.9", "description": "No notes for control-id 1.5.9.", "props": [ @@ -19500,7 +19459,7 @@ ] }, { - "uuid": "2054e0bf-457d-46c4-a3ed-210f076ee427", + "uuid": "6fe709a6-2ae4-44f1-b455-b3998f2bf1a7", "control-id": "cis_rhel10_1-5.10", "description": "No notes for control-id 1.5.10.", "props": [ @@ -19517,7 +19476,7 @@ ] }, { - "uuid": "326bf934-204b-4a7c-acd4-c19fd11149d5", + "uuid": "2b71a590-3e8a-45a2-a6b7-12248af97152", "control-id": "cis_rhel10_1-6.1", "description": "No notes for control-id 1.6.1.", "props": [ @@ -19534,7 +19493,7 @@ ] }, { - "uuid": "0ff97595-adc1-4d26-9b70-18291cee6c36", + "uuid": "36fbfa0f-68ce-45bf-abd0-eaf26710b315", "control-id": "cis_rhel10_1-6.2", "description": "No notes for control-id 1.6.2.", "props": [ @@ -19551,7 +19510,7 @@ ] }, { - "uuid": "70388748-c5fb-4550-a54f-fcc8976883e5", + "uuid": "863d82c7-88a2-4f84-8bd2-0ac856088e7d", "control-id": "cis_rhel10_1-6.3", "description": "No notes for control-id 1.6.3.", "props": [ @@ -19568,7 +19527,7 @@ ] }, { - "uuid": "2210ba4f-0e58-45b9-b49f-1ab82036b19e", + "uuid": "cb111af2-8b69-462b-9881-6f234c3a6e48", "control-id": "cis_rhel10_1-6.4", "description": "No notes for control-id 1.6.4.", "props": [ @@ -19585,7 +19544,7 @@ ] }, { - "uuid": "92148e52-9b97-4db1-a181-935d0159063b", + "uuid": "633bfde6-3a00-482c-9095-3b5d85d7e905", "control-id": "cis_rhel10_1-7.1", "description": "No notes for control-id 1.7.1.", "props": [ @@ -19602,7 +19561,7 @@ ] }, { - "uuid": "cf2da8dc-b532-446c-8b71-433a19c5ee4b", + "uuid": "f3365a62-93d8-4dec-94bd-fc0eb5e2b8ac", "control-id": "cis_rhel10_1-7.2", "description": "No notes for control-id 1.7.2.", "props": [ @@ -19619,7 +19578,7 @@ ] }, { - "uuid": "fbaea53b-dada-440d-9ebf-be1211838fdb", + "uuid": "02b6765b-da34-412f-ac52-57db128a89ce", "control-id": "cis_rhel10_1-7.3", "description": "No notes for control-id 1.7.3.", "props": [ @@ -19636,7 +19595,7 @@ ] }, { - "uuid": "9c352c2c-49a5-442f-ae51-b732680e7c6f", + "uuid": "3206a88b-d261-41a4-9db9-98b45dabaa55", "control-id": "cis_rhel10_1-7.4", "description": "No notes for control-id 1.7.4.", "props": [ @@ -19663,7 +19622,7 @@ ] }, { - "uuid": "e1fc227e-8416-4ca0-ae2f-d6e230f7b922", + "uuid": "926b0acb-cbc1-4696-8f78-e71932d78322", "control-id": "cis_rhel10_1-7.5", "description": "No notes for control-id 1.7.5.", "props": [ @@ -19690,7 +19649,7 @@ ] }, { - "uuid": "e7dec518-9721-4034-81e5-c94079166939", + "uuid": "a1ad3510-215a-4bcf-b66e-e55718cfa493", "control-id": "cis_rhel10_1-7.6", "description": "No notes for control-id 1.7.6.", "props": [ @@ -19717,7 +19676,7 @@ ] }, { - "uuid": "01daf2d2-d7a6-4be5-941a-aef27a6998a2", + "uuid": "ebb1cde0-51df-435d-9dba-793ff0750fc3", "control-id": "cis_rhel10_1-8.1", "description": "No notes for control-id 1.8.1.", "props": [ @@ -19739,7 +19698,7 @@ ] }, { - "uuid": "e8caae00-8268-42ac-b8b3-4f4954658f32", + "uuid": "dc91ce55-3f53-4451-a57a-77c104e4cfe3", "control-id": "cis_rhel10_1-8.2", "description": "No notes for control-id 1.8.2.", "props": [ @@ -19756,7 +19715,7 @@ ] }, { - "uuid": "e8d5028a-93e3-4690-80d4-43c26f5570b8", + "uuid": "3ee50f2f-19f8-4aa4-8f87-4cad8424b9b4", "control-id": "cis_rhel10_1-8.3", "description": "No notes for control-id 1.8.3.", "props": [ @@ -19788,7 +19747,7 @@ ] }, { - "uuid": "37dcf00f-7faa-4e8e-a306-8efbefc81e2f", + "uuid": "bde726e2-6a0f-4c91-ac1e-2183b978cf84", "control-id": "cis_rhel10_1-8.5", "description": "No notes for control-id 1.8.5.", "props": [ @@ -19805,7 +19764,7 @@ ] }, { - "uuid": "f04f2332-dd63-4ac9-816f-a4de595a95ad", + "uuid": "74a7a542-5553-42ed-ba35-3e53dfb44a2f", "control-id": "cis_rhel10_2-1.4", "description": "No notes for control-id 2.1.4.", "props": [ @@ -19822,7 +19781,7 @@ ] }, { - "uuid": "4833abdc-24d0-4570-a6c5-d5111769d249", + "uuid": "0c58c98c-3c74-4aa8-ab40-71d7b0bf992e", "control-id": "cis_rhel10_2-1.5", "description": "No notes for control-id 2.1.5.", "props": [ @@ -19839,7 +19798,7 @@ ] }, { - "uuid": "3c4da067-c459-4b5d-82be-5526ea9f180e", + "uuid": "6a6ea33b-ed9b-457c-86c4-37fdb60c5fae", "control-id": "cis_rhel10_2-1.6", "description": "No notes for control-id 2.1.6.", "props": [ @@ -19856,7 +19815,7 @@ ] }, { - "uuid": "bef221b2-2403-4e4d-a0cd-dc06cbb9a80b", + "uuid": "ff70d2b5-c50b-4ba7-b8cc-03b09fe0cbd3", "control-id": "cis_rhel10_2-1.7", "description": "No notes for control-id 2.1.7.", "props": [ @@ -19873,7 +19832,7 @@ ] }, { - "uuid": "fb66c049-9f4d-4103-8e0a-2c2ec7cfbe61", + "uuid": "e27181f5-2581-4888-aa30-db5f4434a0f7", "control-id": "cis_rhel10_2-1.8", "description": "No notes for control-id 2.1.8.", "props": [ @@ -19895,7 +19854,7 @@ ] }, { - "uuid": "755e6d9c-63a7-4c84-bdbc-e4871d3bdecc", + "uuid": "b3bc6c5e-6726-423c-83a5-f208a086c00f", "control-id": "cis_rhel10_2-1.9", "description": "Many of the libvirt packages used by Enterprise Linux virtualization are dependent on the\nnfs-utils package.", "props": [ @@ -19912,7 +19871,7 @@ ] }, { - "uuid": "60ac3864-a93a-4d79-82ab-4bd87e23b549", + "uuid": "c0ad7122-9d7c-4892-92ea-4853a3937239", "control-id": "cis_rhel10_2-1.11", "description": "Many of the libvirt packages used by Enterprise Linux virtualization, and the nfs-utils\npackage used for The Network File System (NFS), are dependent on the rpcbind package.", "props": [ @@ -19929,7 +19888,7 @@ ] }, { - "uuid": "96297856-fcf4-4f5d-9b7c-13db230de741", + "uuid": "870425a1-b097-41f9-9475-fd21308926f1", "control-id": "cis_rhel10_2-1.12", "description": "No notes for control-id 2.1.12.", "props": [ @@ -19946,7 +19905,7 @@ ] }, { - "uuid": "c553bd1d-95b1-47ab-817a-87648e6474dc", + "uuid": "110adb31-6f2a-49b9-8efe-da5a55c7d415", "control-id": "cis_rhel10_2-1.13", "description": "No notes for control-id 2.1.13.", "props": [ @@ -19963,7 +19922,7 @@ ] }, { - "uuid": "03aaf6ce-16a0-42ef-8453-40fd8ad75ef7", + "uuid": "c86b4080-791c-4ce2-9ff2-6db6bae4a266", "control-id": "cis_rhel10_2-1.14", "description": "No notes for control-id 2.1.14.", "props": [ @@ -19980,7 +19939,7 @@ ] }, { - "uuid": "5c878884-bbcd-4571-883c-5fa61a5ee5ba", + "uuid": "49e2d579-fe55-4f93-9e50-f29dd5df233a", "control-id": "cis_rhel10_2-1.15", "description": "No notes for control-id 2.1.15.", "props": [ @@ -19997,7 +19956,7 @@ ] }, { - "uuid": "ae4bd9bc-4749-4b8b-ae7f-a173de26e12c", + "uuid": "e3e5aea3-76a3-4477-9744-fd0b82fbe6c3", "control-id": "cis_rhel10_2-1.16", "description": "No notes for control-id 2.1.16.", "props": [ @@ -20014,7 +19973,7 @@ ] }, { - "uuid": "ca9ecd9c-2c91-4741-a329-d61188e39699", + "uuid": "f574cd91-bf79-4ef6-b602-b009dde6b887", "control-id": "cis_rhel10_2-1.17", "description": "No notes for control-id 2.1.17.", "props": [ @@ -20031,7 +19990,7 @@ ] }, { - "uuid": "b0fde936-1d08-47e9-8d14-1d91b89f05e3", + "uuid": "2e6d8f30-c5fb-4455-8812-5be86cc1b711", "control-id": "cis_rhel10_2-1.18", "description": "No notes for control-id 2.1.18.", "props": [ @@ -20053,7 +20012,7 @@ ] }, { - "uuid": "6fd8ef4c-44c6-40fe-b8df-24bb9d82e938", + "uuid": "35253a6e-4cc4-4ab4-a925-cf1bd60bf533", "control-id": "cis_rhel10_2-1.21", "description": "No notes for control-id 2.1.21.", "props": [ @@ -20075,7 +20034,7 @@ ] }, { - "uuid": "bd93de8f-8945-4d39-bec5-73c94ce51455", + "uuid": "0151424e-26cd-4a9b-9bbd-34c2ef6622f3", "control-id": "cis_rhel10_2-1.22", "description": "The description for control-id cis_rhel10_2-1.22.", "props": [ @@ -20088,7 +20047,7 @@ ] }, { - "uuid": "8dce80e3-aa27-471d-8e17-90ec2d2fc040", + "uuid": "376c95f3-c4ee-4d68-ae9c-878b3fc9a9b6", "control-id": "cis_rhel10_2-2.1", "description": "No notes for control-id 2.2.1.", "props": [ @@ -20105,7 +20064,7 @@ ] }, { - "uuid": "320942ca-e2b4-4e49-aad2-bd4fe5ea547a", + "uuid": "361be0a7-c49e-4e23-91be-2ff340237e78", "control-id": "cis_rhel10_2-2.3", "description": "No notes for control-id 2.2.3.", "props": [ @@ -20122,7 +20081,7 @@ ] }, { - "uuid": "1dade881-0b2d-4954-8d26-e922491e19ca", + "uuid": "69aa6640-71e8-4a24-b03d-35b58e99bd12", "control-id": "cis_rhel10_2-2.4", "description": "No notes for control-id 2.2.4.", "props": [ @@ -20139,7 +20098,7 @@ ] }, { - "uuid": "101f7529-3b3f-434e-9123-dbc2f19215f0", + "uuid": "a1319ff6-5f1b-4959-bdf0-6e6d75b2a47b", "control-id": "cis_rhel10_2-3.1", "description": "No notes for control-id 2.3.1.", "props": [ @@ -20151,7 +20110,7 @@ ] }, { - "uuid": "a6c3b6f2-efff-47f2-9d4e-8da26dd142d2", + "uuid": "4e04b3e2-45b7-4751-8254-57f9b3d5979d", "control-id": "cis_rhel10_2-3.2", "description": "No notes for control-id 2.3.2.", "props": [ @@ -20168,7 +20127,7 @@ ] }, { - "uuid": "069f34a2-8b80-4dd3-8991-7c39602a8738", + "uuid": "3c859a11-5d96-4ec9-ac9b-0b02ab359bba", "control-id": "cis_rhel10_2-3.3", "description": "No notes for control-id 2.3.3.", "props": [ @@ -20185,7 +20144,7 @@ ] }, { - "uuid": "dad498d1-d23c-4c64-b4a8-19b74d108549", + "uuid": "349c7e72-8340-4895-9b4c-124b91072384", "control-id": "cis_rhel10_2-4.1.1", "description": "No notes for control-id 2.4.1.1.", "props": [ @@ -20207,7 +20166,7 @@ ] }, { - "uuid": "5ac3151e-c3bc-4187-bfba-e3baec9ec323", + "uuid": "b4013cac-ce3d-4ec9-84e2-c0defb80f7d6", "control-id": "cis_rhel10_2-4.1.2", "description": "No notes for control-id 2.4.1.2.", "props": [ @@ -20234,7 +20193,7 @@ ] }, { - "uuid": "a0a76670-475d-4f56-96e1-6872dbc3cb20", + "uuid": "9afab428-ed45-499d-83d1-7ec665f13f9f", "control-id": "cis_rhel10_2-4.1.3", "description": "No notes for control-id 2.4.1.3.", "props": [ @@ -20261,7 +20220,7 @@ ] }, { - "uuid": "b37f0f26-f287-40ed-a75d-5fb2682bdff8", + "uuid": "43bdf617-5209-49d7-890a-17806eb35217", "control-id": "cis_rhel10_2-4.1.4", "description": "No notes for control-id 2.4.1.4.", "props": [ @@ -20288,7 +20247,7 @@ ] }, { - "uuid": "94b8f9a1-ff0f-4d93-b30a-e9c5046d0cf0", + "uuid": "f34337fd-6e06-4d60-a376-6c18501c06cc", "control-id": "cis_rhel10_2-4.1.5", "description": "No notes for control-id 2.4.1.5.", "props": [ @@ -20315,7 +20274,7 @@ ] }, { - "uuid": "c86852df-fab6-4115-8226-0135f01af63e", + "uuid": "3f6415de-808c-4950-9cf3-318114952810", "control-id": "cis_rhel10_2-4.1.6", "description": "No notes for control-id 2.4.1.6.", "props": [ @@ -20342,7 +20301,7 @@ ] }, { - "uuid": "de5c01c9-c668-4819-84ad-8eb5bd935b6e", + "uuid": "a2a3d641-a887-43b7-946a-ff928c0382e6", "control-id": "cis_rhel10_2-4.1.7", "description": "No notes for control-id 2.4.1.7.", "props": [ @@ -20369,7 +20328,7 @@ ] }, { - "uuid": "e272f3d4-c4f4-4615-8040-6f72126e0229", + "uuid": "f7afbf1e-481e-4d6f-8c0e-9146c3748d19", "control-id": "cis_rhel10_2-4.1.8", "description": "No notes for control-id 2.4.1.8.", "props": [ @@ -20396,7 +20355,7 @@ ] }, { - "uuid": "4e788d55-0af6-49bc-b2b1-30136fa43a03", + "uuid": "efc53ee8-c352-4a81-a3cb-f0a0e2b0b3c2", "control-id": "cis_rhel10_2-4.1.9", "description": "No notes for control-id 2.4.1.9.", "props": [ @@ -20433,7 +20392,7 @@ ] }, { - "uuid": "b91712d4-a297-4b52-9906-e96cc5a108c3", + "uuid": "95462c0a-dc4b-4ed9-a627-998804d10d63", "control-id": "cis_rhel10_2-4.2.1", "description": "No notes for control-id 2.4.2.1.", "props": [ @@ -20470,7 +20429,7 @@ ] }, { - "uuid": "68c2dcce-b73d-43aa-8333-c133bb74008f", + "uuid": "3c3ae38e-5a48-4a4b-a67c-8a09caa439b5", "control-id": "cis_rhel10_3-1.1", "description": "The description for control-id cis_rhel10_3-1.1.", "props": [ @@ -20483,7 +20442,7 @@ ] }, { - "uuid": "edf2b954-658b-447e-b3dc-9fc7ffafd3f3", + "uuid": "951f4fd3-7369-463b-89ef-20bd281825ac", "control-id": "cis_rhel10_3-2.1", "description": "No notes for control-id 3.2.1.", "props": [ @@ -20500,7 +20459,7 @@ ] }, { - "uuid": "c4502c71-e566-460e-a888-8b6b03e8ddf5", + "uuid": "7691336d-9a3a-4e3c-99be-dd5d3a6f843c", "control-id": "cis_rhel10_3-2.2", "description": "No notes for control-id 3.2.2.", "props": [ @@ -20517,7 +20476,7 @@ ] }, { - "uuid": "cdced84c-7a22-4686-a926-035308a28464", + "uuid": "4558e7bd-9067-4e86-a035-8a82d4f9fcdc", "control-id": "cis_rhel10_3-2.3", "description": "No notes for control-id 3.2.3.", "props": [ @@ -20534,7 +20493,7 @@ ] }, { - "uuid": "36745ce1-f467-4dad-bfd5-48f1d222b2be", + "uuid": "b02ce256-679a-4a29-984a-2d4ff8b643c6", "control-id": "cis_rhel10_3-2.4", "description": "No notes for control-id 3.2.4.", "props": [ @@ -20551,7 +20510,7 @@ ] }, { - "uuid": "326ec632-e1ad-4b6b-b568-bb2a664d225e", + "uuid": "a7794f6d-b2ac-4d57-87d6-adbfcf42a731", "control-id": "cis_rhel10_3-2.5", "description": "No notes for control-id 3.2.5.", "props": [ @@ -20568,7 +20527,7 @@ ] }, { - "uuid": "bc994203-c466-41d0-ac6c-75b1e52cd02e", + "uuid": "e332459c-f7e8-4303-bf3d-0488d23eb402", "control-id": "cis_rhel10_3-2.6", "description": "No notes for control-id 3.2.6.", "props": [ @@ -20585,7 +20544,7 @@ ] }, { - "uuid": "ec6f0205-e61e-4905-95ed-c4dc621501c4", + "uuid": "21841ba6-d9c6-473b-a7b2-ba86621f8af2", "control-id": "cis_rhel10_3-3.1.1", "description": "No notes for control-id 3.3.1.1.", "props": [ @@ -20602,7 +20561,7 @@ ] }, { - "uuid": "33108f53-0b60-4f17-a078-65ab307de7c0", + "uuid": "5f3cb5e9-e1c4-4e68-a6a0-55955771b3a6", "control-id": "cis_rhel10_3-3.1.2", "description": "No notes for control-id 3.3.1.2.", "props": [ @@ -20619,7 +20578,7 @@ ] }, { - "uuid": "08e6618c-8ce5-4db2-bd47-d48f274cb7a3", + "uuid": "a81c0c9f-9b6d-4efa-b4de-3949eb8e183d", "control-id": "cis_rhel10_3-3.1.3", "description": "No notes for control-id 3.3.1.3.", "props": [ @@ -20636,7 +20595,7 @@ ] }, { - "uuid": "2a32a69c-a61c-41be-8895-c53bc6e2bed2", + "uuid": "bd93d3a2-1c7e-4d1d-bf79-58b67ecd8bf7", "control-id": "cis_rhel10_3-3.1.4", "description": "No notes for control-id 3.3.1.4.", "props": [ @@ -20653,7 +20612,7 @@ ] }, { - "uuid": "005d9772-6b83-475c-a661-781f04866a88", + "uuid": "38fc3ec5-e41c-4397-bd27-6eb4aeb9bdea", "control-id": "cis_rhel10_3-3.1.5", "description": "No notes for control-id 3.3.1.5.", "props": [ @@ -20670,7 +20629,7 @@ ] }, { - "uuid": "64021523-aa40-459b-a188-01ef7aa07848", + "uuid": "e46388d1-f393-4762-a049-f01d66c3f2f6", "control-id": "cis_rhel10_3-3.1.6", "description": "No notes for control-id 3.3.1.6.", "props": [ @@ -20687,7 +20646,7 @@ ] }, { - "uuid": "fc9f0bad-37fb-4cb9-ba1e-5354775ae3c8", + "uuid": "a306a9d9-f48f-448d-9d09-1d8a393250fa", "control-id": "cis_rhel10_3-3.1.7", "description": "No notes for control-id 3.3.1.7.", "props": [ @@ -20704,7 +20663,7 @@ ] }, { - "uuid": "f11efb8e-6d8d-44b7-8d5d-c72a73c5dc9c", + "uuid": "c258439a-8c71-49df-80e7-bc04b1a2418f", "control-id": "cis_rhel10_3-3.1.8", "description": "No notes for control-id 3.3.1.8.", "props": [ @@ -20721,7 +20680,7 @@ ] }, { - "uuid": "67c729d4-1a9d-421c-a2f6-48f197a31c6b", + "uuid": "672a8c70-aa98-44a2-ac5f-215a9fd99af8", "control-id": "cis_rhel10_3-3.1.9", "description": "No notes for control-id 3.3.1.9.", "props": [ @@ -20738,7 +20697,7 @@ ] }, { - "uuid": "c035b550-2e1b-45ca-99a7-95d22962836e", + "uuid": "24c8272d-91fc-4a13-9049-04521c78e888", "control-id": "cis_rhel10_3-3.1.10", "description": "No notes for control-id 3.3.1.10.", "props": [ @@ -20755,7 +20714,7 @@ ] }, { - "uuid": "9c8ddf45-f169-41ce-bbff-74e4922801c3", + "uuid": "7641ffc0-2ad6-410b-9146-f6b68a3330bd", "control-id": "cis_rhel10_3-3.1.11", "description": "No notes for control-id 3.3.1.11.", "props": [ @@ -20772,7 +20731,7 @@ ] }, { - "uuid": "38be95c2-1051-477a-b1b6-4d27877d055b", + "uuid": "056460f4-57a2-4148-92a2-0388b717f3a5", "control-id": "cis_rhel10_3-3.1.12", "description": "No notes for control-id 3.3.1.12.", "props": [ @@ -20789,7 +20748,7 @@ ] }, { - "uuid": "288288fc-95a6-453f-ac72-1a3d54c2e3c6", + "uuid": "6a2bbaef-61fd-4783-a4d1-b03b7c38bf14", "control-id": "cis_rhel10_3-3.1.13", "description": "No notes for control-id 3.3.1.13.", "props": [ @@ -20806,7 +20765,7 @@ ] }, { - "uuid": "40857b3f-6f27-4adc-b770-5d3d379b9d5b", + "uuid": "f5ab7fa5-e2f6-4e2e-a722-c710fb39c220", "control-id": "cis_rhel10_3-3.1.14", "description": "No notes for control-id 3.3.1.14.", "props": [ @@ -20823,7 +20782,7 @@ ] }, { - "uuid": "a8dbe686-7f0d-4588-b886-3869c9e7de6c", + "uuid": "b9493626-ccee-423e-acb7-3c313b9fc221", "control-id": "cis_rhel10_3-3.1.15", "description": "No notes for control-id 3.3.1.15.", "props": [ @@ -20840,7 +20799,7 @@ ] }, { - "uuid": "e42c93fd-731e-4aa3-835b-e2fc69f48d0e", + "uuid": "ba08b3fd-2081-42ee-b067-37a80e637773", "control-id": "cis_rhel10_3-3.1.16", "description": "No notes for control-id 3.3.1.16.", "props": [ @@ -20857,7 +20816,7 @@ ] }, { - "uuid": "78b3cdbd-eb34-47fa-b49c-519d81d223ec", + "uuid": "54fa0fa7-4d73-454e-a1f8-a04041d9f5f9", "control-id": "cis_rhel10_3-3.1.17", "description": "No notes for control-id 3.3.1.17.", "props": [ @@ -20874,7 +20833,7 @@ ] }, { - "uuid": "14504616-697e-44bb-8677-1a0621007294", + "uuid": "f98c9933-dfee-4556-b2c3-dfc84def3c66", "control-id": "cis_rhel10_3-3.1.18", "description": "No notes for control-id 3.3.1.18.", "props": [ @@ -20891,7 +20850,7 @@ ] }, { - "uuid": "f4c3040f-74bf-4595-8731-a0c5b1869bff", + "uuid": "6c6dd092-c351-4cad-af7f-5be167a503ea", "control-id": "cis_rhel10_3-3.2.1", "description": "No notes for control-id 3.3.2.1.", "props": [ @@ -20908,7 +20867,7 @@ ] }, { - "uuid": "ac862856-d611-49d5-9ca1-c096c87677b4", + "uuid": "d4bb3387-fe5c-455e-8902-d6dd0e173b7c", "control-id": "cis_rhel10_3-3.2.2", "description": "No notes for control-id 3.3.2.2.", "props": [ @@ -20925,7 +20884,7 @@ ] }, { - "uuid": "6db94fe6-8e6d-4171-9894-c184b3f0f80f", + "uuid": "87476242-b74b-4092-8880-5e81102761cd", "control-id": "cis_rhel10_3-3.2.3", "description": "No notes for control-id 3.3.2.3.", "props": [ @@ -20942,7 +20901,7 @@ ] }, { - "uuid": "a15789b7-e95a-4b42-a93a-5f4058bce1ee", + "uuid": "fbade312-2d20-4c70-9908-f1011951b280", "control-id": "cis_rhel10_3-3.2.4", "description": "No notes for control-id 3.3.2.4.", "props": [ @@ -20959,7 +20918,7 @@ ] }, { - "uuid": "167a50d6-468a-4050-8910-88f578f4fc8a", + "uuid": "a15a6103-32c5-4935-ba18-90629550b7c1", "control-id": "cis_rhel10_3-3.2.5", "description": "No notes for control-id 3.3.2.5.", "props": [ @@ -20976,7 +20935,7 @@ ] }, { - "uuid": "5078e423-5bd5-403b-a850-c973fa19ac7f", + "uuid": "3e27cad9-1fd1-4501-9482-0256f2e81da6", "control-id": "cis_rhel10_3-3.2.6", "description": "No notes for control-id 3.3.2.6.", "props": [ @@ -20993,7 +20952,7 @@ ] }, { - "uuid": "38e87f04-3a27-4618-bf17-793e712746ca", + "uuid": "9544cc7b-fe70-4737-a4f8-1fffbb39d51b", "control-id": "cis_rhel10_3-3.2.7", "description": "No notes for control-id 3.3.2.7.", "props": [ @@ -21010,7 +20969,7 @@ ] }, { - "uuid": "4d7f12e0-b52f-465a-a9f0-2d2e90eae04b", + "uuid": "787573be-dd9d-45ad-902f-38afba2c5258", "control-id": "cis_rhel10_3-3.2.8", "description": "No notes for control-id 3.3.2.8.", "props": [ @@ -21027,7 +20986,7 @@ ] }, { - "uuid": "ea8a166b-b178-409f-ab40-0fb3b8100d1d", + "uuid": "c363e643-fedf-409b-9360-ab986f559385", "control-id": "cis_rhel10_4-1.1", "description": "No notes for control-id 4.1.1.", "props": [ @@ -21044,7 +21003,7 @@ ] }, { - "uuid": "ad51a099-a1c1-472a-95dd-ef5521f893b1", + "uuid": "24eb6971-685b-4706-8793-c9456507a1fd", "control-id": "cis_rhel10_4-1.2", "description": "No notes for control-id 4.1.2.", "props": [ @@ -21061,7 +21020,7 @@ ] }, { - "uuid": "247c7555-a949-4b0b-a02e-80e49a5a5c95", + "uuid": "351906ae-e324-49cb-80f1-915a75370804", "control-id": "cis_rhel10_4-1.3", "description": "No notes for control-id 4.1.3.", "props": [ @@ -21078,7 +21037,7 @@ ] }, { - "uuid": "5750819e-f5bd-427c-905f-b4d9a4027c1f", + "uuid": "5cdc7765-481d-41de-a368-9b3547e43848", "control-id": "cis_rhel10_4-1.4", "description": "The description for control-id cis_rhel10_4-1.4.", "props": [ @@ -21091,7 +21050,7 @@ ] }, { - "uuid": "52c20668-28d4-4d32-862f-89e7a9d32ebc", + "uuid": "14d2d9a8-0864-41e3-b5d0-98a512b457a7", "control-id": "cis_rhel10_4-1.5", "description": "Firewalld in Red Hat Enterprise Linux 10 accepts loopback traffic by default.", "props": [ @@ -21108,7 +21067,7 @@ ] }, { - "uuid": "e87ca923-3dd8-4a97-adbb-07a8781650b5", + "uuid": "b2e9ca20-6957-4b2f-929c-de28e1b0641c", "control-id": "cis_rhel10_4-1.6", "description": "The description for control-id cis_rhel10_4-1.6.", "props": [ @@ -21121,7 +21080,7 @@ ] }, { - "uuid": "d84354ec-e7b8-4e96-a68e-e612853f92a2", + "uuid": "062ce721-24e9-4efa-8ba8-c7b981e7fd03", "control-id": "cis_rhel10_4-1.7", "description": "The description for control-id cis_rhel10_4-1.7.", "props": [ @@ -21134,7 +21093,7 @@ ] }, { - "uuid": "aee1d4bc-5586-43a2-8145-46d6b768d4be", + "uuid": "873bb25c-d47b-459b-9054-91a88a4ee0fe", "control-id": "cis_rhel10_5-1.1", "description": "No notes for control-id 5.1.1.", "props": [ @@ -21191,7 +21150,7 @@ ] }, { - "uuid": "c1721ea4-98e8-4f13-b741-aef991e4c806", + "uuid": "9af3a3cb-2048-4506-8eb9-1d437c70171c", "control-id": "cis_rhel10_5-1.2", "description": "No notes for control-id 5.1.2.", "props": [ @@ -21218,7 +21177,7 @@ ] }, { - "uuid": "e98f5870-619d-47cc-9f0c-7233d3f2481f", + "uuid": "f3b5c572-116f-49a4-85b1-935807d8500c", "control-id": "cis_rhel10_5-1.3", "description": "No notes for control-id 5.1.3.", "props": [ @@ -21245,7 +21204,7 @@ ] }, { - "uuid": "fca1f36b-f546-4099-8f24-3dd17e1e5759", + "uuid": "c86352ca-2fc7-4d35-8313-2bdc0b626eb4", "control-id": "cis_rhel10_5-1.4", "description": "No notes for control-id 5.1.4.", "props": [ @@ -21262,7 +21221,7 @@ ] }, { - "uuid": "f8b5bcac-1f3b-4f8d-889e-d33601f2ca11", + "uuid": "263e7750-7ce8-4b80-855e-b1449a57eb4f", "control-id": "cis_rhel10_5-1.5", "description": "No notes for control-id 5.1.5.", "props": [ @@ -21279,7 +21238,7 @@ ] }, { - "uuid": "9847a31c-cc5c-4cf0-88a1-7512e1e57fc5", + "uuid": "0fcf56a8-3f7d-4e52-86ad-4f5f866a3e4c", "control-id": "cis_rhel10_5-1.6", "description": "No notes for control-id 5.1.6.", "props": [ @@ -21296,7 +21255,7 @@ ] }, { - "uuid": "06210efb-039f-4b03-bc53-c6b5a78d574c", + "uuid": "808977fd-077c-47f6-b127-ab7fdd75ef9c", "control-id": "cis_rhel10_5-1.7", "description": "The requirement gives an example of 45 seconds, but is flexible about the values. It is only\nnecessary to ensure there is a timeout configured in alignment to the site policy.", "props": [ @@ -21318,7 +21277,7 @@ ] }, { - "uuid": "1a6eb553-f204-4afb-920d-eea67d13c389", + "uuid": "9ef194d9-7228-44ec-9605-34d51962429e", "control-id": "cis_rhel10_5-1.8", "description": "No notes for control-id 5.1.8.", "props": [ @@ -21335,7 +21294,7 @@ ] }, { - "uuid": "80a49b2a-3f75-45c9-aa9e-c6a6888c265a", + "uuid": "fb9e827a-31fb-4b27-99df-ad365fa40e1b", "control-id": "cis_rhel10_5-1.9", "description": "No notes for control-id 5.1.9.", "props": [ @@ -21352,7 +21311,7 @@ ] }, { - "uuid": "aede351c-8aa3-447f-a7e7-35ed3239ed68", + "uuid": "81b62f47-8eae-4126-9266-d278f7479cd2", "control-id": "cis_rhel10_5-1.10", "description": "No notes for control-id 5.1.10.", "props": [ @@ -21369,7 +21328,7 @@ ] }, { - "uuid": "e7fad58c-9957-4f8f-8fa3-6b0103143605", + "uuid": "96f42506-9821-490e-9ca3-97340d074d9d", "control-id": "cis_rhel10_5-1.11", "description": "No notes for control-id 5.1.11.", "props": [ @@ -21386,7 +21345,7 @@ ] }, { - "uuid": "67f6b3b4-000d-43c6-af21-e62fa69e3166", + "uuid": "9331e2cf-360b-4f57-9d33-0702e2fc6694", "control-id": "cis_rhel10_5-1.12", "description": "The description for control-id cis_rhel10_5-1.12.", "props": [ @@ -21404,7 +21363,7 @@ ] }, { - "uuid": "27fe78b5-6a14-4058-ab55-1152f9806eb8", + "uuid": "1e8cee79-e548-4057-b939-24e45ab210fe", "control-id": "cis_rhel10_5-1.13", "description": "No notes for control-id 5.1.13.", "props": [ @@ -21421,7 +21380,7 @@ ] }, { - "uuid": "fd35568c-26fd-45bf-b534-f8a28751707f", + "uuid": "6e1371aa-8693-4835-8c46-9f90c55140ba", "control-id": "cis_rhel10_5-1.14", "description": "The CIS benchmark is not opinionated about which loglevel is selected here. Here, this\nprofile uses VERBOSE by default, as it allows for the capture of login and logout activity\nas well as key fingerprints.", "props": [ @@ -21438,7 +21397,7 @@ ] }, { - "uuid": "1bc64887-1c12-47b4-8bf3-1fbaeede881a", + "uuid": "372d26db-0ddd-408a-b67c-b4a5f5a76e47", "control-id": "cis_rhel10_5-1.15", "description": "No notes for control-id 5.1.15.", "props": [ @@ -21455,7 +21414,7 @@ ] }, { - "uuid": "125a40df-eaa5-4a84-b02e-6c71feb16ce2", + "uuid": "497b5c41-48ed-4253-8ab7-df13c59ab982", "control-id": "cis_rhel10_5-1.16", "description": "No notes for control-id 5.1.16.", "props": [ @@ -21472,7 +21431,7 @@ ] }, { - "uuid": "639e04e4-8797-4972-92dc-2379e907ab31", + "uuid": "210d865c-5d9a-4c60-9ca7-76213c79ac49", "control-id": "cis_rhel10_5-1.17", "description": "No notes for control-id 5.1.17.", "props": [ @@ -21489,7 +21448,7 @@ ] }, { - "uuid": "3806468f-2aae-4f2c-a2c9-3015daf91781", + "uuid": "ea3ec5a7-a054-4b4b-b1bc-531ae16e5719", "control-id": "cis_rhel10_5-1.18", "description": "No notes for control-id 5.1.18.", "props": [ @@ -21506,7 +21465,7 @@ ] }, { - "uuid": "e5b24c46-abd1-42be-96e5-43530985649b", + "uuid": "0edafd4d-1dfc-4d0d-b8c4-17678d40b34a", "control-id": "cis_rhel10_5-1.19", "description": "No notes for control-id 5.1.19.", "props": [ @@ -21523,7 +21482,7 @@ ] }, { - "uuid": "26922d3d-899a-461a-abaa-62e56784b979", + "uuid": "4ab6c708-705b-464c-b582-d7e2d0abbc4d", "control-id": "cis_rhel10_5-1.20", "description": "No notes for control-id 5.1.20.", "props": [ @@ -21540,7 +21499,7 @@ ] }, { - "uuid": "2330f9a2-20a4-4198-9106-337ccf6f5791", + "uuid": "b343c97d-246f-4d97-9c08-e6ba806dd635", "control-id": "cis_rhel10_5-1.21", "description": "No notes for control-id 5.1.21.", "props": [ @@ -21557,7 +21516,7 @@ ] }, { - "uuid": "2b3d8b58-cc8e-422e-b9e4-97a776ae4193", + "uuid": "8414194e-9ad9-4c49-8c3e-b3179962cc26", "control-id": "cis_rhel10_5-1.22", "description": "No notes for control-id 5.1.22.", "props": [ @@ -21574,7 +21533,7 @@ ] }, { - "uuid": "b24fefe3-af86-4898-a45b-f642a7232ed1", + "uuid": "bae9a31a-e4a4-452d-b76b-76b2754d514a", "control-id": "cis_rhel10_5-2.1", "description": "No notes for control-id 5.2.1.", "props": [ @@ -21591,7 +21550,7 @@ ] }, { - "uuid": "a07be9c4-125e-4f94-bd64-2feeab143ecb", + "uuid": "426f3efa-2a3e-437f-ab56-8a846046d0bf", "control-id": "cis_rhel10_5-2.2", "description": "No notes for control-id 5.2.2.", "props": [ @@ -21608,7 +21567,7 @@ ] }, { - "uuid": "cc372dd3-0630-493a-bc5c-af90f0cc92ac", + "uuid": "da0978b5-cf4c-4a70-985f-2ba5077e9209", "control-id": "cis_rhel10_5-2.3", "description": "No notes for control-id 5.2.3.", "props": [ @@ -21625,7 +21584,7 @@ ] }, { - "uuid": "eaa7cfdc-b996-49d6-a66c-ff6d99dce849", + "uuid": "c67c90d6-9c58-49cf-8ca3-73f36af4f4c3", "control-id": "cis_rhel10_5-2.5", "description": "No notes for control-id 5.2.5.", "props": [ @@ -21642,7 +21601,7 @@ ] }, { - "uuid": "c9476e2a-c58e-42ef-aa22-e1691aa4863e", + "uuid": "a791d648-e2a3-4d99-8de5-59fde35b4a6e", "control-id": "cis_rhel10_5-2.6", "description": "No notes for control-id 5.2.6.", "props": [ @@ -21659,7 +21618,7 @@ ] }, { - "uuid": "377c988a-3440-4ad6-b410-12f9d89434cc", + "uuid": "239d1b57-180c-4baf-9e34-275843627ca1", "control-id": "cis_rhel10_5-2.7", "description": "Members of \"wheel\" or GID 0 groups are checked by default if the group option is not set for\npam_wheel.so module. The recommendation states the group should be empty to reinforce the\nuse of \"sudo\" for privileged access. Therefore, members of these groups should be manually\nchecked or a different group should be informed.", "props": [ @@ -21681,7 +21640,7 @@ ] }, { - "uuid": "e93a2216-2ad9-47db-a275-dd3bccd2c167", + "uuid": "f7a88a37-4e15-429c-bdd7-0c39dd779dfa", "control-id": "cis_rhel10_5-3.1.1", "description": "This requirement is hard to be automated without any specific requirement. The policy even\nstates that provided commands are examples, other custom settings might be in place and the\nsettings might be different depending on site policies. The other rules will already make\nsure there is a correct autheselect profile regardless of the existing settings. It is\nnecessary to better discuss with CIS Community.", "props": [ @@ -21693,7 +21652,7 @@ ] }, { - "uuid": "cb1219be-27be-4a5b-baaa-3e73234a0321", + "uuid": "e0779c93-dd93-45b0-a315-54553b8024e2", "control-id": "cis_rhel10_5-3.1.2", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.1.", "props": [ @@ -21715,7 +21674,7 @@ ] }, { - "uuid": "dac58b24-0373-4b45-aea8-75913da01bc9", + "uuid": "8a9d805a-38bc-421a-bb30-844c26268333", "control-id": "cis_rhel10_5-3.1.3", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.2.", "props": [ @@ -21742,7 +21701,7 @@ ] }, { - "uuid": "7f3291f1-479d-45b2-b01c-806bd19d0859", + "uuid": "80417cd6-a654-479b-ade1-acb1115b54fb", "control-id": "cis_rhel10_5-3.1.4", "description": "The module is properly enabled by the rules mentioned in related_rules.\nRequirements in 5.3.2.3 use these rules.", "props": [ @@ -21754,7 +21713,7 @@ ] }, { - "uuid": "385f44a1-34e1-4d82-806e-6f1c1932422c", + "uuid": "bd18b598-8b40-4ac2-813e-88ebc6fbca1e", "control-id": "cis_rhel10_5-3.1.5", "description": "No notes for control-id 5.3.1.5.", "props": [ @@ -21771,7 +21730,7 @@ ] }, { - "uuid": "ad5876b5-f47d-4ca4-b4a2-1f2779744e10", + "uuid": "6b7b19d0-4733-49b2-9f9a-b46b5a57a05c", "control-id": "cis_rhel10_5-3.2.1.1", "description": "No notes for control-id 5.3.2.1.1.", "props": [ @@ -21788,7 +21747,7 @@ ] }, { - "uuid": "549ac367-5ab1-403a-8ae8-c98c13a91375", + "uuid": "e3b01ae1-df59-4848-8207-96617bd61496", "control-id": "cis_rhel10_5-3.2.1.2", "description": "The policy also accepts value 0, which means the locked accounts should be manually unlocked\nby an administrator. However, it also mentions that using value 0 can facilitate a DoS\nattack to legitimate users.", "props": [ @@ -21805,7 +21764,7 @@ ] }, { - "uuid": "d1fe1e61-5b7a-485f-8057-8556a1530a43", + "uuid": "fb931b7f-0f0e-4e10-a8cb-bf083eee55bd", "control-id": "cis_rhel10_5-3.2.2.1", "description": "No notes for control-id 5.3.2.2.1.", "props": [ @@ -21822,7 +21781,7 @@ ] }, { - "uuid": "e385112e-9b91-4751-8bb7-64191d02db64", + "uuid": "75c99911-ffba-435a-b20f-4974955062c2", "control-id": "cis_rhel10_5-3.2.2.2", "description": "No notes for control-id 5.3.2.2.2.", "props": [ @@ -21839,7 +21798,7 @@ ] }, { - "uuid": "cad0866e-eda5-49d6-9770-3625e9d4ac42", + "uuid": "e5fac67f-0a03-42cf-adf4-a47aa7510a3c", "control-id": "cis_rhel10_5-3.2.2.3", "description": "This requirement is expected to be manual. However, in previous versions of the policy\nit was already automated the configuration of \"minclass\" option. This posture was kept for\nRHEL 10 in this new version. Rules related to other options are informed in related_rules.\nIn short, minclass=4 alone can achieve the same result achieved by the combination of the\nother 4 options mentioned in the policy.", "props": [ @@ -21856,7 +21815,7 @@ ] }, { - "uuid": "ab3ad3b9-78ad-4e85-94fc-3680e9d31d3d", + "uuid": "21488ace-06c2-463e-abb7-48a2fa9d8712", "control-id": "cis_rhel10_5-3.2.2.4", "description": "No notes for control-id 5.3.2.2.4.", "props": [ @@ -21873,7 +21832,7 @@ ] }, { - "uuid": "28a80e4b-f0db-44e9-ba2b-64f0de48c34d", + "uuid": "e9934300-8757-4f85-b271-c2c86ab57bed", "control-id": "cis_rhel10_5-3.2.2.5", "description": "No notes for control-id 5.3.2.2.5.", "props": [ @@ -21890,7 +21849,7 @@ ] }, { - "uuid": "fa670a51-718c-42e7-be7f-7eccdd07129b", + "uuid": "39919b42-3e08-4e77-962f-9ef74043be32", "control-id": "cis_rhel10_5-3.2.2.6", "description": "No notes for control-id 5.3.2.2.6.", "props": [ @@ -21907,7 +21866,7 @@ ] }, { - "uuid": "d56e2646-d393-4675-ad22-6c1ad64cfe0a", + "uuid": "001345d9-0c98-4167-8aff-a89dd18d8ed9", "control-id": "cis_rhel10_5-3.2.2.7", "description": "No notes for control-id 5.3.2.2.7.", "props": [ @@ -21924,7 +21883,7 @@ ] }, { - "uuid": "a160e200-c1c9-4ba2-bc30-fbf299270df4", + "uuid": "fe4b926e-d100-4b05-8202-c4ba3094fbc2", "control-id": "cis_rhel10_5-3.2.3.1", "description": "Although mentioned in the section 5.3.3.3, there is no explicit requirement to configure\nretry option of pam_pwhistory. If come in the future, the rule accounts_password_pam_retry\ncan be used.", "props": [ @@ -21946,7 +21905,7 @@ ] }, { - "uuid": "1ca506fd-d405-4d09-afcb-0b1f56e88fff", + "uuid": "5fe221cd-49a5-4cb9-9800-5d48404ce783", "control-id": "cis_rhel10_5-3.2.3.2", "description": "No notes for control-id 5.3.2.3.2.", "props": [ @@ -21963,7 +21922,7 @@ ] }, { - "uuid": "40718795-d28c-4ca9-ad34-fd7875759cbb", + "uuid": "669d02a9-c5e8-4e24-b5cd-e78935b3acce", "control-id": "cis_rhel10_5-3.2.3.3", "description": "In RHEL 10 pam_pwhistory is enabled via authselect feature, as required in 5.3.1.4. The\nfeature automatically set \"use_authok\" option. In any case, we don't have a rule to check\nthis option specifically.", "props": [ @@ -21980,7 +21939,7 @@ ] }, { - "uuid": "77e78a55-dfdb-46d7-a93d-c6714601e2f6", + "uuid": "5760381a-61ac-4d2d-92c3-c1049d3908be", "control-id": "cis_rhel10_5-3.2.4.1", "description": "The rule more specifically used in this requirement also satify the requirement 5.3.1.5.", "props": [ @@ -21997,7 +21956,7 @@ ] }, { - "uuid": "60b49144-8820-460c-97be-7b11c3129398", + "uuid": "320f4c47-df6d-4968-8cc4-1d6708e2291e", "control-id": "cis_rhel10_5-3.2.4.2", "description": "Usage of pam_unix.so module together with \"remember\" option is deprecated and is not\nrecommended by this policy. Instead, it should be used remember option of pam_pwhistory\nmodule, as required in 5.3.2.3.1. See here for more details about pam_unix.so:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1778929", "props": [ @@ -22014,7 +21973,7 @@ ] }, { - "uuid": "d064631a-0dbb-40b9-9db9-f8537a3f41b5", + "uuid": "736554e0-0adb-4fc7-92fb-b1e9a5f45db6", "control-id": "cis_rhel10_5-3.2.4.3", "description": "Changes in logindefs mentioned in this requirement are more specifically covered by 5.4.1.4", "props": [ @@ -22036,7 +21995,7 @@ ] }, { - "uuid": "45401ade-9cfc-4c04-9f7f-183bd56430fc", + "uuid": "59329cb0-0742-43a0-93c6-95aa36f9bb65", "control-id": "cis_rhel10_5-3.2.4.4", "description": "In RHEL 10 pam_unix is enabled by default in all authselect profiles already with the\nuse_authtok option set. In any case, we don't have a rule to check this option specifically,\nlike in 5.3.2.3.3.", "props": [ @@ -22053,7 +22012,7 @@ ] }, { - "uuid": "de92633f-6976-4267-b537-1d9e9714701b", + "uuid": "98ae4f7f-fb4b-446b-8956-251072bae628", "control-id": "cis_rhel10_5-4.1.1", "description": "No notes for control-id 5.4.1.1.", "props": [ @@ -22075,7 +22034,7 @@ ] }, { - "uuid": "7c71dc15-cbd2-4b88-a197-c171272b039c", + "uuid": "e8a1fadf-0e14-4bd8-914c-7d63608771ab", "control-id": "cis_rhel10_5-4.1.3", "description": "No notes for control-id 5.4.1.3.", "props": [ @@ -22097,20 +22056,15 @@ ] }, { - "uuid": "a42c6352-b38f-4cab-aca6-995310e5224c", + "uuid": "e6038520-e5f0-454c-a9af-8d33a201077d", "control-id": "cis_rhel10_5-4.1.4", - "description": "There's a \"new\" set of options in /etc/login.defs file to define the number of iterations\nperformed during the hashing process.", + "description": "No notes for control-id 5.4.1.4.", "props": [ { "name": "implementation-status", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "implemented" }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_libuserconf" - }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", @@ -22119,7 +22073,7 @@ ] }, { - "uuid": "1d482823-0aee-46e9-a2e1-8406f90d6a5c", + "uuid": "0f8d3394-358b-4eb7-9172-2aa60058b550", "control-id": "cis_rhel10_5-4.1.5", "description": "No notes for control-id 5.4.1.5.", "props": [ @@ -22141,7 +22095,7 @@ ] }, { - "uuid": "a54f46d6-5021-49d0-84e4-f151695f6009", + "uuid": "dca57ad0-125b-4563-b471-ffb1722d6021", "control-id": "cis_rhel10_5-4.1.6", "description": "No notes for control-id 5.4.1.6.", "props": [ @@ -22158,7 +22112,7 @@ ] }, { - "uuid": "dbfa0276-d543-4ae1-b737-b68a96527af1", + "uuid": "9d494571-364d-46aa-a1ef-8a62df2245df", "control-id": "cis_rhel10_5-4.2.1", "description": "No notes for control-id 5.4.2.1.", "props": [ @@ -22175,7 +22129,7 @@ ] }, { - "uuid": "fbcb989e-c694-4e73-afa7-b62192ae20ff", + "uuid": "3733eddc-1ff0-4c60-b204-d7b2916473ee", "control-id": "cis_rhel10_5-4.2.2", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -22192,7 +22146,7 @@ ] }, { - "uuid": "5b1f4f50-52a1-493d-b782-26f696e45271", + "uuid": "1247677f-148f-4e44-8b9d-abcd191bcf39", "control-id": "cis_rhel10_5-4.2.3", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -22209,7 +22163,7 @@ ] }, { - "uuid": "c90c3eaf-cebb-4204-a064-f2ef92017a00", + "uuid": "570b2e95-5e19-4c38-a0ab-3a7a2aadb703", "control-id": "cis_rhel10_5-4.2.4", "description": "No notes for control-id 5.4.2.4.", "props": [ @@ -22226,7 +22180,7 @@ ] }, { - "uuid": "3c8e7ab9-ccc7-43aa-89f4-8c327b4777ad", + "uuid": "05af9b80-a5ed-4950-a211-61349966a6c4", "control-id": "cis_rhel10_5-4.2.5", "description": "No notes for control-id 5.4.2.5.", "props": [ @@ -22248,7 +22202,7 @@ ] }, { - "uuid": "5a212ba4-9182-44d5-a725-bd52b1d160cf", + "uuid": "3441dd13-abfb-4216-86cb-27ca2a452755", "control-id": "cis_rhel10_5-4.2.6", "description": "No notes for control-id 5.4.2.6.", "props": [ @@ -22265,7 +22219,7 @@ ] }, { - "uuid": "08c05480-4b18-41ae-8c27-b77f7d1f021e", + "uuid": "c1175a4b-bac4-4d88-92e3-a72467dd8ec6", "control-id": "cis_rhel10_5-4.2.7", "description": "No notes for control-id 5.4.2.7.", "props": [ @@ -22287,7 +22241,7 @@ ] }, { - "uuid": "6ca3d001-5761-432e-a573-3472b688e828", + "uuid": "93b596d5-1daf-41dc-99b4-e3f615345c89", "control-id": "cis_rhel10_5-4.2.8", "description": "No notes for control-id 5.4.2.8.", "props": [ @@ -22304,7 +22258,7 @@ ] }, { - "uuid": "280dd212-eb54-4310-b7e4-3aca5bd9ffa5", + "uuid": "9d3880bf-4c60-40e5-a65d-e879bee2352c", "control-id": "cis_rhel10_5-4.3.2", "description": "No notes for control-id 5.4.3.2.", "props": [ @@ -22321,7 +22275,7 @@ ] }, { - "uuid": "df9345b8-327d-4569-8ba2-8db20b8f90a2", + "uuid": "06e7bcb1-ab83-492a-af60-117e0055f68d", "control-id": "cis_rhel10_5-4.3.3", "description": "No notes for control-id 5.4.3.3.", "props": [ @@ -22348,7 +22302,7 @@ ] }, { - "uuid": "27653769-55d7-4bb6-8a84-35b1122aa35e", + "uuid": "58fff4a9-3c44-4beb-9cf2-e716e74a7ef1", "control-id": "cis_rhel10_6-1.1", "description": "No notes for control-id 6.1.1.", "props": [ @@ -22370,7 +22324,7 @@ ] }, { - "uuid": "e89026f9-589c-4d8a-8cb4-f50e1d9c578a", + "uuid": "25110447-5827-4d05-bcaa-ebca3840d053", "control-id": "cis_rhel10_6-1.2", "description": "No notes for control-id 6.1.2.", "props": [ @@ -22387,7 +22341,7 @@ ] }, { - "uuid": "28876aec-b1b9-4d7a-adac-2e0ca2131302", + "uuid": "7da46282-67a3-4952-8068-44eb8148a9db", "control-id": "cis_rhel10_6-1.3", "description": "No notes for control-id 6.1.3.", "props": [ @@ -22404,7 +22358,7 @@ ] }, { - "uuid": "857d9eae-2512-4251-be45-108f788621d8", + "uuid": "f045d8d2-46f6-4aeb-95da-e2e388cea474", "control-id": "cis_rhel10_6-2.1.1", "description": "No notes for control-id 6.2.1.1.", "props": [ @@ -22421,7 +22375,7 @@ ] }, { - "uuid": "667a5915-3953-4352-b4dc-26e317981517", + "uuid": "2a7ddde1-9387-406e-910f-c0201594d2db", "control-id": "cis_rhel10_6-2.1.2", "description": "The description for control-id cis_rhel10_6-2.1.2.", "props": [ @@ -22434,7 +22388,7 @@ ] }, { - "uuid": "397f8c49-db0e-4e4b-ae88-99020dae000a", + "uuid": "3ed23d4a-6e68-48ca-bf1c-98b5b4d16c18", "control-id": "cis_rhel10_6-2.1.3", "description": "The description for control-id cis_rhel10_6-2.1.3.", "props": [ @@ -22447,7 +22401,7 @@ ] }, { - "uuid": "e3f479a4-bfbf-4903-9a51-68db50d27a54", + "uuid": "78ed1ea0-d876-4685-8959-de86cd3d5058", "control-id": "cis_rhel10_6-2.1.4", "description": "No notes for control-id 6.2.1.4.", "props": [ @@ -22464,7 +22418,7 @@ ] }, { - "uuid": "7aa7ef61-c389-47b2-bde6-4d8bf5de5446", + "uuid": "8b8c994c-e101-4efc-b868-3699f90c9fed", "control-id": "cis_rhel10_6-2.2.1.1", "description": "No notes for control-id 6.2.2.1.1.", "props": [ @@ -22481,7 +22435,7 @@ ] }, { - "uuid": "e63cdbae-8853-4866-9ee3-94f12fe1b8d7", + "uuid": "7450357e-985a-446a-a70f-a9496c65da7e", "control-id": "cis_rhel10_6-2.2.1.2", "description": "The description for control-id cis_rhel10_6-2.2.1.2.", "props": [ @@ -22494,7 +22448,7 @@ ] }, { - "uuid": "541ca697-c33f-4475-9473-2c1aeec74945", + "uuid": "8c24ad3d-f130-4600-a01d-ae660b4877e7", "control-id": "cis_rhel10_6-2.2.1.3", "description": "No notes for control-id 6.2.2.1.3.", "props": [ @@ -22511,7 +22465,7 @@ ] }, { - "uuid": "ccc27a1f-856b-487b-9954-aa26a066ae21", + "uuid": "7561296f-62d7-463a-b9d0-a3e6dd2d920f", "control-id": "cis_rhel10_6-2.2.1.4", "description": "No notes for control-id 6.2.2.1.4.", "props": [ @@ -22528,7 +22482,7 @@ ] }, { - "uuid": "342d9d05-c0bb-4a89-aafe-5d5d1a119dd4", + "uuid": "8611fd35-6328-4e9a-b3c2-4e195ce36ba5", "control-id": "cis_rhel10_6-2.2.2", "description": "No notes for control-id 6.2.2.2.", "props": [ @@ -22545,7 +22499,7 @@ ] }, { - "uuid": "7f82d54b-45eb-46ac-b4a4-90fa23a3aeab", + "uuid": "9c08b4b8-e00f-4acf-bc40-233b01f8139c", "control-id": "cis_rhel10_6-2.2.3", "description": "No notes for control-id 6.2.2.3.", "props": [ @@ -22562,7 +22516,7 @@ ] }, { - "uuid": "87d213be-3c02-42f0-9861-141683b3a7fa", + "uuid": "85920911-979c-484e-80d1-0d33dbacf4b9", "control-id": "cis_rhel10_6-2.2.4", "description": "No notes for control-id 6.2.2.4.", "props": [ @@ -22579,7 +22533,7 @@ ] }, { - "uuid": "99f85b6b-4622-4f03-be28-b043effecef2", + "uuid": "7b5d58bb-5e53-4dd4-a321-4a10e98c615a", "control-id": "cis_rhel10_6-2.3.1", "description": "No notes for control-id 6.2.3.1.", "props": [ @@ -22591,7 +22545,7 @@ ] }, { - "uuid": "4c5c55dc-bd5b-4011-b791-bc9761ac9305", + "uuid": "3d2fb540-d202-48de-8640-a667aa10edb0", "control-id": "cis_rhel10_6-2.3.2", "description": "No notes for control-id 6.2.3.2.", "props": [ @@ -22603,7 +22557,7 @@ ] }, { - "uuid": "4db41c6b-4ced-43d7-ba7a-9f4d8477ff4e", + "uuid": "6813e080-1c80-48aa-b45f-d86a10a4069f", "control-id": "cis_rhel10_6-2.3.3", "description": "No notes for control-id 6.2.3.3.", "props": [ @@ -22615,7 +22569,7 @@ ] }, { - "uuid": "9831d5e4-00cb-44b5-8743-b3782c743cbe", + "uuid": "b0d68327-38a4-4b67-bef0-db490c174cde", "control-id": "cis_rhel10_6-2.3.4", "description": "No notes for control-id 6.2.3.4.", "props": [ @@ -22627,7 +22581,7 @@ ] }, { - "uuid": "14bd89c3-4d08-49cb-bffc-1ed703c4b3aa", + "uuid": "77c250cc-90d1-4cdd-8885-602e7603ae69", "control-id": "cis_rhel10_6-2.3.5", "description": "The description for control-id cis_rhel10_6-2.3.5.", "props": [ @@ -22640,7 +22594,7 @@ ] }, { - "uuid": "387eecd4-1a4f-4fc3-b92b-1ec915cdac46", + "uuid": "621f2874-76b9-45be-a485-0755050a994a", "control-id": "cis_rhel10_6-2.3.6", "description": "The description for control-id cis_rhel10_6-2.3.6.", "props": [ @@ -22653,7 +22607,7 @@ ] }, { - "uuid": "8b6e0b2b-1e7e-49bf-bd12-62be54fa2f28", + "uuid": "c64d3beb-e731-4464-8185-032465744279", "control-id": "cis_rhel10_6-2.3.7", "description": "No notes for control-id 6.2.3.7.", "props": [ @@ -22665,7 +22619,7 @@ ] }, { - "uuid": "742ca32c-4234-4bdd-8866-1a6b2813944e", + "uuid": "050bcfda-d819-4a8a-b298-3acceb00b21d", "control-id": "cis_rhel10_6-2.3.8", "description": "The description for control-id cis_rhel10_6-2.3.8.", "props": [ @@ -22678,7 +22632,7 @@ ] }, { - "uuid": "ee2c62bc-d963-4448-9544-86bf09fd3369", + "uuid": "3bcfa418-1fb0-4c6d-aad5-9a44263d12e8", "control-id": "cis_rhel10_6-2.4.1", "description": "It is not harmful to run these rules even if rsyslog is not installed or active.", "props": [ @@ -22705,7 +22659,7 @@ ] }, { - "uuid": "ed2bcfac-e582-462f-a958-96bd821620f9", + "uuid": "b12fb1f0-9530-4fa6-b0d8-358bac0c1ae6", "control-id": "cis_rhel10_7-1.1", "description": "No notes for control-id 7.1.1.", "props": [ @@ -22732,7 +22686,7 @@ ] }, { - "uuid": "9431b259-be8b-4416-b0f3-325a6f497a38", + "uuid": "27dbab49-9c47-4b85-82c8-a98b25256a7b", "control-id": "cis_rhel10_7-1.2", "description": "No notes for control-id 7.1.2.", "props": [ @@ -22759,7 +22713,7 @@ ] }, { - "uuid": "9bcd08ef-0429-4fbb-9dd0-19f6f1b8cfd0", + "uuid": "4f62d640-8322-47f3-8ba1-4b04a1fe11d7", "control-id": "cis_rhel10_7-1.3", "description": "No notes for control-id 7.1.3.", "props": [ @@ -22786,7 +22740,7 @@ ] }, { - "uuid": "95111c28-3a94-4d14-9323-ca6981a49e29", + "uuid": "6dfe267e-d51b-4b41-8873-b885cd596fad", "control-id": "cis_rhel10_7-1.4", "description": "No notes for control-id 7.1.4.", "props": [ @@ -22813,7 +22767,7 @@ ] }, { - "uuid": "3cad9e08-dd08-4fa5-84c0-3e8c58214bb6", + "uuid": "bacc080b-8629-4013-89c0-43a0c24835af", "control-id": "cis_rhel10_7-1.5", "description": "No notes for control-id 7.1.5.", "props": [ @@ -22840,7 +22794,7 @@ ] }, { - "uuid": "ff2ee8db-0bc7-4c13-af05-d3bbde386ef1", + "uuid": "8f901fce-c5d5-436c-b753-1fa47a3de6d0", "control-id": "cis_rhel10_7-1.6", "description": "No notes for control-id 7.1.6.", "props": [ @@ -22867,7 +22821,7 @@ ] }, { - "uuid": "92d302b5-7a76-413e-a4b5-36be67fb75ce", + "uuid": "a4727b62-679d-4333-b72e-d65ec42d57e1", "control-id": "cis_rhel10_7-1.7", "description": "No notes for control-id 7.1.7.", "props": [ @@ -22894,7 +22848,7 @@ ] }, { - "uuid": "ef4aa3a5-50b0-4c62-b3ee-91c5628ea76d", + "uuid": "8da1c1b9-8a15-480a-8d44-3a40520eb171", "control-id": "cis_rhel10_7-1.8", "description": "No notes for control-id 7.1.8.", "props": [ @@ -22921,7 +22875,7 @@ ] }, { - "uuid": "579a2a03-0e69-4c5d-8031-fde2c24e4f01", + "uuid": "04095bf9-0372-4451-9279-49670c404a78", "control-id": "cis_rhel10_7-1.9", "description": "No notes for control-id 7.1.9.", "props": [ @@ -22948,7 +22902,7 @@ ] }, { - "uuid": "bae54861-da1c-4088-9958-2300290619f5", + "uuid": "10a65c7d-a4f1-4afc-912a-0aee1a5b885b", "control-id": "cis_rhel10_7-1.10", "description": "No notes for control-id 7.1.10.", "props": [ @@ -22990,7 +22944,7 @@ ] }, { - "uuid": "6a4d2318-020b-43cd-b034-602923d25bd3", + "uuid": "737aa899-f156-4fff-9a5c-817350ce0f04", "control-id": "cis_rhel10_7-1.11", "description": "No notes for control-id 7.1.11.", "props": [ @@ -23012,7 +22966,7 @@ ] }, { - "uuid": "d211b6a5-c27c-423a-a75a-c35476ea417b", + "uuid": "67f9a6b3-04d1-499b-a1b0-5224e02504ec", "control-id": "cis_rhel10_7-1.12", "description": "No notes for control-id 7.1.12.", "props": [ @@ -23034,7 +22988,7 @@ ] }, { - "uuid": "80f5553d-56c0-4e78-874a-0580ca049293", + "uuid": "e492936a-f68a-4664-8f63-7cd814b47f56", "control-id": "cis_rhel10_7-1.13", "description": "The description for control-id cis_rhel10_7-1.13.", "props": [ @@ -23047,7 +23001,7 @@ ] }, { - "uuid": "ac8f03af-dfaf-47c5-8d0a-146d6946545b", + "uuid": "b290503a-facc-4954-b60b-226b45a2b7a0", "control-id": "cis_rhel10_7-2.1", "description": "No notes for control-id 7.2.1.", "props": [ @@ -23064,7 +23018,7 @@ ] }, { - "uuid": "19b7ff52-a2b3-4afd-bc68-2ed7a3d18383", + "uuid": "85b8c190-6acc-4600-9c1d-fe2b43c504dd", "control-id": "cis_rhel10_7-2.2", "description": "No notes for control-id 7.2.2.", "props": [ @@ -23081,7 +23035,7 @@ ] }, { - "uuid": "33c50e13-22a5-43c0-8c29-f402b78e24ac", + "uuid": "e5b9288f-f729-429d-8fe9-9fbe2bcf3f49", "control-id": "cis_rhel10_7-2.3", "description": "No notes for control-id 7.2.3.", "props": [ @@ -23098,7 +23052,7 @@ ] }, { - "uuid": "0c5408ef-f7c6-4310-accc-c8cfd8b398af", + "uuid": "fe66b159-bbef-4753-bab6-46f3447b29e9", "control-id": "cis_rhel10_7-2.4", "description": "No notes for control-id 7.2.4.", "props": [ @@ -23115,7 +23069,7 @@ ] }, { - "uuid": "5fa38e01-a792-421b-a9d8-f5b74ce4043d", + "uuid": "5e34d698-24ac-460b-b04c-f46b7ba67564", "control-id": "cis_rhel10_7-2.5", "description": "No notes for control-id 7.2.5.", "props": [ @@ -23132,7 +23086,7 @@ ] }, { - "uuid": "f0029bf1-7590-4f75-8977-4946d5654fa0", + "uuid": "fee15855-4e2f-4885-8422-ab4e4bac366e", "control-id": "cis_rhel10_7-2.6", "description": "No notes for control-id 7.2.6.", "props": [ @@ -23149,7 +23103,7 @@ ] }, { - "uuid": "8c737fbe-0bfc-4ea6-8f19-05096c3f9a07", + "uuid": "00aadea4-66db-463c-a870-6c2bb2f68d23", "control-id": "cis_rhel10_7-2.7", "description": "No notes for control-id 7.2.7.", "props": [ @@ -23166,7 +23120,7 @@ ] }, { - "uuid": "c44d014d-efe7-4b6c-94d4-210145cf88d9", + "uuid": "12f37979-ee29-4d9a-871a-78971c3c3a4c", "control-id": "cis_rhel10_7-2.8", "description": "No notes for control-id 7.2.8.", "props": [ @@ -23193,7 +23147,7 @@ ] }, { - "uuid": "0e064569-4716-4048-9374-6c5875522cac", + "uuid": "d1651952-3ac9-464c-bf63-1641ef69ce79", "control-id": "cis_rhel10_7-2.9", "description": "No notes for control-id 7.2.9.", "props": [ diff --git a/component-definitions/rhel10/rhel10-cis_rhel10-l2_server/component-definition.json b/component-definitions/rhel10/rhel10-cis_rhel10-l2_server/component-definition.json index 7d9e67f3..413c3b1e 100644 --- a/component-definitions/rhel10/rhel10-cis_rhel10-l2_server/component-definition.json +++ b/component-definitions/rhel10/rhel10-cis_rhel10-l2_server/component-definition.json @@ -3,8 +3,8 @@ "uuid": "6531a0d9-efde-405d-ba52-aab8178414c4", "metadata": { "title": "Component definition for rhel10", - "last-modified": "2025-12-17T09:48:04.486986+00:00", - "version": "4.8", + "last-modified": "2025-12-17T10:46:14.034708+00:00", + "version": "4.9", "oscal-version": "1.1.3" }, "components": [ @@ -887,7 +887,7 @@ { "name": "Parameter_Value_Alternatives_47", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -905,7 +905,7 @@ { "name": "Parameter_Value_Alternatives_48", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -4031,2431 +4031,2419 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_libuserconf", + "value": "set_password_hashing_algorithm_logindefs", "remarks": "rule_set_234" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Hashing Algorithm in /etc/libuser.conf", + "value": "Set Password Hashing Algorithm in /etc/login.defs", "remarks": "rule_set_234" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_logindefs", + "value": "account_disable_post_pw_expiration", "remarks": "rule_set_235" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Hashing Algorithm in /etc/login.defs", + "value": "Set Account Expiration Following Inactivity", "remarks": "rule_set_235" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "account_disable_post_pw_expiration", + "value": "accounts_set_post_pw_existing", "remarks": "rule_set_236" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Account Expiration Following Inactivity", + "value": "Set existing passwords a period of inactivity before they been locked", "remarks": "rule_set_236" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_set_post_pw_existing", + "value": "accounts_password_last_change_is_in_past", "remarks": "rule_set_237" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set existing passwords a period of inactivity before they been locked", + "value": "Ensure all users last password change date is in the past", "remarks": "rule_set_237" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_last_change_is_in_past", + "value": "accounts_no_uid_except_zero", "remarks": "rule_set_238" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure all users last password change date is in the past", + "value": "Verify Only Root Has UID 0", "remarks": "rule_set_238" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_no_uid_except_zero", + "value": "accounts_root_gid_zero", "remarks": "rule_set_239" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Only Root Has UID 0", + "value": "Verify Root Has A Primary GID 0", "remarks": "rule_set_239" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_root_gid_zero", + "value": "groups_no_zero_gid_except_root", "remarks": "rule_set_240" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Root Has A Primary GID 0", + "value": "Verify Only Group Root Has GID 0", "remarks": "rule_set_240" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "groups_no_zero_gid_except_root", + "value": "ensure_root_password_configured", "remarks": "rule_set_241" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Only Group Root Has GID 0", + "value": "Ensure Authentication Required for Single User Mode", "remarks": "rule_set_241" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_root_password_configured", + "value": "accounts_root_path_dirs_no_write", "remarks": "rule_set_242" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Authentication Required for Single User Mode", + "value": "Ensure that Root's Path Does Not Include World or Group-Writable Directories", "remarks": "rule_set_242" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_root_path_dirs_no_write", + "value": "root_path_no_dot", "remarks": "rule_set_243" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that Root's Path Does Not Include World or Group-Writable Directories", + "value": "Ensure that Root's Path Does Not Include Relative Paths or Null Directories", "remarks": "rule_set_243" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "root_path_no_dot", + "value": "accounts_umask_root", "remarks": "rule_set_244" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that Root's Path Does Not Include Relative Paths or Null Directories", + "value": "Ensure the Root Bash Umask is Set Correctly", "remarks": "rule_set_244" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_root", + "value": "no_password_auth_for_systemaccounts", "remarks": "rule_set_245" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Root Bash Umask is Set Correctly", + "value": "Ensure that System Accounts Are Locked", "remarks": "rule_set_245" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_password_auth_for_systemaccounts", + "value": "no_shelllogin_for_systemaccounts", "remarks": "rule_set_246" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that System Accounts Are Locked", + "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", "remarks": "rule_set_246" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_shelllogin_for_systemaccounts", + "value": "no_invalid_shell_accounts_unlocked", "remarks": "rule_set_247" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", + "value": "Verify Non-Interactive Accounts Are Locked", "remarks": "rule_set_247" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_invalid_shell_accounts_unlocked", + "value": "accounts_tmout", "remarks": "rule_set_248" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Non-Interactive Accounts Are Locked", + "value": "Set Interactive Session Timeout", "remarks": "rule_set_248" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_tmout", + "value": "accounts_umask_etc_bashrc", "remarks": "rule_set_249" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Interactive Session Timeout", + "value": "Ensure the Default Bash Umask is Set Correctly", "remarks": "rule_set_249" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_bashrc", + "value": "accounts_umask_etc_login_defs", "remarks": "rule_set_250" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Bash Umask is Set Correctly", + "value": "Ensure the Default Umask is Set Correctly in login.defs", "remarks": "rule_set_250" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_login_defs", + "value": "accounts_umask_etc_profile", "remarks": "rule_set_251" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Umask is Set Correctly in login.defs", + "value": "Ensure the Default Umask is Set Correctly in /etc/profile", "remarks": "rule_set_251" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_profile", + "value": "package_aide_installed", "remarks": "rule_set_252" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Umask is Set Correctly in /etc/profile", + "value": "Install AIDE", "remarks": "rule_set_252" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_aide_installed", + "value": "aide_build_database", "remarks": "rule_set_253" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install AIDE", + "value": "Build and Test AIDE Database", "remarks": "rule_set_253" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_build_database", + "value": "aide_periodic_cron_checking", "remarks": "rule_set_254" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Build and Test AIDE Database", + "value": "Configure Periodic Execution of AIDE", "remarks": "rule_set_254" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_periodic_cron_checking", + "value": "aide_check_audit_tools", "remarks": "rule_set_255" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Periodic Execution of AIDE", + "value": "Configure AIDE to Verify the Audit Tools", "remarks": "rule_set_255" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_check_audit_tools", + "value": "service_systemd-journald_enabled", "remarks": "rule_set_256" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure AIDE to Verify the Audit Tools", + "value": "Enable systemd-journald Service", "remarks": "rule_set_256" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_systemd-journald_enabled", + "value": "ensure_journald_and_rsyslog_not_active_together", "remarks": "rule_set_257" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable systemd-journald Service", + "value": "Ensure journald and rsyslog Are Not Active Together", "remarks": "rule_set_257" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_journald_and_rsyslog_not_active_together", + "value": "package_systemd-journal-remote_installed", "remarks": "rule_set_258" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald and rsyslog Are Not Active Together", + "value": "Install systemd-journal-remote Package", "remarks": "rule_set_258" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_systemd-journal-remote_installed", + "value": "service_systemd-journal-upload_enabled", "remarks": "rule_set_259" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install systemd-journal-remote Package", + "value": "Enable systemd-journal-upload Service", "remarks": "rule_set_259" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_systemd-journal-upload_enabled", + "value": "socket_systemd-journal-remote_disabled", "remarks": "rule_set_260" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable systemd-journal-upload Service", + "value": "Disable systemd-journal-remote Socket", "remarks": "rule_set_260" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "socket_systemd-journal-remote_disabled", + "value": "journald_disable_forward_to_syslog", "remarks": "rule_set_261" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable systemd-journal-remote Socket", + "value": "Ensure journald ForwardToSyslog is disabled", "remarks": "rule_set_261" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_disable_forward_to_syslog", + "value": "journald_compress", "remarks": "rule_set_262" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald ForwardToSyslog is disabled", + "value": "Ensure journald is configured to compress large log files", "remarks": "rule_set_262" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_compress", + "value": "journald_storage", "remarks": "rule_set_263" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald is configured to compress large log files", + "value": "Ensure journald is configured to write log files to persistent disk", "remarks": "rule_set_263" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_storage", + "value": "rsyslog_files_groupownership", "remarks": "rule_set_264" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald is configured to write log files to persistent disk", + "value": "Ensure Log Files Are Owned By Appropriate Group", "remarks": "rule_set_264" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_groupownership", + "value": "rsyslog_files_ownership", "remarks": "rule_set_265" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Log Files Are Owned By Appropriate Group", + "value": "Ensure Log Files Are Owned By Appropriate User", "remarks": "rule_set_265" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_ownership", + "value": "rsyslog_files_permissions", "remarks": "rule_set_266" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Log Files Are Owned By Appropriate User", + "value": "Ensure System Log Files Have Correct Permissions", "remarks": "rule_set_266" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_permissions", + "value": "file_groupowner_etc_passwd", "remarks": "rule_set_267" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure System Log Files Have Correct Permissions", + "value": "Verify Group Who Owns passwd File", "remarks": "rule_set_267" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_passwd", + "value": "file_owner_etc_passwd", "remarks": "rule_set_268" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns passwd File", + "value": "Verify User Who Owns passwd File", "remarks": "rule_set_268" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_passwd", + "value": "file_permissions_etc_passwd", "remarks": "rule_set_269" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns passwd File", + "value": "Verify Permissions on passwd File", "remarks": "rule_set_269" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_passwd", + "value": "file_groupowner_backup_etc_passwd", "remarks": "rule_set_270" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on passwd File", + "value": "Verify Group Who Owns Backup passwd File", "remarks": "rule_set_270" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_passwd", + "value": "file_owner_backup_etc_passwd", "remarks": "rule_set_271" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup passwd File", + "value": "Verify User Who Owns Backup passwd File", "remarks": "rule_set_271" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_passwd", + "value": "file_permissions_backup_etc_passwd", "remarks": "rule_set_272" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup passwd File", + "value": "Verify Permissions on Backup passwd File", "remarks": "rule_set_272" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_passwd", + "value": "file_groupowner_etc_group", "remarks": "rule_set_273" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup passwd File", + "value": "Verify Group Who Owns group File", "remarks": "rule_set_273" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_group", + "value": "file_owner_etc_group", "remarks": "rule_set_274" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns group File", + "value": "Verify User Who Owns group File", "remarks": "rule_set_274" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_group", + "value": "file_permissions_etc_group", "remarks": "rule_set_275" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns group File", + "value": "Verify Permissions on group File", "remarks": "rule_set_275" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_group", + "value": "file_groupowner_backup_etc_group", "remarks": "rule_set_276" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on group File", + "value": "Verify Group Who Owns Backup group File", "remarks": "rule_set_276" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_group", + "value": "file_owner_backup_etc_group", "remarks": "rule_set_277" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup group File", + "value": "Verify User Who Owns Backup group File", "remarks": "rule_set_277" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_group", + "value": "file_permissions_backup_etc_group", "remarks": "rule_set_278" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup group File", + "value": "Verify Permissions on Backup group File", "remarks": "rule_set_278" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_group", + "value": "file_owner_etc_shadow", "remarks": "rule_set_279" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup group File", + "value": "Verify User Who Owns shadow File", "remarks": "rule_set_279" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_shadow", + "value": "file_groupowner_etc_shadow", "remarks": "rule_set_280" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns shadow File", + "value": "Verify Group Who Owns shadow File", "remarks": "rule_set_280" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_shadow", + "value": "file_permissions_etc_shadow", "remarks": "rule_set_281" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns shadow File", + "value": "Verify Permissions on shadow File", "remarks": "rule_set_281" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_shadow", + "value": "file_groupowner_backup_etc_shadow", "remarks": "rule_set_282" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on shadow File", + "value": "Verify User Who Owns Backup shadow File", "remarks": "rule_set_282" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_shadow", + "value": "file_owner_backup_etc_shadow", "remarks": "rule_set_283" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup shadow File", + "value": "Verify Group Who Owns Backup shadow File", "remarks": "rule_set_283" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_shadow", + "value": "file_permissions_backup_etc_shadow", "remarks": "rule_set_284" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup shadow File", + "value": "Verify Permissions on Backup shadow File", "remarks": "rule_set_284" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_shadow", + "value": "file_groupowner_etc_gshadow", "remarks": "rule_set_285" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup shadow File", + "value": "Verify Group Who Owns gshadow File", "remarks": "rule_set_285" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_gshadow", + "value": "file_owner_etc_gshadow", "remarks": "rule_set_286" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns gshadow File", + "value": "Verify User Who Owns gshadow File", "remarks": "rule_set_286" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_gshadow", + "value": "file_permissions_etc_gshadow", "remarks": "rule_set_287" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns gshadow File", + "value": "Verify Permissions on gshadow File", "remarks": "rule_set_287" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_gshadow", + "value": "file_groupowner_backup_etc_gshadow", "remarks": "rule_set_288" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on gshadow File", + "value": "Verify Group Who Owns Backup gshadow File", "remarks": "rule_set_288" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_gshadow", + "value": "file_owner_backup_etc_gshadow", "remarks": "rule_set_289" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup gshadow File", + "value": "Verify User Who Owns Backup gshadow File", "remarks": "rule_set_289" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_gshadow", + "value": "file_permissions_backup_etc_gshadow", "remarks": "rule_set_290" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup gshadow File", + "value": "Verify Permissions on Backup gshadow File", "remarks": "rule_set_290" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_gshadow", + "value": "file_groupowner_etc_shells", "remarks": "rule_set_291" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup gshadow File", + "value": "Verify Group Who Owns /etc/shells File", "remarks": "rule_set_291" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_shells", + "value": "file_owner_etc_shells", "remarks": "rule_set_292" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns /etc/shells File", + "value": "Verify Who Owns /etc/shells File", "remarks": "rule_set_292" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_shells", + "value": "file_permissions_etc_shells", "remarks": "rule_set_293" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Who Owns /etc/shells File", + "value": "Verify Permissions on /etc/shells File", "remarks": "rule_set_293" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_shells", + "value": "file_groupowner_etc_security_opasswd", "remarks": "rule_set_294" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on /etc/shells File", + "value": "Verify Group Who Owns /etc/security/opasswd File", "remarks": "rule_set_294" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_security_opasswd", + "value": "file_owner_etc_security_opasswd", "remarks": "rule_set_295" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns /etc/security/opasswd File", + "value": "Verify User Who Owns /etc/security/opasswd File", "remarks": "rule_set_295" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_security_opasswd", + "value": "file_permissions_etc_security_opasswd", "remarks": "rule_set_296" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns /etc/security/opasswd File", + "value": "Verify Permissions on /etc/security/opasswd File", "remarks": "rule_set_296" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_security_opasswd", + "value": "file_groupowner_etc_security_opasswd_old", "remarks": "rule_set_297" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on /etc/security/opasswd File", + "value": "Verify Group Who Owns /etc/security/opasswd.old File", "remarks": "rule_set_297" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_security_opasswd_old", + "value": "file_owner_etc_security_opasswd_old", "remarks": "rule_set_298" }, - { - "name": "Rule_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_298" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_security_opasswd_old", - "remarks": "rule_set_299" - }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_299" + "remarks": "rule_set_298" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd_old", - "remarks": "rule_set_300" + "remarks": "rule_set_299" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd.old File", - "remarks": "rule_set_300" + "remarks": "rule_set_299" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_301" + "remarks": "rule_set_300" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_301" + "remarks": "rule_set_300" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_302" + "remarks": "rule_set_301" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_302" + "remarks": "rule_set_301" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_unowned_by_user", - "remarks": "rule_set_303" + "remarks": "rule_set_302" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a User", - "remarks": "rule_set_303" + "remarks": "rule_set_302" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_ungroupowned", - "remarks": "rule_set_304" + "remarks": "rule_set_303" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a Group", - "remarks": "rule_set_304" + "remarks": "rule_set_303" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_all_shadowed", - "remarks": "rule_set_305" + "remarks": "rule_set_304" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify All Account Password Hashes are Shadowed", - "remarks": "rule_set_305" + "remarks": "rule_set_304" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords_etc_shadow", - "remarks": "rule_set_306" + "remarks": "rule_set_305" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure There Are No Accounts With Blank or Null Passwords", - "remarks": "rule_set_306" + "remarks": "rule_set_305" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gid_passwd_group_same", - "remarks": "rule_set_307" + "remarks": "rule_set_306" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", - "remarks": "rule_set_307" + "remarks": "rule_set_306" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_id", - "remarks": "rule_set_308" + "remarks": "rule_set_307" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique User IDs", - "remarks": "rule_set_308" + "remarks": "rule_set_307" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_id", - "remarks": "rule_set_309" + "remarks": "rule_set_308" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group ID", - "remarks": "rule_set_309" + "remarks": "rule_set_308" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_name", - "remarks": "rule_set_310" + "remarks": "rule_set_309" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique Names", - "remarks": "rule_set_310" + "remarks": "rule_set_309" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_name", - "remarks": "rule_set_311" + "remarks": "rule_set_310" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group Names", - "remarks": "rule_set_311" + "remarks": "rule_set_310" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_interactive_home_directory_exists", - "remarks": "rule_set_312" + "remarks": "rule_set_311" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive Users Home Directories Must Exist", - "remarks": "rule_set_312" + "remarks": "rule_set_311" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_home_directories", - "remarks": "rule_set_313" + "remarks": "rule_set_312" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Be Owned By The Primary User", - "remarks": "rule_set_313" + "remarks": "rule_set_312" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_home_directories", - "remarks": "rule_set_314" + "remarks": "rule_set_313" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", - "remarks": "rule_set_314" + "remarks": "rule_set_313" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_315" + "remarks": "rule_set_314" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_315" + "remarks": "rule_set_314" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_316" + "remarks": "rule_set_315" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_316" + "remarks": "rule_set_315" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_no_world_writable_programs", - "remarks": "rule_set_317" + "remarks": "rule_set_316" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Not Run World-Writable Programs", - "remarks": "rule_set_317" + "remarks": "rule_set_316" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_318" + "remarks": "rule_set_317" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_318" + "remarks": "rule_set_317" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_forward_files", - "remarks": "rule_set_319" + "remarks": "rule_set_318" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .forward Files Exist", - "remarks": "rule_set_319" + "remarks": "rule_set_318" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_netrc_files", - "remarks": "rule_set_320" + "remarks": "rule_set_319" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No netrc Files Exist", - "remarks": "rule_set_320" + "remarks": "rule_set_319" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rhost_files", - "remarks": "rule_set_321" + "remarks": "rule_set_320" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .rhost Files Exist", - "remarks": "rule_set_321" + "remarks": "rule_set_320" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_bash_history", - "remarks": "rule_set_322" + "remarks": "rule_set_321" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure User Bash History File Has Correct Permissions", - "remarks": "rule_set_322" + "remarks": "rule_set_321" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_overlayfs_disabled", - "remarks": "rule_set_323" + "remarks": "rule_set_322" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure overlayfs kernel module is not available", - "remarks": "rule_set_323" + "remarks": "rule_set_322" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_squashfs_disabled", - "remarks": "rule_set_324" + "remarks": "rule_set_323" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Mounting of squashfs", - "remarks": "rule_set_324" + "remarks": "rule_set_323" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_udf_disabled", - "remarks": "rule_set_325" + "remarks": "rule_set_324" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Mounting of udf", - "remarks": "rule_set_325" + "remarks": "rule_set_324" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_home", - "remarks": "rule_set_326" + "remarks": "rule_set_325" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /home Located On Separate Partition", - "remarks": "rule_set_326" + "remarks": "rule_set_325" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var", - "remarks": "rule_set_327" + "remarks": "rule_set_326" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var Located On Separate Partition", - "remarks": "rule_set_327" + "remarks": "rule_set_326" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_tmp", - "remarks": "rule_set_328" + "remarks": "rule_set_327" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/tmp Located On Separate Partition", - "remarks": "rule_set_328" + "remarks": "rule_set_327" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log", - "remarks": "rule_set_329" + "remarks": "rule_set_328" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log Located On Separate Partition", - "remarks": "rule_set_329" + "remarks": "rule_set_328" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log_audit", - "remarks": "rule_set_330" + "remarks": "rule_set_329" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log/audit Located On Separate Partition", - "remarks": "rule_set_330" + "remarks": "rule_set_329" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_weak_deps", - "remarks": "rule_set_331" + "remarks": "rule_set_330" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Installation of Weak Dependencies in DNF", - "remarks": "rule_set_331" + "remarks": "rule_set_330" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_state", - "remarks": "rule_set_332" + "remarks": "rule_set_331" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SELinux State is Enforcing", - "remarks": "rule_set_332" + "remarks": "rule_set_331" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_symlinks", - "remarks": "rule_set_333" + "remarks": "rule_set_332" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", - "remarks": "rule_set_333" + "remarks": "rule_set_332" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "xwayland_disabled", - "remarks": "rule_set_334" + "remarks": "rule_set_333" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable XWayland", - "remarks": "rule_set_334" + "remarks": "rule_set_333" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_cockpit_disabled", - "remarks": "rule_set_335" + "remarks": "rule_set_334" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Cockpit Management Server", - "remarks": "rule_set_335" + "remarks": "rule_set_334" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_gdm_removed", - "remarks": "rule_set_336" + "remarks": "rule_set_335" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove the GDM Package Group", - "remarks": "rule_set_336" + "remarks": "rule_set_335" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_xorg-x11-server-Xwayland_removed", - "remarks": "rule_set_337" + "remarks": "rule_set_336" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove the X Windows Xwayland Package", - "remarks": "rule_set_337" + "remarks": "rule_set_336" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_openldap-clients_removed", - "remarks": "rule_set_338" + "remarks": "rule_set_337" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure LDAP client is not installed", - "remarks": "rule_set_338" + "remarks": "rule_set_337" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_ip_forward", - "remarks": "rule_set_339" + "remarks": "rule_set_338" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IP Forwarding on IPv4 Interfaces", - "remarks": "rule_set_339" + "remarks": "rule_set_338" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_forwarding", - "remarks": "rule_set_340" + "remarks": "rule_set_339" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Forwarding", - "remarks": "rule_set_340" + "remarks": "rule_set_339" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_gssapi_auth", - "remarks": "rule_set_341" + "remarks": "rule_set_340" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GSSAPI Authentication", - "remarks": "rule_set_341" + "remarks": "rule_set_340" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_nopasswd", - "remarks": "rule_set_342" + "remarks": "rule_set_341" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD", - "remarks": "rule_set_342" + "remarks": "rule_set_341" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny_root", - "remarks": "rule_set_343" + "remarks": "rule_set_342" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the root Account for Failed Password Attempts", - "remarks": "rule_set_343" + "remarks": "rule_set_342" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_minimum_age_login_defs", - "remarks": "rule_set_344" + "remarks": "rule_set_343" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Minimum Age", - "remarks": "rule_set_344" + "remarks": "rule_set_343" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_min_life_existing", - "remarks": "rule_set_345" + "remarks": "rule_set_344" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Minimum Age", - "remarks": "rule_set_345" + "remarks": "rule_set_344" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_nologin_in_shells", - "remarks": "rule_set_346" + "remarks": "rule_set_345" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure nologin Shell is Not Listed in /etc/shells", - "remarks": "rule_set_346" + "remarks": "rule_set_345" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit_installed", - "remarks": "rule_set_347" + "remarks": "rule_set_346" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit Subsystem is Installed", - "remarks": "rule_set_347" + "remarks": "rule_set_346" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit-libs_installed", - "remarks": "rule_set_348" + "remarks": "rule_set_347" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit-libs package as a part of audit Subsystem is Installed", - "remarks": "rule_set_348" + "remarks": "rule_set_347" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_argument", - "remarks": "rule_set_349" + "remarks": "rule_set_348" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Auditing for Processes Which Start Prior to the Audit Daemon", - "remarks": "rule_set_349" + "remarks": "rule_set_348" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_backlog_limit_argument", - "remarks": "rule_set_350" + "remarks": "rule_set_349" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Extend Audit Backlog Limit for the Audit Daemon", - "remarks": "rule_set_350" + "remarks": "rule_set_349" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_auditd_enabled", - "remarks": "rule_set_351" + "remarks": "rule_set_350" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable auditd Service", - "remarks": "rule_set_351" + "remarks": "rule_set_350" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_max_log_file", - "remarks": "rule_set_352" + "remarks": "rule_set_351" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Max Log File Size", - "remarks": "rule_set_352" + "remarks": "rule_set_351" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_max_log_file_action", - "remarks": "rule_set_353" + "remarks": "rule_set_352" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd max_log_file_action Upon Reaching Maximum Log Size", - "remarks": "rule_set_353" + "remarks": "rule_set_352" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_disk_error_action", - "remarks": "rule_set_354" + "remarks": "rule_set_353" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Disk Error Action on Disk Error", - "remarks": "rule_set_354" + "remarks": "rule_set_353" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_disk_full_action", - "remarks": "rule_set_355" + "remarks": "rule_set_354" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Disk Full Action when Disk Space Is Full", - "remarks": "rule_set_355" + "remarks": "rule_set_354" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_admin_space_left_action", - "remarks": "rule_set_356" + "remarks": "rule_set_355" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd admin_space_left Action on Low Disk Space", - "remarks": "rule_set_356" + "remarks": "rule_set_355" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_space_left_action", - "remarks": "rule_set_357" + "remarks": "rule_set_356" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd space_left Action on Low Disk Space", - "remarks": "rule_set_357" + "remarks": "rule_set_356" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_sysadmin_actions", - "remarks": "rule_set_358" + "remarks": "rule_set_357" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects System Administrator Actions", - "remarks": "rule_set_358" + "remarks": "rule_set_357" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_suid_auid_privilege_function", - "remarks": "rule_set_359" + "remarks": "rule_set_358" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events When Executables Are Run As Another User", - "remarks": "rule_set_359" + "remarks": "rule_set_358" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_sudo_log_events", - "remarks": "rule_set_360" + "remarks": "rule_set_359" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to perform maintenance activities", - "remarks": "rule_set_360" + "remarks": "rule_set_359" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_adjtimex", - "remarks": "rule_set_361" + "remarks": "rule_set_360" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through adjtimex", - "remarks": "rule_set_361" + "remarks": "rule_set_360" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_settimeofday", - "remarks": "rule_set_362" + "remarks": "rule_set_361" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through settimeofday", - "remarks": "rule_set_362" + "remarks": "rule_set_361" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_clock_settime", - "remarks": "rule_set_363" + "remarks": "rule_set_362" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through clock_settime", - "remarks": "rule_set_363" + "remarks": "rule_set_362" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_watch_localtime", - "remarks": "rule_set_364" + "remarks": "rule_set_363" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter the localtime File", - "remarks": "rule_set_364" + "remarks": "rule_set_363" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_setdomainname", - "remarks": "rule_set_365" + "remarks": "rule_set_364" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - setdomainname", - "remarks": "rule_set_365" + "remarks": "rule_set_364" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_sethostname", - "remarks": "rule_set_366" + "remarks": "rule_set_365" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - sethostname", - "remarks": "rule_set_366" + "remarks": "rule_set_365" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_issue", - "remarks": "rule_set_367" + "remarks": "rule_set_366" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/issue", - "remarks": "rule_set_367" + "remarks": "rule_set_366" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_issue_net", - "remarks": "rule_set_368" + "remarks": "rule_set_367" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/issue.net", - "remarks": "rule_set_368" + "remarks": "rule_set_367" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_hosts", - "remarks": "rule_set_369" + "remarks": "rule_set_368" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/hosts", - "remarks": "rule_set_369" + "remarks": "rule_set_368" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_hostname_file", - "remarks": "rule_set_370" + "remarks": "rule_set_369" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/hostname", - "remarks": "rule_set_370" + "remarks": "rule_set_369" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_sysconfig_network", - "remarks": "rule_set_371" + "remarks": "rule_set_370" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/sysconfig/network", - "remarks": "rule_set_371" + "remarks": "rule_set_370" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_networkmanager_system_connections", - "remarks": "rule_set_372" + "remarks": "rule_set_371" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/system-connections/", - "remarks": "rule_set_372" + "remarks": "rule_set_371" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_networkmanager", - "remarks": "rule_set_373" + "remarks": "rule_set_372" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/", - "remarks": "rule_set_373" + "remarks": "rule_set_372" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands", - "remarks": "rule_set_374" + "remarks": "rule_set_373" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands", - "remarks": "rule_set_374" + "remarks": "rule_set_373" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_creat", - "remarks": "rule_set_375" + "remarks": "rule_set_374" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - creat", - "remarks": "rule_set_375" + "remarks": "rule_set_374" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_ftruncate", - "remarks": "rule_set_376" + "remarks": "rule_set_375" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - ftruncate", - "remarks": "rule_set_376" + "remarks": "rule_set_375" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_open", - "remarks": "rule_set_377" + "remarks": "rule_set_376" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - open", - "remarks": "rule_set_377" + "remarks": "rule_set_376" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_openat", - "remarks": "rule_set_378" + "remarks": "rule_set_377" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - openat", - "remarks": "rule_set_378" + "remarks": "rule_set_377" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_truncate", - "remarks": "rule_set_379" + "remarks": "rule_set_378" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - truncate", - "remarks": "rule_set_379" + "remarks": "rule_set_378" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_group", - "remarks": "rule_set_380" + "remarks": "rule_set_379" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/group", - "remarks": "rule_set_380" + "remarks": "rule_set_379" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_passwd", - "remarks": "rule_set_381" + "remarks": "rule_set_380" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/passwd", - "remarks": "rule_set_381" + "remarks": "rule_set_380" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_gshadow", - "remarks": "rule_set_382" + "remarks": "rule_set_381" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/gshadow", - "remarks": "rule_set_382" + "remarks": "rule_set_381" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_shadow", - "remarks": "rule_set_383" + "remarks": "rule_set_382" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/shadow", - "remarks": "rule_set_383" + "remarks": "rule_set_382" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_opasswd", - "remarks": "rule_set_384" + "remarks": "rule_set_383" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", - "remarks": "rule_set_384" + "remarks": "rule_set_383" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_nsswitch_conf", - "remarks": "rule_set_385" + "remarks": "rule_set_384" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/nsswitch.conf", - "remarks": "rule_set_385" + "remarks": "rule_set_384" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_pam_conf", - "remarks": "rule_set_386" + "remarks": "rule_set_385" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/pam.conf", - "remarks": "rule_set_386" + "remarks": "rule_set_385" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_pamd", - "remarks": "rule_set_387" + "remarks": "rule_set_386" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/pam.d/", - "remarks": "rule_set_387" + "remarks": "rule_set_386" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chmod", - "remarks": "rule_set_388" + "remarks": "rule_set_387" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", - "remarks": "rule_set_388" + "remarks": "rule_set_387" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmod", - "remarks": "rule_set_389" + "remarks": "rule_set_388" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmod", - "remarks": "rule_set_389" + "remarks": "rule_set_388" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat", - "remarks": "rule_set_390" + "remarks": "rule_set_389" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat", - "remarks": "rule_set_390" + "remarks": "rule_set_389" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat2", - "remarks": "rule_set_391" + "remarks": "rule_set_390" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat2", - "remarks": "rule_set_391" + "remarks": "rule_set_390" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chown", - "remarks": "rule_set_392" + "remarks": "rule_set_391" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chown", - "remarks": "rule_set_392" + "remarks": "rule_set_391" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchown", - "remarks": "rule_set_393" + "remarks": "rule_set_392" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchown", - "remarks": "rule_set_393" + "remarks": "rule_set_392" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchownat", - "remarks": "rule_set_394" + "remarks": "rule_set_393" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchownat", - "remarks": "rule_set_394" + "remarks": "rule_set_393" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lchown", - "remarks": "rule_set_395" + "remarks": "rule_set_394" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lchown", - "remarks": "rule_set_395" + "remarks": "rule_set_394" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fremovexattr", - "remarks": "rule_set_396" + "remarks": "rule_set_395" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fremovexattr", - "remarks": "rule_set_396" + "remarks": "rule_set_395" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fsetxattr", - "remarks": "rule_set_397" + "remarks": "rule_set_396" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fsetxattr", - "remarks": "rule_set_397" + "remarks": "rule_set_396" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lremovexattr", - "remarks": "rule_set_398" + "remarks": "rule_set_397" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lremovexattr", - "remarks": "rule_set_398" + "remarks": "rule_set_397" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lsetxattr", - "remarks": "rule_set_399" + "remarks": "rule_set_398" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lsetxattr", - "remarks": "rule_set_399" + "remarks": "rule_set_398" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_removexattr", - "remarks": "rule_set_400" + "remarks": "rule_set_399" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - removexattr", - "remarks": "rule_set_400" + "remarks": "rule_set_399" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_setxattr", - "remarks": "rule_set_401" + "remarks": "rule_set_400" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - setxattr", - "remarks": "rule_set_401" + "remarks": "rule_set_400" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_media_export", - "remarks": "rule_set_402" + "remarks": "rule_set_401" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Exporting to Media (successful)", - "remarks": "rule_set_402" + "remarks": "rule_set_401" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_utmp", - "remarks": "rule_set_403" + "remarks": "rule_set_402" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information utmp", - "remarks": "rule_set_403" + "remarks": "rule_set_402" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_btmp", - "remarks": "rule_set_404" + "remarks": "rule_set_403" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information btmp", - "remarks": "rule_set_404" + "remarks": "rule_set_403" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_wtmp", - "remarks": "rule_set_405" + "remarks": "rule_set_404" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", - "remarks": "rule_set_405" + "remarks": "rule_set_404" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_faillock", - "remarks": "rule_set_406" + "remarks": "rule_set_405" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - faillock", - "remarks": "rule_set_406" + "remarks": "rule_set_405" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_lastlog", - "remarks": "rule_set_407" + "remarks": "rule_set_406" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - lastlog", - "remarks": "rule_set_407" + "remarks": "rule_set_406" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlink", - "remarks": "rule_set_408" + "remarks": "rule_set_407" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlink", - "remarks": "rule_set_408" + "remarks": "rule_set_407" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlinkat", - "remarks": "rule_set_409" + "remarks": "rule_set_408" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlinkat", - "remarks": "rule_set_409" + "remarks": "rule_set_408" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rename", - "remarks": "rule_set_410" + "remarks": "rule_set_409" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rename", - "remarks": "rule_set_410" + "remarks": "rule_set_409" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat", - "remarks": "rule_set_411" + "remarks": "rule_set_410" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat", - "remarks": "rule_set_411" + "remarks": "rule_set_410" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat2", - "remarks": "rule_set_412" + "remarks": "rule_set_411" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat2", - "remarks": "rule_set_412" + "remarks": "rule_set_411" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_etc_selinux", - "remarks": "rule_set_413" + "remarks": "rule_set_412" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls (/etc/selinux)", - "remarks": "rule_set_413" + "remarks": "rule_set_412" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_usr_share", - "remarks": "rule_set_414" + "remarks": "rule_set_413" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls in usr/share", - "remarks": "rule_set_414" + "remarks": "rule_set_413" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chcon", - "remarks": "rule_set_415" + "remarks": "rule_set_414" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chcon", - "remarks": "rule_set_415" + "remarks": "rule_set_414" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_setfacl", - "remarks": "rule_set_416" + "remarks": "rule_set_415" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run setfacl", - "remarks": "rule_set_416" + "remarks": "rule_set_415" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chacl", - "remarks": "rule_set_417" + "remarks": "rule_set_416" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chacl", - "remarks": "rule_set_417" + "remarks": "rule_set_416" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_usermod", - "remarks": "rule_set_418" + "remarks": "rule_set_417" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - usermod", - "remarks": "rule_set_418" + "remarks": "rule_set_417" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_kmod", - "remarks": "rule_set_419" + "remarks": "rule_set_418" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - kmod", - "remarks": "rule_set_419" + "remarks": "rule_set_418" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_init", - "remarks": "rule_set_420" + "remarks": "rule_set_419" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading - init_module", - "remarks": "rule_set_420" + "remarks": "rule_set_419" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_finit", - "remarks": "rule_set_421" + "remarks": "rule_set_420" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - finit_module", - "remarks": "rule_set_421" + "remarks": "rule_set_420" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_delete", - "remarks": "rule_set_422" + "remarks": "rule_set_421" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Unloading - delete_module", - "remarks": "rule_set_422" + "remarks": "rule_set_421" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_query", - "remarks": "rule_set_423" + "remarks": "rule_set_422" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - query_module", - "remarks": "rule_set_423" + "remarks": "rule_set_422" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_continue_loading", - "remarks": "rule_set_424" + "remarks": "rule_set_423" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Audit Configuration is Loaded Regardless of Errors", - "remarks": "rule_set_424" + "remarks": "rule_set_423" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_immutable", - "remarks": "rule_set_425" + "remarks": "rule_set_424" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Make the auditd Configuration Immutable", - "remarks": "rule_set_425" + "remarks": "rule_set_424" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_var_log_audit", - "remarks": "rule_set_426" + "remarks": "rule_set_425" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0750 or Less Permissive", - "remarks": "rule_set_426" + "remarks": "rule_set_425" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_var_log_audit", - "remarks": "rule_set_427" + "remarks": "rule_set_426" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0640 or Less Permissive", - "remarks": "rule_set_427" + "remarks": "rule_set_426" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_var_log_audit_stig", - "remarks": "rule_set_428" + "remarks": "rule_set_427" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Owned By Root", - "remarks": "rule_set_428" + "remarks": "rule_set_427" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_group_ownership_var_log_audit", - "remarks": "rule_set_429" + "remarks": "rule_set_428" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Group Owned By Root", - "remarks": "rule_set_429" + "remarks": "rule_set_428" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_audit_configuration", - "remarks": "rule_set_430" + "remarks": "rule_set_429" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Permissions are 640 or More Restrictive", - "remarks": "rule_set_430" + "remarks": "rule_set_429" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_audit_configuration", - "remarks": "rule_set_431" + "remarks": "rule_set_430" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Must Be Owned By Root", - "remarks": "rule_set_431" + "remarks": "rule_set_430" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_audit_configuration", - "remarks": "rule_set_432" + "remarks": "rule_set_431" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Must Be Owned By Group root", - "remarks": "rule_set_432" + "remarks": "rule_set_431" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_audit_binaries", - "remarks": "rule_set_433" + "remarks": "rule_set_432" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools Have Mode 0755 or less", - "remarks": "rule_set_433" + "remarks": "rule_set_432" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_audit_binaries", - "remarks": "rule_set_434" + "remarks": "rule_set_433" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools are owned by root", - "remarks": "rule_set_434" + "remarks": "rule_set_433" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_audit_binaries", - "remarks": "rule_set_435" + "remarks": "rule_set_434" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools are owned by group root", - "remarks": "rule_set_435" + "remarks": "rule_set_434" } ], "control-implementations": [ { - "uuid": "5dc80808-3787-4762-b690-c04ffe527ae3", + "uuid": "776886cb-25e9-4e6f-8a0a-e7418bf4acac", "source": "trestle://profiles/rhel10-cis_rhel10-l2_server/profile.json", "description": "Control implementation for cis", "props": [ @@ -6751,13 +6739,13 @@ { "param-id": "var_password_hashing_algorithm", "values": [ - "yescrypt" + "cis_rhel10" ] }, { "param-id": "var_password_hashing_algorithm_pam", "values": [ - "yescrypt" + "cis_rhel10" ] }, { @@ -6871,7 +6859,7 @@ ], "implemented-requirements": [ { - "uuid": "6ebf6bb8-9cf2-486d-b311-ffaf0ca66bb3", + "uuid": "7bd9e7a8-a0ea-4c8f-ae5d-bd0ce9a6a9d2", "control-id": "cis_rhel10_1-1.1.6", "description": "No notes for control-id 1.1.1.6.", "props": [ @@ -6888,7 +6876,7 @@ ] }, { - "uuid": "5e031e2a-d4f5-48eb-bbaa-b482b7adce29", + "uuid": "c4f3dbbc-576d-47c2-a4b9-b07959290c1f", "control-id": "cis_rhel10_1-1.1.7", "description": "No notes for control-id 1.1.1.7.", "props": [ @@ -6905,7 +6893,7 @@ ] }, { - "uuid": "99e6c657-0712-47f6-86dd-68a7a81654e7", + "uuid": "443b8869-a3f8-40b4-9aa7-3d4dfb351e3e", "control-id": "cis_rhel10_1-1.1.8", "description": "No notes for control-id 1.1.1.8.", "props": [ @@ -6922,7 +6910,7 @@ ] }, { - "uuid": "fc37dc3c-1912-4b0f-83f2-d361f5b0f9de", + "uuid": "a7cd7ff1-942a-405d-975a-62d5155f7117", "control-id": "cis_rhel10_1-1.2.3.1", "description": "No notes for control-id 1.1.2.3.1.", "props": [ @@ -6939,7 +6927,7 @@ ] }, { - "uuid": "c7373377-9cf4-4b78-b3e1-34901d047ed9", + "uuid": "f028f50d-504f-4d37-a64a-b1ee938b3993", "control-id": "cis_rhel10_1-1.2.4.1", "description": "No notes for control-id 1.1.2.4.1.", "props": [ @@ -6956,7 +6944,7 @@ ] }, { - "uuid": "799a3be7-42cd-4709-bb7d-f7d9ec5800f1", + "uuid": "26081c57-de30-4ecd-a0d1-19249159560c", "control-id": "cis_rhel10_1-1.2.5.1", "description": "No notes for control-id 1.1.2.5.1.", "props": [ @@ -6973,7 +6961,7 @@ ] }, { - "uuid": "a0f2b6f6-5f24-4e7e-af2d-29b133da59c6", + "uuid": "09868660-d082-479e-a451-37fe958ba10a", "control-id": "cis_rhel10_1-1.2.6.1", "description": "No notes for control-id 1.1.2.6.1.", "props": [ @@ -6990,7 +6978,7 @@ ] }, { - "uuid": "2ba4eee8-72ae-4313-9987-2aef9e34ba0b", + "uuid": "3db24e49-035f-4e32-9768-348e296bbeae", "control-id": "cis_rhel10_1-1.2.7.1", "description": "No notes for control-id 1.1.2.7.1.", "props": [ @@ -7007,7 +6995,7 @@ ] }, { - "uuid": "2246b80c-1ace-4536-8c81-a93d1fce45d1", + "uuid": "8b5838f5-241c-4dd5-82df-c0635cbf1918", "control-id": "cis_rhel10_1-2.1.3", "description": "The description for control-id cis_rhel10_1-2.1.3.", "props": [ @@ -7020,7 +7008,7 @@ ] }, { - "uuid": "6df4ec60-e8d6-4fe5-93e6-88a1a6324cb5", + "uuid": "70fe7141-4312-465f-8bf7-22845e3dd2cc", "control-id": "cis_rhel10_1-2.1.5", "description": "No notes for control-id 1.2.1.5.", "props": [ @@ -7037,7 +7025,7 @@ ] }, { - "uuid": "9e393661-085a-4845-a836-e56561cbd221", + "uuid": "f8b75abf-768f-4aef-b0ee-8edacde771d7", "control-id": "cis_rhel10_1-3.1.5", "description": "No notes for control-id 1.3.1.5.", "props": [ @@ -7054,7 +7042,7 @@ ] }, { - "uuid": "a02b435a-3411-490f-8789-d598f7022eb3", + "uuid": "d50432d7-48d2-425a-a772-e9378e579938", "control-id": "cis_rhel10_1-3.1.6", "description": "The description for control-id cis_rhel10_1-3.1.6.", "props": [ @@ -7067,7 +7055,7 @@ ] }, { - "uuid": "486866ea-bf8c-4372-a3c7-b99fc375ed41", + "uuid": "b44f1d4a-6873-4c08-b880-dee247742d3a", "control-id": "cis_rhel10_1-5.3", "description": "No notes for control-id 1.5.3.", "props": [ @@ -7084,7 +7072,7 @@ ] }, { - "uuid": "d703d1c3-ec46-439e-85d2-11a88a66193e", + "uuid": "99b95b18-9ae7-4fbb-9edd-d3d76b1d0b73", "control-id": "cis_rhel10_1-8.6", "description": "No notes for control-id 1.8.6.", "props": [ @@ -7101,7 +7089,7 @@ ] }, { - "uuid": "e689e827-602b-4e9d-b312-87450d9cfcd7", + "uuid": "4facf7bf-cb20-422f-a939-608417396a1d", "control-id": "cis_rhel10_2-1.3", "description": "No notes for control-id 2.1.3.", "props": [ @@ -7118,7 +7106,7 @@ ] }, { - "uuid": "cb70603d-9160-436e-bf36-62177c96ab63", + "uuid": "9f8db744-4cba-404c-b7fc-31d7bc6f98cf", "control-id": "cis_rhel10_2-1.19", "description": "No notes for control-id 2.1.19.", "props": [ @@ -7135,7 +7123,7 @@ ] }, { - "uuid": "ea1302d0-6160-48e4-bf4a-4d9e4847c640", + "uuid": "a57333ce-15e6-4e29-a462-8fed0a08e68b", "control-id": "cis_rhel10_2-1.20", "description": "No notes for control-id 2.1.20.", "props": [ @@ -7152,7 +7140,7 @@ ] }, { - "uuid": "64757f84-53d6-4cf4-9afe-4883d844cff8", + "uuid": "c3214cce-fb8c-4786-b70a-639c4f699655", "control-id": "cis_rhel10_2-2.2", "description": "No notes for control-id 2.2.2.", "props": [ @@ -7169,7 +7157,7 @@ ] }, { - "uuid": "109412d1-bfdc-437a-b00d-347e23decaa8", + "uuid": "941db62c-01e0-4603-8123-5b7d1b83bbf6", "control-id": "cis_rhel10_3-3.1.1", "description": "No notes for control-id 3.3.1.1.", "props": [ @@ -7186,7 +7174,7 @@ ] }, { - "uuid": "ece57cde-bee1-4e91-92e8-46ef9bc145d1", + "uuid": "d22d0804-a2cd-4472-922f-be21e9b8bb32", "control-id": "cis_rhel10_5-1.8", "description": "No notes for control-id 5.1.8.", "props": [ @@ -7203,7 +7191,7 @@ ] }, { - "uuid": "a3651929-6dc3-460a-908f-80a68a708e9e", + "uuid": "6faf4968-807a-40a0-a0e7-f55ef7e12dca", "control-id": "cis_rhel10_5-1.9", "description": "No notes for control-id 5.1.9.", "props": [ @@ -7220,7 +7208,7 @@ ] }, { - "uuid": "1ffa3640-6755-4c01-8465-f6ef109be889", + "uuid": "31170ecb-6d61-434a-8689-7d3b54c751f4", "control-id": "cis_rhel10_5-2.4", "description": "No notes for control-id 5.2.4.", "props": [ @@ -7237,7 +7225,7 @@ ] }, { - "uuid": "c4997f3e-8839-49a7-a91f-be4bc6e475a3", + "uuid": "5a571931-82a3-45ab-98dd-6ae53a2e8179", "control-id": "cis_rhel10_5-3.2.1.3", "description": "No notes for control-id 5.3.2.1.3.", "props": [ @@ -7254,7 +7242,7 @@ ] }, { - "uuid": "503dac2a-5a13-48e6-b61b-def73933f428", + "uuid": "455a4854-5d47-4e5f-a37c-84c78c893ad8", "control-id": "cis_rhel10_5-4.1.2", "description": "No notes for control-id 5.4.1.2.", "props": [ @@ -7276,7 +7264,7 @@ ] }, { - "uuid": "419b56a1-c452-4be9-b5f1-52a28e32db25", + "uuid": "42e088ae-4790-4ccc-aa63-1d2033c4e114", "control-id": "cis_rhel10_5-4.3.1", "description": "No notes for control-id 5.4.3.1.", "props": [ @@ -7293,7 +7281,7 @@ ] }, { - "uuid": "3970ac3b-53d5-45a6-aa82-2e6372f02fce", + "uuid": "d2dab19a-82bb-45a7-97c6-6cffce1376f3", "control-id": "cis_rhel10_6-3.1.1", "description": "No notes for control-id 6.3.1.1.", "props": [ @@ -7315,7 +7303,7 @@ ] }, { - "uuid": "4d5ab09d-ac6c-4176-9696-49dea0687179", + "uuid": "b890c2ae-bd26-4374-98e3-e8a5dd0b437b", "control-id": "cis_rhel10_6-3.1.2", "description": "No notes for control-id 6.3.1.2.", "props": [ @@ -7332,7 +7320,7 @@ ] }, { - "uuid": "45065e5c-79b0-468b-a224-886247884e56", + "uuid": "f1e677fb-4dd1-4e28-9bc5-83b41aefe170", "control-id": "cis_rhel10_6-3.1.3", "description": "No notes for control-id 6.3.1.3.", "props": [ @@ -7349,7 +7337,7 @@ ] }, { - "uuid": "31eaf5c0-5eae-411f-8120-db1586a0c057", + "uuid": "09a827c7-c7ef-490d-849a-881900b2570c", "control-id": "cis_rhel10_6-3.1.4", "description": "No notes for control-id 6.3.1.4.", "props": [ @@ -7366,7 +7354,7 @@ ] }, { - "uuid": "cc1d32f5-7bf0-434b-9cdb-aeeb2ed273e8", + "uuid": "0576e0ef-9901-43a3-82f0-09e8e751c973", "control-id": "cis_rhel10_6-3.2.1", "description": "No notes for control-id 6.3.2.1.", "props": [ @@ -7383,7 +7371,7 @@ ] }, { - "uuid": "dd16fa5a-35b9-404c-8af0-11407cc3dbdc", + "uuid": "fa5a648e-1514-4148-9b5b-ca62ca2eb1c9", "control-id": "cis_rhel10_6-3.2.2", "description": "No notes for control-id 6.3.2.2.", "props": [ @@ -7400,7 +7388,7 @@ ] }, { - "uuid": "03ee50b0-6b01-452f-9893-4ba4b9b74ab1", + "uuid": "acfdf550-1ee8-4f5d-8bab-9b69f7100781", "control-id": "cis_rhel10_6-3.2.3", "description": "No notes for control-id 6.3.2.3.", "props": [ @@ -7422,7 +7410,7 @@ ] }, { - "uuid": "fc0f8b02-42f7-40a6-82e9-82b356b6c9ab", + "uuid": "b6b48caf-f9af-4d7f-8a6f-dfb7839718e4", "control-id": "cis_rhel10_6-3.2.4", "description": "No notes for control-id 6.3.2.4.", "props": [ @@ -7444,7 +7432,7 @@ ] }, { - "uuid": "58804169-d40a-46e3-9dfc-42c38ce73780", + "uuid": "716f37a9-3db9-4850-84b6-8abf8b749c63", "control-id": "cis_rhel10_6-3.3.1", "description": "No notes for control-id 6.3.3.1.", "props": [ @@ -7461,7 +7449,7 @@ ] }, { - "uuid": "2bf3d057-5304-4a67-b868-a29e47761528", + "uuid": "0240d9ab-1b55-4775-acb9-aff6a033bbb5", "control-id": "cis_rhel10_6-3.3.2", "description": "No notes for control-id 6.3.3.2.", "props": [ @@ -7478,7 +7466,7 @@ ] }, { - "uuid": "b1d323d8-3d95-4dfc-a736-1879a98ffd14", + "uuid": "385902d2-f754-4c03-a98b-ec6cac6fb9f4", "control-id": "cis_rhel10_6-3.3.3", "description": "No notes for control-id 6.3.3.3.", "props": [ @@ -7495,7 +7483,7 @@ ] }, { - "uuid": "321f11d8-8344-42bb-b33a-8da54cc5184a", + "uuid": "7651f519-5347-49af-9ed9-4ac36a6af9d4", "control-id": "cis_rhel10_6-3.3.4", "description": "No notes for control-id 6.3.3.4.", "props": [ @@ -7527,7 +7515,7 @@ ] }, { - "uuid": "0fdd582b-222a-4303-9149-b01a6941678b", + "uuid": "27b93fe6-0d02-497f-8f58-1e2fa50ead32", "control-id": "cis_rhel10_6-3.3.5", "description": "No notes for control-id 6.3.3.5.", "props": [ @@ -7549,7 +7537,7 @@ ] }, { - "uuid": "a9446762-ec82-4354-9e34-9a57c066c068", + "uuid": "454a1442-359d-49e5-8b27-2c946479d666", "control-id": "cis_rhel10_6-3.3.6", "description": "No notes for control-id 6.3.3.6.", "props": [ @@ -7571,7 +7559,7 @@ ] }, { - "uuid": "5a90fde5-2bf9-4524-a11b-3e497fd38dee", + "uuid": "f298990f-3d12-4c10-890e-e3488e3589a9", "control-id": "cis_rhel10_6-3.3.7", "description": "No notes for control-id 6.3.3.7.", "props": [ @@ -7593,7 +7581,7 @@ ] }, { - "uuid": "a81efdbd-3050-4a13-a894-4f947e7e5ab0", + "uuid": "0f2b88e9-0c98-48d8-976c-4beb7aa8d0f4", "control-id": "cis_rhel10_6-3.3.8", "description": "No notes for control-id 6.3.3.8.", "props": [ @@ -7615,7 +7603,7 @@ ] }, { - "uuid": "4ba464d1-73bc-4b25-aee7-2bda02d52681", + "uuid": "13cdff3d-c9a1-41a4-95cc-9c2fb696440c", "control-id": "cis_rhel10_6-3.3.9", "description": "No notes for control-id 6.3.3.9.", "props": [ @@ -7632,7 +7620,7 @@ ] }, { - "uuid": "29d82f04-c5f5-47a7-9a0b-1007c1aa33b4", + "uuid": "d880730d-2d31-4774-bb8a-e8ca05f38ba4", "control-id": "cis_rhel10_6-3.3.10", "description": "No notes for control-id 6.3.3.10.", "props": [ @@ -7649,7 +7637,7 @@ ] }, { - "uuid": "6428ccf0-69cb-4991-9e9f-c741ab69d405", + "uuid": "0159ae7a-4a9f-46a8-b1c6-493bdf1076b4", "control-id": "cis_rhel10_6-3.3.11", "description": "No notes for control-id 6.3.3.11.", "props": [ @@ -7686,7 +7674,7 @@ ] }, { - "uuid": "a7890719-fe1a-4246-9ba8-a95f5854732b", + "uuid": "1f7bc8d8-feda-4639-ac91-9ed9550407a2", "control-id": "cis_rhel10_6-3.3.12", "description": "No notes for control-id 6.3.3.12.", "props": [ @@ -7703,7 +7691,7 @@ ] }, { - "uuid": "89fc5480-a3a1-4a93-b609-0017645065c3", + "uuid": "7628f543-4b2a-4ee5-8480-5fb834bc98b4", "control-id": "cis_rhel10_6-3.3.13", "description": "No notes for control-id 6.3.3.13.", "props": [ @@ -7720,7 +7708,7 @@ ] }, { - "uuid": "794112e1-d2da-4f4f-a64d-dcaec2016be1", + "uuid": "40d9eaac-26c7-47f5-beee-0583d14050a9", "control-id": "cis_rhel10_6-3.3.14", "description": "No notes for control-id 6.3.3.14.", "props": [ @@ -7742,7 +7730,7 @@ ] }, { - "uuid": "ae4a20b8-df03-498e-b68a-ca3d0240f1db", + "uuid": "aa9aac2d-e021-4259-b4a9-0ac273a19d5d", "control-id": "cis_rhel10_6-3.3.15", "description": "No notes for control-id 6.3.3.15.", "props": [ @@ -7759,7 +7747,7 @@ ] }, { - "uuid": "903c3a4c-6245-4f17-8aa8-f768568d23ed", + "uuid": "e55809d2-e800-452f-98a2-8043b8bb0a35", "control-id": "cis_rhel10_6-3.3.16", "description": "No notes for control-id 6.3.3.16.", "props": [ @@ -7776,7 +7764,7 @@ ] }, { - "uuid": "35cbd6ba-980b-412f-87b2-babd23bfd0a3", + "uuid": "40bc582d-ab28-4d8e-a7b5-ac5921924e74", "control-id": "cis_rhel10_6-3.3.17", "description": "No notes for control-id 6.3.3.17.", "props": [ @@ -7798,7 +7786,7 @@ ] }, { - "uuid": "7626742e-1988-4845-b815-dd53752461b2", + "uuid": "9cefb3df-b401-4446-ad9e-fbb19594dc48", "control-id": "cis_rhel10_6-3.3.18", "description": "No notes for control-id 6.3.3.18.", "props": [ @@ -7830,7 +7818,7 @@ ] }, { - "uuid": "76ba34d0-c9ac-40bf-bbd5-2d8acc56a434", + "uuid": "c3f9d58c-62ce-43e8-9cef-09727791eaba", "control-id": "cis_rhel10_6-3.3.19", "description": "No notes for control-id 6.3.3.19.", "props": [ @@ -7862,7 +7850,7 @@ ] }, { - "uuid": "5e2e4049-f3aa-43ff-8dff-710384338c9e", + "uuid": "3c6fb6b5-ab29-43be-a1d3-99c588a86fa5", "control-id": "cis_rhel10_6-3.3.20", "description": "No notes for control-id 6.3.3.20.", "props": [ @@ -7904,7 +7892,7 @@ ] }, { - "uuid": "f2d5058e-95e7-40f1-9c1c-f557825be604", + "uuid": "6312e884-62ce-454c-a49f-f08d9d9097c4", "control-id": "cis_rhel10_6-3.3.21", "description": "No notes for control-id 6.3.3.21.", "props": [ @@ -7921,7 +7909,7 @@ ] }, { - "uuid": "5da264b0-25f2-4349-bdd4-68cc789eae72", + "uuid": "830a3ac0-763c-49fe-b3a7-c3fffb1da1a4", "control-id": "cis_rhel10_6-3.3.22", "description": "No notes for control-id 6.3.3.22.", "props": [ @@ -7948,7 +7936,7 @@ ] }, { - "uuid": "22a8996e-e2e8-465d-b232-51cc1542886c", + "uuid": "854a39b7-7158-4be1-9417-4c791f4e322a", "control-id": "cis_rhel10_6-3.3.23", "description": "No notes for control-id 6.3.3.23.", "props": [ @@ -7970,7 +7958,7 @@ ] }, { - "uuid": "f5e804c0-9205-4bc2-9f37-b412e286a8d5", + "uuid": "b2298f40-b35e-4765-b837-8e5a99e6f401", "control-id": "cis_rhel10_6-3.3.24", "description": "No notes for control-id 6.3.3.24.", "props": [ @@ -7992,7 +7980,7 @@ ] }, { - "uuid": "0a667de1-0a81-4388-89de-29d8e8b03626", + "uuid": "c12deaa3-22f5-4304-9af4-eae9484b830c", "control-id": "cis_rhel10_6-3.3.25", "description": "No notes for control-id 6.3.3.25.", "props": [ @@ -8019,7 +8007,7 @@ ] }, { - "uuid": "919417ce-224c-4c68-887c-4bea6f10dbbc", + "uuid": "00c9d83f-6699-4626-8bed-a988439031db", "control-id": "cis_rhel10_6-3.3.26", "description": "No notes for control-id 6.3.3.26.", "props": [ @@ -8041,7 +8029,7 @@ ] }, { - "uuid": "f7cb282e-a3cd-432b-a4eb-a9600c6e8c04", + "uuid": "7e8173b0-80d5-4da4-af8e-c32618ba74b2", "control-id": "cis_rhel10_6-3.3.27", "description": "No notes for control-id 6.3.3.27.", "props": [ @@ -8058,7 +8046,7 @@ ] }, { - "uuid": "0cb36b4d-9208-403e-b227-c53753a61c88", + "uuid": "33d04045-9cdc-4f75-b060-08ba4032b62d", "control-id": "cis_rhel10_6-3.3.28", "description": "No notes for control-id 6.3.3.28.", "props": [ @@ -8075,7 +8063,7 @@ ] }, { - "uuid": "fe19440a-8ca1-4f12-86e1-965c7ea97eaa", + "uuid": "1ddeab0f-420e-45a7-9620-bc5ca8010433", "control-id": "cis_rhel10_6-3.3.29", "description": "No notes for control-id 6.3.3.29.", "props": [ @@ -8092,7 +8080,7 @@ ] }, { - "uuid": "90d3edaf-ae79-4a1c-82f6-c8445dab59f0", + "uuid": "c250836b-31af-490d-aac9-160f1c7d1c60", "control-id": "cis_rhel10_6-3.3.30", "description": "No notes for control-id 6.3.3.30.", "props": [ @@ -8109,7 +8097,7 @@ ] }, { - "uuid": "25967116-82b9-4a30-8c15-50e3703620b7", + "uuid": "af386b42-cd41-4311-87f3-a5bee07138f6", "control-id": "cis_rhel10_6-3.3.31", "description": "No notes for control-id 6.3.3.31.", "props": [ @@ -8126,7 +8114,7 @@ ] }, { - "uuid": "375da343-4910-464f-8d1e-ac773d7ac5b1", + "uuid": "6c0bd2f1-0497-409a-aef7-dfb8228f6a7e", "control-id": "cis_rhel10_6-3.3.32", "description": "No notes for control-id 6.3.3.32.", "props": [ @@ -8148,7 +8136,7 @@ ] }, { - "uuid": "32143bb7-cca5-4cfd-a443-9cb5880d4831", + "uuid": "6006399d-2a23-449e-b115-2ae3769cae52", "control-id": "cis_rhel10_6-3.3.33", "description": "No notes for control-id 6.3.3.33.", "props": [ @@ -8165,7 +8153,7 @@ ] }, { - "uuid": "bcc34018-fbd6-469c-b9e1-2914f581cfd5", + "uuid": "96fd2e2d-f650-49f2-bcf6-f27d963700d2", "control-id": "cis_rhel10_6-3.3.34", "description": "No notes for control-id 6.3.3.34.", "props": [ @@ -8182,7 +8170,7 @@ ] }, { - "uuid": "0dd31c8d-7863-434e-b72a-f6beedcc18e0", + "uuid": "9167c70b-b17a-4e53-b441-a9b8f9b92aef", "control-id": "cis_rhel10_6-3.3.35", "description": "No notes for control-id 6.3.3.35.", "props": [ @@ -8199,7 +8187,7 @@ ] }, { - "uuid": "5ff39ce8-57c8-4891-833c-efb4d5035b99", + "uuid": "2c035f2c-ca18-4606-9357-3ef002f7a981", "control-id": "cis_rhel10_6-3.3.36", "description": "No notes for control-id 6.3.3.36.", "props": [ @@ -8216,7 +8204,7 @@ ] }, { - "uuid": "54f4e3be-e875-4a56-8815-d8a79252f3a9", + "uuid": "cc995f82-1184-4f39-b459-014b1332965f", "control-id": "cis_rhel10_6-3.3.37", "description": "The description for control-id cis_rhel10_6-3.3.37.", "props": [ @@ -8229,7 +8217,7 @@ ] }, { - "uuid": "b651cd4f-e69b-43e7-b009-3b0c8b3e931b", + "uuid": "b31c9e1b-fdac-42d0-9a73-2396c0c22e60", "control-id": "cis_rhel10_6-3.4.1", "description": "No notes for control-id 6.3.4.1.", "props": [ @@ -8246,7 +8234,7 @@ ] }, { - "uuid": "6fabbe9b-e17a-405c-a43c-5c1dffdd32c3", + "uuid": "07771178-ce68-451a-ae63-81ec6f329497", "control-id": "cis_rhel10_6-3.4.2", "description": "No notes for control-id 6.3.4.2.", "props": [ @@ -8263,7 +8251,7 @@ ] }, { - "uuid": "3293dfbc-99f5-42ee-be52-49e9eddb1626", + "uuid": "f9affe74-6045-4184-8a98-5ac8feba589c", "control-id": "cis_rhel10_6-3.4.3", "description": "No notes for control-id 6.3.4.3.", "props": [ @@ -8280,7 +8268,7 @@ ] }, { - "uuid": "4f4ad3be-3c7b-4a38-ad96-89a77d6b7f5c", + "uuid": "5f2f8314-184e-48a0-b943-4ee03d497719", "control-id": "cis_rhel10_6-3.4.4", "description": "No notes for control-id 6.3.4.4.", "props": [ @@ -8297,7 +8285,7 @@ ] }, { - "uuid": "46e53170-2795-4a3e-bc62-ecf71a2d99f0", + "uuid": "163d10d0-f335-42a9-a196-d1e699403db1", "control-id": "cis_rhel10_6-3.4.5", "description": "No notes for control-id 6.3.4.5.", "props": [ @@ -8314,7 +8302,7 @@ ] }, { - "uuid": "22c01da0-f80b-4664-bd48-89889e298810", + "uuid": "26e72ce8-e7d2-46d4-9c6d-be85915fefb9", "control-id": "cis_rhel10_6-3.4.6", "description": "No notes for control-id 6.3.4.6.", "props": [ @@ -8331,7 +8319,7 @@ ] }, { - "uuid": "91d736ba-dc1b-44e8-b1e3-c5f10d76dfa8", + "uuid": "1b589d22-6652-4019-9739-c50bcecfd263", "control-id": "cis_rhel10_6-3.4.7", "description": "No notes for control-id 6.3.4.7.", "props": [ @@ -8348,7 +8336,7 @@ ] }, { - "uuid": "bd124773-2553-4b15-92bd-608cfc475b1a", + "uuid": "7a652790-f6ff-4b79-9297-557dd7475ddd", "control-id": "cis_rhel10_6-3.4.8", "description": "No notes for control-id 6.3.4.8.", "props": [ @@ -8365,7 +8353,7 @@ ] }, { - "uuid": "392439ab-4b01-465c-b178-4e80629d95dd", + "uuid": "1722cece-1652-40ba-832e-703ea7c09890", "control-id": "cis_rhel10_6-3.4.9", "description": "No notes for control-id 6.3.4.9.", "props": [ @@ -8382,7 +8370,7 @@ ] }, { - "uuid": "a654f738-66e3-4607-a652-02ef59af4aac", + "uuid": "399424b7-097e-4a42-9ee6-ce7fb89f76ab", "control-id": "cis_rhel10_6-3.4.10", "description": "No notes for control-id 6.3.4.10.", "props": [ @@ -8399,7 +8387,7 @@ ] }, { - "uuid": "7b3e0a0a-6aad-4801-a201-545fafea0616", + "uuid": "b10cf50c-520d-444e-ad32-2aa77743e492", "control-id": "reload_dconf_db", "description": "This is a helper rule to reload Dconf database correctly.", "props": [ @@ -8416,7 +8404,7 @@ ] }, { - "uuid": "9dbf77d6-108a-4e35-b850-af34634aea11", + "uuid": "51adfbfd-75de-4d48-bcf1-a74b5242d15a", "control-id": "cis_rhel10_1-1.1.1", "description": "No notes for control-id 1.1.1.1.", "props": [ @@ -8433,7 +8421,7 @@ ] }, { - "uuid": "935df9cc-ed27-4c38-8ed4-5360ce3ce618", + "uuid": "b13e56d6-80a3-4450-b6ca-798e112fc7cb", "control-id": "cis_rhel10_1-1.1.2", "description": "No notes for control-id 1.1.1.2.", "props": [ @@ -8450,7 +8438,7 @@ ] }, { - "uuid": "67fb9381-3170-4168-a4db-d6fe743c50da", + "uuid": "8b8cd2e5-4a69-4a2d-a6b8-3de06597691f", "control-id": "cis_rhel10_1-1.1.3", "description": "No notes for control-id 1.1.1.3.", "props": [ @@ -8467,7 +8455,7 @@ ] }, { - "uuid": "3317933a-d53c-4b22-b724-4669c8aa40b0", + "uuid": "49e2d7ef-dde9-43bd-9035-4a0b892368a3", "control-id": "cis_rhel10_1-1.1.4", "description": "No notes for control-id 1.1.1.4.", "props": [ @@ -8484,7 +8472,7 @@ ] }, { - "uuid": "5193768b-3e7b-4a30-987e-a0f77b89bbff", + "uuid": "30827078-a466-4d12-a463-b554fbe91e8b", "control-id": "cis_rhel10_1-1.1.5", "description": "No notes for control-id 1.1.1.5.", "props": [ @@ -8501,7 +8489,7 @@ ] }, { - "uuid": "cbca48a0-eeea-4e7f-b892-4efae7b4d886", + "uuid": "d5dabdb5-91b7-45da-aa80-ec5afbf48f27", "control-id": "cis_rhel10_1-1.1.9", "description": "No notes for control-id 1.1.1.9.", "props": [ @@ -8518,7 +8506,7 @@ ] }, { - "uuid": "4786c6af-aeea-4df9-ad98-2bcf5b810aa1", + "uuid": "746ba73f-cf6c-4920-ba0c-a47b58c75e58", "control-id": "cis_rhel10_1-1.1.10", "description": "No notes for control-id 1.1.1.10.", "props": [ @@ -8535,7 +8523,7 @@ ] }, { - "uuid": "09aa44cd-a3cf-4eb6-871a-c8d02d54d574", + "uuid": "48c8e8f7-4cd9-4711-b460-611ef84b6a9a", "control-id": "cis_rhel10_1-1.1.11", "description": "The description for control-id cis_rhel10_1-1.1.11.", "props": [ @@ -8548,7 +8536,7 @@ ] }, { - "uuid": "1039dfde-a299-4d38-8ec7-da3e11bbc8dd", + "uuid": "15f814aa-ce8d-4ccf-905e-8a2b301e095e", "control-id": "cis_rhel10_1-1.2.1.1", "description": "No notes for control-id 1.1.2.1.1.", "props": [ @@ -8565,7 +8553,7 @@ ] }, { - "uuid": "7ce55830-3494-43ad-bdb3-05b0ff8618f0", + "uuid": "3cc9e540-f6e2-4633-8c76-cdad2fb76aa6", "control-id": "cis_rhel10_1-1.2.1.2", "description": "No notes for control-id 1.1.2.1.2.", "props": [ @@ -8582,7 +8570,7 @@ ] }, { - "uuid": "cd10b0a5-4b9b-42b3-87f7-545abcecc6ac", + "uuid": "2cdb8e39-e101-4e6d-bfd8-2081b64d867e", "control-id": "cis_rhel10_1-1.2.1.3", "description": "No notes for control-id 1.1.2.1.3.", "props": [ @@ -8599,7 +8587,7 @@ ] }, { - "uuid": "9c0dc9c1-1c02-48d7-8bdd-a3bc224136d6", + "uuid": "ca7f1779-de42-4ee4-a819-e83e3c5f0bc9", "control-id": "cis_rhel10_1-1.2.1.4", "description": "No notes for control-id 1.1.2.1.4.", "props": [ @@ -8616,7 +8604,7 @@ ] }, { - "uuid": "dce4418b-ce1a-4a2f-8319-85aa84307b4a", + "uuid": "1f267e63-b97a-40b3-9dcb-238bac6d9b83", "control-id": "cis_rhel10_1-1.2.2.1", "description": "No notes for control-id 1.1.2.2.1.", "props": [ @@ -8633,7 +8621,7 @@ ] }, { - "uuid": "75151dff-4bce-465b-bc1e-cc5b805f1b94", + "uuid": "4c3c7bf3-0d1d-4452-909e-9a4635f7c5ec", "control-id": "cis_rhel10_1-1.2.2.2", "description": "No notes for control-id 1.1.2.2.2.", "props": [ @@ -8650,7 +8638,7 @@ ] }, { - "uuid": "0eb18b5f-1630-4244-aeec-6c7769189929", + "uuid": "5e2e37fb-2bfd-4759-8870-a87edec12f3f", "control-id": "cis_rhel10_1-1.2.2.3", "description": "No notes for control-id 1.1.2.2.3.", "props": [ @@ -8667,7 +8655,7 @@ ] }, { - "uuid": "d49ccd37-a976-4505-884a-bbe4274f4e1c", + "uuid": "71adc202-a46f-48b5-9b69-5c10593dc802", "control-id": "cis_rhel10_1-1.2.2.4", "description": "No notes for control-id 1.1.2.2.4.", "props": [ @@ -8684,7 +8672,7 @@ ] }, { - "uuid": "62b308c8-ea6f-47bc-9998-672fc870ff74", + "uuid": "8b056747-0643-48a8-9ea4-68b613494b6d", "control-id": "cis_rhel10_1-1.2.3.2", "description": "No notes for control-id 1.1.2.3.2.", "props": [ @@ -8701,7 +8689,7 @@ ] }, { - "uuid": "0309689c-ca47-4209-a1ce-561f62dc2458", + "uuid": "2d01998e-0f8c-4c0f-b4fc-60ae704b46d7", "control-id": "cis_rhel10_1-1.2.3.3", "description": "No notes for control-id 1.1.2.3.3.", "props": [ @@ -8718,7 +8706,7 @@ ] }, { - "uuid": "da79d2fe-88ec-4807-a258-f469289c5d48", + "uuid": "f32c16e6-ee42-47b7-a522-ca1cce9be1d2", "control-id": "cis_rhel10_1-1.2.4.2", "description": "No notes for control-id 1.1.2.4.2.", "props": [ @@ -8735,7 +8723,7 @@ ] }, { - "uuid": "a3c260d2-5505-4bcd-8a7d-0a94d4734fd5", + "uuid": "cc64b6e1-3258-436c-9b90-77ffd4927d21", "control-id": "cis_rhel10_1-1.2.4.3", "description": "No notes for control-id 1.1.2.4.3.", "props": [ @@ -8752,7 +8740,7 @@ ] }, { - "uuid": "0a375bda-e7cf-4e6c-87f0-1b34c89c5132", + "uuid": "a00c7d6c-f1d5-4127-825f-59525732f64a", "control-id": "cis_rhel10_1-1.2.5.2", "description": "No notes for control-id 1.1.2.5.2.", "props": [ @@ -8769,7 +8757,7 @@ ] }, { - "uuid": "ae79777f-583a-4639-96ba-2fe88544ceea", + "uuid": "a8cbe763-15b0-4d79-9886-8422ad2a0946", "control-id": "cis_rhel10_1-1.2.5.3", "description": "No notes for control-id 1.1.2.5.3.", "props": [ @@ -8786,7 +8774,7 @@ ] }, { - "uuid": "87ebb2e0-fd9a-4afe-b3ea-1bb76c403523", + "uuid": "9f47090e-1ff0-496e-9f13-838e7fda34e5", "control-id": "cis_rhel10_1-1.2.5.4", "description": "No notes for control-id 1.1.2.5.4.", "props": [ @@ -8803,7 +8791,7 @@ ] }, { - "uuid": "7cd5d194-f0d2-4114-86b2-7a1d29e17d10", + "uuid": "0f84a792-3f6c-445d-84d1-dd9510a8c0cb", "control-id": "cis_rhel10_1-1.2.6.2", "description": "No notes for control-id 1.1.2.6.2.", "props": [ @@ -8820,7 +8808,7 @@ ] }, { - "uuid": "a32a506f-a90f-4be2-82ea-1ca2ae70687f", + "uuid": "d180a3c6-154e-4ab3-8a7f-5d7ef3b799d2", "control-id": "cis_rhel10_1-1.2.6.3", "description": "No notes for control-id 1.1.2.6.3.", "props": [ @@ -8837,7 +8825,7 @@ ] }, { - "uuid": "812a5fb4-4472-4108-a08b-19eabf6931cc", + "uuid": "e1202bd9-ce31-4538-9e69-4e371bd094cb", "control-id": "cis_rhel10_1-1.2.6.4", "description": "No notes for control-id 1.1.2.6.4.", "props": [ @@ -8854,7 +8842,7 @@ ] }, { - "uuid": "0a83d51f-86c7-4c83-97d7-a27d0017a20a", + "uuid": "2e2d6f84-196e-4068-8835-d8b990346e7c", "control-id": "cis_rhel10_1-1.2.7.2", "description": "No notes for control-id 1.1.2.7.2.", "props": [ @@ -8871,7 +8859,7 @@ ] }, { - "uuid": "a064ce23-0a75-4b9f-9b32-922c7b6a6db3", + "uuid": "35bee545-06b1-421c-9681-483ad7b65ff2", "control-id": "cis_rhel10_1-1.2.7.3", "description": "No notes for control-id 1.1.2.7.3.", "props": [ @@ -8888,7 +8876,7 @@ ] }, { - "uuid": "c12b89f4-4569-411b-ba52-beda665fb0bb", + "uuid": "2d554004-e8d6-49e6-9662-fa61e2fb64a0", "control-id": "cis_rhel10_1-1.2.7.4", "description": "No notes for control-id 1.1.2.7.4.", "props": [ @@ -8905,7 +8893,7 @@ ] }, { - "uuid": "f2746fd1-e7bc-4148-90a9-34a1363175fd", + "uuid": "f965f343-b9b0-4996-af47-b2c746530bc7", "control-id": "cis_rhel10_1-2.1.1", "description": "The description for control-id cis_rhel10_1-2.1.1.", "props": [ @@ -8918,7 +8906,7 @@ ] }, { - "uuid": "40a6989d-b783-43ef-badc-8dec79bacd88", + "uuid": "0fd49fb3-8634-4475-8a05-8b8657410abd", "control-id": "cis_rhel10_1-2.1.2", "description": "No notes for control-id 1.2.1.2.", "props": [ @@ -8935,7 +8923,7 @@ ] }, { - "uuid": "3a87f6ea-5e5a-4565-8ba6-a1a9587d63bc", + "uuid": "3f4d1266-6acb-468d-a771-7520c83ce0a4", "control-id": "cis_rhel10_1-2.1.4", "description": "The description for control-id cis_rhel10_1-2.1.4.", "props": [ @@ -8948,7 +8936,7 @@ ] }, { - "uuid": "cfd4c239-9f3a-4e1e-98ac-6bc255672f5b", + "uuid": "d75a3848-f890-4b7d-aca8-7568591db5de", "control-id": "cis_rhel10_1-2.2.1", "description": "The description for control-id cis_rhel10_1-2.2.1.", "props": [ @@ -8961,7 +8949,7 @@ ] }, { - "uuid": "a82fc45d-0f44-41a6-94e2-6f91e8726e49", + "uuid": "5a094e94-4e5e-4b04-b023-fed6a96bee78", "control-id": "cis_rhel10_1-3.1.1", "description": "No notes for control-id 1.3.1.1.", "props": [ @@ -8978,7 +8966,7 @@ ] }, { - "uuid": "330151f2-c81b-46de-a80a-91109f389b86", + "uuid": "4da7a24e-5d39-4440-b828-268724df1c6a", "control-id": "cis_rhel10_1-3.1.2", "description": "No notes for control-id 1.3.1.2.", "props": [ @@ -8995,7 +8983,7 @@ ] }, { - "uuid": "64893c29-7f85-4ce2-9c91-a2b108dbb49b", + "uuid": "3ebed778-d770-45e5-ab38-2fde67a5d001", "control-id": "cis_rhel10_1-3.1.3", "description": "No notes for control-id 1.3.1.3.", "props": [ @@ -9012,7 +9000,7 @@ ] }, { - "uuid": "99d903aa-2bf7-4036-b3a4-634a203c6180", + "uuid": "6c2d32e6-81c0-42af-8e5d-b2b3d4cb6a87", "control-id": "cis_rhel10_1-3.1.4", "description": "No notes for control-id 1.3.1.4.", "props": [ @@ -9029,7 +9017,7 @@ ] }, { - "uuid": "1142c644-898a-464c-abff-eca0ac80e9eb", + "uuid": "6dbd570b-fa7f-4b93-9b88-3fb25c635aa5", "control-id": "cis_rhel10_1-3.1.7", "description": "No notes for control-id 1.3.1.7.", "props": [ @@ -9046,7 +9034,7 @@ ] }, { - "uuid": "2cb30e09-4025-43f5-a4bb-f3e7e9e136ca", + "uuid": "aff8bab9-8aaa-4f27-8067-569c7b3cb6cb", "control-id": "cis_rhel10_1-3.1.8", "description": "No notes for control-id 1.3.1.8.", "props": [ @@ -9063,7 +9051,7 @@ ] }, { - "uuid": "745d196e-166f-4585-9333-7ef878481410", + "uuid": "77205555-5eb3-476b-897f-5a506c6830dc", "control-id": "cis_rhel10_1-4.1", "description": "There is no automated remediation for this rule and this is intentional.\nMore details in the rule description.", "props": [ @@ -9080,7 +9068,7 @@ ] }, { - "uuid": "c49ca919-f3fa-480c-95f8-38a14250f2dd", + "uuid": "ac1cac8c-15d9-4f77-a0d7-21f60f807b9d", "control-id": "cis_rhel10_1-4.2", "description": "This requirement demands a deeper review of the rules.", "props": [ @@ -9107,7 +9095,7 @@ ] }, { - "uuid": "9f865a37-d670-4417-9e44-566ce91e1e64", + "uuid": "ceef36f8-19d0-43e8-8494-9121a383547f", "control-id": "cis_rhel10_1-5.1", "description": "No notes for control-id 1.5.1.", "props": [ @@ -9124,7 +9112,7 @@ ] }, { - "uuid": "a2a2ed7e-ddeb-476a-8827-9c9e6c765d2f", + "uuid": "773d078a-9306-4402-ad55-1817f2dd92df", "control-id": "cis_rhel10_1-5.2", "description": "No notes for control-id 1.5.2.", "props": [ @@ -9141,7 +9129,7 @@ ] }, { - "uuid": "1d9d2cd5-53ec-4cb0-a25e-80ae56c40ed8", + "uuid": "3216ff42-7bf5-435e-b895-5f3b1736e29a", "control-id": "cis_rhel10_1-5.4", "description": "No notes for control-id 1.5.4.", "props": [ @@ -9158,7 +9146,7 @@ ] }, { - "uuid": "02d1dd22-7f49-457d-9841-fa91325e9707", + "uuid": "e23cbf44-f59d-493f-bf18-3cdc060c8af2", "control-id": "cis_rhel10_1-5.5", "description": "No notes for control-id 1.5.5.", "props": [ @@ -9175,7 +9163,7 @@ ] }, { - "uuid": "5a088f67-f316-4649-a257-699686cc424b", + "uuid": "e99c831c-b595-4dc7-afcf-b1a42082005c", "control-id": "cis_rhel10_1-5.6", "description": "No notes for control-id 1.5.6.", "props": [ @@ -9192,7 +9180,7 @@ ] }, { - "uuid": "5cfa57aa-925a-451a-8cdd-a74f02a2c92e", + "uuid": "ef22d12f-f469-41f4-9296-933fca785b80", "control-id": "cis_rhel10_1-5.7", "description": "No notes for control-id 1.5.7.", "props": [ @@ -9209,7 +9197,7 @@ ] }, { - "uuid": "4940ba55-9083-46aa-9085-d21c15a769a5", + "uuid": "ebee0cba-9f51-4002-92ee-b35fa32878ed", "control-id": "cis_rhel10_1-5.8", "description": "Address Space Layout Randomization (ASLR)", "props": [ @@ -9226,7 +9214,7 @@ ] }, { - "uuid": "e9085ea1-cbf6-4f7d-a95a-0b0b063e481d", + "uuid": "ff256aab-a5f9-422b-8d1e-789148e6c263", "control-id": "cis_rhel10_1-5.9", "description": "No notes for control-id 1.5.9.", "props": [ @@ -9243,7 +9231,7 @@ ] }, { - "uuid": "a1a536c5-f05d-48e4-ad4d-e1e662d75c19", + "uuid": "a52e3ae2-c4d5-43eb-8f1f-a71f145744a7", "control-id": "cis_rhel10_1-5.10", "description": "No notes for control-id 1.5.10.", "props": [ @@ -9260,7 +9248,7 @@ ] }, { - "uuid": "ea2d7f9f-7741-48c8-a06b-c7137f4e8ce0", + "uuid": "557f4a97-7b34-4291-b2ae-ff780ee7f532", "control-id": "cis_rhel10_1-6.1", "description": "No notes for control-id 1.6.1.", "props": [ @@ -9277,7 +9265,7 @@ ] }, { - "uuid": "463fa8ab-d8a7-4533-a57e-a24d292eee34", + "uuid": "f11261cc-5527-4c3f-bb69-6b32abaf5142", "control-id": "cis_rhel10_1-6.2", "description": "No notes for control-id 1.6.2.", "props": [ @@ -9294,7 +9282,7 @@ ] }, { - "uuid": "00427b94-7446-42d0-ab7f-96957cd09d0c", + "uuid": "5d299712-e7c3-44b6-b72d-584400b8c204", "control-id": "cis_rhel10_1-6.3", "description": "No notes for control-id 1.6.3.", "props": [ @@ -9311,7 +9299,7 @@ ] }, { - "uuid": "8f8cbb9b-9eb0-4896-9704-aa64547cadbf", + "uuid": "7b61c8cb-3742-4d5f-acb9-4d5ba741a546", "control-id": "cis_rhel10_1-6.4", "description": "No notes for control-id 1.6.4.", "props": [ @@ -9328,7 +9316,7 @@ ] }, { - "uuid": "94deb825-e07b-4f38-baa7-beb8d6a6bd53", + "uuid": "9d4d6140-a415-4e1d-9fac-b9c94bd92679", "control-id": "cis_rhel10_1-7.1", "description": "No notes for control-id 1.7.1.", "props": [ @@ -9345,7 +9333,7 @@ ] }, { - "uuid": "457030e8-41e4-42d8-9c67-45a9049f05b4", + "uuid": "205e146b-4377-4d31-8d15-2bcb3b7e9a7a", "control-id": "cis_rhel10_1-7.2", "description": "No notes for control-id 1.7.2.", "props": [ @@ -9362,7 +9350,7 @@ ] }, { - "uuid": "bef203bd-c3ce-4278-9adf-a71e4610a589", + "uuid": "952f87fc-b603-46b0-a4ac-fbafade30884", "control-id": "cis_rhel10_1-7.3", "description": "No notes for control-id 1.7.3.", "props": [ @@ -9379,7 +9367,7 @@ ] }, { - "uuid": "dba967f7-9a33-48b0-b0f1-76fb5b7fea1f", + "uuid": "9a579381-9e17-47a9-9447-ef4d5281c008", "control-id": "cis_rhel10_1-7.4", "description": "No notes for control-id 1.7.4.", "props": [ @@ -9406,7 +9394,7 @@ ] }, { - "uuid": "268af437-f1a8-454b-a660-d50c43571dde", + "uuid": "65b64c82-849a-48ea-81b3-c9f7beb3ebb8", "control-id": "cis_rhel10_1-7.5", "description": "No notes for control-id 1.7.5.", "props": [ @@ -9433,7 +9421,7 @@ ] }, { - "uuid": "c1f9038a-8714-4ed0-8775-96d720194c96", + "uuid": "962c4927-45c9-477d-b94e-c14e91044148", "control-id": "cis_rhel10_1-7.6", "description": "No notes for control-id 1.7.6.", "props": [ @@ -9460,7 +9448,7 @@ ] }, { - "uuid": "a005ac77-9e97-4e3a-abf7-693b8c869983", + "uuid": "636f1aab-521d-4cc5-b33e-cde899a47f50", "control-id": "cis_rhel10_1-8.1", "description": "No notes for control-id 1.8.1.", "props": [ @@ -9482,7 +9470,7 @@ ] }, { - "uuid": "52b4e25f-93bc-4782-b529-63830153ae68", + "uuid": "b68ed1aa-54a3-4f91-bf67-d5a879c0bf17", "control-id": "cis_rhel10_1-8.2", "description": "No notes for control-id 1.8.2.", "props": [ @@ -9499,7 +9487,7 @@ ] }, { - "uuid": "7ff7c1cd-91f6-4df0-a81d-39896c952ee4", + "uuid": "f3bad06b-2906-4114-be18-704b60dce371", "control-id": "cis_rhel10_1-8.3", "description": "No notes for control-id 1.8.3.", "props": [ @@ -9531,7 +9519,7 @@ ] }, { - "uuid": "4e13acbe-5ee9-4abb-b74b-a091b2897376", + "uuid": "86ee765e-e6c8-4af0-ae66-5d79448217fd", "control-id": "cis_rhel10_1-8.4", "description": "No notes for control-id 1.8.4.", "props": [ @@ -9553,7 +9541,7 @@ ] }, { - "uuid": "8d82aeff-00a3-4c4d-b5e9-dfbca6751340", + "uuid": "e5daffbe-f919-4dfd-8c8b-9cb0bf16476f", "control-id": "cis_rhel10_1-8.5", "description": "No notes for control-id 1.8.5.", "props": [ @@ -9570,7 +9558,7 @@ ] }, { - "uuid": "afa2b490-a586-4b64-9f1c-07fb8b395bfe", + "uuid": "0d9207ed-c76f-42cf-9ad7-d446c51b459e", "control-id": "cis_rhel10_2-1.1", "description": "No notes for control-id 2.1.1.", "props": [ @@ -9587,7 +9575,7 @@ ] }, { - "uuid": "35d75d91-c6e6-4def-9a41-69f54d469d14", + "uuid": "3171e137-6f4a-405f-ac5b-1007d8d9c305", "control-id": "cis_rhel10_2-1.2", "description": "No notes for control-id 2.1.2.", "props": [ @@ -9604,7 +9592,7 @@ ] }, { - "uuid": "f12bf0d1-d9d8-43ad-aee3-f493cfa108d4", + "uuid": "d5bd709e-0e69-417a-a137-41ddf75b2bc4", "control-id": "cis_rhel10_2-1.4", "description": "No notes for control-id 2.1.4.", "props": [ @@ -9621,7 +9609,7 @@ ] }, { - "uuid": "bce91ef5-ec2e-4c23-b85c-199b4bd9519b", + "uuid": "4a9eff2e-75dd-4ae0-b458-2f7bb2891309", "control-id": "cis_rhel10_2-1.5", "description": "No notes for control-id 2.1.5.", "props": [ @@ -9638,7 +9626,7 @@ ] }, { - "uuid": "ebf5ca33-b6a8-45c3-ac26-e115f48b0c7d", + "uuid": "b6862c7e-1abd-4e92-85dd-a9825402c23f", "control-id": "cis_rhel10_2-1.6", "description": "No notes for control-id 2.1.6.", "props": [ @@ -9655,7 +9643,7 @@ ] }, { - "uuid": "69050cd3-cac8-4ac2-978b-9e1043aa100b", + "uuid": "f4592fbf-a4cf-4872-9bba-ac8ed6f0b16e", "control-id": "cis_rhel10_2-1.7", "description": "No notes for control-id 2.1.7.", "props": [ @@ -9672,7 +9660,7 @@ ] }, { - "uuid": "7c64a2f8-5a7f-49ae-b142-394815fb2cbf", + "uuid": "6b315176-3e68-421d-895a-687a4ff23910", "control-id": "cis_rhel10_2-1.8", "description": "No notes for control-id 2.1.8.", "props": [ @@ -9694,7 +9682,7 @@ ] }, { - "uuid": "5f8ec8de-ec20-4aac-9164-a9203cd63467", + "uuid": "4b24a50b-f125-46e5-a4ae-e675c0d8c96c", "control-id": "cis_rhel10_2-1.9", "description": "Many of the libvirt packages used by Enterprise Linux virtualization are dependent on the\nnfs-utils package.", "props": [ @@ -9711,7 +9699,7 @@ ] }, { - "uuid": "3f01985f-fb69-4ca6-a961-06915f6693b5", + "uuid": "e77dfaa7-a2df-4702-800c-b1a261e04630", "control-id": "cis_rhel10_2-1.10", "description": "No notes for control-id 2.1.10.", "props": [ @@ -9728,7 +9716,7 @@ ] }, { - "uuid": "295b6806-5c27-4431-8200-c1f61de6fdc9", + "uuid": "54c6954b-1fda-4237-8532-2af1d4f3c164", "control-id": "cis_rhel10_2-1.11", "description": "Many of the libvirt packages used by Enterprise Linux virtualization, and the nfs-utils\npackage used for The Network File System (NFS), are dependent on the rpcbind package.", "props": [ @@ -9745,7 +9733,7 @@ ] }, { - "uuid": "6ca78d76-fa74-43c9-a273-1646432eb286", + "uuid": "1e731b75-cff2-4a43-af86-cb43ea232ce6", "control-id": "cis_rhel10_2-1.12", "description": "No notes for control-id 2.1.12.", "props": [ @@ -9762,7 +9750,7 @@ ] }, { - "uuid": "725ea5d0-7f1d-4e89-a782-af2996bcc12a", + "uuid": "a1a9482e-42c2-41ca-9325-dfd26dd42bf4", "control-id": "cis_rhel10_2-1.13", "description": "No notes for control-id 2.1.13.", "props": [ @@ -9779,7 +9767,7 @@ ] }, { - "uuid": "c400228f-72cd-4ed0-9ff9-ecb141fb9bdf", + "uuid": "e3858076-8043-4698-9754-2a1f3f36e7d9", "control-id": "cis_rhel10_2-1.14", "description": "No notes for control-id 2.1.14.", "props": [ @@ -9796,7 +9784,7 @@ ] }, { - "uuid": "afa4ed55-dc7d-4b77-b062-c1c96a713f7b", + "uuid": "eb4d28a3-db17-4ad2-9789-2d22f1117d53", "control-id": "cis_rhel10_2-1.15", "description": "No notes for control-id 2.1.15.", "props": [ @@ -9813,7 +9801,7 @@ ] }, { - "uuid": "306767b0-2ee9-441b-8582-ed368b9b6b44", + "uuid": "22a7d95d-aa0b-42b2-a9ad-1f48929dffd4", "control-id": "cis_rhel10_2-1.16", "description": "No notes for control-id 2.1.16.", "props": [ @@ -9830,7 +9818,7 @@ ] }, { - "uuid": "bf7443f3-bee7-40e4-9e45-13bc1549595c", + "uuid": "f62f9837-7bb1-411e-b058-2075e567c4a9", "control-id": "cis_rhel10_2-1.17", "description": "No notes for control-id 2.1.17.", "props": [ @@ -9847,7 +9835,7 @@ ] }, { - "uuid": "a82da6ef-d915-474c-a5be-301084576543", + "uuid": "25bdd6ce-7c01-46b7-ae7d-6e7c0583253d", "control-id": "cis_rhel10_2-1.18", "description": "No notes for control-id 2.1.18.", "props": [ @@ -9869,7 +9857,7 @@ ] }, { - "uuid": "e8aa92e8-ed3d-40d6-a03d-055f4c45a0ff", + "uuid": "d1f8deea-cc7d-4334-abdf-cfd89e38133c", "control-id": "cis_rhel10_2-1.21", "description": "No notes for control-id 2.1.21.", "props": [ @@ -9891,7 +9879,7 @@ ] }, { - "uuid": "691ef907-74c8-470a-b5d8-87dfbb861923", + "uuid": "70229f4a-bdea-4db7-b95e-58ceedfb4169", "control-id": "cis_rhel10_2-1.22", "description": "The description for control-id cis_rhel10_2-1.22.", "props": [ @@ -9904,7 +9892,7 @@ ] }, { - "uuid": "8532751e-2d53-46b2-8522-c3ae42130842", + "uuid": "fb378a36-d3ce-43c8-814e-4cff8e72efe2", "control-id": "cis_rhel10_2-2.1", "description": "No notes for control-id 2.2.1.", "props": [ @@ -9921,7 +9909,7 @@ ] }, { - "uuid": "c06fc6c1-330b-4caf-b574-1f7b20189645", + "uuid": "7a07f5eb-0a09-4e47-b7fb-970d702e4d5f", "control-id": "cis_rhel10_2-2.3", "description": "No notes for control-id 2.2.3.", "props": [ @@ -9938,7 +9926,7 @@ ] }, { - "uuid": "507e07da-7ace-49c4-8be6-d36ae68cbc48", + "uuid": "6d9ecfe3-1c21-4e30-a3df-86d21fb44180", "control-id": "cis_rhel10_2-2.4", "description": "No notes for control-id 2.2.4.", "props": [ @@ -9955,7 +9943,7 @@ ] }, { - "uuid": "f08f949a-089b-4ea0-85b0-3dd3c9808eb2", + "uuid": "8d2a3ca9-c152-40f9-be4f-f6459eb4ca4f", "control-id": "cis_rhel10_2-3.1", "description": "No notes for control-id 2.3.1.", "props": [ @@ -9967,7 +9955,7 @@ ] }, { - "uuid": "ebe01560-456e-410f-9198-ffc51061854d", + "uuid": "b3db28ed-d42c-40ca-aa92-bd5574fa3c34", "control-id": "cis_rhel10_2-3.2", "description": "No notes for control-id 2.3.2.", "props": [ @@ -9984,7 +9972,7 @@ ] }, { - "uuid": "71ce46a0-f6e4-4f34-9bac-05168df6246b", + "uuid": "b2c2aa2e-c664-43c8-82ea-e15cf71ef003", "control-id": "cis_rhel10_2-3.3", "description": "No notes for control-id 2.3.3.", "props": [ @@ -10001,7 +9989,7 @@ ] }, { - "uuid": "5380b00e-a17b-4494-a76b-b2da06f42c5a", + "uuid": "7a28e3da-b354-4b05-b01f-c0a7d1452a9f", "control-id": "cis_rhel10_2-4.1.1", "description": "No notes for control-id 2.4.1.1.", "props": [ @@ -10023,7 +10011,7 @@ ] }, { - "uuid": "944f5f2a-36ee-4594-8ff3-f4042927551e", + "uuid": "4354728b-689f-4620-b117-e4e87b5f2383", "control-id": "cis_rhel10_2-4.1.2", "description": "No notes for control-id 2.4.1.2.", "props": [ @@ -10050,7 +10038,7 @@ ] }, { - "uuid": "e843e5c1-190f-4e67-89cd-4330b75ea526", + "uuid": "4cae070c-1dce-4a37-826f-772630109e33", "control-id": "cis_rhel10_2-4.1.3", "description": "No notes for control-id 2.4.1.3.", "props": [ @@ -10077,7 +10065,7 @@ ] }, { - "uuid": "c7364879-48a2-44e9-93e0-b1bbcf108973", + "uuid": "2d8a8eb0-2143-4bdf-8e51-9907c11a25f5", "control-id": "cis_rhel10_2-4.1.4", "description": "No notes for control-id 2.4.1.4.", "props": [ @@ -10104,7 +10092,7 @@ ] }, { - "uuid": "c851e69a-e26b-4812-81ef-a5298316155e", + "uuid": "ced4188f-b3c7-43d7-9c23-6c506c53f05f", "control-id": "cis_rhel10_2-4.1.5", "description": "No notes for control-id 2.4.1.5.", "props": [ @@ -10131,7 +10119,7 @@ ] }, { - "uuid": "592d37b4-63e2-445f-85e0-5683b3a682b0", + "uuid": "db0eda7b-bd9d-426d-89cd-f278ead81c42", "control-id": "cis_rhel10_2-4.1.6", "description": "No notes for control-id 2.4.1.6.", "props": [ @@ -10158,7 +10146,7 @@ ] }, { - "uuid": "66a8ce33-9044-41f4-a81a-f37033a331a9", + "uuid": "b2ffbdbf-8593-459d-aaca-c747d506a922", "control-id": "cis_rhel10_2-4.1.7", "description": "No notes for control-id 2.4.1.7.", "props": [ @@ -10185,7 +10173,7 @@ ] }, { - "uuid": "f81e8cff-2c37-4fb0-8238-dc624d18dbb8", + "uuid": "0aef7cb6-c9c8-494d-8d77-88deffda7c6c", "control-id": "cis_rhel10_2-4.1.8", "description": "No notes for control-id 2.4.1.8.", "props": [ @@ -10212,7 +10200,7 @@ ] }, { - "uuid": "e180d6c3-7f08-43c7-aa1e-0731a3b0a94d", + "uuid": "37ecc0b5-028b-4101-b2be-c97cc2c63e8b", "control-id": "cis_rhel10_2-4.1.9", "description": "No notes for control-id 2.4.1.9.", "props": [ @@ -10249,7 +10237,7 @@ ] }, { - "uuid": "a47fa85e-ab38-498b-b080-587a8c46bf72", + "uuid": "8066fe37-ddb8-4ba6-bf5a-96e381f830dd", "control-id": "cis_rhel10_2-4.2.1", "description": "No notes for control-id 2.4.2.1.", "props": [ @@ -10286,7 +10274,7 @@ ] }, { - "uuid": "169807fb-7244-4d16-8e98-c2dbd2a7d1fd", + "uuid": "36d9e2ee-70a8-429f-bbb8-1025a24a3780", "control-id": "cis_rhel10_3-1.1", "description": "The description for control-id cis_rhel10_3-1.1.", "props": [ @@ -10299,7 +10287,7 @@ ] }, { - "uuid": "bc8251bc-4cc8-4f5d-be91-d809a88437c5", + "uuid": "11eab2ce-de13-49c7-9df7-996129585ecb", "control-id": "cis_rhel10_3-1.2", "description": "No notes for control-id 3.1.2.", "props": [ @@ -10316,7 +10304,7 @@ ] }, { - "uuid": "156a73b9-7a92-4799-b696-4e218dda0506", + "uuid": "b3ef4ac3-4bc2-4600-b2a3-b4f97890ab52", "control-id": "cis_rhel10_3-1.3", "description": "No notes for control-id 3.1.3.", "props": [ @@ -10333,7 +10321,7 @@ ] }, { - "uuid": "97fa3a42-5066-4786-8b53-cff0d1d774ca", + "uuid": "774e5d77-07c6-498d-9d34-44c3f90d8de8", "control-id": "cis_rhel10_3-2.1", "description": "No notes for control-id 3.2.1.", "props": [ @@ -10350,7 +10338,7 @@ ] }, { - "uuid": "dc0bfb26-cf7c-445f-af75-b8dbe53748d5", + "uuid": "85a7d91a-5ec3-4a39-b9cb-4a8780e46a32", "control-id": "cis_rhel10_3-2.2", "description": "No notes for control-id 3.2.2.", "props": [ @@ -10367,7 +10355,7 @@ ] }, { - "uuid": "fcfd758d-9027-41b4-aee9-967c8385d915", + "uuid": "553c97eb-7fb1-44c0-bc14-4a20de691e4f", "control-id": "cis_rhel10_3-2.3", "description": "No notes for control-id 3.2.3.", "props": [ @@ -10384,7 +10372,7 @@ ] }, { - "uuid": "0b9e4e27-cf4b-4b45-8f89-e56c30146515", + "uuid": "082326e8-1ac6-4374-8145-91feccfca44d", "control-id": "cis_rhel10_3-2.4", "description": "No notes for control-id 3.2.4.", "props": [ @@ -10401,7 +10389,7 @@ ] }, { - "uuid": "3046799c-f49b-4f0f-9b49-e6c7cc555db9", + "uuid": "33bd072c-5c0b-4c4f-9e96-0a2205fa8c1b", "control-id": "cis_rhel10_3-2.5", "description": "No notes for control-id 3.2.5.", "props": [ @@ -10418,7 +10406,7 @@ ] }, { - "uuid": "2cbdeec5-4453-4118-a8fa-c5bebd4fccc0", + "uuid": "60c024d0-c564-4c3e-8661-cf682725da9b", "control-id": "cis_rhel10_3-2.6", "description": "No notes for control-id 3.2.6.", "props": [ @@ -10435,7 +10423,7 @@ ] }, { - "uuid": "f37ed43e-b5b5-4bd8-9848-7e9876765b3f", + "uuid": "21ad0b3c-5019-455e-85ef-a13e302991a7", "control-id": "cis_rhel10_3-3.1.2", "description": "No notes for control-id 3.3.1.2.", "props": [ @@ -10452,7 +10440,7 @@ ] }, { - "uuid": "891d82be-c871-4b09-b685-20a92577963a", + "uuid": "b6d3a503-0ed1-4516-a0c0-c8019ccf61f9", "control-id": "cis_rhel10_3-3.1.3", "description": "No notes for control-id 3.3.1.3.", "props": [ @@ -10469,7 +10457,7 @@ ] }, { - "uuid": "7ba380b0-e3bf-4379-a1c5-8a6491f18c48", + "uuid": "62f79fb8-9105-40b9-b775-b2d8f9622dfc", "control-id": "cis_rhel10_3-3.1.4", "description": "No notes for control-id 3.3.1.4.", "props": [ @@ -10486,7 +10474,7 @@ ] }, { - "uuid": "36c4021d-cdf5-4c34-b3f9-8b45adb12d00", + "uuid": "1d8af20b-829a-4ec1-b55b-fe8e0caed24e", "control-id": "cis_rhel10_3-3.1.5", "description": "No notes for control-id 3.3.1.5.", "props": [ @@ -10503,7 +10491,7 @@ ] }, { - "uuid": "650ab2d2-23ed-4a48-974e-8559c9f552b2", + "uuid": "d57885c0-024c-4a95-844a-1f1f6bc398f0", "control-id": "cis_rhel10_3-3.1.6", "description": "No notes for control-id 3.3.1.6.", "props": [ @@ -10520,7 +10508,7 @@ ] }, { - "uuid": "3f62d639-c4da-4a5a-91ee-1c85f1132cf5", + "uuid": "37830fa1-53ba-49fb-ac1f-4c711be3da4a", "control-id": "cis_rhel10_3-3.1.7", "description": "No notes for control-id 3.3.1.7.", "props": [ @@ -10537,7 +10525,7 @@ ] }, { - "uuid": "fa0f89f7-d0ce-4ef7-8f72-640679ddc36b", + "uuid": "6f3068ce-0248-4a6a-91fe-149b5a627443", "control-id": "cis_rhel10_3-3.1.8", "description": "No notes for control-id 3.3.1.8.", "props": [ @@ -10554,7 +10542,7 @@ ] }, { - "uuid": "1d7d1d51-7211-4ad4-aa4e-bc0b4e640b34", + "uuid": "734831dd-24ba-4baf-92c7-26d1aba49adb", "control-id": "cis_rhel10_3-3.1.9", "description": "No notes for control-id 3.3.1.9.", "props": [ @@ -10571,7 +10559,7 @@ ] }, { - "uuid": "4c797be4-9e44-43e7-8803-cda23fb1e81f", + "uuid": "46a92779-d0d4-417a-8302-4c06d788c94c", "control-id": "cis_rhel10_3-3.1.10", "description": "No notes for control-id 3.3.1.10.", "props": [ @@ -10588,7 +10576,7 @@ ] }, { - "uuid": "fac0a1ce-e2ae-4ec1-be5d-a1ecbc53b1ef", + "uuid": "87ac5ef8-b235-4c1d-82b7-ea5111596cf9", "control-id": "cis_rhel10_3-3.1.11", "description": "No notes for control-id 3.3.1.11.", "props": [ @@ -10605,7 +10593,7 @@ ] }, { - "uuid": "54b6bcdf-dad0-4560-9744-284e6b352752", + "uuid": "80c71f4c-c546-49e6-88b5-344bdf572f44", "control-id": "cis_rhel10_3-3.1.12", "description": "No notes for control-id 3.3.1.12.", "props": [ @@ -10622,7 +10610,7 @@ ] }, { - "uuid": "bf1242b4-c504-4738-9e0a-546954b82153", + "uuid": "4f7ca359-5c5f-44f5-9231-5b4c7dab67cb", "control-id": "cis_rhel10_3-3.1.13", "description": "No notes for control-id 3.3.1.13.", "props": [ @@ -10639,7 +10627,7 @@ ] }, { - "uuid": "3a75cb18-8055-44f1-bf06-fe061f05386f", + "uuid": "964e050c-d206-4db5-b84e-d7c1b7b8b1f1", "control-id": "cis_rhel10_3-3.1.14", "description": "No notes for control-id 3.3.1.14.", "props": [ @@ -10656,7 +10644,7 @@ ] }, { - "uuid": "68bc89cb-0fd6-4685-a982-1180f9c583bf", + "uuid": "228f5581-975a-4b83-94c5-d2f43dac28ba", "control-id": "cis_rhel10_3-3.1.15", "description": "No notes for control-id 3.3.1.15.", "props": [ @@ -10673,7 +10661,7 @@ ] }, { - "uuid": "bb63f15c-bdb1-442c-9b68-637374e8af36", + "uuid": "f0046850-605e-45df-b218-48bce52f77b3", "control-id": "cis_rhel10_3-3.1.16", "description": "No notes for control-id 3.3.1.16.", "props": [ @@ -10690,7 +10678,7 @@ ] }, { - "uuid": "c5796f13-6d58-404e-a428-d36f26263058", + "uuid": "d7743d36-2fc0-422c-a495-209d47564f47", "control-id": "cis_rhel10_3-3.1.17", "description": "No notes for control-id 3.3.1.17.", "props": [ @@ -10707,7 +10695,7 @@ ] }, { - "uuid": "bbe56ad2-aefd-417e-82cd-c9df9a026e68", + "uuid": "59a4f775-3d08-440e-9f5a-638756aaf41c", "control-id": "cis_rhel10_3-3.1.18", "description": "No notes for control-id 3.3.1.18.", "props": [ @@ -10724,7 +10712,7 @@ ] }, { - "uuid": "cfc817d4-22e1-479f-93d4-68fa67f30eca", + "uuid": "b5629edb-0f99-4678-b3db-09c16f177903", "control-id": "cis_rhel10_3-3.2.1", "description": "No notes for control-id 3.3.2.1.", "props": [ @@ -10741,7 +10729,7 @@ ] }, { - "uuid": "140c4861-f84f-44bc-87db-1db034b2a435", + "uuid": "5cc661f7-16ad-4740-a2d7-5f7480cc99cd", "control-id": "cis_rhel10_3-3.2.2", "description": "No notes for control-id 3.3.2.2.", "props": [ @@ -10758,7 +10746,7 @@ ] }, { - "uuid": "53d0644c-d021-4798-9ead-a2b1e87932a0", + "uuid": "dd54379b-23e9-4d73-9bd5-993d498b72bd", "control-id": "cis_rhel10_3-3.2.3", "description": "No notes for control-id 3.3.2.3.", "props": [ @@ -10775,7 +10763,7 @@ ] }, { - "uuid": "c8a9bf48-9123-44eb-a33e-1a175acd36a2", + "uuid": "5b271fa9-46f5-45c0-b812-fbb0bbea77f5", "control-id": "cis_rhel10_3-3.2.4", "description": "No notes for control-id 3.3.2.4.", "props": [ @@ -10792,7 +10780,7 @@ ] }, { - "uuid": "bfcc6228-65ee-4cbd-ada6-c9ae2c76e343", + "uuid": "7a8d4ed3-4991-4256-b1bc-a33344e264c0", "control-id": "cis_rhel10_3-3.2.5", "description": "No notes for control-id 3.3.2.5.", "props": [ @@ -10809,7 +10797,7 @@ ] }, { - "uuid": "d84d27e5-2b13-43aa-8cbb-43c326ea437d", + "uuid": "d3b2ff64-931d-46f8-a607-6869fb4cdbad", "control-id": "cis_rhel10_3-3.2.6", "description": "No notes for control-id 3.3.2.6.", "props": [ @@ -10826,7 +10814,7 @@ ] }, { - "uuid": "a6723510-b0e9-4a7f-bd73-294948cfde2b", + "uuid": "1143bd4d-c231-4994-a4b1-6d32c2ca0958", "control-id": "cis_rhel10_3-3.2.7", "description": "No notes for control-id 3.3.2.7.", "props": [ @@ -10843,7 +10831,7 @@ ] }, { - "uuid": "2ae23adf-da20-405f-8337-f156197ad3bd", + "uuid": "bd00f6c6-cc9d-4c71-91c5-a116ec4ec0d9", "control-id": "cis_rhel10_3-3.2.8", "description": "No notes for control-id 3.3.2.8.", "props": [ @@ -10860,7 +10848,7 @@ ] }, { - "uuid": "fa4f482b-9508-4720-937a-888f7122d40f", + "uuid": "463c1323-2c67-474e-b355-531f0939bcca", "control-id": "cis_rhel10_4-1.1", "description": "No notes for control-id 4.1.1.", "props": [ @@ -10877,7 +10865,7 @@ ] }, { - "uuid": "026bac13-622e-4f92-880e-0dc4c0b439a0", + "uuid": "2797e7fa-8dc9-46b4-ad9c-f4a604458c56", "control-id": "cis_rhel10_4-1.2", "description": "No notes for control-id 4.1.2.", "props": [ @@ -10894,7 +10882,7 @@ ] }, { - "uuid": "d21c1ad0-363e-4346-8c81-e0106fd24b4e", + "uuid": "d81d8052-2608-4678-a713-7bdbdc2f234c", "control-id": "cis_rhel10_4-1.3", "description": "No notes for control-id 4.1.3.", "props": [ @@ -10911,7 +10899,7 @@ ] }, { - "uuid": "a2d1fba9-631f-4056-9ab9-7f77077f621e", + "uuid": "9b2c298e-e0e9-4bc8-b27c-fdc733f3f08f", "control-id": "cis_rhel10_4-1.4", "description": "The description for control-id cis_rhel10_4-1.4.", "props": [ @@ -10924,7 +10912,7 @@ ] }, { - "uuid": "3f2cf41a-7f97-418d-9de5-e8d2ebdca587", + "uuid": "c9d5b8f5-c15f-43e4-8293-f1eb30161df8", "control-id": "cis_rhel10_4-1.5", "description": "Firewalld in Red Hat Enterprise Linux 10 accepts loopback traffic by default.", "props": [ @@ -10941,7 +10929,7 @@ ] }, { - "uuid": "8a54e455-293d-46e4-b986-c613c798a016", + "uuid": "ec5241ad-369e-4ded-8453-dcbc5f66ff11", "control-id": "cis_rhel10_4-1.6", "description": "The description for control-id cis_rhel10_4-1.6.", "props": [ @@ -10954,7 +10942,7 @@ ] }, { - "uuid": "584c8090-a18c-4f00-a1a8-ca9df4910547", + "uuid": "e941439d-18c5-4e9d-8ae7-79924fb59f9e", "control-id": "cis_rhel10_4-1.7", "description": "The description for control-id cis_rhel10_4-1.7.", "props": [ @@ -10967,7 +10955,7 @@ ] }, { - "uuid": "d5b4085e-ef9c-4342-a1f5-8968e090519c", + "uuid": "595b06d8-67a9-4a47-8e33-0b9093bdce41", "control-id": "cis_rhel10_5-1.1", "description": "No notes for control-id 5.1.1.", "props": [ @@ -11024,7 +11012,7 @@ ] }, { - "uuid": "98de5e63-0036-4346-992e-68e06254f705", + "uuid": "80660582-e817-47ba-aee4-e14eac96dfa8", "control-id": "cis_rhel10_5-1.2", "description": "No notes for control-id 5.1.2.", "props": [ @@ -11051,7 +11039,7 @@ ] }, { - "uuid": "4a33c0dd-28c8-46d7-bf1c-74a6a36bf1c9", + "uuid": "f0093bbb-8f27-4c01-9110-083d0aeb7f79", "control-id": "cis_rhel10_5-1.3", "description": "No notes for control-id 5.1.3.", "props": [ @@ -11078,7 +11066,7 @@ ] }, { - "uuid": "db98facd-4449-48f4-aa04-d4e22f5c93b8", + "uuid": "00ec1471-d041-4644-9c1c-ea4232ea57db", "control-id": "cis_rhel10_5-1.4", "description": "No notes for control-id 5.1.4.", "props": [ @@ -11095,7 +11083,7 @@ ] }, { - "uuid": "3e18ab88-becb-4cdd-8bb4-24089793b6f3", + "uuid": "e2ba7898-d9f9-4d3d-bec7-d506436ba18c", "control-id": "cis_rhel10_5-1.5", "description": "No notes for control-id 5.1.5.", "props": [ @@ -11112,7 +11100,7 @@ ] }, { - "uuid": "9c1d8c84-bf01-4faa-9002-09076d5a181e", + "uuid": "a71f38e0-88d1-4926-b291-397017c4105e", "control-id": "cis_rhel10_5-1.6", "description": "No notes for control-id 5.1.6.", "props": [ @@ -11129,7 +11117,7 @@ ] }, { - "uuid": "d7b7fcfc-ed4f-405f-aa2d-523b84384310", + "uuid": "eede75ae-e4d8-42c5-ad29-8ee1cb245a62", "control-id": "cis_rhel10_5-1.7", "description": "The requirement gives an example of 45 seconds, but is flexible about the values. It is only\nnecessary to ensure there is a timeout configured in alignment to the site policy.", "props": [ @@ -11151,7 +11139,7 @@ ] }, { - "uuid": "555649b9-877a-4b26-9dda-667209a68450", + "uuid": "9f22b654-5d0f-43b1-87bc-84acea380252", "control-id": "cis_rhel10_5-1.10", "description": "No notes for control-id 5.1.10.", "props": [ @@ -11168,7 +11156,7 @@ ] }, { - "uuid": "f666fae8-41e5-44ce-82a0-bd557b7a1ece", + "uuid": "e670d5bd-33a7-443b-9b27-5749d47460fc", "control-id": "cis_rhel10_5-1.11", "description": "No notes for control-id 5.1.11.", "props": [ @@ -11185,7 +11173,7 @@ ] }, { - "uuid": "6a50655f-c11b-477f-a475-1ab2e98c7837", + "uuid": "09fb8b77-2254-47a8-b8b3-734bc7b0f9b0", "control-id": "cis_rhel10_5-1.12", "description": "The description for control-id cis_rhel10_5-1.12.", "props": [ @@ -11203,7 +11191,7 @@ ] }, { - "uuid": "d01ec016-1a23-4f64-980a-49f71a7e1fde", + "uuid": "5feb8dae-a478-404b-bb96-c773e1a826ae", "control-id": "cis_rhel10_5-1.13", "description": "No notes for control-id 5.1.13.", "props": [ @@ -11220,7 +11208,7 @@ ] }, { - "uuid": "6db9bb26-acc2-47c9-a9b3-91b08b733bce", + "uuid": "f6e934a8-1767-4631-b86b-a59e480ae06c", "control-id": "cis_rhel10_5-1.14", "description": "The CIS benchmark is not opinionated about which loglevel is selected here. Here, this\nprofile uses VERBOSE by default, as it allows for the capture of login and logout activity\nas well as key fingerprints.", "props": [ @@ -11237,7 +11225,7 @@ ] }, { - "uuid": "6829448e-23ad-4a5a-833c-7f20b060a873", + "uuid": "30fd1229-1663-4a54-81a1-ef399182b55d", "control-id": "cis_rhel10_5-1.15", "description": "No notes for control-id 5.1.15.", "props": [ @@ -11254,7 +11242,7 @@ ] }, { - "uuid": "1222996d-2fd1-43f2-ac2c-28bd848beb5e", + "uuid": "c6fc3c56-64f6-4fc3-8ee3-98085350c645", "control-id": "cis_rhel10_5-1.16", "description": "No notes for control-id 5.1.16.", "props": [ @@ -11271,7 +11259,7 @@ ] }, { - "uuid": "67b9746d-6c75-4f9e-8a16-ca82b32e7b5d", + "uuid": "c0e12709-5436-4084-aa15-6747b8dc9e3e", "control-id": "cis_rhel10_5-1.17", "description": "No notes for control-id 5.1.17.", "props": [ @@ -11288,7 +11276,7 @@ ] }, { - "uuid": "89fcd82b-39fa-4dcd-8854-c080b400974a", + "uuid": "4ada20c0-98fa-4384-839a-92667a0cfcd3", "control-id": "cis_rhel10_5-1.18", "description": "No notes for control-id 5.1.18.", "props": [ @@ -11305,7 +11293,7 @@ ] }, { - "uuid": "aee5d649-082c-48fc-9297-718321c9e3c6", + "uuid": "ccc83bce-d830-4e99-9203-b7e602d9394b", "control-id": "cis_rhel10_5-1.19", "description": "No notes for control-id 5.1.19.", "props": [ @@ -11322,7 +11310,7 @@ ] }, { - "uuid": "cedb5260-9fdc-4e36-ab1e-26639f50da8b", + "uuid": "9b308bc7-d1a6-490c-ac03-9e3e1b39325c", "control-id": "cis_rhel10_5-1.20", "description": "No notes for control-id 5.1.20.", "props": [ @@ -11339,7 +11327,7 @@ ] }, { - "uuid": "e3a35d1e-cbed-4c48-8c1a-b6f5ac9ab682", + "uuid": "cc57d633-5506-4176-9162-354817463228", "control-id": "cis_rhel10_5-1.21", "description": "No notes for control-id 5.1.21.", "props": [ @@ -11356,7 +11344,7 @@ ] }, { - "uuid": "bf4697ef-4cbf-4d83-a5f9-3500ec6affd1", + "uuid": "b6f87104-5f39-4ecc-9450-801ba3a9942c", "control-id": "cis_rhel10_5-1.22", "description": "No notes for control-id 5.1.22.", "props": [ @@ -11373,7 +11361,7 @@ ] }, { - "uuid": "81d9eef7-0f31-49cf-aa3d-fc857043a5cc", + "uuid": "73ede37a-208f-484f-bd6c-cc190aff92b2", "control-id": "cis_rhel10_5-2.1", "description": "No notes for control-id 5.2.1.", "props": [ @@ -11390,7 +11378,7 @@ ] }, { - "uuid": "81c3034b-3e3b-41e1-8ca1-558b1a1fe928", + "uuid": "bed337f3-4b16-47e1-a225-f5adf299b1a5", "control-id": "cis_rhel10_5-2.2", "description": "No notes for control-id 5.2.2.", "props": [ @@ -11407,7 +11395,7 @@ ] }, { - "uuid": "406c7f15-ec1e-49f7-a517-ac69f0d6ea30", + "uuid": "5388197c-ae51-4015-b649-ce46a9d81d8e", "control-id": "cis_rhel10_5-2.3", "description": "No notes for control-id 5.2.3.", "props": [ @@ -11424,7 +11412,7 @@ ] }, { - "uuid": "a1ebb41a-f554-4628-a1ea-931f3cf8a611", + "uuid": "66953dca-212d-4f91-b528-d82cef22d9b3", "control-id": "cis_rhel10_5-2.5", "description": "No notes for control-id 5.2.5.", "props": [ @@ -11441,7 +11429,7 @@ ] }, { - "uuid": "5f02b4af-2d53-4c06-8027-ad2e7e11c8f1", + "uuid": "1b7f465d-394f-4d24-98ec-ea481d1ff637", "control-id": "cis_rhel10_5-2.6", "description": "No notes for control-id 5.2.6.", "props": [ @@ -11458,7 +11446,7 @@ ] }, { - "uuid": "17e27a35-f4be-46f0-978a-f6277dc7a6bc", + "uuid": "8df35742-7ebc-4af6-a86f-6d6c394e291f", "control-id": "cis_rhel10_5-2.7", "description": "Members of \"wheel\" or GID 0 groups are checked by default if the group option is not set for\npam_wheel.so module. The recommendation states the group should be empty to reinforce the\nuse of \"sudo\" for privileged access. Therefore, members of these groups should be manually\nchecked or a different group should be informed.", "props": [ @@ -11480,7 +11468,7 @@ ] }, { - "uuid": "8433ee76-1555-4f20-b155-03f68735e122", + "uuid": "fe281125-aeae-438e-8efe-11efc88f464b", "control-id": "cis_rhel10_5-3.1.1", "description": "This requirement is hard to be automated without any specific requirement. The policy even\nstates that provided commands are examples, other custom settings might be in place and the\nsettings might be different depending on site policies. The other rules will already make\nsure there is a correct autheselect profile regardless of the existing settings. It is\nnecessary to better discuss with CIS Community.", "props": [ @@ -11492,7 +11480,7 @@ ] }, { - "uuid": "a9505f86-b520-4317-9023-df67272267e0", + "uuid": "3e4ffca2-cce0-4a0c-b80d-bb235f38a813", "control-id": "cis_rhel10_5-3.1.2", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.1.", "props": [ @@ -11514,7 +11502,7 @@ ] }, { - "uuid": "0468f3d3-fa00-4f75-ba34-072ef05be793", + "uuid": "93a23b9e-e6ea-4a1b-bdcc-b5136ec8f66c", "control-id": "cis_rhel10_5-3.1.3", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.2.", "props": [ @@ -11541,7 +11529,7 @@ ] }, { - "uuid": "d0662761-61c9-4ad2-aec1-b7bcb9ff6da8", + "uuid": "088761c7-7a1d-4e79-87d8-fe502bef00e3", "control-id": "cis_rhel10_5-3.1.4", "description": "The module is properly enabled by the rules mentioned in related_rules.\nRequirements in 5.3.2.3 use these rules.", "props": [ @@ -11553,7 +11541,7 @@ ] }, { - "uuid": "c45c3394-da10-42c0-89f2-9203101b32c3", + "uuid": "ffa67854-934f-4a25-8722-09c0a99ecd44", "control-id": "cis_rhel10_5-3.1.5", "description": "No notes for control-id 5.3.1.5.", "props": [ @@ -11570,7 +11558,7 @@ ] }, { - "uuid": "cd143ba9-78a6-4cfb-a685-4c68ceba0ba2", + "uuid": "3fa31149-22dc-433a-9c0a-3aef62f1cb12", "control-id": "cis_rhel10_5-3.2.1.1", "description": "No notes for control-id 5.3.2.1.1.", "props": [ @@ -11587,7 +11575,7 @@ ] }, { - "uuid": "c17e00aa-da13-4eb7-bf4c-12ec964fb614", + "uuid": "e549c0a3-e4ec-4e88-a695-c626bcd99afb", "control-id": "cis_rhel10_5-3.2.1.2", "description": "The policy also accepts value 0, which means the locked accounts should be manually unlocked\nby an administrator. However, it also mentions that using value 0 can facilitate a DoS\nattack to legitimate users.", "props": [ @@ -11604,7 +11592,7 @@ ] }, { - "uuid": "380ad109-f246-4d9f-a865-62b9ddc99b48", + "uuid": "6e97de6f-2a24-4f2a-aead-d6ed3019905d", "control-id": "cis_rhel10_5-3.2.2.1", "description": "No notes for control-id 5.3.2.2.1.", "props": [ @@ -11621,7 +11609,7 @@ ] }, { - "uuid": "9b24eb80-8373-4695-969c-5e2092952b7b", + "uuid": "af905c1a-932b-430c-b4ba-8c9be98d5571", "control-id": "cis_rhel10_5-3.2.2.2", "description": "No notes for control-id 5.3.2.2.2.", "props": [ @@ -11638,7 +11626,7 @@ ] }, { - "uuid": "9ba03abf-34b1-4f94-89d9-8e99c0da3452", + "uuid": "2aba8719-bfcd-42d0-a4ae-0013f2083d08", "control-id": "cis_rhel10_5-3.2.2.3", "description": "This requirement is expected to be manual. However, in previous versions of the policy\nit was already automated the configuration of \"minclass\" option. This posture was kept for\nRHEL 10 in this new version. Rules related to other options are informed in related_rules.\nIn short, minclass=4 alone can achieve the same result achieved by the combination of the\nother 4 options mentioned in the policy.", "props": [ @@ -11655,7 +11643,7 @@ ] }, { - "uuid": "a55af814-741f-40df-a7aa-3faa8b767990", + "uuid": "e8022e29-b215-46c0-aa2d-003caa0398a9", "control-id": "cis_rhel10_5-3.2.2.4", "description": "No notes for control-id 5.3.2.2.4.", "props": [ @@ -11672,7 +11660,7 @@ ] }, { - "uuid": "9ffd9f07-469c-44da-8699-4ccce9f0e1af", + "uuid": "a5785077-a1a3-46ea-b4fe-329a16177bc4", "control-id": "cis_rhel10_5-3.2.2.5", "description": "No notes for control-id 5.3.2.2.5.", "props": [ @@ -11689,7 +11677,7 @@ ] }, { - "uuid": "81fac593-7702-450f-8cf0-ff51c1feb424", + "uuid": "25a22d57-8abe-4ae7-bdb4-c482a383f196", "control-id": "cis_rhel10_5-3.2.2.6", "description": "No notes for control-id 5.3.2.2.6.", "props": [ @@ -11706,7 +11694,7 @@ ] }, { - "uuid": "db59aeac-2e98-4a90-be0c-5adf0811e149", + "uuid": "4815590f-7b79-4cfd-8cf1-1a318f8db44f", "control-id": "cis_rhel10_5-3.2.2.7", "description": "No notes for control-id 5.3.2.2.7.", "props": [ @@ -11723,7 +11711,7 @@ ] }, { - "uuid": "d38effcb-e2d9-4da6-8800-6da6bf68f315", + "uuid": "d4c4776b-6638-4275-b2c4-3f934f095b34", "control-id": "cis_rhel10_5-3.2.3.1", "description": "Although mentioned in the section 5.3.3.3, there is no explicit requirement to configure\nretry option of pam_pwhistory. If come in the future, the rule accounts_password_pam_retry\ncan be used.", "props": [ @@ -11745,7 +11733,7 @@ ] }, { - "uuid": "9a7f717f-3889-4393-8f44-7c76bd59f680", + "uuid": "d6b61c82-28d6-4f97-9d42-d66e4d32bfc7", "control-id": "cis_rhel10_5-3.2.3.2", "description": "No notes for control-id 5.3.2.3.2.", "props": [ @@ -11762,7 +11750,7 @@ ] }, { - "uuid": "ee14fb27-0ee2-4eea-bf8f-9f09adbd87c0", + "uuid": "dc8750d6-72a6-4272-a6d8-68aef574cc50", "control-id": "cis_rhel10_5-3.2.3.3", "description": "In RHEL 10 pam_pwhistory is enabled via authselect feature, as required in 5.3.1.4. The\nfeature automatically set \"use_authok\" option. In any case, we don't have a rule to check\nthis option specifically.", "props": [ @@ -11779,7 +11767,7 @@ ] }, { - "uuid": "64a6adcd-c4e2-4c76-b6fa-53a94e342c93", + "uuid": "2e769f33-113d-477b-b3a4-663e1f2d95e7", "control-id": "cis_rhel10_5-3.2.4.1", "description": "The rule more specifically used in this requirement also satify the requirement 5.3.1.5.", "props": [ @@ -11796,7 +11784,7 @@ ] }, { - "uuid": "45212d0e-c115-40ea-b61f-20259bf865c9", + "uuid": "8e3c7628-595c-4fc5-a3fe-83f8d61d5c9a", "control-id": "cis_rhel10_5-3.2.4.2", "description": "Usage of pam_unix.so module together with \"remember\" option is deprecated and is not\nrecommended by this policy. Instead, it should be used remember option of pam_pwhistory\nmodule, as required in 5.3.2.3.1. See here for more details about pam_unix.so:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1778929", "props": [ @@ -11813,7 +11801,7 @@ ] }, { - "uuid": "d4d8e7b5-d95e-4ff5-80b8-4a074a4c77b2", + "uuid": "a08945f4-3518-4ba1-85cd-7de255dc3ec7", "control-id": "cis_rhel10_5-3.2.4.3", "description": "Changes in logindefs mentioned in this requirement are more specifically covered by 5.4.1.4", "props": [ @@ -11835,7 +11823,7 @@ ] }, { - "uuid": "c6178f0f-6471-4825-86bb-162367d1db01", + "uuid": "261c02c7-3d61-46e8-9749-d1acb5c5afe4", "control-id": "cis_rhel10_5-3.2.4.4", "description": "In RHEL 10 pam_unix is enabled by default in all authselect profiles already with the\nuse_authtok option set. In any case, we don't have a rule to check this option specifically,\nlike in 5.3.2.3.3.", "props": [ @@ -11852,7 +11840,7 @@ ] }, { - "uuid": "2d45a09c-0043-496d-8f04-25d36f6ee467", + "uuid": "73f61564-bd7e-48c5-aa12-b338489a708c", "control-id": "cis_rhel10_5-4.1.1", "description": "No notes for control-id 5.4.1.1.", "props": [ @@ -11874,7 +11862,7 @@ ] }, { - "uuid": "9f09e11c-95bd-4283-a57f-5a398cdffb80", + "uuid": "eb90cd36-3870-4384-949f-23dbb8418d12", "control-id": "cis_rhel10_5-4.1.3", "description": "No notes for control-id 5.4.1.3.", "props": [ @@ -11896,20 +11884,15 @@ ] }, { - "uuid": "14ec3ce7-8af9-4aef-b011-3b73ab325a61", + "uuid": "5b31fabe-64d6-4c4f-90dd-142feb24d39e", "control-id": "cis_rhel10_5-4.1.4", - "description": "There's a \"new\" set of options in /etc/login.defs file to define the number of iterations\nperformed during the hashing process.", + "description": "No notes for control-id 5.4.1.4.", "props": [ { "name": "implementation-status", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "implemented" }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_libuserconf" - }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", @@ -11918,7 +11901,7 @@ ] }, { - "uuid": "e6ba5638-b7cd-4a8a-9e4f-dd48312acbad", + "uuid": "974a5ed4-e5dc-471c-95a8-ef1c8978b195", "control-id": "cis_rhel10_5-4.1.5", "description": "No notes for control-id 5.4.1.5.", "props": [ @@ -11940,7 +11923,7 @@ ] }, { - "uuid": "7b348288-896b-458b-946c-b300fee7d7ee", + "uuid": "b827f2ed-6cf7-43e4-8e36-e84d86c3b6a0", "control-id": "cis_rhel10_5-4.1.6", "description": "No notes for control-id 5.4.1.6.", "props": [ @@ -11957,7 +11940,7 @@ ] }, { - "uuid": "f448c907-59c1-4777-ad22-ad2f1d25f112", + "uuid": "7920d0e9-1e7d-4e60-90d9-ad08f8f5e37e", "control-id": "cis_rhel10_5-4.2.1", "description": "No notes for control-id 5.4.2.1.", "props": [ @@ -11974,7 +11957,7 @@ ] }, { - "uuid": "de0668d9-3530-48f8-98af-4737a6298cc3", + "uuid": "11f5718e-7bec-491d-ac6f-76e966cdb7e0", "control-id": "cis_rhel10_5-4.2.2", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -11991,7 +11974,7 @@ ] }, { - "uuid": "6ec30d78-5282-4fc7-9593-b35e5199e97c", + "uuid": "d33a3af7-bc37-4bdb-b727-b243927dfeb2", "control-id": "cis_rhel10_5-4.2.3", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -12008,7 +11991,7 @@ ] }, { - "uuid": "ff6de686-e28d-481f-bcc4-32d939aa8fe1", + "uuid": "f0a185a5-4c97-43b7-8577-d946d0d7de8b", "control-id": "cis_rhel10_5-4.2.4", "description": "No notes for control-id 5.4.2.4.", "props": [ @@ -12025,7 +12008,7 @@ ] }, { - "uuid": "b62b8d41-ef29-4f61-9c4a-6a69bf8dce44", + "uuid": "e3c0fb36-97e0-4c4a-86a0-7475bb3c774c", "control-id": "cis_rhel10_5-4.2.5", "description": "No notes for control-id 5.4.2.5.", "props": [ @@ -12047,7 +12030,7 @@ ] }, { - "uuid": "04c78af4-cd4d-481d-8a4e-966c66457c7d", + "uuid": "a0a4eb20-5659-41eb-beac-22ae44b29200", "control-id": "cis_rhel10_5-4.2.6", "description": "No notes for control-id 5.4.2.6.", "props": [ @@ -12064,7 +12047,7 @@ ] }, { - "uuid": "efc49d1b-2a30-4436-af46-f61c7cd35d13", + "uuid": "65053a07-a48d-4e7d-aaf4-b9d234f08b9d", "control-id": "cis_rhel10_5-4.2.7", "description": "No notes for control-id 5.4.2.7.", "props": [ @@ -12086,7 +12069,7 @@ ] }, { - "uuid": "42a6fddc-4c22-4d46-a0dd-57dca05f30bf", + "uuid": "9cb23672-6090-4b00-836d-ee7a2bf4918d", "control-id": "cis_rhel10_5-4.2.8", "description": "No notes for control-id 5.4.2.8.", "props": [ @@ -12103,7 +12086,7 @@ ] }, { - "uuid": "43498f47-7561-4c22-8f92-f954b31d9dd7", + "uuid": "d18c1237-c37b-41f0-bc86-9740b922611a", "control-id": "cis_rhel10_5-4.3.2", "description": "No notes for control-id 5.4.3.2.", "props": [ @@ -12120,7 +12103,7 @@ ] }, { - "uuid": "848e62dc-fa4f-4af2-844f-c90d9307648d", + "uuid": "7ead4e89-6299-443e-93ca-6553735ae1a7", "control-id": "cis_rhel10_5-4.3.3", "description": "No notes for control-id 5.4.3.3.", "props": [ @@ -12147,7 +12130,7 @@ ] }, { - "uuid": "c4187101-277c-4e16-9659-fd908a047599", + "uuid": "61928651-9b89-408d-a88a-6db39e50ab3e", "control-id": "cis_rhel10_6-1.1", "description": "No notes for control-id 6.1.1.", "props": [ @@ -12169,7 +12152,7 @@ ] }, { - "uuid": "8aa3f0ff-f6b9-49c1-87d5-d10336b52da6", + "uuid": "c1309766-35e9-4a43-9567-9762729f3c35", "control-id": "cis_rhel10_6-1.2", "description": "No notes for control-id 6.1.2.", "props": [ @@ -12186,7 +12169,7 @@ ] }, { - "uuid": "d97d9a12-69cd-4b56-9f3e-7112c5d535a7", + "uuid": "a445d657-95a8-44a8-8aec-aa6749af2faa", "control-id": "cis_rhel10_6-1.3", "description": "No notes for control-id 6.1.3.", "props": [ @@ -12203,7 +12186,7 @@ ] }, { - "uuid": "31e38ddd-f2da-4b7e-af4d-aaf8f4197b19", + "uuid": "1efb8c33-399d-4f08-8edc-326617487e35", "control-id": "cis_rhel10_6-2.1.1", "description": "No notes for control-id 6.2.1.1.", "props": [ @@ -12220,7 +12203,7 @@ ] }, { - "uuid": "a32abe66-dd6d-40e5-ac84-203c639aa571", + "uuid": "3615e6a8-9475-440e-941c-481ecd7b8586", "control-id": "cis_rhel10_6-2.1.2", "description": "The description for control-id cis_rhel10_6-2.1.2.", "props": [ @@ -12233,7 +12216,7 @@ ] }, { - "uuid": "13af8f51-6453-48e2-a477-42c2bf9882bc", + "uuid": "86f43ca0-e587-45a5-872d-7b81534b4bf2", "control-id": "cis_rhel10_6-2.1.3", "description": "The description for control-id cis_rhel10_6-2.1.3.", "props": [ @@ -12246,7 +12229,7 @@ ] }, { - "uuid": "02724586-71c7-4d47-89c6-a50666f03f4e", + "uuid": "1c0184b0-a655-4c7f-9ad6-58f46ff7aa72", "control-id": "cis_rhel10_6-2.1.4", "description": "No notes for control-id 6.2.1.4.", "props": [ @@ -12263,7 +12246,7 @@ ] }, { - "uuid": "a40dcf49-e890-4a51-8ed2-fdcf610a9ef1", + "uuid": "98f2ce1c-bf51-4618-b7e5-b1a278fd30d7", "control-id": "cis_rhel10_6-2.2.1.1", "description": "No notes for control-id 6.2.2.1.1.", "props": [ @@ -12280,7 +12263,7 @@ ] }, { - "uuid": "b2635735-12ad-459d-9363-cc6837834ed9", + "uuid": "5ec1dda2-96b6-4d6d-b2e4-2ba27d8ff97b", "control-id": "cis_rhel10_6-2.2.1.2", "description": "The description for control-id cis_rhel10_6-2.2.1.2.", "props": [ @@ -12293,7 +12276,7 @@ ] }, { - "uuid": "c488cb76-46ea-43b5-8f23-8e033334af22", + "uuid": "428de4e5-1f38-49c5-8806-8ff828c104d0", "control-id": "cis_rhel10_6-2.2.1.3", "description": "No notes for control-id 6.2.2.1.3.", "props": [ @@ -12310,7 +12293,7 @@ ] }, { - "uuid": "f201fbf0-f11d-4898-acaf-fac5e25a6588", + "uuid": "22313a48-1114-44d2-bcaf-7eaccc2e5177", "control-id": "cis_rhel10_6-2.2.1.4", "description": "No notes for control-id 6.2.2.1.4.", "props": [ @@ -12327,7 +12310,7 @@ ] }, { - "uuid": "cf39d769-6b7b-474d-96cf-d1deb04c743f", + "uuid": "386cb86d-aa4c-4477-a175-21f08b2f5c4f", "control-id": "cis_rhel10_6-2.2.2", "description": "No notes for control-id 6.2.2.2.", "props": [ @@ -12344,7 +12327,7 @@ ] }, { - "uuid": "08eb4f46-3d2f-4224-9922-771e551ba173", + "uuid": "362e8a54-36dc-4d0d-88d2-506fcc30cd69", "control-id": "cis_rhel10_6-2.2.3", "description": "No notes for control-id 6.2.2.3.", "props": [ @@ -12361,7 +12344,7 @@ ] }, { - "uuid": "7a39d435-24c3-4fa3-8367-ef1b1003145d", + "uuid": "0879f68f-652f-46c5-a333-dd4517801cb2", "control-id": "cis_rhel10_6-2.2.4", "description": "No notes for control-id 6.2.2.4.", "props": [ @@ -12378,7 +12361,7 @@ ] }, { - "uuid": "0a4b4fc3-c975-45d3-9c23-66ca2a2d652a", + "uuid": "a55dc5a6-c61c-433e-af32-2a563ae67947", "control-id": "cis_rhel10_6-2.3.1", "description": "No notes for control-id 6.2.3.1.", "props": [ @@ -12390,7 +12373,7 @@ ] }, { - "uuid": "95c5d94d-a5fe-4fbc-bb7b-11a77349d826", + "uuid": "9f637e44-14ad-40ac-aff2-5ac68aa02577", "control-id": "cis_rhel10_6-2.3.2", "description": "No notes for control-id 6.2.3.2.", "props": [ @@ -12402,7 +12385,7 @@ ] }, { - "uuid": "4e1bc584-1c74-4759-aca0-113cdf1f2e39", + "uuid": "9acbfb4e-067d-4173-b55f-ceb620052906", "control-id": "cis_rhel10_6-2.3.3", "description": "No notes for control-id 6.2.3.3.", "props": [ @@ -12414,7 +12397,7 @@ ] }, { - "uuid": "ed292ee8-5999-402e-955d-ee08ef80802c", + "uuid": "1a77bce8-5ed3-4063-95fb-0f9f025c1b0d", "control-id": "cis_rhel10_6-2.3.4", "description": "No notes for control-id 6.2.3.4.", "props": [ @@ -12426,7 +12409,7 @@ ] }, { - "uuid": "3e7f34f3-0571-4de6-a084-441bf76b70af", + "uuid": "12891ee1-a1d7-498e-bbb5-8976b20a3378", "control-id": "cis_rhel10_6-2.3.5", "description": "The description for control-id cis_rhel10_6-2.3.5.", "props": [ @@ -12439,7 +12422,7 @@ ] }, { - "uuid": "6e742522-abea-4449-badc-d88e9998fe37", + "uuid": "6ad00b48-9e39-4500-83db-c10c38065e8b", "control-id": "cis_rhel10_6-2.3.6", "description": "The description for control-id cis_rhel10_6-2.3.6.", "props": [ @@ -12452,7 +12435,7 @@ ] }, { - "uuid": "4d17658e-c631-4c5c-a18f-fd7b75f40ffd", + "uuid": "2c087472-5922-42f1-9f9d-0eacf29f42c7", "control-id": "cis_rhel10_6-2.3.7", "description": "No notes for control-id 6.2.3.7.", "props": [ @@ -12464,7 +12447,7 @@ ] }, { - "uuid": "57ea9385-271c-4dd2-bf97-5a6294652ec8", + "uuid": "db5be369-064b-4f23-a98e-ddd7db630f43", "control-id": "cis_rhel10_6-2.3.8", "description": "The description for control-id cis_rhel10_6-2.3.8.", "props": [ @@ -12477,7 +12460,7 @@ ] }, { - "uuid": "a9b701e6-c9ce-4e78-8641-dea53630c8bc", + "uuid": "9d599125-bd83-49aa-9fab-f0d465abf5d8", "control-id": "cis_rhel10_6-2.4.1", "description": "It is not harmful to run these rules even if rsyslog is not installed or active.", "props": [ @@ -12504,7 +12487,7 @@ ] }, { - "uuid": "07bcc97d-a8ae-4835-afcb-89cde44e1d14", + "uuid": "1d7b7bdb-c928-4724-8b19-2ecaacbd7fca", "control-id": "cis_rhel10_7-1.1", "description": "No notes for control-id 7.1.1.", "props": [ @@ -12531,7 +12514,7 @@ ] }, { - "uuid": "7dd24574-15f9-483c-aea1-aa1c9e478489", + "uuid": "d978f9e0-56b7-48b6-821e-cceac546de4c", "control-id": "cis_rhel10_7-1.2", "description": "No notes for control-id 7.1.2.", "props": [ @@ -12558,7 +12541,7 @@ ] }, { - "uuid": "275a0d77-322f-4871-a14e-f346b4f7ff8e", + "uuid": "2cfd03da-83a1-406a-a7bb-050b697df439", "control-id": "cis_rhel10_7-1.3", "description": "No notes for control-id 7.1.3.", "props": [ @@ -12585,7 +12568,7 @@ ] }, { - "uuid": "cb5aa6da-dec0-49b9-9dc3-2f574b4aa7c7", + "uuid": "fe0e1ae0-a1a6-49cf-b75d-b47b0451b84f", "control-id": "cis_rhel10_7-1.4", "description": "No notes for control-id 7.1.4.", "props": [ @@ -12612,7 +12595,7 @@ ] }, { - "uuid": "1217bf29-ef95-42a9-9cf6-9b0e31e0cf1c", + "uuid": "01320a47-18b5-4eb4-8868-1512ba58a006", "control-id": "cis_rhel10_7-1.5", "description": "No notes for control-id 7.1.5.", "props": [ @@ -12639,7 +12622,7 @@ ] }, { - "uuid": "35e04c12-f837-445b-a87a-1bed93715193", + "uuid": "16a8a345-35cd-42b7-bf0d-6dbdfc36dc69", "control-id": "cis_rhel10_7-1.6", "description": "No notes for control-id 7.1.6.", "props": [ @@ -12666,7 +12649,7 @@ ] }, { - "uuid": "e8bb18fa-fb65-4ad7-84ec-1739a3fbf913", + "uuid": "8b55569c-4fa1-412a-afd4-e2247cea26c0", "control-id": "cis_rhel10_7-1.7", "description": "No notes for control-id 7.1.7.", "props": [ @@ -12693,7 +12676,7 @@ ] }, { - "uuid": "d02ae39a-1f12-4f6e-80a9-8da04ec7b1a5", + "uuid": "726360e6-2da7-4028-8fa2-d4f73f10494b", "control-id": "cis_rhel10_7-1.8", "description": "No notes for control-id 7.1.8.", "props": [ @@ -12720,7 +12703,7 @@ ] }, { - "uuid": "1fafda91-ea42-485f-bd4d-1ccca463227e", + "uuid": "4def5b71-138c-4348-98ab-294b4a353bbd", "control-id": "cis_rhel10_7-1.9", "description": "No notes for control-id 7.1.9.", "props": [ @@ -12747,7 +12730,7 @@ ] }, { - "uuid": "09620294-676a-4ca7-8ac9-c4da2500d30b", + "uuid": "72f6590e-1dfd-452a-8158-37627728beeb", "control-id": "cis_rhel10_7-1.10", "description": "No notes for control-id 7.1.10.", "props": [ @@ -12789,7 +12772,7 @@ ] }, { - "uuid": "8cd4fbf7-b16f-4223-add5-c2c6f5550eaa", + "uuid": "b35153fa-4fe6-4e53-8ffe-f9767da8f3da", "control-id": "cis_rhel10_7-1.11", "description": "No notes for control-id 7.1.11.", "props": [ @@ -12811,7 +12794,7 @@ ] }, { - "uuid": "8573b063-bfe6-445f-9054-5d65bd3af797", + "uuid": "2073a701-0d18-432d-9622-6cf8e910956c", "control-id": "cis_rhel10_7-1.12", "description": "No notes for control-id 7.1.12.", "props": [ @@ -12833,7 +12816,7 @@ ] }, { - "uuid": "a549ccbb-3277-4718-bc8b-08a85eb79917", + "uuid": "fe49782a-d7e0-4f0b-889f-6fd6e558c759", "control-id": "cis_rhel10_7-1.13", "description": "The description for control-id cis_rhel10_7-1.13.", "props": [ @@ -12846,7 +12829,7 @@ ] }, { - "uuid": "0dd7677d-d867-4823-a564-765f0531a3c1", + "uuid": "a08fe880-707f-4564-b567-a4a1f5d4ebb3", "control-id": "cis_rhel10_7-2.1", "description": "No notes for control-id 7.2.1.", "props": [ @@ -12863,7 +12846,7 @@ ] }, { - "uuid": "66384a0a-1dfe-48f9-8190-140c58d223e9", + "uuid": "f893d374-438e-4236-9a5c-bd93f18e1823", "control-id": "cis_rhel10_7-2.2", "description": "No notes for control-id 7.2.2.", "props": [ @@ -12880,7 +12863,7 @@ ] }, { - "uuid": "ffbaae4b-490c-4da2-80c7-5f0060708ae8", + "uuid": "56ab7f4c-4c45-47f3-92b8-00be105a587d", "control-id": "cis_rhel10_7-2.3", "description": "No notes for control-id 7.2.3.", "props": [ @@ -12897,7 +12880,7 @@ ] }, { - "uuid": "fbd8273f-7108-41ad-a936-db2d23796c45", + "uuid": "5e95b492-4165-4001-9347-9fabf0b73fba", "control-id": "cis_rhel10_7-2.4", "description": "No notes for control-id 7.2.4.", "props": [ @@ -12914,7 +12897,7 @@ ] }, { - "uuid": "9d98730f-bc46-4795-a544-b0d1cb73adae", + "uuid": "cfab5b4c-a95c-4ec4-b39f-38c8a8713818", "control-id": "cis_rhel10_7-2.5", "description": "No notes for control-id 7.2.5.", "props": [ @@ -12931,7 +12914,7 @@ ] }, { - "uuid": "f32512d4-2f88-4afd-a61a-b35422a0589b", + "uuid": "36ae5710-3e62-428b-bf49-fa75dc188318", "control-id": "cis_rhel10_7-2.6", "description": "No notes for control-id 7.2.6.", "props": [ @@ -12948,7 +12931,7 @@ ] }, { - "uuid": "0945f568-7fe9-4616-a26f-3ad40dfa6a4e", + "uuid": "c70e39c8-f4e4-4964-995e-f76f30ffaf9d", "control-id": "cis_rhel10_7-2.7", "description": "No notes for control-id 7.2.7.", "props": [ @@ -12965,7 +12948,7 @@ ] }, { - "uuid": "3a891c04-3690-4bac-976d-670adaabfc82", + "uuid": "a47dda31-e0af-4cb3-8a24-3dd8077fec22", "control-id": "cis_rhel10_7-2.8", "description": "No notes for control-id 7.2.8.", "props": [ @@ -12992,7 +12975,7 @@ ] }, { - "uuid": "6e3ed890-bb7d-4db7-b3aa-d60f642e2ba9", + "uuid": "25cf10bc-d6d7-4cc3-ba69-34010a137b2f", "control-id": "cis_rhel10_7-2.9", "description": "No notes for control-id 7.2.9.", "props": [ @@ -13938,7 +13921,7 @@ { "name": "Parameter_Value_Alternatives_47", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -13956,7 +13939,7 @@ { "name": "Parameter_Value_Alternatives_48", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -19875,4858 +19858,4834 @@ "value": "Set Existing Passwords Warning Age", "remarks": "rule_set_233" }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_libuserconf", - "remarks": "rule_set_234" - }, - { - "name": "Rule_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Hashing Algorithm in /etc/libuser.conf", - "remarks": "rule_set_234" - }, - { - "name": "Check_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_libuserconf", - "remarks": "rule_set_234" - }, - { - "name": "Check_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Hashing Algorithm in /etc/libuser.conf", - "remarks": "rule_set_234" - }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_logindefs", - "remarks": "rule_set_235" + "remarks": "rule_set_234" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/login.defs", - "remarks": "rule_set_235" + "remarks": "rule_set_234" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_logindefs", - "remarks": "rule_set_235" + "remarks": "rule_set_234" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/login.defs", - "remarks": "rule_set_235" + "remarks": "rule_set_234" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_disable_post_pw_expiration", - "remarks": "rule_set_236" + "remarks": "rule_set_235" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Account Expiration Following Inactivity", - "remarks": "rule_set_236" + "remarks": "rule_set_235" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_disable_post_pw_expiration", - "remarks": "rule_set_236" + "remarks": "rule_set_235" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Account Expiration Following Inactivity", - "remarks": "rule_set_236" + "remarks": "rule_set_235" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_set_post_pw_existing", - "remarks": "rule_set_237" + "remarks": "rule_set_236" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set existing passwords a period of inactivity before they been locked", - "remarks": "rule_set_237" + "remarks": "rule_set_236" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_set_post_pw_existing", - "remarks": "rule_set_237" + "remarks": "rule_set_236" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set existing passwords a period of inactivity before they been locked", - "remarks": "rule_set_237" + "remarks": "rule_set_236" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_last_change_is_in_past", - "remarks": "rule_set_238" + "remarks": "rule_set_237" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure all users last password change date is in the past", - "remarks": "rule_set_238" + "remarks": "rule_set_237" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_last_change_is_in_past", - "remarks": "rule_set_238" + "remarks": "rule_set_237" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure all users last password change date is in the past", - "remarks": "rule_set_238" + "remarks": "rule_set_237" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_no_uid_except_zero", - "remarks": "rule_set_239" + "remarks": "rule_set_238" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Root Has UID 0", - "remarks": "rule_set_239" + "remarks": "rule_set_238" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_no_uid_except_zero", - "remarks": "rule_set_239" + "remarks": "rule_set_238" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Root Has UID 0", - "remarks": "rule_set_239" + "remarks": "rule_set_238" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_gid_zero", - "remarks": "rule_set_240" + "remarks": "rule_set_239" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Root Has A Primary GID 0", - "remarks": "rule_set_240" + "remarks": "rule_set_239" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_gid_zero", - "remarks": "rule_set_240" + "remarks": "rule_set_239" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Root Has A Primary GID 0", - "remarks": "rule_set_240" + "remarks": "rule_set_239" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "groups_no_zero_gid_except_root", - "remarks": "rule_set_241" + "remarks": "rule_set_240" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Group Root Has GID 0", - "remarks": "rule_set_241" + "remarks": "rule_set_240" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "groups_no_zero_gid_except_root", - "remarks": "rule_set_241" + "remarks": "rule_set_240" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Group Root Has GID 0", - "remarks": "rule_set_241" + "remarks": "rule_set_240" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_root_password_configured", - "remarks": "rule_set_242" + "remarks": "rule_set_241" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Authentication Required for Single User Mode", - "remarks": "rule_set_242" + "remarks": "rule_set_241" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_root_password_configured", - "remarks": "rule_set_242" + "remarks": "rule_set_241" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Authentication Required for Single User Mode", - "remarks": "rule_set_242" + "remarks": "rule_set_241" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_path_dirs_no_write", - "remarks": "rule_set_243" + "remarks": "rule_set_242" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include World or Group-Writable Directories", - "remarks": "rule_set_243" + "remarks": "rule_set_242" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_path_dirs_no_write", - "remarks": "rule_set_243" + "remarks": "rule_set_242" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include World or Group-Writable Directories", - "remarks": "rule_set_243" + "remarks": "rule_set_242" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "root_path_no_dot", - "remarks": "rule_set_244" + "remarks": "rule_set_243" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include Relative Paths or Null Directories", - "remarks": "rule_set_244" + "remarks": "rule_set_243" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "root_path_no_dot", - "remarks": "rule_set_244" + "remarks": "rule_set_243" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include Relative Paths or Null Directories", - "remarks": "rule_set_244" + "remarks": "rule_set_243" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_root", - "remarks": "rule_set_245" + "remarks": "rule_set_244" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Root Bash Umask is Set Correctly", - "remarks": "rule_set_245" + "remarks": "rule_set_244" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_root", - "remarks": "rule_set_245" + "remarks": "rule_set_244" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Root Bash Umask is Set Correctly", - "remarks": "rule_set_245" + "remarks": "rule_set_244" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_password_auth_for_systemaccounts", - "remarks": "rule_set_246" + "remarks": "rule_set_245" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Are Locked", - "remarks": "rule_set_246" + "remarks": "rule_set_245" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_password_auth_for_systemaccounts", - "remarks": "rule_set_246" + "remarks": "rule_set_245" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Are Locked", - "remarks": "rule_set_246" + "remarks": "rule_set_245" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_shelllogin_for_systemaccounts", - "remarks": "rule_set_247" + "remarks": "rule_set_246" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", - "remarks": "rule_set_247" + "remarks": "rule_set_246" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_shelllogin_for_systemaccounts", - "remarks": "rule_set_247" + "remarks": "rule_set_246" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", - "remarks": "rule_set_247" + "remarks": "rule_set_246" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_invalid_shell_accounts_unlocked", - "remarks": "rule_set_248" + "remarks": "rule_set_247" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Non-Interactive Accounts Are Locked", - "remarks": "rule_set_248" + "remarks": "rule_set_247" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_invalid_shell_accounts_unlocked", - "remarks": "rule_set_248" + "remarks": "rule_set_247" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Non-Interactive Accounts Are Locked", - "remarks": "rule_set_248" + "remarks": "rule_set_247" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_tmout", - "remarks": "rule_set_249" + "remarks": "rule_set_248" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Interactive Session Timeout", - "remarks": "rule_set_249" + "remarks": "rule_set_248" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_tmout", - "remarks": "rule_set_249" + "remarks": "rule_set_248" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Interactive Session Timeout", - "remarks": "rule_set_249" + "remarks": "rule_set_248" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_bashrc", - "remarks": "rule_set_250" + "remarks": "rule_set_249" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Bash Umask is Set Correctly", - "remarks": "rule_set_250" + "remarks": "rule_set_249" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_bashrc", - "remarks": "rule_set_250" + "remarks": "rule_set_249" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Bash Umask is Set Correctly", - "remarks": "rule_set_250" + "remarks": "rule_set_249" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_login_defs", - "remarks": "rule_set_251" + "remarks": "rule_set_250" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in login.defs", - "remarks": "rule_set_251" + "remarks": "rule_set_250" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_login_defs", - "remarks": "rule_set_251" + "remarks": "rule_set_250" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in login.defs", - "remarks": "rule_set_251" + "remarks": "rule_set_250" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_profile", - "remarks": "rule_set_252" + "remarks": "rule_set_251" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in /etc/profile", - "remarks": "rule_set_252" + "remarks": "rule_set_251" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_profile", - "remarks": "rule_set_252" + "remarks": "rule_set_251" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in /etc/profile", - "remarks": "rule_set_252" + "remarks": "rule_set_251" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_253" + "remarks": "rule_set_252" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_253" + "remarks": "rule_set_252" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_253" + "remarks": "rule_set_252" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_253" + "remarks": "rule_set_252" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_build_database", - "remarks": "rule_set_254" + "remarks": "rule_set_253" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Build and Test AIDE Database", - "remarks": "rule_set_254" + "remarks": "rule_set_253" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_build_database", - "remarks": "rule_set_254" + "remarks": "rule_set_253" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Build and Test AIDE Database", - "remarks": "rule_set_254" + "remarks": "rule_set_253" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_periodic_cron_checking", - "remarks": "rule_set_255" + "remarks": "rule_set_254" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Periodic Execution of AIDE", - "remarks": "rule_set_255" + "remarks": "rule_set_254" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_periodic_cron_checking", - "remarks": "rule_set_255" + "remarks": "rule_set_254" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Periodic Execution of AIDE", - "remarks": "rule_set_255" + "remarks": "rule_set_254" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_check_audit_tools", - "remarks": "rule_set_256" + "remarks": "rule_set_255" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure AIDE to Verify the Audit Tools", - "remarks": "rule_set_256" + "remarks": "rule_set_255" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_check_audit_tools", - "remarks": "rule_set_256" + "remarks": "rule_set_255" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure AIDE to Verify the Audit Tools", - "remarks": "rule_set_256" + "remarks": "rule_set_255" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journald_enabled", - "remarks": "rule_set_257" + "remarks": "rule_set_256" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journald Service", - "remarks": "rule_set_257" + "remarks": "rule_set_256" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journald_enabled", - "remarks": "rule_set_257" + "remarks": "rule_set_256" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journald Service", - "remarks": "rule_set_257" + "remarks": "rule_set_256" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_journald_and_rsyslog_not_active_together", - "remarks": "rule_set_258" + "remarks": "rule_set_257" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald and rsyslog Are Not Active Together", - "remarks": "rule_set_258" + "remarks": "rule_set_257" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_journald_and_rsyslog_not_active_together", - "remarks": "rule_set_258" + "remarks": "rule_set_257" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald and rsyslog Are Not Active Together", - "remarks": "rule_set_258" + "remarks": "rule_set_257" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_systemd-journal-remote_installed", - "remarks": "rule_set_259" + "remarks": "rule_set_258" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install systemd-journal-remote Package", - "remarks": "rule_set_259" + "remarks": "rule_set_258" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_systemd-journal-remote_installed", - "remarks": "rule_set_259" + "remarks": "rule_set_258" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install systemd-journal-remote Package", - "remarks": "rule_set_259" + "remarks": "rule_set_258" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journal-upload_enabled", - "remarks": "rule_set_260" + "remarks": "rule_set_259" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journal-upload Service", - "remarks": "rule_set_260" + "remarks": "rule_set_259" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journal-upload_enabled", - "remarks": "rule_set_260" + "remarks": "rule_set_259" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journal-upload Service", - "remarks": "rule_set_260" + "remarks": "rule_set_259" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "socket_systemd-journal-remote_disabled", - "remarks": "rule_set_261" + "remarks": "rule_set_260" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable systemd-journal-remote Socket", - "remarks": "rule_set_261" + "remarks": "rule_set_260" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "socket_systemd-journal-remote_disabled", - "remarks": "rule_set_261" + "remarks": "rule_set_260" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable systemd-journal-remote Socket", - "remarks": "rule_set_261" + "remarks": "rule_set_260" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_disable_forward_to_syslog", - "remarks": "rule_set_262" + "remarks": "rule_set_261" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald ForwardToSyslog is disabled", - "remarks": "rule_set_262" + "remarks": "rule_set_261" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_disable_forward_to_syslog", - "remarks": "rule_set_262" + "remarks": "rule_set_261" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald ForwardToSyslog is disabled", - "remarks": "rule_set_262" + "remarks": "rule_set_261" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_compress", - "remarks": "rule_set_263" + "remarks": "rule_set_262" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to compress large log files", - "remarks": "rule_set_263" + "remarks": "rule_set_262" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_compress", - "remarks": "rule_set_263" + "remarks": "rule_set_262" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to compress large log files", - "remarks": "rule_set_263" + "remarks": "rule_set_262" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_storage", - "remarks": "rule_set_264" + "remarks": "rule_set_263" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to write log files to persistent disk", - "remarks": "rule_set_264" + "remarks": "rule_set_263" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_storage", - "remarks": "rule_set_264" + "remarks": "rule_set_263" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to write log files to persistent disk", - "remarks": "rule_set_264" + "remarks": "rule_set_263" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_265" + "remarks": "rule_set_264" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_265" + "remarks": "rule_set_264" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_265" + "remarks": "rule_set_264" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_265" + "remarks": "rule_set_264" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_266" + "remarks": "rule_set_265" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_266" + "remarks": "rule_set_265" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_266" + "remarks": "rule_set_265" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_266" + "remarks": "rule_set_265" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_267" + "remarks": "rule_set_266" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_267" + "remarks": "rule_set_266" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_267" + "remarks": "rule_set_266" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_267" + "remarks": "rule_set_266" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_passwd", - "remarks": "rule_set_268" + "remarks": "rule_set_267" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns passwd File", - "remarks": "rule_set_268" + "remarks": "rule_set_267" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_passwd", - "remarks": "rule_set_268" + "remarks": "rule_set_267" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns passwd File", - "remarks": "rule_set_268" + "remarks": "rule_set_267" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_passwd", - "remarks": "rule_set_269" + "remarks": "rule_set_268" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns passwd File", - "remarks": "rule_set_269" + "remarks": "rule_set_268" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_passwd", - "remarks": "rule_set_269" + "remarks": "rule_set_268" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns passwd File", - "remarks": "rule_set_269" + "remarks": "rule_set_268" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_passwd", - "remarks": "rule_set_270" + "remarks": "rule_set_269" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on passwd File", - "remarks": "rule_set_270" + "remarks": "rule_set_269" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_passwd", - "remarks": "rule_set_270" + "remarks": "rule_set_269" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on passwd File", - "remarks": "rule_set_270" + "remarks": "rule_set_269" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_passwd", - "remarks": "rule_set_271" + "remarks": "rule_set_270" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup passwd File", - "remarks": "rule_set_271" + "remarks": "rule_set_270" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_passwd", - "remarks": "rule_set_271" + "remarks": "rule_set_270" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup passwd File", - "remarks": "rule_set_271" + "remarks": "rule_set_270" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_passwd", - "remarks": "rule_set_272" + "remarks": "rule_set_271" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup passwd File", - "remarks": "rule_set_272" + "remarks": "rule_set_271" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_passwd", - "remarks": "rule_set_272" + "remarks": "rule_set_271" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup passwd File", - "remarks": "rule_set_272" + "remarks": "rule_set_271" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_passwd", - "remarks": "rule_set_273" + "remarks": "rule_set_272" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup passwd File", - "remarks": "rule_set_273" + "remarks": "rule_set_272" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_passwd", - "remarks": "rule_set_273" + "remarks": "rule_set_272" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup passwd File", - "remarks": "rule_set_273" + "remarks": "rule_set_272" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_group", - "remarks": "rule_set_274" + "remarks": "rule_set_273" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns group File", - "remarks": "rule_set_274" + "remarks": "rule_set_273" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_group", - "remarks": "rule_set_274" + "remarks": "rule_set_273" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns group File", - "remarks": "rule_set_274" + "remarks": "rule_set_273" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_group", - "remarks": "rule_set_275" + "remarks": "rule_set_274" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns group File", - "remarks": "rule_set_275" + "remarks": "rule_set_274" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_group", - "remarks": "rule_set_275" + "remarks": "rule_set_274" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns group File", - "remarks": "rule_set_275" + "remarks": "rule_set_274" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_group", - "remarks": "rule_set_276" + "remarks": "rule_set_275" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on group File", - "remarks": "rule_set_276" + "remarks": "rule_set_275" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_group", - "remarks": "rule_set_276" + "remarks": "rule_set_275" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on group File", - "remarks": "rule_set_276" + "remarks": "rule_set_275" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_group", - "remarks": "rule_set_277" + "remarks": "rule_set_276" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup group File", - "remarks": "rule_set_277" + "remarks": "rule_set_276" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_group", - "remarks": "rule_set_277" + "remarks": "rule_set_276" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup group File", - "remarks": "rule_set_277" + "remarks": "rule_set_276" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_group", - "remarks": "rule_set_278" + "remarks": "rule_set_277" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup group File", - "remarks": "rule_set_278" + "remarks": "rule_set_277" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_group", - "remarks": "rule_set_278" + "remarks": "rule_set_277" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup group File", - "remarks": "rule_set_278" + "remarks": "rule_set_277" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_group", - "remarks": "rule_set_279" + "remarks": "rule_set_278" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup group File", - "remarks": "rule_set_279" + "remarks": "rule_set_278" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_group", - "remarks": "rule_set_279" + "remarks": "rule_set_278" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup group File", - "remarks": "rule_set_279" + "remarks": "rule_set_278" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shadow", - "remarks": "rule_set_280" + "remarks": "rule_set_279" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns shadow File", - "remarks": "rule_set_280" + "remarks": "rule_set_279" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shadow", - "remarks": "rule_set_280" + "remarks": "rule_set_279" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns shadow File", - "remarks": "rule_set_280" + "remarks": "rule_set_279" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shadow", - "remarks": "rule_set_281" + "remarks": "rule_set_280" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns shadow File", - "remarks": "rule_set_281" + "remarks": "rule_set_280" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shadow", - "remarks": "rule_set_281" + "remarks": "rule_set_280" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns shadow File", - "remarks": "rule_set_281" + "remarks": "rule_set_280" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shadow", - "remarks": "rule_set_282" + "remarks": "rule_set_281" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on shadow File", - "remarks": "rule_set_282" + "remarks": "rule_set_281" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shadow", - "remarks": "rule_set_282" + "remarks": "rule_set_281" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on shadow File", - "remarks": "rule_set_282" + "remarks": "rule_set_281" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_shadow", - "remarks": "rule_set_283" + "remarks": "rule_set_282" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup shadow File", - "remarks": "rule_set_283" + "remarks": "rule_set_282" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_shadow", - "remarks": "rule_set_283" + "remarks": "rule_set_282" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup shadow File", - "remarks": "rule_set_283" + "remarks": "rule_set_282" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_shadow", - "remarks": "rule_set_284" + "remarks": "rule_set_283" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup shadow File", - "remarks": "rule_set_284" + "remarks": "rule_set_283" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_shadow", - "remarks": "rule_set_284" + "remarks": "rule_set_283" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup shadow File", - "remarks": "rule_set_284" + "remarks": "rule_set_283" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_shadow", - "remarks": "rule_set_285" + "remarks": "rule_set_284" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup shadow File", - "remarks": "rule_set_285" + "remarks": "rule_set_284" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_shadow", - "remarks": "rule_set_285" + "remarks": "rule_set_284" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup shadow File", - "remarks": "rule_set_285" + "remarks": "rule_set_284" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_gshadow", - "remarks": "rule_set_286" + "remarks": "rule_set_285" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns gshadow File", - "remarks": "rule_set_286" + "remarks": "rule_set_285" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_gshadow", - "remarks": "rule_set_286" + "remarks": "rule_set_285" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns gshadow File", - "remarks": "rule_set_286" + "remarks": "rule_set_285" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_gshadow", - "remarks": "rule_set_287" + "remarks": "rule_set_286" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns gshadow File", - "remarks": "rule_set_287" + "remarks": "rule_set_286" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_gshadow", - "remarks": "rule_set_287" + "remarks": "rule_set_286" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns gshadow File", - "remarks": "rule_set_287" + "remarks": "rule_set_286" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_gshadow", - "remarks": "rule_set_288" + "remarks": "rule_set_287" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on gshadow File", - "remarks": "rule_set_288" + "remarks": "rule_set_287" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_gshadow", - "remarks": "rule_set_288" + "remarks": "rule_set_287" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on gshadow File", - "remarks": "rule_set_288" + "remarks": "rule_set_287" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_gshadow", - "remarks": "rule_set_289" + "remarks": "rule_set_288" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup gshadow File", - "remarks": "rule_set_289" + "remarks": "rule_set_288" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_gshadow", - "remarks": "rule_set_289" + "remarks": "rule_set_288" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup gshadow File", - "remarks": "rule_set_289" + "remarks": "rule_set_288" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_gshadow", - "remarks": "rule_set_290" + "remarks": "rule_set_289" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup gshadow File", - "remarks": "rule_set_290" + "remarks": "rule_set_289" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_gshadow", - "remarks": "rule_set_290" + "remarks": "rule_set_289" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup gshadow File", - "remarks": "rule_set_290" + "remarks": "rule_set_289" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_gshadow", - "remarks": "rule_set_291" + "remarks": "rule_set_290" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup gshadow File", - "remarks": "rule_set_291" + "remarks": "rule_set_290" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_gshadow", - "remarks": "rule_set_291" + "remarks": "rule_set_290" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup gshadow File", - "remarks": "rule_set_291" + "remarks": "rule_set_290" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shells", - "remarks": "rule_set_292" + "remarks": "rule_set_291" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/shells File", - "remarks": "rule_set_292" + "remarks": "rule_set_291" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shells", - "remarks": "rule_set_292" + "remarks": "rule_set_291" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/shells File", - "remarks": "rule_set_292" + "remarks": "rule_set_291" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shells", - "remarks": "rule_set_293" + "remarks": "rule_set_292" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Who Owns /etc/shells File", - "remarks": "rule_set_293" + "remarks": "rule_set_292" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shells", - "remarks": "rule_set_293" + "remarks": "rule_set_292" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Who Owns /etc/shells File", - "remarks": "rule_set_293" + "remarks": "rule_set_292" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shells", - "remarks": "rule_set_294" + "remarks": "rule_set_293" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/shells File", - "remarks": "rule_set_294" + "remarks": "rule_set_293" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shells", - "remarks": "rule_set_294" + "remarks": "rule_set_293" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/shells File", - "remarks": "rule_set_294" + "remarks": "rule_set_293" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd", - "remarks": "rule_set_295" + "remarks": "rule_set_294" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd File", - "remarks": "rule_set_295" + "remarks": "rule_set_294" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd", - "remarks": "rule_set_295" + "remarks": "rule_set_294" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd File", - "remarks": "rule_set_295" + "remarks": "rule_set_294" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd", - "remarks": "rule_set_296" + "remarks": "rule_set_295" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd File", - "remarks": "rule_set_296" + "remarks": "rule_set_295" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd", - "remarks": "rule_set_296" + "remarks": "rule_set_295" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd File", - "remarks": "rule_set_296" + "remarks": "rule_set_295" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd", - "remarks": "rule_set_297" + "remarks": "rule_set_296" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd File", - "remarks": "rule_set_297" + "remarks": "rule_set_296" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd", - "remarks": "rule_set_297" + "remarks": "rule_set_296" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd File", - "remarks": "rule_set_297" + "remarks": "rule_set_296" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd_old", - "remarks": "rule_set_298" + "remarks": "rule_set_297" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_298" + "remarks": "rule_set_297" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd_old", - "remarks": "rule_set_298" + "remarks": "rule_set_297" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_298" + "remarks": "rule_set_297" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd_old", - "remarks": "rule_set_299" + "remarks": "rule_set_298" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_299" + "remarks": "rule_set_298" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd_old", - "remarks": "rule_set_299" + "remarks": "rule_set_298" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_299" + "remarks": "rule_set_298" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd_old", - "remarks": "rule_set_300" + "remarks": "rule_set_299" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd.old File", - "remarks": "rule_set_300" + "remarks": "rule_set_299" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd_old", - "remarks": "rule_set_300" + "remarks": "rule_set_299" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd.old File", - "remarks": "rule_set_300" + "remarks": "rule_set_299" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_301" + "remarks": "rule_set_300" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_301" + "remarks": "rule_set_300" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_301" + "remarks": "rule_set_300" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_301" + "remarks": "rule_set_300" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_302" + "remarks": "rule_set_301" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_302" + "remarks": "rule_set_301" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_302" + "remarks": "rule_set_301" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_302" + "remarks": "rule_set_301" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_unowned_by_user", - "remarks": "rule_set_303" + "remarks": "rule_set_302" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a User", - "remarks": "rule_set_303" + "remarks": "rule_set_302" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_unowned_by_user", - "remarks": "rule_set_303" + "remarks": "rule_set_302" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a User", - "remarks": "rule_set_303" + "remarks": "rule_set_302" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_ungroupowned", - "remarks": "rule_set_304" + "remarks": "rule_set_303" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a Group", - "remarks": "rule_set_304" + "remarks": "rule_set_303" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_ungroupowned", - "remarks": "rule_set_304" + "remarks": "rule_set_303" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a Group", - "remarks": "rule_set_304" + "remarks": "rule_set_303" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_all_shadowed", - "remarks": "rule_set_305" + "remarks": "rule_set_304" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify All Account Password Hashes are Shadowed", - "remarks": "rule_set_305" + "remarks": "rule_set_304" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_all_shadowed", - "remarks": "rule_set_305" + "remarks": "rule_set_304" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify All Account Password Hashes are Shadowed", - "remarks": "rule_set_305" + "remarks": "rule_set_304" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords_etc_shadow", - "remarks": "rule_set_306" + "remarks": "rule_set_305" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure There Are No Accounts With Blank or Null Passwords", - "remarks": "rule_set_306" + "remarks": "rule_set_305" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords_etc_shadow", - "remarks": "rule_set_306" + "remarks": "rule_set_305" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure There Are No Accounts With Blank or Null Passwords", - "remarks": "rule_set_306" + "remarks": "rule_set_305" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gid_passwd_group_same", - "remarks": "rule_set_307" + "remarks": "rule_set_306" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", - "remarks": "rule_set_307" + "remarks": "rule_set_306" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gid_passwd_group_same", - "remarks": "rule_set_307" + "remarks": "rule_set_306" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", - "remarks": "rule_set_307" + "remarks": "rule_set_306" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_id", - "remarks": "rule_set_308" + "remarks": "rule_set_307" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique User IDs", - "remarks": "rule_set_308" + "remarks": "rule_set_307" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_id", - "remarks": "rule_set_308" + "remarks": "rule_set_307" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique User IDs", - "remarks": "rule_set_308" + "remarks": "rule_set_307" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_id", - "remarks": "rule_set_309" + "remarks": "rule_set_308" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group ID", - "remarks": "rule_set_309" + "remarks": "rule_set_308" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_id", - "remarks": "rule_set_309" + "remarks": "rule_set_308" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group ID", - "remarks": "rule_set_309" + "remarks": "rule_set_308" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_name", - "remarks": "rule_set_310" + "remarks": "rule_set_309" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique Names", - "remarks": "rule_set_310" + "remarks": "rule_set_309" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_name", - "remarks": "rule_set_310" + "remarks": "rule_set_309" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique Names", - "remarks": "rule_set_310" + "remarks": "rule_set_309" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_name", - "remarks": "rule_set_311" + "remarks": "rule_set_310" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group Names", - "remarks": "rule_set_311" + "remarks": "rule_set_310" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_name", - "remarks": "rule_set_311" + "remarks": "rule_set_310" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group Names", - "remarks": "rule_set_311" + "remarks": "rule_set_310" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_interactive_home_directory_exists", - "remarks": "rule_set_312" + "remarks": "rule_set_311" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive Users Home Directories Must Exist", - "remarks": "rule_set_312" + "remarks": "rule_set_311" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_interactive_home_directory_exists", - "remarks": "rule_set_312" + "remarks": "rule_set_311" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive Users Home Directories Must Exist", - "remarks": "rule_set_312" + "remarks": "rule_set_311" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_home_directories", - "remarks": "rule_set_313" + "remarks": "rule_set_312" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Be Owned By The Primary User", - "remarks": "rule_set_313" + "remarks": "rule_set_312" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_home_directories", - "remarks": "rule_set_313" + "remarks": "rule_set_312" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Be Owned By The Primary User", - "remarks": "rule_set_313" + "remarks": "rule_set_312" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_home_directories", - "remarks": "rule_set_314" + "remarks": "rule_set_313" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", - "remarks": "rule_set_314" + "remarks": "rule_set_313" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_home_directories", - "remarks": "rule_set_314" + "remarks": "rule_set_313" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", - "remarks": "rule_set_314" + "remarks": "rule_set_313" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_315" + "remarks": "rule_set_314" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_315" + "remarks": "rule_set_314" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_315" + "remarks": "rule_set_314" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_315" + "remarks": "rule_set_314" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_316" + "remarks": "rule_set_315" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_316" + "remarks": "rule_set_315" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_316" + "remarks": "rule_set_315" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_316" + "remarks": "rule_set_315" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_no_world_writable_programs", - "remarks": "rule_set_317" + "remarks": "rule_set_316" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Not Run World-Writable Programs", - "remarks": "rule_set_317" + "remarks": "rule_set_316" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_no_world_writable_programs", - "remarks": "rule_set_317" + "remarks": "rule_set_316" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Not Run World-Writable Programs", - "remarks": "rule_set_317" + "remarks": "rule_set_316" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_318" + "remarks": "rule_set_317" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_318" + "remarks": "rule_set_317" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_318" + "remarks": "rule_set_317" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_318" + "remarks": "rule_set_317" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_forward_files", - "remarks": "rule_set_319" + "remarks": "rule_set_318" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .forward Files Exist", - "remarks": "rule_set_319" + "remarks": "rule_set_318" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_forward_files", - "remarks": "rule_set_319" + "remarks": "rule_set_318" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .forward Files Exist", - "remarks": "rule_set_319" + "remarks": "rule_set_318" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_netrc_files", - "remarks": "rule_set_320" + "remarks": "rule_set_319" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No netrc Files Exist", - "remarks": "rule_set_320" + "remarks": "rule_set_319" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_netrc_files", - "remarks": "rule_set_320" + "remarks": "rule_set_319" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No netrc Files Exist", - "remarks": "rule_set_320" + "remarks": "rule_set_319" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rhost_files", - "remarks": "rule_set_321" + "remarks": "rule_set_320" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .rhost Files Exist", - "remarks": "rule_set_321" + "remarks": "rule_set_320" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rhost_files", - "remarks": "rule_set_321" + "remarks": "rule_set_320" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .rhost Files Exist", - "remarks": "rule_set_321" + "remarks": "rule_set_320" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_bash_history", - "remarks": "rule_set_322" + "remarks": "rule_set_321" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure User Bash History File Has Correct Permissions", - "remarks": "rule_set_322" + "remarks": "rule_set_321" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_bash_history", - "remarks": "rule_set_322" + "remarks": "rule_set_321" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure User Bash History File Has Correct Permissions", - "remarks": "rule_set_322" + "remarks": "rule_set_321" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_overlayfs_disabled", - "remarks": "rule_set_323" + "remarks": "rule_set_322" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure overlayfs kernel module is not available", - "remarks": "rule_set_323" + "remarks": "rule_set_322" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_overlayfs_disabled", - "remarks": "rule_set_323" + "remarks": "rule_set_322" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure overlayfs kernel module is not available", - "remarks": "rule_set_323" + "remarks": "rule_set_322" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_squashfs_disabled", - "remarks": "rule_set_324" + "remarks": "rule_set_323" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Mounting of squashfs", - "remarks": "rule_set_324" + "remarks": "rule_set_323" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_squashfs_disabled", - "remarks": "rule_set_324" + "remarks": "rule_set_323" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Mounting of squashfs", - "remarks": "rule_set_324" + "remarks": "rule_set_323" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_udf_disabled", - "remarks": "rule_set_325" + "remarks": "rule_set_324" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Mounting of udf", - "remarks": "rule_set_325" + "remarks": "rule_set_324" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_udf_disabled", - "remarks": "rule_set_325" + "remarks": "rule_set_324" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Mounting of udf", - "remarks": "rule_set_325" + "remarks": "rule_set_324" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_home", - "remarks": "rule_set_326" + "remarks": "rule_set_325" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /home Located On Separate Partition", - "remarks": "rule_set_326" + "remarks": "rule_set_325" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_home", - "remarks": "rule_set_326" + "remarks": "rule_set_325" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /home Located On Separate Partition", - "remarks": "rule_set_326" + "remarks": "rule_set_325" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var", - "remarks": "rule_set_327" + "remarks": "rule_set_326" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var Located On Separate Partition", - "remarks": "rule_set_327" + "remarks": "rule_set_326" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var", - "remarks": "rule_set_327" + "remarks": "rule_set_326" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var Located On Separate Partition", - "remarks": "rule_set_327" + "remarks": "rule_set_326" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_tmp", - "remarks": "rule_set_328" + "remarks": "rule_set_327" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/tmp Located On Separate Partition", - "remarks": "rule_set_328" + "remarks": "rule_set_327" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_tmp", - "remarks": "rule_set_328" + "remarks": "rule_set_327" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/tmp Located On Separate Partition", - "remarks": "rule_set_328" + "remarks": "rule_set_327" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log", - "remarks": "rule_set_329" + "remarks": "rule_set_328" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log Located On Separate Partition", - "remarks": "rule_set_329" + "remarks": "rule_set_328" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log", - "remarks": "rule_set_329" + "remarks": "rule_set_328" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log Located On Separate Partition", - "remarks": "rule_set_329" + "remarks": "rule_set_328" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log_audit", - "remarks": "rule_set_330" + "remarks": "rule_set_329" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log/audit Located On Separate Partition", - "remarks": "rule_set_330" + "remarks": "rule_set_329" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log_audit", - "remarks": "rule_set_330" + "remarks": "rule_set_329" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log/audit Located On Separate Partition", - "remarks": "rule_set_330" + "remarks": "rule_set_329" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_weak_deps", - "remarks": "rule_set_331" + "remarks": "rule_set_330" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Installation of Weak Dependencies in DNF", - "remarks": "rule_set_331" + "remarks": "rule_set_330" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_weak_deps", - "remarks": "rule_set_331" + "remarks": "rule_set_330" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Installation of Weak Dependencies in DNF", - "remarks": "rule_set_331" + "remarks": "rule_set_330" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_state", - "remarks": "rule_set_332" + "remarks": "rule_set_331" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SELinux State is Enforcing", - "remarks": "rule_set_332" + "remarks": "rule_set_331" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_state", - "remarks": "rule_set_332" + "remarks": "rule_set_331" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SELinux State is Enforcing", - "remarks": "rule_set_332" + "remarks": "rule_set_331" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_symlinks", - "remarks": "rule_set_333" + "remarks": "rule_set_332" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", - "remarks": "rule_set_333" + "remarks": "rule_set_332" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_symlinks", - "remarks": "rule_set_333" + "remarks": "rule_set_332" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", - "remarks": "rule_set_333" + "remarks": "rule_set_332" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "xwayland_disabled", - "remarks": "rule_set_334" + "remarks": "rule_set_333" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable XWayland", - "remarks": "rule_set_334" + "remarks": "rule_set_333" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "xwayland_disabled", - "remarks": "rule_set_334" + "remarks": "rule_set_333" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable XWayland", - "remarks": "rule_set_334" + "remarks": "rule_set_333" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_cockpit_disabled", - "remarks": "rule_set_335" + "remarks": "rule_set_334" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Cockpit Management Server", - "remarks": "rule_set_335" + "remarks": "rule_set_334" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_cockpit_disabled", - "remarks": "rule_set_335" + "remarks": "rule_set_334" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Cockpit Management Server", - "remarks": "rule_set_335" + "remarks": "rule_set_334" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_gdm_removed", - "remarks": "rule_set_336" + "remarks": "rule_set_335" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove the GDM Package Group", - "remarks": "rule_set_336" + "remarks": "rule_set_335" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_gdm_removed", - "remarks": "rule_set_336" + "remarks": "rule_set_335" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove the GDM Package Group", - "remarks": "rule_set_336" + "remarks": "rule_set_335" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_xorg-x11-server-Xwayland_removed", - "remarks": "rule_set_337" + "remarks": "rule_set_336" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove the X Windows Xwayland Package", - "remarks": "rule_set_337" + "remarks": "rule_set_336" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_xorg-x11-server-Xwayland_removed", - "remarks": "rule_set_337" + "remarks": "rule_set_336" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Remove the X Windows Xwayland Package", - "remarks": "rule_set_337" + "remarks": "rule_set_336" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_openldap-clients_removed", - "remarks": "rule_set_338" + "remarks": "rule_set_337" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure LDAP client is not installed", - "remarks": "rule_set_338" + "remarks": "rule_set_337" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_openldap-clients_removed", - "remarks": "rule_set_338" + "remarks": "rule_set_337" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure LDAP client is not installed", - "remarks": "rule_set_338" + "remarks": "rule_set_337" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_ip_forward", - "remarks": "rule_set_339" + "remarks": "rule_set_338" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IP Forwarding on IPv4 Interfaces", - "remarks": "rule_set_339" + "remarks": "rule_set_338" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_ipv4_ip_forward", - "remarks": "rule_set_339" + "remarks": "rule_set_338" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Parameter for IP Forwarding on IPv4 Interfaces", - "remarks": "rule_set_339" + "remarks": "rule_set_338" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_forwarding", - "remarks": "rule_set_340" + "remarks": "rule_set_339" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Forwarding", - "remarks": "rule_set_340" + "remarks": "rule_set_339" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_forwarding", - "remarks": "rule_set_340" + "remarks": "rule_set_339" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Forwarding", - "remarks": "rule_set_340" + "remarks": "rule_set_339" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_gssapi_auth", - "remarks": "rule_set_341" + "remarks": "rule_set_340" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GSSAPI Authentication", - "remarks": "rule_set_341" + "remarks": "rule_set_340" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_gssapi_auth", - "remarks": "rule_set_341" + "remarks": "rule_set_340" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GSSAPI Authentication", - "remarks": "rule_set_341" + "remarks": "rule_set_340" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_nopasswd", - "remarks": "rule_set_342" + "remarks": "rule_set_341" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD", - "remarks": "rule_set_342" + "remarks": "rule_set_341" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_nopasswd", - "remarks": "rule_set_342" + "remarks": "rule_set_341" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD", - "remarks": "rule_set_342" + "remarks": "rule_set_341" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny_root", - "remarks": "rule_set_343" + "remarks": "rule_set_342" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the root Account for Failed Password Attempts", - "remarks": "rule_set_343" + "remarks": "rule_set_342" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny_root", - "remarks": "rule_set_343" + "remarks": "rule_set_342" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the root Account for Failed Password Attempts", - "remarks": "rule_set_343" + "remarks": "rule_set_342" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_minimum_age_login_defs", - "remarks": "rule_set_344" + "remarks": "rule_set_343" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Minimum Age", - "remarks": "rule_set_344" + "remarks": "rule_set_343" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_minimum_age_login_defs", - "remarks": "rule_set_344" + "remarks": "rule_set_343" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Minimum Age", - "remarks": "rule_set_344" + "remarks": "rule_set_343" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_min_life_existing", - "remarks": "rule_set_345" + "remarks": "rule_set_344" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Minimum Age", - "remarks": "rule_set_345" + "remarks": "rule_set_344" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_min_life_existing", - "remarks": "rule_set_345" + "remarks": "rule_set_344" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Minimum Age", - "remarks": "rule_set_345" + "remarks": "rule_set_344" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_nologin_in_shells", - "remarks": "rule_set_346" + "remarks": "rule_set_345" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure nologin Shell is Not Listed in /etc/shells", - "remarks": "rule_set_346" + "remarks": "rule_set_345" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_nologin_in_shells", - "remarks": "rule_set_346" + "remarks": "rule_set_345" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure nologin Shell is Not Listed in /etc/shells", - "remarks": "rule_set_346" + "remarks": "rule_set_345" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit_installed", - "remarks": "rule_set_347" + "remarks": "rule_set_346" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit Subsystem is Installed", - "remarks": "rule_set_347" + "remarks": "rule_set_346" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit_installed", - "remarks": "rule_set_347" + "remarks": "rule_set_346" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit Subsystem is Installed", - "remarks": "rule_set_347" + "remarks": "rule_set_346" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit-libs_installed", - "remarks": "rule_set_348" + "remarks": "rule_set_347" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit-libs package as a part of audit Subsystem is Installed", - "remarks": "rule_set_348" + "remarks": "rule_set_347" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit-libs_installed", - "remarks": "rule_set_348" + "remarks": "rule_set_347" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit-libs package as a part of audit Subsystem is Installed", - "remarks": "rule_set_348" + "remarks": "rule_set_347" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_argument", - "remarks": "rule_set_349" + "remarks": "rule_set_348" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Auditing for Processes Which Start Prior to the Audit Daemon", - "remarks": "rule_set_349" + "remarks": "rule_set_348" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_argument", - "remarks": "rule_set_349" + "remarks": "rule_set_348" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Auditing for Processes Which Start Prior to the Audit Daemon", - "remarks": "rule_set_349" + "remarks": "rule_set_348" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_backlog_limit_argument", - "remarks": "rule_set_350" + "remarks": "rule_set_349" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Extend Audit Backlog Limit for the Audit Daemon", - "remarks": "rule_set_350" + "remarks": "rule_set_349" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_backlog_limit_argument", - "remarks": "rule_set_350" + "remarks": "rule_set_349" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Extend Audit Backlog Limit for the Audit Daemon", - "remarks": "rule_set_350" + "remarks": "rule_set_349" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_auditd_enabled", - "remarks": "rule_set_351" + "remarks": "rule_set_350" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable auditd Service", - "remarks": "rule_set_351" + "remarks": "rule_set_350" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_auditd_enabled", - "remarks": "rule_set_351" + "remarks": "rule_set_350" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable auditd Service", - "remarks": "rule_set_351" + "remarks": "rule_set_350" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_max_log_file", - "remarks": "rule_set_352" + "remarks": "rule_set_351" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Max Log File Size", - "remarks": "rule_set_352" + "remarks": "rule_set_351" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_max_log_file", - "remarks": "rule_set_352" + "remarks": "rule_set_351" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Max Log File Size", - "remarks": "rule_set_352" + "remarks": "rule_set_351" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_max_log_file_action", - "remarks": "rule_set_353" + "remarks": "rule_set_352" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd max_log_file_action Upon Reaching Maximum Log Size", - "remarks": "rule_set_353" + "remarks": "rule_set_352" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_max_log_file_action", - "remarks": "rule_set_353" + "remarks": "rule_set_352" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd max_log_file_action Upon Reaching Maximum Log Size", - "remarks": "rule_set_353" + "remarks": "rule_set_352" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_disk_error_action", - "remarks": "rule_set_354" + "remarks": "rule_set_353" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Disk Error Action on Disk Error", - "remarks": "rule_set_354" + "remarks": "rule_set_353" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_disk_error_action", - "remarks": "rule_set_354" + "remarks": "rule_set_353" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Disk Error Action on Disk Error", - "remarks": "rule_set_354" + "remarks": "rule_set_353" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_disk_full_action", - "remarks": "rule_set_355" + "remarks": "rule_set_354" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Disk Full Action when Disk Space Is Full", - "remarks": "rule_set_355" + "remarks": "rule_set_354" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_disk_full_action", - "remarks": "rule_set_355" + "remarks": "rule_set_354" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Disk Full Action when Disk Space Is Full", - "remarks": "rule_set_355" + "remarks": "rule_set_354" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_admin_space_left_action", - "remarks": "rule_set_356" + "remarks": "rule_set_355" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd admin_space_left Action on Low Disk Space", - "remarks": "rule_set_356" + "remarks": "rule_set_355" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_admin_space_left_action", - "remarks": "rule_set_356" + "remarks": "rule_set_355" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd admin_space_left Action on Low Disk Space", - "remarks": "rule_set_356" + "remarks": "rule_set_355" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_space_left_action", - "remarks": "rule_set_357" + "remarks": "rule_set_356" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd space_left Action on Low Disk Space", - "remarks": "rule_set_357" + "remarks": "rule_set_356" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_space_left_action", - "remarks": "rule_set_357" + "remarks": "rule_set_356" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd space_left Action on Low Disk Space", - "remarks": "rule_set_357" + "remarks": "rule_set_356" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_sysadmin_actions", - "remarks": "rule_set_358" + "remarks": "rule_set_357" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects System Administrator Actions", - "remarks": "rule_set_358" + "remarks": "rule_set_357" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_sysadmin_actions", - "remarks": "rule_set_358" + "remarks": "rule_set_357" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects System Administrator Actions", - "remarks": "rule_set_358" + "remarks": "rule_set_357" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_suid_auid_privilege_function", - "remarks": "rule_set_359" + "remarks": "rule_set_358" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events When Executables Are Run As Another User", - "remarks": "rule_set_359" + "remarks": "rule_set_358" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_suid_auid_privilege_function", - "remarks": "rule_set_359" + "remarks": "rule_set_358" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events When Executables Are Run As Another User", - "remarks": "rule_set_359" + "remarks": "rule_set_358" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_sudo_log_events", - "remarks": "rule_set_360" + "remarks": "rule_set_359" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to perform maintenance activities", - "remarks": "rule_set_360" + "remarks": "rule_set_359" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_sudo_log_events", - "remarks": "rule_set_360" + "remarks": "rule_set_359" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to perform maintenance activities", - "remarks": "rule_set_360" + "remarks": "rule_set_359" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_adjtimex", - "remarks": "rule_set_361" + "remarks": "rule_set_360" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through adjtimex", - "remarks": "rule_set_361" + "remarks": "rule_set_360" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_adjtimex", - "remarks": "rule_set_361" + "remarks": "rule_set_360" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through adjtimex", - "remarks": "rule_set_361" + "remarks": "rule_set_360" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_settimeofday", - "remarks": "rule_set_362" + "remarks": "rule_set_361" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through settimeofday", - "remarks": "rule_set_362" + "remarks": "rule_set_361" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_settimeofday", - "remarks": "rule_set_362" + "remarks": "rule_set_361" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through settimeofday", - "remarks": "rule_set_362" + "remarks": "rule_set_361" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_clock_settime", - "remarks": "rule_set_363" + "remarks": "rule_set_362" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through clock_settime", - "remarks": "rule_set_363" + "remarks": "rule_set_362" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_clock_settime", - "remarks": "rule_set_363" + "remarks": "rule_set_362" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through clock_settime", - "remarks": "rule_set_363" + "remarks": "rule_set_362" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_watch_localtime", - "remarks": "rule_set_364" + "remarks": "rule_set_363" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter the localtime File", - "remarks": "rule_set_364" + "remarks": "rule_set_363" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_watch_localtime", - "remarks": "rule_set_364" + "remarks": "rule_set_363" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter the localtime File", - "remarks": "rule_set_364" + "remarks": "rule_set_363" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_setdomainname", - "remarks": "rule_set_365" + "remarks": "rule_set_364" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - setdomainname", - "remarks": "rule_set_365" + "remarks": "rule_set_364" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_setdomainname", - "remarks": "rule_set_365" + "remarks": "rule_set_364" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - setdomainname", - "remarks": "rule_set_365" + "remarks": "rule_set_364" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_sethostname", - "remarks": "rule_set_366" + "remarks": "rule_set_365" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - sethostname", - "remarks": "rule_set_366" + "remarks": "rule_set_365" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_sethostname", - "remarks": "rule_set_366" + "remarks": "rule_set_365" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - sethostname", - "remarks": "rule_set_366" + "remarks": "rule_set_365" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_issue", - "remarks": "rule_set_367" + "remarks": "rule_set_366" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/issue", - "remarks": "rule_set_367" + "remarks": "rule_set_366" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_issue", - "remarks": "rule_set_367" + "remarks": "rule_set_366" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/issue", - "remarks": "rule_set_367" + "remarks": "rule_set_366" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_issue_net", - "remarks": "rule_set_368" + "remarks": "rule_set_367" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/issue.net", - "remarks": "rule_set_368" + "remarks": "rule_set_367" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_issue_net", - "remarks": "rule_set_368" + "remarks": "rule_set_367" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/issue.net", - "remarks": "rule_set_368" + "remarks": "rule_set_367" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_hosts", - "remarks": "rule_set_369" + "remarks": "rule_set_368" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/hosts", - "remarks": "rule_set_369" + "remarks": "rule_set_368" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_hosts", - "remarks": "rule_set_369" + "remarks": "rule_set_368" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/hosts", - "remarks": "rule_set_369" + "remarks": "rule_set_368" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_hostname_file", - "remarks": "rule_set_370" + "remarks": "rule_set_369" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/hostname", - "remarks": "rule_set_370" + "remarks": "rule_set_369" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_hostname_file", - "remarks": "rule_set_370" + "remarks": "rule_set_369" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/hostname", - "remarks": "rule_set_370" + "remarks": "rule_set_369" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_sysconfig_network", - "remarks": "rule_set_371" + "remarks": "rule_set_370" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/sysconfig/network", - "remarks": "rule_set_371" + "remarks": "rule_set_370" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_sysconfig_network", - "remarks": "rule_set_371" + "remarks": "rule_set_370" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/sysconfig/network", - "remarks": "rule_set_371" + "remarks": "rule_set_370" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_networkmanager_system_connections", - "remarks": "rule_set_372" + "remarks": "rule_set_371" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/system-connections/", - "remarks": "rule_set_372" + "remarks": "rule_set_371" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_networkmanager_system_connections", - "remarks": "rule_set_372" + "remarks": "rule_set_371" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/system-connections/", - "remarks": "rule_set_372" + "remarks": "rule_set_371" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_networkmanager", - "remarks": "rule_set_373" + "remarks": "rule_set_372" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/", - "remarks": "rule_set_373" + "remarks": "rule_set_372" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_networkmanager", - "remarks": "rule_set_373" + "remarks": "rule_set_372" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/", - "remarks": "rule_set_373" + "remarks": "rule_set_372" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands", - "remarks": "rule_set_374" + "remarks": "rule_set_373" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands", - "remarks": "rule_set_374" + "remarks": "rule_set_373" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands", - "remarks": "rule_set_374" + "remarks": "rule_set_373" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands", - "remarks": "rule_set_374" + "remarks": "rule_set_373" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_creat", - "remarks": "rule_set_375" + "remarks": "rule_set_374" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - creat", - "remarks": "rule_set_375" + "remarks": "rule_set_374" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_creat", - "remarks": "rule_set_375" + "remarks": "rule_set_374" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - creat", - "remarks": "rule_set_375" + "remarks": "rule_set_374" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_ftruncate", - "remarks": "rule_set_376" + "remarks": "rule_set_375" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - ftruncate", - "remarks": "rule_set_376" + "remarks": "rule_set_375" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_ftruncate", - "remarks": "rule_set_376" + "remarks": "rule_set_375" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - ftruncate", - "remarks": "rule_set_376" + "remarks": "rule_set_375" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_open", - "remarks": "rule_set_377" + "remarks": "rule_set_376" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - open", - "remarks": "rule_set_377" + "remarks": "rule_set_376" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_open", - "remarks": "rule_set_377" + "remarks": "rule_set_376" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - open", - "remarks": "rule_set_377" + "remarks": "rule_set_376" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_openat", - "remarks": "rule_set_378" + "remarks": "rule_set_377" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - openat", - "remarks": "rule_set_378" + "remarks": "rule_set_377" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_openat", - "remarks": "rule_set_378" + "remarks": "rule_set_377" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - openat", - "remarks": "rule_set_378" + "remarks": "rule_set_377" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_truncate", - "remarks": "rule_set_379" + "remarks": "rule_set_378" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - truncate", - "remarks": "rule_set_379" + "remarks": "rule_set_378" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_truncate", - "remarks": "rule_set_379" + "remarks": "rule_set_378" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - truncate", - "remarks": "rule_set_379" + "remarks": "rule_set_378" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_group", - "remarks": "rule_set_380" + "remarks": "rule_set_379" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/group", - "remarks": "rule_set_380" + "remarks": "rule_set_379" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_group", - "remarks": "rule_set_380" + "remarks": "rule_set_379" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/group", - "remarks": "rule_set_380" + "remarks": "rule_set_379" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_passwd", - "remarks": "rule_set_381" + "remarks": "rule_set_380" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/passwd", - "remarks": "rule_set_381" + "remarks": "rule_set_380" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_passwd", - "remarks": "rule_set_381" + "remarks": "rule_set_380" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/passwd", - "remarks": "rule_set_381" + "remarks": "rule_set_380" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_gshadow", - "remarks": "rule_set_382" + "remarks": "rule_set_381" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/gshadow", - "remarks": "rule_set_382" + "remarks": "rule_set_381" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_gshadow", - "remarks": "rule_set_382" + "remarks": "rule_set_381" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/gshadow", - "remarks": "rule_set_382" + "remarks": "rule_set_381" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_shadow", - "remarks": "rule_set_383" + "remarks": "rule_set_382" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/shadow", - "remarks": "rule_set_383" + "remarks": "rule_set_382" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_shadow", - "remarks": "rule_set_383" + "remarks": "rule_set_382" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/shadow", - "remarks": "rule_set_383" + "remarks": "rule_set_382" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_opasswd", - "remarks": "rule_set_384" + "remarks": "rule_set_383" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", - "remarks": "rule_set_384" + "remarks": "rule_set_383" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_opasswd", - "remarks": "rule_set_384" + "remarks": "rule_set_383" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", - "remarks": "rule_set_384" + "remarks": "rule_set_383" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_nsswitch_conf", - "remarks": "rule_set_385" + "remarks": "rule_set_384" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/nsswitch.conf", - "remarks": "rule_set_385" + "remarks": "rule_set_384" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_nsswitch_conf", - "remarks": "rule_set_385" + "remarks": "rule_set_384" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/nsswitch.conf", - "remarks": "rule_set_385" + "remarks": "rule_set_384" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_pam_conf", - "remarks": "rule_set_386" + "remarks": "rule_set_385" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/pam.conf", - "remarks": "rule_set_386" + "remarks": "rule_set_385" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_pam_conf", - "remarks": "rule_set_386" + "remarks": "rule_set_385" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/pam.conf", - "remarks": "rule_set_386" + "remarks": "rule_set_385" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_pamd", - "remarks": "rule_set_387" + "remarks": "rule_set_386" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/pam.d/", - "remarks": "rule_set_387" + "remarks": "rule_set_386" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_pamd", - "remarks": "rule_set_387" + "remarks": "rule_set_386" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/pam.d/", - "remarks": "rule_set_387" + "remarks": "rule_set_386" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chmod", - "remarks": "rule_set_388" + "remarks": "rule_set_387" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", - "remarks": "rule_set_388" + "remarks": "rule_set_387" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chmod", - "remarks": "rule_set_388" + "remarks": "rule_set_387" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", - "remarks": "rule_set_388" + "remarks": "rule_set_387" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmod", - "remarks": "rule_set_389" + "remarks": "rule_set_388" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmod", - "remarks": "rule_set_389" + "remarks": "rule_set_388" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmod", - "remarks": "rule_set_389" + "remarks": "rule_set_388" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmod", - "remarks": "rule_set_389" + "remarks": "rule_set_388" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat", - "remarks": "rule_set_390" + "remarks": "rule_set_389" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat", - "remarks": "rule_set_390" + "remarks": "rule_set_389" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat", - "remarks": "rule_set_390" + "remarks": "rule_set_389" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat", - "remarks": "rule_set_390" + "remarks": "rule_set_389" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat2", - "remarks": "rule_set_391" + "remarks": "rule_set_390" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat2", - "remarks": "rule_set_391" + "remarks": "rule_set_390" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat2", - "remarks": "rule_set_391" + "remarks": "rule_set_390" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat2", - "remarks": "rule_set_391" + "remarks": "rule_set_390" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chown", - "remarks": "rule_set_392" + "remarks": "rule_set_391" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chown", - "remarks": "rule_set_392" + "remarks": "rule_set_391" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chown", - "remarks": "rule_set_392" + "remarks": "rule_set_391" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chown", - "remarks": "rule_set_392" + "remarks": "rule_set_391" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchown", - "remarks": "rule_set_393" + "remarks": "rule_set_392" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchown", - "remarks": "rule_set_393" + "remarks": "rule_set_392" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchown", - "remarks": "rule_set_393" + "remarks": "rule_set_392" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchown", - "remarks": "rule_set_393" + "remarks": "rule_set_392" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchownat", - "remarks": "rule_set_394" + "remarks": "rule_set_393" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchownat", - "remarks": "rule_set_394" + "remarks": "rule_set_393" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchownat", - "remarks": "rule_set_394" + "remarks": "rule_set_393" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchownat", - "remarks": "rule_set_394" + "remarks": "rule_set_393" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lchown", - "remarks": "rule_set_395" + "remarks": "rule_set_394" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lchown", - "remarks": "rule_set_395" + "remarks": "rule_set_394" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lchown", - "remarks": "rule_set_395" + "remarks": "rule_set_394" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lchown", - "remarks": "rule_set_395" + "remarks": "rule_set_394" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fremovexattr", - "remarks": "rule_set_396" + "remarks": "rule_set_395" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fremovexattr", - "remarks": "rule_set_396" + "remarks": "rule_set_395" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fremovexattr", - "remarks": "rule_set_396" + "remarks": "rule_set_395" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fremovexattr", - "remarks": "rule_set_396" + "remarks": "rule_set_395" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fsetxattr", - "remarks": "rule_set_397" + "remarks": "rule_set_396" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fsetxattr", - "remarks": "rule_set_397" + "remarks": "rule_set_396" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fsetxattr", - "remarks": "rule_set_397" + "remarks": "rule_set_396" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fsetxattr", - "remarks": "rule_set_397" + "remarks": "rule_set_396" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lremovexattr", - "remarks": "rule_set_398" + "remarks": "rule_set_397" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lremovexattr", - "remarks": "rule_set_398" + "remarks": "rule_set_397" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lremovexattr", - "remarks": "rule_set_398" + "remarks": "rule_set_397" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lremovexattr", - "remarks": "rule_set_398" + "remarks": "rule_set_397" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lsetxattr", - "remarks": "rule_set_399" + "remarks": "rule_set_398" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lsetxattr", - "remarks": "rule_set_399" + "remarks": "rule_set_398" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lsetxattr", - "remarks": "rule_set_399" + "remarks": "rule_set_398" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lsetxattr", - "remarks": "rule_set_399" + "remarks": "rule_set_398" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_removexattr", - "remarks": "rule_set_400" + "remarks": "rule_set_399" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - removexattr", - "remarks": "rule_set_400" + "remarks": "rule_set_399" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_removexattr", - "remarks": "rule_set_400" + "remarks": "rule_set_399" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - removexattr", - "remarks": "rule_set_400" + "remarks": "rule_set_399" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_setxattr", - "remarks": "rule_set_401" + "remarks": "rule_set_400" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - setxattr", - "remarks": "rule_set_401" + "remarks": "rule_set_400" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_setxattr", - "remarks": "rule_set_401" + "remarks": "rule_set_400" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - setxattr", - "remarks": "rule_set_401" + "remarks": "rule_set_400" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_media_export", - "remarks": "rule_set_402" + "remarks": "rule_set_401" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Exporting to Media (successful)", - "remarks": "rule_set_402" + "remarks": "rule_set_401" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_media_export", - "remarks": "rule_set_402" + "remarks": "rule_set_401" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Exporting to Media (successful)", - "remarks": "rule_set_402" + "remarks": "rule_set_401" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_utmp", - "remarks": "rule_set_403" + "remarks": "rule_set_402" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information utmp", - "remarks": "rule_set_403" + "remarks": "rule_set_402" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_utmp", - "remarks": "rule_set_403" + "remarks": "rule_set_402" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information utmp", - "remarks": "rule_set_403" + "remarks": "rule_set_402" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_btmp", - "remarks": "rule_set_404" + "remarks": "rule_set_403" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information btmp", - "remarks": "rule_set_404" + "remarks": "rule_set_403" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_btmp", - "remarks": "rule_set_404" + "remarks": "rule_set_403" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information btmp", - "remarks": "rule_set_404" + "remarks": "rule_set_403" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_wtmp", - "remarks": "rule_set_405" + "remarks": "rule_set_404" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", - "remarks": "rule_set_405" + "remarks": "rule_set_404" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_wtmp", - "remarks": "rule_set_405" + "remarks": "rule_set_404" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", - "remarks": "rule_set_405" + "remarks": "rule_set_404" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_faillock", - "remarks": "rule_set_406" + "remarks": "rule_set_405" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - faillock", - "remarks": "rule_set_406" + "remarks": "rule_set_405" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_faillock", - "remarks": "rule_set_406" + "remarks": "rule_set_405" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - faillock", - "remarks": "rule_set_406" + "remarks": "rule_set_405" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_lastlog", - "remarks": "rule_set_407" + "remarks": "rule_set_406" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - lastlog", - "remarks": "rule_set_407" + "remarks": "rule_set_406" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_lastlog", - "remarks": "rule_set_407" + "remarks": "rule_set_406" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - lastlog", - "remarks": "rule_set_407" + "remarks": "rule_set_406" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlink", - "remarks": "rule_set_408" + "remarks": "rule_set_407" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlink", - "remarks": "rule_set_408" + "remarks": "rule_set_407" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlink", - "remarks": "rule_set_408" + "remarks": "rule_set_407" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlink", - "remarks": "rule_set_408" + "remarks": "rule_set_407" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlinkat", - "remarks": "rule_set_409" + "remarks": "rule_set_408" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlinkat", - "remarks": "rule_set_409" + "remarks": "rule_set_408" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlinkat", - "remarks": "rule_set_409" + "remarks": "rule_set_408" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlinkat", - "remarks": "rule_set_409" + "remarks": "rule_set_408" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rename", - "remarks": "rule_set_410" + "remarks": "rule_set_409" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rename", - "remarks": "rule_set_410" + "remarks": "rule_set_409" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rename", - "remarks": "rule_set_410" + "remarks": "rule_set_409" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rename", - "remarks": "rule_set_410" + "remarks": "rule_set_409" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat", - "remarks": "rule_set_411" + "remarks": "rule_set_410" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat", - "remarks": "rule_set_411" + "remarks": "rule_set_410" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat", - "remarks": "rule_set_411" + "remarks": "rule_set_410" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat", - "remarks": "rule_set_411" + "remarks": "rule_set_410" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat2", - "remarks": "rule_set_412" + "remarks": "rule_set_411" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat2", - "remarks": "rule_set_412" + "remarks": "rule_set_411" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat2", - "remarks": "rule_set_412" + "remarks": "rule_set_411" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat2", - "remarks": "rule_set_412" + "remarks": "rule_set_411" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_etc_selinux", - "remarks": "rule_set_413" + "remarks": "rule_set_412" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls (/etc/selinux)", - "remarks": "rule_set_413" + "remarks": "rule_set_412" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_etc_selinux", - "remarks": "rule_set_413" + "remarks": "rule_set_412" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls (/etc/selinux)", - "remarks": "rule_set_413" + "remarks": "rule_set_412" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_usr_share", - "remarks": "rule_set_414" + "remarks": "rule_set_413" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls in usr/share", - "remarks": "rule_set_414" + "remarks": "rule_set_413" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_usr_share", - "remarks": "rule_set_414" + "remarks": "rule_set_413" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls in usr/share", - "remarks": "rule_set_414" + "remarks": "rule_set_413" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chcon", - "remarks": "rule_set_415" + "remarks": "rule_set_414" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chcon", - "remarks": "rule_set_415" + "remarks": "rule_set_414" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chcon", - "remarks": "rule_set_415" + "remarks": "rule_set_414" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chcon", - "remarks": "rule_set_415" + "remarks": "rule_set_414" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_setfacl", - "remarks": "rule_set_416" + "remarks": "rule_set_415" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run setfacl", - "remarks": "rule_set_416" + "remarks": "rule_set_415" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_setfacl", - "remarks": "rule_set_416" + "remarks": "rule_set_415" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run setfacl", - "remarks": "rule_set_416" + "remarks": "rule_set_415" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chacl", - "remarks": "rule_set_417" + "remarks": "rule_set_416" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chacl", - "remarks": "rule_set_417" + "remarks": "rule_set_416" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chacl", - "remarks": "rule_set_417" + "remarks": "rule_set_416" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chacl", - "remarks": "rule_set_417" + "remarks": "rule_set_416" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_usermod", - "remarks": "rule_set_418" + "remarks": "rule_set_417" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - usermod", - "remarks": "rule_set_418" + "remarks": "rule_set_417" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_usermod", - "remarks": "rule_set_418" + "remarks": "rule_set_417" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - usermod", - "remarks": "rule_set_418" + "remarks": "rule_set_417" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_kmod", - "remarks": "rule_set_419" + "remarks": "rule_set_418" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - kmod", - "remarks": "rule_set_419" + "remarks": "rule_set_418" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_kmod", - "remarks": "rule_set_419" + "remarks": "rule_set_418" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - kmod", - "remarks": "rule_set_419" + "remarks": "rule_set_418" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_init", - "remarks": "rule_set_420" + "remarks": "rule_set_419" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading - init_module", - "remarks": "rule_set_420" + "remarks": "rule_set_419" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_init", - "remarks": "rule_set_420" + "remarks": "rule_set_419" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading - init_module", - "remarks": "rule_set_420" + "remarks": "rule_set_419" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_finit", - "remarks": "rule_set_421" + "remarks": "rule_set_420" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - finit_module", - "remarks": "rule_set_421" + "remarks": "rule_set_420" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_finit", - "remarks": "rule_set_421" + "remarks": "rule_set_420" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - finit_module", - "remarks": "rule_set_421" + "remarks": "rule_set_420" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_delete", - "remarks": "rule_set_422" + "remarks": "rule_set_421" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Unloading - delete_module", - "remarks": "rule_set_422" + "remarks": "rule_set_421" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_delete", - "remarks": "rule_set_422" + "remarks": "rule_set_421" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Unloading - delete_module", - "remarks": "rule_set_422" + "remarks": "rule_set_421" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_query", - "remarks": "rule_set_423" + "remarks": "rule_set_422" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - query_module", - "remarks": "rule_set_423" + "remarks": "rule_set_422" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_query", - "remarks": "rule_set_423" + "remarks": "rule_set_422" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - query_module", - "remarks": "rule_set_423" + "remarks": "rule_set_422" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_continue_loading", - "remarks": "rule_set_424" + "remarks": "rule_set_423" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Audit Configuration is Loaded Regardless of Errors", - "remarks": "rule_set_424" + "remarks": "rule_set_423" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_continue_loading", - "remarks": "rule_set_424" + "remarks": "rule_set_423" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Audit Configuration is Loaded Regardless of Errors", - "remarks": "rule_set_424" + "remarks": "rule_set_423" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_immutable", - "remarks": "rule_set_425" + "remarks": "rule_set_424" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Make the auditd Configuration Immutable", - "remarks": "rule_set_425" + "remarks": "rule_set_424" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_immutable", - "remarks": "rule_set_425" + "remarks": "rule_set_424" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Make the auditd Configuration Immutable", - "remarks": "rule_set_425" + "remarks": "rule_set_424" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_var_log_audit", - "remarks": "rule_set_426" + "remarks": "rule_set_425" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0750 or Less Permissive", - "remarks": "rule_set_426" + "remarks": "rule_set_425" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_var_log_audit", - "remarks": "rule_set_426" + "remarks": "rule_set_425" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0750 or Less Permissive", - "remarks": "rule_set_426" + "remarks": "rule_set_425" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_var_log_audit", - "remarks": "rule_set_427" + "remarks": "rule_set_426" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0640 or Less Permissive", - "remarks": "rule_set_427" + "remarks": "rule_set_426" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_var_log_audit", - "remarks": "rule_set_427" + "remarks": "rule_set_426" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0640 or Less Permissive", - "remarks": "rule_set_427" + "remarks": "rule_set_426" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_var_log_audit_stig", - "remarks": "rule_set_428" + "remarks": "rule_set_427" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Owned By Root", - "remarks": "rule_set_428" + "remarks": "rule_set_427" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_var_log_audit_stig", - "remarks": "rule_set_428" + "remarks": "rule_set_427" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Owned By Root", - "remarks": "rule_set_428" + "remarks": "rule_set_427" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_group_ownership_var_log_audit", - "remarks": "rule_set_429" + "remarks": "rule_set_428" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Group Owned By Root", - "remarks": "rule_set_429" + "remarks": "rule_set_428" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_group_ownership_var_log_audit", - "remarks": "rule_set_429" + "remarks": "rule_set_428" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Group Owned By Root", - "remarks": "rule_set_429" + "remarks": "rule_set_428" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_audit_configuration", - "remarks": "rule_set_430" + "remarks": "rule_set_429" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Permissions are 640 or More Restrictive", - "remarks": "rule_set_430" + "remarks": "rule_set_429" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_audit_configuration", - "remarks": "rule_set_430" + "remarks": "rule_set_429" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Permissions are 640 or More Restrictive", - "remarks": "rule_set_430" + "remarks": "rule_set_429" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_audit_configuration", - "remarks": "rule_set_431" + "remarks": "rule_set_430" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Must Be Owned By Root", - "remarks": "rule_set_431" + "remarks": "rule_set_430" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_audit_configuration", - "remarks": "rule_set_431" + "remarks": "rule_set_430" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Must Be Owned By Root", - "remarks": "rule_set_431" + "remarks": "rule_set_430" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_audit_configuration", - "remarks": "rule_set_432" + "remarks": "rule_set_431" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Must Be Owned By Group root", - "remarks": "rule_set_432" + "remarks": "rule_set_431" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_audit_configuration", - "remarks": "rule_set_432" + "remarks": "rule_set_431" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Must Be Owned By Group root", - "remarks": "rule_set_432" + "remarks": "rule_set_431" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_audit_binaries", - "remarks": "rule_set_433" + "remarks": "rule_set_432" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools Have Mode 0755 or less", - "remarks": "rule_set_433" + "remarks": "rule_set_432" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_audit_binaries", - "remarks": "rule_set_433" + "remarks": "rule_set_432" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools Have Mode 0755 or less", - "remarks": "rule_set_433" + "remarks": "rule_set_432" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_audit_binaries", - "remarks": "rule_set_434" + "remarks": "rule_set_433" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools are owned by root", - "remarks": "rule_set_434" + "remarks": "rule_set_433" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_audit_binaries", - "remarks": "rule_set_434" + "remarks": "rule_set_433" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools are owned by root", - "remarks": "rule_set_434" + "remarks": "rule_set_433" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_audit_binaries", - "remarks": "rule_set_435" + "remarks": "rule_set_434" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools are owned by group root", - "remarks": "rule_set_435" + "remarks": "rule_set_434" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_audit_binaries", - "remarks": "rule_set_435" + "remarks": "rule_set_434" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools are owned by group root", - "remarks": "rule_set_435" + "remarks": "rule_set_434" } ], "control-implementations": [ { - "uuid": "787f523c-3eaa-4382-967b-d91fe0e8bfa5", + "uuid": "c584f573-70a7-4aeb-bb65-693f8db3e394", "source": "trestle://profiles/rhel10-cis_rhel10-l2_server/profile.json", "description": "Control implementation for cis", "props": [ @@ -25022,13 +24981,13 @@ { "param-id": "var_password_hashing_algorithm", "values": [ - "yescrypt" + "cis_rhel10" ] }, { "param-id": "var_password_hashing_algorithm_pam", "values": [ - "yescrypt" + "cis_rhel10" ] }, { @@ -25142,7 +25101,7 @@ ], "implemented-requirements": [ { - "uuid": "1acd65fb-570f-4cf5-b7f2-3fdf1cc7a1f9", + "uuid": "2ce39aef-6ddf-4dfb-bfab-063cdc66ab2f", "control-id": "cis_rhel10_1-1.1.6", "description": "No notes for control-id 1.1.1.6.", "props": [ @@ -25159,7 +25118,7 @@ ] }, { - "uuid": "45396c6f-c786-423b-a224-72b502ad053a", + "uuid": "5907abca-1dd9-44ba-9297-de6f873f8cbb", "control-id": "cis_rhel10_1-1.1.7", "description": "No notes for control-id 1.1.1.7.", "props": [ @@ -25176,7 +25135,7 @@ ] }, { - "uuid": "578fb9fe-ba89-4b35-8c6c-affcfab67766", + "uuid": "bca98cfa-abc8-4a0b-b6f7-9a213ae3eb04", "control-id": "cis_rhel10_1-1.1.8", "description": "No notes for control-id 1.1.1.8.", "props": [ @@ -25193,7 +25152,7 @@ ] }, { - "uuid": "7da28af2-fbd5-43a2-aa49-26f68756b88f", + "uuid": "85cea36d-b303-49e6-8f1d-ba66cb8bdfec", "control-id": "cis_rhel10_1-1.2.3.1", "description": "No notes for control-id 1.1.2.3.1.", "props": [ @@ -25210,7 +25169,7 @@ ] }, { - "uuid": "3b92f53a-ba65-4de4-8603-17ee3a55d63a", + "uuid": "3c2c96b2-ae79-4110-87e6-a3cd875aac13", "control-id": "cis_rhel10_1-1.2.4.1", "description": "No notes for control-id 1.1.2.4.1.", "props": [ @@ -25227,7 +25186,7 @@ ] }, { - "uuid": "189136ff-81aa-4303-9f7b-a2ec7c688fc2", + "uuid": "72457c52-f307-4074-ab03-ff51b86cf54b", "control-id": "cis_rhel10_1-1.2.5.1", "description": "No notes for control-id 1.1.2.5.1.", "props": [ @@ -25244,7 +25203,7 @@ ] }, { - "uuid": "68a0feee-7844-4044-a63b-cf5f4c848e14", + "uuid": "437d86bc-17bf-4f50-8fa7-4e41e2a02bfd", "control-id": "cis_rhel10_1-1.2.6.1", "description": "No notes for control-id 1.1.2.6.1.", "props": [ @@ -25261,7 +25220,7 @@ ] }, { - "uuid": "fc928fe6-e8e2-484e-8157-efa6ca69df10", + "uuid": "0f03b5a3-7ed0-4230-a2fc-a1d322c69f66", "control-id": "cis_rhel10_1-1.2.7.1", "description": "No notes for control-id 1.1.2.7.1.", "props": [ @@ -25278,7 +25237,7 @@ ] }, { - "uuid": "33c9b809-834a-4518-bc33-4dc86f71dd3b", + "uuid": "c62ab2a3-9b0b-45e4-a9d3-bf6583307d4d", "control-id": "cis_rhel10_1-2.1.3", "description": "The description for control-id cis_rhel10_1-2.1.3.", "props": [ @@ -25291,7 +25250,7 @@ ] }, { - "uuid": "fa8a037c-401b-4184-bc71-196ba780e27f", + "uuid": "2c472e0b-4202-4541-9331-6ec72f057185", "control-id": "cis_rhel10_1-2.1.5", "description": "No notes for control-id 1.2.1.5.", "props": [ @@ -25308,7 +25267,7 @@ ] }, { - "uuid": "5fb58a62-9390-4073-a57d-718de99a9146", + "uuid": "ddb87feb-8006-4dff-b1f1-0e341aecc7a6", "control-id": "cis_rhel10_1-3.1.5", "description": "No notes for control-id 1.3.1.5.", "props": [ @@ -25325,7 +25284,7 @@ ] }, { - "uuid": "4b521aea-5c79-4ff9-a9b4-01579b61cb72", + "uuid": "ba0ba9ca-8934-4503-ada8-12775fa3a204", "control-id": "cis_rhel10_1-3.1.6", "description": "The description for control-id cis_rhel10_1-3.1.6.", "props": [ @@ -25338,7 +25297,7 @@ ] }, { - "uuid": "dd56b9e4-c971-465b-9eab-79e481212d8d", + "uuid": "1c89be17-efb2-4167-8b06-ac5e76169509", "control-id": "cis_rhel10_1-5.3", "description": "No notes for control-id 1.5.3.", "props": [ @@ -25355,7 +25314,7 @@ ] }, { - "uuid": "a68757dc-c29b-463f-aa34-86d4d9cdedbc", + "uuid": "c2a8ba2e-972d-4aff-9fbd-01b766642f16", "control-id": "cis_rhel10_1-8.6", "description": "No notes for control-id 1.8.6.", "props": [ @@ -25372,7 +25331,7 @@ ] }, { - "uuid": "bfb69297-33c1-42f2-aab2-d100dd7634b6", + "uuid": "21344b7c-a093-4ecd-ba08-0f819276acd8", "control-id": "cis_rhel10_2-1.3", "description": "No notes for control-id 2.1.3.", "props": [ @@ -25389,7 +25348,7 @@ ] }, { - "uuid": "7a6c9b07-4917-4e62-8ee0-3edcb4c27ccd", + "uuid": "f54a697f-083d-4879-8e70-1551337ad0b9", "control-id": "cis_rhel10_2-1.19", "description": "No notes for control-id 2.1.19.", "props": [ @@ -25406,7 +25365,7 @@ ] }, { - "uuid": "70d40a2e-698d-413b-a129-7e87a5e4f6b0", + "uuid": "b7c20960-e3f8-4d19-9a56-98e57e742e2a", "control-id": "cis_rhel10_2-1.20", "description": "No notes for control-id 2.1.20.", "props": [ @@ -25423,7 +25382,7 @@ ] }, { - "uuid": "3d140858-2280-46ae-aa3e-17553698f4f0", + "uuid": "fb47bbef-07d3-490c-a79a-bc9dae7e4b4e", "control-id": "cis_rhel10_2-2.2", "description": "No notes for control-id 2.2.2.", "props": [ @@ -25440,7 +25399,7 @@ ] }, { - "uuid": "1104e009-bb89-41b8-aa29-179b417ad271", + "uuid": "63e15344-2825-4c5e-b0a9-777051693e85", "control-id": "cis_rhel10_3-3.1.1", "description": "No notes for control-id 3.3.1.1.", "props": [ @@ -25457,7 +25416,7 @@ ] }, { - "uuid": "8412b4b7-55cc-42ed-ae8c-c7580149b441", + "uuid": "96f5100e-34bd-4554-bc32-74e79d8ac9f4", "control-id": "cis_rhel10_5-1.8", "description": "No notes for control-id 5.1.8.", "props": [ @@ -25474,7 +25433,7 @@ ] }, { - "uuid": "c604c9ca-7f7a-4362-87ba-45aca7d2ab17", + "uuid": "6b75985c-6c19-4bb3-93c4-6ae1fbe375eb", "control-id": "cis_rhel10_5-1.9", "description": "No notes for control-id 5.1.9.", "props": [ @@ -25491,7 +25450,7 @@ ] }, { - "uuid": "a0d2928c-c308-49a4-bdc3-72ffcbfe7dde", + "uuid": "5ea81ef4-0626-4635-a12f-cb4e3f44e096", "control-id": "cis_rhel10_5-2.4", "description": "No notes for control-id 5.2.4.", "props": [ @@ -25508,7 +25467,7 @@ ] }, { - "uuid": "88d300a0-8abf-4033-92b4-fbb18ab39ecd", + "uuid": "b9ee3978-8742-45e4-9521-32ec40e0f335", "control-id": "cis_rhel10_5-3.2.1.3", "description": "No notes for control-id 5.3.2.1.3.", "props": [ @@ -25525,7 +25484,7 @@ ] }, { - "uuid": "d93d72dd-9e1c-44c0-b781-271bd6e4d2cb", + "uuid": "6efd6a60-7a1c-4b9e-9c0c-5f328ad71ca1", "control-id": "cis_rhel10_5-4.1.2", "description": "No notes for control-id 5.4.1.2.", "props": [ @@ -25547,7 +25506,7 @@ ] }, { - "uuid": "83829157-35e3-4027-926e-c65aae6a4463", + "uuid": "5ab9bbf1-424d-4516-9150-d42d73166a65", "control-id": "cis_rhel10_5-4.3.1", "description": "No notes for control-id 5.4.3.1.", "props": [ @@ -25564,7 +25523,7 @@ ] }, { - "uuid": "1157d036-1a63-4e09-8549-62550a3020eb", + "uuid": "7fa90ac4-bb0d-4947-978a-905af449ff8c", "control-id": "cis_rhel10_6-3.1.1", "description": "No notes for control-id 6.3.1.1.", "props": [ @@ -25586,7 +25545,7 @@ ] }, { - "uuid": "a3d35b43-79e7-4fd9-b88d-2979eab0a264", + "uuid": "3da00e76-7b69-49a6-9b82-bdd134d1d667", "control-id": "cis_rhel10_6-3.1.2", "description": "No notes for control-id 6.3.1.2.", "props": [ @@ -25603,7 +25562,7 @@ ] }, { - "uuid": "9721c1e8-608d-4e70-90ee-583d4e002598", + "uuid": "ecc77cec-57cb-4b6e-9af9-013f47155ee1", "control-id": "cis_rhel10_6-3.1.3", "description": "No notes for control-id 6.3.1.3.", "props": [ @@ -25620,7 +25579,7 @@ ] }, { - "uuid": "37c7d239-f2fb-4982-bb0a-7e396d6c8805", + "uuid": "16462f82-7b02-4bde-b41b-6702859b99fc", "control-id": "cis_rhel10_6-3.1.4", "description": "No notes for control-id 6.3.1.4.", "props": [ @@ -25637,7 +25596,7 @@ ] }, { - "uuid": "02275cd6-40cc-4e43-b81f-fae7addb864f", + "uuid": "efaa6839-19d6-43e6-93a4-54728b7849b2", "control-id": "cis_rhel10_6-3.2.1", "description": "No notes for control-id 6.3.2.1.", "props": [ @@ -25654,7 +25613,7 @@ ] }, { - "uuid": "cf90d8a2-1d85-480d-8218-3f1892d72054", + "uuid": "f54f0513-9e44-45d6-afb1-ccf148994b98", "control-id": "cis_rhel10_6-3.2.2", "description": "No notes for control-id 6.3.2.2.", "props": [ @@ -25671,7 +25630,7 @@ ] }, { - "uuid": "d8b8fedb-69af-4284-b60f-350e905b8390", + "uuid": "5696f159-da49-44e7-a5ef-a0df8f60bf0d", "control-id": "cis_rhel10_6-3.2.3", "description": "No notes for control-id 6.3.2.3.", "props": [ @@ -25693,7 +25652,7 @@ ] }, { - "uuid": "625d11f6-653d-4d77-94c7-ffdda13ff0f5", + "uuid": "886b337e-0946-4106-ae1a-76ebdf19fe90", "control-id": "cis_rhel10_6-3.2.4", "description": "No notes for control-id 6.3.2.4.", "props": [ @@ -25715,7 +25674,7 @@ ] }, { - "uuid": "c39476fa-c8f1-4e74-8b3c-1410b6fb9564", + "uuid": "618f5bef-8ce7-4b1a-b31d-51dd0c68819f", "control-id": "cis_rhel10_6-3.3.1", "description": "No notes for control-id 6.3.3.1.", "props": [ @@ -25732,7 +25691,7 @@ ] }, { - "uuid": "3c2f8e79-f5b4-42da-aa6b-5acade6ca858", + "uuid": "65b5bb28-74e5-421f-8bb2-536bff6b4e26", "control-id": "cis_rhel10_6-3.3.2", "description": "No notes for control-id 6.3.3.2.", "props": [ @@ -25749,7 +25708,7 @@ ] }, { - "uuid": "5c352070-f422-485b-9100-1488320b43d5", + "uuid": "7852d907-2eea-41c7-a75e-9a298b3cb377", "control-id": "cis_rhel10_6-3.3.3", "description": "No notes for control-id 6.3.3.3.", "props": [ @@ -25766,7 +25725,7 @@ ] }, { - "uuid": "74bfad04-49b4-4ac6-bd39-7596d70a76e6", + "uuid": "be1f9cc9-392e-45f0-95c8-c785389bbba3", "control-id": "cis_rhel10_6-3.3.4", "description": "No notes for control-id 6.3.3.4.", "props": [ @@ -25798,7 +25757,7 @@ ] }, { - "uuid": "68a4a21d-066e-4b50-bcff-df669a35beca", + "uuid": "bf78d436-5b7f-42c0-8c2c-4c73d2d29c9b", "control-id": "cis_rhel10_6-3.3.5", "description": "No notes for control-id 6.3.3.5.", "props": [ @@ -25820,7 +25779,7 @@ ] }, { - "uuid": "dbd8a62b-3e73-42e8-a0aa-4f81d4ef4ff4", + "uuid": "20f1c963-52a8-44f3-859d-1af9e3e70cc7", "control-id": "cis_rhel10_6-3.3.6", "description": "No notes for control-id 6.3.3.6.", "props": [ @@ -25842,7 +25801,7 @@ ] }, { - "uuid": "2c76efca-c7f9-4ee1-87e5-672e1dcc4682", + "uuid": "bf4ad540-a0ba-4aa7-8beb-9151ea66d7e7", "control-id": "cis_rhel10_6-3.3.7", "description": "No notes for control-id 6.3.3.7.", "props": [ @@ -25864,7 +25823,7 @@ ] }, { - "uuid": "62565197-e708-4ea9-84ad-eae761a7686e", + "uuid": "67e46584-f210-44c0-984c-5e8da279dc08", "control-id": "cis_rhel10_6-3.3.8", "description": "No notes for control-id 6.3.3.8.", "props": [ @@ -25886,7 +25845,7 @@ ] }, { - "uuid": "c31eca2e-dc2e-419d-887c-5f5547fa67fc", + "uuid": "b07785ec-eaef-4d8d-8d27-959f7902ae78", "control-id": "cis_rhel10_6-3.3.9", "description": "No notes for control-id 6.3.3.9.", "props": [ @@ -25903,7 +25862,7 @@ ] }, { - "uuid": "91e62039-fd85-45df-9ecb-d3f1134d1cf4", + "uuid": "c89e0ae8-f6c2-4879-8c79-3bd182fa351a", "control-id": "cis_rhel10_6-3.3.10", "description": "No notes for control-id 6.3.3.10.", "props": [ @@ -25920,7 +25879,7 @@ ] }, { - "uuid": "a5506cec-5170-4ae7-98e7-12bc2bbfc0cc", + "uuid": "2179d160-b7d1-4c6a-82a9-31bbecc62e21", "control-id": "cis_rhel10_6-3.3.11", "description": "No notes for control-id 6.3.3.11.", "props": [ @@ -25957,7 +25916,7 @@ ] }, { - "uuid": "b151c874-a346-4b8d-91a7-9251702cdd73", + "uuid": "8cb9348b-f87c-4f2e-932a-e65c9fd03861", "control-id": "cis_rhel10_6-3.3.12", "description": "No notes for control-id 6.3.3.12.", "props": [ @@ -25974,7 +25933,7 @@ ] }, { - "uuid": "3d80ab0c-fa11-495c-b82c-bf2edfa335f7", + "uuid": "c188a2d8-0269-4022-b93a-a9e6aaa97c43", "control-id": "cis_rhel10_6-3.3.13", "description": "No notes for control-id 6.3.3.13.", "props": [ @@ -25991,7 +25950,7 @@ ] }, { - "uuid": "b2118aae-e71d-499d-897b-9e06353098f2", + "uuid": "75f6c2d7-7474-4d33-9ca7-a1cb9757c3f5", "control-id": "cis_rhel10_6-3.3.14", "description": "No notes for control-id 6.3.3.14.", "props": [ @@ -26013,7 +25972,7 @@ ] }, { - "uuid": "0d51b895-c63c-498d-a3a0-0a7306ef9da3", + "uuid": "09994cd0-faea-4102-8dcd-9c3ab196db1d", "control-id": "cis_rhel10_6-3.3.15", "description": "No notes for control-id 6.3.3.15.", "props": [ @@ -26030,7 +25989,7 @@ ] }, { - "uuid": "78ddd350-7381-4599-93a0-d766fda15ac9", + "uuid": "9ab2c2d8-a10a-42e2-b3be-afbf64f899ae", "control-id": "cis_rhel10_6-3.3.16", "description": "No notes for control-id 6.3.3.16.", "props": [ @@ -26047,7 +26006,7 @@ ] }, { - "uuid": "53941e96-f56b-4ec5-98fb-b7477265d01f", + "uuid": "52452166-5462-4664-ab4c-b31b31942882", "control-id": "cis_rhel10_6-3.3.17", "description": "No notes for control-id 6.3.3.17.", "props": [ @@ -26069,7 +26028,7 @@ ] }, { - "uuid": "3c8ea1fb-1080-4819-b30f-6b14c80914d7", + "uuid": "730e72af-4a5c-4404-a41b-5e59f7e78a91", "control-id": "cis_rhel10_6-3.3.18", "description": "No notes for control-id 6.3.3.18.", "props": [ @@ -26101,7 +26060,7 @@ ] }, { - "uuid": "318460b4-7740-441f-b382-e79394afab96", + "uuid": "b7aa9950-6a10-41ba-be05-4c5519191dd5", "control-id": "cis_rhel10_6-3.3.19", "description": "No notes for control-id 6.3.3.19.", "props": [ @@ -26133,7 +26092,7 @@ ] }, { - "uuid": "79cc4279-d086-4a61-b6d1-fbf154bcbc23", + "uuid": "71fa256c-2683-43e7-adc7-75cd5020270a", "control-id": "cis_rhel10_6-3.3.20", "description": "No notes for control-id 6.3.3.20.", "props": [ @@ -26175,7 +26134,7 @@ ] }, { - "uuid": "9e9ede9d-9a4f-414b-9aae-eac4cca1510b", + "uuid": "d879fd89-7f61-46ad-82e9-7fc5e22eaab9", "control-id": "cis_rhel10_6-3.3.21", "description": "No notes for control-id 6.3.3.21.", "props": [ @@ -26192,7 +26151,7 @@ ] }, { - "uuid": "e585246c-7ac6-46fa-a352-4f6ce08cb9c8", + "uuid": "c4fd6b0c-1b3f-49a6-9a82-e87415ca81ab", "control-id": "cis_rhel10_6-3.3.22", "description": "No notes for control-id 6.3.3.22.", "props": [ @@ -26219,7 +26178,7 @@ ] }, { - "uuid": "c9cc9d11-e632-4de2-acfb-eb3cb8bd3bf1", + "uuid": "3535eda4-1e6a-4a17-b7fe-154b46e69e41", "control-id": "cis_rhel10_6-3.3.23", "description": "No notes for control-id 6.3.3.23.", "props": [ @@ -26241,7 +26200,7 @@ ] }, { - "uuid": "8e735904-54a7-44fa-aebb-ff50634a0a48", + "uuid": "697df3d0-310c-43f4-b880-839283b1544d", "control-id": "cis_rhel10_6-3.3.24", "description": "No notes for control-id 6.3.3.24.", "props": [ @@ -26263,7 +26222,7 @@ ] }, { - "uuid": "8db1936d-92db-40e6-b035-65270b0eeb24", + "uuid": "79f84214-8333-4683-ab95-45c5e0e24b94", "control-id": "cis_rhel10_6-3.3.25", "description": "No notes for control-id 6.3.3.25.", "props": [ @@ -26290,7 +26249,7 @@ ] }, { - "uuid": "00f85f4a-e259-4841-a2f4-1198754a83d1", + "uuid": "defbdba0-31eb-4fa7-8dcc-32293764401d", "control-id": "cis_rhel10_6-3.3.26", "description": "No notes for control-id 6.3.3.26.", "props": [ @@ -26312,7 +26271,7 @@ ] }, { - "uuid": "76bd0668-810c-4312-a889-299a306cb50b", + "uuid": "da123c8e-9221-48f7-90e0-7b42a5f40771", "control-id": "cis_rhel10_6-3.3.27", "description": "No notes for control-id 6.3.3.27.", "props": [ @@ -26329,7 +26288,7 @@ ] }, { - "uuid": "654d1978-9b96-460d-b823-d65f10982e21", + "uuid": "76726161-81c5-409e-9c67-283c8f7380ef", "control-id": "cis_rhel10_6-3.3.28", "description": "No notes for control-id 6.3.3.28.", "props": [ @@ -26346,7 +26305,7 @@ ] }, { - "uuid": "1323641b-2fa8-405a-bedb-1a29245b5191", + "uuid": "cba21b9d-368b-456c-8c4f-349fe604980d", "control-id": "cis_rhel10_6-3.3.29", "description": "No notes for control-id 6.3.3.29.", "props": [ @@ -26363,7 +26322,7 @@ ] }, { - "uuid": "9c4e1d98-db8a-4cc2-83e7-ce1f4c9c1922", + "uuid": "187b4a70-70de-422d-a6d9-b5d7698e82a3", "control-id": "cis_rhel10_6-3.3.30", "description": "No notes for control-id 6.3.3.30.", "props": [ @@ -26380,7 +26339,7 @@ ] }, { - "uuid": "bc254072-663d-498e-99b6-df5e166cf564", + "uuid": "0df1e90a-6b4e-4ee9-ba16-b7ac47688123", "control-id": "cis_rhel10_6-3.3.31", "description": "No notes for control-id 6.3.3.31.", "props": [ @@ -26397,7 +26356,7 @@ ] }, { - "uuid": "cee04cdd-5a30-4e0a-ba96-62c8770e1cd3", + "uuid": "26e35736-1f74-413f-9ab6-33ace3ffadf8", "control-id": "cis_rhel10_6-3.3.32", "description": "No notes for control-id 6.3.3.32.", "props": [ @@ -26419,7 +26378,7 @@ ] }, { - "uuid": "8fc91efb-f3e6-4957-95ff-2bd09e584574", + "uuid": "148ca1e0-5cda-41c3-87ec-35d3d6265a14", "control-id": "cis_rhel10_6-3.3.33", "description": "No notes for control-id 6.3.3.33.", "props": [ @@ -26436,7 +26395,7 @@ ] }, { - "uuid": "92957107-ccc5-4d61-b755-dca62a0f627d", + "uuid": "b9fd120a-2fbb-42bb-aa91-b899905391a5", "control-id": "cis_rhel10_6-3.3.34", "description": "No notes for control-id 6.3.3.34.", "props": [ @@ -26453,7 +26412,7 @@ ] }, { - "uuid": "295b3d95-d15f-40f6-bbeb-584fec162cae", + "uuid": "508d8eba-620e-4cc5-a358-c4bea65e6dff", "control-id": "cis_rhel10_6-3.3.35", "description": "No notes for control-id 6.3.3.35.", "props": [ @@ -26470,7 +26429,7 @@ ] }, { - "uuid": "35316e0f-3c1a-4310-a544-fe2b927e6576", + "uuid": "33926e64-f1a1-42a0-b9be-0db62b96aa36", "control-id": "cis_rhel10_6-3.3.36", "description": "No notes for control-id 6.3.3.36.", "props": [ @@ -26487,7 +26446,7 @@ ] }, { - "uuid": "642c5edc-a6b2-455e-9619-f17290f4c693", + "uuid": "2cfa48bc-c87f-4444-8547-ad47fbdd4247", "control-id": "cis_rhel10_6-3.3.37", "description": "The description for control-id cis_rhel10_6-3.3.37.", "props": [ @@ -26500,7 +26459,7 @@ ] }, { - "uuid": "2683cdf1-d0be-4daa-8a3c-49f7788a8f53", + "uuid": "ff1a5c62-c034-4314-b887-0b1989e26412", "control-id": "cis_rhel10_6-3.4.1", "description": "No notes for control-id 6.3.4.1.", "props": [ @@ -26517,7 +26476,7 @@ ] }, { - "uuid": "1d255dc8-7dbc-4f5b-aaf6-b7e39c574b34", + "uuid": "b1df0d85-b73d-4cff-918b-f6c95dead7c3", "control-id": "cis_rhel10_6-3.4.2", "description": "No notes for control-id 6.3.4.2.", "props": [ @@ -26534,7 +26493,7 @@ ] }, { - "uuid": "87d90385-23a0-4193-af1f-a26c2e085131", + "uuid": "628a4cb9-f468-4e3f-b277-a2120cef15bc", "control-id": "cis_rhel10_6-3.4.3", "description": "No notes for control-id 6.3.4.3.", "props": [ @@ -26551,7 +26510,7 @@ ] }, { - "uuid": "c680054b-a5f4-4d8c-a520-7c3d7523cbfd", + "uuid": "f320cf0a-57db-4833-a4da-7db345a6ceba", "control-id": "cis_rhel10_6-3.4.4", "description": "No notes for control-id 6.3.4.4.", "props": [ @@ -26568,7 +26527,7 @@ ] }, { - "uuid": "bd838fc8-51a9-4fb8-ae14-c47a07d9b8de", + "uuid": "f08bd37e-5624-4024-9f43-cc1424105db5", "control-id": "cis_rhel10_6-3.4.5", "description": "No notes for control-id 6.3.4.5.", "props": [ @@ -26585,7 +26544,7 @@ ] }, { - "uuid": "0f4732e3-0a12-4216-ac93-ac1f3a3dfb4a", + "uuid": "6b43b781-49b3-4300-ae26-777f7ee4fe4c", "control-id": "cis_rhel10_6-3.4.6", "description": "No notes for control-id 6.3.4.6.", "props": [ @@ -26602,7 +26561,7 @@ ] }, { - "uuid": "c717e4fd-75ff-48d2-aec0-0341d09923b3", + "uuid": "ce07981f-422a-4a85-a814-7d2f9c33be7e", "control-id": "cis_rhel10_6-3.4.7", "description": "No notes for control-id 6.3.4.7.", "props": [ @@ -26619,7 +26578,7 @@ ] }, { - "uuid": "4e832259-ca72-4a05-a886-7ceeb1514b75", + "uuid": "a397c696-b056-4fff-ab3c-6e4e6a3c3341", "control-id": "cis_rhel10_6-3.4.8", "description": "No notes for control-id 6.3.4.8.", "props": [ @@ -26636,7 +26595,7 @@ ] }, { - "uuid": "c9c0beea-c01e-415d-9a55-a8737628097c", + "uuid": "6c336f83-a11c-4f72-a7f4-81feb97d04fa", "control-id": "cis_rhel10_6-3.4.9", "description": "No notes for control-id 6.3.4.9.", "props": [ @@ -26653,7 +26612,7 @@ ] }, { - "uuid": "ce81cdc5-2a14-4b49-8b19-edd4b770e36e", + "uuid": "a96378fb-d543-42fb-9a62-92ac5345a7ef", "control-id": "cis_rhel10_6-3.4.10", "description": "No notes for control-id 6.3.4.10.", "props": [ @@ -26670,7 +26629,7 @@ ] }, { - "uuid": "48213cbc-cc16-41ad-9490-9c10b12b1bc8", + "uuid": "86c3daac-35d9-463f-ab3e-d126cea4ef4e", "control-id": "reload_dconf_db", "description": "This is a helper rule to reload Dconf database correctly.", "props": [ @@ -26687,7 +26646,7 @@ ] }, { - "uuid": "d02af640-5d57-49bd-b751-699b8ec3d6ac", + "uuid": "fd1d548d-3eb9-48d1-a4c7-86de0f299a7d", "control-id": "cis_rhel10_1-1.1.1", "description": "No notes for control-id 1.1.1.1.", "props": [ @@ -26704,7 +26663,7 @@ ] }, { - "uuid": "3935f7e8-a631-42cf-a0ee-a7eade0e4c49", + "uuid": "bbac35b9-71db-4641-b542-f38f4528ff6f", "control-id": "cis_rhel10_1-1.1.2", "description": "No notes for control-id 1.1.1.2.", "props": [ @@ -26721,7 +26680,7 @@ ] }, { - "uuid": "504061fa-24ff-4b0b-8173-29da4b053ad7", + "uuid": "4d0942f0-32e8-4601-bb60-97c3a6cb5290", "control-id": "cis_rhel10_1-1.1.3", "description": "No notes for control-id 1.1.1.3.", "props": [ @@ -26738,7 +26697,7 @@ ] }, { - "uuid": "263ba465-6292-4089-81ab-69472aabf303", + "uuid": "e40ac9ad-00d2-4b80-a2a6-b648556c9a51", "control-id": "cis_rhel10_1-1.1.4", "description": "No notes for control-id 1.1.1.4.", "props": [ @@ -26755,7 +26714,7 @@ ] }, { - "uuid": "2dfce83e-7349-4f52-8bba-00aa466ea478", + "uuid": "3367dd1e-bea5-4d62-9cc9-cda9eaf3a6b5", "control-id": "cis_rhel10_1-1.1.5", "description": "No notes for control-id 1.1.1.5.", "props": [ @@ -26772,7 +26731,7 @@ ] }, { - "uuid": "4b9a543b-100a-4f28-8c68-f11e585c4e45", + "uuid": "9dd1b16b-be71-42ef-b00e-5eed7f12d1e5", "control-id": "cis_rhel10_1-1.1.9", "description": "No notes for control-id 1.1.1.9.", "props": [ @@ -26789,7 +26748,7 @@ ] }, { - "uuid": "a60098c5-39de-4e7e-b30d-703d25c0f81b", + "uuid": "161cd5dc-b422-4fa2-9b93-bbac1ec8198a", "control-id": "cis_rhel10_1-1.1.10", "description": "No notes for control-id 1.1.1.10.", "props": [ @@ -26806,7 +26765,7 @@ ] }, { - "uuid": "c943d23c-9c32-4e16-b7b2-1c5a46633622", + "uuid": "7c5d974d-7af2-4aaf-9f3f-d9ef861e253f", "control-id": "cis_rhel10_1-1.1.11", "description": "The description for control-id cis_rhel10_1-1.1.11.", "props": [ @@ -26819,7 +26778,7 @@ ] }, { - "uuid": "ecc1ee1c-81d1-49c3-82d8-c0a37376f1d9", + "uuid": "f50721eb-3b3a-4cdf-9196-a0214a394edb", "control-id": "cis_rhel10_1-1.2.1.1", "description": "No notes for control-id 1.1.2.1.1.", "props": [ @@ -26836,7 +26795,7 @@ ] }, { - "uuid": "191b6b25-e42e-4002-8510-ee2d3c9cc70e", + "uuid": "5156122f-e8d3-436c-b59f-7cfdd36de8a3", "control-id": "cis_rhel10_1-1.2.1.2", "description": "No notes for control-id 1.1.2.1.2.", "props": [ @@ -26853,7 +26812,7 @@ ] }, { - "uuid": "784a67ff-4cdc-4b14-98da-da600a2abdf8", + "uuid": "47e5f478-765a-4f36-9fee-a936be845cd6", "control-id": "cis_rhel10_1-1.2.1.3", "description": "No notes for control-id 1.1.2.1.3.", "props": [ @@ -26870,7 +26829,7 @@ ] }, { - "uuid": "6bb67fd7-21d2-4231-81eb-0674d483ca43", + "uuid": "cb4a756e-673f-4287-9e35-a0cea8a1464c", "control-id": "cis_rhel10_1-1.2.1.4", "description": "No notes for control-id 1.1.2.1.4.", "props": [ @@ -26887,7 +26846,7 @@ ] }, { - "uuid": "d1440ef0-76d8-479b-88f0-5cdfa10c1fac", + "uuid": "fc3dd7c3-dad9-497c-b168-bb10a941b0e1", "control-id": "cis_rhel10_1-1.2.2.1", "description": "No notes for control-id 1.1.2.2.1.", "props": [ @@ -26904,7 +26863,7 @@ ] }, { - "uuid": "7fd88415-eaab-49d4-a709-f45eae1189fa", + "uuid": "dc58543c-ce4f-47bf-a17c-d922f602a4eb", "control-id": "cis_rhel10_1-1.2.2.2", "description": "No notes for control-id 1.1.2.2.2.", "props": [ @@ -26921,7 +26880,7 @@ ] }, { - "uuid": "b4f78dd1-7379-435d-b30b-5576f8006429", + "uuid": "084ec0ab-dbf3-461c-b9be-36b6b4e76339", "control-id": "cis_rhel10_1-1.2.2.3", "description": "No notes for control-id 1.1.2.2.3.", "props": [ @@ -26938,7 +26897,7 @@ ] }, { - "uuid": "81906c1c-a4dd-495f-ac33-3f3f99c044c9", + "uuid": "611fc06e-92ae-4d1d-90a2-30ed320df708", "control-id": "cis_rhel10_1-1.2.2.4", "description": "No notes for control-id 1.1.2.2.4.", "props": [ @@ -26955,7 +26914,7 @@ ] }, { - "uuid": "1205da36-f369-4eb2-94be-513ec1a3676e", + "uuid": "608bd064-dc63-4ad9-bd73-63db87537bb8", "control-id": "cis_rhel10_1-1.2.3.2", "description": "No notes for control-id 1.1.2.3.2.", "props": [ @@ -26972,7 +26931,7 @@ ] }, { - "uuid": "de53786e-61d7-4b3b-b06e-34686e218d66", + "uuid": "389e93ae-a127-454b-aa36-c0925087fa13", "control-id": "cis_rhel10_1-1.2.3.3", "description": "No notes for control-id 1.1.2.3.3.", "props": [ @@ -26989,7 +26948,7 @@ ] }, { - "uuid": "7bb2cbaf-008e-4e82-8f75-6c863f9d9b3a", + "uuid": "263a6897-5550-427e-bf34-3d47b34b8b48", "control-id": "cis_rhel10_1-1.2.4.2", "description": "No notes for control-id 1.1.2.4.2.", "props": [ @@ -27006,7 +26965,7 @@ ] }, { - "uuid": "14257ed6-abb8-4f11-a736-e23bd12bf15b", + "uuid": "f9bd1eb6-1560-4bc9-87a0-f4b9f7e37264", "control-id": "cis_rhel10_1-1.2.4.3", "description": "No notes for control-id 1.1.2.4.3.", "props": [ @@ -27023,7 +26982,7 @@ ] }, { - "uuid": "101a20ee-c40e-4e45-bb15-c2a090b2343c", + "uuid": "a29c6814-a86f-46b4-9e51-4c6295475760", "control-id": "cis_rhel10_1-1.2.5.2", "description": "No notes for control-id 1.1.2.5.2.", "props": [ @@ -27040,7 +26999,7 @@ ] }, { - "uuid": "5fae420b-9b40-4bb9-9986-b643e6931e4d", + "uuid": "12741dce-1493-4aa6-9e2d-b35fb348b928", "control-id": "cis_rhel10_1-1.2.5.3", "description": "No notes for control-id 1.1.2.5.3.", "props": [ @@ -27057,7 +27016,7 @@ ] }, { - "uuid": "b3fb1823-b593-4e45-a865-78c9354bedf4", + "uuid": "dbe0d823-b0e4-413c-9c16-05a935d43938", "control-id": "cis_rhel10_1-1.2.5.4", "description": "No notes for control-id 1.1.2.5.4.", "props": [ @@ -27074,7 +27033,7 @@ ] }, { - "uuid": "3e3741cf-bc69-401e-9193-69dbcb5ab910", + "uuid": "ce61752b-3624-41fd-9e9d-4ed03eac3cd3", "control-id": "cis_rhel10_1-1.2.6.2", "description": "No notes for control-id 1.1.2.6.2.", "props": [ @@ -27091,7 +27050,7 @@ ] }, { - "uuid": "a4c9a35a-e4f5-42fd-be70-36d3ca0cfb1d", + "uuid": "41b4a59b-8de8-46b9-bf6d-995c170fd7b4", "control-id": "cis_rhel10_1-1.2.6.3", "description": "No notes for control-id 1.1.2.6.3.", "props": [ @@ -27108,7 +27067,7 @@ ] }, { - "uuid": "1e5e01d4-8788-46cc-8b7d-bde43616001e", + "uuid": "cae29167-a9ff-41d1-bcc0-766af0428da0", "control-id": "cis_rhel10_1-1.2.6.4", "description": "No notes for control-id 1.1.2.6.4.", "props": [ @@ -27125,7 +27084,7 @@ ] }, { - "uuid": "0126ee8a-2d31-4e7d-8eeb-594a3db5646e", + "uuid": "30639f70-2643-4cce-ad2d-b9671f6a8399", "control-id": "cis_rhel10_1-1.2.7.2", "description": "No notes for control-id 1.1.2.7.2.", "props": [ @@ -27142,7 +27101,7 @@ ] }, { - "uuid": "27c6225a-9975-4f0c-b461-155395562526", + "uuid": "53c1b655-6853-44b6-a22a-727bb4603d2e", "control-id": "cis_rhel10_1-1.2.7.3", "description": "No notes for control-id 1.1.2.7.3.", "props": [ @@ -27159,7 +27118,7 @@ ] }, { - "uuid": "a62cd160-11f7-4e68-857c-77d8f9339c17", + "uuid": "90fa630d-30b7-4b30-af17-2d1ace6797c1", "control-id": "cis_rhel10_1-1.2.7.4", "description": "No notes for control-id 1.1.2.7.4.", "props": [ @@ -27176,7 +27135,7 @@ ] }, { - "uuid": "31795ca9-2d7e-4c20-95df-451c183c3c76", + "uuid": "580453dd-037d-4449-a623-04e271a304ec", "control-id": "cis_rhel10_1-2.1.1", "description": "The description for control-id cis_rhel10_1-2.1.1.", "props": [ @@ -27189,7 +27148,7 @@ ] }, { - "uuid": "e350d549-5ee5-4d20-b2ba-8b8c86bd8589", + "uuid": "1811f64f-537b-4909-b0eb-88848e449257", "control-id": "cis_rhel10_1-2.1.2", "description": "No notes for control-id 1.2.1.2.", "props": [ @@ -27206,7 +27165,7 @@ ] }, { - "uuid": "b9272316-aa53-4089-a7bb-cc791064225c", + "uuid": "2affa82f-ab84-4a2b-b6c3-017daf6a70d3", "control-id": "cis_rhel10_1-2.1.4", "description": "The description for control-id cis_rhel10_1-2.1.4.", "props": [ @@ -27219,7 +27178,7 @@ ] }, { - "uuid": "c0a46f60-cba4-429b-902f-2095b9dafd30", + "uuid": "9b3900ad-c571-44f9-af30-b4741c1f9a65", "control-id": "cis_rhel10_1-2.2.1", "description": "The description for control-id cis_rhel10_1-2.2.1.", "props": [ @@ -27232,7 +27191,7 @@ ] }, { - "uuid": "d76a12ae-0e15-4d9c-965f-aad08c1a3223", + "uuid": "15be6663-df92-4e33-992e-439ab33c741f", "control-id": "cis_rhel10_1-3.1.1", "description": "No notes for control-id 1.3.1.1.", "props": [ @@ -27249,7 +27208,7 @@ ] }, { - "uuid": "a97d6f33-c2d3-4bef-9bb6-1a55e65adc8e", + "uuid": "630a1400-a7ef-4976-af02-a9ab67e4ca7b", "control-id": "cis_rhel10_1-3.1.2", "description": "No notes for control-id 1.3.1.2.", "props": [ @@ -27266,7 +27225,7 @@ ] }, { - "uuid": "d316a0ba-f483-4b29-8749-5198dc94780f", + "uuid": "caecad05-001c-403f-a7fc-f9283faae62e", "control-id": "cis_rhel10_1-3.1.3", "description": "No notes for control-id 1.3.1.3.", "props": [ @@ -27283,7 +27242,7 @@ ] }, { - "uuid": "afd718c7-9cc2-4dfb-a1c4-b27e40074b42", + "uuid": "12a8ce52-37ca-4b89-a727-da91a8faa6c1", "control-id": "cis_rhel10_1-3.1.4", "description": "No notes for control-id 1.3.1.4.", "props": [ @@ -27300,7 +27259,7 @@ ] }, { - "uuid": "91bf33c1-0651-4b5d-8cd4-e668df9297b2", + "uuid": "37e24599-cd0c-46f1-8574-09516804b728", "control-id": "cis_rhel10_1-3.1.7", "description": "No notes for control-id 1.3.1.7.", "props": [ @@ -27317,7 +27276,7 @@ ] }, { - "uuid": "10373885-ec79-43e3-bb04-d532b00251fd", + "uuid": "6608e37b-9815-4779-a188-ba95862a079b", "control-id": "cis_rhel10_1-3.1.8", "description": "No notes for control-id 1.3.1.8.", "props": [ @@ -27334,7 +27293,7 @@ ] }, { - "uuid": "2854efaa-b00e-4500-b6b7-694ae4b0aafd", + "uuid": "bbc15c45-734e-4476-804a-03b43b215860", "control-id": "cis_rhel10_1-4.1", "description": "There is no automated remediation for this rule and this is intentional.\nMore details in the rule description.", "props": [ @@ -27351,7 +27310,7 @@ ] }, { - "uuid": "5ccb125b-5e36-428c-b4dd-3a06786c020f", + "uuid": "1c9b7a63-9be9-4081-b912-3e37a1603146", "control-id": "cis_rhel10_1-4.2", "description": "This requirement demands a deeper review of the rules.", "props": [ @@ -27378,7 +27337,7 @@ ] }, { - "uuid": "83355a4b-ab28-419d-91f5-8c9b0ea7ea23", + "uuid": "3fb24b2c-eeac-450c-b30f-24b362158b43", "control-id": "cis_rhel10_1-5.1", "description": "No notes for control-id 1.5.1.", "props": [ @@ -27395,7 +27354,7 @@ ] }, { - "uuid": "a832c96b-4844-4529-a7b2-bdbd112d3c8e", + "uuid": "37c6a25c-f154-4539-b818-97f35c32a706", "control-id": "cis_rhel10_1-5.2", "description": "No notes for control-id 1.5.2.", "props": [ @@ -27412,7 +27371,7 @@ ] }, { - "uuid": "6eb9ee81-7067-41b6-84cf-0c3f5fa1d617", + "uuid": "6b9ebdc8-3ce4-4710-90ff-09b3aad53502", "control-id": "cis_rhel10_1-5.4", "description": "No notes for control-id 1.5.4.", "props": [ @@ -27429,7 +27388,7 @@ ] }, { - "uuid": "e03897ad-cfcb-4fb4-a7da-bf3f145af86e", + "uuid": "cdc03d68-0a3d-442d-920c-6353a695a3d9", "control-id": "cis_rhel10_1-5.5", "description": "No notes for control-id 1.5.5.", "props": [ @@ -27446,7 +27405,7 @@ ] }, { - "uuid": "a08853c7-53ef-4ebb-b479-e7b0c8773a11", + "uuid": "c2bc67b4-a383-4dcb-b3a2-a9d7b3240ac1", "control-id": "cis_rhel10_1-5.6", "description": "No notes for control-id 1.5.6.", "props": [ @@ -27463,7 +27422,7 @@ ] }, { - "uuid": "e70a32bf-2d63-4638-b376-f74ba8c0d8a4", + "uuid": "db427447-fbb8-43db-b00e-53c4283113eb", "control-id": "cis_rhel10_1-5.7", "description": "No notes for control-id 1.5.7.", "props": [ @@ -27480,7 +27439,7 @@ ] }, { - "uuid": "6003aa3e-4c43-42ad-a922-6e723e3f4706", + "uuid": "16394734-6d32-451e-b6e2-4577cd1a6f51", "control-id": "cis_rhel10_1-5.8", "description": "Address Space Layout Randomization (ASLR)", "props": [ @@ -27497,7 +27456,7 @@ ] }, { - "uuid": "1146f8e9-0489-407e-88be-579059b252c1", + "uuid": "30e9f00a-2580-4343-8575-9f5a92394c3c", "control-id": "cis_rhel10_1-5.9", "description": "No notes for control-id 1.5.9.", "props": [ @@ -27514,7 +27473,7 @@ ] }, { - "uuid": "7e21c6e0-8f96-4425-8701-e49a906662f9", + "uuid": "e32018d9-d616-409c-ba72-d538578a36fc", "control-id": "cis_rhel10_1-5.10", "description": "No notes for control-id 1.5.10.", "props": [ @@ -27531,7 +27490,7 @@ ] }, { - "uuid": "2674a47e-47b4-41e0-ae64-501ccc6cbd09", + "uuid": "2ef6907a-90e7-4189-9664-95df65a01b78", "control-id": "cis_rhel10_1-6.1", "description": "No notes for control-id 1.6.1.", "props": [ @@ -27548,7 +27507,7 @@ ] }, { - "uuid": "a7db3fbc-d064-4858-b9af-32ef28a729da", + "uuid": "45c64bf8-8514-4b6e-ad13-8e284efe43e1", "control-id": "cis_rhel10_1-6.2", "description": "No notes for control-id 1.6.2.", "props": [ @@ -27565,7 +27524,7 @@ ] }, { - "uuid": "4b270093-9e8d-4bf1-9a73-7e4380e9f67c", + "uuid": "5b6b6340-8f51-4908-8306-72ed9c414305", "control-id": "cis_rhel10_1-6.3", "description": "No notes for control-id 1.6.3.", "props": [ @@ -27582,7 +27541,7 @@ ] }, { - "uuid": "1d2762d0-6d12-416e-8318-3b949db5cd86", + "uuid": "41c13ebb-2c7d-4138-bc37-0483c989cc73", "control-id": "cis_rhel10_1-6.4", "description": "No notes for control-id 1.6.4.", "props": [ @@ -27599,7 +27558,7 @@ ] }, { - "uuid": "ee24858a-f6d7-4df1-a691-8d6c5c2467de", + "uuid": "8de1f153-abff-4938-84f8-8847450e50c9", "control-id": "cis_rhel10_1-7.1", "description": "No notes for control-id 1.7.1.", "props": [ @@ -27616,7 +27575,7 @@ ] }, { - "uuid": "2851f937-ca58-4cd2-bc00-e0e23bce53fa", + "uuid": "6c81a77f-ba12-4f2d-904d-beef721d93fc", "control-id": "cis_rhel10_1-7.2", "description": "No notes for control-id 1.7.2.", "props": [ @@ -27633,7 +27592,7 @@ ] }, { - "uuid": "dc3a050e-b290-415d-b2ff-f6888a489c9d", + "uuid": "5babe739-126a-417b-b2c6-d41ce4e25979", "control-id": "cis_rhel10_1-7.3", "description": "No notes for control-id 1.7.3.", "props": [ @@ -27650,7 +27609,7 @@ ] }, { - "uuid": "c1e7116e-4494-4fb5-958f-ade513b67780", + "uuid": "6815ba13-9500-4175-8219-90041f1a2a00", "control-id": "cis_rhel10_1-7.4", "description": "No notes for control-id 1.7.4.", "props": [ @@ -27677,7 +27636,7 @@ ] }, { - "uuid": "105adef5-fd92-4d30-9354-734c453d1132", + "uuid": "ed4c8744-64a0-4e02-92e7-e7d826fb53c9", "control-id": "cis_rhel10_1-7.5", "description": "No notes for control-id 1.7.5.", "props": [ @@ -27704,7 +27663,7 @@ ] }, { - "uuid": "0f68f9b5-717f-48f2-bd6e-3e41a26b6b39", + "uuid": "eb8a02ee-54e1-423c-bc55-20a24ff69b1f", "control-id": "cis_rhel10_1-7.6", "description": "No notes for control-id 1.7.6.", "props": [ @@ -27731,7 +27690,7 @@ ] }, { - "uuid": "72730747-a369-4101-9123-4a6038cb4e98", + "uuid": "79b82388-532d-4300-a8e9-c421334988ee", "control-id": "cis_rhel10_1-8.1", "description": "No notes for control-id 1.8.1.", "props": [ @@ -27753,7 +27712,7 @@ ] }, { - "uuid": "f6284668-0ea1-4e2c-9f0a-703056cc1b35", + "uuid": "d71f7345-59ce-4989-b284-1edea2e5e245", "control-id": "cis_rhel10_1-8.2", "description": "No notes for control-id 1.8.2.", "props": [ @@ -27770,7 +27729,7 @@ ] }, { - "uuid": "460811eb-e4f8-4398-8bf4-63346c196a7c", + "uuid": "73268ea4-5521-42a7-8e00-5c1403bf711d", "control-id": "cis_rhel10_1-8.3", "description": "No notes for control-id 1.8.3.", "props": [ @@ -27802,7 +27761,7 @@ ] }, { - "uuid": "f2e9d0b7-33c1-47b0-bc41-6669edcdd746", + "uuid": "3c374dae-a647-4d74-b129-9797cb0fcec3", "control-id": "cis_rhel10_1-8.4", "description": "No notes for control-id 1.8.4.", "props": [ @@ -27824,7 +27783,7 @@ ] }, { - "uuid": "c2c9b601-7148-4e7a-8707-f46de52d3876", + "uuid": "ade0305e-f701-44c8-8a13-7ae26cb7f000", "control-id": "cis_rhel10_1-8.5", "description": "No notes for control-id 1.8.5.", "props": [ @@ -27841,7 +27800,7 @@ ] }, { - "uuid": "e7ebc8c8-0f0e-498f-a69e-037acd4e7a07", + "uuid": "c58f57da-4c68-41c3-ae88-5fcc26d9590a", "control-id": "cis_rhel10_2-1.1", "description": "No notes for control-id 2.1.1.", "props": [ @@ -27858,7 +27817,7 @@ ] }, { - "uuid": "463be1a8-59f0-476e-8b55-5b0c2bb0d6e7", + "uuid": "6942c23d-beae-4b6a-9f54-2b6ba81de034", "control-id": "cis_rhel10_2-1.2", "description": "No notes for control-id 2.1.2.", "props": [ @@ -27875,7 +27834,7 @@ ] }, { - "uuid": "de4bf035-e897-48b0-947f-51038df53c3b", + "uuid": "86da00e3-d0b2-46e5-8a4c-db719f89ff2d", "control-id": "cis_rhel10_2-1.4", "description": "No notes for control-id 2.1.4.", "props": [ @@ -27892,7 +27851,7 @@ ] }, { - "uuid": "791bceec-26f9-4108-82e7-782c19d72f32", + "uuid": "31e933de-e1b9-424d-b0c8-cdc94ac4605d", "control-id": "cis_rhel10_2-1.5", "description": "No notes for control-id 2.1.5.", "props": [ @@ -27909,7 +27868,7 @@ ] }, { - "uuid": "572dc4ea-6df0-4f2e-bbd7-8485c50639f8", + "uuid": "82bd02d7-85af-418e-923b-760f1c2a7b54", "control-id": "cis_rhel10_2-1.6", "description": "No notes for control-id 2.1.6.", "props": [ @@ -27926,7 +27885,7 @@ ] }, { - "uuid": "82b13012-acbb-485e-ba0a-ca6dd7533c3e", + "uuid": "7a4dceae-1b6a-42b0-9ae5-b1812d9b13cc", "control-id": "cis_rhel10_2-1.7", "description": "No notes for control-id 2.1.7.", "props": [ @@ -27943,7 +27902,7 @@ ] }, { - "uuid": "04018695-d36d-44ff-862d-21ec7e092982", + "uuid": "401ce675-16cb-4014-bfdf-07c026a8eb50", "control-id": "cis_rhel10_2-1.8", "description": "No notes for control-id 2.1.8.", "props": [ @@ -27965,7 +27924,7 @@ ] }, { - "uuid": "74f1da4b-3635-4a02-8622-c223d9adfcc0", + "uuid": "05a55fd1-850b-49a1-aba4-11fbf96db877", "control-id": "cis_rhel10_2-1.9", "description": "Many of the libvirt packages used by Enterprise Linux virtualization are dependent on the\nnfs-utils package.", "props": [ @@ -27982,7 +27941,7 @@ ] }, { - "uuid": "5d68a99c-f1c9-4c84-a524-e240e0fe737c", + "uuid": "2c284ee9-f8ad-4602-8701-50eba51fdac7", "control-id": "cis_rhel10_2-1.10", "description": "No notes for control-id 2.1.10.", "props": [ @@ -27999,7 +27958,7 @@ ] }, { - "uuid": "17bde8b4-ee4a-4257-85a3-4effecc01dc6", + "uuid": "ac577832-65bf-4760-a262-b8a17bd4b0af", "control-id": "cis_rhel10_2-1.11", "description": "Many of the libvirt packages used by Enterprise Linux virtualization, and the nfs-utils\npackage used for The Network File System (NFS), are dependent on the rpcbind package.", "props": [ @@ -28016,7 +27975,7 @@ ] }, { - "uuid": "0e289a0e-30f1-415b-abbf-7716e05e9e9a", + "uuid": "ec1023cd-d71f-4cd9-856d-606caf1c689a", "control-id": "cis_rhel10_2-1.12", "description": "No notes for control-id 2.1.12.", "props": [ @@ -28033,7 +27992,7 @@ ] }, { - "uuid": "10a6428a-fcc8-4df5-8a6b-552f34931fd7", + "uuid": "8b9affb8-080d-4c24-aab9-86b0cf84660d", "control-id": "cis_rhel10_2-1.13", "description": "No notes for control-id 2.1.13.", "props": [ @@ -28050,7 +28009,7 @@ ] }, { - "uuid": "731c48a5-9e9a-4254-9f90-cba48ccbbf56", + "uuid": "d60342a7-5af6-4dda-b2cf-439c29bc40ea", "control-id": "cis_rhel10_2-1.14", "description": "No notes for control-id 2.1.14.", "props": [ @@ -28067,7 +28026,7 @@ ] }, { - "uuid": "fe45c391-4f37-4a65-9246-caaa7637ba33", + "uuid": "fcd01ea4-4d04-4599-bbde-80df86943262", "control-id": "cis_rhel10_2-1.15", "description": "No notes for control-id 2.1.15.", "props": [ @@ -28084,7 +28043,7 @@ ] }, { - "uuid": "958fb8d5-73bf-401c-8f3b-c514c6de5314", + "uuid": "f996966c-547d-47eb-86f9-142ffa8d6ce0", "control-id": "cis_rhel10_2-1.16", "description": "No notes for control-id 2.1.16.", "props": [ @@ -28101,7 +28060,7 @@ ] }, { - "uuid": "e54dfc2d-a364-4bf7-9f4b-ef36f0db8d74", + "uuid": "ae3296b0-db7c-466f-9032-f09816edf247", "control-id": "cis_rhel10_2-1.17", "description": "No notes for control-id 2.1.17.", "props": [ @@ -28118,7 +28077,7 @@ ] }, { - "uuid": "4f9c875a-c331-4232-8282-00f5f4d111c1", + "uuid": "4fab87e5-d223-48eb-b8c6-0f4103c87471", "control-id": "cis_rhel10_2-1.18", "description": "No notes for control-id 2.1.18.", "props": [ @@ -28140,7 +28099,7 @@ ] }, { - "uuid": "68a5e641-3547-4aac-a6fd-a5be7c9d656a", + "uuid": "5f791b47-afb1-47ae-b196-0d2d07c84c9b", "control-id": "cis_rhel10_2-1.21", "description": "No notes for control-id 2.1.21.", "props": [ @@ -28162,7 +28121,7 @@ ] }, { - "uuid": "0aeb0eca-c9ec-4912-87a4-ad8fe8558061", + "uuid": "f0265b0a-7ec2-43d7-a280-0f82d90002cc", "control-id": "cis_rhel10_2-1.22", "description": "The description for control-id cis_rhel10_2-1.22.", "props": [ @@ -28175,7 +28134,7 @@ ] }, { - "uuid": "9b966199-cdf2-4526-8d07-fa182558ed93", + "uuid": "33aa3e47-1218-43f2-b7e1-1258a53996db", "control-id": "cis_rhel10_2-2.1", "description": "No notes for control-id 2.2.1.", "props": [ @@ -28192,7 +28151,7 @@ ] }, { - "uuid": "6c817225-22d9-4640-8512-ec72b86b036f", + "uuid": "bfc0f40e-d073-451d-bac8-3f91dfd8dab5", "control-id": "cis_rhel10_2-2.3", "description": "No notes for control-id 2.2.3.", "props": [ @@ -28209,7 +28168,7 @@ ] }, { - "uuid": "6a20443a-86b0-4e45-a2ca-1c9565a9a5e7", + "uuid": "08b850dd-198d-452c-9f02-6850a55b99fc", "control-id": "cis_rhel10_2-2.4", "description": "No notes for control-id 2.2.4.", "props": [ @@ -28226,7 +28185,7 @@ ] }, { - "uuid": "1f68a085-f78f-4469-b7dd-1456ab6849f4", + "uuid": "ad7fabd8-9294-48a0-b392-8dd969424225", "control-id": "cis_rhel10_2-3.1", "description": "No notes for control-id 2.3.1.", "props": [ @@ -28238,7 +28197,7 @@ ] }, { - "uuid": "07a1a53a-e467-40d7-a418-d03a7176e0d4", + "uuid": "978b2b16-7ad2-4cd7-95cc-e3b9c7409d32", "control-id": "cis_rhel10_2-3.2", "description": "No notes for control-id 2.3.2.", "props": [ @@ -28255,7 +28214,7 @@ ] }, { - "uuid": "6f3f9645-1509-4725-8ad6-7db6613f0cd6", + "uuid": "172b14b0-26ca-4b1f-a6a4-dbe4f9e84075", "control-id": "cis_rhel10_2-3.3", "description": "No notes for control-id 2.3.3.", "props": [ @@ -28272,7 +28231,7 @@ ] }, { - "uuid": "fe9608ab-53ec-4f8c-a489-b76886c7a334", + "uuid": "7b3acf13-1b65-41fc-a737-bb71415fc749", "control-id": "cis_rhel10_2-4.1.1", "description": "No notes for control-id 2.4.1.1.", "props": [ @@ -28294,7 +28253,7 @@ ] }, { - "uuid": "dcbdfeb2-5817-412d-baad-f6cbce8e07b2", + "uuid": "dcf32de0-021b-4b7f-836e-f879b57d64f8", "control-id": "cis_rhel10_2-4.1.2", "description": "No notes for control-id 2.4.1.2.", "props": [ @@ -28321,7 +28280,7 @@ ] }, { - "uuid": "b30811f5-ff8c-4f03-9f08-ecd0419ce122", + "uuid": "a6a8f5e3-e98f-4267-ad9b-47036fc7eabc", "control-id": "cis_rhel10_2-4.1.3", "description": "No notes for control-id 2.4.1.3.", "props": [ @@ -28348,7 +28307,7 @@ ] }, { - "uuid": "cd71425d-caf0-4d83-8a0c-57b3f4295b43", + "uuid": "d81bd918-666c-43ff-9cc4-1eee1f73b17b", "control-id": "cis_rhel10_2-4.1.4", "description": "No notes for control-id 2.4.1.4.", "props": [ @@ -28375,7 +28334,7 @@ ] }, { - "uuid": "df72bfa4-eb90-462a-81ec-353b879d3a5e", + "uuid": "be2a5425-caf7-4320-91a3-354ca06a9728", "control-id": "cis_rhel10_2-4.1.5", "description": "No notes for control-id 2.4.1.5.", "props": [ @@ -28402,7 +28361,7 @@ ] }, { - "uuid": "fd0e83a1-5876-4d2a-b7ea-b92271703d8d", + "uuid": "70592f65-4d7e-4886-ae1f-563dff01f6ba", "control-id": "cis_rhel10_2-4.1.6", "description": "No notes for control-id 2.4.1.6.", "props": [ @@ -28429,7 +28388,7 @@ ] }, { - "uuid": "58626afd-d047-4915-b7e9-c2e921be7346", + "uuid": "9f778bbd-1320-4814-a6fd-d4c99b3ac239", "control-id": "cis_rhel10_2-4.1.7", "description": "No notes for control-id 2.4.1.7.", "props": [ @@ -28456,7 +28415,7 @@ ] }, { - "uuid": "b90e5f9a-3d24-43b9-a3ac-66ac8b33c204", + "uuid": "74aeb77d-cc02-4d98-b1bd-7743c3e4de11", "control-id": "cis_rhel10_2-4.1.8", "description": "No notes for control-id 2.4.1.8.", "props": [ @@ -28483,7 +28442,7 @@ ] }, { - "uuid": "2e2eaf21-11ff-4550-95b9-6d4ddba4929d", + "uuid": "4ac2674b-5fd1-45b7-80e6-557331c1c98e", "control-id": "cis_rhel10_2-4.1.9", "description": "No notes for control-id 2.4.1.9.", "props": [ @@ -28520,7 +28479,7 @@ ] }, { - "uuid": "72bc4ab3-1275-4901-8e21-9971745a30b4", + "uuid": "c7fb0dc9-9a5f-4914-af6f-b340e025047e", "control-id": "cis_rhel10_2-4.2.1", "description": "No notes for control-id 2.4.2.1.", "props": [ @@ -28557,7 +28516,7 @@ ] }, { - "uuid": "4aeaa237-eb1d-4087-a1fd-4d7ed7c04c5e", + "uuid": "8fcac5e5-3913-438c-8a1b-03b43a75bac8", "control-id": "cis_rhel10_3-1.1", "description": "The description for control-id cis_rhel10_3-1.1.", "props": [ @@ -28570,7 +28529,7 @@ ] }, { - "uuid": "2d4ad981-f16e-4ea9-8887-f29567e26e4e", + "uuid": "0afc71ea-80ee-422b-bd6d-b369406ffa97", "control-id": "cis_rhel10_3-1.2", "description": "No notes for control-id 3.1.2.", "props": [ @@ -28587,7 +28546,7 @@ ] }, { - "uuid": "62f4b29b-0b51-4c07-9ffc-ae631fe4e9ec", + "uuid": "096a79b8-261d-49cf-9fb1-26917f48406f", "control-id": "cis_rhel10_3-1.3", "description": "No notes for control-id 3.1.3.", "props": [ @@ -28604,7 +28563,7 @@ ] }, { - "uuid": "de900cdb-4c8b-4be1-b8cd-bb3672bf9f28", + "uuid": "77e33935-c72b-4dbd-b5a5-c2070ea8aeb6", "control-id": "cis_rhel10_3-2.1", "description": "No notes for control-id 3.2.1.", "props": [ @@ -28621,7 +28580,7 @@ ] }, { - "uuid": "037eff27-14f3-4859-93eb-e85506a19239", + "uuid": "b452b38f-7ef3-4e84-8b8a-cdd70207b8c0", "control-id": "cis_rhel10_3-2.2", "description": "No notes for control-id 3.2.2.", "props": [ @@ -28638,7 +28597,7 @@ ] }, { - "uuid": "d82a4a47-edd6-488f-90fe-5838c0e66094", + "uuid": "c91be890-4803-4924-ba9b-6434eb43aed1", "control-id": "cis_rhel10_3-2.3", "description": "No notes for control-id 3.2.3.", "props": [ @@ -28655,7 +28614,7 @@ ] }, { - "uuid": "2821176c-ecdf-415b-87d9-b1b2dfbb4278", + "uuid": "0f09d544-3809-42da-8ba8-ca34fc533088", "control-id": "cis_rhel10_3-2.4", "description": "No notes for control-id 3.2.4.", "props": [ @@ -28672,7 +28631,7 @@ ] }, { - "uuid": "533227d6-72ef-4f74-93ba-1f477492a0a8", + "uuid": "5af36334-5ce7-4d2a-9de1-c799e354c015", "control-id": "cis_rhel10_3-2.5", "description": "No notes for control-id 3.2.5.", "props": [ @@ -28689,7 +28648,7 @@ ] }, { - "uuid": "bf32f985-95e6-480a-b732-d01e50b19259", + "uuid": "32bdae54-78b5-48ad-8fc1-28da9e9fdbed", "control-id": "cis_rhel10_3-2.6", "description": "No notes for control-id 3.2.6.", "props": [ @@ -28706,7 +28665,7 @@ ] }, { - "uuid": "3fd2b960-476a-4ee9-b250-040276c2b1bc", + "uuid": "fd4f86fa-759c-418f-98e6-a00a75e15aa4", "control-id": "cis_rhel10_3-3.1.2", "description": "No notes for control-id 3.3.1.2.", "props": [ @@ -28723,7 +28682,7 @@ ] }, { - "uuid": "79cfca1d-c02d-4945-8555-300ddd10aeae", + "uuid": "ad1e14eb-83f5-4ce0-a451-95495121fe4e", "control-id": "cis_rhel10_3-3.1.3", "description": "No notes for control-id 3.3.1.3.", "props": [ @@ -28740,7 +28699,7 @@ ] }, { - "uuid": "76934fb7-c5f3-4713-9619-fe6f39a6d5c1", + "uuid": "44caae82-c93c-415f-b057-e318ddf2f840", "control-id": "cis_rhel10_3-3.1.4", "description": "No notes for control-id 3.3.1.4.", "props": [ @@ -28757,7 +28716,7 @@ ] }, { - "uuid": "d8afe9b8-d34c-4bfd-9a8e-e3c66c7bf150", + "uuid": "93f4688a-79d7-43e4-8a83-dcf5e643f185", "control-id": "cis_rhel10_3-3.1.5", "description": "No notes for control-id 3.3.1.5.", "props": [ @@ -28774,7 +28733,7 @@ ] }, { - "uuid": "660fc50e-2429-4b67-a7ac-79c4daa8eddd", + "uuid": "9d0bca7f-c5af-4409-b006-219425898566", "control-id": "cis_rhel10_3-3.1.6", "description": "No notes for control-id 3.3.1.6.", "props": [ @@ -28791,7 +28750,7 @@ ] }, { - "uuid": "1428e823-c88f-4772-9b48-e9c5f992f171", + "uuid": "01c62e13-b265-48ea-98d2-a47150d99d6f", "control-id": "cis_rhel10_3-3.1.7", "description": "No notes for control-id 3.3.1.7.", "props": [ @@ -28808,7 +28767,7 @@ ] }, { - "uuid": "32c37eae-1f22-45f3-aa5f-c789f75e6278", + "uuid": "510af3ec-2d7c-419c-914f-e1286b7aecf6", "control-id": "cis_rhel10_3-3.1.8", "description": "No notes for control-id 3.3.1.8.", "props": [ @@ -28825,7 +28784,7 @@ ] }, { - "uuid": "cb49d63c-24a2-4417-a9a7-9ee30cdec4ef", + "uuid": "3a988e48-c873-495f-b9d5-2dad6139920f", "control-id": "cis_rhel10_3-3.1.9", "description": "No notes for control-id 3.3.1.9.", "props": [ @@ -28842,7 +28801,7 @@ ] }, { - "uuid": "20d3ecb3-71fd-449d-b131-5a47d7545c23", + "uuid": "8c4f0bb7-fe94-4cf7-b443-12e836c2db48", "control-id": "cis_rhel10_3-3.1.10", "description": "No notes for control-id 3.3.1.10.", "props": [ @@ -28859,7 +28818,7 @@ ] }, { - "uuid": "a269f751-0a06-4d44-a8e8-6b255c995d75", + "uuid": "ca4f2d28-3066-490e-8d64-a467a38c37c6", "control-id": "cis_rhel10_3-3.1.11", "description": "No notes for control-id 3.3.1.11.", "props": [ @@ -28876,7 +28835,7 @@ ] }, { - "uuid": "9adc7cfe-fe05-4bf6-9c11-e9d91bd807df", + "uuid": "4b1b6073-8647-4f67-9cd5-6031e5eaf6f4", "control-id": "cis_rhel10_3-3.1.12", "description": "No notes for control-id 3.3.1.12.", "props": [ @@ -28893,7 +28852,7 @@ ] }, { - "uuid": "c149f6b7-942c-4dde-9e50-f05a96f87be8", + "uuid": "56b3c27a-a0b1-4f13-9d7a-915ee5af0eae", "control-id": "cis_rhel10_3-3.1.13", "description": "No notes for control-id 3.3.1.13.", "props": [ @@ -28910,7 +28869,7 @@ ] }, { - "uuid": "6f3151f4-70df-4163-91c3-0c132561a9ef", + "uuid": "e244edaf-4c23-4da9-a20b-51f6d52ce746", "control-id": "cis_rhel10_3-3.1.14", "description": "No notes for control-id 3.3.1.14.", "props": [ @@ -28927,7 +28886,7 @@ ] }, { - "uuid": "f183c59f-cbdf-45d0-9c75-fbad4e28c1a3", + "uuid": "f29c77cb-0fdb-405e-9838-44a29cf7c231", "control-id": "cis_rhel10_3-3.1.15", "description": "No notes for control-id 3.3.1.15.", "props": [ @@ -28944,7 +28903,7 @@ ] }, { - "uuid": "23ec879a-8523-4112-8ce3-add79ce5db03", + "uuid": "8f449f70-2245-47f7-866f-0da935f5fa24", "control-id": "cis_rhel10_3-3.1.16", "description": "No notes for control-id 3.3.1.16.", "props": [ @@ -28961,7 +28920,7 @@ ] }, { - "uuid": "b05a258b-d17b-4ad3-8cf2-47099c17c90f", + "uuid": "26e1b471-535b-464e-a4ec-80e1d6ed443e", "control-id": "cis_rhel10_3-3.1.17", "description": "No notes for control-id 3.3.1.17.", "props": [ @@ -28978,7 +28937,7 @@ ] }, { - "uuid": "d9435a91-9342-4813-987d-7b969266cc5d", + "uuid": "85368497-d124-478f-b6fb-28fea7beb852", "control-id": "cis_rhel10_3-3.1.18", "description": "No notes for control-id 3.3.1.18.", "props": [ @@ -28995,7 +28954,7 @@ ] }, { - "uuid": "96b80883-7187-4bf7-9450-48846c1e2b7e", + "uuid": "b970bc72-da67-4d79-9c35-03a527437946", "control-id": "cis_rhel10_3-3.2.1", "description": "No notes for control-id 3.3.2.1.", "props": [ @@ -29012,7 +28971,7 @@ ] }, { - "uuid": "baf8ebe7-ed1b-47a9-9a4b-5bf29a31fc76", + "uuid": "974fd83d-6c45-4156-a336-f2317f956b87", "control-id": "cis_rhel10_3-3.2.2", "description": "No notes for control-id 3.3.2.2.", "props": [ @@ -29029,7 +28988,7 @@ ] }, { - "uuid": "67f094ec-b493-49be-9490-58a712bcaef4", + "uuid": "d573210b-13a3-4e5c-9a4b-06d29d93e3bc", "control-id": "cis_rhel10_3-3.2.3", "description": "No notes for control-id 3.3.2.3.", "props": [ @@ -29046,7 +29005,7 @@ ] }, { - "uuid": "4ca498a3-2a05-4494-ae80-3ce6dcc80a58", + "uuid": "2dbcc48f-9585-4fcf-aa87-9cf94b3ff184", "control-id": "cis_rhel10_3-3.2.4", "description": "No notes for control-id 3.3.2.4.", "props": [ @@ -29063,7 +29022,7 @@ ] }, { - "uuid": "a1b79f70-0b53-485d-b902-7a6c8368ef15", + "uuid": "c93706d5-4462-453d-bcec-7466aa9afcbb", "control-id": "cis_rhel10_3-3.2.5", "description": "No notes for control-id 3.3.2.5.", "props": [ @@ -29080,7 +29039,7 @@ ] }, { - "uuid": "68807e60-4a4d-46f8-b2c8-c956d03f0549", + "uuid": "f501f0d1-fdfb-41e4-a24c-ebc2d945baaf", "control-id": "cis_rhel10_3-3.2.6", "description": "No notes for control-id 3.3.2.6.", "props": [ @@ -29097,7 +29056,7 @@ ] }, { - "uuid": "a90cb7a7-21cc-46f2-8b52-51ce9b6c3ee2", + "uuid": "44a93edf-e457-4740-9313-a91e1aef2d27", "control-id": "cis_rhel10_3-3.2.7", "description": "No notes for control-id 3.3.2.7.", "props": [ @@ -29114,7 +29073,7 @@ ] }, { - "uuid": "35f8a01d-7e96-41c2-92b1-dd19aad73d73", + "uuid": "f805e423-a5c8-4d97-89bb-a1d3525d18da", "control-id": "cis_rhel10_3-3.2.8", "description": "No notes for control-id 3.3.2.8.", "props": [ @@ -29131,7 +29090,7 @@ ] }, { - "uuid": "e90f71b7-5732-410d-9ff4-e1f459ac82eb", + "uuid": "cf9f3121-478a-484f-a961-e5055c6ec798", "control-id": "cis_rhel10_4-1.1", "description": "No notes for control-id 4.1.1.", "props": [ @@ -29148,7 +29107,7 @@ ] }, { - "uuid": "8677ced0-112d-4219-b9b0-39d43a88fc86", + "uuid": "b7c9544e-15fb-4f32-93f8-6446f6015ad4", "control-id": "cis_rhel10_4-1.2", "description": "No notes for control-id 4.1.2.", "props": [ @@ -29165,7 +29124,7 @@ ] }, { - "uuid": "e28fd3b6-f699-40bd-919a-5c0c79dddacf", + "uuid": "647bf0be-9580-4996-9caf-21acb337b7e1", "control-id": "cis_rhel10_4-1.3", "description": "No notes for control-id 4.1.3.", "props": [ @@ -29182,7 +29141,7 @@ ] }, { - "uuid": "46aca2f1-e608-49a4-90b4-c420d3a215b5", + "uuid": "ff220aaf-b682-4eec-b9f7-85e8b9bb1cc5", "control-id": "cis_rhel10_4-1.4", "description": "The description for control-id cis_rhel10_4-1.4.", "props": [ @@ -29195,7 +29154,7 @@ ] }, { - "uuid": "fb52e5fb-86d7-4975-9f6a-b2eaf9efe2dc", + "uuid": "f9fd897f-b874-45b6-8f7b-5380e849afd0", "control-id": "cis_rhel10_4-1.5", "description": "Firewalld in Red Hat Enterprise Linux 10 accepts loopback traffic by default.", "props": [ @@ -29212,7 +29171,7 @@ ] }, { - "uuid": "3d7590ea-daa0-4ba2-8fa8-1899f477eb36", + "uuid": "fdb27db3-e2c5-4fa0-b510-cb28ae3260ff", "control-id": "cis_rhel10_4-1.6", "description": "The description for control-id cis_rhel10_4-1.6.", "props": [ @@ -29225,7 +29184,7 @@ ] }, { - "uuid": "853b671a-27ac-4c5a-bf8d-af9fb3042d7a", + "uuid": "2ae576d8-6bfc-4393-9d2d-27bf75c0719c", "control-id": "cis_rhel10_4-1.7", "description": "The description for control-id cis_rhel10_4-1.7.", "props": [ @@ -29238,7 +29197,7 @@ ] }, { - "uuid": "b3849d8a-472e-43a6-8f04-b9a449a0a4f6", + "uuid": "6a06e4ae-48f0-4357-b525-ee43675c1b70", "control-id": "cis_rhel10_5-1.1", "description": "No notes for control-id 5.1.1.", "props": [ @@ -29295,7 +29254,7 @@ ] }, { - "uuid": "2832394d-e3fd-4087-a830-5182fe34fc7e", + "uuid": "834bf7f9-b832-47f1-96cb-dde391edd568", "control-id": "cis_rhel10_5-1.2", "description": "No notes for control-id 5.1.2.", "props": [ @@ -29322,7 +29281,7 @@ ] }, { - "uuid": "1ce839bb-d8c5-4c21-9bef-1b60d6a5fe97", + "uuid": "8ba1ca58-3861-443f-bd7e-ae595bc88228", "control-id": "cis_rhel10_5-1.3", "description": "No notes for control-id 5.1.3.", "props": [ @@ -29349,7 +29308,7 @@ ] }, { - "uuid": "50c90f6c-8b0a-4054-8781-fb83df38824f", + "uuid": "f76b7e07-7d63-4bb1-877e-cc4996accbb6", "control-id": "cis_rhel10_5-1.4", "description": "No notes for control-id 5.1.4.", "props": [ @@ -29366,7 +29325,7 @@ ] }, { - "uuid": "8f19ac18-9cdf-4ad4-8339-6b376895d6d6", + "uuid": "6e43b312-5eb2-4746-a5ce-3657e2207678", "control-id": "cis_rhel10_5-1.5", "description": "No notes for control-id 5.1.5.", "props": [ @@ -29383,7 +29342,7 @@ ] }, { - "uuid": "316b1733-3cf0-4599-8cc6-9e6fa3abbf4f", + "uuid": "32c4907b-b008-4cad-997e-a51173af6384", "control-id": "cis_rhel10_5-1.6", "description": "No notes for control-id 5.1.6.", "props": [ @@ -29400,7 +29359,7 @@ ] }, { - "uuid": "15825f8d-eade-4a9c-b9a2-78cf1f96183e", + "uuid": "e81474a6-8896-457c-9220-e86c5579752e", "control-id": "cis_rhel10_5-1.7", "description": "The requirement gives an example of 45 seconds, but is flexible about the values. It is only\nnecessary to ensure there is a timeout configured in alignment to the site policy.", "props": [ @@ -29422,7 +29381,7 @@ ] }, { - "uuid": "0f84f1c2-1b28-4c9b-95f8-4dca899ea5aa", + "uuid": "77e31d33-efa3-4b4e-9420-e06231e749d6", "control-id": "cis_rhel10_5-1.10", "description": "No notes for control-id 5.1.10.", "props": [ @@ -29439,7 +29398,7 @@ ] }, { - "uuid": "afabe779-aca4-4086-85ef-d54d78b70576", + "uuid": "a82f1363-7386-4a62-a83f-3f8673560c97", "control-id": "cis_rhel10_5-1.11", "description": "No notes for control-id 5.1.11.", "props": [ @@ -29456,7 +29415,7 @@ ] }, { - "uuid": "0f6f90c6-8cef-4dd4-bbfc-4c103d0d07ef", + "uuid": "4cdd6958-7d82-449c-91ce-671c90888b66", "control-id": "cis_rhel10_5-1.12", "description": "The description for control-id cis_rhel10_5-1.12.", "props": [ @@ -29474,7 +29433,7 @@ ] }, { - "uuid": "14a5295c-db2c-469f-b6f2-74106721621e", + "uuid": "b9a80fac-6b9c-4e50-bf53-79b815ba6713", "control-id": "cis_rhel10_5-1.13", "description": "No notes for control-id 5.1.13.", "props": [ @@ -29491,7 +29450,7 @@ ] }, { - "uuid": "5c1db012-1097-440f-aa05-9ceb5d48fa22", + "uuid": "68ec7a39-ddc0-429e-800a-fc036e761ff9", "control-id": "cis_rhel10_5-1.14", "description": "The CIS benchmark is not opinionated about which loglevel is selected here. Here, this\nprofile uses VERBOSE by default, as it allows for the capture of login and logout activity\nas well as key fingerprints.", "props": [ @@ -29508,7 +29467,7 @@ ] }, { - "uuid": "a59a4d0b-cd39-4685-8f5c-6dbaf881b38e", + "uuid": "928f9c3b-7bb1-46c3-8523-b544bdf491d0", "control-id": "cis_rhel10_5-1.15", "description": "No notes for control-id 5.1.15.", "props": [ @@ -29525,7 +29484,7 @@ ] }, { - "uuid": "35432863-0481-4cb1-8365-da7416062b3d", + "uuid": "300263c8-0d7a-4f66-ab9d-e4c16ee2d807", "control-id": "cis_rhel10_5-1.16", "description": "No notes for control-id 5.1.16.", "props": [ @@ -29542,7 +29501,7 @@ ] }, { - "uuid": "0fa070c6-be58-4bde-9668-14b9c0ad3dda", + "uuid": "82cb9a0b-591f-41ea-8364-a01ad062f1e5", "control-id": "cis_rhel10_5-1.17", "description": "No notes for control-id 5.1.17.", "props": [ @@ -29559,7 +29518,7 @@ ] }, { - "uuid": "8c1c28e5-1d9a-4594-a01c-5cfd90aebe30", + "uuid": "56988daa-3a0a-4e7c-bcf4-c0333eeb21fc", "control-id": "cis_rhel10_5-1.18", "description": "No notes for control-id 5.1.18.", "props": [ @@ -29576,7 +29535,7 @@ ] }, { - "uuid": "a229c1c8-e91c-432a-876f-322dcd631ace", + "uuid": "8378edc0-0f02-4b04-994d-8999158c443c", "control-id": "cis_rhel10_5-1.19", "description": "No notes for control-id 5.1.19.", "props": [ @@ -29593,7 +29552,7 @@ ] }, { - "uuid": "c0297fa2-6ce0-4612-838d-cf607aea4d89", + "uuid": "6d26662d-10af-4aba-9389-b0be28dd474c", "control-id": "cis_rhel10_5-1.20", "description": "No notes for control-id 5.1.20.", "props": [ @@ -29610,7 +29569,7 @@ ] }, { - "uuid": "4f77fcbe-abaf-42a7-9ce2-5054c6e024cf", + "uuid": "b256a28a-1c7f-47c3-917c-4427aa9b7d76", "control-id": "cis_rhel10_5-1.21", "description": "No notes for control-id 5.1.21.", "props": [ @@ -29627,7 +29586,7 @@ ] }, { - "uuid": "766252eb-288e-4871-ba09-21c75dc0b17e", + "uuid": "ef936850-4931-43f5-8159-beb54d96653a", "control-id": "cis_rhel10_5-1.22", "description": "No notes for control-id 5.1.22.", "props": [ @@ -29644,7 +29603,7 @@ ] }, { - "uuid": "4ad61b9e-86e9-4c75-af0e-1d9e682faec1", + "uuid": "8f66d6de-e7a5-4fd2-b7b2-ed98221d0819", "control-id": "cis_rhel10_5-2.1", "description": "No notes for control-id 5.2.1.", "props": [ @@ -29661,7 +29620,7 @@ ] }, { - "uuid": "0273b380-35b9-48cc-a32d-c6bf7bbb496e", + "uuid": "e4bce5ed-aa75-44d4-bd1a-a9e82bdc9c70", "control-id": "cis_rhel10_5-2.2", "description": "No notes for control-id 5.2.2.", "props": [ @@ -29678,7 +29637,7 @@ ] }, { - "uuid": "24f47b63-b06f-437c-8cb7-bc3387d78744", + "uuid": "9728b36a-044a-4a0d-a554-8deb08fa77ae", "control-id": "cis_rhel10_5-2.3", "description": "No notes for control-id 5.2.3.", "props": [ @@ -29695,7 +29654,7 @@ ] }, { - "uuid": "61adc5c5-b543-4c74-8b49-6e5adedfa862", + "uuid": "1b5e4aa4-8167-4589-ad0f-a7618f489bc9", "control-id": "cis_rhel10_5-2.5", "description": "No notes for control-id 5.2.5.", "props": [ @@ -29712,7 +29671,7 @@ ] }, { - "uuid": "ca19c9b9-7298-460e-9089-10638d85b5b8", + "uuid": "6cd8495f-04e0-418c-b266-a4734d92727a", "control-id": "cis_rhel10_5-2.6", "description": "No notes for control-id 5.2.6.", "props": [ @@ -29729,7 +29688,7 @@ ] }, { - "uuid": "a7c7c964-8728-40ab-b9fd-2025f7dca51a", + "uuid": "2829ef8a-df8c-4ac7-9a79-b76950ffd3b9", "control-id": "cis_rhel10_5-2.7", "description": "Members of \"wheel\" or GID 0 groups are checked by default if the group option is not set for\npam_wheel.so module. The recommendation states the group should be empty to reinforce the\nuse of \"sudo\" for privileged access. Therefore, members of these groups should be manually\nchecked or a different group should be informed.", "props": [ @@ -29751,7 +29710,7 @@ ] }, { - "uuid": "f6c714d2-29c2-4c52-9f70-2aec8d503ba3", + "uuid": "8f6295dd-2fdf-4342-8e4b-6b57251841fc", "control-id": "cis_rhel10_5-3.1.1", "description": "This requirement is hard to be automated without any specific requirement. The policy even\nstates that provided commands are examples, other custom settings might be in place and the\nsettings might be different depending on site policies. The other rules will already make\nsure there is a correct autheselect profile regardless of the existing settings. It is\nnecessary to better discuss with CIS Community.", "props": [ @@ -29763,7 +29722,7 @@ ] }, { - "uuid": "36d7abfd-aefb-4cf7-aab9-2876317dc342", + "uuid": "e22d973a-a966-4b51-8f44-c905de8abf57", "control-id": "cis_rhel10_5-3.1.2", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.1.", "props": [ @@ -29785,7 +29744,7 @@ ] }, { - "uuid": "50b70568-69ea-4c76-b421-b2144b257ce0", + "uuid": "6c5c4447-5317-442e-8af5-a11655ee8b2e", "control-id": "cis_rhel10_5-3.1.3", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.2.", "props": [ @@ -29812,7 +29771,7 @@ ] }, { - "uuid": "48eaf894-d3d4-476f-b387-0571a83ab563", + "uuid": "007596eb-e8eb-4876-8ea7-4666efde56bd", "control-id": "cis_rhel10_5-3.1.4", "description": "The module is properly enabled by the rules mentioned in related_rules.\nRequirements in 5.3.2.3 use these rules.", "props": [ @@ -29824,7 +29783,7 @@ ] }, { - "uuid": "88613868-a418-45e6-b348-cfe36787ce43", + "uuid": "c97b26a4-0169-470f-96fd-514221641b28", "control-id": "cis_rhel10_5-3.1.5", "description": "No notes for control-id 5.3.1.5.", "props": [ @@ -29841,7 +29800,7 @@ ] }, { - "uuid": "f24e8194-63d0-4d5a-b443-27b23ddf8470", + "uuid": "556dc5fa-31da-447e-9684-750c2479f479", "control-id": "cis_rhel10_5-3.2.1.1", "description": "No notes for control-id 5.3.2.1.1.", "props": [ @@ -29858,7 +29817,7 @@ ] }, { - "uuid": "ace81b1b-0170-4c7b-ba0a-a47268cf331f", + "uuid": "8b86e8c3-dfb4-4ee1-af21-a4abe815972f", "control-id": "cis_rhel10_5-3.2.1.2", "description": "The policy also accepts value 0, which means the locked accounts should be manually unlocked\nby an administrator. However, it also mentions that using value 0 can facilitate a DoS\nattack to legitimate users.", "props": [ @@ -29875,7 +29834,7 @@ ] }, { - "uuid": "83db5b5e-49e4-497b-bac4-70b75087ff46", + "uuid": "3d58760a-bb78-4b96-b7cd-592eab108782", "control-id": "cis_rhel10_5-3.2.2.1", "description": "No notes for control-id 5.3.2.2.1.", "props": [ @@ -29892,7 +29851,7 @@ ] }, { - "uuid": "4b85a269-f993-4d07-808d-557170eef01d", + "uuid": "7a554e39-e767-45aa-9efb-b36497456393", "control-id": "cis_rhel10_5-3.2.2.2", "description": "No notes for control-id 5.3.2.2.2.", "props": [ @@ -29909,7 +29868,7 @@ ] }, { - "uuid": "22a8da99-0d87-4cfa-bfdc-250320bbf665", + "uuid": "de642430-0f09-47ca-8539-4b14d684d49b", "control-id": "cis_rhel10_5-3.2.2.3", "description": "This requirement is expected to be manual. However, in previous versions of the policy\nit was already automated the configuration of \"minclass\" option. This posture was kept for\nRHEL 10 in this new version. Rules related to other options are informed in related_rules.\nIn short, minclass=4 alone can achieve the same result achieved by the combination of the\nother 4 options mentioned in the policy.", "props": [ @@ -29926,7 +29885,7 @@ ] }, { - "uuid": "a9fbe826-2019-4afa-a82d-1e91c3885d1f", + "uuid": "b0c5254b-dda2-4187-b2fb-bf5df1815e64", "control-id": "cis_rhel10_5-3.2.2.4", "description": "No notes for control-id 5.3.2.2.4.", "props": [ @@ -29943,7 +29902,7 @@ ] }, { - "uuid": "5597e0f5-737a-4e7b-8a7d-786b3a4db4c5", + "uuid": "9024c0b0-7344-46ed-9d2b-e83192af6933", "control-id": "cis_rhel10_5-3.2.2.5", "description": "No notes for control-id 5.3.2.2.5.", "props": [ @@ -29960,7 +29919,7 @@ ] }, { - "uuid": "f8134550-f864-46e2-843c-f302b6ef311c", + "uuid": "87ea3f86-eda1-4f7b-997d-f6b021abab68", "control-id": "cis_rhel10_5-3.2.2.6", "description": "No notes for control-id 5.3.2.2.6.", "props": [ @@ -29977,7 +29936,7 @@ ] }, { - "uuid": "fef1d1ff-4523-420d-ba88-63f4f77babe2", + "uuid": "9fde125c-ab2d-4feb-8e7d-0efbb9c7b70b", "control-id": "cis_rhel10_5-3.2.2.7", "description": "No notes for control-id 5.3.2.2.7.", "props": [ @@ -29994,7 +29953,7 @@ ] }, { - "uuid": "fbfe452c-6210-4801-8add-12f91f39cb4f", + "uuid": "e73a2cd8-eb62-4a9f-9e54-665c8639d6e7", "control-id": "cis_rhel10_5-3.2.3.1", "description": "Although mentioned in the section 5.3.3.3, there is no explicit requirement to configure\nretry option of pam_pwhistory. If come in the future, the rule accounts_password_pam_retry\ncan be used.", "props": [ @@ -30016,7 +29975,7 @@ ] }, { - "uuid": "75a8cd1f-a1c3-4a4b-8b98-46db6b3f5362", + "uuid": "2c6bb747-2783-4596-b092-0ad67e7a7718", "control-id": "cis_rhel10_5-3.2.3.2", "description": "No notes for control-id 5.3.2.3.2.", "props": [ @@ -30033,7 +29992,7 @@ ] }, { - "uuid": "90da8d00-6708-4fa1-892d-981546fc85d1", + "uuid": "257b1310-0f2a-4f65-9ddf-82059c3400e1", "control-id": "cis_rhel10_5-3.2.3.3", "description": "In RHEL 10 pam_pwhistory is enabled via authselect feature, as required in 5.3.1.4. The\nfeature automatically set \"use_authok\" option. In any case, we don't have a rule to check\nthis option specifically.", "props": [ @@ -30050,7 +30009,7 @@ ] }, { - "uuid": "e2bcf9ec-ac82-4f28-9db0-0704678cbbf0", + "uuid": "7840562a-cec5-4214-aea2-533e7ccea494", "control-id": "cis_rhel10_5-3.2.4.1", "description": "The rule more specifically used in this requirement also satify the requirement 5.3.1.5.", "props": [ @@ -30067,7 +30026,7 @@ ] }, { - "uuid": "ee92ca26-7ce5-4c38-be81-bf2e7164b74e", + "uuid": "753d269c-112c-42d4-b3f8-9ae12eeeba5d", "control-id": "cis_rhel10_5-3.2.4.2", "description": "Usage of pam_unix.so module together with \"remember\" option is deprecated and is not\nrecommended by this policy. Instead, it should be used remember option of pam_pwhistory\nmodule, as required in 5.3.2.3.1. See here for more details about pam_unix.so:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1778929", "props": [ @@ -30084,7 +30043,7 @@ ] }, { - "uuid": "af1f8aa0-fc3c-4bc0-92e1-39dfb59008b8", + "uuid": "9aef7a90-2f04-448d-be3b-65b19224be57", "control-id": "cis_rhel10_5-3.2.4.3", "description": "Changes in logindefs mentioned in this requirement are more specifically covered by 5.4.1.4", "props": [ @@ -30106,7 +30065,7 @@ ] }, { - "uuid": "619dabb0-95f3-4a11-b2c8-db1d2fc4cc0b", + "uuid": "abe92601-0ffb-4260-a251-2382179d414a", "control-id": "cis_rhel10_5-3.2.4.4", "description": "In RHEL 10 pam_unix is enabled by default in all authselect profiles already with the\nuse_authtok option set. In any case, we don't have a rule to check this option specifically,\nlike in 5.3.2.3.3.", "props": [ @@ -30123,7 +30082,7 @@ ] }, { - "uuid": "e82c9626-0454-4d49-999e-c10784bd02de", + "uuid": "65aff169-eb75-4c49-8201-68d536c0ba03", "control-id": "cis_rhel10_5-4.1.1", "description": "No notes for control-id 5.4.1.1.", "props": [ @@ -30145,7 +30104,7 @@ ] }, { - "uuid": "f1657e7d-595b-4edd-89a9-9d909f47d6f7", + "uuid": "5c5c4e08-253c-4780-92ad-5d3c7364562b", "control-id": "cis_rhel10_5-4.1.3", "description": "No notes for control-id 5.4.1.3.", "props": [ @@ -30167,20 +30126,15 @@ ] }, { - "uuid": "8c29eeb6-8219-407f-9734-7f967046dae9", + "uuid": "905a4654-9889-4706-8d16-808c378d151f", "control-id": "cis_rhel10_5-4.1.4", - "description": "There's a \"new\" set of options in /etc/login.defs file to define the number of iterations\nperformed during the hashing process.", + "description": "No notes for control-id 5.4.1.4.", "props": [ { "name": "implementation-status", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "implemented" }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_libuserconf" - }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", @@ -30189,7 +30143,7 @@ ] }, { - "uuid": "8096f374-42c6-449e-ba83-be657253fd79", + "uuid": "e0e63850-0af0-4fba-8408-c2cd87471342", "control-id": "cis_rhel10_5-4.1.5", "description": "No notes for control-id 5.4.1.5.", "props": [ @@ -30211,7 +30165,7 @@ ] }, { - "uuid": "d864fef0-a754-477f-96ca-f2968d34770f", + "uuid": "803b2b37-d302-4ce0-bc7f-2bf7c1bee646", "control-id": "cis_rhel10_5-4.1.6", "description": "No notes for control-id 5.4.1.6.", "props": [ @@ -30228,7 +30182,7 @@ ] }, { - "uuid": "a00cf6e5-9940-4529-9a76-b2110e0e02fb", + "uuid": "1a244946-4b0b-4ccd-b0c0-4fa2de3e976f", "control-id": "cis_rhel10_5-4.2.1", "description": "No notes for control-id 5.4.2.1.", "props": [ @@ -30245,7 +30199,7 @@ ] }, { - "uuid": "c150a67a-93c3-400a-ac2b-aa80d198afbf", + "uuid": "6a69686b-430e-438c-905f-35534d63544a", "control-id": "cis_rhel10_5-4.2.2", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -30262,7 +30216,7 @@ ] }, { - "uuid": "8b2061a7-37bd-4e08-9b92-80205e731393", + "uuid": "bbb1f506-e749-4c8d-8958-07c7b7a474af", "control-id": "cis_rhel10_5-4.2.3", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -30279,7 +30233,7 @@ ] }, { - "uuid": "2d555684-0b6a-4904-a1ed-516bfa4b943b", + "uuid": "30ca9974-b498-4665-a800-b11ebcfa76d9", "control-id": "cis_rhel10_5-4.2.4", "description": "No notes for control-id 5.4.2.4.", "props": [ @@ -30296,7 +30250,7 @@ ] }, { - "uuid": "cbf3c4e9-f6a2-4dff-aa96-52227b91f405", + "uuid": "7fe8fd35-18bc-4978-8987-7c2d18a89d5f", "control-id": "cis_rhel10_5-4.2.5", "description": "No notes for control-id 5.4.2.5.", "props": [ @@ -30318,7 +30272,7 @@ ] }, { - "uuid": "d63adca0-7fd8-44be-a458-059a199ad5cb", + "uuid": "72fe5644-301f-4928-9030-b1becd31d247", "control-id": "cis_rhel10_5-4.2.6", "description": "No notes for control-id 5.4.2.6.", "props": [ @@ -30335,7 +30289,7 @@ ] }, { - "uuid": "956f61cb-cd5c-4201-81b5-b353c76c7fab", + "uuid": "45719379-7a19-41f6-9443-76f4a4865376", "control-id": "cis_rhel10_5-4.2.7", "description": "No notes for control-id 5.4.2.7.", "props": [ @@ -30357,7 +30311,7 @@ ] }, { - "uuid": "5a615492-f08c-4544-8ab8-cc967a410c72", + "uuid": "711499ea-85f2-40b7-8390-20f9aef369f5", "control-id": "cis_rhel10_5-4.2.8", "description": "No notes for control-id 5.4.2.8.", "props": [ @@ -30374,7 +30328,7 @@ ] }, { - "uuid": "4c31c946-9c10-49fd-aa6d-bd22e75131cb", + "uuid": "b4ca104d-df25-4260-827c-54e8e20a5339", "control-id": "cis_rhel10_5-4.3.2", "description": "No notes for control-id 5.4.3.2.", "props": [ @@ -30391,7 +30345,7 @@ ] }, { - "uuid": "81193401-ce66-4c51-b75a-60df6bf743a2", + "uuid": "e1321687-10ff-4ae8-bd90-089a795c7431", "control-id": "cis_rhel10_5-4.3.3", "description": "No notes for control-id 5.4.3.3.", "props": [ @@ -30418,7 +30372,7 @@ ] }, { - "uuid": "b4b55b8d-19a8-4c1c-a6d9-12f3bba076a4", + "uuid": "cbe862b8-52a7-4a47-bf2b-97d299e20730", "control-id": "cis_rhel10_6-1.1", "description": "No notes for control-id 6.1.1.", "props": [ @@ -30440,7 +30394,7 @@ ] }, { - "uuid": "436fe0bf-75fb-4bf9-8634-8bcdaabeb88b", + "uuid": "ff1fb275-aa26-4be5-b881-1a3a30af080c", "control-id": "cis_rhel10_6-1.2", "description": "No notes for control-id 6.1.2.", "props": [ @@ -30457,7 +30411,7 @@ ] }, { - "uuid": "b8119162-5026-45fc-b16e-addf85edc8b1", + "uuid": "db4738e6-9ec6-40d0-935a-1386070b1b90", "control-id": "cis_rhel10_6-1.3", "description": "No notes for control-id 6.1.3.", "props": [ @@ -30474,7 +30428,7 @@ ] }, { - "uuid": "9353d7ae-5b68-4811-87fe-03c4a71f5b93", + "uuid": "33085f70-9ac5-4b30-a69d-ecd6a7d0768f", "control-id": "cis_rhel10_6-2.1.1", "description": "No notes for control-id 6.2.1.1.", "props": [ @@ -30491,7 +30445,7 @@ ] }, { - "uuid": "af10d35f-8a34-4ab3-96f6-77cbf2c39a72", + "uuid": "a5f3899c-fec5-4429-9819-2f024b5fbd0f", "control-id": "cis_rhel10_6-2.1.2", "description": "The description for control-id cis_rhel10_6-2.1.2.", "props": [ @@ -30504,7 +30458,7 @@ ] }, { - "uuid": "d2f32596-a67c-458f-bb13-3edb82a7b32d", + "uuid": "9696c728-6d4c-43fc-a4f3-51f7312104fd", "control-id": "cis_rhel10_6-2.1.3", "description": "The description for control-id cis_rhel10_6-2.1.3.", "props": [ @@ -30517,7 +30471,7 @@ ] }, { - "uuid": "47de7070-c937-4d83-a61f-e3c901aebef4", + "uuid": "7310b424-9778-4f4b-8c24-7caaede884ae", "control-id": "cis_rhel10_6-2.1.4", "description": "No notes for control-id 6.2.1.4.", "props": [ @@ -30534,7 +30488,7 @@ ] }, { - "uuid": "7cd3fddf-cfe8-4945-884a-0184bbd56c5c", + "uuid": "9f1f7afc-8fac-41f7-a5f8-96e1b8c33011", "control-id": "cis_rhel10_6-2.2.1.1", "description": "No notes for control-id 6.2.2.1.1.", "props": [ @@ -30551,7 +30505,7 @@ ] }, { - "uuid": "22339091-c764-4650-ad5f-7d565df213b0", + "uuid": "48a807df-1ee6-4a26-9ad4-0ec319ad699e", "control-id": "cis_rhel10_6-2.2.1.2", "description": "The description for control-id cis_rhel10_6-2.2.1.2.", "props": [ @@ -30564,7 +30518,7 @@ ] }, { - "uuid": "7650d323-a1f1-49cd-af46-c53dd326d7aa", + "uuid": "fe718250-ae2a-4e3d-9697-c456d8e7ed89", "control-id": "cis_rhel10_6-2.2.1.3", "description": "No notes for control-id 6.2.2.1.3.", "props": [ @@ -30581,7 +30535,7 @@ ] }, { - "uuid": "a17f2f1b-cefc-4ab9-8c68-c518c2e3a521", + "uuid": "e5c05602-c75f-4889-b25b-1e3ccc138a7a", "control-id": "cis_rhel10_6-2.2.1.4", "description": "No notes for control-id 6.2.2.1.4.", "props": [ @@ -30598,7 +30552,7 @@ ] }, { - "uuid": "05199ad2-adb7-4ab3-ac6f-2da54e5a7df8", + "uuid": "d46f6e2a-9348-45f9-b372-3710216c5131", "control-id": "cis_rhel10_6-2.2.2", "description": "No notes for control-id 6.2.2.2.", "props": [ @@ -30615,7 +30569,7 @@ ] }, { - "uuid": "51365a0e-31bb-417e-a383-39c1ae78ca9d", + "uuid": "e79dd7ae-f1c3-422d-818d-9773bf68e101", "control-id": "cis_rhel10_6-2.2.3", "description": "No notes for control-id 6.2.2.3.", "props": [ @@ -30632,7 +30586,7 @@ ] }, { - "uuid": "46584ecb-3976-4e51-bfd8-168fffe1e0ef", + "uuid": "3604ed71-4309-403c-ae47-51565075bc33", "control-id": "cis_rhel10_6-2.2.4", "description": "No notes for control-id 6.2.2.4.", "props": [ @@ -30649,7 +30603,7 @@ ] }, { - "uuid": "b5d03595-55d4-491f-9f7c-b50797953f9c", + "uuid": "df8619cd-5d78-4482-a700-da692656bd86", "control-id": "cis_rhel10_6-2.3.1", "description": "No notes for control-id 6.2.3.1.", "props": [ @@ -30661,7 +30615,7 @@ ] }, { - "uuid": "2b4bb043-c9c2-4052-8db7-ce4547256f9f", + "uuid": "07d6ff1e-a16c-4406-b67c-779a1147e02c", "control-id": "cis_rhel10_6-2.3.2", "description": "No notes for control-id 6.2.3.2.", "props": [ @@ -30673,7 +30627,7 @@ ] }, { - "uuid": "fabd31b5-f0e2-4da3-850e-ed0f58f9e83f", + "uuid": "d9959657-2095-448c-a17b-b5230cbace8d", "control-id": "cis_rhel10_6-2.3.3", "description": "No notes for control-id 6.2.3.3.", "props": [ @@ -30685,7 +30639,7 @@ ] }, { - "uuid": "b88e0dc6-5611-4492-a59c-50923e6c0faf", + "uuid": "4c10299a-6e28-4ecf-a4fa-fa08293a49e7", "control-id": "cis_rhel10_6-2.3.4", "description": "No notes for control-id 6.2.3.4.", "props": [ @@ -30697,7 +30651,7 @@ ] }, { - "uuid": "b50442db-ee00-4662-ad34-c9c29a2e4fe4", + "uuid": "f1eed118-3224-4105-aeb3-3e9de2caa8bc", "control-id": "cis_rhel10_6-2.3.5", "description": "The description for control-id cis_rhel10_6-2.3.5.", "props": [ @@ -30710,7 +30664,7 @@ ] }, { - "uuid": "23ab0be0-d567-4da2-9acd-1e6fd03df9ab", + "uuid": "fa84f2e8-b15b-48a6-92d6-9e54ded1ff6d", "control-id": "cis_rhel10_6-2.3.6", "description": "The description for control-id cis_rhel10_6-2.3.6.", "props": [ @@ -30723,7 +30677,7 @@ ] }, { - "uuid": "59e4e321-6a90-4518-a3f2-0b63f529ec69", + "uuid": "01d23910-ea00-4b27-b8dd-c52fd17afd55", "control-id": "cis_rhel10_6-2.3.7", "description": "No notes for control-id 6.2.3.7.", "props": [ @@ -30735,7 +30689,7 @@ ] }, { - "uuid": "9366178a-5e0c-477f-9650-bcc05319480f", + "uuid": "0591e613-e493-4f2a-915b-f4d7b1acffeb", "control-id": "cis_rhel10_6-2.3.8", "description": "The description for control-id cis_rhel10_6-2.3.8.", "props": [ @@ -30748,7 +30702,7 @@ ] }, { - "uuid": "ef1892b3-5802-4453-b7d3-ab3be38f4700", + "uuid": "fa97e35f-8ec8-4c30-a5a6-98ea7e8d8c98", "control-id": "cis_rhel10_6-2.4.1", "description": "It is not harmful to run these rules even if rsyslog is not installed or active.", "props": [ @@ -30775,7 +30729,7 @@ ] }, { - "uuid": "0f473c94-5451-4b34-82dd-9069f13dbcd5", + "uuid": "6044075f-a601-4b9d-ab47-7544ba92d2e8", "control-id": "cis_rhel10_7-1.1", "description": "No notes for control-id 7.1.1.", "props": [ @@ -30802,7 +30756,7 @@ ] }, { - "uuid": "12b41e57-3373-4008-a9b5-eacb8554c5e5", + "uuid": "92bca0ae-b6ba-4fc4-bcfe-3b3335b453f0", "control-id": "cis_rhel10_7-1.2", "description": "No notes for control-id 7.1.2.", "props": [ @@ -30829,7 +30783,7 @@ ] }, { - "uuid": "075eea29-5553-46e0-be51-eb96267b50b7", + "uuid": "b9d21bb2-3361-4583-bbf3-0ee74229c6bf", "control-id": "cis_rhel10_7-1.3", "description": "No notes for control-id 7.1.3.", "props": [ @@ -30856,7 +30810,7 @@ ] }, { - "uuid": "9cb14ca2-e0bb-4ae4-b840-b13ebe78697a", + "uuid": "c76d656d-9f66-4f5b-88ba-405ce73b7519", "control-id": "cis_rhel10_7-1.4", "description": "No notes for control-id 7.1.4.", "props": [ @@ -30883,7 +30837,7 @@ ] }, { - "uuid": "2307e987-3888-4015-945f-3e13a2f8339c", + "uuid": "9bbfad3e-731c-45fc-b740-d852d7648a01", "control-id": "cis_rhel10_7-1.5", "description": "No notes for control-id 7.1.5.", "props": [ @@ -30910,7 +30864,7 @@ ] }, { - "uuid": "ef38aa13-8782-46c0-afee-ab7298479f3c", + "uuid": "97796fdb-fbdd-4e96-a2ec-a00d481ece38", "control-id": "cis_rhel10_7-1.6", "description": "No notes for control-id 7.1.6.", "props": [ @@ -30937,7 +30891,7 @@ ] }, { - "uuid": "4be77dc3-5d0a-4c71-aa0b-b352a4695696", + "uuid": "8c14f806-f90e-423d-bd71-84643c27dc3f", "control-id": "cis_rhel10_7-1.7", "description": "No notes for control-id 7.1.7.", "props": [ @@ -30964,7 +30918,7 @@ ] }, { - "uuid": "62d0b919-bf47-4e47-9ac7-5109d30827f4", + "uuid": "43409dc1-ddf2-4354-9281-40fa24861f92", "control-id": "cis_rhel10_7-1.8", "description": "No notes for control-id 7.1.8.", "props": [ @@ -30991,7 +30945,7 @@ ] }, { - "uuid": "d95b80b9-99dd-46df-9adc-0a656a57b029", + "uuid": "a49e4fac-1cb8-405c-ac00-642c74296d26", "control-id": "cis_rhel10_7-1.9", "description": "No notes for control-id 7.1.9.", "props": [ @@ -31018,7 +30972,7 @@ ] }, { - "uuid": "1df74b79-32e5-41e0-98e8-f9843f4b3e24", + "uuid": "3cf55aa3-723d-4e9a-add2-5a542789473f", "control-id": "cis_rhel10_7-1.10", "description": "No notes for control-id 7.1.10.", "props": [ @@ -31060,7 +31014,7 @@ ] }, { - "uuid": "97c43e1a-e951-4940-a29f-8f7a3916cec3", + "uuid": "9317918f-400c-4438-b26c-e569244ba8f6", "control-id": "cis_rhel10_7-1.11", "description": "No notes for control-id 7.1.11.", "props": [ @@ -31082,7 +31036,7 @@ ] }, { - "uuid": "0f8aa62f-f3ce-4278-b348-33317f038e18", + "uuid": "881a985b-e9f1-4017-afcb-1ad2149f81ee", "control-id": "cis_rhel10_7-1.12", "description": "No notes for control-id 7.1.12.", "props": [ @@ -31104,7 +31058,7 @@ ] }, { - "uuid": "27aab75e-2b47-4582-96e3-8b2bbff6ddaa", + "uuid": "d20a321d-0a53-476c-8c4c-96d5abd5d5b7", "control-id": "cis_rhel10_7-1.13", "description": "The description for control-id cis_rhel10_7-1.13.", "props": [ @@ -31117,7 +31071,7 @@ ] }, { - "uuid": "6825f3f9-3bac-4b0e-b43e-66bb710cb5f4", + "uuid": "678e10c4-f0dc-4f6f-a382-690d5280c606", "control-id": "cis_rhel10_7-2.1", "description": "No notes for control-id 7.2.1.", "props": [ @@ -31134,7 +31088,7 @@ ] }, { - "uuid": "bfc9e569-6da4-4990-9e97-575e0981bb98", + "uuid": "7ad9737d-205d-44a8-9972-9cee7483f4ad", "control-id": "cis_rhel10_7-2.2", "description": "No notes for control-id 7.2.2.", "props": [ @@ -31151,7 +31105,7 @@ ] }, { - "uuid": "7327d452-fb78-424b-b26f-c5b9981e4d7f", + "uuid": "e40a143f-dffb-4865-87e0-398cf003b475", "control-id": "cis_rhel10_7-2.3", "description": "No notes for control-id 7.2.3.", "props": [ @@ -31168,7 +31122,7 @@ ] }, { - "uuid": "b11d387a-2db6-4fe0-8715-b0da9f498b65", + "uuid": "ee60a632-0643-4462-970f-2dd41e683fbd", "control-id": "cis_rhel10_7-2.4", "description": "No notes for control-id 7.2.4.", "props": [ @@ -31185,7 +31139,7 @@ ] }, { - "uuid": "a142fb6a-8a33-4c45-9c55-0c798ec48e1d", + "uuid": "041d3a3b-0a43-4d93-875c-0dae6c55c174", "control-id": "cis_rhel10_7-2.5", "description": "No notes for control-id 7.2.5.", "props": [ @@ -31202,7 +31156,7 @@ ] }, { - "uuid": "056dffa0-bee9-4293-b44f-d203d7ebf1cd", + "uuid": "c1fa9e97-b917-4e5b-8744-afa34739ad98", "control-id": "cis_rhel10_7-2.6", "description": "No notes for control-id 7.2.6.", "props": [ @@ -31219,7 +31173,7 @@ ] }, { - "uuid": "a8b267fd-4199-41c2-b3d6-f7af30d1f05c", + "uuid": "b8a867ce-6cf6-4c5f-98fb-d974e26bac5a", "control-id": "cis_rhel10_7-2.7", "description": "No notes for control-id 7.2.7.", "props": [ @@ -31236,7 +31190,7 @@ ] }, { - "uuid": "e5c16bed-01d5-4899-a5f1-22db3b48ce36", + "uuid": "58c90e64-3fd4-44bd-9929-4dbd232aa2d7", "control-id": "cis_rhel10_7-2.8", "description": "No notes for control-id 7.2.8.", "props": [ @@ -31263,7 +31217,7 @@ ] }, { - "uuid": "0a75a1d0-0ef2-47c4-8792-ccbbbfac334a", + "uuid": "910fab03-8b17-43fd-918f-ab0f79e2fcd5", "control-id": "cis_rhel10_7-2.9", "description": "No notes for control-id 7.2.9.", "props": [ diff --git a/component-definitions/rhel10/rhel10-cis_rhel10-l2_workstation/component-definition.json b/component-definitions/rhel10/rhel10-cis_rhel10-l2_workstation/component-definition.json index c9fa7d05..8fcd351d 100644 --- a/component-definitions/rhel10/rhel10-cis_rhel10-l2_workstation/component-definition.json +++ b/component-definitions/rhel10/rhel10-cis_rhel10-l2_workstation/component-definition.json @@ -3,8 +3,8 @@ "uuid": "9025707c-c78d-4c60-a2df-d0a822467a29", "metadata": { "title": "Component definition for rhel10", - "last-modified": "2025-12-17T09:50:48.295033+00:00", - "version": "4.6", + "last-modified": "2025-12-17T10:48:51.447427+00:00", + "version": "4.7", "oscal-version": "1.1.3" }, "components": [ @@ -887,7 +887,7 @@ { "name": "Parameter_Value_Alternatives_47", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -905,7 +905,7 @@ { "name": "Parameter_Value_Alternatives_48", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -3947,2455 +3947,2443 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_libuserconf", + "value": "set_password_hashing_algorithm_logindefs", "remarks": "rule_set_227" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Hashing Algorithm in /etc/libuser.conf", + "value": "Set Password Hashing Algorithm in /etc/login.defs", "remarks": "rule_set_227" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_logindefs", + "value": "account_disable_post_pw_expiration", "remarks": "rule_set_228" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Hashing Algorithm in /etc/login.defs", + "value": "Set Account Expiration Following Inactivity", "remarks": "rule_set_228" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "account_disable_post_pw_expiration", + "value": "accounts_set_post_pw_existing", "remarks": "rule_set_229" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Account Expiration Following Inactivity", + "value": "Set existing passwords a period of inactivity before they been locked", "remarks": "rule_set_229" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_set_post_pw_existing", + "value": "accounts_password_last_change_is_in_past", "remarks": "rule_set_230" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set existing passwords a period of inactivity before they been locked", + "value": "Ensure all users last password change date is in the past", "remarks": "rule_set_230" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_last_change_is_in_past", + "value": "accounts_no_uid_except_zero", "remarks": "rule_set_231" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure all users last password change date is in the past", + "value": "Verify Only Root Has UID 0", "remarks": "rule_set_231" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_no_uid_except_zero", + "value": "accounts_root_gid_zero", "remarks": "rule_set_232" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Only Root Has UID 0", + "value": "Verify Root Has A Primary GID 0", "remarks": "rule_set_232" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_root_gid_zero", + "value": "groups_no_zero_gid_except_root", "remarks": "rule_set_233" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Root Has A Primary GID 0", + "value": "Verify Only Group Root Has GID 0", "remarks": "rule_set_233" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "groups_no_zero_gid_except_root", + "value": "ensure_root_password_configured", "remarks": "rule_set_234" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Only Group Root Has GID 0", + "value": "Ensure Authentication Required for Single User Mode", "remarks": "rule_set_234" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_root_password_configured", + "value": "accounts_root_path_dirs_no_write", "remarks": "rule_set_235" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Authentication Required for Single User Mode", + "value": "Ensure that Root's Path Does Not Include World or Group-Writable Directories", "remarks": "rule_set_235" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_root_path_dirs_no_write", + "value": "root_path_no_dot", "remarks": "rule_set_236" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that Root's Path Does Not Include World or Group-Writable Directories", + "value": "Ensure that Root's Path Does Not Include Relative Paths or Null Directories", "remarks": "rule_set_236" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "root_path_no_dot", + "value": "accounts_umask_root", "remarks": "rule_set_237" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that Root's Path Does Not Include Relative Paths or Null Directories", + "value": "Ensure the Root Bash Umask is Set Correctly", "remarks": "rule_set_237" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_root", + "value": "no_password_auth_for_systemaccounts", "remarks": "rule_set_238" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Root Bash Umask is Set Correctly", + "value": "Ensure that System Accounts Are Locked", "remarks": "rule_set_238" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_password_auth_for_systemaccounts", + "value": "no_shelllogin_for_systemaccounts", "remarks": "rule_set_239" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that System Accounts Are Locked", + "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", "remarks": "rule_set_239" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_shelllogin_for_systemaccounts", + "value": "no_invalid_shell_accounts_unlocked", "remarks": "rule_set_240" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", + "value": "Verify Non-Interactive Accounts Are Locked", "remarks": "rule_set_240" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_invalid_shell_accounts_unlocked", + "value": "accounts_tmout", "remarks": "rule_set_241" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Non-Interactive Accounts Are Locked", + "value": "Set Interactive Session Timeout", "remarks": "rule_set_241" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_tmout", + "value": "accounts_umask_etc_bashrc", "remarks": "rule_set_242" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Interactive Session Timeout", + "value": "Ensure the Default Bash Umask is Set Correctly", "remarks": "rule_set_242" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_bashrc", + "value": "accounts_umask_etc_login_defs", "remarks": "rule_set_243" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Bash Umask is Set Correctly", + "value": "Ensure the Default Umask is Set Correctly in login.defs", "remarks": "rule_set_243" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_login_defs", + "value": "accounts_umask_etc_profile", "remarks": "rule_set_244" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Umask is Set Correctly in login.defs", + "value": "Ensure the Default Umask is Set Correctly in /etc/profile", "remarks": "rule_set_244" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_umask_etc_profile", + "value": "package_aide_installed", "remarks": "rule_set_245" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the Default Umask is Set Correctly in /etc/profile", + "value": "Install AIDE", "remarks": "rule_set_245" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_aide_installed", + "value": "aide_build_database", "remarks": "rule_set_246" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install AIDE", + "value": "Build and Test AIDE Database", "remarks": "rule_set_246" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_build_database", + "value": "aide_periodic_cron_checking", "remarks": "rule_set_247" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Build and Test AIDE Database", + "value": "Configure Periodic Execution of AIDE", "remarks": "rule_set_247" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_periodic_cron_checking", + "value": "aide_check_audit_tools", "remarks": "rule_set_248" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Periodic Execution of AIDE", + "value": "Configure AIDE to Verify the Audit Tools", "remarks": "rule_set_248" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_check_audit_tools", + "value": "service_systemd-journald_enabled", "remarks": "rule_set_249" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure AIDE to Verify the Audit Tools", + "value": "Enable systemd-journald Service", "remarks": "rule_set_249" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_systemd-journald_enabled", + "value": "ensure_journald_and_rsyslog_not_active_together", "remarks": "rule_set_250" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable systemd-journald Service", + "value": "Ensure journald and rsyslog Are Not Active Together", "remarks": "rule_set_250" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_journald_and_rsyslog_not_active_together", + "value": "package_systemd-journal-remote_installed", "remarks": "rule_set_251" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald and rsyslog Are Not Active Together", + "value": "Install systemd-journal-remote Package", "remarks": "rule_set_251" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_systemd-journal-remote_installed", + "value": "service_systemd-journal-upload_enabled", "remarks": "rule_set_252" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install systemd-journal-remote Package", + "value": "Enable systemd-journal-upload Service", "remarks": "rule_set_252" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_systemd-journal-upload_enabled", + "value": "socket_systemd-journal-remote_disabled", "remarks": "rule_set_253" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable systemd-journal-upload Service", + "value": "Disable systemd-journal-remote Socket", "remarks": "rule_set_253" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "socket_systemd-journal-remote_disabled", + "value": "journald_disable_forward_to_syslog", "remarks": "rule_set_254" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable systemd-journal-remote Socket", + "value": "Ensure journald ForwardToSyslog is disabled", "remarks": "rule_set_254" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_disable_forward_to_syslog", + "value": "journald_compress", "remarks": "rule_set_255" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald ForwardToSyslog is disabled", + "value": "Ensure journald is configured to compress large log files", "remarks": "rule_set_255" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_compress", + "value": "journald_storage", "remarks": "rule_set_256" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald is configured to compress large log files", + "value": "Ensure journald is configured to write log files to persistent disk", "remarks": "rule_set_256" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "journald_storage", + "value": "rsyslog_files_groupownership", "remarks": "rule_set_257" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure journald is configured to write log files to persistent disk", + "value": "Ensure Log Files Are Owned By Appropriate Group", "remarks": "rule_set_257" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_groupownership", + "value": "rsyslog_files_ownership", "remarks": "rule_set_258" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Log Files Are Owned By Appropriate Group", + "value": "Ensure Log Files Are Owned By Appropriate User", "remarks": "rule_set_258" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_ownership", + "value": "rsyslog_files_permissions", "remarks": "rule_set_259" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Log Files Are Owned By Appropriate User", + "value": "Ensure System Log Files Have Correct Permissions", "remarks": "rule_set_259" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_permissions", + "value": "file_groupowner_etc_passwd", "remarks": "rule_set_260" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure System Log Files Have Correct Permissions", + "value": "Verify Group Who Owns passwd File", "remarks": "rule_set_260" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_passwd", + "value": "file_owner_etc_passwd", "remarks": "rule_set_261" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns passwd File", + "value": "Verify User Who Owns passwd File", "remarks": "rule_set_261" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_passwd", + "value": "file_permissions_etc_passwd", "remarks": "rule_set_262" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns passwd File", + "value": "Verify Permissions on passwd File", "remarks": "rule_set_262" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_passwd", + "value": "file_groupowner_backup_etc_passwd", "remarks": "rule_set_263" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on passwd File", + "value": "Verify Group Who Owns Backup passwd File", "remarks": "rule_set_263" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_passwd", + "value": "file_owner_backup_etc_passwd", "remarks": "rule_set_264" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup passwd File", + "value": "Verify User Who Owns Backup passwd File", "remarks": "rule_set_264" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_passwd", + "value": "file_permissions_backup_etc_passwd", "remarks": "rule_set_265" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup passwd File", + "value": "Verify Permissions on Backup passwd File", "remarks": "rule_set_265" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_passwd", + "value": "file_groupowner_etc_group", "remarks": "rule_set_266" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup passwd File", + "value": "Verify Group Who Owns group File", "remarks": "rule_set_266" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_group", + "value": "file_owner_etc_group", "remarks": "rule_set_267" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns group File", + "value": "Verify User Who Owns group File", "remarks": "rule_set_267" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_group", + "value": "file_permissions_etc_group", "remarks": "rule_set_268" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns group File", + "value": "Verify Permissions on group File", "remarks": "rule_set_268" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_group", + "value": "file_groupowner_backup_etc_group", "remarks": "rule_set_269" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on group File", + "value": "Verify Group Who Owns Backup group File", "remarks": "rule_set_269" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_group", + "value": "file_owner_backup_etc_group", "remarks": "rule_set_270" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup group File", + "value": "Verify User Who Owns Backup group File", "remarks": "rule_set_270" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_group", + "value": "file_permissions_backup_etc_group", "remarks": "rule_set_271" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup group File", + "value": "Verify Permissions on Backup group File", "remarks": "rule_set_271" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_group", + "value": "file_owner_etc_shadow", "remarks": "rule_set_272" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup group File", + "value": "Verify User Who Owns shadow File", "remarks": "rule_set_272" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_shadow", + "value": "file_groupowner_etc_shadow", "remarks": "rule_set_273" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns shadow File", + "value": "Verify Group Who Owns shadow File", "remarks": "rule_set_273" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_shadow", + "value": "file_permissions_etc_shadow", "remarks": "rule_set_274" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns shadow File", + "value": "Verify Permissions on shadow File", "remarks": "rule_set_274" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_shadow", + "value": "file_groupowner_backup_etc_shadow", "remarks": "rule_set_275" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on shadow File", + "value": "Verify User Who Owns Backup shadow File", "remarks": "rule_set_275" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_shadow", + "value": "file_owner_backup_etc_shadow", "remarks": "rule_set_276" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup shadow File", + "value": "Verify Group Who Owns Backup shadow File", "remarks": "rule_set_276" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_shadow", + "value": "file_permissions_backup_etc_shadow", "remarks": "rule_set_277" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup shadow File", + "value": "Verify Permissions on Backup shadow File", "remarks": "rule_set_277" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_shadow", + "value": "file_groupowner_etc_gshadow", "remarks": "rule_set_278" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup shadow File", + "value": "Verify Group Who Owns gshadow File", "remarks": "rule_set_278" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_gshadow", + "value": "file_owner_etc_gshadow", "remarks": "rule_set_279" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns gshadow File", + "value": "Verify User Who Owns gshadow File", "remarks": "rule_set_279" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_gshadow", + "value": "file_permissions_etc_gshadow", "remarks": "rule_set_280" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns gshadow File", + "value": "Verify Permissions on gshadow File", "remarks": "rule_set_280" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_gshadow", + "value": "file_groupowner_backup_etc_gshadow", "remarks": "rule_set_281" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on gshadow File", + "value": "Verify Group Who Owns Backup gshadow File", "remarks": "rule_set_281" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_backup_etc_gshadow", + "value": "file_owner_backup_etc_gshadow", "remarks": "rule_set_282" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns Backup gshadow File", + "value": "Verify User Who Owns Backup gshadow File", "remarks": "rule_set_282" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_backup_etc_gshadow", + "value": "file_permissions_backup_etc_gshadow", "remarks": "rule_set_283" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns Backup gshadow File", + "value": "Verify Permissions on Backup gshadow File", "remarks": "rule_set_283" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_backup_etc_gshadow", + "value": "file_groupowner_etc_shells", "remarks": "rule_set_284" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on Backup gshadow File", + "value": "Verify Group Who Owns /etc/shells File", "remarks": "rule_set_284" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_shells", + "value": "file_owner_etc_shells", "remarks": "rule_set_285" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns /etc/shells File", + "value": "Verify Who Owns /etc/shells File", "remarks": "rule_set_285" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_shells", + "value": "file_permissions_etc_shells", "remarks": "rule_set_286" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Who Owns /etc/shells File", + "value": "Verify Permissions on /etc/shells File", "remarks": "rule_set_286" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_shells", + "value": "file_groupowner_etc_security_opasswd", "remarks": "rule_set_287" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on /etc/shells File", + "value": "Verify Group Who Owns /etc/security/opasswd File", "remarks": "rule_set_287" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_security_opasswd", + "value": "file_owner_etc_security_opasswd", "remarks": "rule_set_288" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns /etc/security/opasswd File", + "value": "Verify User Who Owns /etc/security/opasswd File", "remarks": "rule_set_288" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_security_opasswd", + "value": "file_permissions_etc_security_opasswd", "remarks": "rule_set_289" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify User Who Owns /etc/security/opasswd File", + "value": "Verify Permissions on /etc/security/opasswd File", "remarks": "rule_set_289" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_etc_security_opasswd", + "value": "file_groupowner_etc_security_opasswd_old", "remarks": "rule_set_290" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on /etc/security/opasswd File", + "value": "Verify Group Who Owns /etc/security/opasswd.old File", "remarks": "rule_set_290" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_groupowner_etc_security_opasswd_old", + "value": "file_owner_etc_security_opasswd_old", "remarks": "rule_set_291" }, - { - "name": "Rule_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Group Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_291" - }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_owner_etc_security_opasswd_old", - "remarks": "rule_set_292" - }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_292" + "remarks": "rule_set_291" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd_old", - "remarks": "rule_set_293" + "remarks": "rule_set_292" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd.old File", - "remarks": "rule_set_293" + "remarks": "rule_set_292" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_294" + "remarks": "rule_set_293" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_294" + "remarks": "rule_set_293" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_295" + "remarks": "rule_set_294" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_295" + "remarks": "rule_set_294" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_unowned_by_user", - "remarks": "rule_set_296" + "remarks": "rule_set_295" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a User", - "remarks": "rule_set_296" + "remarks": "rule_set_295" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_ungroupowned", - "remarks": "rule_set_297" + "remarks": "rule_set_296" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a Group", - "remarks": "rule_set_297" + "remarks": "rule_set_296" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_all_shadowed", - "remarks": "rule_set_298" + "remarks": "rule_set_297" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify All Account Password Hashes are Shadowed", - "remarks": "rule_set_298" + "remarks": "rule_set_297" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords_etc_shadow", - "remarks": "rule_set_299" + "remarks": "rule_set_298" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure There Are No Accounts With Blank or Null Passwords", - "remarks": "rule_set_299" + "remarks": "rule_set_298" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gid_passwd_group_same", - "remarks": "rule_set_300" + "remarks": "rule_set_299" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", - "remarks": "rule_set_300" + "remarks": "rule_set_299" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_id", - "remarks": "rule_set_301" + "remarks": "rule_set_300" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique User IDs", - "remarks": "rule_set_301" + "remarks": "rule_set_300" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_id", - "remarks": "rule_set_302" + "remarks": "rule_set_301" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group ID", - "remarks": "rule_set_302" + "remarks": "rule_set_301" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_name", - "remarks": "rule_set_303" + "remarks": "rule_set_302" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique Names", - "remarks": "rule_set_303" + "remarks": "rule_set_302" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_name", - "remarks": "rule_set_304" + "remarks": "rule_set_303" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group Names", - "remarks": "rule_set_304" + "remarks": "rule_set_303" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_interactive_home_directory_exists", - "remarks": "rule_set_305" + "remarks": "rule_set_304" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive Users Home Directories Must Exist", - "remarks": "rule_set_305" + "remarks": "rule_set_304" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_home_directories", - "remarks": "rule_set_306" + "remarks": "rule_set_305" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Be Owned By The Primary User", - "remarks": "rule_set_306" + "remarks": "rule_set_305" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_home_directories", - "remarks": "rule_set_307" + "remarks": "rule_set_306" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", - "remarks": "rule_set_307" + "remarks": "rule_set_306" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_308" + "remarks": "rule_set_307" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_308" + "remarks": "rule_set_307" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_309" + "remarks": "rule_set_308" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_309" + "remarks": "rule_set_308" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_no_world_writable_programs", - "remarks": "rule_set_310" + "remarks": "rule_set_309" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Not Run World-Writable Programs", - "remarks": "rule_set_310" + "remarks": "rule_set_309" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_311" + "remarks": "rule_set_310" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_311" + "remarks": "rule_set_310" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_forward_files", - "remarks": "rule_set_312" + "remarks": "rule_set_311" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .forward Files Exist", - "remarks": "rule_set_312" + "remarks": "rule_set_311" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_netrc_files", - "remarks": "rule_set_313" + "remarks": "rule_set_312" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No netrc Files Exist", - "remarks": "rule_set_313" + "remarks": "rule_set_312" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rhost_files", - "remarks": "rule_set_314" + "remarks": "rule_set_313" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .rhost Files Exist", - "remarks": "rule_set_314" + "remarks": "rule_set_313" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_bash_history", - "remarks": "rule_set_315" + "remarks": "rule_set_314" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure User Bash History File Has Correct Permissions", - "remarks": "rule_set_315" + "remarks": "rule_set_314" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_overlayfs_disabled", - "remarks": "rule_set_316" + "remarks": "rule_set_315" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure overlayfs kernel module is not available", - "remarks": "rule_set_316" + "remarks": "rule_set_315" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_squashfs_disabled", - "remarks": "rule_set_317" + "remarks": "rule_set_316" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Mounting of squashfs", - "remarks": "rule_set_317" + "remarks": "rule_set_316" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_udf_disabled", - "remarks": "rule_set_318" + "remarks": "rule_set_317" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Mounting of udf", - "remarks": "rule_set_318" + "remarks": "rule_set_317" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_firewire-core_disabled", - "remarks": "rule_set_319" + "remarks": "rule_set_318" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable IEEE 1394 (FireWire) Support", - "remarks": "rule_set_319" + "remarks": "rule_set_318" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_usb-storage_disabled", - "remarks": "rule_set_320" + "remarks": "rule_set_319" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Modprobe Loading of USB Storage Driver", - "remarks": "rule_set_320" + "remarks": "rule_set_319" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_home", - "remarks": "rule_set_321" + "remarks": "rule_set_320" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /home Located On Separate Partition", - "remarks": "rule_set_321" + "remarks": "rule_set_320" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var", - "remarks": "rule_set_322" + "remarks": "rule_set_321" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var Located On Separate Partition", - "remarks": "rule_set_322" + "remarks": "rule_set_321" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_tmp", - "remarks": "rule_set_323" + "remarks": "rule_set_322" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/tmp Located On Separate Partition", - "remarks": "rule_set_323" + "remarks": "rule_set_322" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log", - "remarks": "rule_set_324" + "remarks": "rule_set_323" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log Located On Separate Partition", - "remarks": "rule_set_324" + "remarks": "rule_set_323" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log_audit", - "remarks": "rule_set_325" + "remarks": "rule_set_324" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log/audit Located On Separate Partition", - "remarks": "rule_set_325" + "remarks": "rule_set_324" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_weak_deps", - "remarks": "rule_set_326" + "remarks": "rule_set_325" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Installation of Weak Dependencies in DNF", - "remarks": "rule_set_326" + "remarks": "rule_set_325" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_state", - "remarks": "rule_set_327" + "remarks": "rule_set_326" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SELinux State is Enforcing", - "remarks": "rule_set_327" + "remarks": "rule_set_326" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_symlinks", - "remarks": "rule_set_328" + "remarks": "rule_set_327" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", - "remarks": "rule_set_328" + "remarks": "rule_set_327" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_automount", - "remarks": "rule_set_329" + "remarks": "rule_set_328" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automounting", - "remarks": "rule_set_329" + "remarks": "rule_set_328" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_automount_open", - "remarks": "rule_set_330" + "remarks": "rule_set_329" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automount Opening", - "remarks": "rule_set_330" + "remarks": "rule_set_329" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "xwayland_disabled", - "remarks": "rule_set_331" + "remarks": "rule_set_330" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable XWayland", - "remarks": "rule_set_331" + "remarks": "rule_set_330" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_autofs_disabled", - "remarks": "rule_set_332" + "remarks": "rule_set_331" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the Automounter", - "remarks": "rule_set_332" + "remarks": "rule_set_331" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_avahi-daemon_disabled", - "remarks": "rule_set_333" + "remarks": "rule_set_332" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Avahi Server Software", - "remarks": "rule_set_333" + "remarks": "rule_set_332" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_cockpit_disabled", - "remarks": "rule_set_334" + "remarks": "rule_set_333" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Cockpit Management Server", - "remarks": "rule_set_334" + "remarks": "rule_set_333" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_openldap-clients_removed", - "remarks": "rule_set_335" + "remarks": "rule_set_334" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure LDAP client is not installed", - "remarks": "rule_set_335" + "remarks": "rule_set_334" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_bluetooth_disabled", - "remarks": "rule_set_336" + "remarks": "rule_set_335" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Bluetooth Service", - "remarks": "rule_set_336" + "remarks": "rule_set_335" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_nopasswd", - "remarks": "rule_set_337" + "remarks": "rule_set_336" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD", - "remarks": "rule_set_337" + "remarks": "rule_set_336" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny_root", - "remarks": "rule_set_338" + "remarks": "rule_set_337" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the root Account for Failed Password Attempts", - "remarks": "rule_set_338" + "remarks": "rule_set_337" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_minimum_age_login_defs", - "remarks": "rule_set_339" + "remarks": "rule_set_338" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Minimum Age", - "remarks": "rule_set_339" + "remarks": "rule_set_338" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_min_life_existing", - "remarks": "rule_set_340" + "remarks": "rule_set_339" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Minimum Age", - "remarks": "rule_set_340" + "remarks": "rule_set_339" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_nologin_in_shells", - "remarks": "rule_set_341" + "remarks": "rule_set_340" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure nologin Shell is Not Listed in /etc/shells", - "remarks": "rule_set_341" + "remarks": "rule_set_340" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit_installed", - "remarks": "rule_set_342" + "remarks": "rule_set_341" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit Subsystem is Installed", - "remarks": "rule_set_342" + "remarks": "rule_set_341" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit-libs_installed", - "remarks": "rule_set_343" + "remarks": "rule_set_342" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit-libs package as a part of audit Subsystem is Installed", - "remarks": "rule_set_343" + "remarks": "rule_set_342" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_argument", - "remarks": "rule_set_344" + "remarks": "rule_set_343" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Auditing for Processes Which Start Prior to the Audit Daemon", - "remarks": "rule_set_344" + "remarks": "rule_set_343" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_backlog_limit_argument", - "remarks": "rule_set_345" + "remarks": "rule_set_344" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Extend Audit Backlog Limit for the Audit Daemon", - "remarks": "rule_set_345" + "remarks": "rule_set_344" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_auditd_enabled", - "remarks": "rule_set_346" + "remarks": "rule_set_345" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable auditd Service", - "remarks": "rule_set_346" + "remarks": "rule_set_345" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_max_log_file", - "remarks": "rule_set_347" + "remarks": "rule_set_346" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Max Log File Size", - "remarks": "rule_set_347" + "remarks": "rule_set_346" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_max_log_file_action", - "remarks": "rule_set_348" + "remarks": "rule_set_347" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd max_log_file_action Upon Reaching Maximum Log Size", - "remarks": "rule_set_348" + "remarks": "rule_set_347" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_disk_error_action", - "remarks": "rule_set_349" + "remarks": "rule_set_348" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Disk Error Action on Disk Error", - "remarks": "rule_set_349" + "remarks": "rule_set_348" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_disk_full_action", - "remarks": "rule_set_350" + "remarks": "rule_set_349" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Disk Full Action when Disk Space Is Full", - "remarks": "rule_set_350" + "remarks": "rule_set_349" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_admin_space_left_action", - "remarks": "rule_set_351" + "remarks": "rule_set_350" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd admin_space_left Action on Low Disk Space", - "remarks": "rule_set_351" + "remarks": "rule_set_350" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_space_left_action", - "remarks": "rule_set_352" + "remarks": "rule_set_351" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd space_left Action on Low Disk Space", - "remarks": "rule_set_352" + "remarks": "rule_set_351" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_sysadmin_actions", - "remarks": "rule_set_353" + "remarks": "rule_set_352" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects System Administrator Actions", - "remarks": "rule_set_353" + "remarks": "rule_set_352" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_suid_auid_privilege_function", - "remarks": "rule_set_354" + "remarks": "rule_set_353" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events When Executables Are Run As Another User", - "remarks": "rule_set_354" + "remarks": "rule_set_353" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_sudo_log_events", - "remarks": "rule_set_355" + "remarks": "rule_set_354" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to perform maintenance activities", - "remarks": "rule_set_355" + "remarks": "rule_set_354" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_adjtimex", - "remarks": "rule_set_356" + "remarks": "rule_set_355" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through adjtimex", - "remarks": "rule_set_356" + "remarks": "rule_set_355" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_settimeofday", - "remarks": "rule_set_357" + "remarks": "rule_set_356" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through settimeofday", - "remarks": "rule_set_357" + "remarks": "rule_set_356" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_clock_settime", - "remarks": "rule_set_358" + "remarks": "rule_set_357" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through clock_settime", - "remarks": "rule_set_358" + "remarks": "rule_set_357" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_watch_localtime", - "remarks": "rule_set_359" + "remarks": "rule_set_358" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter the localtime File", - "remarks": "rule_set_359" + "remarks": "rule_set_358" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_setdomainname", - "remarks": "rule_set_360" + "remarks": "rule_set_359" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - setdomainname", - "remarks": "rule_set_360" + "remarks": "rule_set_359" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_sethostname", - "remarks": "rule_set_361" + "remarks": "rule_set_360" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - sethostname", - "remarks": "rule_set_361" + "remarks": "rule_set_360" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_issue", - "remarks": "rule_set_362" + "remarks": "rule_set_361" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/issue", - "remarks": "rule_set_362" + "remarks": "rule_set_361" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_issue_net", - "remarks": "rule_set_363" + "remarks": "rule_set_362" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/issue.net", - "remarks": "rule_set_363" + "remarks": "rule_set_362" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_hosts", - "remarks": "rule_set_364" + "remarks": "rule_set_363" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/hosts", - "remarks": "rule_set_364" + "remarks": "rule_set_363" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_hostname_file", - "remarks": "rule_set_365" + "remarks": "rule_set_364" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/hostname", - "remarks": "rule_set_365" + "remarks": "rule_set_364" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_sysconfig_network", - "remarks": "rule_set_366" + "remarks": "rule_set_365" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/sysconfig/network", - "remarks": "rule_set_366" + "remarks": "rule_set_365" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_networkmanager_system_connections", - "remarks": "rule_set_367" + "remarks": "rule_set_366" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/system-connections/", - "remarks": "rule_set_367" + "remarks": "rule_set_366" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_networkmanager", - "remarks": "rule_set_368" + "remarks": "rule_set_367" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/", - "remarks": "rule_set_368" + "remarks": "rule_set_367" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands", - "remarks": "rule_set_369" + "remarks": "rule_set_368" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands", - "remarks": "rule_set_369" + "remarks": "rule_set_368" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_creat", - "remarks": "rule_set_370" + "remarks": "rule_set_369" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - creat", - "remarks": "rule_set_370" + "remarks": "rule_set_369" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_ftruncate", - "remarks": "rule_set_371" + "remarks": "rule_set_370" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - ftruncate", - "remarks": "rule_set_371" + "remarks": "rule_set_370" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_open", - "remarks": "rule_set_372" + "remarks": "rule_set_371" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - open", - "remarks": "rule_set_372" + "remarks": "rule_set_371" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_openat", - "remarks": "rule_set_373" + "remarks": "rule_set_372" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - openat", - "remarks": "rule_set_373" + "remarks": "rule_set_372" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_truncate", - "remarks": "rule_set_374" + "remarks": "rule_set_373" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - truncate", - "remarks": "rule_set_374" + "remarks": "rule_set_373" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_group", - "remarks": "rule_set_375" + "remarks": "rule_set_374" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/group", - "remarks": "rule_set_375" + "remarks": "rule_set_374" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_passwd", - "remarks": "rule_set_376" + "remarks": "rule_set_375" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/passwd", - "remarks": "rule_set_376" + "remarks": "rule_set_375" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_gshadow", - "remarks": "rule_set_377" + "remarks": "rule_set_376" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/gshadow", - "remarks": "rule_set_377" + "remarks": "rule_set_376" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_shadow", - "remarks": "rule_set_378" + "remarks": "rule_set_377" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/shadow", - "remarks": "rule_set_378" + "remarks": "rule_set_377" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_opasswd", - "remarks": "rule_set_379" + "remarks": "rule_set_378" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", - "remarks": "rule_set_379" + "remarks": "rule_set_378" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_nsswitch_conf", - "remarks": "rule_set_380" + "remarks": "rule_set_379" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/nsswitch.conf", - "remarks": "rule_set_380" + "remarks": "rule_set_379" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_pam_conf", - "remarks": "rule_set_381" + "remarks": "rule_set_380" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/pam.conf", - "remarks": "rule_set_381" + "remarks": "rule_set_380" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_pamd", - "remarks": "rule_set_382" + "remarks": "rule_set_381" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/pam.d/", - "remarks": "rule_set_382" + "remarks": "rule_set_381" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chmod", - "remarks": "rule_set_383" + "remarks": "rule_set_382" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", - "remarks": "rule_set_383" + "remarks": "rule_set_382" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmod", - "remarks": "rule_set_384" + "remarks": "rule_set_383" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmod", - "remarks": "rule_set_384" + "remarks": "rule_set_383" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat", - "remarks": "rule_set_385" + "remarks": "rule_set_384" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat", - "remarks": "rule_set_385" + "remarks": "rule_set_384" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat2", - "remarks": "rule_set_386" + "remarks": "rule_set_385" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat2", - "remarks": "rule_set_386" + "remarks": "rule_set_385" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chown", - "remarks": "rule_set_387" + "remarks": "rule_set_386" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chown", - "remarks": "rule_set_387" + "remarks": "rule_set_386" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchown", - "remarks": "rule_set_388" + "remarks": "rule_set_387" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchown", - "remarks": "rule_set_388" + "remarks": "rule_set_387" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchownat", - "remarks": "rule_set_389" + "remarks": "rule_set_388" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchownat", - "remarks": "rule_set_389" + "remarks": "rule_set_388" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lchown", - "remarks": "rule_set_390" + "remarks": "rule_set_389" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lchown", - "remarks": "rule_set_390" + "remarks": "rule_set_389" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fremovexattr", - "remarks": "rule_set_391" + "remarks": "rule_set_390" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fremovexattr", - "remarks": "rule_set_391" + "remarks": "rule_set_390" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fsetxattr", - "remarks": "rule_set_392" + "remarks": "rule_set_391" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fsetxattr", - "remarks": "rule_set_392" + "remarks": "rule_set_391" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lremovexattr", - "remarks": "rule_set_393" + "remarks": "rule_set_392" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lremovexattr", - "remarks": "rule_set_393" + "remarks": "rule_set_392" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lsetxattr", - "remarks": "rule_set_394" + "remarks": "rule_set_393" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lsetxattr", - "remarks": "rule_set_394" + "remarks": "rule_set_393" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_removexattr", - "remarks": "rule_set_395" + "remarks": "rule_set_394" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - removexattr", - "remarks": "rule_set_395" + "remarks": "rule_set_394" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_setxattr", - "remarks": "rule_set_396" + "remarks": "rule_set_395" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - setxattr", - "remarks": "rule_set_396" + "remarks": "rule_set_395" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_media_export", - "remarks": "rule_set_397" + "remarks": "rule_set_396" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Exporting to Media (successful)", - "remarks": "rule_set_397" + "remarks": "rule_set_396" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_utmp", - "remarks": "rule_set_398" + "remarks": "rule_set_397" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information utmp", - "remarks": "rule_set_398" + "remarks": "rule_set_397" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_btmp", - "remarks": "rule_set_399" + "remarks": "rule_set_398" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information btmp", - "remarks": "rule_set_399" + "remarks": "rule_set_398" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_wtmp", - "remarks": "rule_set_400" + "remarks": "rule_set_399" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", - "remarks": "rule_set_400" + "remarks": "rule_set_399" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_faillock", - "remarks": "rule_set_401" + "remarks": "rule_set_400" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - faillock", - "remarks": "rule_set_401" + "remarks": "rule_set_400" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_lastlog", - "remarks": "rule_set_402" + "remarks": "rule_set_401" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - lastlog", - "remarks": "rule_set_402" + "remarks": "rule_set_401" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlink", - "remarks": "rule_set_403" + "remarks": "rule_set_402" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlink", - "remarks": "rule_set_403" + "remarks": "rule_set_402" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlinkat", - "remarks": "rule_set_404" + "remarks": "rule_set_403" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlinkat", - "remarks": "rule_set_404" + "remarks": "rule_set_403" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rename", - "remarks": "rule_set_405" + "remarks": "rule_set_404" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rename", - "remarks": "rule_set_405" + "remarks": "rule_set_404" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat", - "remarks": "rule_set_406" + "remarks": "rule_set_405" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat", - "remarks": "rule_set_406" + "remarks": "rule_set_405" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat2", - "remarks": "rule_set_407" + "remarks": "rule_set_406" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat2", - "remarks": "rule_set_407" + "remarks": "rule_set_406" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_etc_selinux", - "remarks": "rule_set_408" + "remarks": "rule_set_407" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls (/etc/selinux)", - "remarks": "rule_set_408" + "remarks": "rule_set_407" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_usr_share", - "remarks": "rule_set_409" + "remarks": "rule_set_408" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls in usr/share", - "remarks": "rule_set_409" + "remarks": "rule_set_408" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chcon", - "remarks": "rule_set_410" + "remarks": "rule_set_409" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chcon", - "remarks": "rule_set_410" + "remarks": "rule_set_409" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_setfacl", - "remarks": "rule_set_411" + "remarks": "rule_set_410" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run setfacl", - "remarks": "rule_set_411" + "remarks": "rule_set_410" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chacl", - "remarks": "rule_set_412" + "remarks": "rule_set_411" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chacl", - "remarks": "rule_set_412" + "remarks": "rule_set_411" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_usermod", - "remarks": "rule_set_413" + "remarks": "rule_set_412" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - usermod", - "remarks": "rule_set_413" + "remarks": "rule_set_412" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_kmod", - "remarks": "rule_set_414" + "remarks": "rule_set_413" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - kmod", - "remarks": "rule_set_414" + "remarks": "rule_set_413" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_init", - "remarks": "rule_set_415" + "remarks": "rule_set_414" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading - init_module", - "remarks": "rule_set_415" + "remarks": "rule_set_414" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_finit", - "remarks": "rule_set_416" + "remarks": "rule_set_415" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - finit_module", - "remarks": "rule_set_416" + "remarks": "rule_set_415" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_delete", - "remarks": "rule_set_417" + "remarks": "rule_set_416" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Unloading - delete_module", - "remarks": "rule_set_417" + "remarks": "rule_set_416" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_query", - "remarks": "rule_set_418" + "remarks": "rule_set_417" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - query_module", - "remarks": "rule_set_418" + "remarks": "rule_set_417" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_continue_loading", - "remarks": "rule_set_419" + "remarks": "rule_set_418" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Audit Configuration is Loaded Regardless of Errors", - "remarks": "rule_set_419" + "remarks": "rule_set_418" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_immutable", - "remarks": "rule_set_420" + "remarks": "rule_set_419" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Make the auditd Configuration Immutable", - "remarks": "rule_set_420" + "remarks": "rule_set_419" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_var_log_audit", - "remarks": "rule_set_421" + "remarks": "rule_set_420" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0750 or Less Permissive", - "remarks": "rule_set_421" + "remarks": "rule_set_420" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_var_log_audit", - "remarks": "rule_set_422" + "remarks": "rule_set_421" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0640 or Less Permissive", - "remarks": "rule_set_422" + "remarks": "rule_set_421" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_var_log_audit_stig", - "remarks": "rule_set_423" + "remarks": "rule_set_422" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Owned By Root", - "remarks": "rule_set_423" + "remarks": "rule_set_422" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_group_ownership_var_log_audit", - "remarks": "rule_set_424" + "remarks": "rule_set_423" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Group Owned By Root", - "remarks": "rule_set_424" + "remarks": "rule_set_423" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_audit_configuration", - "remarks": "rule_set_425" + "remarks": "rule_set_424" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Permissions are 640 or More Restrictive", - "remarks": "rule_set_425" + "remarks": "rule_set_424" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_audit_configuration", - "remarks": "rule_set_426" + "remarks": "rule_set_425" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Must Be Owned By Root", - "remarks": "rule_set_426" + "remarks": "rule_set_425" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_audit_configuration", - "remarks": "rule_set_427" + "remarks": "rule_set_426" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Must Be Owned By Group root", - "remarks": "rule_set_427" + "remarks": "rule_set_426" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_audit_binaries", - "remarks": "rule_set_428" + "remarks": "rule_set_427" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools Have Mode 0755 or less", - "remarks": "rule_set_428" + "remarks": "rule_set_427" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_audit_binaries", - "remarks": "rule_set_429" + "remarks": "rule_set_428" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools are owned by root", - "remarks": "rule_set_429" + "remarks": "rule_set_428" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_audit_binaries", - "remarks": "rule_set_430" + "remarks": "rule_set_429" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools are owned by group root", - "remarks": "rule_set_430" + "remarks": "rule_set_429" } ], "control-implementations": [ { - "uuid": "25ce83ef-165b-4a6a-a875-b3b5a0df64d7", + "uuid": "430437d8-6b9a-4b28-b7c6-74c4ff9dae93", "source": "trestle://profiles/rhel10-cis_rhel10-l2_workstation/profile.json", "description": "Control implementation for cis_workstation_l2", "props": [ @@ -6691,13 +6679,13 @@ { "param-id": "var_password_hashing_algorithm", "values": [ - "yescrypt" + "cis_rhel10" ] }, { "param-id": "var_password_hashing_algorithm_pam", "values": [ - "yescrypt" + "cis_rhel10" ] }, { @@ -6811,7 +6799,7 @@ ], "implemented-requirements": [ { - "uuid": "49a86ca3-e74b-4482-9f9d-2c58574bcde9", + "uuid": "fcf603d4-4fd5-478e-bbcb-d344b438cec5", "control-id": "cis_rhel10_1-1.1.6", "description": "No notes for control-id 1.1.1.6.", "props": [ @@ -6828,7 +6816,7 @@ ] }, { - "uuid": "44962342-1942-482b-887c-c3055be9f638", + "uuid": "103562a5-bae0-41f2-99a3-6b04e62b2375", "control-id": "cis_rhel10_1-1.1.7", "description": "No notes for control-id 1.1.1.7.", "props": [ @@ -6845,7 +6833,7 @@ ] }, { - "uuid": "42af95a4-542a-4ca2-8b56-05c77dab8f3b", + "uuid": "3c0e944d-ccab-4773-b032-22b029b22b40", "control-id": "cis_rhel10_1-1.1.8", "description": "No notes for control-id 1.1.1.8.", "props": [ @@ -6862,7 +6850,7 @@ ] }, { - "uuid": "228e1c91-9e1d-469b-93e7-b03e6e346c98", + "uuid": "ac7e10b6-1df9-4b43-a061-f2310e13bedb", "control-id": "cis_rhel10_1-1.1.9", "description": "No notes for control-id 1.1.1.9.", "props": [ @@ -6879,7 +6867,7 @@ ] }, { - "uuid": "9df41024-b07a-4dc4-871d-c9043759cf85", + "uuid": "3110af86-f1db-4fc1-94c9-25d812e0ee51", "control-id": "cis_rhel10_1-1.1.10", "description": "No notes for control-id 1.1.1.10.", "props": [ @@ -6896,7 +6884,7 @@ ] }, { - "uuid": "004c6f14-6fa4-4068-9efa-f5f52cd46cc7", + "uuid": "0fad5fa4-a928-453f-b444-6137e85c73a2", "control-id": "cis_rhel10_1-1.2.3.1", "description": "No notes for control-id 1.1.2.3.1.", "props": [ @@ -6913,7 +6901,7 @@ ] }, { - "uuid": "ed4e7cfe-fccb-41f3-a431-b330e29b0f91", + "uuid": "c52aeb71-50f7-4463-a087-d7e76e3c4279", "control-id": "cis_rhel10_1-1.2.4.1", "description": "No notes for control-id 1.1.2.4.1.", "props": [ @@ -6930,7 +6918,7 @@ ] }, { - "uuid": "80ebe825-e889-4ae1-8ae7-c21498cda05c", + "uuid": "defecb02-129f-465b-8966-917c89e03fef", "control-id": "cis_rhel10_1-1.2.5.1", "description": "No notes for control-id 1.1.2.5.1.", "props": [ @@ -6947,7 +6935,7 @@ ] }, { - "uuid": "e46c72c6-b309-4d5d-ac0a-ccf51ff59f38", + "uuid": "db7c6580-5622-452d-b4e6-bd48b8ad0b00", "control-id": "cis_rhel10_1-1.2.6.1", "description": "No notes for control-id 1.1.2.6.1.", "props": [ @@ -6964,7 +6952,7 @@ ] }, { - "uuid": "21dd7613-50da-4528-a317-bd095702d9bc", + "uuid": "f4173a12-4a11-42fb-a9cb-cd6348ff53f3", "control-id": "cis_rhel10_1-1.2.7.1", "description": "No notes for control-id 1.1.2.7.1.", "props": [ @@ -6981,7 +6969,7 @@ ] }, { - "uuid": "30fa1798-cb0f-4be7-a54c-bd326ebeaab7", + "uuid": "11131096-8fb6-47c4-8323-569f25c217d8", "control-id": "cis_rhel10_1-2.1.3", "description": "The description for control-id cis_rhel10_1-2.1.3.", "props": [ @@ -6994,7 +6982,7 @@ ] }, { - "uuid": "45b3e4d5-eccf-4583-879e-d893280e3561", + "uuid": "5e5eef66-6e34-42f6-ae7c-b4852105b152", "control-id": "cis_rhel10_1-2.1.5", "description": "No notes for control-id 1.2.1.5.", "props": [ @@ -7011,7 +6999,7 @@ ] }, { - "uuid": "55208533-0225-411d-a3c4-8b59ad46f41a", + "uuid": "89e9a074-c801-4177-ace2-233dcd3126b8", "control-id": "cis_rhel10_1-3.1.5", "description": "No notes for control-id 1.3.1.5.", "props": [ @@ -7028,7 +7016,7 @@ ] }, { - "uuid": "42a2f8f3-a0f5-4543-bf09-9c05d713cddd", + "uuid": "6f3d152d-a408-4b29-a04b-9cd12938164a", "control-id": "cis_rhel10_1-3.1.6", "description": "The description for control-id cis_rhel10_1-3.1.6.", "props": [ @@ -7041,7 +7029,7 @@ ] }, { - "uuid": "1d722fd8-4131-4227-9ba0-2cd7ef9fc402", + "uuid": "be587d05-7866-422c-a6cc-5d1f3b2ec40c", "control-id": "cis_rhel10_1-5.3", "description": "No notes for control-id 1.5.3.", "props": [ @@ -7058,7 +7046,7 @@ ] }, { - "uuid": "5eed25b5-6cdd-42c9-b5c3-6d0934815ad8", + "uuid": "29fe06e9-1718-4fe6-b6ca-5897494f9b14", "control-id": "cis_rhel10_1-8.4", "description": "No notes for control-id 1.8.4.", "props": [ @@ -7080,7 +7068,7 @@ ] }, { - "uuid": "b4ab63a9-f14c-47b4-bf89-77fd537376d4", + "uuid": "76c40b71-28f1-4b65-b78e-6d1d342ce4c5", "control-id": "cis_rhel10_1-8.6", "description": "No notes for control-id 1.8.6.", "props": [ @@ -7097,7 +7085,7 @@ ] }, { - "uuid": "979b5069-585e-4b89-9e30-8f997ae5df83", + "uuid": "ff49c7f9-6e39-4cd5-8240-a016acbc1b2b", "control-id": "cis_rhel10_2-1.1", "description": "No notes for control-id 2.1.1.", "props": [ @@ -7114,7 +7102,7 @@ ] }, { - "uuid": "47f0692f-c44d-4c03-b531-393118b793e5", + "uuid": "658d3786-0447-4739-b6d5-b836bae9cf1f", "control-id": "cis_rhel10_2-1.2", "description": "No notes for control-id 2.1.2.", "props": [ @@ -7131,7 +7119,7 @@ ] }, { - "uuid": "0353592b-6af9-4cf3-abcb-30ee493dc9f3", + "uuid": "ed7d4d0d-ba6e-42f9-be26-8aab5b9a35de", "control-id": "cis_rhel10_2-1.3", "description": "No notes for control-id 2.1.3.", "props": [ @@ -7148,7 +7136,7 @@ ] }, { - "uuid": "53b7baf6-34a6-4b9d-a447-352099635755", + "uuid": "4091f3d8-8c4e-4097-861a-8ca474d28ab5", "control-id": "cis_rhel10_2-2.2", "description": "No notes for control-id 2.2.2.", "props": [ @@ -7165,7 +7153,7 @@ ] }, { - "uuid": "d7765f65-4c9d-4ec3-972e-745a1652f166", + "uuid": "0410c117-4585-41c6-983d-6efd2b63b7a4", "control-id": "cis_rhel10_3-1.3", "description": "No notes for control-id 3.1.3.", "props": [ @@ -7182,7 +7170,7 @@ ] }, { - "uuid": "b4517dba-3486-44b0-960b-afc67e5eae33", + "uuid": "f9ff7f44-6bb9-499f-a319-b02b17addf39", "control-id": "cis_rhel10_5-2.4", "description": "No notes for control-id 5.2.4.", "props": [ @@ -7199,7 +7187,7 @@ ] }, { - "uuid": "28dd438d-ccec-4ecc-87f1-89c8133686a7", + "uuid": "ca1b8369-5656-4ee4-affe-e6c5d2206112", "control-id": "cis_rhel10_5-3.2.1.3", "description": "No notes for control-id 5.3.2.1.3.", "props": [ @@ -7216,7 +7204,7 @@ ] }, { - "uuid": "b4765a7e-b45b-4d61-a66c-a207267ddd99", + "uuid": "c1f918ec-c92f-428b-bc51-508030cac7c3", "control-id": "cis_rhel10_5-4.1.2", "description": "No notes for control-id 5.4.1.2.", "props": [ @@ -7238,7 +7226,7 @@ ] }, { - "uuid": "0424540b-c5e5-4fd2-835c-d4324f3f1d31", + "uuid": "71a68237-b9e8-4664-9315-05f653fd26ad", "control-id": "cis_rhel10_5-4.3.1", "description": "No notes for control-id 5.4.3.1.", "props": [ @@ -7255,7 +7243,7 @@ ] }, { - "uuid": "7e4be050-8798-4b8a-bf5c-e1f67b56a3ff", + "uuid": "2d17c1e8-d112-41a6-bcc3-6b2de275f8a7", "control-id": "cis_rhel10_6-3.1.1", "description": "No notes for control-id 6.3.1.1.", "props": [ @@ -7277,7 +7265,7 @@ ] }, { - "uuid": "c530d3d9-fe0f-406a-a48b-2082036a275d", + "uuid": "3d73486a-c695-4f10-9f16-c782edf7f19e", "control-id": "cis_rhel10_6-3.1.2", "description": "No notes for control-id 6.3.1.2.", "props": [ @@ -7294,7 +7282,7 @@ ] }, { - "uuid": "7d2b075c-adf0-431c-ae27-63f0e9e1d82a", + "uuid": "7ca4dd38-72b0-4c88-8f1e-ad221a2cc8bc", "control-id": "cis_rhel10_6-3.1.3", "description": "No notes for control-id 6.3.1.3.", "props": [ @@ -7311,7 +7299,7 @@ ] }, { - "uuid": "3c23b24b-18a2-45e6-9da0-f0273bfcabed", + "uuid": "2291f0f5-e998-44b9-800d-0c12016a8df6", "control-id": "cis_rhel10_6-3.1.4", "description": "No notes for control-id 6.3.1.4.", "props": [ @@ -7328,7 +7316,7 @@ ] }, { - "uuid": "be143a2a-a256-4052-a8bd-c602c9353489", + "uuid": "d517eff8-6830-4a1e-be51-5e8041a1e453", "control-id": "cis_rhel10_6-3.2.1", "description": "No notes for control-id 6.3.2.1.", "props": [ @@ -7345,7 +7333,7 @@ ] }, { - "uuid": "7f7500ef-47d7-40cc-891e-400137cdaaba", + "uuid": "29b75eaa-c994-400c-9c3b-0b3671898d05", "control-id": "cis_rhel10_6-3.2.2", "description": "No notes for control-id 6.3.2.2.", "props": [ @@ -7362,7 +7350,7 @@ ] }, { - "uuid": "71cdb9c2-8dc4-4726-ab9e-5ddbd296ca41", + "uuid": "ba7c2cc2-edf5-483c-a52c-968d1b24a3be", "control-id": "cis_rhel10_6-3.2.3", "description": "No notes for control-id 6.3.2.3.", "props": [ @@ -7384,7 +7372,7 @@ ] }, { - "uuid": "3c31cf22-533c-4207-8090-3763b336bb0b", + "uuid": "6ccc549f-5873-4686-ae7e-bc9060e5bedf", "control-id": "cis_rhel10_6-3.2.4", "description": "No notes for control-id 6.3.2.4.", "props": [ @@ -7406,7 +7394,7 @@ ] }, { - "uuid": "5ac0efb6-9b3a-487e-b89f-8d1da284a988", + "uuid": "20e486c1-0170-4f3f-ad22-1c9c8d11489e", "control-id": "cis_rhel10_6-3.3.1", "description": "No notes for control-id 6.3.3.1.", "props": [ @@ -7423,7 +7411,7 @@ ] }, { - "uuid": "55ceb019-a74d-4b23-b53a-a702ffde953c", + "uuid": "583d5919-029f-4f14-b83a-f3145b1a32ff", "control-id": "cis_rhel10_6-3.3.2", "description": "No notes for control-id 6.3.3.2.", "props": [ @@ -7440,7 +7428,7 @@ ] }, { - "uuid": "bf68c4e5-33d0-4a44-acec-498a8d7a0cff", + "uuid": "8429c730-c6fb-4875-bb8b-4e375163af8d", "control-id": "cis_rhel10_6-3.3.3", "description": "No notes for control-id 6.3.3.3.", "props": [ @@ -7457,7 +7445,7 @@ ] }, { - "uuid": "6e9fdff1-5957-4910-94bd-c81b1ff8caca", + "uuid": "0d85b9a9-74a6-4622-9671-7848a7523991", "control-id": "cis_rhel10_6-3.3.4", "description": "No notes for control-id 6.3.3.4.", "props": [ @@ -7489,7 +7477,7 @@ ] }, { - "uuid": "6de39c7d-596d-46d8-a701-812f227e5860", + "uuid": "24b1798e-8f52-4208-b5f6-6ba69d0fa151", "control-id": "cis_rhel10_6-3.3.5", "description": "No notes for control-id 6.3.3.5.", "props": [ @@ -7511,7 +7499,7 @@ ] }, { - "uuid": "22930124-5efd-47e5-9563-432704824578", + "uuid": "388e35c4-af4c-4c50-9ebc-c085d8c9afad", "control-id": "cis_rhel10_6-3.3.6", "description": "No notes for control-id 6.3.3.6.", "props": [ @@ -7533,7 +7521,7 @@ ] }, { - "uuid": "ae60c4b3-6d69-40c5-9f66-3af943b131c6", + "uuid": "43f4fa8d-23ab-4f6b-af00-df1ea3dde34a", "control-id": "cis_rhel10_6-3.3.7", "description": "No notes for control-id 6.3.3.7.", "props": [ @@ -7555,7 +7543,7 @@ ] }, { - "uuid": "06947b17-4bb1-47de-81b1-e598b48d4227", + "uuid": "a70e8592-fb11-4d64-97ad-d2a46a2f5188", "control-id": "cis_rhel10_6-3.3.8", "description": "No notes for control-id 6.3.3.8.", "props": [ @@ -7577,7 +7565,7 @@ ] }, { - "uuid": "79eb3a61-0066-49e5-9b6d-e8e7713fd76f", + "uuid": "db4c54bc-6d7b-4dc1-8e50-3d271b788025", "control-id": "cis_rhel10_6-3.3.9", "description": "No notes for control-id 6.3.3.9.", "props": [ @@ -7594,7 +7582,7 @@ ] }, { - "uuid": "eb81edf7-8b98-4f3e-b747-c504df2e8664", + "uuid": "a762634e-ca99-4d29-a9ef-90108023decc", "control-id": "cis_rhel10_6-3.3.10", "description": "No notes for control-id 6.3.3.10.", "props": [ @@ -7611,7 +7599,7 @@ ] }, { - "uuid": "87fc50c1-b0fb-449c-a5a8-dc9427400471", + "uuid": "bf60b9e0-b8ff-4498-bb53-45e16f5c749c", "control-id": "cis_rhel10_6-3.3.11", "description": "No notes for control-id 6.3.3.11.", "props": [ @@ -7648,7 +7636,7 @@ ] }, { - "uuid": "f6eccb4e-2584-4ba5-8a36-353377080299", + "uuid": "c9b30b87-e19c-463d-be5e-4369ebbf4412", "control-id": "cis_rhel10_6-3.3.12", "description": "No notes for control-id 6.3.3.12.", "props": [ @@ -7665,7 +7653,7 @@ ] }, { - "uuid": "1e819c12-723e-423b-86f4-8426f06161fe", + "uuid": "72febbe9-8cc6-4b0b-96b2-d5068b4060ff", "control-id": "cis_rhel10_6-3.3.13", "description": "No notes for control-id 6.3.3.13.", "props": [ @@ -7682,7 +7670,7 @@ ] }, { - "uuid": "d9b294dd-b6b9-46b4-88cf-f4ff9f0a5b55", + "uuid": "aeee304f-aad6-45bf-88ea-6159db1df58d", "control-id": "cis_rhel10_6-3.3.14", "description": "No notes for control-id 6.3.3.14.", "props": [ @@ -7704,7 +7692,7 @@ ] }, { - "uuid": "1c8b9752-c691-42ff-8a47-d3229a20d3f0", + "uuid": "555c1967-cb0f-46ef-b47b-fb64451326ca", "control-id": "cis_rhel10_6-3.3.15", "description": "No notes for control-id 6.3.3.15.", "props": [ @@ -7721,7 +7709,7 @@ ] }, { - "uuid": "f9373c88-5e4b-4f9f-bd07-945735007bed", + "uuid": "fccee59c-c39f-459f-81d5-5e6d48b5b5b9", "control-id": "cis_rhel10_6-3.3.16", "description": "No notes for control-id 6.3.3.16.", "props": [ @@ -7738,7 +7726,7 @@ ] }, { - "uuid": "fc12210e-6b82-487a-96fe-735e80b65cc6", + "uuid": "2bcf8950-a234-4375-a307-052fe29a0794", "control-id": "cis_rhel10_6-3.3.17", "description": "No notes for control-id 6.3.3.17.", "props": [ @@ -7760,7 +7748,7 @@ ] }, { - "uuid": "19b9decb-843c-4bd4-b931-cea232a9275a", + "uuid": "a393b64c-5f31-4a84-b5b2-f1ef290e5a52", "control-id": "cis_rhel10_6-3.3.18", "description": "No notes for control-id 6.3.3.18.", "props": [ @@ -7792,7 +7780,7 @@ ] }, { - "uuid": "ebb12f8b-415b-4691-85da-6516ec62a21a", + "uuid": "2f0d45f9-c85e-42d9-8d0b-0d4822c5dbe5", "control-id": "cis_rhel10_6-3.3.19", "description": "No notes for control-id 6.3.3.19.", "props": [ @@ -7824,7 +7812,7 @@ ] }, { - "uuid": "02a4e94c-094d-40d8-9b1c-643f9fdb063b", + "uuid": "78f55dfe-4bb4-41d4-b9fe-b0528ea824ab", "control-id": "cis_rhel10_6-3.3.20", "description": "No notes for control-id 6.3.3.20.", "props": [ @@ -7866,7 +7854,7 @@ ] }, { - "uuid": "896d2f39-3fe2-44b5-ab12-6321db561733", + "uuid": "d01737f9-bf8a-4af6-9568-0ca7ce36b0fc", "control-id": "cis_rhel10_6-3.3.21", "description": "No notes for control-id 6.3.3.21.", "props": [ @@ -7883,7 +7871,7 @@ ] }, { - "uuid": "272da763-dc37-4b2b-9b04-08fc91fa19ce", + "uuid": "7133286e-ef6e-4d39-8343-c27c4da393ad", "control-id": "cis_rhel10_6-3.3.22", "description": "No notes for control-id 6.3.3.22.", "props": [ @@ -7910,7 +7898,7 @@ ] }, { - "uuid": "1d1abc33-c9fe-498a-8081-beb37574df76", + "uuid": "22d594bb-c21e-4d4c-a815-7ed38269e8fe", "control-id": "cis_rhel10_6-3.3.23", "description": "No notes for control-id 6.3.3.23.", "props": [ @@ -7932,7 +7920,7 @@ ] }, { - "uuid": "2d382034-2f0f-42fe-97ad-03fc87a60c91", + "uuid": "6ff3673d-48bd-48c2-b9b2-65572a8ab102", "control-id": "cis_rhel10_6-3.3.24", "description": "No notes for control-id 6.3.3.24.", "props": [ @@ -7954,7 +7942,7 @@ ] }, { - "uuid": "40aca1ce-18be-4dca-92ad-b808af9fec02", + "uuid": "e9422903-7697-4efb-b78d-b8a846ffe628", "control-id": "cis_rhel10_6-3.3.25", "description": "No notes for control-id 6.3.3.25.", "props": [ @@ -7981,7 +7969,7 @@ ] }, { - "uuid": "d98aa571-0b4d-492a-80cc-ea3a65c3e22c", + "uuid": "866914e6-7221-4001-b860-385d23714f13", "control-id": "cis_rhel10_6-3.3.26", "description": "No notes for control-id 6.3.3.26.", "props": [ @@ -8003,7 +7991,7 @@ ] }, { - "uuid": "b8e051cb-d15d-465e-b9a4-3b89f4a873d5", + "uuid": "6287c788-dcbb-466e-974b-0b2772d4c1b2", "control-id": "cis_rhel10_6-3.3.27", "description": "No notes for control-id 6.3.3.27.", "props": [ @@ -8020,7 +8008,7 @@ ] }, { - "uuid": "c4aff37c-ddc2-48b6-a9a5-0afea62b54dc", + "uuid": "f8742c1a-f953-4081-bd1b-68ae74ba4396", "control-id": "cis_rhel10_6-3.3.28", "description": "No notes for control-id 6.3.3.28.", "props": [ @@ -8037,7 +8025,7 @@ ] }, { - "uuid": "294dfc31-1b6a-46a2-ba7f-b861f5bf88d5", + "uuid": "d450dab2-8377-4ef3-8771-a2125a5a8d88", "control-id": "cis_rhel10_6-3.3.29", "description": "No notes for control-id 6.3.3.29.", "props": [ @@ -8054,7 +8042,7 @@ ] }, { - "uuid": "0bd817c8-ddb6-4371-9cca-1880cdc26908", + "uuid": "a718ab9a-4982-4fce-980c-e4770ae07075", "control-id": "cis_rhel10_6-3.3.30", "description": "No notes for control-id 6.3.3.30.", "props": [ @@ -8071,7 +8059,7 @@ ] }, { - "uuid": "2e45e262-7b9b-4a7b-8347-3ffd52860d34", + "uuid": "0ef73786-9cfd-4422-967d-83719ecccf71", "control-id": "cis_rhel10_6-3.3.31", "description": "No notes for control-id 6.3.3.31.", "props": [ @@ -8088,7 +8076,7 @@ ] }, { - "uuid": "976d3b3a-a5d7-4588-8923-d7dcabc117da", + "uuid": "5e50763f-333a-4dd6-aa47-f95c7c351df1", "control-id": "cis_rhel10_6-3.3.32", "description": "No notes for control-id 6.3.3.32.", "props": [ @@ -8110,7 +8098,7 @@ ] }, { - "uuid": "0ffbbcac-84a2-4641-92fc-0f7ec5e32bdc", + "uuid": "ad4aa8c2-3d38-4583-8d6a-678b816a2898", "control-id": "cis_rhel10_6-3.3.33", "description": "No notes for control-id 6.3.3.33.", "props": [ @@ -8127,7 +8115,7 @@ ] }, { - "uuid": "ec6fd14d-93ec-4e47-be0a-1370c4eb7f54", + "uuid": "d63865f0-e6f5-4342-837a-040a9a182969", "control-id": "cis_rhel10_6-3.3.34", "description": "No notes for control-id 6.3.3.34.", "props": [ @@ -8144,7 +8132,7 @@ ] }, { - "uuid": "b57ad6db-52ed-40af-bbf8-067a73bcd7a5", + "uuid": "582ef8e0-5b3e-4afe-bb7b-98b9dd085158", "control-id": "cis_rhel10_6-3.3.35", "description": "No notes for control-id 6.3.3.35.", "props": [ @@ -8161,7 +8149,7 @@ ] }, { - "uuid": "9a07f77e-2b53-4f9a-9274-6190d763a0ef", + "uuid": "e39b2e08-423a-4361-aef0-ab0365c3053a", "control-id": "cis_rhel10_6-3.3.36", "description": "No notes for control-id 6.3.3.36.", "props": [ @@ -8178,7 +8166,7 @@ ] }, { - "uuid": "a27cf630-866f-4911-a94f-36df562a10cb", + "uuid": "50175de0-8c67-454f-b085-d2c4b45cb191", "control-id": "cis_rhel10_6-3.3.37", "description": "The description for control-id cis_rhel10_6-3.3.37.", "props": [ @@ -8191,7 +8179,7 @@ ] }, { - "uuid": "01cceae9-4018-4bfd-82d3-bd078f8036eb", + "uuid": "232403d9-99dc-4c78-afea-3439ca43ca2a", "control-id": "cis_rhel10_6-3.4.1", "description": "No notes for control-id 6.3.4.1.", "props": [ @@ -8208,7 +8196,7 @@ ] }, { - "uuid": "8c2402fe-8919-4112-89e0-a1ae6b2c615a", + "uuid": "7062778f-db38-4210-a1f1-5d41c263b503", "control-id": "cis_rhel10_6-3.4.2", "description": "No notes for control-id 6.3.4.2.", "props": [ @@ -8225,7 +8213,7 @@ ] }, { - "uuid": "18dc1123-a7aa-4cf6-887c-988392fc5635", + "uuid": "fbdc9588-f801-4e58-a9dc-12110a9a38ef", "control-id": "cis_rhel10_6-3.4.3", "description": "No notes for control-id 6.3.4.3.", "props": [ @@ -8242,7 +8230,7 @@ ] }, { - "uuid": "f236c545-8a8f-48d4-a39b-13d6126f9467", + "uuid": "9c609b9d-ff8c-43d3-b394-0e8f285fbcda", "control-id": "cis_rhel10_6-3.4.4", "description": "No notes for control-id 6.3.4.4.", "props": [ @@ -8259,7 +8247,7 @@ ] }, { - "uuid": "cae3736e-bfdf-4f35-ae94-8453ac125ae8", + "uuid": "d2583c4a-9709-4df4-b0e1-3ab52b2dc83d", "control-id": "cis_rhel10_6-3.4.5", "description": "No notes for control-id 6.3.4.5.", "props": [ @@ -8276,7 +8264,7 @@ ] }, { - "uuid": "2ffcf79c-fdb2-41b5-bb94-4de1db07152a", + "uuid": "7b396b35-199d-472a-89c8-d8c4e821e289", "control-id": "cis_rhel10_6-3.4.6", "description": "No notes for control-id 6.3.4.6.", "props": [ @@ -8293,7 +8281,7 @@ ] }, { - "uuid": "a80a2f13-4e0f-446f-b3fc-4edf638e6545", + "uuid": "b1b8dec4-9d33-4b0f-a44f-f8beb502d3ac", "control-id": "cis_rhel10_6-3.4.7", "description": "No notes for control-id 6.3.4.7.", "props": [ @@ -8310,7 +8298,7 @@ ] }, { - "uuid": "85e5c989-963b-4db5-ae99-b55761734356", + "uuid": "0efc1945-b406-4638-9e40-86fe64faad77", "control-id": "cis_rhel10_6-3.4.8", "description": "No notes for control-id 6.3.4.8.", "props": [ @@ -8327,7 +8315,7 @@ ] }, { - "uuid": "9c11438d-9e9a-4714-be4c-5a58af7c9cf3", + "uuid": "12af5a31-c377-4c98-ab0c-8d8e695f04ce", "control-id": "cis_rhel10_6-3.4.9", "description": "No notes for control-id 6.3.4.9.", "props": [ @@ -8344,7 +8332,7 @@ ] }, { - "uuid": "a949cbd5-92d3-428d-93a0-f735cef3c93f", + "uuid": "f323fc9a-fd92-4077-8334-8958b264bab3", "control-id": "cis_rhel10_6-3.4.10", "description": "No notes for control-id 6.3.4.10.", "props": [ @@ -8361,7 +8349,7 @@ ] }, { - "uuid": "62daf4c0-2b3e-44d7-84d4-331caa156479", + "uuid": "f81cfdf8-35ba-4233-916c-c663915fc110", "control-id": "reload_dconf_db", "description": "This is a helper rule to reload Dconf database correctly.", "props": [ @@ -8378,7 +8366,7 @@ ] }, { - "uuid": "572c9d89-ee42-4669-ae71-4ba2ebf8133d", + "uuid": "fc93dd57-26d5-477d-8066-8b6e722e8cd4", "control-id": "cis_rhel10_1-1.1.1", "description": "No notes for control-id 1.1.1.1.", "props": [ @@ -8395,7 +8383,7 @@ ] }, { - "uuid": "bf94b1e0-090b-420b-b4ee-b0e2e525d901", + "uuid": "78baae12-98c6-4728-8299-846589b5b16b", "control-id": "cis_rhel10_1-1.1.2", "description": "No notes for control-id 1.1.1.2.", "props": [ @@ -8412,7 +8400,7 @@ ] }, { - "uuid": "7c216b35-51bb-48e3-bd19-3459806d51af", + "uuid": "1b03c78a-9596-455e-bb18-9655c2c48557", "control-id": "cis_rhel10_1-1.1.3", "description": "No notes for control-id 1.1.1.3.", "props": [ @@ -8429,7 +8417,7 @@ ] }, { - "uuid": "d5f20886-ae97-461b-94d8-af0bad28e38b", + "uuid": "132333f5-6313-43b0-aa04-562a022ddd65", "control-id": "cis_rhel10_1-1.1.4", "description": "No notes for control-id 1.1.1.4.", "props": [ @@ -8446,7 +8434,7 @@ ] }, { - "uuid": "f70dcd47-f170-4b3b-8192-3fb4d79a00cc", + "uuid": "1fe3470e-599a-4356-a22e-14641a8cd836", "control-id": "cis_rhel10_1-1.1.5", "description": "No notes for control-id 1.1.1.5.", "props": [ @@ -8463,7 +8451,7 @@ ] }, { - "uuid": "f17adee2-eba1-41d2-89c9-d9286d15e432", + "uuid": "e836e676-ab74-4d3a-bf9c-83bbbfb4bbe4", "control-id": "cis_rhel10_1-1.1.11", "description": "The description for control-id cis_rhel10_1-1.1.11.", "props": [ @@ -8476,7 +8464,7 @@ ] }, { - "uuid": "f8e0488e-dd67-48fb-8651-1cd9becc54d0", + "uuid": "e560a5d6-dbb3-45e0-bb39-edd7b126c8f9", "control-id": "cis_rhel10_1-1.2.1.1", "description": "No notes for control-id 1.1.2.1.1.", "props": [ @@ -8493,7 +8481,7 @@ ] }, { - "uuid": "ed756735-7576-4558-875e-af873588b044", + "uuid": "fe84b28a-cbcd-4f67-93bd-a0cfb0fdfcc7", "control-id": "cis_rhel10_1-1.2.1.2", "description": "No notes for control-id 1.1.2.1.2.", "props": [ @@ -8510,7 +8498,7 @@ ] }, { - "uuid": "7dd48063-192b-427c-b222-49195d2ef825", + "uuid": "d6f8ce6a-fdd0-4747-860a-519f25e20ca4", "control-id": "cis_rhel10_1-1.2.1.3", "description": "No notes for control-id 1.1.2.1.3.", "props": [ @@ -8527,7 +8515,7 @@ ] }, { - "uuid": "1bb772ff-4344-4030-a2f7-823140e93063", + "uuid": "460252cc-2b30-4ac2-a5e4-0d8ecda66c7d", "control-id": "cis_rhel10_1-1.2.1.4", "description": "No notes for control-id 1.1.2.1.4.", "props": [ @@ -8544,7 +8532,7 @@ ] }, { - "uuid": "5dd8d9b5-7eb7-440b-9532-0345934e016b", + "uuid": "664ebbf5-4d0c-42c5-b1d1-aa15187da1b4", "control-id": "cis_rhel10_1-1.2.2.1", "description": "No notes for control-id 1.1.2.2.1.", "props": [ @@ -8561,7 +8549,7 @@ ] }, { - "uuid": "399ae027-171f-4955-a9ab-b826d1aec7b7", + "uuid": "fec6f81a-368c-4fa0-a9c8-60770986d372", "control-id": "cis_rhel10_1-1.2.2.2", "description": "No notes for control-id 1.1.2.2.2.", "props": [ @@ -8578,7 +8566,7 @@ ] }, { - "uuid": "a09ae928-b08a-4cde-b3a8-ff5a92077634", + "uuid": "2ad5cece-a881-4d5c-9fd8-97d09d6c5fc6", "control-id": "cis_rhel10_1-1.2.2.3", "description": "No notes for control-id 1.1.2.2.3.", "props": [ @@ -8595,7 +8583,7 @@ ] }, { - "uuid": "5ec226b5-fefa-4fd1-af4a-2be03570ce7c", + "uuid": "bd6eb132-1a55-4e76-943c-35b7eced0762", "control-id": "cis_rhel10_1-1.2.2.4", "description": "No notes for control-id 1.1.2.2.4.", "props": [ @@ -8612,7 +8600,7 @@ ] }, { - "uuid": "4fa357a5-9fae-4c5d-b17a-83aafe702c33", + "uuid": "11d75670-63f2-4d10-adb8-5cb7362798b7", "control-id": "cis_rhel10_1-1.2.3.2", "description": "No notes for control-id 1.1.2.3.2.", "props": [ @@ -8629,7 +8617,7 @@ ] }, { - "uuid": "6f2d7612-995f-461b-90af-836aee47c2af", + "uuid": "d941dfbd-22a0-4edb-b7e3-3af2b9132028", "control-id": "cis_rhel10_1-1.2.3.3", "description": "No notes for control-id 1.1.2.3.3.", "props": [ @@ -8646,7 +8634,7 @@ ] }, { - "uuid": "1ae543ca-5c1c-42c2-be48-3914202cff96", + "uuid": "ad6440c9-a110-4a3e-8623-0251d4749cb4", "control-id": "cis_rhel10_1-1.2.4.2", "description": "No notes for control-id 1.1.2.4.2.", "props": [ @@ -8663,7 +8651,7 @@ ] }, { - "uuid": "46188c4c-2091-4cda-ae11-ac3d7fd36647", + "uuid": "06152479-423d-4e7f-9656-ded19efc468a", "control-id": "cis_rhel10_1-1.2.4.3", "description": "No notes for control-id 1.1.2.4.3.", "props": [ @@ -8680,7 +8668,7 @@ ] }, { - "uuid": "ef68aced-3702-4a7e-a454-bd4a09aca910", + "uuid": "80428340-e6b3-4c58-9aec-8d252f22d0dc", "control-id": "cis_rhel10_1-1.2.5.2", "description": "No notes for control-id 1.1.2.5.2.", "props": [ @@ -8697,7 +8685,7 @@ ] }, { - "uuid": "92714762-f9fa-442a-ba7e-2d382fc4dcd3", + "uuid": "5ff4c29f-50eb-4977-b7dd-8a3a8988bded", "control-id": "cis_rhel10_1-1.2.5.3", "description": "No notes for control-id 1.1.2.5.3.", "props": [ @@ -8714,7 +8702,7 @@ ] }, { - "uuid": "54d24b9c-123c-4cee-adb1-ec8d12c92d8a", + "uuid": "f4770551-ce06-4ac4-92bd-befdf95e8e50", "control-id": "cis_rhel10_1-1.2.5.4", "description": "No notes for control-id 1.1.2.5.4.", "props": [ @@ -8731,7 +8719,7 @@ ] }, { - "uuid": "9c97061a-6f62-4aa6-a788-519ae11bed5a", + "uuid": "def25e36-3890-4a9b-94b8-3f0f34735080", "control-id": "cis_rhel10_1-1.2.6.2", "description": "No notes for control-id 1.1.2.6.2.", "props": [ @@ -8748,7 +8736,7 @@ ] }, { - "uuid": "41c77a31-7821-4cdd-8953-ec20c4ff9224", + "uuid": "136460ff-0c1e-49f9-bcce-43ce4f90b3cf", "control-id": "cis_rhel10_1-1.2.6.3", "description": "No notes for control-id 1.1.2.6.3.", "props": [ @@ -8765,7 +8753,7 @@ ] }, { - "uuid": "fe661a16-9b15-465f-bf14-0a7a84e5b5c2", + "uuid": "99250b50-3599-4b1b-b349-36b4b5c0fdc2", "control-id": "cis_rhel10_1-1.2.6.4", "description": "No notes for control-id 1.1.2.6.4.", "props": [ @@ -8782,7 +8770,7 @@ ] }, { - "uuid": "1898e1b7-c0b1-489a-b57f-ec85896d47be", + "uuid": "2c2cd1e8-bcc1-441b-be73-2b81c3d5d008", "control-id": "cis_rhel10_1-1.2.7.2", "description": "No notes for control-id 1.1.2.7.2.", "props": [ @@ -8799,7 +8787,7 @@ ] }, { - "uuid": "84fb9520-b7e3-40c8-8dcc-c902933a3135", + "uuid": "83ba4f3d-707c-4866-80bc-72d3cbdf06b6", "control-id": "cis_rhel10_1-1.2.7.3", "description": "No notes for control-id 1.1.2.7.3.", "props": [ @@ -8816,7 +8804,7 @@ ] }, { - "uuid": "39dc5e52-b222-4165-a21c-700ddda2f956", + "uuid": "1a31ceb3-80ac-4358-a956-f6722264abc0", "control-id": "cis_rhel10_1-1.2.7.4", "description": "No notes for control-id 1.1.2.7.4.", "props": [ @@ -8833,7 +8821,7 @@ ] }, { - "uuid": "835d7754-75b0-4d37-8bd7-938f56ca156e", + "uuid": "be87d7de-b920-4cd0-b843-c9004aea90ec", "control-id": "cis_rhel10_1-2.1.1", "description": "The description for control-id cis_rhel10_1-2.1.1.", "props": [ @@ -8846,7 +8834,7 @@ ] }, { - "uuid": "673ed186-2f8a-4388-b7f3-0fa14d0f9d1a", + "uuid": "5a592e89-7ee3-42b9-9843-8fe90157f5e0", "control-id": "cis_rhel10_1-2.1.2", "description": "No notes for control-id 1.2.1.2.", "props": [ @@ -8863,7 +8851,7 @@ ] }, { - "uuid": "e9d7946a-2dd7-4bfe-a30f-ccd8ade090fe", + "uuid": "ab92a7ac-5c42-4104-948a-6482b912d6a9", "control-id": "cis_rhel10_1-2.1.4", "description": "The description for control-id cis_rhel10_1-2.1.4.", "props": [ @@ -8876,7 +8864,7 @@ ] }, { - "uuid": "306a8423-906b-483c-a459-55136b48bcb8", + "uuid": "1e4b3535-a795-4cc2-9108-eee77ece2a31", "control-id": "cis_rhel10_1-2.2.1", "description": "The description for control-id cis_rhel10_1-2.2.1.", "props": [ @@ -8889,7 +8877,7 @@ ] }, { - "uuid": "c666d69b-8368-4ca2-b192-80001e2c533a", + "uuid": "892613ea-6ffb-4435-8259-d6b13035dba4", "control-id": "cis_rhel10_1-3.1.1", "description": "No notes for control-id 1.3.1.1.", "props": [ @@ -8906,7 +8894,7 @@ ] }, { - "uuid": "a0dc1d3c-79fd-4461-8d7b-efddbef6dc11", + "uuid": "3bb0f934-1798-4b09-8a3d-f0252015f306", "control-id": "cis_rhel10_1-3.1.2", "description": "No notes for control-id 1.3.1.2.", "props": [ @@ -8923,7 +8911,7 @@ ] }, { - "uuid": "9ea78d8c-3c6a-4499-9778-a78b8dea3216", + "uuid": "28e2a24e-74e3-41b0-95d3-37f194c94242", "control-id": "cis_rhel10_1-3.1.3", "description": "No notes for control-id 1.3.1.3.", "props": [ @@ -8940,7 +8928,7 @@ ] }, { - "uuid": "95da6244-1610-4424-8718-f2bbe9799bdb", + "uuid": "1d5d4668-0361-4ef6-ac8d-94fb492fc3d0", "control-id": "cis_rhel10_1-3.1.4", "description": "No notes for control-id 1.3.1.4.", "props": [ @@ -8957,7 +8945,7 @@ ] }, { - "uuid": "8430cd44-ce26-49e2-80ac-5f54ee986963", + "uuid": "b24e289f-227b-4f75-b06b-58127051fb61", "control-id": "cis_rhel10_1-3.1.7", "description": "No notes for control-id 1.3.1.7.", "props": [ @@ -8974,7 +8962,7 @@ ] }, { - "uuid": "52b05cd0-cd8b-446a-8ddf-d17859ecffd2", + "uuid": "17309c5a-a6d7-4bd0-adab-a66b3e62ca43", "control-id": "cis_rhel10_1-4.1", "description": "There is no automated remediation for this rule and this is intentional.\nMore details in the rule description.", "props": [ @@ -8991,7 +8979,7 @@ ] }, { - "uuid": "a1ec6e68-59e3-4d8c-8963-39715869cf1d", + "uuid": "3a82a405-d5fa-464b-abe7-e2f52f8592cb", "control-id": "cis_rhel10_1-4.2", "description": "This requirement demands a deeper review of the rules.", "props": [ @@ -9018,7 +9006,7 @@ ] }, { - "uuid": "201d3df0-a097-4f60-a958-614d8df1a9e8", + "uuid": "3158c8bb-938a-4052-ac0d-53f23e06938c", "control-id": "cis_rhel10_1-5.1", "description": "No notes for control-id 1.5.1.", "props": [ @@ -9035,7 +9023,7 @@ ] }, { - "uuid": "fbaa4f40-d168-42f6-8619-39c37d82b171", + "uuid": "b515f4b0-7c30-4b75-9e32-9cffaf52be13", "control-id": "cis_rhel10_1-5.2", "description": "No notes for control-id 1.5.2.", "props": [ @@ -9052,7 +9040,7 @@ ] }, { - "uuid": "290dbfbc-909c-443b-bbd4-346d9a90c642", + "uuid": "ce204994-a9e5-4eb7-a944-07328eaf135f", "control-id": "cis_rhel10_1-5.4", "description": "No notes for control-id 1.5.4.", "props": [ @@ -9069,7 +9057,7 @@ ] }, { - "uuid": "059152ab-b403-4791-a3ab-60c769524099", + "uuid": "701d4c8d-926a-4a93-b605-a27b42c85634", "control-id": "cis_rhel10_1-5.5", "description": "No notes for control-id 1.5.5.", "props": [ @@ -9086,7 +9074,7 @@ ] }, { - "uuid": "e008d879-e4fa-4ca6-9165-468965b33f9f", + "uuid": "cbdb0360-bbf5-4527-bc59-25f63a9db18e", "control-id": "cis_rhel10_1-5.6", "description": "No notes for control-id 1.5.6.", "props": [ @@ -9103,7 +9091,7 @@ ] }, { - "uuid": "9d88c915-88b6-4680-b852-82ada0ba6054", + "uuid": "cc586618-0cda-4cdf-884d-8344770cba9a", "control-id": "cis_rhel10_1-5.7", "description": "No notes for control-id 1.5.7.", "props": [ @@ -9120,7 +9108,7 @@ ] }, { - "uuid": "0ed5188f-6268-46f1-bc8b-6bddc5794052", + "uuid": "e9ec9d46-1372-4949-89b8-62af98fa7695", "control-id": "cis_rhel10_1-5.8", "description": "Address Space Layout Randomization (ASLR)", "props": [ @@ -9137,7 +9125,7 @@ ] }, { - "uuid": "4abbeeeb-a63e-4621-99d7-eb63cd4d31da", + "uuid": "57f96b6f-adb3-42e5-bb02-a52b8ce4376e", "control-id": "cis_rhel10_1-5.9", "description": "No notes for control-id 1.5.9.", "props": [ @@ -9154,7 +9142,7 @@ ] }, { - "uuid": "d421dd48-a6c4-44d4-9494-fefc22d87990", + "uuid": "94dde0b1-79ad-4672-92d9-77bf10f25768", "control-id": "cis_rhel10_1-5.10", "description": "No notes for control-id 1.5.10.", "props": [ @@ -9171,7 +9159,7 @@ ] }, { - "uuid": "6edaabc5-89b5-4f10-a3ca-771fce9d5309", + "uuid": "0b11035c-4850-4f7b-ae76-6e17104f4453", "control-id": "cis_rhel10_1-6.1", "description": "No notes for control-id 1.6.1.", "props": [ @@ -9188,7 +9176,7 @@ ] }, { - "uuid": "23f5a20e-d77a-43ba-8b91-98d5e98a12f3", + "uuid": "3a355e3d-e26f-4742-8c4d-cfe04beeb9de", "control-id": "cis_rhel10_1-6.2", "description": "No notes for control-id 1.6.2.", "props": [ @@ -9205,7 +9193,7 @@ ] }, { - "uuid": "d1ac3972-ad4f-4abb-b55e-d1990d33b1fb", + "uuid": "85590288-5fb0-40ee-abad-890b7d5fae5e", "control-id": "cis_rhel10_1-6.3", "description": "No notes for control-id 1.6.3.", "props": [ @@ -9222,7 +9210,7 @@ ] }, { - "uuid": "627ead45-2fdb-410c-8d3d-496d278eac92", + "uuid": "42d92b38-fcac-4efa-9a5c-999af44f1eae", "control-id": "cis_rhel10_1-6.4", "description": "No notes for control-id 1.6.4.", "props": [ @@ -9239,7 +9227,7 @@ ] }, { - "uuid": "0d6b586b-4568-4085-98a0-71a3e64cbeed", + "uuid": "30aadcf7-b5c0-48e2-b666-7c9c964f459f", "control-id": "cis_rhel10_1-7.1", "description": "No notes for control-id 1.7.1.", "props": [ @@ -9256,7 +9244,7 @@ ] }, { - "uuid": "bc2b011a-708a-435e-9666-b6eba3fa8700", + "uuid": "b1021239-dbc8-4d66-8c26-fbe5baad49b0", "control-id": "cis_rhel10_1-7.2", "description": "No notes for control-id 1.7.2.", "props": [ @@ -9273,7 +9261,7 @@ ] }, { - "uuid": "76f79552-6843-46ad-bc8b-1ec406763265", + "uuid": "9ee2badf-ccb0-4004-acb2-2d87ea23ff2d", "control-id": "cis_rhel10_1-7.3", "description": "No notes for control-id 1.7.3.", "props": [ @@ -9290,7 +9278,7 @@ ] }, { - "uuid": "10468a4f-4673-4364-85fc-bc007d945c58", + "uuid": "4e05593d-45d8-4d05-bcb6-91ed0868a4c0", "control-id": "cis_rhel10_1-7.4", "description": "No notes for control-id 1.7.4.", "props": [ @@ -9317,7 +9305,7 @@ ] }, { - "uuid": "7d0dd6f8-ecc1-4728-8438-74f92220328c", + "uuid": "dd23d643-2862-4ef1-ba0f-5265925b40bc", "control-id": "cis_rhel10_1-7.5", "description": "No notes for control-id 1.7.5.", "props": [ @@ -9344,7 +9332,7 @@ ] }, { - "uuid": "0005ab24-9fae-4414-afab-13eb2a304e27", + "uuid": "b3ad0726-59c6-4233-86bd-e4c67db948d2", "control-id": "cis_rhel10_1-7.6", "description": "No notes for control-id 1.7.6.", "props": [ @@ -9371,7 +9359,7 @@ ] }, { - "uuid": "15e5810b-3016-4aaf-8b15-2c9819a979a8", + "uuid": "761aa95a-b9e0-4946-9302-ad833b534886", "control-id": "cis_rhel10_1-8.1", "description": "No notes for control-id 1.8.1.", "props": [ @@ -9393,7 +9381,7 @@ ] }, { - "uuid": "5cda20f5-6447-484c-a61f-88ee469065e1", + "uuid": "9a6557c3-b6de-4967-9fbe-58fe8f01a972", "control-id": "cis_rhel10_1-8.2", "description": "No notes for control-id 1.8.2.", "props": [ @@ -9410,7 +9398,7 @@ ] }, { - "uuid": "b3e37b44-6bfb-4799-bf3c-8bfd06b4f787", + "uuid": "84e22083-3ddf-42c2-b5df-661a260450de", "control-id": "cis_rhel10_1-8.3", "description": "No notes for control-id 1.8.3.", "props": [ @@ -9442,7 +9430,7 @@ ] }, { - "uuid": "45c572e9-9576-4e99-9dde-f361c0ea9d4b", + "uuid": "c7e3dab0-6c44-42d3-956e-0c6576defbb3", "control-id": "cis_rhel10_1-8.5", "description": "No notes for control-id 1.8.5.", "props": [ @@ -9459,7 +9447,7 @@ ] }, { - "uuid": "8dbc4a18-de0f-461b-b0d5-35ffed7f8bf6", + "uuid": "29b00cd8-dc66-4f62-a1d0-54a5f7a7b068", "control-id": "cis_rhel10_2-1.4", "description": "No notes for control-id 2.1.4.", "props": [ @@ -9476,7 +9464,7 @@ ] }, { - "uuid": "71538235-e66a-4398-9dcc-6b7d4c4a7874", + "uuid": "deb66cc8-15a6-4e3a-9551-74b85335dd2e", "control-id": "cis_rhel10_2-1.5", "description": "No notes for control-id 2.1.5.", "props": [ @@ -9493,7 +9481,7 @@ ] }, { - "uuid": "218968c3-03d9-471f-bcce-363ba47facdb", + "uuid": "a9e72dd3-c3a6-4dd7-927a-477bb3431332", "control-id": "cis_rhel10_2-1.6", "description": "No notes for control-id 2.1.6.", "props": [ @@ -9510,7 +9498,7 @@ ] }, { - "uuid": "d23665f8-b32b-4746-ad03-8f6b7a3f223f", + "uuid": "1e581f8c-5b6e-4707-9198-969707db9db7", "control-id": "cis_rhel10_2-1.7", "description": "No notes for control-id 2.1.7.", "props": [ @@ -9527,7 +9515,7 @@ ] }, { - "uuid": "4239855a-04eb-4f18-b43f-5bbf3439a981", + "uuid": "64bc5cd9-5005-441a-8d69-2de92034fd16", "control-id": "cis_rhel10_2-1.8", "description": "No notes for control-id 2.1.8.", "props": [ @@ -9549,7 +9537,7 @@ ] }, { - "uuid": "b6f1cb88-c371-4a8b-9737-14918e1dd20e", + "uuid": "dfb65681-41c0-4b62-9e89-25aeaafc5876", "control-id": "cis_rhel10_2-1.9", "description": "Many of the libvirt packages used by Enterprise Linux virtualization are dependent on the\nnfs-utils package.", "props": [ @@ -9566,7 +9554,7 @@ ] }, { - "uuid": "3c49a46f-1c9c-478e-a3d5-cf7d32b049f3", + "uuid": "208757a7-480f-45d0-a8f7-d4889786f08c", "control-id": "cis_rhel10_2-1.11", "description": "Many of the libvirt packages used by Enterprise Linux virtualization, and the nfs-utils\npackage used for The Network File System (NFS), are dependent on the rpcbind package.", "props": [ @@ -9583,7 +9571,7 @@ ] }, { - "uuid": "11238bb7-6208-41f5-afff-ac7190854d3b", + "uuid": "ed231620-8070-4d30-92b5-0c6901ae1e7c", "control-id": "cis_rhel10_2-1.12", "description": "No notes for control-id 2.1.12.", "props": [ @@ -9600,7 +9588,7 @@ ] }, { - "uuid": "d775e034-af85-4708-8e3d-188bcfce4b50", + "uuid": "07d6eb2f-6792-43ae-8ee3-27cf91189b68", "control-id": "cis_rhel10_2-1.13", "description": "No notes for control-id 2.1.13.", "props": [ @@ -9617,7 +9605,7 @@ ] }, { - "uuid": "4f3a2e47-e33a-4c49-b157-68a919be7d33", + "uuid": "03da5f70-51c2-4b59-a042-e673a384c380", "control-id": "cis_rhel10_2-1.14", "description": "No notes for control-id 2.1.14.", "props": [ @@ -9634,7 +9622,7 @@ ] }, { - "uuid": "7b5a6e3f-e092-4081-b0d7-878e35f4a8a5", + "uuid": "10ed0a96-c034-4ed9-a522-87c9f6d5d87e", "control-id": "cis_rhel10_2-1.15", "description": "No notes for control-id 2.1.15.", "props": [ @@ -9651,7 +9639,7 @@ ] }, { - "uuid": "8c855146-93db-46be-ae11-ae073c00b62d", + "uuid": "c26ad8ef-1525-4d22-8de0-59218ef4d36e", "control-id": "cis_rhel10_2-1.16", "description": "No notes for control-id 2.1.16.", "props": [ @@ -9668,7 +9656,7 @@ ] }, { - "uuid": "8539e11b-c344-4262-bdb3-e7a386f55eb0", + "uuid": "fe8d3dcb-8bb9-4e0e-af79-4fc1b257f8f5", "control-id": "cis_rhel10_2-1.17", "description": "No notes for control-id 2.1.17.", "props": [ @@ -9685,7 +9673,7 @@ ] }, { - "uuid": "1e555669-1734-4b54-a842-2223c2252bbc", + "uuid": "3afbd56d-8a13-44d1-95c8-1f2916ff3643", "control-id": "cis_rhel10_2-1.18", "description": "No notes for control-id 2.1.18.", "props": [ @@ -9707,7 +9695,7 @@ ] }, { - "uuid": "f3c09d64-e185-4599-8938-25cd4eeec557", + "uuid": "caef9f1e-72a1-4e3b-9692-1d5af948fd25", "control-id": "cis_rhel10_2-1.21", "description": "No notes for control-id 2.1.21.", "props": [ @@ -9729,7 +9717,7 @@ ] }, { - "uuid": "ec095925-e917-47a8-98dc-569a4ee3715f", + "uuid": "7740fcbd-be26-417f-84f8-40540c5f9c3f", "control-id": "cis_rhel10_2-1.22", "description": "The description for control-id cis_rhel10_2-1.22.", "props": [ @@ -9742,7 +9730,7 @@ ] }, { - "uuid": "fe89c3f2-c69c-4c38-a2ec-dfe3a1a2ad07", + "uuid": "fe123e84-d115-4391-b523-fdbf50013ef8", "control-id": "cis_rhel10_2-2.1", "description": "No notes for control-id 2.2.1.", "props": [ @@ -9759,7 +9747,7 @@ ] }, { - "uuid": "89485b86-10c9-4d8f-980f-584be90e7336", + "uuid": "2c571e22-2625-4d03-9d88-443a70e5cd9b", "control-id": "cis_rhel10_2-2.3", "description": "No notes for control-id 2.2.3.", "props": [ @@ -9776,7 +9764,7 @@ ] }, { - "uuid": "74a06aab-31cc-43bf-a450-c8e3f9321b21", + "uuid": "f5463044-bd3c-4540-bdb6-03267f796a3d", "control-id": "cis_rhel10_2-2.4", "description": "No notes for control-id 2.2.4.", "props": [ @@ -9793,7 +9781,7 @@ ] }, { - "uuid": "07c5af48-29de-4380-b9b9-77dca4873237", + "uuid": "6ea12cad-0fe6-47ac-8815-aca4242c0282", "control-id": "cis_rhel10_2-3.1", "description": "No notes for control-id 2.3.1.", "props": [ @@ -9805,7 +9793,7 @@ ] }, { - "uuid": "2236a4ce-08a1-41a7-ac69-fc426b985e40", + "uuid": "4bdf4ce0-a607-4a21-b029-7a1dff74dc89", "control-id": "cis_rhel10_2-3.2", "description": "No notes for control-id 2.3.2.", "props": [ @@ -9822,7 +9810,7 @@ ] }, { - "uuid": "20bc03f0-37f5-4f72-afd0-96b481e2be5c", + "uuid": "74495562-cf79-42be-8823-63c25afa5f5e", "control-id": "cis_rhel10_2-3.3", "description": "No notes for control-id 2.3.3.", "props": [ @@ -9839,7 +9827,7 @@ ] }, { - "uuid": "db9cd74a-ef41-4237-b7b9-18cb72d0bad1", + "uuid": "37b53457-69f6-400c-8431-40efd5ae73b6", "control-id": "cis_rhel10_2-4.1.1", "description": "No notes for control-id 2.4.1.1.", "props": [ @@ -9861,7 +9849,7 @@ ] }, { - "uuid": "aa8ab8c6-f475-4da7-925d-71e0b5c4cb04", + "uuid": "d538ad37-fafc-4a43-bf72-becc38d32eed", "control-id": "cis_rhel10_2-4.1.2", "description": "No notes for control-id 2.4.1.2.", "props": [ @@ -9888,7 +9876,7 @@ ] }, { - "uuid": "fb89b413-f375-44ac-a7f1-97a6906de3b5", + "uuid": "a8a32794-03ca-469b-8395-36f48f43b0f2", "control-id": "cis_rhel10_2-4.1.3", "description": "No notes for control-id 2.4.1.3.", "props": [ @@ -9915,7 +9903,7 @@ ] }, { - "uuid": "7e36bceb-c067-4533-8d4b-44cf341ebca1", + "uuid": "f16795cd-7e1d-4129-a02e-4c7a5af12be3", "control-id": "cis_rhel10_2-4.1.4", "description": "No notes for control-id 2.4.1.4.", "props": [ @@ -9942,7 +9930,7 @@ ] }, { - "uuid": "7b180dde-e762-49ab-ae02-d27bb3f31b59", + "uuid": "2aab8db7-ed2d-4510-a1f3-55f92491ff0b", "control-id": "cis_rhel10_2-4.1.5", "description": "No notes for control-id 2.4.1.5.", "props": [ @@ -9969,7 +9957,7 @@ ] }, { - "uuid": "422fc897-c5bf-4f13-a949-05a0a5c57535", + "uuid": "83877928-9093-49cf-9146-77a28028d501", "control-id": "cis_rhel10_2-4.1.6", "description": "No notes for control-id 2.4.1.6.", "props": [ @@ -9996,7 +9984,7 @@ ] }, { - "uuid": "e2008f48-24a7-4719-862d-3180cc1e7e49", + "uuid": "b0ded74f-1629-4562-8ed5-c95e10c6b3bb", "control-id": "cis_rhel10_2-4.1.7", "description": "No notes for control-id 2.4.1.7.", "props": [ @@ -10023,7 +10011,7 @@ ] }, { - "uuid": "13312704-524d-4ea7-88c8-a113a5104522", + "uuid": "d61835ff-f412-45ae-a7a5-4f2a1d2a4d0d", "control-id": "cis_rhel10_2-4.1.8", "description": "No notes for control-id 2.4.1.8.", "props": [ @@ -10050,7 +10038,7 @@ ] }, { - "uuid": "60bb4fdb-7e62-4c51-8f36-2b3e3cc281be", + "uuid": "a931acac-f292-4815-b90c-d0a618983c48", "control-id": "cis_rhel10_2-4.1.9", "description": "No notes for control-id 2.4.1.9.", "props": [ @@ -10087,7 +10075,7 @@ ] }, { - "uuid": "2b9f9b26-9313-4505-a5c9-de3002110b76", + "uuid": "dd43d3ec-1f25-4912-8fa6-483f80a39be0", "control-id": "cis_rhel10_2-4.2.1", "description": "No notes for control-id 2.4.2.1.", "props": [ @@ -10124,7 +10112,7 @@ ] }, { - "uuid": "0c0c10f1-4b6e-41ed-b74c-7dc1985fe7a2", + "uuid": "e7d0a257-b6d8-464e-8ea5-04c34dd30974", "control-id": "cis_rhel10_3-1.1", "description": "The description for control-id cis_rhel10_3-1.1.", "props": [ @@ -10137,7 +10125,7 @@ ] }, { - "uuid": "829595e1-0d39-43fd-9038-a8337dd54371", + "uuid": "e0e9ec00-bbd5-42ba-a802-6b9334bcb880", "control-id": "cis_rhel10_3-2.1", "description": "No notes for control-id 3.2.1.", "props": [ @@ -10154,7 +10142,7 @@ ] }, { - "uuid": "541b5eda-410f-40dd-b25a-4cec3847633b", + "uuid": "188f975b-b604-47ca-8325-a8e38893317c", "control-id": "cis_rhel10_3-2.2", "description": "No notes for control-id 3.2.2.", "props": [ @@ -10171,7 +10159,7 @@ ] }, { - "uuid": "41ed4b5a-49e7-4f11-ba17-655713d14c70", + "uuid": "ef0af3c3-f49c-4348-a4a8-9f20d25f1fd7", "control-id": "cis_rhel10_3-2.3", "description": "No notes for control-id 3.2.3.", "props": [ @@ -10188,7 +10176,7 @@ ] }, { - "uuid": "4bc08ade-eb4c-49c9-bdf7-4e964c10b62f", + "uuid": "90ec0d03-b19d-47ef-bfa0-65a88d2cc2c8", "control-id": "cis_rhel10_3-2.4", "description": "No notes for control-id 3.2.4.", "props": [ @@ -10205,7 +10193,7 @@ ] }, { - "uuid": "37387845-1a6f-45f7-8fe5-a7e797e9f3ee", + "uuid": "2a880cd2-a538-4a0a-925a-18b63cae1214", "control-id": "cis_rhel10_3-2.5", "description": "No notes for control-id 3.2.5.", "props": [ @@ -10222,7 +10210,7 @@ ] }, { - "uuid": "49921f2d-a19d-44e0-b18c-6bb1ee56cb70", + "uuid": "48ac643c-36d2-4027-8ab9-822767e60681", "control-id": "cis_rhel10_3-2.6", "description": "No notes for control-id 3.2.6.", "props": [ @@ -10239,7 +10227,7 @@ ] }, { - "uuid": "ad0e43c7-068a-4c17-9457-2778bacbcd79", + "uuid": "63aeb5e7-26ce-41b4-83c4-e44010939cef", "control-id": "cis_rhel10_3-3.1.1", "description": "No notes for control-id 3.3.1.1.", "props": [ @@ -10256,7 +10244,7 @@ ] }, { - "uuid": "24c94785-b92d-4772-a994-8fcb1ad15586", + "uuid": "1f805978-b381-4efa-b2a1-212c6e61add4", "control-id": "cis_rhel10_3-3.1.2", "description": "No notes for control-id 3.3.1.2.", "props": [ @@ -10273,7 +10261,7 @@ ] }, { - "uuid": "23fe63f2-485e-42ad-8808-53218cd5bf9e", + "uuid": "d4a0e98f-dfaa-4571-ac9e-d2b75aa3780c", "control-id": "cis_rhel10_3-3.1.3", "description": "No notes for control-id 3.3.1.3.", "props": [ @@ -10290,7 +10278,7 @@ ] }, { - "uuid": "5a9a44c5-9694-4989-b274-fc796bb3263e", + "uuid": "f11963b7-b8a1-4194-9eed-eb6f2490aca2", "control-id": "cis_rhel10_3-3.1.4", "description": "No notes for control-id 3.3.1.4.", "props": [ @@ -10307,7 +10295,7 @@ ] }, { - "uuid": "474587a8-41d8-436e-9353-fc8dfcebf4e1", + "uuid": "6936f28e-9076-40ec-bc6f-e9aa3c7cc976", "control-id": "cis_rhel10_3-3.1.5", "description": "No notes for control-id 3.3.1.5.", "props": [ @@ -10324,7 +10312,7 @@ ] }, { - "uuid": "aa33007c-f0b9-4824-950e-32427c2bca0f", + "uuid": "d537ef4c-439c-4338-9b9b-e039f277fcfc", "control-id": "cis_rhel10_3-3.1.6", "description": "No notes for control-id 3.3.1.6.", "props": [ @@ -10341,7 +10329,7 @@ ] }, { - "uuid": "4a5a809d-fde3-4a53-b62d-b2a07febec7b", + "uuid": "b965608d-d36a-4c3f-8205-1e1e99d5565f", "control-id": "cis_rhel10_3-3.1.7", "description": "No notes for control-id 3.3.1.7.", "props": [ @@ -10358,7 +10346,7 @@ ] }, { - "uuid": "354a9cae-7fdb-40ed-9ce4-e9242f04acf4", + "uuid": "0205eebe-5e7b-42ff-8966-ee407ff10c2f", "control-id": "cis_rhel10_3-3.1.8", "description": "No notes for control-id 3.3.1.8.", "props": [ @@ -10375,7 +10363,7 @@ ] }, { - "uuid": "1156adee-c1ac-4df2-a891-4b4b89e3e6a9", + "uuid": "b257d56a-7ccf-451f-8c77-037f7d4044b7", "control-id": "cis_rhel10_3-3.1.9", "description": "No notes for control-id 3.3.1.9.", "props": [ @@ -10392,7 +10380,7 @@ ] }, { - "uuid": "8baa088d-79be-443f-9099-5847f7d49877", + "uuid": "dcdcb003-5f0c-4305-92a6-462830969117", "control-id": "cis_rhel10_3-3.1.10", "description": "No notes for control-id 3.3.1.10.", "props": [ @@ -10409,7 +10397,7 @@ ] }, { - "uuid": "798bbecd-dfce-41e4-a8a6-e8205deae670", + "uuid": "aca469cb-0903-405b-be81-7d929ba02a31", "control-id": "cis_rhel10_3-3.1.11", "description": "No notes for control-id 3.3.1.11.", "props": [ @@ -10426,7 +10414,7 @@ ] }, { - "uuid": "bc1ce359-35e2-40ba-bd54-86bb42703684", + "uuid": "91ec7d19-20da-4fbf-9779-2f09c1f8d8ab", "control-id": "cis_rhel10_3-3.1.12", "description": "No notes for control-id 3.3.1.12.", "props": [ @@ -10443,7 +10431,7 @@ ] }, { - "uuid": "c91dc57c-4d5b-4d49-8d9b-5483f384bb2e", + "uuid": "0287e0a7-32d1-4489-b34e-58fcd35a1ac9", "control-id": "cis_rhel10_3-3.1.13", "description": "No notes for control-id 3.3.1.13.", "props": [ @@ -10460,7 +10448,7 @@ ] }, { - "uuid": "431c31d4-5df8-41ac-a486-61e1ff7782f4", + "uuid": "8ebe2fe5-38b9-4aab-8a58-3d755621d149", "control-id": "cis_rhel10_3-3.1.14", "description": "No notes for control-id 3.3.1.14.", "props": [ @@ -10477,7 +10465,7 @@ ] }, { - "uuid": "3d9881f3-162b-4f84-b1ff-1d1aebe7223e", + "uuid": "1778800c-6de7-4756-ac9e-440db79336ac", "control-id": "cis_rhel10_3-3.1.15", "description": "No notes for control-id 3.3.1.15.", "props": [ @@ -10494,7 +10482,7 @@ ] }, { - "uuid": "54999dac-1c54-4c50-a92f-80f399075147", + "uuid": "6f84ca6d-1461-49f5-bcb7-dce05897d91d", "control-id": "cis_rhel10_3-3.1.16", "description": "No notes for control-id 3.3.1.16.", "props": [ @@ -10511,7 +10499,7 @@ ] }, { - "uuid": "2ae2b57e-0a76-46ba-8848-54c3a472c8f8", + "uuid": "bb73ef25-bbd3-4c1c-bc41-60fd1f7af4af", "control-id": "cis_rhel10_3-3.1.17", "description": "No notes for control-id 3.3.1.17.", "props": [ @@ -10528,7 +10516,7 @@ ] }, { - "uuid": "64d570a0-ab29-4cee-b211-777099f5f71f", + "uuid": "f4cc4978-bd98-4e5e-a244-67c043e208df", "control-id": "cis_rhel10_3-3.1.18", "description": "No notes for control-id 3.3.1.18.", "props": [ @@ -10545,7 +10533,7 @@ ] }, { - "uuid": "d9332884-1d32-42c2-887d-f04c17a2a112", + "uuid": "dbf64f98-925e-41dd-97e7-d871ac914ace", "control-id": "cis_rhel10_3-3.2.1", "description": "No notes for control-id 3.3.2.1.", "props": [ @@ -10562,7 +10550,7 @@ ] }, { - "uuid": "e0eac958-55be-49d4-8c0d-53c306a188c8", + "uuid": "b75bcd81-d296-46c9-bef1-3843f5913287", "control-id": "cis_rhel10_3-3.2.2", "description": "No notes for control-id 3.3.2.2.", "props": [ @@ -10579,7 +10567,7 @@ ] }, { - "uuid": "52ef9242-bb2d-4131-aa1f-45c651811cd1", + "uuid": "3865ecb8-b019-46cc-addb-0af8c6b81181", "control-id": "cis_rhel10_3-3.2.3", "description": "No notes for control-id 3.3.2.3.", "props": [ @@ -10596,7 +10584,7 @@ ] }, { - "uuid": "5bb33e2e-690d-47c9-b4cc-b1031082b5a4", + "uuid": "c9d66749-fb37-4000-b1de-dfc2771f318c", "control-id": "cis_rhel10_3-3.2.4", "description": "No notes for control-id 3.3.2.4.", "props": [ @@ -10613,7 +10601,7 @@ ] }, { - "uuid": "85c0ba5b-b0b3-48f2-868a-da62681f86f7", + "uuid": "a838557f-13f5-4076-bb00-e02513ec9935", "control-id": "cis_rhel10_3-3.2.5", "description": "No notes for control-id 3.3.2.5.", "props": [ @@ -10630,7 +10618,7 @@ ] }, { - "uuid": "6bd72684-cc49-476b-a815-4240cca64da8", + "uuid": "6524d52b-ba80-4ab5-958c-72ae722ccce0", "control-id": "cis_rhel10_3-3.2.6", "description": "No notes for control-id 3.3.2.6.", "props": [ @@ -10647,7 +10635,7 @@ ] }, { - "uuid": "c6b9fde5-cab2-417d-a2f5-cfeb15591da3", + "uuid": "bb5c76f0-06d4-4df1-becf-9cd3cfc484a6", "control-id": "cis_rhel10_3-3.2.7", "description": "No notes for control-id 3.3.2.7.", "props": [ @@ -10664,7 +10652,7 @@ ] }, { - "uuid": "218d5b09-5fa1-4a8e-9e87-e86ff3f8872c", + "uuid": "c250675f-517b-4673-b511-a04948d53f27", "control-id": "cis_rhel10_3-3.2.8", "description": "No notes for control-id 3.3.2.8.", "props": [ @@ -10681,7 +10669,7 @@ ] }, { - "uuid": "9708de64-4399-428c-a310-c30350f92951", + "uuid": "7ddcd73d-288f-4f44-a9f1-9d67513adba2", "control-id": "cis_rhel10_4-1.1", "description": "No notes for control-id 4.1.1.", "props": [ @@ -10698,7 +10686,7 @@ ] }, { - "uuid": "ad2d0354-2288-467e-8304-3348b18f81df", + "uuid": "aa25cfd5-c394-4955-a1f6-fb22c0111b43", "control-id": "cis_rhel10_4-1.2", "description": "No notes for control-id 4.1.2.", "props": [ @@ -10715,7 +10703,7 @@ ] }, { - "uuid": "2d68c580-ce7d-423a-9d5b-dd2aec583b10", + "uuid": "3e00b1cf-7600-46d5-ba22-0abe97b63a2e", "control-id": "cis_rhel10_4-1.3", "description": "No notes for control-id 4.1.3.", "props": [ @@ -10732,7 +10720,7 @@ ] }, { - "uuid": "0483dc94-ddf6-4e25-a1ec-d79ba0eeb723", + "uuid": "58eb1e37-d516-4c4e-ac68-f742318be435", "control-id": "cis_rhel10_4-1.4", "description": "The description for control-id cis_rhel10_4-1.4.", "props": [ @@ -10745,7 +10733,7 @@ ] }, { - "uuid": "e9100fe9-5784-4c7a-8773-f75af2a2d04b", + "uuid": "b97b44aa-d3a3-44f8-ac32-6a74036dddf2", "control-id": "cis_rhel10_4-1.5", "description": "Firewalld in Red Hat Enterprise Linux 10 accepts loopback traffic by default.", "props": [ @@ -10762,7 +10750,7 @@ ] }, { - "uuid": "5e90bac3-dac0-43dc-a926-5076d64a2e61", + "uuid": "6f486d01-2e43-4eb6-a21a-5ec8191662b4", "control-id": "cis_rhel10_4-1.6", "description": "The description for control-id cis_rhel10_4-1.6.", "props": [ @@ -10775,7 +10763,7 @@ ] }, { - "uuid": "c61d8ff8-50b9-468b-b716-283fcde04b6d", + "uuid": "7bc4ecfb-0072-45b9-b43d-187557bc07c5", "control-id": "cis_rhel10_4-1.7", "description": "The description for control-id cis_rhel10_4-1.7.", "props": [ @@ -10788,7 +10776,7 @@ ] }, { - "uuid": "7cf84bbf-9c16-40bf-aec3-9092083d7449", + "uuid": "5031d055-d5f9-4540-94ce-19672e26d16d", "control-id": "cis_rhel10_5-1.1", "description": "No notes for control-id 5.1.1.", "props": [ @@ -10845,7 +10833,7 @@ ] }, { - "uuid": "65bf7f3a-29fd-4ce4-ab4d-1892f48d3095", + "uuid": "14b5ab85-a60d-4067-99d5-ccd0049feccc", "control-id": "cis_rhel10_5-1.2", "description": "No notes for control-id 5.1.2.", "props": [ @@ -10872,7 +10860,7 @@ ] }, { - "uuid": "7e6fc9ad-9ed0-4f68-a3f6-7a0248e4c0c2", + "uuid": "190d6a17-8ee8-4937-8546-ff54f8e9c9c1", "control-id": "cis_rhel10_5-1.3", "description": "No notes for control-id 5.1.3.", "props": [ @@ -10899,7 +10887,7 @@ ] }, { - "uuid": "fb5fe5b4-a6da-40b0-b74f-e18307e1d794", + "uuid": "5eb29b01-44fa-4a04-8748-b333dfe232d7", "control-id": "cis_rhel10_5-1.4", "description": "No notes for control-id 5.1.4.", "props": [ @@ -10916,7 +10904,7 @@ ] }, { - "uuid": "6564500f-6386-4fe5-8a64-0288a4853552", + "uuid": "f87cc9dd-7cc3-4ff3-846d-834bd3a95f59", "control-id": "cis_rhel10_5-1.5", "description": "No notes for control-id 5.1.5.", "props": [ @@ -10933,7 +10921,7 @@ ] }, { - "uuid": "3cbe36cb-7606-437a-a70d-44b880a9c2ed", + "uuid": "67e55de1-7259-4c2c-8772-6d191beb8629", "control-id": "cis_rhel10_5-1.6", "description": "No notes for control-id 5.1.6.", "props": [ @@ -10950,7 +10938,7 @@ ] }, { - "uuid": "8342306c-491d-4e78-8113-05082b12a791", + "uuid": "aa149cb5-4e1d-4b45-b508-ccc85e9a3637", "control-id": "cis_rhel10_5-1.7", "description": "The requirement gives an example of 45 seconds, but is flexible about the values. It is only\nnecessary to ensure there is a timeout configured in alignment to the site policy.", "props": [ @@ -10972,7 +10960,7 @@ ] }, { - "uuid": "925b6a0f-9a98-4691-a161-f59696f12cc1", + "uuid": "6a703b17-7d37-43ce-afd0-4f51e3b8eadb", "control-id": "cis_rhel10_5-1.8", "description": "No notes for control-id 5.1.8.", "props": [ @@ -10989,7 +10977,7 @@ ] }, { - "uuid": "603026a1-04b8-45b7-9893-9b3b1517ad51", + "uuid": "eb62e1a6-bd49-4994-b708-bebd222f4736", "control-id": "cis_rhel10_5-1.9", "description": "No notes for control-id 5.1.9.", "props": [ @@ -11006,7 +10994,7 @@ ] }, { - "uuid": "e151b06a-1b44-41b1-a6e3-94a73d8e2dfe", + "uuid": "5c5aaf62-616a-49a5-ab4f-0a91c38239fe", "control-id": "cis_rhel10_5-1.10", "description": "No notes for control-id 5.1.10.", "props": [ @@ -11023,7 +11011,7 @@ ] }, { - "uuid": "788f36d7-774f-4779-bc3c-858d41bc4556", + "uuid": "92239df3-e232-4b34-b932-c8d513f11bc3", "control-id": "cis_rhel10_5-1.11", "description": "No notes for control-id 5.1.11.", "props": [ @@ -11040,7 +11028,7 @@ ] }, { - "uuid": "feb0dc18-9d85-4a15-9480-092e64e8a0a1", + "uuid": "30fd9c41-dbb1-4a0e-a556-8717618016d9", "control-id": "cis_rhel10_5-1.12", "description": "The description for control-id cis_rhel10_5-1.12.", "props": [ @@ -11058,7 +11046,7 @@ ] }, { - "uuid": "ce088acb-dff2-400b-930d-5afa1a47a4e7", + "uuid": "430e6984-d3ca-481f-b9c3-c63f63c35568", "control-id": "cis_rhel10_5-1.13", "description": "No notes for control-id 5.1.13.", "props": [ @@ -11075,7 +11063,7 @@ ] }, { - "uuid": "17748a3f-96b3-4687-8be6-df1f7c9a6853", + "uuid": "e539f1a8-49ea-4746-b1c0-152e3e0ec398", "control-id": "cis_rhel10_5-1.14", "description": "The CIS benchmark is not opinionated about which loglevel is selected here. Here, this\nprofile uses VERBOSE by default, as it allows for the capture of login and logout activity\nas well as key fingerprints.", "props": [ @@ -11092,7 +11080,7 @@ ] }, { - "uuid": "f304e851-e8c8-42d9-a226-49ae254aef6a", + "uuid": "a858f92b-239f-4aad-a3b0-9a7b090a30dd", "control-id": "cis_rhel10_5-1.15", "description": "No notes for control-id 5.1.15.", "props": [ @@ -11109,7 +11097,7 @@ ] }, { - "uuid": "59461bf2-ca43-4acc-a774-2835073c43c5", + "uuid": "6da93360-87f8-46e6-ac4e-057649ed4ef5", "control-id": "cis_rhel10_5-1.16", "description": "No notes for control-id 5.1.16.", "props": [ @@ -11126,7 +11114,7 @@ ] }, { - "uuid": "977ff64a-faff-48e4-b049-718f2652fb48", + "uuid": "01d7dcc0-3dc8-43ac-816f-eb91c42a59d0", "control-id": "cis_rhel10_5-1.17", "description": "No notes for control-id 5.1.17.", "props": [ @@ -11143,7 +11131,7 @@ ] }, { - "uuid": "23b26bed-8d92-42f2-a53b-6e2abcf2163a", + "uuid": "45946716-fe61-4b0a-8f50-78d169bf2729", "control-id": "cis_rhel10_5-1.18", "description": "No notes for control-id 5.1.18.", "props": [ @@ -11160,7 +11148,7 @@ ] }, { - "uuid": "85a44dc3-4993-4c7c-82a5-05d280ffd6cb", + "uuid": "e2e22640-355b-4d2d-b60e-c115ef5d1b4e", "control-id": "cis_rhel10_5-1.19", "description": "No notes for control-id 5.1.19.", "props": [ @@ -11177,7 +11165,7 @@ ] }, { - "uuid": "c5486729-2334-47c5-955c-35e47b8c6b2c", + "uuid": "0c805b68-0b03-4540-98da-688663c736ea", "control-id": "cis_rhel10_5-1.20", "description": "No notes for control-id 5.1.20.", "props": [ @@ -11194,7 +11182,7 @@ ] }, { - "uuid": "852d398d-dd65-4f59-8ebe-e2e440901cf9", + "uuid": "eb8a49f3-d262-4c8a-93e5-18a5eed902b3", "control-id": "cis_rhel10_5-1.21", "description": "No notes for control-id 5.1.21.", "props": [ @@ -11211,7 +11199,7 @@ ] }, { - "uuid": "5b469bf6-c1b3-4fa7-9cd2-ba685eed9658", + "uuid": "67b15bb1-cf91-4a9b-95e6-7600a8e1af7c", "control-id": "cis_rhel10_5-1.22", "description": "No notes for control-id 5.1.22.", "props": [ @@ -11228,7 +11216,7 @@ ] }, { - "uuid": "c1fd67cc-23ed-4202-8c03-ec88e10ac4a1", + "uuid": "ccd40a03-3447-4126-9414-98bd86c7fb97", "control-id": "cis_rhel10_5-2.1", "description": "No notes for control-id 5.2.1.", "props": [ @@ -11245,7 +11233,7 @@ ] }, { - "uuid": "3cc02cce-c371-44b3-bb94-5fd1ab58acbe", + "uuid": "4bb5e704-202c-4854-813a-1607d28bfd3c", "control-id": "cis_rhel10_5-2.2", "description": "No notes for control-id 5.2.2.", "props": [ @@ -11262,7 +11250,7 @@ ] }, { - "uuid": "292bac98-f985-47ea-be2b-d4ee16c93682", + "uuid": "1419267c-0f11-44a0-90f8-50dcbda503af", "control-id": "cis_rhel10_5-2.3", "description": "No notes for control-id 5.2.3.", "props": [ @@ -11279,7 +11267,7 @@ ] }, { - "uuid": "873ea4fb-2d5f-4b45-ad7d-1248389f9abb", + "uuid": "76a5de61-0663-4895-b068-e59b51f1eb58", "control-id": "cis_rhel10_5-2.5", "description": "No notes for control-id 5.2.5.", "props": [ @@ -11296,7 +11284,7 @@ ] }, { - "uuid": "7e6f5f5a-a9c9-4243-98b5-dd8a1957b20e", + "uuid": "d05528ab-934d-4628-abc2-96a5ff00b0e0", "control-id": "cis_rhel10_5-2.6", "description": "No notes for control-id 5.2.6.", "props": [ @@ -11313,7 +11301,7 @@ ] }, { - "uuid": "f810b270-ff2b-4919-a6d7-dd6bd546f074", + "uuid": "b2a13e51-1116-4b80-91e8-aa662b23a07b", "control-id": "cis_rhel10_5-2.7", "description": "Members of \"wheel\" or GID 0 groups are checked by default if the group option is not set for\npam_wheel.so module. The recommendation states the group should be empty to reinforce the\nuse of \"sudo\" for privileged access. Therefore, members of these groups should be manually\nchecked or a different group should be informed.", "props": [ @@ -11335,7 +11323,7 @@ ] }, { - "uuid": "e2dcabea-6b15-40de-ad58-f13203729847", + "uuid": "c767a4fa-b758-4b11-a735-dd3709b220a6", "control-id": "cis_rhel10_5-3.1.1", "description": "This requirement is hard to be automated without any specific requirement. The policy even\nstates that provided commands are examples, other custom settings might be in place and the\nsettings might be different depending on site policies. The other rules will already make\nsure there is a correct autheselect profile regardless of the existing settings. It is\nnecessary to better discuss with CIS Community.", "props": [ @@ -11347,7 +11335,7 @@ ] }, { - "uuid": "619dd679-be02-4b27-9dfc-88cf4f488b60", + "uuid": "c69d5f4a-b470-4be3-b9dd-12602c764860", "control-id": "cis_rhel10_5-3.1.2", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.1.", "props": [ @@ -11369,7 +11357,7 @@ ] }, { - "uuid": "d1b83676-1747-4ac3-860c-6ab746df5dd1", + "uuid": "eafacfdb-fe34-467b-9a8f-1dddc843a0b5", "control-id": "cis_rhel10_5-3.1.3", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.2.", "props": [ @@ -11396,7 +11384,7 @@ ] }, { - "uuid": "01381fbd-0249-44b0-98a3-7d1ff73c0367", + "uuid": "6bff53a2-ac78-4179-8f24-b71645a9912c", "control-id": "cis_rhel10_5-3.1.4", "description": "The module is properly enabled by the rules mentioned in related_rules.\nRequirements in 5.3.2.3 use these rules.", "props": [ @@ -11408,7 +11396,7 @@ ] }, { - "uuid": "8ab1a8ce-aa52-4430-8f0e-9300a8ef3357", + "uuid": "35df5fc1-2f5c-49e2-a02b-c63d725b0b5c", "control-id": "cis_rhel10_5-3.1.5", "description": "No notes for control-id 5.3.1.5.", "props": [ @@ -11425,7 +11413,7 @@ ] }, { - "uuid": "6c3a78fd-76c1-4cb6-8bc3-726bcd160a3c", + "uuid": "676f3828-d38a-4193-a2bd-7d99b170c666", "control-id": "cis_rhel10_5-3.2.1.1", "description": "No notes for control-id 5.3.2.1.1.", "props": [ @@ -11442,7 +11430,7 @@ ] }, { - "uuid": "c0e67ca9-bd32-418d-b7bf-621d20f10ccb", + "uuid": "4db97b10-2144-4b8a-bd48-326cd58365a1", "control-id": "cis_rhel10_5-3.2.1.2", "description": "The policy also accepts value 0, which means the locked accounts should be manually unlocked\nby an administrator. However, it also mentions that using value 0 can facilitate a DoS\nattack to legitimate users.", "props": [ @@ -11459,7 +11447,7 @@ ] }, { - "uuid": "dd46c931-9060-4c14-abe0-0a42994d5d77", + "uuid": "3dba092f-b6f4-4b5b-a793-0e28b36038c5", "control-id": "cis_rhel10_5-3.2.2.1", "description": "No notes for control-id 5.3.2.2.1.", "props": [ @@ -11476,7 +11464,7 @@ ] }, { - "uuid": "1471b8f7-9e88-4981-8436-40d1a1bb3813", + "uuid": "9e4553ec-d7ec-4096-9e6a-3459b636f511", "control-id": "cis_rhel10_5-3.2.2.2", "description": "No notes for control-id 5.3.2.2.2.", "props": [ @@ -11493,7 +11481,7 @@ ] }, { - "uuid": "a75d7f9c-c9ca-4701-bdc4-e8600dae0aa5", + "uuid": "2cd16901-ca08-4ca7-abad-e2aebeb66f80", "control-id": "cis_rhel10_5-3.2.2.3", "description": "This requirement is expected to be manual. However, in previous versions of the policy\nit was already automated the configuration of \"minclass\" option. This posture was kept for\nRHEL 10 in this new version. Rules related to other options are informed in related_rules.\nIn short, minclass=4 alone can achieve the same result achieved by the combination of the\nother 4 options mentioned in the policy.", "props": [ @@ -11510,7 +11498,7 @@ ] }, { - "uuid": "f6bb0d94-e2af-4b28-abf3-42b6d55c4ad6", + "uuid": "eae5bf74-8622-4d9b-b5c5-2307bf508325", "control-id": "cis_rhel10_5-3.2.2.4", "description": "No notes for control-id 5.3.2.2.4.", "props": [ @@ -11527,7 +11515,7 @@ ] }, { - "uuid": "2ef22b89-33b6-4483-909b-653533895bb3", + "uuid": "8360c8b5-e540-4a5d-9027-85f5aa8f7910", "control-id": "cis_rhel10_5-3.2.2.5", "description": "No notes for control-id 5.3.2.2.5.", "props": [ @@ -11544,7 +11532,7 @@ ] }, { - "uuid": "cc5052ab-88a7-406c-8896-893d387de866", + "uuid": "de75838e-5086-4e2f-a33b-828f215839ac", "control-id": "cis_rhel10_5-3.2.2.6", "description": "No notes for control-id 5.3.2.2.6.", "props": [ @@ -11561,7 +11549,7 @@ ] }, { - "uuid": "57c0c82f-d32d-4ea0-8861-1e4aad4e78d0", + "uuid": "bf985752-98b2-40ea-9c98-3e12645c76e6", "control-id": "cis_rhel10_5-3.2.2.7", "description": "No notes for control-id 5.3.2.2.7.", "props": [ @@ -11578,7 +11566,7 @@ ] }, { - "uuid": "0e8c9f7b-681b-4a4a-868d-ed323303aef5", + "uuid": "671954f6-ae40-402c-987b-6e8101289724", "control-id": "cis_rhel10_5-3.2.3.1", "description": "Although mentioned in the section 5.3.3.3, there is no explicit requirement to configure\nretry option of pam_pwhistory. If come in the future, the rule accounts_password_pam_retry\ncan be used.", "props": [ @@ -11600,7 +11588,7 @@ ] }, { - "uuid": "94bb243d-c378-48bb-8ead-23cf88e829ee", + "uuid": "a0bd79c9-ba98-4ea4-8158-64bb427685b7", "control-id": "cis_rhel10_5-3.2.3.2", "description": "No notes for control-id 5.3.2.3.2.", "props": [ @@ -11617,7 +11605,7 @@ ] }, { - "uuid": "8c0f23b8-ce0f-4ae5-9003-fd61e09954c1", + "uuid": "8885dbe2-a50a-49fb-9fc8-2fc776e15927", "control-id": "cis_rhel10_5-3.2.3.3", "description": "In RHEL 10 pam_pwhistory is enabled via authselect feature, as required in 5.3.1.4. The\nfeature automatically set \"use_authok\" option. In any case, we don't have a rule to check\nthis option specifically.", "props": [ @@ -11634,7 +11622,7 @@ ] }, { - "uuid": "c8af4054-dce7-42de-a6c7-44c8bcf255f8", + "uuid": "4e4a4426-64ed-495f-aab7-961050db5944", "control-id": "cis_rhel10_5-3.2.4.1", "description": "The rule more specifically used in this requirement also satify the requirement 5.3.1.5.", "props": [ @@ -11651,7 +11639,7 @@ ] }, { - "uuid": "2eccf376-d841-4fd2-a594-07743ef81b90", + "uuid": "d5e5ecc6-cb73-4bdb-93e8-f5b396d86fd9", "control-id": "cis_rhel10_5-3.2.4.2", "description": "Usage of pam_unix.so module together with \"remember\" option is deprecated and is not\nrecommended by this policy. Instead, it should be used remember option of pam_pwhistory\nmodule, as required in 5.3.2.3.1. See here for more details about pam_unix.so:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1778929", "props": [ @@ -11668,7 +11656,7 @@ ] }, { - "uuid": "1f33435b-2f36-4abd-8ee7-a602b20b40a9", + "uuid": "21791b6d-971d-4eba-ad83-1cf45efc3182", "control-id": "cis_rhel10_5-3.2.4.3", "description": "Changes in logindefs mentioned in this requirement are more specifically covered by 5.4.1.4", "props": [ @@ -11690,7 +11678,7 @@ ] }, { - "uuid": "35da92b2-dfe4-4277-87e3-c0285b6b6a7f", + "uuid": "9f09d857-cec0-4477-a53f-d2d356f1e1fc", "control-id": "cis_rhel10_5-3.2.4.4", "description": "In RHEL 10 pam_unix is enabled by default in all authselect profiles already with the\nuse_authtok option set. In any case, we don't have a rule to check this option specifically,\nlike in 5.3.2.3.3.", "props": [ @@ -11707,7 +11695,7 @@ ] }, { - "uuid": "abfc29ad-6310-49f7-8ce6-87cd08d7dbc2", + "uuid": "dca859b0-6107-4a77-9d60-9fa4ed9ba89a", "control-id": "cis_rhel10_5-4.1.1", "description": "No notes for control-id 5.4.1.1.", "props": [ @@ -11729,7 +11717,7 @@ ] }, { - "uuid": "87e6a011-391b-4b58-9d15-52393e71e394", + "uuid": "6b89ff97-364a-4d2e-8f07-10f602abe40c", "control-id": "cis_rhel10_5-4.1.3", "description": "No notes for control-id 5.4.1.3.", "props": [ @@ -11751,20 +11739,15 @@ ] }, { - "uuid": "35914859-6f49-4e17-ab71-0752fe74269c", + "uuid": "7e7d0a1f-efdf-40a3-ad0e-b6d0aec19485", "control-id": "cis_rhel10_5-4.1.4", - "description": "There's a \"new\" set of options in /etc/login.defs file to define the number of iterations\nperformed during the hashing process.", + "description": "No notes for control-id 5.4.1.4.", "props": [ { "name": "implementation-status", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "implemented" }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_libuserconf" - }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", @@ -11773,7 +11756,7 @@ ] }, { - "uuid": "1a1ffa26-8a08-45c4-8077-047f6cbc4500", + "uuid": "af876550-3d7b-46e3-ac47-a5249a785e84", "control-id": "cis_rhel10_5-4.1.5", "description": "No notes for control-id 5.4.1.5.", "props": [ @@ -11795,7 +11778,7 @@ ] }, { - "uuid": "48912527-6f79-47e5-b22b-b176c3894716", + "uuid": "f57b6088-b296-490e-9770-d13a6572a385", "control-id": "cis_rhel10_5-4.1.6", "description": "No notes for control-id 5.4.1.6.", "props": [ @@ -11812,7 +11795,7 @@ ] }, { - "uuid": "7d22bb53-9b05-4a7a-b22b-542f93dc2324", + "uuid": "b6874491-6e01-481a-9079-d13b3cdddcd2", "control-id": "cis_rhel10_5-4.2.1", "description": "No notes for control-id 5.4.2.1.", "props": [ @@ -11829,7 +11812,7 @@ ] }, { - "uuid": "66703e71-8d78-4b8a-9305-d5152fd00c45", + "uuid": "7977657b-e83b-4c12-a14d-3c60c71c7a7f", "control-id": "cis_rhel10_5-4.2.2", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -11846,7 +11829,7 @@ ] }, { - "uuid": "2c95bb46-fd46-4ea4-a851-29d5e9bd9470", + "uuid": "d791519e-70b7-48c2-b727-237a05d95ae0", "control-id": "cis_rhel10_5-4.2.3", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -11863,7 +11846,7 @@ ] }, { - "uuid": "93688d5b-bfa5-493f-abcb-a4dbad28bf5e", + "uuid": "e9933966-b1a8-4a95-8689-8fe567a26d9a", "control-id": "cis_rhel10_5-4.2.4", "description": "No notes for control-id 5.4.2.4.", "props": [ @@ -11880,7 +11863,7 @@ ] }, { - "uuid": "5ab8de8a-79f4-4674-8b22-7edfd8585a94", + "uuid": "d86a73d6-08f5-4d8b-b88b-2b1f4d9218f4", "control-id": "cis_rhel10_5-4.2.5", "description": "No notes for control-id 5.4.2.5.", "props": [ @@ -11902,7 +11885,7 @@ ] }, { - "uuid": "ed6ff38b-4f08-44ef-8c96-a2be1f249209", + "uuid": "e271fe94-656b-4f7a-af1d-348395e377bd", "control-id": "cis_rhel10_5-4.2.6", "description": "No notes for control-id 5.4.2.6.", "props": [ @@ -11919,7 +11902,7 @@ ] }, { - "uuid": "8e9288b4-d4b9-40db-ae97-ba562150ae79", + "uuid": "2beec9fc-d316-427f-a08d-7a9c01543375", "control-id": "cis_rhel10_5-4.2.7", "description": "No notes for control-id 5.4.2.7.", "props": [ @@ -11941,7 +11924,7 @@ ] }, { - "uuid": "1ee94f31-b758-46f5-85f6-5d98bcc3d3f1", + "uuid": "12c18665-bc2f-43fe-adf0-7343aba76b23", "control-id": "cis_rhel10_5-4.2.8", "description": "No notes for control-id 5.4.2.8.", "props": [ @@ -11958,7 +11941,7 @@ ] }, { - "uuid": "936c7870-5ab2-437a-8cef-e8af16f15ecb", + "uuid": "a94532bb-01c7-4565-af24-007e77349d29", "control-id": "cis_rhel10_5-4.3.2", "description": "No notes for control-id 5.4.3.2.", "props": [ @@ -11975,7 +11958,7 @@ ] }, { - "uuid": "8259e6c9-cf9d-4835-8edc-2a673e66ad8b", + "uuid": "0eb2fcdc-d5c2-4aea-a30a-076487fe76ac", "control-id": "cis_rhel10_5-4.3.3", "description": "No notes for control-id 5.4.3.3.", "props": [ @@ -12002,7 +11985,7 @@ ] }, { - "uuid": "7bd2852c-3771-44d5-949f-7332deb20aae", + "uuid": "cb76a34f-0a51-4b3f-9ae7-a60d0da103d0", "control-id": "cis_rhel10_6-1.1", "description": "No notes for control-id 6.1.1.", "props": [ @@ -12024,7 +12007,7 @@ ] }, { - "uuid": "f5ba74c4-2cef-4c16-b104-df9e86147cb4", + "uuid": "f8e9e40c-b796-4c59-b625-5d128fc53583", "control-id": "cis_rhel10_6-1.2", "description": "No notes for control-id 6.1.2.", "props": [ @@ -12041,7 +12024,7 @@ ] }, { - "uuid": "8456f357-61ab-4dd9-91c2-65723b96c782", + "uuid": "ec3ce448-2740-43ad-9d79-ff79b11f6c74", "control-id": "cis_rhel10_6-1.3", "description": "No notes for control-id 6.1.3.", "props": [ @@ -12058,7 +12041,7 @@ ] }, { - "uuid": "c4181c5e-49d9-49c6-a418-26cbe7c4daa1", + "uuid": "72d70d50-0772-4c20-bd26-563863a312ac", "control-id": "cis_rhel10_6-2.1.1", "description": "No notes for control-id 6.2.1.1.", "props": [ @@ -12075,7 +12058,7 @@ ] }, { - "uuid": "8071bc00-303f-441b-b7e0-f06e855a6e31", + "uuid": "a1ab9395-58a4-4c36-b34a-38e81b8c53ab", "control-id": "cis_rhel10_6-2.1.2", "description": "The description for control-id cis_rhel10_6-2.1.2.", "props": [ @@ -12088,7 +12071,7 @@ ] }, { - "uuid": "b1f6e5ce-9e57-4404-affb-711065ad6b89", + "uuid": "65b98fd7-91f1-429c-b90b-5038a5662c22", "control-id": "cis_rhel10_6-2.1.3", "description": "The description for control-id cis_rhel10_6-2.1.3.", "props": [ @@ -12101,7 +12084,7 @@ ] }, { - "uuid": "890391c0-d8eb-47d3-bdec-cc6ee6f35906", + "uuid": "6d9649fe-1b4f-4613-89e6-44cb3d4390d9", "control-id": "cis_rhel10_6-2.1.4", "description": "No notes for control-id 6.2.1.4.", "props": [ @@ -12118,7 +12101,7 @@ ] }, { - "uuid": "5032f6a5-5f2a-4ae6-bfcc-33ec5684ff4c", + "uuid": "2ff5cf28-0f24-43b4-9777-842fc5a88f5b", "control-id": "cis_rhel10_6-2.2.1.1", "description": "No notes for control-id 6.2.2.1.1.", "props": [ @@ -12135,7 +12118,7 @@ ] }, { - "uuid": "c9acade4-a7fb-470a-962c-89c348b9c5de", + "uuid": "45cd954f-16b4-4035-bea4-13b102a6e2f0", "control-id": "cis_rhel10_6-2.2.1.2", "description": "The description for control-id cis_rhel10_6-2.2.1.2.", "props": [ @@ -12148,7 +12131,7 @@ ] }, { - "uuid": "91c8f8eb-1404-4b56-8121-40681188773c", + "uuid": "c3f6f9d3-98a9-474a-bfd1-2d2f5215d819", "control-id": "cis_rhel10_6-2.2.1.3", "description": "No notes for control-id 6.2.2.1.3.", "props": [ @@ -12165,7 +12148,7 @@ ] }, { - "uuid": "d0dbebcd-381d-4a4a-87f7-a91c7803257f", + "uuid": "39bc88fb-fc3e-486a-badd-118e2d31388a", "control-id": "cis_rhel10_6-2.2.1.4", "description": "No notes for control-id 6.2.2.1.4.", "props": [ @@ -12182,7 +12165,7 @@ ] }, { - "uuid": "f7d313e6-44fc-49c6-9393-925a8d283de4", + "uuid": "aee3abd3-ab82-4fec-8d24-10bd8c1ee2b1", "control-id": "cis_rhel10_6-2.2.2", "description": "No notes for control-id 6.2.2.2.", "props": [ @@ -12199,7 +12182,7 @@ ] }, { - "uuid": "2d108b8e-b628-47e4-aa84-e3baeb93f91f", + "uuid": "9acd6719-d3c1-4d76-925f-004ddebb18e8", "control-id": "cis_rhel10_6-2.2.3", "description": "No notes for control-id 6.2.2.3.", "props": [ @@ -12216,7 +12199,7 @@ ] }, { - "uuid": "cf63cce9-7329-4315-a2a7-004f373f2920", + "uuid": "df23dc57-901d-44bd-a60e-2c0bd2447705", "control-id": "cis_rhel10_6-2.2.4", "description": "No notes for control-id 6.2.2.4.", "props": [ @@ -12233,7 +12216,7 @@ ] }, { - "uuid": "bdd8eec6-b814-4fc3-998f-ef815a28f60b", + "uuid": "fee80e3a-bd2e-488a-bfb6-aa078e5c3037", "control-id": "cis_rhel10_6-2.3.1", "description": "No notes for control-id 6.2.3.1.", "props": [ @@ -12245,7 +12228,7 @@ ] }, { - "uuid": "ba98c764-a04d-4875-8fdd-02f027172a95", + "uuid": "16a409f6-2f4a-4f23-87fc-8e8eafd2f113", "control-id": "cis_rhel10_6-2.3.2", "description": "No notes for control-id 6.2.3.2.", "props": [ @@ -12257,7 +12240,7 @@ ] }, { - "uuid": "d66aab5b-158f-4c5c-a7da-efea65dad0e9", + "uuid": "c218bbcf-2cc0-4ef4-a907-c5fb5d913eed", "control-id": "cis_rhel10_6-2.3.3", "description": "No notes for control-id 6.2.3.3.", "props": [ @@ -12269,7 +12252,7 @@ ] }, { - "uuid": "dcb84d81-91ea-486a-b5fb-cb01c70707bb", + "uuid": "ba6cd376-8b09-4a8e-98f8-611044aae5ed", "control-id": "cis_rhel10_6-2.3.4", "description": "No notes for control-id 6.2.3.4.", "props": [ @@ -12281,7 +12264,7 @@ ] }, { - "uuid": "c7e65399-2251-4a74-a0c6-7df6c6ee6a4d", + "uuid": "e02cf6ee-0c22-4ad5-95ee-afdead91be84", "control-id": "cis_rhel10_6-2.3.5", "description": "The description for control-id cis_rhel10_6-2.3.5.", "props": [ @@ -12294,7 +12277,7 @@ ] }, { - "uuid": "cc92eedc-5026-442b-917f-94129ef078dc", + "uuid": "7592686c-cd94-4230-b6a2-7296157bb9d5", "control-id": "cis_rhel10_6-2.3.6", "description": "The description for control-id cis_rhel10_6-2.3.6.", "props": [ @@ -12307,7 +12290,7 @@ ] }, { - "uuid": "656804b5-8db4-4f79-bea3-a6f36eaf1774", + "uuid": "7e583ea1-1f7f-468e-9a32-1242636f995a", "control-id": "cis_rhel10_6-2.3.7", "description": "No notes for control-id 6.2.3.7.", "props": [ @@ -12319,7 +12302,7 @@ ] }, { - "uuid": "2b9f64a7-c854-453e-85c6-19dcc9d73974", + "uuid": "1f8c7274-d084-49bd-8c3e-e650b90b4077", "control-id": "cis_rhel10_6-2.3.8", "description": "The description for control-id cis_rhel10_6-2.3.8.", "props": [ @@ -12332,7 +12315,7 @@ ] }, { - "uuid": "d3dc1e57-1358-4957-a4a9-d9c2f57bccb2", + "uuid": "3a945b40-acd0-4a80-ad9f-b859b97e3d37", "control-id": "cis_rhel10_6-2.4.1", "description": "It is not harmful to run these rules even if rsyslog is not installed or active.", "props": [ @@ -12359,7 +12342,7 @@ ] }, { - "uuid": "83b97fe3-17a1-4a53-b51a-f6041047d543", + "uuid": "1658cfbb-99a1-4a83-aaa6-1ee814338db2", "control-id": "cis_rhel10_7-1.1", "description": "No notes for control-id 7.1.1.", "props": [ @@ -12386,7 +12369,7 @@ ] }, { - "uuid": "145c5533-3d3e-4cfe-b0f3-845b57f733bc", + "uuid": "c507a9a0-958b-4af9-8bc1-e292dd8ee87a", "control-id": "cis_rhel10_7-1.2", "description": "No notes for control-id 7.1.2.", "props": [ @@ -12413,7 +12396,7 @@ ] }, { - "uuid": "33f198c5-57b1-4e0e-a00b-324cd35679a3", + "uuid": "2a78daac-d145-4b29-9ea6-c89c79a27d33", "control-id": "cis_rhel10_7-1.3", "description": "No notes for control-id 7.1.3.", "props": [ @@ -12440,7 +12423,7 @@ ] }, { - "uuid": "dbd3073e-3771-4ff7-afc2-4e395d194033", + "uuid": "f1d27208-2a13-48f2-a8ff-4376c812354f", "control-id": "cis_rhel10_7-1.4", "description": "No notes for control-id 7.1.4.", "props": [ @@ -12467,7 +12450,7 @@ ] }, { - "uuid": "0a4badb0-d144-4228-a4b6-7a6f1d5da62e", + "uuid": "76d31ebd-682e-4c17-a952-62c9dc44ff6f", "control-id": "cis_rhel10_7-1.5", "description": "No notes for control-id 7.1.5.", "props": [ @@ -12494,7 +12477,7 @@ ] }, { - "uuid": "70bedd18-d373-44bf-a484-9afa8bb2d3d2", + "uuid": "0004df98-e6f3-4203-8961-2539d1a09081", "control-id": "cis_rhel10_7-1.6", "description": "No notes for control-id 7.1.6.", "props": [ @@ -12521,7 +12504,7 @@ ] }, { - "uuid": "17647e63-5283-4c18-ac20-6d35d6f4100e", + "uuid": "a3bdfdc1-e88f-4958-804b-6c3a72868967", "control-id": "cis_rhel10_7-1.7", "description": "No notes for control-id 7.1.7.", "props": [ @@ -12548,7 +12531,7 @@ ] }, { - "uuid": "c562d43d-0f8e-4379-92fe-b645a0dd9eb9", + "uuid": "6de4ccda-84c2-4b0b-b732-36a5d1a7d356", "control-id": "cis_rhel10_7-1.8", "description": "No notes for control-id 7.1.8.", "props": [ @@ -12575,7 +12558,7 @@ ] }, { - "uuid": "d6b27889-313f-493c-8643-52eb8693a6bd", + "uuid": "db3615fa-fa10-4cd7-8628-d58cb05ad516", "control-id": "cis_rhel10_7-1.9", "description": "No notes for control-id 7.1.9.", "props": [ @@ -12602,7 +12585,7 @@ ] }, { - "uuid": "a7e45d70-6808-4170-983c-2d9b47ea4af2", + "uuid": "f373ae74-28be-4cb9-a76b-0a1b3654b556", "control-id": "cis_rhel10_7-1.10", "description": "No notes for control-id 7.1.10.", "props": [ @@ -12644,7 +12627,7 @@ ] }, { - "uuid": "a465e575-8274-431e-9b88-454d4c912531", + "uuid": "10d3a8c1-be7e-48ab-b614-75aad48a66f9", "control-id": "cis_rhel10_7-1.11", "description": "No notes for control-id 7.1.11.", "props": [ @@ -12666,7 +12649,7 @@ ] }, { - "uuid": "35f42a27-9fe4-449d-a1a3-c5c45850772e", + "uuid": "a4c33964-623a-4199-849a-a26145cc7609", "control-id": "cis_rhel10_7-1.12", "description": "No notes for control-id 7.1.12.", "props": [ @@ -12688,7 +12671,7 @@ ] }, { - "uuid": "5e7775a5-429d-4938-afad-cf4c9a6f674e", + "uuid": "31427301-30fb-4aa4-8802-2306b5575207", "control-id": "cis_rhel10_7-1.13", "description": "The description for control-id cis_rhel10_7-1.13.", "props": [ @@ -12701,7 +12684,7 @@ ] }, { - "uuid": "b3c532ff-770a-495a-8a4a-05b6f51b2ad2", + "uuid": "8d17ee6a-6058-4889-8622-d8614a65a4bb", "control-id": "cis_rhel10_7-2.1", "description": "No notes for control-id 7.2.1.", "props": [ @@ -12718,7 +12701,7 @@ ] }, { - "uuid": "fd137430-0b28-4264-91ed-88b8e3442852", + "uuid": "875b3e34-7622-41a6-922d-77a988b0d1d3", "control-id": "cis_rhel10_7-2.2", "description": "No notes for control-id 7.2.2.", "props": [ @@ -12735,7 +12718,7 @@ ] }, { - "uuid": "e9852d0d-e5e0-457a-95c0-7a1dc1f26ee5", + "uuid": "3346b785-9af4-4e58-af21-2ffc7a916b53", "control-id": "cis_rhel10_7-2.3", "description": "No notes for control-id 7.2.3.", "props": [ @@ -12752,7 +12735,7 @@ ] }, { - "uuid": "949df42b-021f-473b-9114-0c762bec284c", + "uuid": "b61a22ce-010a-4f1b-b269-662cd6acdce2", "control-id": "cis_rhel10_7-2.4", "description": "No notes for control-id 7.2.4.", "props": [ @@ -12769,7 +12752,7 @@ ] }, { - "uuid": "3847b68b-4498-4cd0-a05b-2baa7f46ca5c", + "uuid": "65c2a3d0-b51c-4cb7-bbb0-bd0e354b5162", "control-id": "cis_rhel10_7-2.5", "description": "No notes for control-id 7.2.5.", "props": [ @@ -12786,7 +12769,7 @@ ] }, { - "uuid": "ef403387-d7ec-4335-b615-bbedff5a697b", + "uuid": "a8a8882b-9bbb-4ac1-9699-a286541bab55", "control-id": "cis_rhel10_7-2.6", "description": "No notes for control-id 7.2.6.", "props": [ @@ -12803,7 +12786,7 @@ ] }, { - "uuid": "4f37189c-fb3d-4089-ba5c-8298ed40d8ff", + "uuid": "bb1465df-4c79-4df6-9140-06e053a94553", "control-id": "cis_rhel10_7-2.7", "description": "No notes for control-id 7.2.7.", "props": [ @@ -12820,7 +12803,7 @@ ] }, { - "uuid": "d35441e3-9bec-46ec-a94b-67b68cf08bc1", + "uuid": "5754df03-739e-4450-a2c2-5a72140c1fa5", "control-id": "cis_rhel10_7-2.8", "description": "No notes for control-id 7.2.8.", "props": [ @@ -12847,7 +12830,7 @@ ] }, { - "uuid": "1fd626e7-4b6f-42bc-803e-fe5c74d84a7b", + "uuid": "87c475de-d55d-4cdf-9ed9-d282d99ef950", "control-id": "cis_rhel10_7-2.9", "description": "No notes for control-id 7.2.9.", "props": [ @@ -13793,7 +13776,7 @@ { "name": "Parameter_Value_Alternatives_47", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -13811,7 +13794,7 @@ { "name": "Parameter_Value_Alternatives_48", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -19562,4906 +19545,4882 @@ "value": "Set Existing Passwords Warning Age", "remarks": "rule_set_226" }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_libuserconf", - "remarks": "rule_set_227" - }, - { - "name": "Rule_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Hashing Algorithm in /etc/libuser.conf", - "remarks": "rule_set_227" - }, - { - "name": "Check_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_libuserconf", - "remarks": "rule_set_227" - }, - { - "name": "Check_Description", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Hashing Algorithm in /etc/libuser.conf", - "remarks": "rule_set_227" - }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_logindefs", - "remarks": "rule_set_228" + "remarks": "rule_set_227" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/login.defs", - "remarks": "rule_set_228" + "remarks": "rule_set_227" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_logindefs", - "remarks": "rule_set_228" + "remarks": "rule_set_227" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/login.defs", - "remarks": "rule_set_228" + "remarks": "rule_set_227" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_disable_post_pw_expiration", - "remarks": "rule_set_229" + "remarks": "rule_set_228" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Account Expiration Following Inactivity", - "remarks": "rule_set_229" + "remarks": "rule_set_228" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_disable_post_pw_expiration", - "remarks": "rule_set_229" + "remarks": "rule_set_228" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Account Expiration Following Inactivity", - "remarks": "rule_set_229" + "remarks": "rule_set_228" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_set_post_pw_existing", - "remarks": "rule_set_230" + "remarks": "rule_set_229" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set existing passwords a period of inactivity before they been locked", - "remarks": "rule_set_230" + "remarks": "rule_set_229" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_set_post_pw_existing", - "remarks": "rule_set_230" + "remarks": "rule_set_229" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set existing passwords a period of inactivity before they been locked", - "remarks": "rule_set_230" + "remarks": "rule_set_229" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_last_change_is_in_past", - "remarks": "rule_set_231" + "remarks": "rule_set_230" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure all users last password change date is in the past", - "remarks": "rule_set_231" + "remarks": "rule_set_230" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_last_change_is_in_past", - "remarks": "rule_set_231" + "remarks": "rule_set_230" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure all users last password change date is in the past", - "remarks": "rule_set_231" + "remarks": "rule_set_230" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_no_uid_except_zero", - "remarks": "rule_set_232" + "remarks": "rule_set_231" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Root Has UID 0", - "remarks": "rule_set_232" + "remarks": "rule_set_231" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_no_uid_except_zero", - "remarks": "rule_set_232" + "remarks": "rule_set_231" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Root Has UID 0", - "remarks": "rule_set_232" + "remarks": "rule_set_231" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_gid_zero", - "remarks": "rule_set_233" + "remarks": "rule_set_232" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Root Has A Primary GID 0", - "remarks": "rule_set_233" + "remarks": "rule_set_232" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_gid_zero", - "remarks": "rule_set_233" + "remarks": "rule_set_232" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Root Has A Primary GID 0", - "remarks": "rule_set_233" + "remarks": "rule_set_232" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "groups_no_zero_gid_except_root", - "remarks": "rule_set_234" + "remarks": "rule_set_233" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Group Root Has GID 0", - "remarks": "rule_set_234" + "remarks": "rule_set_233" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "groups_no_zero_gid_except_root", - "remarks": "rule_set_234" + "remarks": "rule_set_233" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Group Root Has GID 0", - "remarks": "rule_set_234" + "remarks": "rule_set_233" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_root_password_configured", - "remarks": "rule_set_235" + "remarks": "rule_set_234" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Authentication Required for Single User Mode", - "remarks": "rule_set_235" + "remarks": "rule_set_234" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_root_password_configured", - "remarks": "rule_set_235" + "remarks": "rule_set_234" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Authentication Required for Single User Mode", - "remarks": "rule_set_235" + "remarks": "rule_set_234" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_path_dirs_no_write", - "remarks": "rule_set_236" + "remarks": "rule_set_235" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include World or Group-Writable Directories", - "remarks": "rule_set_236" + "remarks": "rule_set_235" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_root_path_dirs_no_write", - "remarks": "rule_set_236" + "remarks": "rule_set_235" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include World or Group-Writable Directories", - "remarks": "rule_set_236" + "remarks": "rule_set_235" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "root_path_no_dot", - "remarks": "rule_set_237" + "remarks": "rule_set_236" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include Relative Paths or Null Directories", - "remarks": "rule_set_237" + "remarks": "rule_set_236" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "root_path_no_dot", - "remarks": "rule_set_237" + "remarks": "rule_set_236" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Root's Path Does Not Include Relative Paths or Null Directories", - "remarks": "rule_set_237" + "remarks": "rule_set_236" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_root", - "remarks": "rule_set_238" + "remarks": "rule_set_237" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Root Bash Umask is Set Correctly", - "remarks": "rule_set_238" + "remarks": "rule_set_237" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_root", - "remarks": "rule_set_238" + "remarks": "rule_set_237" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Root Bash Umask is Set Correctly", - "remarks": "rule_set_238" + "remarks": "rule_set_237" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_password_auth_for_systemaccounts", - "remarks": "rule_set_239" + "remarks": "rule_set_238" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Are Locked", - "remarks": "rule_set_239" + "remarks": "rule_set_238" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_password_auth_for_systemaccounts", - "remarks": "rule_set_239" + "remarks": "rule_set_238" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Are Locked", - "remarks": "rule_set_239" + "remarks": "rule_set_238" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_shelllogin_for_systemaccounts", - "remarks": "rule_set_240" + "remarks": "rule_set_239" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", - "remarks": "rule_set_240" + "remarks": "rule_set_239" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_shelllogin_for_systemaccounts", - "remarks": "rule_set_240" + "remarks": "rule_set_239" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", - "remarks": "rule_set_240" + "remarks": "rule_set_239" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_invalid_shell_accounts_unlocked", - "remarks": "rule_set_241" + "remarks": "rule_set_240" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Non-Interactive Accounts Are Locked", - "remarks": "rule_set_241" + "remarks": "rule_set_240" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_invalid_shell_accounts_unlocked", - "remarks": "rule_set_241" + "remarks": "rule_set_240" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Non-Interactive Accounts Are Locked", - "remarks": "rule_set_241" + "remarks": "rule_set_240" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_tmout", - "remarks": "rule_set_242" + "remarks": "rule_set_241" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Interactive Session Timeout", - "remarks": "rule_set_242" + "remarks": "rule_set_241" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_tmout", - "remarks": "rule_set_242" + "remarks": "rule_set_241" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Interactive Session Timeout", - "remarks": "rule_set_242" + "remarks": "rule_set_241" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_bashrc", - "remarks": "rule_set_243" + "remarks": "rule_set_242" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Bash Umask is Set Correctly", - "remarks": "rule_set_243" + "remarks": "rule_set_242" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_bashrc", - "remarks": "rule_set_243" + "remarks": "rule_set_242" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Bash Umask is Set Correctly", - "remarks": "rule_set_243" + "remarks": "rule_set_242" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_login_defs", - "remarks": "rule_set_244" + "remarks": "rule_set_243" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in login.defs", - "remarks": "rule_set_244" + "remarks": "rule_set_243" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_login_defs", - "remarks": "rule_set_244" + "remarks": "rule_set_243" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in login.defs", - "remarks": "rule_set_244" + "remarks": "rule_set_243" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_profile", - "remarks": "rule_set_245" + "remarks": "rule_set_244" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in /etc/profile", - "remarks": "rule_set_245" + "remarks": "rule_set_244" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_umask_etc_profile", - "remarks": "rule_set_245" + "remarks": "rule_set_244" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Default Umask is Set Correctly in /etc/profile", - "remarks": "rule_set_245" + "remarks": "rule_set_244" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_246" + "remarks": "rule_set_245" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_246" + "remarks": "rule_set_245" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_246" + "remarks": "rule_set_245" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_246" + "remarks": "rule_set_245" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_build_database", - "remarks": "rule_set_247" + "remarks": "rule_set_246" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Build and Test AIDE Database", - "remarks": "rule_set_247" + "remarks": "rule_set_246" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_build_database", - "remarks": "rule_set_247" + "remarks": "rule_set_246" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Build and Test AIDE Database", - "remarks": "rule_set_247" + "remarks": "rule_set_246" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_periodic_cron_checking", - "remarks": "rule_set_248" + "remarks": "rule_set_247" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Periodic Execution of AIDE", - "remarks": "rule_set_248" + "remarks": "rule_set_247" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_periodic_cron_checking", - "remarks": "rule_set_248" + "remarks": "rule_set_247" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Periodic Execution of AIDE", - "remarks": "rule_set_248" + "remarks": "rule_set_247" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_check_audit_tools", - "remarks": "rule_set_249" + "remarks": "rule_set_248" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure AIDE to Verify the Audit Tools", - "remarks": "rule_set_249" + "remarks": "rule_set_248" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_check_audit_tools", - "remarks": "rule_set_249" + "remarks": "rule_set_248" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure AIDE to Verify the Audit Tools", - "remarks": "rule_set_249" + "remarks": "rule_set_248" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journald_enabled", - "remarks": "rule_set_250" + "remarks": "rule_set_249" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journald Service", - "remarks": "rule_set_250" + "remarks": "rule_set_249" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journald_enabled", - "remarks": "rule_set_250" + "remarks": "rule_set_249" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journald Service", - "remarks": "rule_set_250" + "remarks": "rule_set_249" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_journald_and_rsyslog_not_active_together", - "remarks": "rule_set_251" + "remarks": "rule_set_250" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald and rsyslog Are Not Active Together", - "remarks": "rule_set_251" + "remarks": "rule_set_250" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_journald_and_rsyslog_not_active_together", - "remarks": "rule_set_251" + "remarks": "rule_set_250" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald and rsyslog Are Not Active Together", - "remarks": "rule_set_251" + "remarks": "rule_set_250" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_systemd-journal-remote_installed", - "remarks": "rule_set_252" + "remarks": "rule_set_251" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install systemd-journal-remote Package", - "remarks": "rule_set_252" + "remarks": "rule_set_251" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_systemd-journal-remote_installed", - "remarks": "rule_set_252" + "remarks": "rule_set_251" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install systemd-journal-remote Package", - "remarks": "rule_set_252" + "remarks": "rule_set_251" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journal-upload_enabled", - "remarks": "rule_set_253" + "remarks": "rule_set_252" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journal-upload Service", - "remarks": "rule_set_253" + "remarks": "rule_set_252" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_systemd-journal-upload_enabled", - "remarks": "rule_set_253" + "remarks": "rule_set_252" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable systemd-journal-upload Service", - "remarks": "rule_set_253" + "remarks": "rule_set_252" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "socket_systemd-journal-remote_disabled", - "remarks": "rule_set_254" + "remarks": "rule_set_253" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable systemd-journal-remote Socket", - "remarks": "rule_set_254" + "remarks": "rule_set_253" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "socket_systemd-journal-remote_disabled", - "remarks": "rule_set_254" + "remarks": "rule_set_253" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable systemd-journal-remote Socket", - "remarks": "rule_set_254" + "remarks": "rule_set_253" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_disable_forward_to_syslog", - "remarks": "rule_set_255" + "remarks": "rule_set_254" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald ForwardToSyslog is disabled", - "remarks": "rule_set_255" + "remarks": "rule_set_254" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_disable_forward_to_syslog", - "remarks": "rule_set_255" + "remarks": "rule_set_254" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald ForwardToSyslog is disabled", - "remarks": "rule_set_255" + "remarks": "rule_set_254" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_compress", - "remarks": "rule_set_256" + "remarks": "rule_set_255" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to compress large log files", - "remarks": "rule_set_256" + "remarks": "rule_set_255" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_compress", - "remarks": "rule_set_256" + "remarks": "rule_set_255" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to compress large log files", - "remarks": "rule_set_256" + "remarks": "rule_set_255" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_storage", - "remarks": "rule_set_257" + "remarks": "rule_set_256" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to write log files to persistent disk", - "remarks": "rule_set_257" + "remarks": "rule_set_256" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "journald_storage", - "remarks": "rule_set_257" + "remarks": "rule_set_256" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure journald is configured to write log files to persistent disk", - "remarks": "rule_set_257" + "remarks": "rule_set_256" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_258" + "remarks": "rule_set_257" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_258" + "remarks": "rule_set_257" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_258" + "remarks": "rule_set_257" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_258" + "remarks": "rule_set_257" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_259" + "remarks": "rule_set_258" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_259" + "remarks": "rule_set_258" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_259" + "remarks": "rule_set_258" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_259" + "remarks": "rule_set_258" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_260" + "remarks": "rule_set_259" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_260" + "remarks": "rule_set_259" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_260" + "remarks": "rule_set_259" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_260" + "remarks": "rule_set_259" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_passwd", - "remarks": "rule_set_261" + "remarks": "rule_set_260" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns passwd File", - "remarks": "rule_set_261" + "remarks": "rule_set_260" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_passwd", - "remarks": "rule_set_261" + "remarks": "rule_set_260" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns passwd File", - "remarks": "rule_set_261" + "remarks": "rule_set_260" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_passwd", - "remarks": "rule_set_262" + "remarks": "rule_set_261" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns passwd File", - "remarks": "rule_set_262" + "remarks": "rule_set_261" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_passwd", - "remarks": "rule_set_262" + "remarks": "rule_set_261" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns passwd File", - "remarks": "rule_set_262" + "remarks": "rule_set_261" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_passwd", - "remarks": "rule_set_263" + "remarks": "rule_set_262" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on passwd File", - "remarks": "rule_set_263" + "remarks": "rule_set_262" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_passwd", - "remarks": "rule_set_263" + "remarks": "rule_set_262" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on passwd File", - "remarks": "rule_set_263" + "remarks": "rule_set_262" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_passwd", - "remarks": "rule_set_264" + "remarks": "rule_set_263" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup passwd File", - "remarks": "rule_set_264" + "remarks": "rule_set_263" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_passwd", - "remarks": "rule_set_264" + "remarks": "rule_set_263" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup passwd File", - "remarks": "rule_set_264" + "remarks": "rule_set_263" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_passwd", - "remarks": "rule_set_265" + "remarks": "rule_set_264" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup passwd File", - "remarks": "rule_set_265" + "remarks": "rule_set_264" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_passwd", - "remarks": "rule_set_265" + "remarks": "rule_set_264" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup passwd File", - "remarks": "rule_set_265" + "remarks": "rule_set_264" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_passwd", - "remarks": "rule_set_266" + "remarks": "rule_set_265" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup passwd File", - "remarks": "rule_set_266" + "remarks": "rule_set_265" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_passwd", - "remarks": "rule_set_266" + "remarks": "rule_set_265" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup passwd File", - "remarks": "rule_set_266" + "remarks": "rule_set_265" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_group", - "remarks": "rule_set_267" + "remarks": "rule_set_266" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns group File", - "remarks": "rule_set_267" + "remarks": "rule_set_266" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_group", - "remarks": "rule_set_267" + "remarks": "rule_set_266" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns group File", - "remarks": "rule_set_267" + "remarks": "rule_set_266" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_group", - "remarks": "rule_set_268" + "remarks": "rule_set_267" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns group File", - "remarks": "rule_set_268" + "remarks": "rule_set_267" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_group", - "remarks": "rule_set_268" + "remarks": "rule_set_267" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns group File", - "remarks": "rule_set_268" + "remarks": "rule_set_267" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_group", - "remarks": "rule_set_269" + "remarks": "rule_set_268" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on group File", - "remarks": "rule_set_269" + "remarks": "rule_set_268" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_group", - "remarks": "rule_set_269" + "remarks": "rule_set_268" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on group File", - "remarks": "rule_set_269" + "remarks": "rule_set_268" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_group", - "remarks": "rule_set_270" + "remarks": "rule_set_269" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup group File", - "remarks": "rule_set_270" + "remarks": "rule_set_269" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_group", - "remarks": "rule_set_270" + "remarks": "rule_set_269" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup group File", - "remarks": "rule_set_270" + "remarks": "rule_set_269" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_group", - "remarks": "rule_set_271" + "remarks": "rule_set_270" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup group File", - "remarks": "rule_set_271" + "remarks": "rule_set_270" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_group", - "remarks": "rule_set_271" + "remarks": "rule_set_270" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup group File", - "remarks": "rule_set_271" + "remarks": "rule_set_270" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_group", - "remarks": "rule_set_272" + "remarks": "rule_set_271" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup group File", - "remarks": "rule_set_272" + "remarks": "rule_set_271" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_group", - "remarks": "rule_set_272" + "remarks": "rule_set_271" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup group File", - "remarks": "rule_set_272" + "remarks": "rule_set_271" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shadow", - "remarks": "rule_set_273" + "remarks": "rule_set_272" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns shadow File", - "remarks": "rule_set_273" + "remarks": "rule_set_272" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shadow", - "remarks": "rule_set_273" + "remarks": "rule_set_272" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns shadow File", - "remarks": "rule_set_273" + "remarks": "rule_set_272" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shadow", - "remarks": "rule_set_274" + "remarks": "rule_set_273" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns shadow File", - "remarks": "rule_set_274" + "remarks": "rule_set_273" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shadow", - "remarks": "rule_set_274" + "remarks": "rule_set_273" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns shadow File", - "remarks": "rule_set_274" + "remarks": "rule_set_273" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shadow", - "remarks": "rule_set_275" + "remarks": "rule_set_274" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on shadow File", - "remarks": "rule_set_275" + "remarks": "rule_set_274" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shadow", - "remarks": "rule_set_275" + "remarks": "rule_set_274" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on shadow File", - "remarks": "rule_set_275" + "remarks": "rule_set_274" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_shadow", - "remarks": "rule_set_276" + "remarks": "rule_set_275" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup shadow File", - "remarks": "rule_set_276" + "remarks": "rule_set_275" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_shadow", - "remarks": "rule_set_276" + "remarks": "rule_set_275" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup shadow File", - "remarks": "rule_set_276" + "remarks": "rule_set_275" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_shadow", - "remarks": "rule_set_277" + "remarks": "rule_set_276" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup shadow File", - "remarks": "rule_set_277" + "remarks": "rule_set_276" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_shadow", - "remarks": "rule_set_277" + "remarks": "rule_set_276" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup shadow File", - "remarks": "rule_set_277" + "remarks": "rule_set_276" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_shadow", - "remarks": "rule_set_278" + "remarks": "rule_set_277" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup shadow File", - "remarks": "rule_set_278" + "remarks": "rule_set_277" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_shadow", - "remarks": "rule_set_278" + "remarks": "rule_set_277" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup shadow File", - "remarks": "rule_set_278" + "remarks": "rule_set_277" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_gshadow", - "remarks": "rule_set_279" + "remarks": "rule_set_278" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns gshadow File", - "remarks": "rule_set_279" + "remarks": "rule_set_278" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_gshadow", - "remarks": "rule_set_279" + "remarks": "rule_set_278" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns gshadow File", - "remarks": "rule_set_279" + "remarks": "rule_set_278" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_gshadow", - "remarks": "rule_set_280" + "remarks": "rule_set_279" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns gshadow File", - "remarks": "rule_set_280" + "remarks": "rule_set_279" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_gshadow", - "remarks": "rule_set_280" + "remarks": "rule_set_279" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns gshadow File", - "remarks": "rule_set_280" + "remarks": "rule_set_279" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_gshadow", - "remarks": "rule_set_281" + "remarks": "rule_set_280" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on gshadow File", - "remarks": "rule_set_281" + "remarks": "rule_set_280" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_gshadow", - "remarks": "rule_set_281" + "remarks": "rule_set_280" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on gshadow File", - "remarks": "rule_set_281" + "remarks": "rule_set_280" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_gshadow", - "remarks": "rule_set_282" + "remarks": "rule_set_281" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup gshadow File", - "remarks": "rule_set_282" + "remarks": "rule_set_281" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_backup_etc_gshadow", - "remarks": "rule_set_282" + "remarks": "rule_set_281" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns Backup gshadow File", - "remarks": "rule_set_282" + "remarks": "rule_set_281" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_gshadow", - "remarks": "rule_set_283" + "remarks": "rule_set_282" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup gshadow File", - "remarks": "rule_set_283" + "remarks": "rule_set_282" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_backup_etc_gshadow", - "remarks": "rule_set_283" + "remarks": "rule_set_282" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns Backup gshadow File", - "remarks": "rule_set_283" + "remarks": "rule_set_282" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_gshadow", - "remarks": "rule_set_284" + "remarks": "rule_set_283" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup gshadow File", - "remarks": "rule_set_284" + "remarks": "rule_set_283" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_backup_etc_gshadow", - "remarks": "rule_set_284" + "remarks": "rule_set_283" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on Backup gshadow File", - "remarks": "rule_set_284" + "remarks": "rule_set_283" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shells", - "remarks": "rule_set_285" + "remarks": "rule_set_284" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/shells File", - "remarks": "rule_set_285" + "remarks": "rule_set_284" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_shells", - "remarks": "rule_set_285" + "remarks": "rule_set_284" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/shells File", - "remarks": "rule_set_285" + "remarks": "rule_set_284" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shells", - "remarks": "rule_set_286" + "remarks": "rule_set_285" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Who Owns /etc/shells File", - "remarks": "rule_set_286" + "remarks": "rule_set_285" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_shells", - "remarks": "rule_set_286" + "remarks": "rule_set_285" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Who Owns /etc/shells File", - "remarks": "rule_set_286" + "remarks": "rule_set_285" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shells", - "remarks": "rule_set_287" + "remarks": "rule_set_286" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/shells File", - "remarks": "rule_set_287" + "remarks": "rule_set_286" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_shells", - "remarks": "rule_set_287" + "remarks": "rule_set_286" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/shells File", - "remarks": "rule_set_287" + "remarks": "rule_set_286" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd", - "remarks": "rule_set_288" + "remarks": "rule_set_287" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd File", - "remarks": "rule_set_288" + "remarks": "rule_set_287" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd", - "remarks": "rule_set_288" + "remarks": "rule_set_287" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd File", - "remarks": "rule_set_288" + "remarks": "rule_set_287" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd", - "remarks": "rule_set_289" + "remarks": "rule_set_288" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd File", - "remarks": "rule_set_289" + "remarks": "rule_set_288" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd", - "remarks": "rule_set_289" + "remarks": "rule_set_288" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd File", - "remarks": "rule_set_289" + "remarks": "rule_set_288" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd", - "remarks": "rule_set_290" + "remarks": "rule_set_289" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd File", - "remarks": "rule_set_290" + "remarks": "rule_set_289" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd", - "remarks": "rule_set_290" + "remarks": "rule_set_289" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd File", - "remarks": "rule_set_290" + "remarks": "rule_set_289" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd_old", - "remarks": "rule_set_291" + "remarks": "rule_set_290" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_291" + "remarks": "rule_set_290" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupowner_etc_security_opasswd_old", - "remarks": "rule_set_291" + "remarks": "rule_set_290" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Group Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_291" + "remarks": "rule_set_290" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd_old", - "remarks": "rule_set_292" + "remarks": "rule_set_291" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_292" + "remarks": "rule_set_291" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_owner_etc_security_opasswd_old", - "remarks": "rule_set_292" + "remarks": "rule_set_291" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify User Who Owns /etc/security/opasswd.old File", - "remarks": "rule_set_292" + "remarks": "rule_set_291" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd_old", - "remarks": "rule_set_293" + "remarks": "rule_set_292" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd.old File", - "remarks": "rule_set_293" + "remarks": "rule_set_292" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_etc_security_opasswd_old", - "remarks": "rule_set_293" + "remarks": "rule_set_292" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on /etc/security/opasswd.old File", - "remarks": "rule_set_293" + "remarks": "rule_set_292" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_294" + "remarks": "rule_set_293" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_294" + "remarks": "rule_set_293" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_294" + "remarks": "rule_set_293" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_294" + "remarks": "rule_set_293" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_295" + "remarks": "rule_set_294" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_295" + "remarks": "rule_set_294" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_295" + "remarks": "rule_set_294" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_295" + "remarks": "rule_set_294" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_unowned_by_user", - "remarks": "rule_set_296" + "remarks": "rule_set_295" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a User", - "remarks": "rule_set_296" + "remarks": "rule_set_295" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_unowned_by_user", - "remarks": "rule_set_296" + "remarks": "rule_set_295" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a User", - "remarks": "rule_set_296" + "remarks": "rule_set_295" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_ungroupowned", - "remarks": "rule_set_297" + "remarks": "rule_set_296" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a Group", - "remarks": "rule_set_297" + "remarks": "rule_set_296" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_files_or_dirs_ungroupowned", - "remarks": "rule_set_297" + "remarks": "rule_set_296" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Files And Directories Are Owned by a Group", - "remarks": "rule_set_297" + "remarks": "rule_set_296" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_all_shadowed", - "remarks": "rule_set_298" + "remarks": "rule_set_297" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify All Account Password Hashes are Shadowed", - "remarks": "rule_set_298" + "remarks": "rule_set_297" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_all_shadowed", - "remarks": "rule_set_298" + "remarks": "rule_set_297" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify All Account Password Hashes are Shadowed", - "remarks": "rule_set_298" + "remarks": "rule_set_297" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords_etc_shadow", - "remarks": "rule_set_299" + "remarks": "rule_set_298" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure There Are No Accounts With Blank or Null Passwords", - "remarks": "rule_set_299" + "remarks": "rule_set_298" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords_etc_shadow", - "remarks": "rule_set_299" + "remarks": "rule_set_298" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure There Are No Accounts With Blank or Null Passwords", - "remarks": "rule_set_299" + "remarks": "rule_set_298" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gid_passwd_group_same", - "remarks": "rule_set_300" + "remarks": "rule_set_299" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", - "remarks": "rule_set_300" + "remarks": "rule_set_299" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "gid_passwd_group_same", - "remarks": "rule_set_300" + "remarks": "rule_set_299" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", - "remarks": "rule_set_300" + "remarks": "rule_set_299" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_id", - "remarks": "rule_set_301" + "remarks": "rule_set_300" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique User IDs", - "remarks": "rule_set_301" + "remarks": "rule_set_300" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_id", - "remarks": "rule_set_301" + "remarks": "rule_set_300" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique User IDs", - "remarks": "rule_set_301" + "remarks": "rule_set_300" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_id", - "remarks": "rule_set_302" + "remarks": "rule_set_301" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group ID", - "remarks": "rule_set_302" + "remarks": "rule_set_301" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_id", - "remarks": "rule_set_302" + "remarks": "rule_set_301" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group ID", - "remarks": "rule_set_302" + "remarks": "rule_set_301" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_name", - "remarks": "rule_set_303" + "remarks": "rule_set_302" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique Names", - "remarks": "rule_set_303" + "remarks": "rule_set_302" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "account_unique_name", - "remarks": "rule_set_303" + "remarks": "rule_set_302" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Accounts on the System Have Unique Names", - "remarks": "rule_set_303" + "remarks": "rule_set_302" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_name", - "remarks": "rule_set_304" + "remarks": "rule_set_303" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group Names", - "remarks": "rule_set_304" + "remarks": "rule_set_303" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "group_unique_name", - "remarks": "rule_set_304" + "remarks": "rule_set_303" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All Groups on the System Have Unique Group Names", - "remarks": "rule_set_304" + "remarks": "rule_set_303" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_interactive_home_directory_exists", - "remarks": "rule_set_305" + "remarks": "rule_set_304" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive Users Home Directories Must Exist", - "remarks": "rule_set_305" + "remarks": "rule_set_304" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_interactive_home_directory_exists", - "remarks": "rule_set_305" + "remarks": "rule_set_304" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive Users Home Directories Must Exist", - "remarks": "rule_set_305" + "remarks": "rule_set_304" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_home_directories", - "remarks": "rule_set_306" + "remarks": "rule_set_305" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Be Owned By The Primary User", - "remarks": "rule_set_306" + "remarks": "rule_set_305" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_home_directories", - "remarks": "rule_set_306" + "remarks": "rule_set_305" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Be Owned By The Primary User", - "remarks": "rule_set_306" + "remarks": "rule_set_305" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_home_directories", - "remarks": "rule_set_307" + "remarks": "rule_set_306" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", - "remarks": "rule_set_307" + "remarks": "rule_set_306" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_home_directories", - "remarks": "rule_set_307" + "remarks": "rule_set_306" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "All Interactive User Home Directories Must Have mode 0750 Or Less Permissive", - "remarks": "rule_set_307" + "remarks": "rule_set_306" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_308" + "remarks": "rule_set_307" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_308" + "remarks": "rule_set_307" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_group_ownership", - "remarks": "rule_set_308" + "remarks": "rule_set_307" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Group-Owned By The Primary Group", - "remarks": "rule_set_308" + "remarks": "rule_set_307" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_309" + "remarks": "rule_set_308" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_309" + "remarks": "rule_set_308" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_user_ownership", - "remarks": "rule_set_309" + "remarks": "rule_set_308" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Be Owned By the Primary User", - "remarks": "rule_set_309" + "remarks": "rule_set_308" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_no_world_writable_programs", - "remarks": "rule_set_310" + "remarks": "rule_set_309" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Not Run World-Writable Programs", - "remarks": "rule_set_310" + "remarks": "rule_set_309" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_user_dot_no_world_writable_programs", - "remarks": "rule_set_310" + "remarks": "rule_set_309" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "User Initialization Files Must Not Run World-Writable Programs", - "remarks": "rule_set_310" + "remarks": "rule_set_309" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_311" + "remarks": "rule_set_310" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_311" + "remarks": "rule_set_310" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_init_files", - "remarks": "rule_set_311" + "remarks": "rule_set_310" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All User Initialization Files Have Mode 0740 Or Less Permissive", - "remarks": "rule_set_311" + "remarks": "rule_set_310" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_forward_files", - "remarks": "rule_set_312" + "remarks": "rule_set_311" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .forward Files Exist", - "remarks": "rule_set_312" + "remarks": "rule_set_311" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_forward_files", - "remarks": "rule_set_312" + "remarks": "rule_set_311" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .forward Files Exist", - "remarks": "rule_set_312" + "remarks": "rule_set_311" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_netrc_files", - "remarks": "rule_set_313" + "remarks": "rule_set_312" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No netrc Files Exist", - "remarks": "rule_set_313" + "remarks": "rule_set_312" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_netrc_files", - "remarks": "rule_set_313" + "remarks": "rule_set_312" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No netrc Files Exist", - "remarks": "rule_set_313" + "remarks": "rule_set_312" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rhost_files", - "remarks": "rule_set_314" + "remarks": "rule_set_313" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .rhost Files Exist", - "remarks": "rule_set_314" + "remarks": "rule_set_313" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_rhost_files", - "remarks": "rule_set_314" + "remarks": "rule_set_313" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify No .rhost Files Exist", - "remarks": "rule_set_314" + "remarks": "rule_set_313" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_bash_history", - "remarks": "rule_set_315" + "remarks": "rule_set_314" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure User Bash History File Has Correct Permissions", - "remarks": "rule_set_315" + "remarks": "rule_set_314" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permission_user_bash_history", - "remarks": "rule_set_315" + "remarks": "rule_set_314" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure User Bash History File Has Correct Permissions", - "remarks": "rule_set_315" + "remarks": "rule_set_314" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_overlayfs_disabled", - "remarks": "rule_set_316" + "remarks": "rule_set_315" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure overlayfs kernel module is not available", - "remarks": "rule_set_316" + "remarks": "rule_set_315" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_overlayfs_disabled", - "remarks": "rule_set_316" + "remarks": "rule_set_315" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure overlayfs kernel module is not available", - "remarks": "rule_set_316" + "remarks": "rule_set_315" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_squashfs_disabled", - "remarks": "rule_set_317" + "remarks": "rule_set_316" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Mounting of squashfs", - "remarks": "rule_set_317" + "remarks": "rule_set_316" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_squashfs_disabled", - "remarks": "rule_set_317" + "remarks": "rule_set_316" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Mounting of squashfs", - "remarks": "rule_set_317" + "remarks": "rule_set_316" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_udf_disabled", - "remarks": "rule_set_318" + "remarks": "rule_set_317" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Mounting of udf", - "remarks": "rule_set_318" + "remarks": "rule_set_317" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_udf_disabled", - "remarks": "rule_set_318" + "remarks": "rule_set_317" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Mounting of udf", - "remarks": "rule_set_318" + "remarks": "rule_set_317" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_firewire-core_disabled", - "remarks": "rule_set_319" + "remarks": "rule_set_318" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable IEEE 1394 (FireWire) Support", - "remarks": "rule_set_319" + "remarks": "rule_set_318" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_firewire-core_disabled", - "remarks": "rule_set_319" + "remarks": "rule_set_318" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable IEEE 1394 (FireWire) Support", - "remarks": "rule_set_319" + "remarks": "rule_set_318" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_usb-storage_disabled", - "remarks": "rule_set_320" + "remarks": "rule_set_319" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Modprobe Loading of USB Storage Driver", - "remarks": "rule_set_320" + "remarks": "rule_set_319" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kernel_module_usb-storage_disabled", - "remarks": "rule_set_320" + "remarks": "rule_set_319" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Modprobe Loading of USB Storage Driver", - "remarks": "rule_set_320" + "remarks": "rule_set_319" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_home", - "remarks": "rule_set_321" + "remarks": "rule_set_320" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /home Located On Separate Partition", - "remarks": "rule_set_321" + "remarks": "rule_set_320" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_home", - "remarks": "rule_set_321" + "remarks": "rule_set_320" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /home Located On Separate Partition", - "remarks": "rule_set_321" + "remarks": "rule_set_320" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var", - "remarks": "rule_set_322" + "remarks": "rule_set_321" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var Located On Separate Partition", - "remarks": "rule_set_322" + "remarks": "rule_set_321" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var", - "remarks": "rule_set_322" + "remarks": "rule_set_321" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var Located On Separate Partition", - "remarks": "rule_set_322" + "remarks": "rule_set_321" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_tmp", - "remarks": "rule_set_323" + "remarks": "rule_set_322" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/tmp Located On Separate Partition", - "remarks": "rule_set_323" + "remarks": "rule_set_322" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_tmp", - "remarks": "rule_set_323" + "remarks": "rule_set_322" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/tmp Located On Separate Partition", - "remarks": "rule_set_323" + "remarks": "rule_set_322" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log", - "remarks": "rule_set_324" + "remarks": "rule_set_323" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log Located On Separate Partition", - "remarks": "rule_set_324" + "remarks": "rule_set_323" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log", - "remarks": "rule_set_324" + "remarks": "rule_set_323" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log Located On Separate Partition", - "remarks": "rule_set_324" + "remarks": "rule_set_323" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log_audit", - "remarks": "rule_set_325" + "remarks": "rule_set_324" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log/audit Located On Separate Partition", - "remarks": "rule_set_325" + "remarks": "rule_set_324" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "partition_for_var_log_audit", - "remarks": "rule_set_325" + "remarks": "rule_set_324" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure /var/log/audit Located On Separate Partition", - "remarks": "rule_set_325" + "remarks": "rule_set_324" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_weak_deps", - "remarks": "rule_set_326" + "remarks": "rule_set_325" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Installation of Weak Dependencies in DNF", - "remarks": "rule_set_326" + "remarks": "rule_set_325" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_weak_deps", - "remarks": "rule_set_326" + "remarks": "rule_set_325" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Installation of Weak Dependencies in DNF", - "remarks": "rule_set_326" + "remarks": "rule_set_325" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_state", - "remarks": "rule_set_327" + "remarks": "rule_set_326" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SELinux State is Enforcing", - "remarks": "rule_set_327" + "remarks": "rule_set_326" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_state", - "remarks": "rule_set_327" + "remarks": "rule_set_326" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SELinux State is Enforcing", - "remarks": "rule_set_327" + "remarks": "rule_set_326" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_symlinks", - "remarks": "rule_set_328" + "remarks": "rule_set_327" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", - "remarks": "rule_set_328" + "remarks": "rule_set_327" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_fs_protected_symlinks", - "remarks": "rule_set_328" + "remarks": "rule_set_327" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Kernel Parameter to Enforce DAC on Symlinks", - "remarks": "rule_set_328" + "remarks": "rule_set_327" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_automount", - "remarks": "rule_set_329" + "remarks": "rule_set_328" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automounting", - "remarks": "rule_set_329" + "remarks": "rule_set_328" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_automount", - "remarks": "rule_set_329" + "remarks": "rule_set_328" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automounting", - "remarks": "rule_set_329" + "remarks": "rule_set_328" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_automount_open", - "remarks": "rule_set_330" + "remarks": "rule_set_329" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automount Opening", - "remarks": "rule_set_330" + "remarks": "rule_set_329" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dconf_gnome_disable_automount_open", - "remarks": "rule_set_330" + "remarks": "rule_set_329" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GNOME3 Automount Opening", - "remarks": "rule_set_330" + "remarks": "rule_set_329" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "xwayland_disabled", - "remarks": "rule_set_331" + "remarks": "rule_set_330" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable XWayland", - "remarks": "rule_set_331" + "remarks": "rule_set_330" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "xwayland_disabled", - "remarks": "rule_set_331" + "remarks": "rule_set_330" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable XWayland", - "remarks": "rule_set_331" + "remarks": "rule_set_330" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_autofs_disabled", - "remarks": "rule_set_332" + "remarks": "rule_set_331" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the Automounter", - "remarks": "rule_set_332" + "remarks": "rule_set_331" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_autofs_disabled", - "remarks": "rule_set_332" + "remarks": "rule_set_331" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the Automounter", - "remarks": "rule_set_332" + "remarks": "rule_set_331" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_avahi-daemon_disabled", - "remarks": "rule_set_333" + "remarks": "rule_set_332" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Avahi Server Software", - "remarks": "rule_set_333" + "remarks": "rule_set_332" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_avahi-daemon_disabled", - "remarks": "rule_set_333" + "remarks": "rule_set_332" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Avahi Server Software", - "remarks": "rule_set_333" + "remarks": "rule_set_332" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_cockpit_disabled", - "remarks": "rule_set_334" + "remarks": "rule_set_333" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Cockpit Management Server", - "remarks": "rule_set_334" + "remarks": "rule_set_333" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_cockpit_disabled", - "remarks": "rule_set_334" + "remarks": "rule_set_333" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Cockpit Management Server", - "remarks": "rule_set_334" + "remarks": "rule_set_333" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_openldap-clients_removed", - "remarks": "rule_set_335" + "remarks": "rule_set_334" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure LDAP client is not installed", - "remarks": "rule_set_335" + "remarks": "rule_set_334" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_openldap-clients_removed", - "remarks": "rule_set_335" + "remarks": "rule_set_334" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure LDAP client is not installed", - "remarks": "rule_set_335" + "remarks": "rule_set_334" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_bluetooth_disabled", - "remarks": "rule_set_336" + "remarks": "rule_set_335" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Bluetooth Service", - "remarks": "rule_set_336" + "remarks": "rule_set_335" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_bluetooth_disabled", - "remarks": "rule_set_336" + "remarks": "rule_set_335" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Bluetooth Service", - "remarks": "rule_set_336" + "remarks": "rule_set_335" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_nopasswd", - "remarks": "rule_set_337" + "remarks": "rule_set_336" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD", - "remarks": "rule_set_337" + "remarks": "rule_set_336" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_nopasswd", - "remarks": "rule_set_337" + "remarks": "rule_set_336" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD", - "remarks": "rule_set_337" + "remarks": "rule_set_336" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny_root", - "remarks": "rule_set_338" + "remarks": "rule_set_337" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the root Account for Failed Password Attempts", - "remarks": "rule_set_338" + "remarks": "rule_set_337" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny_root", - "remarks": "rule_set_338" + "remarks": "rule_set_337" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the root Account for Failed Password Attempts", - "remarks": "rule_set_338" + "remarks": "rule_set_337" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_minimum_age_login_defs", - "remarks": "rule_set_339" + "remarks": "rule_set_338" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Minimum Age", - "remarks": "rule_set_339" + "remarks": "rule_set_338" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_minimum_age_login_defs", - "remarks": "rule_set_339" + "remarks": "rule_set_338" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Minimum Age", - "remarks": "rule_set_339" + "remarks": "rule_set_338" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_min_life_existing", - "remarks": "rule_set_340" + "remarks": "rule_set_339" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Minimum Age", - "remarks": "rule_set_340" + "remarks": "rule_set_339" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_set_min_life_existing", - "remarks": "rule_set_340" + "remarks": "rule_set_339" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Existing Passwords Minimum Age", - "remarks": "rule_set_340" + "remarks": "rule_set_339" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_nologin_in_shells", - "remarks": "rule_set_341" + "remarks": "rule_set_340" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure nologin Shell is Not Listed in /etc/shells", - "remarks": "rule_set_341" + "remarks": "rule_set_340" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_nologin_in_shells", - "remarks": "rule_set_341" + "remarks": "rule_set_340" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure nologin Shell is Not Listed in /etc/shells", - "remarks": "rule_set_341" + "remarks": "rule_set_340" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit_installed", - "remarks": "rule_set_342" + "remarks": "rule_set_341" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit Subsystem is Installed", - "remarks": "rule_set_342" + "remarks": "rule_set_341" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit_installed", - "remarks": "rule_set_342" + "remarks": "rule_set_341" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit Subsystem is Installed", - "remarks": "rule_set_342" + "remarks": "rule_set_341" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit-libs_installed", - "remarks": "rule_set_343" + "remarks": "rule_set_342" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit-libs package as a part of audit Subsystem is Installed", - "remarks": "rule_set_343" + "remarks": "rule_set_342" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit-libs_installed", - "remarks": "rule_set_343" + "remarks": "rule_set_342" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit-libs package as a part of audit Subsystem is Installed", - "remarks": "rule_set_343" + "remarks": "rule_set_342" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_argument", - "remarks": "rule_set_344" + "remarks": "rule_set_343" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Auditing for Processes Which Start Prior to the Audit Daemon", - "remarks": "rule_set_344" + "remarks": "rule_set_343" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_argument", - "remarks": "rule_set_344" + "remarks": "rule_set_343" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Auditing for Processes Which Start Prior to the Audit Daemon", - "remarks": "rule_set_344" + "remarks": "rule_set_343" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_backlog_limit_argument", - "remarks": "rule_set_345" + "remarks": "rule_set_344" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Extend Audit Backlog Limit for the Audit Daemon", - "remarks": "rule_set_345" + "remarks": "rule_set_344" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_backlog_limit_argument", - "remarks": "rule_set_345" + "remarks": "rule_set_344" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Extend Audit Backlog Limit for the Audit Daemon", - "remarks": "rule_set_345" + "remarks": "rule_set_344" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_auditd_enabled", - "remarks": "rule_set_346" + "remarks": "rule_set_345" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable auditd Service", - "remarks": "rule_set_346" + "remarks": "rule_set_345" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_auditd_enabled", - "remarks": "rule_set_346" + "remarks": "rule_set_345" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable auditd Service", - "remarks": "rule_set_346" + "remarks": "rule_set_345" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_max_log_file", - "remarks": "rule_set_347" + "remarks": "rule_set_346" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Max Log File Size", - "remarks": "rule_set_347" + "remarks": "rule_set_346" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_max_log_file", - "remarks": "rule_set_347" + "remarks": "rule_set_346" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Max Log File Size", - "remarks": "rule_set_347" + "remarks": "rule_set_346" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_max_log_file_action", - "remarks": "rule_set_348" + "remarks": "rule_set_347" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd max_log_file_action Upon Reaching Maximum Log Size", - "remarks": "rule_set_348" + "remarks": "rule_set_347" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_max_log_file_action", - "remarks": "rule_set_348" + "remarks": "rule_set_347" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd max_log_file_action Upon Reaching Maximum Log Size", - "remarks": "rule_set_348" + "remarks": "rule_set_347" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_disk_error_action", - "remarks": "rule_set_349" + "remarks": "rule_set_348" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Disk Error Action on Disk Error", - "remarks": "rule_set_349" + "remarks": "rule_set_348" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_disk_error_action", - "remarks": "rule_set_349" + "remarks": "rule_set_348" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Disk Error Action on Disk Error", - "remarks": "rule_set_349" + "remarks": "rule_set_348" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_disk_full_action", - "remarks": "rule_set_350" + "remarks": "rule_set_349" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Disk Full Action when Disk Space Is Full", - "remarks": "rule_set_350" + "remarks": "rule_set_349" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_disk_full_action", - "remarks": "rule_set_350" + "remarks": "rule_set_349" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd Disk Full Action when Disk Space Is Full", - "remarks": "rule_set_350" + "remarks": "rule_set_349" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_admin_space_left_action", - "remarks": "rule_set_351" + "remarks": "rule_set_350" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd admin_space_left Action on Low Disk Space", - "remarks": "rule_set_351" + "remarks": "rule_set_350" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_admin_space_left_action", - "remarks": "rule_set_351" + "remarks": "rule_set_350" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd admin_space_left Action on Low Disk Space", - "remarks": "rule_set_351" + "remarks": "rule_set_350" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_space_left_action", - "remarks": "rule_set_352" + "remarks": "rule_set_351" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd space_left Action on Low Disk Space", - "remarks": "rule_set_352" + "remarks": "rule_set_351" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_space_left_action", - "remarks": "rule_set_352" + "remarks": "rule_set_351" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd space_left Action on Low Disk Space", - "remarks": "rule_set_352" + "remarks": "rule_set_351" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_sysadmin_actions", - "remarks": "rule_set_353" + "remarks": "rule_set_352" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects System Administrator Actions", - "remarks": "rule_set_353" + "remarks": "rule_set_352" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_sysadmin_actions", - "remarks": "rule_set_353" + "remarks": "rule_set_352" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects System Administrator Actions", - "remarks": "rule_set_353" + "remarks": "rule_set_352" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_suid_auid_privilege_function", - "remarks": "rule_set_354" + "remarks": "rule_set_353" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events When Executables Are Run As Another User", - "remarks": "rule_set_354" + "remarks": "rule_set_353" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_suid_auid_privilege_function", - "remarks": "rule_set_354" + "remarks": "rule_set_353" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events When Executables Are Run As Another User", - "remarks": "rule_set_354" + "remarks": "rule_set_353" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_sudo_log_events", - "remarks": "rule_set_355" + "remarks": "rule_set_354" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to perform maintenance activities", - "remarks": "rule_set_355" + "remarks": "rule_set_354" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_sudo_log_events", - "remarks": "rule_set_355" + "remarks": "rule_set_354" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to perform maintenance activities", - "remarks": "rule_set_355" + "remarks": "rule_set_354" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_adjtimex", - "remarks": "rule_set_356" + "remarks": "rule_set_355" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through adjtimex", - "remarks": "rule_set_356" + "remarks": "rule_set_355" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_adjtimex", - "remarks": "rule_set_356" + "remarks": "rule_set_355" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through adjtimex", - "remarks": "rule_set_356" + "remarks": "rule_set_355" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_settimeofday", - "remarks": "rule_set_357" + "remarks": "rule_set_356" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through settimeofday", - "remarks": "rule_set_357" + "remarks": "rule_set_356" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_settimeofday", - "remarks": "rule_set_357" + "remarks": "rule_set_356" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through settimeofday", - "remarks": "rule_set_357" + "remarks": "rule_set_356" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_clock_settime", - "remarks": "rule_set_358" + "remarks": "rule_set_357" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through clock_settime", - "remarks": "rule_set_358" + "remarks": "rule_set_357" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_clock_settime", - "remarks": "rule_set_358" + "remarks": "rule_set_357" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through clock_settime", - "remarks": "rule_set_358" + "remarks": "rule_set_357" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_watch_localtime", - "remarks": "rule_set_359" + "remarks": "rule_set_358" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter the localtime File", - "remarks": "rule_set_359" + "remarks": "rule_set_358" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_watch_localtime", - "remarks": "rule_set_359" + "remarks": "rule_set_358" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter the localtime File", - "remarks": "rule_set_359" + "remarks": "rule_set_358" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_setdomainname", - "remarks": "rule_set_360" + "remarks": "rule_set_359" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - setdomainname", - "remarks": "rule_set_360" + "remarks": "rule_set_359" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_setdomainname", - "remarks": "rule_set_360" + "remarks": "rule_set_359" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - setdomainname", - "remarks": "rule_set_360" + "remarks": "rule_set_359" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_sethostname", - "remarks": "rule_set_361" + "remarks": "rule_set_360" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - sethostname", - "remarks": "rule_set_361" + "remarks": "rule_set_360" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_sethostname", - "remarks": "rule_set_361" + "remarks": "rule_set_360" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - sethostname", - "remarks": "rule_set_361" + "remarks": "rule_set_360" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_issue", - "remarks": "rule_set_362" + "remarks": "rule_set_361" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/issue", - "remarks": "rule_set_362" + "remarks": "rule_set_361" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_issue", - "remarks": "rule_set_362" + "remarks": "rule_set_361" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/issue", - "remarks": "rule_set_362" + "remarks": "rule_set_361" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_issue_net", - "remarks": "rule_set_363" + "remarks": "rule_set_362" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/issue.net", - "remarks": "rule_set_363" + "remarks": "rule_set_362" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_issue_net", - "remarks": "rule_set_363" + "remarks": "rule_set_362" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/issue.net", - "remarks": "rule_set_363" + "remarks": "rule_set_362" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_hosts", - "remarks": "rule_set_364" + "remarks": "rule_set_363" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/hosts", - "remarks": "rule_set_364" + "remarks": "rule_set_363" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_hosts", - "remarks": "rule_set_364" + "remarks": "rule_set_363" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/hosts", - "remarks": "rule_set_364" + "remarks": "rule_set_363" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_hostname_file", - "remarks": "rule_set_365" + "remarks": "rule_set_364" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/hostname", - "remarks": "rule_set_365" + "remarks": "rule_set_364" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_hostname_file", - "remarks": "rule_set_365" + "remarks": "rule_set_364" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/hostname", - "remarks": "rule_set_365" + "remarks": "rule_set_364" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_sysconfig_network", - "remarks": "rule_set_366" + "remarks": "rule_set_365" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/sysconfig/network", - "remarks": "rule_set_366" + "remarks": "rule_set_365" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_sysconfig_network", - "remarks": "rule_set_366" + "remarks": "rule_set_365" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/sysconfig/network", - "remarks": "rule_set_366" + "remarks": "rule_set_365" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_networkmanager_system_connections", - "remarks": "rule_set_367" + "remarks": "rule_set_366" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/system-connections/", - "remarks": "rule_set_367" + "remarks": "rule_set_366" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_etc_networkmanager_system_connections", - "remarks": "rule_set_367" + "remarks": "rule_set_366" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/system-connections/", - "remarks": "rule_set_367" + "remarks": "rule_set_366" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_networkmanager", - "remarks": "rule_set_368" + "remarks": "rule_set_367" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/", - "remarks": "rule_set_368" + "remarks": "rule_set_367" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification_networkmanager", - "remarks": "rule_set_368" + "remarks": "rule_set_367" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment - /etc/NetworkManager/", - "remarks": "rule_set_368" + "remarks": "rule_set_367" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands", - "remarks": "rule_set_369" + "remarks": "rule_set_368" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands", - "remarks": "rule_set_369" + "remarks": "rule_set_368" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands", - "remarks": "rule_set_369" + "remarks": "rule_set_368" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands", - "remarks": "rule_set_369" + "remarks": "rule_set_368" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_creat", - "remarks": "rule_set_370" + "remarks": "rule_set_369" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - creat", - "remarks": "rule_set_370" + "remarks": "rule_set_369" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_creat", - "remarks": "rule_set_370" + "remarks": "rule_set_369" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - creat", - "remarks": "rule_set_370" + "remarks": "rule_set_369" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_ftruncate", - "remarks": "rule_set_371" + "remarks": "rule_set_370" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - ftruncate", - "remarks": "rule_set_371" + "remarks": "rule_set_370" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_ftruncate", - "remarks": "rule_set_371" + "remarks": "rule_set_370" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - ftruncate", - "remarks": "rule_set_371" + "remarks": "rule_set_370" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_open", - "remarks": "rule_set_372" + "remarks": "rule_set_371" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - open", - "remarks": "rule_set_372" + "remarks": "rule_set_371" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_open", - "remarks": "rule_set_372" + "remarks": "rule_set_371" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - open", - "remarks": "rule_set_372" + "remarks": "rule_set_371" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_openat", - "remarks": "rule_set_373" + "remarks": "rule_set_372" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - openat", - "remarks": "rule_set_373" + "remarks": "rule_set_372" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_openat", - "remarks": "rule_set_373" + "remarks": "rule_set_372" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - openat", - "remarks": "rule_set_373" + "remarks": "rule_set_372" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_truncate", - "remarks": "rule_set_374" + "remarks": "rule_set_373" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - truncate", - "remarks": "rule_set_374" + "remarks": "rule_set_373" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_truncate", - "remarks": "rule_set_374" + "remarks": "rule_set_373" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - truncate", - "remarks": "rule_set_374" + "remarks": "rule_set_373" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_group", - "remarks": "rule_set_375" + "remarks": "rule_set_374" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/group", - "remarks": "rule_set_375" + "remarks": "rule_set_374" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_group", - "remarks": "rule_set_375" + "remarks": "rule_set_374" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/group", - "remarks": "rule_set_375" + "remarks": "rule_set_374" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_passwd", - "remarks": "rule_set_376" + "remarks": "rule_set_375" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/passwd", - "remarks": "rule_set_376" + "remarks": "rule_set_375" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_passwd", - "remarks": "rule_set_376" + "remarks": "rule_set_375" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/passwd", - "remarks": "rule_set_376" + "remarks": "rule_set_375" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_gshadow", - "remarks": "rule_set_377" + "remarks": "rule_set_376" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/gshadow", - "remarks": "rule_set_377" + "remarks": "rule_set_376" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_gshadow", - "remarks": "rule_set_377" + "remarks": "rule_set_376" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/gshadow", - "remarks": "rule_set_377" + "remarks": "rule_set_376" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_shadow", - "remarks": "rule_set_378" + "remarks": "rule_set_377" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/shadow", - "remarks": "rule_set_378" + "remarks": "rule_set_377" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_shadow", - "remarks": "rule_set_378" + "remarks": "rule_set_377" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/shadow", - "remarks": "rule_set_378" + "remarks": "rule_set_377" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_opasswd", - "remarks": "rule_set_379" + "remarks": "rule_set_378" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", - "remarks": "rule_set_379" + "remarks": "rule_set_378" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_opasswd", - "remarks": "rule_set_379" + "remarks": "rule_set_378" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", - "remarks": "rule_set_379" + "remarks": "rule_set_378" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_nsswitch_conf", - "remarks": "rule_set_380" + "remarks": "rule_set_379" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/nsswitch.conf", - "remarks": "rule_set_380" + "remarks": "rule_set_379" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_nsswitch_conf", - "remarks": "rule_set_380" + "remarks": "rule_set_379" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/nsswitch.conf", - "remarks": "rule_set_380" + "remarks": "rule_set_379" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_pam_conf", - "remarks": "rule_set_381" + "remarks": "rule_set_380" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/pam.conf", - "remarks": "rule_set_381" + "remarks": "rule_set_380" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_pam_conf", - "remarks": "rule_set_381" + "remarks": "rule_set_380" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/pam.conf", - "remarks": "rule_set_381" + "remarks": "rule_set_380" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_pamd", - "remarks": "rule_set_382" + "remarks": "rule_set_381" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/pam.d/", - "remarks": "rule_set_382" + "remarks": "rule_set_381" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_pamd", - "remarks": "rule_set_382" + "remarks": "rule_set_381" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/pam.d/", - "remarks": "rule_set_382" + "remarks": "rule_set_381" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chmod", - "remarks": "rule_set_383" + "remarks": "rule_set_382" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", - "remarks": "rule_set_383" + "remarks": "rule_set_382" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chmod", - "remarks": "rule_set_383" + "remarks": "rule_set_382" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", - "remarks": "rule_set_383" + "remarks": "rule_set_382" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmod", - "remarks": "rule_set_384" + "remarks": "rule_set_383" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmod", - "remarks": "rule_set_384" + "remarks": "rule_set_383" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmod", - "remarks": "rule_set_384" + "remarks": "rule_set_383" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmod", - "remarks": "rule_set_384" + "remarks": "rule_set_383" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat", - "remarks": "rule_set_385" + "remarks": "rule_set_384" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat", - "remarks": "rule_set_385" + "remarks": "rule_set_384" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat", - "remarks": "rule_set_385" + "remarks": "rule_set_384" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat", - "remarks": "rule_set_385" + "remarks": "rule_set_384" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat2", - "remarks": "rule_set_386" + "remarks": "rule_set_385" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat2", - "remarks": "rule_set_386" + "remarks": "rule_set_385" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat2", - "remarks": "rule_set_386" + "remarks": "rule_set_385" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat2", - "remarks": "rule_set_386" + "remarks": "rule_set_385" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chown", - "remarks": "rule_set_387" + "remarks": "rule_set_386" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chown", - "remarks": "rule_set_387" + "remarks": "rule_set_386" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chown", - "remarks": "rule_set_387" + "remarks": "rule_set_386" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chown", - "remarks": "rule_set_387" + "remarks": "rule_set_386" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchown", - "remarks": "rule_set_388" + "remarks": "rule_set_387" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchown", - "remarks": "rule_set_388" + "remarks": "rule_set_387" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchown", - "remarks": "rule_set_388" + "remarks": "rule_set_387" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchown", - "remarks": "rule_set_388" + "remarks": "rule_set_387" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchownat", - "remarks": "rule_set_389" + "remarks": "rule_set_388" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchownat", - "remarks": "rule_set_389" + "remarks": "rule_set_388" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchownat", - "remarks": "rule_set_389" + "remarks": "rule_set_388" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchownat", - "remarks": "rule_set_389" + "remarks": "rule_set_388" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lchown", - "remarks": "rule_set_390" + "remarks": "rule_set_389" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lchown", - "remarks": "rule_set_390" + "remarks": "rule_set_389" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lchown", - "remarks": "rule_set_390" + "remarks": "rule_set_389" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lchown", - "remarks": "rule_set_390" + "remarks": "rule_set_389" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fremovexattr", - "remarks": "rule_set_391" + "remarks": "rule_set_390" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fremovexattr", - "remarks": "rule_set_391" + "remarks": "rule_set_390" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fremovexattr", - "remarks": "rule_set_391" + "remarks": "rule_set_390" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fremovexattr", - "remarks": "rule_set_391" + "remarks": "rule_set_390" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fsetxattr", - "remarks": "rule_set_392" + "remarks": "rule_set_391" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fsetxattr", - "remarks": "rule_set_392" + "remarks": "rule_set_391" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fsetxattr", - "remarks": "rule_set_392" + "remarks": "rule_set_391" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fsetxattr", - "remarks": "rule_set_392" + "remarks": "rule_set_391" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lremovexattr", - "remarks": "rule_set_393" + "remarks": "rule_set_392" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lremovexattr", - "remarks": "rule_set_393" + "remarks": "rule_set_392" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lremovexattr", - "remarks": "rule_set_393" + "remarks": "rule_set_392" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lremovexattr", - "remarks": "rule_set_393" + "remarks": "rule_set_392" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lsetxattr", - "remarks": "rule_set_394" + "remarks": "rule_set_393" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lsetxattr", - "remarks": "rule_set_394" + "remarks": "rule_set_393" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lsetxattr", - "remarks": "rule_set_394" + "remarks": "rule_set_393" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lsetxattr", - "remarks": "rule_set_394" + "remarks": "rule_set_393" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_removexattr", - "remarks": "rule_set_395" + "remarks": "rule_set_394" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - removexattr", - "remarks": "rule_set_395" + "remarks": "rule_set_394" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_removexattr", - "remarks": "rule_set_395" + "remarks": "rule_set_394" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - removexattr", - "remarks": "rule_set_395" + "remarks": "rule_set_394" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_setxattr", - "remarks": "rule_set_396" + "remarks": "rule_set_395" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - setxattr", - "remarks": "rule_set_396" + "remarks": "rule_set_395" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_setxattr", - "remarks": "rule_set_396" + "remarks": "rule_set_395" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - setxattr", - "remarks": "rule_set_396" + "remarks": "rule_set_395" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_media_export", - "remarks": "rule_set_397" + "remarks": "rule_set_396" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Exporting to Media (successful)", - "remarks": "rule_set_397" + "remarks": "rule_set_396" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_media_export", - "remarks": "rule_set_397" + "remarks": "rule_set_396" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Exporting to Media (successful)", - "remarks": "rule_set_397" + "remarks": "rule_set_396" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_utmp", - "remarks": "rule_set_398" + "remarks": "rule_set_397" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information utmp", - "remarks": "rule_set_398" + "remarks": "rule_set_397" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_utmp", - "remarks": "rule_set_398" + "remarks": "rule_set_397" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information utmp", - "remarks": "rule_set_398" + "remarks": "rule_set_397" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_btmp", - "remarks": "rule_set_399" + "remarks": "rule_set_398" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information btmp", - "remarks": "rule_set_399" + "remarks": "rule_set_398" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_btmp", - "remarks": "rule_set_399" + "remarks": "rule_set_398" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information btmp", - "remarks": "rule_set_399" + "remarks": "rule_set_398" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_wtmp", - "remarks": "rule_set_400" + "remarks": "rule_set_399" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", - "remarks": "rule_set_400" + "remarks": "rule_set_399" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_wtmp", - "remarks": "rule_set_400" + "remarks": "rule_set_399" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", - "remarks": "rule_set_400" + "remarks": "rule_set_399" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_faillock", - "remarks": "rule_set_401" + "remarks": "rule_set_400" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - faillock", - "remarks": "rule_set_401" + "remarks": "rule_set_400" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_faillock", - "remarks": "rule_set_401" + "remarks": "rule_set_400" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - faillock", - "remarks": "rule_set_401" + "remarks": "rule_set_400" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_lastlog", - "remarks": "rule_set_402" + "remarks": "rule_set_401" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - lastlog", - "remarks": "rule_set_402" + "remarks": "rule_set_401" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_lastlog", - "remarks": "rule_set_402" + "remarks": "rule_set_401" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - lastlog", - "remarks": "rule_set_402" + "remarks": "rule_set_401" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlink", - "remarks": "rule_set_403" + "remarks": "rule_set_402" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlink", - "remarks": "rule_set_403" + "remarks": "rule_set_402" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlink", - "remarks": "rule_set_403" + "remarks": "rule_set_402" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlink", - "remarks": "rule_set_403" + "remarks": "rule_set_402" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlinkat", - "remarks": "rule_set_404" + "remarks": "rule_set_403" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlinkat", - "remarks": "rule_set_404" + "remarks": "rule_set_403" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlinkat", - "remarks": "rule_set_404" + "remarks": "rule_set_403" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlinkat", - "remarks": "rule_set_404" + "remarks": "rule_set_403" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rename", - "remarks": "rule_set_405" + "remarks": "rule_set_404" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rename", - "remarks": "rule_set_405" + "remarks": "rule_set_404" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rename", - "remarks": "rule_set_405" + "remarks": "rule_set_404" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rename", - "remarks": "rule_set_405" + "remarks": "rule_set_404" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat", - "remarks": "rule_set_406" + "remarks": "rule_set_405" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat", - "remarks": "rule_set_406" + "remarks": "rule_set_405" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat", - "remarks": "rule_set_406" + "remarks": "rule_set_405" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat", - "remarks": "rule_set_406" + "remarks": "rule_set_405" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat2", - "remarks": "rule_set_407" + "remarks": "rule_set_406" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat2", - "remarks": "rule_set_407" + "remarks": "rule_set_406" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat2", - "remarks": "rule_set_407" + "remarks": "rule_set_406" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat2", - "remarks": "rule_set_407" + "remarks": "rule_set_406" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_etc_selinux", - "remarks": "rule_set_408" + "remarks": "rule_set_407" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls (/etc/selinux)", - "remarks": "rule_set_408" + "remarks": "rule_set_407" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_etc_selinux", - "remarks": "rule_set_408" + "remarks": "rule_set_407" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls (/etc/selinux)", - "remarks": "rule_set_408" + "remarks": "rule_set_407" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_usr_share", - "remarks": "rule_set_409" + "remarks": "rule_set_408" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls in usr/share", - "remarks": "rule_set_409" + "remarks": "rule_set_408" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_usr_share", - "remarks": "rule_set_409" + "remarks": "rule_set_408" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls in usr/share", - "remarks": "rule_set_409" + "remarks": "rule_set_408" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chcon", - "remarks": "rule_set_410" + "remarks": "rule_set_409" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chcon", - "remarks": "rule_set_410" + "remarks": "rule_set_409" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chcon", - "remarks": "rule_set_410" + "remarks": "rule_set_409" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chcon", - "remarks": "rule_set_410" + "remarks": "rule_set_409" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_setfacl", - "remarks": "rule_set_411" + "remarks": "rule_set_410" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run setfacl", - "remarks": "rule_set_411" + "remarks": "rule_set_410" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_setfacl", - "remarks": "rule_set_411" + "remarks": "rule_set_410" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run setfacl", - "remarks": "rule_set_411" + "remarks": "rule_set_410" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chacl", - "remarks": "rule_set_412" + "remarks": "rule_set_411" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chacl", - "remarks": "rule_set_412" + "remarks": "rule_set_411" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chacl", - "remarks": "rule_set_412" + "remarks": "rule_set_411" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chacl", - "remarks": "rule_set_412" + "remarks": "rule_set_411" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_usermod", - "remarks": "rule_set_413" + "remarks": "rule_set_412" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - usermod", - "remarks": "rule_set_413" + "remarks": "rule_set_412" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_usermod", - "remarks": "rule_set_413" + "remarks": "rule_set_412" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - usermod", - "remarks": "rule_set_413" + "remarks": "rule_set_412" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_kmod", - "remarks": "rule_set_414" + "remarks": "rule_set_413" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - kmod", - "remarks": "rule_set_414" + "remarks": "rule_set_413" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands_kmod", - "remarks": "rule_set_414" + "remarks": "rule_set_413" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands - kmod", - "remarks": "rule_set_414" + "remarks": "rule_set_413" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_init", - "remarks": "rule_set_415" + "remarks": "rule_set_414" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading - init_module", - "remarks": "rule_set_415" + "remarks": "rule_set_414" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_init", - "remarks": "rule_set_415" + "remarks": "rule_set_414" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading - init_module", - "remarks": "rule_set_415" + "remarks": "rule_set_414" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_finit", - "remarks": "rule_set_416" + "remarks": "rule_set_415" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - finit_module", - "remarks": "rule_set_416" + "remarks": "rule_set_415" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_finit", - "remarks": "rule_set_416" + "remarks": "rule_set_415" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - finit_module", - "remarks": "rule_set_416" + "remarks": "rule_set_415" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_delete", - "remarks": "rule_set_417" + "remarks": "rule_set_416" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Unloading - delete_module", - "remarks": "rule_set_417" + "remarks": "rule_set_416" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_delete", - "remarks": "rule_set_417" + "remarks": "rule_set_416" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Unloading - delete_module", - "remarks": "rule_set_417" + "remarks": "rule_set_416" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_query", - "remarks": "rule_set_418" + "remarks": "rule_set_417" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - query_module", - "remarks": "rule_set_418" + "remarks": "rule_set_417" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading_query", - "remarks": "rule_set_418" + "remarks": "rule_set_417" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading - query_module", - "remarks": "rule_set_418" + "remarks": "rule_set_417" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_continue_loading", - "remarks": "rule_set_419" + "remarks": "rule_set_418" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Audit Configuration is Loaded Regardless of Errors", - "remarks": "rule_set_419" + "remarks": "rule_set_418" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_continue_loading", - "remarks": "rule_set_419" + "remarks": "rule_set_418" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the Audit Configuration is Loaded Regardless of Errors", - "remarks": "rule_set_419" + "remarks": "rule_set_418" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_immutable", - "remarks": "rule_set_420" + "remarks": "rule_set_419" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Make the auditd Configuration Immutable", - "remarks": "rule_set_420" + "remarks": "rule_set_419" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_immutable", - "remarks": "rule_set_420" + "remarks": "rule_set_419" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Make the auditd Configuration Immutable", - "remarks": "rule_set_420" + "remarks": "rule_set_419" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_var_log_audit", - "remarks": "rule_set_421" + "remarks": "rule_set_420" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0750 or Less Permissive", - "remarks": "rule_set_421" + "remarks": "rule_set_420" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_permissions_var_log_audit", - "remarks": "rule_set_421" + "remarks": "rule_set_420" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0750 or Less Permissive", - "remarks": "rule_set_421" + "remarks": "rule_set_420" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_var_log_audit", - "remarks": "rule_set_422" + "remarks": "rule_set_421" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0640 or Less Permissive", - "remarks": "rule_set_422" + "remarks": "rule_set_421" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_var_log_audit", - "remarks": "rule_set_422" + "remarks": "rule_set_421" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0640 or Less Permissive", - "remarks": "rule_set_422" + "remarks": "rule_set_421" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_var_log_audit_stig", - "remarks": "rule_set_423" + "remarks": "rule_set_422" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Owned By Root", - "remarks": "rule_set_423" + "remarks": "rule_set_422" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_var_log_audit_stig", - "remarks": "rule_set_423" + "remarks": "rule_set_422" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Owned By Root", - "remarks": "rule_set_423" + "remarks": "rule_set_422" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_group_ownership_var_log_audit", - "remarks": "rule_set_424" + "remarks": "rule_set_423" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Group Owned By Root", - "remarks": "rule_set_424" + "remarks": "rule_set_423" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_group_ownership_var_log_audit", - "remarks": "rule_set_424" + "remarks": "rule_set_423" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Group Owned By Root", - "remarks": "rule_set_424" + "remarks": "rule_set_423" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_audit_configuration", - "remarks": "rule_set_425" + "remarks": "rule_set_424" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Permissions are 640 or More Restrictive", - "remarks": "rule_set_425" + "remarks": "rule_set_424" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_audit_configuration", - "remarks": "rule_set_425" + "remarks": "rule_set_424" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Permissions are 640 or More Restrictive", - "remarks": "rule_set_425" + "remarks": "rule_set_424" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_audit_configuration", - "remarks": "rule_set_426" + "remarks": "rule_set_425" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Must Be Owned By Root", - "remarks": "rule_set_426" + "remarks": "rule_set_425" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_audit_configuration", - "remarks": "rule_set_426" + "remarks": "rule_set_425" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Must Be Owned By Root", - "remarks": "rule_set_426" + "remarks": "rule_set_425" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_audit_configuration", - "remarks": "rule_set_427" + "remarks": "rule_set_426" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Must Be Owned By Group root", - "remarks": "rule_set_427" + "remarks": "rule_set_426" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_audit_configuration", - "remarks": "rule_set_427" + "remarks": "rule_set_426" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Audit Configuration Files Must Be Owned By Group root", - "remarks": "rule_set_427" + "remarks": "rule_set_426" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_audit_binaries", - "remarks": "rule_set_428" + "remarks": "rule_set_427" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools Have Mode 0755 or less", - "remarks": "rule_set_428" + "remarks": "rule_set_427" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_audit_binaries", - "remarks": "rule_set_428" + "remarks": "rule_set_427" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools Have Mode 0755 or less", - "remarks": "rule_set_428" + "remarks": "rule_set_427" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_audit_binaries", - "remarks": "rule_set_429" + "remarks": "rule_set_428" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools are owned by root", - "remarks": "rule_set_429" + "remarks": "rule_set_428" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_audit_binaries", - "remarks": "rule_set_429" + "remarks": "rule_set_428" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools are owned by root", - "remarks": "rule_set_429" + "remarks": "rule_set_428" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_audit_binaries", - "remarks": "rule_set_430" + "remarks": "rule_set_429" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools are owned by group root", - "remarks": "rule_set_430" + "remarks": "rule_set_429" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_groupownership_audit_binaries", - "remarks": "rule_set_430" + "remarks": "rule_set_429" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that audit tools are owned by group root", - "remarks": "rule_set_430" + "remarks": "rule_set_429" } ], "control-implementations": [ { - "uuid": "9aadc9ec-9ac5-4734-a21a-e6becafd9a08", + "uuid": "99608dbc-6aec-4e42-86b6-8953960612c7", "source": "trestle://profiles/rhel10-cis_rhel10-l2_workstation/profile.json", "description": "Control implementation for cis_workstation_l2", "props": [ @@ -24757,13 +24716,13 @@ { "param-id": "var_password_hashing_algorithm", "values": [ - "yescrypt" + "cis_rhel10" ] }, { "param-id": "var_password_hashing_algorithm_pam", "values": [ - "yescrypt" + "cis_rhel10" ] }, { @@ -24877,7 +24836,7 @@ ], "implemented-requirements": [ { - "uuid": "588a8f67-fef5-4ab8-ade6-9bafa9219dc5", + "uuid": "1b09085d-edf8-4fa5-9200-d977b68e7464", "control-id": "cis_rhel10_1-1.1.6", "description": "No notes for control-id 1.1.1.6.", "props": [ @@ -24894,7 +24853,7 @@ ] }, { - "uuid": "5ac7866e-c6fb-4c02-bb78-b9038e208201", + "uuid": "0260b8f7-7e16-4fa4-98d2-5a7a1c984731", "control-id": "cis_rhel10_1-1.1.7", "description": "No notes for control-id 1.1.1.7.", "props": [ @@ -24911,7 +24870,7 @@ ] }, { - "uuid": "e2ae9758-b8e3-4efb-9d69-6e032e6ae44b", + "uuid": "12416322-63c0-49f3-b6ab-f9df9f5feb4c", "control-id": "cis_rhel10_1-1.1.8", "description": "No notes for control-id 1.1.1.8.", "props": [ @@ -24928,7 +24887,7 @@ ] }, { - "uuid": "39787b34-85c3-4738-a075-633d4341bd6e", + "uuid": "929efb8d-614b-48d4-b2ca-1dd34fd2b546", "control-id": "cis_rhel10_1-1.1.9", "description": "No notes for control-id 1.1.1.9.", "props": [ @@ -24945,7 +24904,7 @@ ] }, { - "uuid": "74304013-d196-427a-9f4f-f10466a6fd74", + "uuid": "b15f4110-4a69-498e-99c6-8b92fe17d466", "control-id": "cis_rhel10_1-1.1.10", "description": "No notes for control-id 1.1.1.10.", "props": [ @@ -24962,7 +24921,7 @@ ] }, { - "uuid": "47d73692-6c7b-41f9-8010-a3783e58ccce", + "uuid": "39af2182-d8ad-4296-875d-921936a0e130", "control-id": "cis_rhel10_1-1.2.3.1", "description": "No notes for control-id 1.1.2.3.1.", "props": [ @@ -24979,7 +24938,7 @@ ] }, { - "uuid": "afa556da-8f71-49ab-86b5-da7b50efd2e7", + "uuid": "2c47e39d-dc11-4433-acb2-47ce62527308", "control-id": "cis_rhel10_1-1.2.4.1", "description": "No notes for control-id 1.1.2.4.1.", "props": [ @@ -24996,7 +24955,7 @@ ] }, { - "uuid": "b5bc05c5-b1bc-4722-9aee-37ca1382a61d", + "uuid": "ffe3a8e8-243f-4a6f-b8b0-4853d1ea01c3", "control-id": "cis_rhel10_1-1.2.5.1", "description": "No notes for control-id 1.1.2.5.1.", "props": [ @@ -25013,7 +24972,7 @@ ] }, { - "uuid": "36744a83-43cd-4b31-8473-2ef99386fa30", + "uuid": "1570b41e-5afe-406a-a96d-0296c4fbd26c", "control-id": "cis_rhel10_1-1.2.6.1", "description": "No notes for control-id 1.1.2.6.1.", "props": [ @@ -25030,7 +24989,7 @@ ] }, { - "uuid": "aee91ed9-bea0-4b08-99a5-e9d83cab02ff", + "uuid": "e2ae8efd-338b-4eb1-a41e-5fc810ef19c9", "control-id": "cis_rhel10_1-1.2.7.1", "description": "No notes for control-id 1.1.2.7.1.", "props": [ @@ -25047,7 +25006,7 @@ ] }, { - "uuid": "2daf5b14-c33a-4d89-8a1f-9a426d3862a5", + "uuid": "52e55674-97c9-4b24-85da-20c85f94ca7e", "control-id": "cis_rhel10_1-2.1.3", "description": "The description for control-id cis_rhel10_1-2.1.3.", "props": [ @@ -25060,7 +25019,7 @@ ] }, { - "uuid": "c05476f7-48be-4cd2-8002-620f99bc01a3", + "uuid": "7e9b1de3-6255-40d3-b69d-8e660686f6c0", "control-id": "cis_rhel10_1-2.1.5", "description": "No notes for control-id 1.2.1.5.", "props": [ @@ -25077,7 +25036,7 @@ ] }, { - "uuid": "d91dd197-227d-46e9-83fe-82999396de8c", + "uuid": "ab48c788-2605-47f8-9ea4-f184db586627", "control-id": "cis_rhel10_1-3.1.5", "description": "No notes for control-id 1.3.1.5.", "props": [ @@ -25094,7 +25053,7 @@ ] }, { - "uuid": "c1ba31cc-6e96-4c14-9e3d-a67f2cf63b2e", + "uuid": "55ef8e9f-0502-4115-b4bb-8c7fbf4d80e7", "control-id": "cis_rhel10_1-3.1.6", "description": "The description for control-id cis_rhel10_1-3.1.6.", "props": [ @@ -25107,7 +25066,7 @@ ] }, { - "uuid": "2bed0fc8-8358-4db7-9029-f7a6c1457366", + "uuid": "623eb029-7995-4ed5-9e9e-3733078c5e81", "control-id": "cis_rhel10_1-5.3", "description": "No notes for control-id 1.5.3.", "props": [ @@ -25124,7 +25083,7 @@ ] }, { - "uuid": "da624951-a8a3-4999-ad59-66d5c0807471", + "uuid": "7d782a0b-ff7b-44a9-b40c-87f1f07d9cc6", "control-id": "cis_rhel10_1-8.4", "description": "No notes for control-id 1.8.4.", "props": [ @@ -25146,7 +25105,7 @@ ] }, { - "uuid": "f583ca89-2661-4f50-99b4-985c114e19f1", + "uuid": "1ec38b92-8fa5-43fe-bd96-722e15f8791b", "control-id": "cis_rhel10_1-8.6", "description": "No notes for control-id 1.8.6.", "props": [ @@ -25163,7 +25122,7 @@ ] }, { - "uuid": "20e893aa-7d10-41d5-aea0-251863b3110f", + "uuid": "e8ddf69d-cf53-4166-8f90-defc6b913f90", "control-id": "cis_rhel10_2-1.1", "description": "No notes for control-id 2.1.1.", "props": [ @@ -25180,7 +25139,7 @@ ] }, { - "uuid": "2e3b53e6-192a-4c4a-bb70-0b72926a7e6f", + "uuid": "2017262b-c276-4160-a6ef-ff7657f35e14", "control-id": "cis_rhel10_2-1.2", "description": "No notes for control-id 2.1.2.", "props": [ @@ -25197,7 +25156,7 @@ ] }, { - "uuid": "a4154da1-6385-4ab2-9456-67d3b2064ed8", + "uuid": "aff1b034-012d-4689-8567-2bcd0770ff65", "control-id": "cis_rhel10_2-1.3", "description": "No notes for control-id 2.1.3.", "props": [ @@ -25214,7 +25173,7 @@ ] }, { - "uuid": "90a17122-470b-426e-926f-c06e33606c84", + "uuid": "35e1eb01-9570-4481-8876-8d0a32e059f1", "control-id": "cis_rhel10_2-2.2", "description": "No notes for control-id 2.2.2.", "props": [ @@ -25231,7 +25190,7 @@ ] }, { - "uuid": "afb46c93-2637-4858-99e2-e6601bd65769", + "uuid": "ce2beef9-fb9c-4e3c-879c-9abcde03f8af", "control-id": "cis_rhel10_3-1.3", "description": "No notes for control-id 3.1.3.", "props": [ @@ -25248,7 +25207,7 @@ ] }, { - "uuid": "ec2d54f4-0ef8-4646-a6e2-880227c1ab10", + "uuid": "bc84ac44-ac91-4540-a330-968696c12639", "control-id": "cis_rhel10_5-2.4", "description": "No notes for control-id 5.2.4.", "props": [ @@ -25265,7 +25224,7 @@ ] }, { - "uuid": "b16c4004-d0a6-46d0-b823-b4600a4789bb", + "uuid": "1722a931-c387-4eb6-b5a3-e188ea00ea20", "control-id": "cis_rhel10_5-3.2.1.3", "description": "No notes for control-id 5.3.2.1.3.", "props": [ @@ -25282,7 +25241,7 @@ ] }, { - "uuid": "cae6975e-518b-4fa2-823e-56b29ae1c2b7", + "uuid": "61d1f7f3-8f3b-4cc2-9128-0a67a1206536", "control-id": "cis_rhel10_5-4.1.2", "description": "No notes for control-id 5.4.1.2.", "props": [ @@ -25304,7 +25263,7 @@ ] }, { - "uuid": "4d3f84eb-17e1-444b-9bb4-a89494aaeb50", + "uuid": "d984c8ad-aa4e-4dee-a42c-c7dba2c776e6", "control-id": "cis_rhel10_5-4.3.1", "description": "No notes for control-id 5.4.3.1.", "props": [ @@ -25321,7 +25280,7 @@ ] }, { - "uuid": "e34180ae-8680-4746-8947-1b204c25ace7", + "uuid": "a7d318a4-7b2c-4756-a395-2e048ae023b3", "control-id": "cis_rhel10_6-3.1.1", "description": "No notes for control-id 6.3.1.1.", "props": [ @@ -25343,7 +25302,7 @@ ] }, { - "uuid": "0389d8af-c140-4249-aa97-91180e214aff", + "uuid": "52aefce6-e0f5-4ce2-afe5-461cf55edb50", "control-id": "cis_rhel10_6-3.1.2", "description": "No notes for control-id 6.3.1.2.", "props": [ @@ -25360,7 +25319,7 @@ ] }, { - "uuid": "969f5ac5-52e0-4066-b899-1225bb44f4b9", + "uuid": "67def5d0-506a-4b36-abcb-518e6773024b", "control-id": "cis_rhel10_6-3.1.3", "description": "No notes for control-id 6.3.1.3.", "props": [ @@ -25377,7 +25336,7 @@ ] }, { - "uuid": "1f24b996-c59b-4d90-b058-82e957a1f8ff", + "uuid": "85532f19-283c-4f2a-9c6a-5fb6c15b1098", "control-id": "cis_rhel10_6-3.1.4", "description": "No notes for control-id 6.3.1.4.", "props": [ @@ -25394,7 +25353,7 @@ ] }, { - "uuid": "11204d59-de7f-496f-b21c-a9136d4f84d2", + "uuid": "1d3124ec-c66d-4efe-ba8e-f4f031d6db32", "control-id": "cis_rhel10_6-3.2.1", "description": "No notes for control-id 6.3.2.1.", "props": [ @@ -25411,7 +25370,7 @@ ] }, { - "uuid": "a4bd3afc-3731-4c9f-bc6f-b54620659b4b", + "uuid": "962cbaa4-e8bc-49b8-9352-16c3ee142c6d", "control-id": "cis_rhel10_6-3.2.2", "description": "No notes for control-id 6.3.2.2.", "props": [ @@ -25428,7 +25387,7 @@ ] }, { - "uuid": "f6c730b7-9dd2-4032-8a8d-d145aba8787a", + "uuid": "83e507db-0c8f-46ae-8027-2fab672281d2", "control-id": "cis_rhel10_6-3.2.3", "description": "No notes for control-id 6.3.2.3.", "props": [ @@ -25450,7 +25409,7 @@ ] }, { - "uuid": "5eed933d-9222-4415-be8b-615564b0f042", + "uuid": "882a45c9-5235-40b8-b9d0-fbb09b33feb5", "control-id": "cis_rhel10_6-3.2.4", "description": "No notes for control-id 6.3.2.4.", "props": [ @@ -25472,7 +25431,7 @@ ] }, { - "uuid": "2fbc5be9-22a8-4c62-9c3c-a5545f133f22", + "uuid": "04b33037-d322-4a91-a577-c1a442cfe9c3", "control-id": "cis_rhel10_6-3.3.1", "description": "No notes for control-id 6.3.3.1.", "props": [ @@ -25489,7 +25448,7 @@ ] }, { - "uuid": "5a7d2367-1b69-40e8-acc9-a957a01df8b0", + "uuid": "5be79d39-10aa-484b-8526-84cd6411aa3a", "control-id": "cis_rhel10_6-3.3.2", "description": "No notes for control-id 6.3.3.2.", "props": [ @@ -25506,7 +25465,7 @@ ] }, { - "uuid": "385e8155-b4a0-4ffa-a697-49a3cf047b23", + "uuid": "8b0875b3-075e-47f1-9878-abf23d9ea302", "control-id": "cis_rhel10_6-3.3.3", "description": "No notes for control-id 6.3.3.3.", "props": [ @@ -25523,7 +25482,7 @@ ] }, { - "uuid": "489f18cf-821e-49a7-9550-5c895e5aa2e5", + "uuid": "a99cb44e-c0c6-47c3-81b8-528e5db5bd89", "control-id": "cis_rhel10_6-3.3.4", "description": "No notes for control-id 6.3.3.4.", "props": [ @@ -25555,7 +25514,7 @@ ] }, { - "uuid": "8da70956-7c06-4822-a452-a3bab0e39129", + "uuid": "718ccfe1-d0fb-418e-b9c4-256a3159c825", "control-id": "cis_rhel10_6-3.3.5", "description": "No notes for control-id 6.3.3.5.", "props": [ @@ -25577,7 +25536,7 @@ ] }, { - "uuid": "d3acccc1-c0f0-4687-b4b5-5df9398e292d", + "uuid": "4e46b6e7-767b-4f61-8231-282495c4a0b7", "control-id": "cis_rhel10_6-3.3.6", "description": "No notes for control-id 6.3.3.6.", "props": [ @@ -25599,7 +25558,7 @@ ] }, { - "uuid": "e7c41229-e628-4a3d-8418-c0eb2a1ddba4", + "uuid": "c076f1c7-40e9-46d3-86ba-88baf02ab622", "control-id": "cis_rhel10_6-3.3.7", "description": "No notes for control-id 6.3.3.7.", "props": [ @@ -25621,7 +25580,7 @@ ] }, { - "uuid": "84bb682b-9c11-494a-9747-93583d625b0e", + "uuid": "4a836a25-112d-4131-ac4f-8211411ec345", "control-id": "cis_rhel10_6-3.3.8", "description": "No notes for control-id 6.3.3.8.", "props": [ @@ -25643,7 +25602,7 @@ ] }, { - "uuid": "78f25ff6-f7a1-4f01-bad7-dbb5b747218b", + "uuid": "517a799a-75cf-489c-9576-b11050b58cee", "control-id": "cis_rhel10_6-3.3.9", "description": "No notes for control-id 6.3.3.9.", "props": [ @@ -25660,7 +25619,7 @@ ] }, { - "uuid": "64e55f26-58a2-4c8f-8528-a5bd33c0f1e8", + "uuid": "9aaa0476-4949-4403-abcc-913c613b2809", "control-id": "cis_rhel10_6-3.3.10", "description": "No notes for control-id 6.3.3.10.", "props": [ @@ -25677,7 +25636,7 @@ ] }, { - "uuid": "b530f33a-ffe7-4232-93bf-f1cf15392833", + "uuid": "b0b4bc71-94be-406d-b18e-8dae9aed4cec", "control-id": "cis_rhel10_6-3.3.11", "description": "No notes for control-id 6.3.3.11.", "props": [ @@ -25714,7 +25673,7 @@ ] }, { - "uuid": "fc33bac9-42d8-43c4-aad5-ddb0c7971a01", + "uuid": "27616b6b-1788-46db-80f8-cf5249ce4443", "control-id": "cis_rhel10_6-3.3.12", "description": "No notes for control-id 6.3.3.12.", "props": [ @@ -25731,7 +25690,7 @@ ] }, { - "uuid": "b7268a2f-ab42-4287-a49d-14a1cd280c30", + "uuid": "50e951a8-cc06-42a9-b1f8-7454b7a615bb", "control-id": "cis_rhel10_6-3.3.13", "description": "No notes for control-id 6.3.3.13.", "props": [ @@ -25748,7 +25707,7 @@ ] }, { - "uuid": "1cfb3cf8-6a95-4636-813f-5c280f321299", + "uuid": "e62d0466-5971-41f7-86ca-124acb02a4ae", "control-id": "cis_rhel10_6-3.3.14", "description": "No notes for control-id 6.3.3.14.", "props": [ @@ -25770,7 +25729,7 @@ ] }, { - "uuid": "4d0c5794-e70c-4c44-bd61-022ea6cb0bbe", + "uuid": "caa33515-3d08-4548-a3e4-4531643b523e", "control-id": "cis_rhel10_6-3.3.15", "description": "No notes for control-id 6.3.3.15.", "props": [ @@ -25787,7 +25746,7 @@ ] }, { - "uuid": "d7c203df-4735-4f51-99cc-e8f0e463a516", + "uuid": "35455c38-9b5a-4d80-9085-52ddeb3fdf5a", "control-id": "cis_rhel10_6-3.3.16", "description": "No notes for control-id 6.3.3.16.", "props": [ @@ -25804,7 +25763,7 @@ ] }, { - "uuid": "678be193-4f76-41bc-88bb-e869e51cd9c5", + "uuid": "a2856ac2-af95-4528-a6ec-63c1b0ff625a", "control-id": "cis_rhel10_6-3.3.17", "description": "No notes for control-id 6.3.3.17.", "props": [ @@ -25826,7 +25785,7 @@ ] }, { - "uuid": "326a2b22-c442-491f-8765-922db7c41a6c", + "uuid": "59d8669d-10af-4f60-aa4c-70d462b85bf9", "control-id": "cis_rhel10_6-3.3.18", "description": "No notes for control-id 6.3.3.18.", "props": [ @@ -25858,7 +25817,7 @@ ] }, { - "uuid": "053890d7-2b17-47b6-b886-5af4f3e1a15d", + "uuid": "0d7e3717-80f2-409e-ab8f-261fed850682", "control-id": "cis_rhel10_6-3.3.19", "description": "No notes for control-id 6.3.3.19.", "props": [ @@ -25890,7 +25849,7 @@ ] }, { - "uuid": "eb3b4f68-abed-4353-b513-21e21522ac67", + "uuid": "bfead6fc-ef90-4012-a0a8-1bc2bb5fdd9f", "control-id": "cis_rhel10_6-3.3.20", "description": "No notes for control-id 6.3.3.20.", "props": [ @@ -25932,7 +25891,7 @@ ] }, { - "uuid": "e9f73a81-3f9d-4c3b-a100-13f02af54b27", + "uuid": "7e522aea-c1e3-45d5-aa0a-11c541542422", "control-id": "cis_rhel10_6-3.3.21", "description": "No notes for control-id 6.3.3.21.", "props": [ @@ -25949,7 +25908,7 @@ ] }, { - "uuid": "c6d9ab72-94a9-4cab-bedb-7fe5526e075a", + "uuid": "bbc6f01e-561f-4d1b-88f3-2f1cc291bda0", "control-id": "cis_rhel10_6-3.3.22", "description": "No notes for control-id 6.3.3.22.", "props": [ @@ -25976,7 +25935,7 @@ ] }, { - "uuid": "a21db416-2529-4a22-a49e-a802518ce8ca", + "uuid": "3bcdeb67-cdbf-410d-9095-3f9cb480967f", "control-id": "cis_rhel10_6-3.3.23", "description": "No notes for control-id 6.3.3.23.", "props": [ @@ -25998,7 +25957,7 @@ ] }, { - "uuid": "50f845ee-8c54-4bc4-b161-8a597de7c39e", + "uuid": "0ce30678-5935-47cc-a130-378f65e2d9d7", "control-id": "cis_rhel10_6-3.3.24", "description": "No notes for control-id 6.3.3.24.", "props": [ @@ -26020,7 +25979,7 @@ ] }, { - "uuid": "729749f7-b836-4169-8286-0520e7b3bf2f", + "uuid": "b6f841b1-b1a2-47f2-9ec9-22ccb5d534a2", "control-id": "cis_rhel10_6-3.3.25", "description": "No notes for control-id 6.3.3.25.", "props": [ @@ -26047,7 +26006,7 @@ ] }, { - "uuid": "6c844571-6de1-480c-a926-a36bc2b4111f", + "uuid": "c8c99be5-48e0-4479-8b26-c2343f43ddd9", "control-id": "cis_rhel10_6-3.3.26", "description": "No notes for control-id 6.3.3.26.", "props": [ @@ -26069,7 +26028,7 @@ ] }, { - "uuid": "ff3c959f-04ea-41df-9074-ad2f3c904425", + "uuid": "70406cb2-b19d-4926-bcdf-928a2dcbea53", "control-id": "cis_rhel10_6-3.3.27", "description": "No notes for control-id 6.3.3.27.", "props": [ @@ -26086,7 +26045,7 @@ ] }, { - "uuid": "9050157e-a632-4649-961b-fdd653e5041e", + "uuid": "c9cc7459-a739-4045-93ff-00ea1009299b", "control-id": "cis_rhel10_6-3.3.28", "description": "No notes for control-id 6.3.3.28.", "props": [ @@ -26103,7 +26062,7 @@ ] }, { - "uuid": "1c5aebef-15dd-448f-bb60-0977f061cc65", + "uuid": "07426558-cc38-4192-82fb-57f16661d98e", "control-id": "cis_rhel10_6-3.3.29", "description": "No notes for control-id 6.3.3.29.", "props": [ @@ -26120,7 +26079,7 @@ ] }, { - "uuid": "66be89e6-1b05-488c-a5f6-9a66d67098a8", + "uuid": "185d6c8e-b5d4-4268-b2ff-f499b93db495", "control-id": "cis_rhel10_6-3.3.30", "description": "No notes for control-id 6.3.3.30.", "props": [ @@ -26137,7 +26096,7 @@ ] }, { - "uuid": "3259dc07-b947-4bb6-84e1-539c5ca6fa34", + "uuid": "448bd0f4-8db9-4ee8-bdde-9a404c252b0a", "control-id": "cis_rhel10_6-3.3.31", "description": "No notes for control-id 6.3.3.31.", "props": [ @@ -26154,7 +26113,7 @@ ] }, { - "uuid": "f27dc512-5e45-4f45-ae80-0ee6f77233be", + "uuid": "49292af1-525e-44f7-86f4-dd90f7e65a2e", "control-id": "cis_rhel10_6-3.3.32", "description": "No notes for control-id 6.3.3.32.", "props": [ @@ -26176,7 +26135,7 @@ ] }, { - "uuid": "ceaed706-c5e4-48d6-b838-3271b5f3e07b", + "uuid": "f8e48494-2e8a-4973-b925-396376045e78", "control-id": "cis_rhel10_6-3.3.33", "description": "No notes for control-id 6.3.3.33.", "props": [ @@ -26193,7 +26152,7 @@ ] }, { - "uuid": "b5ffa3b7-aedb-401f-8e4f-c84955e2c255", + "uuid": "3ad0f727-a79a-4f8a-9fb7-70fd5613b480", "control-id": "cis_rhel10_6-3.3.34", "description": "No notes for control-id 6.3.3.34.", "props": [ @@ -26210,7 +26169,7 @@ ] }, { - "uuid": "1db16953-c64a-41fc-97dc-b454f4f135d8", + "uuid": "a4742a96-9ee5-45f4-92af-b0d972e831a2", "control-id": "cis_rhel10_6-3.3.35", "description": "No notes for control-id 6.3.3.35.", "props": [ @@ -26227,7 +26186,7 @@ ] }, { - "uuid": "6cf5c10f-b439-40de-95a7-83346349cd40", + "uuid": "392a59bd-ad7a-42e4-8736-3e09fea0bd0e", "control-id": "cis_rhel10_6-3.3.36", "description": "No notes for control-id 6.3.3.36.", "props": [ @@ -26244,7 +26203,7 @@ ] }, { - "uuid": "d490770e-3154-497b-9c0d-e4adc3f13a27", + "uuid": "dae9cda3-191d-4f77-92da-d4d29abf8d5d", "control-id": "cis_rhel10_6-3.3.37", "description": "The description for control-id cis_rhel10_6-3.3.37.", "props": [ @@ -26257,7 +26216,7 @@ ] }, { - "uuid": "a5cee228-b085-4317-8f41-23b095b2305a", + "uuid": "3cd4ce51-ddeb-4329-93e6-fa8045fcc1ec", "control-id": "cis_rhel10_6-3.4.1", "description": "No notes for control-id 6.3.4.1.", "props": [ @@ -26274,7 +26233,7 @@ ] }, { - "uuid": "22fe5919-f868-475c-961e-33dab318c800", + "uuid": "14a20c5f-22d5-4ed6-928e-a51082acc9cf", "control-id": "cis_rhel10_6-3.4.2", "description": "No notes for control-id 6.3.4.2.", "props": [ @@ -26291,7 +26250,7 @@ ] }, { - "uuid": "f67a5a33-f724-4a82-b5db-289fd945a62a", + "uuid": "825515ab-6200-433f-ac07-a4e9cfca269a", "control-id": "cis_rhel10_6-3.4.3", "description": "No notes for control-id 6.3.4.3.", "props": [ @@ -26308,7 +26267,7 @@ ] }, { - "uuid": "dfa5b83e-1eed-4de8-87a8-7883b8682059", + "uuid": "aa65f56e-6ff0-44ba-acba-cf465a51f299", "control-id": "cis_rhel10_6-3.4.4", "description": "No notes for control-id 6.3.4.4.", "props": [ @@ -26325,7 +26284,7 @@ ] }, { - "uuid": "b49724df-8160-4e4d-bdda-ae147d6cbfdb", + "uuid": "9b25c3fa-d94d-497b-97ca-d11477b5bf30", "control-id": "cis_rhel10_6-3.4.5", "description": "No notes for control-id 6.3.4.5.", "props": [ @@ -26342,7 +26301,7 @@ ] }, { - "uuid": "3d5b1d42-1d7a-44a0-addf-188c5bc86cf3", + "uuid": "58f55f01-d029-428a-afeb-6e9f64abc5b7", "control-id": "cis_rhel10_6-3.4.6", "description": "No notes for control-id 6.3.4.6.", "props": [ @@ -26359,7 +26318,7 @@ ] }, { - "uuid": "5973ac04-4818-4ee8-be80-9b3129cc7a7b", + "uuid": "1a6fe145-6481-42aa-8943-24376796d2b4", "control-id": "cis_rhel10_6-3.4.7", "description": "No notes for control-id 6.3.4.7.", "props": [ @@ -26376,7 +26335,7 @@ ] }, { - "uuid": "abf0209d-79a4-4074-a003-bf65a01ee83c", + "uuid": "e251dd32-4886-4253-ad11-0d1882ea0e8e", "control-id": "cis_rhel10_6-3.4.8", "description": "No notes for control-id 6.3.4.8.", "props": [ @@ -26393,7 +26352,7 @@ ] }, { - "uuid": "d33957a8-7b53-4402-a26c-ab608588c994", + "uuid": "826b3dfe-265c-4186-b407-41e2c577f508", "control-id": "cis_rhel10_6-3.4.9", "description": "No notes for control-id 6.3.4.9.", "props": [ @@ -26410,7 +26369,7 @@ ] }, { - "uuid": "ed452fd6-0908-4774-acdf-18f8e5d0fd29", + "uuid": "e8605e15-b46a-4331-a611-b00707580978", "control-id": "cis_rhel10_6-3.4.10", "description": "No notes for control-id 6.3.4.10.", "props": [ @@ -26427,7 +26386,7 @@ ] }, { - "uuid": "3e7e5e34-ce71-4b98-8ae3-0c633fa8baab", + "uuid": "7564a952-4504-42ee-9934-28cdd213e5d6", "control-id": "reload_dconf_db", "description": "This is a helper rule to reload Dconf database correctly.", "props": [ @@ -26444,7 +26403,7 @@ ] }, { - "uuid": "62105a9e-107d-4c16-b3ad-47a37e2e17b3", + "uuid": "17ca3286-b9fa-4dd0-b9c6-cb1d22c632d9", "control-id": "cis_rhel10_1-1.1.1", "description": "No notes for control-id 1.1.1.1.", "props": [ @@ -26461,7 +26420,7 @@ ] }, { - "uuid": "3b1e8847-3c66-437c-9eac-e090a069da7c", + "uuid": "5108b64c-2d2b-461c-af9a-29b2718234a7", "control-id": "cis_rhel10_1-1.1.2", "description": "No notes for control-id 1.1.1.2.", "props": [ @@ -26478,7 +26437,7 @@ ] }, { - "uuid": "c97e8005-3224-4d9d-b70c-220bea1b95d4", + "uuid": "66eaed8a-372d-4de8-8978-91e25f4a0f1c", "control-id": "cis_rhel10_1-1.1.3", "description": "No notes for control-id 1.1.1.3.", "props": [ @@ -26495,7 +26454,7 @@ ] }, { - "uuid": "8d0a63ad-65df-4fd0-bca6-19941f68b948", + "uuid": "9c7e21a7-8ddb-4221-87f3-26b821006952", "control-id": "cis_rhel10_1-1.1.4", "description": "No notes for control-id 1.1.1.4.", "props": [ @@ -26512,7 +26471,7 @@ ] }, { - "uuid": "d72e1494-3cbe-4e8c-b178-1a7450e49422", + "uuid": "84799d55-ef4e-4ad1-b7ad-f1b0542adc65", "control-id": "cis_rhel10_1-1.1.5", "description": "No notes for control-id 1.1.1.5.", "props": [ @@ -26529,7 +26488,7 @@ ] }, { - "uuid": "ea4ea8d1-c0f5-4a03-aabf-5ac87759fb05", + "uuid": "8315e083-2f55-4809-8559-72a65797384a", "control-id": "cis_rhel10_1-1.1.11", "description": "The description for control-id cis_rhel10_1-1.1.11.", "props": [ @@ -26542,7 +26501,7 @@ ] }, { - "uuid": "b641d851-9d1a-4d1a-8545-ce9fb59402ed", + "uuid": "0917dc43-1c32-4099-9602-35ffa0e4db4f", "control-id": "cis_rhel10_1-1.2.1.1", "description": "No notes for control-id 1.1.2.1.1.", "props": [ @@ -26559,7 +26518,7 @@ ] }, { - "uuid": "a48fbd76-a64d-451b-9be6-0d39db51bb07", + "uuid": "d1825d59-1be8-43f3-b66d-37e77577e648", "control-id": "cis_rhel10_1-1.2.1.2", "description": "No notes for control-id 1.1.2.1.2.", "props": [ @@ -26576,7 +26535,7 @@ ] }, { - "uuid": "b323edfb-3e39-4bbb-9adb-d69e272ceca8", + "uuid": "84d6b373-218e-46a3-a27e-924a61c19b28", "control-id": "cis_rhel10_1-1.2.1.3", "description": "No notes for control-id 1.1.2.1.3.", "props": [ @@ -26593,7 +26552,7 @@ ] }, { - "uuid": "c7f65fe2-4449-4d7c-b5ed-c62ad98e1ea7", + "uuid": "7dbfeda4-e9ea-4bec-8991-9a6da1328682", "control-id": "cis_rhel10_1-1.2.1.4", "description": "No notes for control-id 1.1.2.1.4.", "props": [ @@ -26610,7 +26569,7 @@ ] }, { - "uuid": "8edb40bb-9421-4102-a49c-07110f59b926", + "uuid": "1e7f8751-0b9b-4525-826f-da6d23a930a2", "control-id": "cis_rhel10_1-1.2.2.1", "description": "No notes for control-id 1.1.2.2.1.", "props": [ @@ -26627,7 +26586,7 @@ ] }, { - "uuid": "0fa39841-57d1-4300-8ddb-03f6d2caf912", + "uuid": "68c86261-3ba6-4827-a110-7089b8529e33", "control-id": "cis_rhel10_1-1.2.2.2", "description": "No notes for control-id 1.1.2.2.2.", "props": [ @@ -26644,7 +26603,7 @@ ] }, { - "uuid": "49d8bf5a-9902-46f8-8d92-429891c0d2f9", + "uuid": "528c5e73-c85f-4e35-9890-e1f79a934ca8", "control-id": "cis_rhel10_1-1.2.2.3", "description": "No notes for control-id 1.1.2.2.3.", "props": [ @@ -26661,7 +26620,7 @@ ] }, { - "uuid": "ebb77de3-f0bc-4e47-b212-974e33a15af8", + "uuid": "fbfc9d99-57a2-4218-bc67-86566ab2ad61", "control-id": "cis_rhel10_1-1.2.2.4", "description": "No notes for control-id 1.1.2.2.4.", "props": [ @@ -26678,7 +26637,7 @@ ] }, { - "uuid": "55aa831c-9c47-4db9-a8bd-397f3bc52f56", + "uuid": "5ce1bb74-c97e-44fb-869a-a308be2c4958", "control-id": "cis_rhel10_1-1.2.3.2", "description": "No notes for control-id 1.1.2.3.2.", "props": [ @@ -26695,7 +26654,7 @@ ] }, { - "uuid": "99110621-4a15-47c7-904c-fa0f70a18741", + "uuid": "ce92df38-b3be-49a9-9aa3-45807efc8c9e", "control-id": "cis_rhel10_1-1.2.3.3", "description": "No notes for control-id 1.1.2.3.3.", "props": [ @@ -26712,7 +26671,7 @@ ] }, { - "uuid": "83c0e75c-3bbf-441e-af53-6f2bcaec2f0d", + "uuid": "6a1e49b2-d0e6-4477-91bc-0d62c2caff1f", "control-id": "cis_rhel10_1-1.2.4.2", "description": "No notes for control-id 1.1.2.4.2.", "props": [ @@ -26729,7 +26688,7 @@ ] }, { - "uuid": "a1cddfc6-b89b-4548-93db-dee2763ef1e6", + "uuid": "37212d10-ed4a-44cd-9fc2-ab5aa677e87a", "control-id": "cis_rhel10_1-1.2.4.3", "description": "No notes for control-id 1.1.2.4.3.", "props": [ @@ -26746,7 +26705,7 @@ ] }, { - "uuid": "8cb299cb-eb14-41d6-aa92-7988bf9540ca", + "uuid": "6e499469-855f-4de7-98ca-9d4c75487788", "control-id": "cis_rhel10_1-1.2.5.2", "description": "No notes for control-id 1.1.2.5.2.", "props": [ @@ -26763,7 +26722,7 @@ ] }, { - "uuid": "ee8e91d9-5d8c-4a6c-acd8-f9f0af19f599", + "uuid": "4bbba2ed-c21c-4700-94cc-a264aead7e26", "control-id": "cis_rhel10_1-1.2.5.3", "description": "No notes for control-id 1.1.2.5.3.", "props": [ @@ -26780,7 +26739,7 @@ ] }, { - "uuid": "f66cdb95-feb2-4345-8eb0-a1f6716d6de8", + "uuid": "1eeae521-904a-469e-95bc-69f9c9320096", "control-id": "cis_rhel10_1-1.2.5.4", "description": "No notes for control-id 1.1.2.5.4.", "props": [ @@ -26797,7 +26756,7 @@ ] }, { - "uuid": "bf355fbe-e5fc-4750-9e1a-532a80d9fc7d", + "uuid": "982d7d07-471a-4486-94da-fc5283058a49", "control-id": "cis_rhel10_1-1.2.6.2", "description": "No notes for control-id 1.1.2.6.2.", "props": [ @@ -26814,7 +26773,7 @@ ] }, { - "uuid": "a0b78c87-fde1-481a-aff3-dff0d7ee5f0b", + "uuid": "62fab630-f402-434d-addd-3390a23773aa", "control-id": "cis_rhel10_1-1.2.6.3", "description": "No notes for control-id 1.1.2.6.3.", "props": [ @@ -26831,7 +26790,7 @@ ] }, { - "uuid": "e5a9e054-93b3-41cd-b054-6703b07c388b", + "uuid": "a4af6820-d3f6-4ab4-bd18-81ad05f76c8f", "control-id": "cis_rhel10_1-1.2.6.4", "description": "No notes for control-id 1.1.2.6.4.", "props": [ @@ -26848,7 +26807,7 @@ ] }, { - "uuid": "4b5c2872-4288-459e-8f20-639e77e7e4a1", + "uuid": "6522bf7f-fabc-43fb-be13-195bc2d4f527", "control-id": "cis_rhel10_1-1.2.7.2", "description": "No notes for control-id 1.1.2.7.2.", "props": [ @@ -26865,7 +26824,7 @@ ] }, { - "uuid": "3c0dd46f-87ee-40cb-a550-7c335ced28bf", + "uuid": "c4752b6e-bc10-443d-943a-776c91ed0b73", "control-id": "cis_rhel10_1-1.2.7.3", "description": "No notes for control-id 1.1.2.7.3.", "props": [ @@ -26882,7 +26841,7 @@ ] }, { - "uuid": "62172131-44d1-43c9-bd0b-1f01fefb56d9", + "uuid": "3a7857cd-950e-46c5-b277-6379529d8539", "control-id": "cis_rhel10_1-1.2.7.4", "description": "No notes for control-id 1.1.2.7.4.", "props": [ @@ -26899,7 +26858,7 @@ ] }, { - "uuid": "880fbaa0-b498-4db3-bc8c-938fc13c2dc1", + "uuid": "7325418c-98af-4575-b237-0cccfa2625e0", "control-id": "cis_rhel10_1-2.1.1", "description": "The description for control-id cis_rhel10_1-2.1.1.", "props": [ @@ -26912,7 +26871,7 @@ ] }, { - "uuid": "962b6bb7-4d43-46c6-b9be-13ef77df675c", + "uuid": "64337793-0671-4004-af57-f42feebe0762", "control-id": "cis_rhel10_1-2.1.2", "description": "No notes for control-id 1.2.1.2.", "props": [ @@ -26929,7 +26888,7 @@ ] }, { - "uuid": "bda5e6df-4ee6-4c61-9256-fdde7222fad1", + "uuid": "fa5de22f-c1c3-41d2-9c26-7251f28a1e03", "control-id": "cis_rhel10_1-2.1.4", "description": "The description for control-id cis_rhel10_1-2.1.4.", "props": [ @@ -26942,7 +26901,7 @@ ] }, { - "uuid": "3e0f6c34-e7a1-4f7c-84ed-c78005da0148", + "uuid": "0d69ce65-7020-4fe8-a25a-15ab6ff2cf51", "control-id": "cis_rhel10_1-2.2.1", "description": "The description for control-id cis_rhel10_1-2.2.1.", "props": [ @@ -26955,7 +26914,7 @@ ] }, { - "uuid": "99bba670-4e80-498a-9f5f-43a0c1ab7497", + "uuid": "3874fde3-c368-4639-a960-0dff5a119ab6", "control-id": "cis_rhel10_1-3.1.1", "description": "No notes for control-id 1.3.1.1.", "props": [ @@ -26972,7 +26931,7 @@ ] }, { - "uuid": "6a2f53a1-9faa-46fa-aa77-559e086a76c9", + "uuid": "0c00310f-b35d-4f88-9d59-3b18b47da1bf", "control-id": "cis_rhel10_1-3.1.2", "description": "No notes for control-id 1.3.1.2.", "props": [ @@ -26989,7 +26948,7 @@ ] }, { - "uuid": "7812a670-ec85-494f-af32-f7524ca69ed6", + "uuid": "46cef159-25f3-4d7a-811b-cd2fb7dcfc02", "control-id": "cis_rhel10_1-3.1.3", "description": "No notes for control-id 1.3.1.3.", "props": [ @@ -27006,7 +26965,7 @@ ] }, { - "uuid": "871a60a4-4f8a-4e07-ac5e-6b4f89473505", + "uuid": "4c049b9b-6ba3-49eb-a911-b1aff9d788cf", "control-id": "cis_rhel10_1-3.1.4", "description": "No notes for control-id 1.3.1.4.", "props": [ @@ -27023,7 +26982,7 @@ ] }, { - "uuid": "c269c60d-0ebd-498c-8cde-7dd6812ee7b8", + "uuid": "411ac329-ae40-4a2c-a71b-4126ffc90ea4", "control-id": "cis_rhel10_1-3.1.7", "description": "No notes for control-id 1.3.1.7.", "props": [ @@ -27040,7 +26999,7 @@ ] }, { - "uuid": "4ed151e6-a909-4282-9932-713c34d7c119", + "uuid": "9b538241-b538-4fcc-9f57-99cc417012dd", "control-id": "cis_rhel10_1-4.1", "description": "There is no automated remediation for this rule and this is intentional.\nMore details in the rule description.", "props": [ @@ -27057,7 +27016,7 @@ ] }, { - "uuid": "9cb04d0d-30d2-4ac1-ba17-94cb3a62df7d", + "uuid": "6e149d83-e977-428c-9d6f-14226d3de9f6", "control-id": "cis_rhel10_1-4.2", "description": "This requirement demands a deeper review of the rules.", "props": [ @@ -27084,7 +27043,7 @@ ] }, { - "uuid": "87962109-3031-48e1-8841-188e9656d2ce", + "uuid": "0ea59085-1f79-4958-acd1-90e0044e9d7d", "control-id": "cis_rhel10_1-5.1", "description": "No notes for control-id 1.5.1.", "props": [ @@ -27101,7 +27060,7 @@ ] }, { - "uuid": "6b728eab-4ce3-48b5-b607-4d2a12fcce4b", + "uuid": "6bd07a1e-29d0-4894-bc03-7cf44be81b87", "control-id": "cis_rhel10_1-5.2", "description": "No notes for control-id 1.5.2.", "props": [ @@ -27118,7 +27077,7 @@ ] }, { - "uuid": "645ebf1a-8222-4af7-b1a9-532e1c945a94", + "uuid": "6607ecfc-c2d0-4348-9fbf-9e3b942f823a", "control-id": "cis_rhel10_1-5.4", "description": "No notes for control-id 1.5.4.", "props": [ @@ -27135,7 +27094,7 @@ ] }, { - "uuid": "48178ac2-4433-4fc4-8de3-0a71a51bf51f", + "uuid": "50b3f130-cf8f-483a-8e98-dbabc478d539", "control-id": "cis_rhel10_1-5.5", "description": "No notes for control-id 1.5.5.", "props": [ @@ -27152,7 +27111,7 @@ ] }, { - "uuid": "720e1f4c-d25e-4826-9356-eefe419e7421", + "uuid": "db54684a-1916-4a7e-bad8-a27f7ee7c6b5", "control-id": "cis_rhel10_1-5.6", "description": "No notes for control-id 1.5.6.", "props": [ @@ -27169,7 +27128,7 @@ ] }, { - "uuid": "bcefd86e-db20-4a35-ad66-3bb953d94bcc", + "uuid": "4b097dd1-058e-4452-ba78-4d20732c29eb", "control-id": "cis_rhel10_1-5.7", "description": "No notes for control-id 1.5.7.", "props": [ @@ -27186,7 +27145,7 @@ ] }, { - "uuid": "68121389-5376-420c-9050-5ffb87405998", + "uuid": "5ec4b5ee-6421-40b6-ae10-cad5a08cbcd6", "control-id": "cis_rhel10_1-5.8", "description": "Address Space Layout Randomization (ASLR)", "props": [ @@ -27203,7 +27162,7 @@ ] }, { - "uuid": "ee0ff6bd-432a-4bb8-939a-b342ac1222a0", + "uuid": "1bb90ba1-a908-470f-a515-5160c84d20d4", "control-id": "cis_rhel10_1-5.9", "description": "No notes for control-id 1.5.9.", "props": [ @@ -27220,7 +27179,7 @@ ] }, { - "uuid": "6902d560-1e0f-488b-87e3-73bb3d5d9d8f", + "uuid": "ccbf5eb9-064c-491d-a4f6-8af4179ba178", "control-id": "cis_rhel10_1-5.10", "description": "No notes for control-id 1.5.10.", "props": [ @@ -27237,7 +27196,7 @@ ] }, { - "uuid": "f8e205e7-348c-4245-9bf6-62af3f22b24a", + "uuid": "0bfefb99-f469-49b7-ab1d-6ad0edf45398", "control-id": "cis_rhel10_1-6.1", "description": "No notes for control-id 1.6.1.", "props": [ @@ -27254,7 +27213,7 @@ ] }, { - "uuid": "7d2ad889-4b1c-425d-8aaf-9f0f8cc0856b", + "uuid": "0f462acf-de0a-4116-8f64-19fa7c43019a", "control-id": "cis_rhel10_1-6.2", "description": "No notes for control-id 1.6.2.", "props": [ @@ -27271,7 +27230,7 @@ ] }, { - "uuid": "90353d3f-18ec-44bd-9d16-426046916927", + "uuid": "9b4a23bf-02d4-4c4e-a080-13708347e47f", "control-id": "cis_rhel10_1-6.3", "description": "No notes for control-id 1.6.3.", "props": [ @@ -27288,7 +27247,7 @@ ] }, { - "uuid": "17fa20ed-802e-4b9a-94de-fd3e4dfd5278", + "uuid": "a314c7d2-a5d4-43d3-b3a8-825258f26e21", "control-id": "cis_rhel10_1-6.4", "description": "No notes for control-id 1.6.4.", "props": [ @@ -27305,7 +27264,7 @@ ] }, { - "uuid": "180b6e4e-b112-468d-9e15-b1312a927111", + "uuid": "1b0d9c23-88a1-4539-8b33-906523bf6cb9", "control-id": "cis_rhel10_1-7.1", "description": "No notes for control-id 1.7.1.", "props": [ @@ -27322,7 +27281,7 @@ ] }, { - "uuid": "425d2504-af4b-460e-89f3-ef864dc779eb", + "uuid": "28af30d2-3856-4607-b6ea-b6f983e96345", "control-id": "cis_rhel10_1-7.2", "description": "No notes for control-id 1.7.2.", "props": [ @@ -27339,7 +27298,7 @@ ] }, { - "uuid": "8547d74f-1d43-4a61-8252-124da5ba303f", + "uuid": "bc0a61d2-2e56-4d10-a52c-688a343bcbd8", "control-id": "cis_rhel10_1-7.3", "description": "No notes for control-id 1.7.3.", "props": [ @@ -27356,7 +27315,7 @@ ] }, { - "uuid": "1dfef124-aac6-4b02-8870-38dce6f72d8d", + "uuid": "4dc68017-4ff9-4ce3-8ea1-ac97058d376f", "control-id": "cis_rhel10_1-7.4", "description": "No notes for control-id 1.7.4.", "props": [ @@ -27383,7 +27342,7 @@ ] }, { - "uuid": "2407155d-beea-4767-980a-4e02ac2bac96", + "uuid": "be58c67a-1e6f-4bd2-bb09-f34084ef1427", "control-id": "cis_rhel10_1-7.5", "description": "No notes for control-id 1.7.5.", "props": [ @@ -27410,7 +27369,7 @@ ] }, { - "uuid": "651d33f5-2aec-4720-aabd-4db404024546", + "uuid": "e7aabd65-3fbe-4e1f-8256-231e9cc2b619", "control-id": "cis_rhel10_1-7.6", "description": "No notes for control-id 1.7.6.", "props": [ @@ -27437,7 +27396,7 @@ ] }, { - "uuid": "f36db36b-b78c-4177-86bc-67b652d891c5", + "uuid": "ac697eb3-c133-4c44-bb5b-15bc4ad2f065", "control-id": "cis_rhel10_1-8.1", "description": "No notes for control-id 1.8.1.", "props": [ @@ -27459,7 +27418,7 @@ ] }, { - "uuid": "c556ea73-0803-472e-b0f1-12eeb79d4a7e", + "uuid": "43d6207d-f7c3-40f3-881e-2946387873ab", "control-id": "cis_rhel10_1-8.2", "description": "No notes for control-id 1.8.2.", "props": [ @@ -27476,7 +27435,7 @@ ] }, { - "uuid": "3d03544b-d9d4-4409-91e6-8d49dfea5f36", + "uuid": "92f851da-c1b9-466a-8621-17c25e8e7d58", "control-id": "cis_rhel10_1-8.3", "description": "No notes for control-id 1.8.3.", "props": [ @@ -27508,7 +27467,7 @@ ] }, { - "uuid": "8879d30f-8f9b-4edd-9c10-4bff53f7c043", + "uuid": "057dd0bb-c2ce-4da0-9b83-c58b9a4c9464", "control-id": "cis_rhel10_1-8.5", "description": "No notes for control-id 1.8.5.", "props": [ @@ -27525,7 +27484,7 @@ ] }, { - "uuid": "b12ac19e-dfa4-4bba-aabf-f851a153c111", + "uuid": "34e3bd61-532b-4179-9e19-9d337c7de928", "control-id": "cis_rhel10_2-1.4", "description": "No notes for control-id 2.1.4.", "props": [ @@ -27542,7 +27501,7 @@ ] }, { - "uuid": "3240773d-356d-4eb2-b624-af805d1b55e2", + "uuid": "8ace24c7-3f73-44fe-a12d-d8cd91accd93", "control-id": "cis_rhel10_2-1.5", "description": "No notes for control-id 2.1.5.", "props": [ @@ -27559,7 +27518,7 @@ ] }, { - "uuid": "54baae01-e3d7-435d-93ef-faa35fe3d12e", + "uuid": "aed1bdb3-5a81-4b5c-b652-2ad3e371bd7d", "control-id": "cis_rhel10_2-1.6", "description": "No notes for control-id 2.1.6.", "props": [ @@ -27576,7 +27535,7 @@ ] }, { - "uuid": "9cc206be-76f8-46f2-9899-2b12916e222a", + "uuid": "6089ce80-5aa6-4131-b364-a7a7217bd028", "control-id": "cis_rhel10_2-1.7", "description": "No notes for control-id 2.1.7.", "props": [ @@ -27593,7 +27552,7 @@ ] }, { - "uuid": "fbaa16a8-b147-422a-b1de-9b62b6611497", + "uuid": "61a93dc7-72d4-496b-be62-853a65170a38", "control-id": "cis_rhel10_2-1.8", "description": "No notes for control-id 2.1.8.", "props": [ @@ -27615,7 +27574,7 @@ ] }, { - "uuid": "d5c18dce-bdd1-4e3f-a89d-46ba322cac1b", + "uuid": "b5511c28-7556-4bda-a3e6-5f49ad10db29", "control-id": "cis_rhel10_2-1.9", "description": "Many of the libvirt packages used by Enterprise Linux virtualization are dependent on the\nnfs-utils package.", "props": [ @@ -27632,7 +27591,7 @@ ] }, { - "uuid": "b6f9a890-e7ae-467e-b79c-5d70794dc3a8", + "uuid": "64ef4ab3-2919-47e6-9e2c-4bd95328f383", "control-id": "cis_rhel10_2-1.11", "description": "Many of the libvirt packages used by Enterprise Linux virtualization, and the nfs-utils\npackage used for The Network File System (NFS), are dependent on the rpcbind package.", "props": [ @@ -27649,7 +27608,7 @@ ] }, { - "uuid": "9983b781-c2af-4298-80d4-796cbf6e3af5", + "uuid": "f4a20941-c15a-46f5-96f8-0dcd9ff685fe", "control-id": "cis_rhel10_2-1.12", "description": "No notes for control-id 2.1.12.", "props": [ @@ -27666,7 +27625,7 @@ ] }, { - "uuid": "be421f09-be30-4d54-acb8-a7b01295a361", + "uuid": "419843d6-a256-4cc9-ab70-edd9d7421750", "control-id": "cis_rhel10_2-1.13", "description": "No notes for control-id 2.1.13.", "props": [ @@ -27683,7 +27642,7 @@ ] }, { - "uuid": "e32296c9-b0b0-47e4-a2c5-46e422c5dd68", + "uuid": "680ba4a8-156c-4d89-a367-97b10b0b2a6c", "control-id": "cis_rhel10_2-1.14", "description": "No notes for control-id 2.1.14.", "props": [ @@ -27700,7 +27659,7 @@ ] }, { - "uuid": "95cc71b5-e1ec-4cbd-94b4-b9ac3e3de522", + "uuid": "b5fb3766-aaf2-4b28-9447-bc7c51ff40bc", "control-id": "cis_rhel10_2-1.15", "description": "No notes for control-id 2.1.15.", "props": [ @@ -27717,7 +27676,7 @@ ] }, { - "uuid": "66995ef2-dd2f-4a6e-89d6-f66d6f3dba7b", + "uuid": "10ce1fbb-4bf7-4a4d-971b-1209a32717f3", "control-id": "cis_rhel10_2-1.16", "description": "No notes for control-id 2.1.16.", "props": [ @@ -27734,7 +27693,7 @@ ] }, { - "uuid": "8a5e278b-b7c8-4825-b7aa-36dab49a92a9", + "uuid": "b201a62c-80d2-41e0-9f0f-c7195e2ef188", "control-id": "cis_rhel10_2-1.17", "description": "No notes for control-id 2.1.17.", "props": [ @@ -27751,7 +27710,7 @@ ] }, { - "uuid": "171325d9-273f-42d0-9550-562a6dfcac79", + "uuid": "39809210-4ce2-4bb7-8dfd-a1dca9ac3c32", "control-id": "cis_rhel10_2-1.18", "description": "No notes for control-id 2.1.18.", "props": [ @@ -27773,7 +27732,7 @@ ] }, { - "uuid": "6311a807-497d-43bf-b212-c4424c18e166", + "uuid": "cf6cadd0-043a-4356-8136-f1793c939b09", "control-id": "cis_rhel10_2-1.21", "description": "No notes for control-id 2.1.21.", "props": [ @@ -27795,7 +27754,7 @@ ] }, { - "uuid": "f1543389-1b46-403a-b894-b4e16825c260", + "uuid": "846fc641-ed25-4962-b464-3771a6d9168e", "control-id": "cis_rhel10_2-1.22", "description": "The description for control-id cis_rhel10_2-1.22.", "props": [ @@ -27808,7 +27767,7 @@ ] }, { - "uuid": "1957d29d-3b1d-4018-954f-ea48976f86fd", + "uuid": "e82ae63a-f474-42da-a80c-76ad2ffc26e0", "control-id": "cis_rhel10_2-2.1", "description": "No notes for control-id 2.2.1.", "props": [ @@ -27825,7 +27784,7 @@ ] }, { - "uuid": "f64fa5c4-13cb-4638-a51e-77a294541ad0", + "uuid": "7a42aa2f-d348-44ce-b7b6-b71c00982b89", "control-id": "cis_rhel10_2-2.3", "description": "No notes for control-id 2.2.3.", "props": [ @@ -27842,7 +27801,7 @@ ] }, { - "uuid": "0e1455e5-6cc9-4b86-9e01-b5562638ecea", + "uuid": "62ecd303-423f-40ab-ae03-9f97263efb48", "control-id": "cis_rhel10_2-2.4", "description": "No notes for control-id 2.2.4.", "props": [ @@ -27859,7 +27818,7 @@ ] }, { - "uuid": "f7de5f4a-1230-4861-94ac-dffc863fe092", + "uuid": "ca2f665d-ce9c-4ece-aa85-c6f748138b1e", "control-id": "cis_rhel10_2-3.1", "description": "No notes for control-id 2.3.1.", "props": [ @@ -27871,7 +27830,7 @@ ] }, { - "uuid": "f037f090-ba08-44bf-9337-655a38985c7b", + "uuid": "397dc31a-78e8-4cd4-ace6-f541b3d86ea4", "control-id": "cis_rhel10_2-3.2", "description": "No notes for control-id 2.3.2.", "props": [ @@ -27888,7 +27847,7 @@ ] }, { - "uuid": "895e4214-5831-43c1-86d0-252c85fa4638", + "uuid": "23502ff6-b985-48ef-ac81-71d16b023839", "control-id": "cis_rhel10_2-3.3", "description": "No notes for control-id 2.3.3.", "props": [ @@ -27905,7 +27864,7 @@ ] }, { - "uuid": "3ec95881-f7a2-4d67-ba9c-16753793aa97", + "uuid": "aec67312-51de-4558-b893-5fb3059f46a7", "control-id": "cis_rhel10_2-4.1.1", "description": "No notes for control-id 2.4.1.1.", "props": [ @@ -27927,7 +27886,7 @@ ] }, { - "uuid": "bf04687f-12cf-4df0-949e-b86af3a4551e", + "uuid": "66216129-3ec6-42c2-b232-fac8d253720c", "control-id": "cis_rhel10_2-4.1.2", "description": "No notes for control-id 2.4.1.2.", "props": [ @@ -27954,7 +27913,7 @@ ] }, { - "uuid": "aec49343-b68c-45d7-86c4-39f94cabc6f1", + "uuid": "4cc65c0b-f70a-4c1a-93a0-7565d824c0c0", "control-id": "cis_rhel10_2-4.1.3", "description": "No notes for control-id 2.4.1.3.", "props": [ @@ -27981,7 +27940,7 @@ ] }, { - "uuid": "b93e8fc5-aaf3-47ba-9803-c91b09c70792", + "uuid": "faa250fa-6adf-459c-944c-0d56d51104cf", "control-id": "cis_rhel10_2-4.1.4", "description": "No notes for control-id 2.4.1.4.", "props": [ @@ -28008,7 +27967,7 @@ ] }, { - "uuid": "374ed0e0-eb32-422a-8365-446d2edd4ee8", + "uuid": "c3a78c3e-7a9e-4d60-8bed-96c0de2fc09c", "control-id": "cis_rhel10_2-4.1.5", "description": "No notes for control-id 2.4.1.5.", "props": [ @@ -28035,7 +27994,7 @@ ] }, { - "uuid": "f1aa1649-7fa8-4290-b10d-ca55a8a9320a", + "uuid": "70e92c91-c6ab-4977-b6fc-d940d6d94b0f", "control-id": "cis_rhel10_2-4.1.6", "description": "No notes for control-id 2.4.1.6.", "props": [ @@ -28062,7 +28021,7 @@ ] }, { - "uuid": "fe4a3e33-5345-40ab-a8a7-7c415e8b5013", + "uuid": "08b4496a-fb16-4ad6-942c-b43ef137ec45", "control-id": "cis_rhel10_2-4.1.7", "description": "No notes for control-id 2.4.1.7.", "props": [ @@ -28089,7 +28048,7 @@ ] }, { - "uuid": "55a22b17-6825-4210-a306-16344aa196e7", + "uuid": "f4d591c8-04fc-42be-981a-d085f23db2fa", "control-id": "cis_rhel10_2-4.1.8", "description": "No notes for control-id 2.4.1.8.", "props": [ @@ -28116,7 +28075,7 @@ ] }, { - "uuid": "96d3aad3-98cb-4417-9059-5c29eb6750a0", + "uuid": "0b8636fb-0d60-413b-b83d-6f605e17e5c4", "control-id": "cis_rhel10_2-4.1.9", "description": "No notes for control-id 2.4.1.9.", "props": [ @@ -28153,7 +28112,7 @@ ] }, { - "uuid": "38996fd2-5b50-4c36-b331-84a769f679c7", + "uuid": "6e1de265-c490-4d01-91ee-f91164443498", "control-id": "cis_rhel10_2-4.2.1", "description": "No notes for control-id 2.4.2.1.", "props": [ @@ -28190,7 +28149,7 @@ ] }, { - "uuid": "c3965dae-fc3c-44d2-bcfc-a46cb8879b85", + "uuid": "a55366dc-61d5-43be-8fa0-88a3523c8e41", "control-id": "cis_rhel10_3-1.1", "description": "The description for control-id cis_rhel10_3-1.1.", "props": [ @@ -28203,7 +28162,7 @@ ] }, { - "uuid": "3b4c48da-f5e7-4ca8-b5a2-6bd2bcb9d9d0", + "uuid": "2f471f18-0df3-44d0-8085-1956acc04df6", "control-id": "cis_rhel10_3-2.1", "description": "No notes for control-id 3.2.1.", "props": [ @@ -28220,7 +28179,7 @@ ] }, { - "uuid": "223c8df7-aaac-4c24-94a2-e04ae288739a", + "uuid": "12186809-7d1d-4e8c-bed0-5fb391dfa8e6", "control-id": "cis_rhel10_3-2.2", "description": "No notes for control-id 3.2.2.", "props": [ @@ -28237,7 +28196,7 @@ ] }, { - "uuid": "92469dff-c395-41d4-a5e6-464fa8d39d71", + "uuid": "c8e1d6a8-2743-40e8-9411-9dcf679a6c80", "control-id": "cis_rhel10_3-2.3", "description": "No notes for control-id 3.2.3.", "props": [ @@ -28254,7 +28213,7 @@ ] }, { - "uuid": "6ab47c14-0678-4cb6-8c01-fceb98e5dbbc", + "uuid": "a248cfc8-d685-4e0f-b58a-4fed34b025cc", "control-id": "cis_rhel10_3-2.4", "description": "No notes for control-id 3.2.4.", "props": [ @@ -28271,7 +28230,7 @@ ] }, { - "uuid": "6afa6e34-781e-441d-8e53-b323f8590b4a", + "uuid": "34a16078-4fab-4892-b75b-623d8dffcdf7", "control-id": "cis_rhel10_3-2.5", "description": "No notes for control-id 3.2.5.", "props": [ @@ -28288,7 +28247,7 @@ ] }, { - "uuid": "ec7fd866-e239-4423-b981-bd50b3e8de99", + "uuid": "d51bbf15-7bd2-43f1-a5c7-a7754b28ed0c", "control-id": "cis_rhel10_3-2.6", "description": "No notes for control-id 3.2.6.", "props": [ @@ -28305,7 +28264,7 @@ ] }, { - "uuid": "2e0e7bfc-e956-4a18-8fe0-997d0e597477", + "uuid": "cfc57748-c775-4de2-a893-6c1c27bcdd5c", "control-id": "cis_rhel10_3-3.1.1", "description": "No notes for control-id 3.3.1.1.", "props": [ @@ -28322,7 +28281,7 @@ ] }, { - "uuid": "1000d10d-e2b5-41ce-b5a6-9ae266726908", + "uuid": "a3f69762-073f-4a7e-886b-94f097560e10", "control-id": "cis_rhel10_3-3.1.2", "description": "No notes for control-id 3.3.1.2.", "props": [ @@ -28339,7 +28298,7 @@ ] }, { - "uuid": "95b6928e-19fc-4219-984d-6ac35a17f6fc", + "uuid": "914a8a88-e66c-4dfd-bbc2-325c23782800", "control-id": "cis_rhel10_3-3.1.3", "description": "No notes for control-id 3.3.1.3.", "props": [ @@ -28356,7 +28315,7 @@ ] }, { - "uuid": "2f6e0517-3b9b-43d5-824c-ce4d71e16991", + "uuid": "019e93ad-c55a-4a79-88b1-c83ae60f1ca8", "control-id": "cis_rhel10_3-3.1.4", "description": "No notes for control-id 3.3.1.4.", "props": [ @@ -28373,7 +28332,7 @@ ] }, { - "uuid": "4457f7b0-120b-4947-bc33-22b8bfb77134", + "uuid": "3477c9ae-9b8d-4e64-8f83-421318e58f55", "control-id": "cis_rhel10_3-3.1.5", "description": "No notes for control-id 3.3.1.5.", "props": [ @@ -28390,7 +28349,7 @@ ] }, { - "uuid": "137eac79-4713-47f1-8d8d-f36b0c224c94", + "uuid": "2383e928-8040-4c95-90fc-107771fe4dbe", "control-id": "cis_rhel10_3-3.1.6", "description": "No notes for control-id 3.3.1.6.", "props": [ @@ -28407,7 +28366,7 @@ ] }, { - "uuid": "ac7dcca2-967a-426b-8eaf-07d62a3fcde9", + "uuid": "078e526b-a4e0-42e6-b322-ff29363bdfaa", "control-id": "cis_rhel10_3-3.1.7", "description": "No notes for control-id 3.3.1.7.", "props": [ @@ -28424,7 +28383,7 @@ ] }, { - "uuid": "ffd77009-9e4e-4a51-9863-03ff1840bf64", + "uuid": "59b929d8-9418-4ea6-830a-8d75e451873d", "control-id": "cis_rhel10_3-3.1.8", "description": "No notes for control-id 3.3.1.8.", "props": [ @@ -28441,7 +28400,7 @@ ] }, { - "uuid": "dfc7841b-74cc-4a85-ae4a-d123580ec8a3", + "uuid": "5c5e3766-73a4-4a61-916e-ea8d1cf27d00", "control-id": "cis_rhel10_3-3.1.9", "description": "No notes for control-id 3.3.1.9.", "props": [ @@ -28458,7 +28417,7 @@ ] }, { - "uuid": "e88213e2-bc43-4f0d-b81f-7fc2db46b124", + "uuid": "9cfe68b3-e16d-479f-95cb-1aaeccb5c990", "control-id": "cis_rhel10_3-3.1.10", "description": "No notes for control-id 3.3.1.10.", "props": [ @@ -28475,7 +28434,7 @@ ] }, { - "uuid": "e504903c-14ef-4921-9ed0-35ba6ae8bd60", + "uuid": "66b5ec90-a1ea-4bc5-8f98-ec775ed95f4f", "control-id": "cis_rhel10_3-3.1.11", "description": "No notes for control-id 3.3.1.11.", "props": [ @@ -28492,7 +28451,7 @@ ] }, { - "uuid": "438f1f8a-f2b0-463c-af81-daa00730b42b", + "uuid": "fb415730-052a-49f2-a400-b1d26c05c3cd", "control-id": "cis_rhel10_3-3.1.12", "description": "No notes for control-id 3.3.1.12.", "props": [ @@ -28509,7 +28468,7 @@ ] }, { - "uuid": "1fad065d-f33a-42e0-b255-2bc42fbf8ce8", + "uuid": "e4d83b72-92b0-4fb5-b566-765616565852", "control-id": "cis_rhel10_3-3.1.13", "description": "No notes for control-id 3.3.1.13.", "props": [ @@ -28526,7 +28485,7 @@ ] }, { - "uuid": "1f383c48-9221-40f0-bb5a-0204a93ee0e2", + "uuid": "85eabac6-c9e7-4004-aadb-a4e104bfd968", "control-id": "cis_rhel10_3-3.1.14", "description": "No notes for control-id 3.3.1.14.", "props": [ @@ -28543,7 +28502,7 @@ ] }, { - "uuid": "9f070336-052b-43d2-986f-774eed220b0c", + "uuid": "1fba599b-28ed-4bb5-9cf7-32ee8513f181", "control-id": "cis_rhel10_3-3.1.15", "description": "No notes for control-id 3.3.1.15.", "props": [ @@ -28560,7 +28519,7 @@ ] }, { - "uuid": "53ee709a-66ff-4cc3-8418-f3991ef1c5b9", + "uuid": "6a376673-a36c-499f-8312-dc26c10ccc5c", "control-id": "cis_rhel10_3-3.1.16", "description": "No notes for control-id 3.3.1.16.", "props": [ @@ -28577,7 +28536,7 @@ ] }, { - "uuid": "40a61550-7d41-43a3-86be-ac97e8bb3629", + "uuid": "a01425b9-e79b-4242-b7c3-9e111d0983bb", "control-id": "cis_rhel10_3-3.1.17", "description": "No notes for control-id 3.3.1.17.", "props": [ @@ -28594,7 +28553,7 @@ ] }, { - "uuid": "07e04190-06e6-4ad9-9706-200406ca891f", + "uuid": "6f76bedd-39ec-4b14-b0c7-f92eac7aa761", "control-id": "cis_rhel10_3-3.1.18", "description": "No notes for control-id 3.3.1.18.", "props": [ @@ -28611,7 +28570,7 @@ ] }, { - "uuid": "c93816d5-e04c-4644-b037-9744c7e974c1", + "uuid": "0680ae4a-9d50-4431-bdb5-1886ff51a892", "control-id": "cis_rhel10_3-3.2.1", "description": "No notes for control-id 3.3.2.1.", "props": [ @@ -28628,7 +28587,7 @@ ] }, { - "uuid": "5e41fb2d-192e-47b5-a369-f885d002cfa6", + "uuid": "11ec3772-99cc-40a4-8299-88beb13b18a8", "control-id": "cis_rhel10_3-3.2.2", "description": "No notes for control-id 3.3.2.2.", "props": [ @@ -28645,7 +28604,7 @@ ] }, { - "uuid": "5f1456d1-00f2-4503-b8ce-97188aa81344", + "uuid": "dbe1164e-212d-4f09-b93d-a5063155bf4d", "control-id": "cis_rhel10_3-3.2.3", "description": "No notes for control-id 3.3.2.3.", "props": [ @@ -28662,7 +28621,7 @@ ] }, { - "uuid": "e6722390-2806-4f59-8892-915d9f76df5a", + "uuid": "e834df44-553a-421c-b759-5bcc9c925c95", "control-id": "cis_rhel10_3-3.2.4", "description": "No notes for control-id 3.3.2.4.", "props": [ @@ -28679,7 +28638,7 @@ ] }, { - "uuid": "2f6f9755-11ff-470a-9e54-0ec3a79ad221", + "uuid": "dd4d938e-c941-4f9f-b1ac-0eddaacb5e0f", "control-id": "cis_rhel10_3-3.2.5", "description": "No notes for control-id 3.3.2.5.", "props": [ @@ -28696,7 +28655,7 @@ ] }, { - "uuid": "3ed7a8d3-9913-4b9f-ab29-2362b4d23308", + "uuid": "aa2d2982-f659-44af-b979-81353ad879e5", "control-id": "cis_rhel10_3-3.2.6", "description": "No notes for control-id 3.3.2.6.", "props": [ @@ -28713,7 +28672,7 @@ ] }, { - "uuid": "c191fbd5-7f0c-4579-88bd-2dd92f24334f", + "uuid": "c5c0a9ec-9049-4d35-a283-05d96684b65f", "control-id": "cis_rhel10_3-3.2.7", "description": "No notes for control-id 3.3.2.7.", "props": [ @@ -28730,7 +28689,7 @@ ] }, { - "uuid": "54745b00-0561-4169-9367-084532ddf6be", + "uuid": "e6dd6a50-5112-4ecc-a9b1-2ba955455017", "control-id": "cis_rhel10_3-3.2.8", "description": "No notes for control-id 3.3.2.8.", "props": [ @@ -28747,7 +28706,7 @@ ] }, { - "uuid": "d9d02770-f1da-485c-9f6d-56a4596cc716", + "uuid": "840c16dd-b734-42fb-875c-babf2fa3ceaa", "control-id": "cis_rhel10_4-1.1", "description": "No notes for control-id 4.1.1.", "props": [ @@ -28764,7 +28723,7 @@ ] }, { - "uuid": "58c06e05-ed40-4cfe-9370-0b52702f84a9", + "uuid": "f9e2209a-5394-4a24-920c-fdff4a8db9a0", "control-id": "cis_rhel10_4-1.2", "description": "No notes for control-id 4.1.2.", "props": [ @@ -28781,7 +28740,7 @@ ] }, { - "uuid": "1791b426-32bc-4b56-9db7-64cf797984ce", + "uuid": "717bd16e-b059-4f40-bd81-d137c7de91bc", "control-id": "cis_rhel10_4-1.3", "description": "No notes for control-id 4.1.3.", "props": [ @@ -28798,7 +28757,7 @@ ] }, { - "uuid": "3688befb-5656-4f11-9096-8b6668ac404d", + "uuid": "bc852c5c-4690-434b-9ab3-85cce6b4f942", "control-id": "cis_rhel10_4-1.4", "description": "The description for control-id cis_rhel10_4-1.4.", "props": [ @@ -28811,7 +28770,7 @@ ] }, { - "uuid": "fa3051cb-63be-45ec-be6d-10a133900d4b", + "uuid": "c2284a0e-1543-4923-8700-766feff4abfd", "control-id": "cis_rhel10_4-1.5", "description": "Firewalld in Red Hat Enterprise Linux 10 accepts loopback traffic by default.", "props": [ @@ -28828,7 +28787,7 @@ ] }, { - "uuid": "e40df42d-cad8-4a0d-97f4-875cd2c0238e", + "uuid": "196b1838-7049-486d-835d-ad87c3001ac9", "control-id": "cis_rhel10_4-1.6", "description": "The description for control-id cis_rhel10_4-1.6.", "props": [ @@ -28841,7 +28800,7 @@ ] }, { - "uuid": "8b572fb2-5398-441d-b53a-1d820d5276da", + "uuid": "06cbd3ba-ddd3-456b-bad6-ba7e52280dc7", "control-id": "cis_rhel10_4-1.7", "description": "The description for control-id cis_rhel10_4-1.7.", "props": [ @@ -28854,7 +28813,7 @@ ] }, { - "uuid": "71a61fb0-da6c-4876-8c43-4c0598503ccd", + "uuid": "a162490c-c0d4-445e-9169-45ad7605a40a", "control-id": "cis_rhel10_5-1.1", "description": "No notes for control-id 5.1.1.", "props": [ @@ -28911,7 +28870,7 @@ ] }, { - "uuid": "518fc976-4214-4ebd-840b-3cf126a24a96", + "uuid": "0fdb77c7-20b5-4538-8226-6e87582faea3", "control-id": "cis_rhel10_5-1.2", "description": "No notes for control-id 5.1.2.", "props": [ @@ -28938,7 +28897,7 @@ ] }, { - "uuid": "8e4e07fa-d802-4c2f-b961-831da3f8d067", + "uuid": "61ddc4ac-4644-49fe-a8a7-5a0519fd69e6", "control-id": "cis_rhel10_5-1.3", "description": "No notes for control-id 5.1.3.", "props": [ @@ -28965,7 +28924,7 @@ ] }, { - "uuid": "c4e07d54-9059-458d-a0bd-3fa4e736251e", + "uuid": "69031bef-d4dd-4a79-87c3-29663450511a", "control-id": "cis_rhel10_5-1.4", "description": "No notes for control-id 5.1.4.", "props": [ @@ -28982,7 +28941,7 @@ ] }, { - "uuid": "189f4f60-ea02-497d-b9de-18ca320aae11", + "uuid": "db3529ec-27ae-45e8-8e15-4931d0a0a8fd", "control-id": "cis_rhel10_5-1.5", "description": "No notes for control-id 5.1.5.", "props": [ @@ -28999,7 +28958,7 @@ ] }, { - "uuid": "a624302d-f842-4be9-a4f3-73fdc6c14835", + "uuid": "c653ecd3-5eeb-4cb5-98b9-30dcd0ddc56a", "control-id": "cis_rhel10_5-1.6", "description": "No notes for control-id 5.1.6.", "props": [ @@ -29016,7 +28975,7 @@ ] }, { - "uuid": "9b7465d7-d35e-4a2f-b949-f0add809af39", + "uuid": "4fea3248-1a91-4816-a03e-6ed03c219dbe", "control-id": "cis_rhel10_5-1.7", "description": "The requirement gives an example of 45 seconds, but is flexible about the values. It is only\nnecessary to ensure there is a timeout configured in alignment to the site policy.", "props": [ @@ -29038,7 +28997,7 @@ ] }, { - "uuid": "3d04a5ca-3c40-4c0e-b1fc-233249d2df4a", + "uuid": "4c9e9c50-564d-42fa-b93c-bed0dcdad3cf", "control-id": "cis_rhel10_5-1.8", "description": "No notes for control-id 5.1.8.", "props": [ @@ -29055,7 +29014,7 @@ ] }, { - "uuid": "155d41bf-cd89-436d-838a-67491986bc8c", + "uuid": "e9fc823e-0b7e-4ddd-840a-10d94da26042", "control-id": "cis_rhel10_5-1.9", "description": "No notes for control-id 5.1.9.", "props": [ @@ -29072,7 +29031,7 @@ ] }, { - "uuid": "83f878d9-1283-48e7-85c9-f867593a9a20", + "uuid": "cdb4946f-6165-49ac-b2ef-f5c802422ed9", "control-id": "cis_rhel10_5-1.10", "description": "No notes for control-id 5.1.10.", "props": [ @@ -29089,7 +29048,7 @@ ] }, { - "uuid": "4c3e68c1-d2b4-4198-93ac-3eb4a9b01146", + "uuid": "6b9e34cc-a691-4d8c-bb37-6af8bdd62491", "control-id": "cis_rhel10_5-1.11", "description": "No notes for control-id 5.1.11.", "props": [ @@ -29106,7 +29065,7 @@ ] }, { - "uuid": "ec585f58-9b48-44f1-a6ab-7a265c0d8907", + "uuid": "8661d3ad-e4d2-49c4-bf75-998eddacb3f5", "control-id": "cis_rhel10_5-1.12", "description": "The description for control-id cis_rhel10_5-1.12.", "props": [ @@ -29124,7 +29083,7 @@ ] }, { - "uuid": "7a70ccad-ebd6-4ee1-babf-f8d4bc2ea950", + "uuid": "526e96e9-321e-4b1f-ad90-71e0fa7ecbb1", "control-id": "cis_rhel10_5-1.13", "description": "No notes for control-id 5.1.13.", "props": [ @@ -29141,7 +29100,7 @@ ] }, { - "uuid": "7e9e42da-ff4b-4496-b6bc-443a02680aaa", + "uuid": "7f89a3d9-9f6a-4b1c-a20e-9d3ad5448cb6", "control-id": "cis_rhel10_5-1.14", "description": "The CIS benchmark is not opinionated about which loglevel is selected here. Here, this\nprofile uses VERBOSE by default, as it allows for the capture of login and logout activity\nas well as key fingerprints.", "props": [ @@ -29158,7 +29117,7 @@ ] }, { - "uuid": "7e3d9951-a46d-4daf-af69-ceb2586f1a73", + "uuid": "435f67e4-380c-462f-9fdd-f5e0b28c6817", "control-id": "cis_rhel10_5-1.15", "description": "No notes for control-id 5.1.15.", "props": [ @@ -29175,7 +29134,7 @@ ] }, { - "uuid": "7c924b91-cfe0-4a14-b303-25545996a803", + "uuid": "9c460b96-5cb2-4f58-80a5-8579701cf8ba", "control-id": "cis_rhel10_5-1.16", "description": "No notes for control-id 5.1.16.", "props": [ @@ -29192,7 +29151,7 @@ ] }, { - "uuid": "becc4c3c-450a-4146-8a55-70a33e8fe1f2", + "uuid": "d8abe41a-4a96-4e3a-9eff-e05ef1fca2a8", "control-id": "cis_rhel10_5-1.17", "description": "No notes for control-id 5.1.17.", "props": [ @@ -29209,7 +29168,7 @@ ] }, { - "uuid": "9837bd7f-8aa2-4a15-b131-7da36806cad5", + "uuid": "ab600037-79b6-4a7b-adc7-ca1d8fcc3bd3", "control-id": "cis_rhel10_5-1.18", "description": "No notes for control-id 5.1.18.", "props": [ @@ -29226,7 +29185,7 @@ ] }, { - "uuid": "685d4967-adba-42ff-b56a-71ddc271274b", + "uuid": "c93511cf-7c25-45bb-9ff9-ab16ebb68026", "control-id": "cis_rhel10_5-1.19", "description": "No notes for control-id 5.1.19.", "props": [ @@ -29243,7 +29202,7 @@ ] }, { - "uuid": "c0d55441-1c68-4632-b73d-2a958af852a4", + "uuid": "4eb48c67-e3b2-4c94-89cd-92292e7ace87", "control-id": "cis_rhel10_5-1.20", "description": "No notes for control-id 5.1.20.", "props": [ @@ -29260,7 +29219,7 @@ ] }, { - "uuid": "ed4717f2-3f92-4bec-a08c-81176df9aca3", + "uuid": "bf59486f-a88f-4170-a6de-fdf332125e47", "control-id": "cis_rhel10_5-1.21", "description": "No notes for control-id 5.1.21.", "props": [ @@ -29277,7 +29236,7 @@ ] }, { - "uuid": "e1fb65fc-2f72-4786-8c05-5f4371bf41c7", + "uuid": "805582a3-57fd-42b1-987f-5fabcdded7ca", "control-id": "cis_rhel10_5-1.22", "description": "No notes for control-id 5.1.22.", "props": [ @@ -29294,7 +29253,7 @@ ] }, { - "uuid": "965490c1-a6ae-4fd1-a570-7bcef4bc008d", + "uuid": "58af92af-e015-4b9e-bde4-5bc2af1e5e60", "control-id": "cis_rhel10_5-2.1", "description": "No notes for control-id 5.2.1.", "props": [ @@ -29311,7 +29270,7 @@ ] }, { - "uuid": "7458a6fb-2283-450f-9eae-374bdcadff3f", + "uuid": "d9fd565e-70ed-4e8c-91be-f5e63dadeeed", "control-id": "cis_rhel10_5-2.2", "description": "No notes for control-id 5.2.2.", "props": [ @@ -29328,7 +29287,7 @@ ] }, { - "uuid": "0476e08f-398e-48ba-8d90-3062816b19c9", + "uuid": "7034a6e6-2c49-4904-b2f9-1ab0ab16de1e", "control-id": "cis_rhel10_5-2.3", "description": "No notes for control-id 5.2.3.", "props": [ @@ -29345,7 +29304,7 @@ ] }, { - "uuid": "d7f3460c-95e4-4b34-8fb3-db1b3c2de806", + "uuid": "886ae974-0313-44e0-9f21-e91a1f5f7a7c", "control-id": "cis_rhel10_5-2.5", "description": "No notes for control-id 5.2.5.", "props": [ @@ -29362,7 +29321,7 @@ ] }, { - "uuid": "65ab7862-c6fb-4dee-9ad8-138c1e385616", + "uuid": "a460f31b-9984-40c1-80ef-4482d4229144", "control-id": "cis_rhel10_5-2.6", "description": "No notes for control-id 5.2.6.", "props": [ @@ -29379,7 +29338,7 @@ ] }, { - "uuid": "2371ee3c-53c8-4bed-90da-a9d092e7f14b", + "uuid": "e39df864-5751-486b-82c7-c9dea37d84a9", "control-id": "cis_rhel10_5-2.7", "description": "Members of \"wheel\" or GID 0 groups are checked by default if the group option is not set for\npam_wheel.so module. The recommendation states the group should be empty to reinforce the\nuse of \"sudo\" for privileged access. Therefore, members of these groups should be manually\nchecked or a different group should be informed.", "props": [ @@ -29401,7 +29360,7 @@ ] }, { - "uuid": "669f6c74-bedc-4214-b457-fcf52d569d34", + "uuid": "714cdb4e-9882-4dc9-b4e9-b6d78481d051", "control-id": "cis_rhel10_5-3.1.1", "description": "This requirement is hard to be automated without any specific requirement. The policy even\nstates that provided commands are examples, other custom settings might be in place and the\nsettings might be different depending on site policies. The other rules will already make\nsure there is a correct autheselect profile regardless of the existing settings. It is\nnecessary to better discuss with CIS Community.", "props": [ @@ -29413,7 +29372,7 @@ ] }, { - "uuid": "7be1e4dd-81a9-40ce-8776-f54332c659c0", + "uuid": "737601ac-e4ab-4322-86e5-46ce02036a8c", "control-id": "cis_rhel10_5-3.1.2", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.1.", "props": [ @@ -29435,7 +29394,7 @@ ] }, { - "uuid": "e45d4bce-9004-4860-ba6b-08e86fd9667e", + "uuid": "841c545e-d8b8-4efc-86e5-efbc0448ce11", "control-id": "cis_rhel10_5-3.1.3", "description": "This requirement is also indirectly satisfied by the requirement 5.3.2.2.", "props": [ @@ -29462,7 +29421,7 @@ ] }, { - "uuid": "6ca5ea59-da56-4fdc-8e47-874be92983c6", + "uuid": "7c99c310-8ca3-4156-b9b3-7f859bff4eaf", "control-id": "cis_rhel10_5-3.1.4", "description": "The module is properly enabled by the rules mentioned in related_rules.\nRequirements in 5.3.2.3 use these rules.", "props": [ @@ -29474,7 +29433,7 @@ ] }, { - "uuid": "b4a71a92-1054-46f9-ac32-7c6244e3748e", + "uuid": "d46f194c-6ed8-4645-975a-10905f00c140", "control-id": "cis_rhel10_5-3.1.5", "description": "No notes for control-id 5.3.1.5.", "props": [ @@ -29491,7 +29450,7 @@ ] }, { - "uuid": "399aab86-4840-4b7b-9eb1-b25ee04834cb", + "uuid": "6bb400e4-8150-4376-87af-9f16ff2112c6", "control-id": "cis_rhel10_5-3.2.1.1", "description": "No notes for control-id 5.3.2.1.1.", "props": [ @@ -29508,7 +29467,7 @@ ] }, { - "uuid": "e9105e4e-8eed-439a-85e3-797397e98c47", + "uuid": "c470a8b3-6e4f-4c16-873b-babb21a9f5ba", "control-id": "cis_rhel10_5-3.2.1.2", "description": "The policy also accepts value 0, which means the locked accounts should be manually unlocked\nby an administrator. However, it also mentions that using value 0 can facilitate a DoS\nattack to legitimate users.", "props": [ @@ -29525,7 +29484,7 @@ ] }, { - "uuid": "7e6bf2fa-f53f-44ec-8247-0f3785635245", + "uuid": "dd6e389f-5b85-437c-960b-14d6aedb568b", "control-id": "cis_rhel10_5-3.2.2.1", "description": "No notes for control-id 5.3.2.2.1.", "props": [ @@ -29542,7 +29501,7 @@ ] }, { - "uuid": "bd66a694-86ea-4c34-b52b-617a16781073", + "uuid": "7f7a7725-357f-4bfd-a5d0-2133034cfc2d", "control-id": "cis_rhel10_5-3.2.2.2", "description": "No notes for control-id 5.3.2.2.2.", "props": [ @@ -29559,7 +29518,7 @@ ] }, { - "uuid": "bc08dc4b-298e-49fd-879c-2042f66753ee", + "uuid": "656a5732-8110-42f1-b8d0-635cc1b6066d", "control-id": "cis_rhel10_5-3.2.2.3", "description": "This requirement is expected to be manual. However, in previous versions of the policy\nit was already automated the configuration of \"minclass\" option. This posture was kept for\nRHEL 10 in this new version. Rules related to other options are informed in related_rules.\nIn short, minclass=4 alone can achieve the same result achieved by the combination of the\nother 4 options mentioned in the policy.", "props": [ @@ -29576,7 +29535,7 @@ ] }, { - "uuid": "9b78fae5-44d3-4781-89c0-d0fd3f1008e2", + "uuid": "d2a5a4d9-e954-4570-86a8-b510e15bbce3", "control-id": "cis_rhel10_5-3.2.2.4", "description": "No notes for control-id 5.3.2.2.4.", "props": [ @@ -29593,7 +29552,7 @@ ] }, { - "uuid": "b738c137-ca6c-4381-aee9-6b08f2a83f2d", + "uuid": "adf2ed82-3f86-4977-9350-ca2a9cf80a0a", "control-id": "cis_rhel10_5-3.2.2.5", "description": "No notes for control-id 5.3.2.2.5.", "props": [ @@ -29610,7 +29569,7 @@ ] }, { - "uuid": "7aba6418-c05c-44f6-afd1-d399be8bd905", + "uuid": "a0e0c3b2-e13f-4c76-a687-b3fcd0552afa", "control-id": "cis_rhel10_5-3.2.2.6", "description": "No notes for control-id 5.3.2.2.6.", "props": [ @@ -29627,7 +29586,7 @@ ] }, { - "uuid": "83a8d3ea-285d-4496-b718-2a11e7829a9d", + "uuid": "5ff7b9d3-e9be-400f-befd-bda51adde681", "control-id": "cis_rhel10_5-3.2.2.7", "description": "No notes for control-id 5.3.2.2.7.", "props": [ @@ -29644,7 +29603,7 @@ ] }, { - "uuid": "91be5cfa-bf66-4e4e-bbde-49d45be5d200", + "uuid": "5562c26a-5e45-4afb-9c98-3e77ed68cfa4", "control-id": "cis_rhel10_5-3.2.3.1", "description": "Although mentioned in the section 5.3.3.3, there is no explicit requirement to configure\nretry option of pam_pwhistory. If come in the future, the rule accounts_password_pam_retry\ncan be used.", "props": [ @@ -29666,7 +29625,7 @@ ] }, { - "uuid": "ecd878aa-23c0-41fd-a358-1150d2e088a2", + "uuid": "054a4b7d-4c65-4ffa-adc4-4570b56ea10b", "control-id": "cis_rhel10_5-3.2.3.2", "description": "No notes for control-id 5.3.2.3.2.", "props": [ @@ -29683,7 +29642,7 @@ ] }, { - "uuid": "44a29649-5052-45f9-a8cc-b97715507b07", + "uuid": "8ddf7473-7349-44c7-8743-037833f15be7", "control-id": "cis_rhel10_5-3.2.3.3", "description": "In RHEL 10 pam_pwhistory is enabled via authselect feature, as required in 5.3.1.4. The\nfeature automatically set \"use_authok\" option. In any case, we don't have a rule to check\nthis option specifically.", "props": [ @@ -29700,7 +29659,7 @@ ] }, { - "uuid": "4804e2db-c156-439c-9313-deaae5db968a", + "uuid": "7daf1d23-f32f-4ae9-96f4-5f67a1503b07", "control-id": "cis_rhel10_5-3.2.4.1", "description": "The rule more specifically used in this requirement also satify the requirement 5.3.1.5.", "props": [ @@ -29717,7 +29676,7 @@ ] }, { - "uuid": "e5d86ebb-940f-4ecd-81fa-e430e85d1fa3", + "uuid": "7dc54b14-9c20-45fd-8303-7aba85f9e836", "control-id": "cis_rhel10_5-3.2.4.2", "description": "Usage of pam_unix.so module together with \"remember\" option is deprecated and is not\nrecommended by this policy. Instead, it should be used remember option of pam_pwhistory\nmodule, as required in 5.3.2.3.1. See here for more details about pam_unix.so:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1778929", "props": [ @@ -29734,7 +29693,7 @@ ] }, { - "uuid": "8b0ff651-dd13-4fbd-82ef-310c2df0ac43", + "uuid": "2858219c-97e8-4694-af30-c869da4f1607", "control-id": "cis_rhel10_5-3.2.4.3", "description": "Changes in logindefs mentioned in this requirement are more specifically covered by 5.4.1.4", "props": [ @@ -29756,7 +29715,7 @@ ] }, { - "uuid": "b92e64f1-ad15-40bf-833a-79941273becf", + "uuid": "229b6a58-d9ea-454b-8a2d-2fa12691954f", "control-id": "cis_rhel10_5-3.2.4.4", "description": "In RHEL 10 pam_unix is enabled by default in all authselect profiles already with the\nuse_authtok option set. In any case, we don't have a rule to check this option specifically,\nlike in 5.3.2.3.3.", "props": [ @@ -29773,7 +29732,7 @@ ] }, { - "uuid": "4a61ce92-7a1a-4226-be0c-170c7e1b5129", + "uuid": "5aa616c1-a375-4201-8e51-de5af313704c", "control-id": "cis_rhel10_5-4.1.1", "description": "No notes for control-id 5.4.1.1.", "props": [ @@ -29795,7 +29754,7 @@ ] }, { - "uuid": "c31eee95-ad9f-45fd-9156-879b030449ea", + "uuid": "460ee834-51c5-4bcf-85fa-3fba9085ddcb", "control-id": "cis_rhel10_5-4.1.3", "description": "No notes for control-id 5.4.1.3.", "props": [ @@ -29817,20 +29776,15 @@ ] }, { - "uuid": "11b72b15-0f36-483d-91c7-c8abb832aa60", + "uuid": "1caeb5d2-e948-480d-95bc-185dd2274e76", "control-id": "cis_rhel10_5-4.1.4", - "description": "There's a \"new\" set of options in /etc/login.defs file to define the number of iterations\nperformed during the hashing process.", + "description": "No notes for control-id 5.4.1.4.", "props": [ { "name": "implementation-status", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "implemented" }, - { - "name": "Rule_Id", - "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_libuserconf" - }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", @@ -29839,7 +29793,7 @@ ] }, { - "uuid": "723d34e2-7523-4747-ab28-2f99028bcb1f", + "uuid": "999b7a09-2784-4fd4-80d3-8b88d774a894", "control-id": "cis_rhel10_5-4.1.5", "description": "No notes for control-id 5.4.1.5.", "props": [ @@ -29861,7 +29815,7 @@ ] }, { - "uuid": "82eb6c94-3c7c-4731-8a46-160d7ac9fced", + "uuid": "055fcf41-e5be-4b77-9fc4-0007075c56af", "control-id": "cis_rhel10_5-4.1.6", "description": "No notes for control-id 5.4.1.6.", "props": [ @@ -29878,7 +29832,7 @@ ] }, { - "uuid": "b0b93689-460e-4ffe-be31-962509e7ce61", + "uuid": "7b5a22e3-d4cd-4981-b71f-830389f9f751", "control-id": "cis_rhel10_5-4.2.1", "description": "No notes for control-id 5.4.2.1.", "props": [ @@ -29895,7 +29849,7 @@ ] }, { - "uuid": "d228c97c-a3f1-4dbe-888e-14db9172dfea", + "uuid": "f1050c9a-da8f-49c5-a88a-e57744371151", "control-id": "cis_rhel10_5-4.2.2", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -29912,7 +29866,7 @@ ] }, { - "uuid": "581c4a56-bbb2-437e-a073-e4b4782aea7c", + "uuid": "0bb11a29-9a3b-4194-96de-ec575b8a3dd2", "control-id": "cis_rhel10_5-4.2.3", "description": "There is assessment but no automated remediation for this rule and this sounds reasonable.", "props": [ @@ -29929,7 +29883,7 @@ ] }, { - "uuid": "a4eb854a-33be-47b6-b831-02ce31e6ce10", + "uuid": "76075340-1fed-40d4-82c8-5f2b05aac8bf", "control-id": "cis_rhel10_5-4.2.4", "description": "No notes for control-id 5.4.2.4.", "props": [ @@ -29946,7 +29900,7 @@ ] }, { - "uuid": "39af11ac-4884-43d6-b8f0-a4178be923d4", + "uuid": "456c938a-86a9-4e02-86be-c0811c58412a", "control-id": "cis_rhel10_5-4.2.5", "description": "No notes for control-id 5.4.2.5.", "props": [ @@ -29968,7 +29922,7 @@ ] }, { - "uuid": "1cdd0937-43fe-4434-a985-954a6896ee33", + "uuid": "ea8a324d-70c3-48da-9eb9-6160e0203f3c", "control-id": "cis_rhel10_5-4.2.6", "description": "No notes for control-id 5.4.2.6.", "props": [ @@ -29985,7 +29939,7 @@ ] }, { - "uuid": "23f7c1ea-c0fb-421a-8101-2ee67e794f87", + "uuid": "2b389aa2-2a4b-44b8-9870-d0fde1fff544", "control-id": "cis_rhel10_5-4.2.7", "description": "No notes for control-id 5.4.2.7.", "props": [ @@ -30007,7 +29961,7 @@ ] }, { - "uuid": "0130ef38-c796-456c-9048-9ea1519dcccf", + "uuid": "e62ab662-b2f8-4fac-b418-4e37b8911edc", "control-id": "cis_rhel10_5-4.2.8", "description": "No notes for control-id 5.4.2.8.", "props": [ @@ -30024,7 +29978,7 @@ ] }, { - "uuid": "f75a09d7-23e8-458b-8fd1-a11cc2e7ff16", + "uuid": "0a73e2b3-dfde-4f9b-a2e7-f52b014a2555", "control-id": "cis_rhel10_5-4.3.2", "description": "No notes for control-id 5.4.3.2.", "props": [ @@ -30041,7 +29995,7 @@ ] }, { - "uuid": "79600bdc-e7f2-4219-8006-49a87ffc40f8", + "uuid": "7c0751c4-3f76-47af-bf0a-23b01b7a665b", "control-id": "cis_rhel10_5-4.3.3", "description": "No notes for control-id 5.4.3.3.", "props": [ @@ -30068,7 +30022,7 @@ ] }, { - "uuid": "248b1a94-df59-45c3-9079-29f7bfce8311", + "uuid": "3b5199f1-d145-4fbe-8fb9-261c25e73340", "control-id": "cis_rhel10_6-1.1", "description": "No notes for control-id 6.1.1.", "props": [ @@ -30090,7 +30044,7 @@ ] }, { - "uuid": "af9cd5d4-5c8a-4a6e-9024-b1c041d80b5a", + "uuid": "3ba9fd65-1493-4493-b44b-722412dc7f94", "control-id": "cis_rhel10_6-1.2", "description": "No notes for control-id 6.1.2.", "props": [ @@ -30107,7 +30061,7 @@ ] }, { - "uuid": "09be932b-e452-4c8d-bec0-b527876e145e", + "uuid": "6f1ab0b1-3574-437c-9db6-238544fab464", "control-id": "cis_rhel10_6-1.3", "description": "No notes for control-id 6.1.3.", "props": [ @@ -30124,7 +30078,7 @@ ] }, { - "uuid": "e07d680e-a00b-4440-a37c-62a8479f63b8", + "uuid": "fdaffd47-25ff-4d2c-8935-f0b8abf1b9bd", "control-id": "cis_rhel10_6-2.1.1", "description": "No notes for control-id 6.2.1.1.", "props": [ @@ -30141,7 +30095,7 @@ ] }, { - "uuid": "36130295-64c7-48d2-98c8-b87c7086cf52", + "uuid": "4fc9f574-a9e5-44fb-8015-4d4b4df39ed2", "control-id": "cis_rhel10_6-2.1.2", "description": "The description for control-id cis_rhel10_6-2.1.2.", "props": [ @@ -30154,7 +30108,7 @@ ] }, { - "uuid": "af66f8f1-8c0e-408a-acea-22cc7847416a", + "uuid": "c72b2091-ac7b-487a-9ed0-f8464b7046c7", "control-id": "cis_rhel10_6-2.1.3", "description": "The description for control-id cis_rhel10_6-2.1.3.", "props": [ @@ -30167,7 +30121,7 @@ ] }, { - "uuid": "396c964d-99da-425b-96c0-53632ae23f19", + "uuid": "5bf1e715-2032-4fff-a2bc-95fc41c271db", "control-id": "cis_rhel10_6-2.1.4", "description": "No notes for control-id 6.2.1.4.", "props": [ @@ -30184,7 +30138,7 @@ ] }, { - "uuid": "fb0cfcc7-5acf-4553-8328-082130d39d89", + "uuid": "47ac90d2-3231-4772-b9b2-beb0822f2ac6", "control-id": "cis_rhel10_6-2.2.1.1", "description": "No notes for control-id 6.2.2.1.1.", "props": [ @@ -30201,7 +30155,7 @@ ] }, { - "uuid": "fa50c0b4-2494-41b6-b8c5-4230d293f677", + "uuid": "1305dcff-87a6-4ef0-81a6-51ddaa172c96", "control-id": "cis_rhel10_6-2.2.1.2", "description": "The description for control-id cis_rhel10_6-2.2.1.2.", "props": [ @@ -30214,7 +30168,7 @@ ] }, { - "uuid": "85f474ca-d0b2-440e-ac3b-5745aa68fad1", + "uuid": "998cb71d-e11b-442e-a6e9-7ae193004a5f", "control-id": "cis_rhel10_6-2.2.1.3", "description": "No notes for control-id 6.2.2.1.3.", "props": [ @@ -30231,7 +30185,7 @@ ] }, { - "uuid": "35f60f49-d28c-4342-871c-20a511b6ebf8", + "uuid": "6fa6afa6-1676-4ee1-845e-bb38d91e0aa5", "control-id": "cis_rhel10_6-2.2.1.4", "description": "No notes for control-id 6.2.2.1.4.", "props": [ @@ -30248,7 +30202,7 @@ ] }, { - "uuid": "c9f539c0-ef4f-4b7b-a47d-232fb2c4b85e", + "uuid": "b6d8258a-51fa-4dea-96fb-5f11c333d90f", "control-id": "cis_rhel10_6-2.2.2", "description": "No notes for control-id 6.2.2.2.", "props": [ @@ -30265,7 +30219,7 @@ ] }, { - "uuid": "d535eed5-7b9b-4eb9-bf0c-ca39e7e03cbd", + "uuid": "af4d4672-af6d-46a5-bfbd-94b1d7a4937a", "control-id": "cis_rhel10_6-2.2.3", "description": "No notes for control-id 6.2.2.3.", "props": [ @@ -30282,7 +30236,7 @@ ] }, { - "uuid": "997f6ad4-fe85-419a-8fa0-e8804ad9c583", + "uuid": "cd1a8b78-316d-43d7-8aab-1747680a8723", "control-id": "cis_rhel10_6-2.2.4", "description": "No notes for control-id 6.2.2.4.", "props": [ @@ -30299,7 +30253,7 @@ ] }, { - "uuid": "83629f35-a2e8-4981-bd6b-32ddb5476bc1", + "uuid": "382fdc31-c4c0-49ab-9a55-a596634eb4f5", "control-id": "cis_rhel10_6-2.3.1", "description": "No notes for control-id 6.2.3.1.", "props": [ @@ -30311,7 +30265,7 @@ ] }, { - "uuid": "0598c1da-a0db-4b69-8a3e-c61d6ebda037", + "uuid": "2f6b88f9-0b16-4ddb-9b06-c3c03c277bdc", "control-id": "cis_rhel10_6-2.3.2", "description": "No notes for control-id 6.2.3.2.", "props": [ @@ -30323,7 +30277,7 @@ ] }, { - "uuid": "799b70be-4f0a-44b3-a54c-d5572c7f970d", + "uuid": "1ee1f714-79b6-4379-9504-286ee1c6f283", "control-id": "cis_rhel10_6-2.3.3", "description": "No notes for control-id 6.2.3.3.", "props": [ @@ -30335,7 +30289,7 @@ ] }, { - "uuid": "e207d1cc-e868-4b4d-8bdb-0d835f5b63e6", + "uuid": "5479ea23-a8d6-48fb-ac8d-0abb28a6777e", "control-id": "cis_rhel10_6-2.3.4", "description": "No notes for control-id 6.2.3.4.", "props": [ @@ -30347,7 +30301,7 @@ ] }, { - "uuid": "73ac85e5-a30c-4e33-aff3-8a5cb93bb534", + "uuid": "dbef5a56-f0ae-4dc1-bf0f-b86e0015fb38", "control-id": "cis_rhel10_6-2.3.5", "description": "The description for control-id cis_rhel10_6-2.3.5.", "props": [ @@ -30360,7 +30314,7 @@ ] }, { - "uuid": "4b72d5de-092f-4c37-9438-48a635af1876", + "uuid": "6586ec23-bad8-4b19-9f43-117b3468f97e", "control-id": "cis_rhel10_6-2.3.6", "description": "The description for control-id cis_rhel10_6-2.3.6.", "props": [ @@ -30373,7 +30327,7 @@ ] }, { - "uuid": "8cc1823b-e816-4a6d-92d7-fd5522f399df", + "uuid": "4509c425-cf12-4800-8b24-19c08757195b", "control-id": "cis_rhel10_6-2.3.7", "description": "No notes for control-id 6.2.3.7.", "props": [ @@ -30385,7 +30339,7 @@ ] }, { - "uuid": "74d9a679-7155-418d-a4a0-06e0ec8943be", + "uuid": "b9117ec6-bfdc-482f-a92c-3522c681e98a", "control-id": "cis_rhel10_6-2.3.8", "description": "The description for control-id cis_rhel10_6-2.3.8.", "props": [ @@ -30398,7 +30352,7 @@ ] }, { - "uuid": "1b3c2023-4d57-46c6-99a2-64957ea0e5be", + "uuid": "449786a7-f627-46da-b8b7-f6347ebc0b66", "control-id": "cis_rhel10_6-2.4.1", "description": "It is not harmful to run these rules even if rsyslog is not installed or active.", "props": [ @@ -30425,7 +30379,7 @@ ] }, { - "uuid": "09339fc5-a83d-4db1-b66a-b6958d11d9ad", + "uuid": "dd752ada-f759-49b2-9a14-605af55fc59a", "control-id": "cis_rhel10_7-1.1", "description": "No notes for control-id 7.1.1.", "props": [ @@ -30452,7 +30406,7 @@ ] }, { - "uuid": "c7edce15-3e0a-4ac0-9e47-f6b3a134b2af", + "uuid": "a2bc23d7-6d73-438f-ac19-3063132f6608", "control-id": "cis_rhel10_7-1.2", "description": "No notes for control-id 7.1.2.", "props": [ @@ -30479,7 +30433,7 @@ ] }, { - "uuid": "5057515d-a7f4-487b-b398-f71dd95903d1", + "uuid": "63897cac-97c7-4c84-8eb8-0193c1541d1b", "control-id": "cis_rhel10_7-1.3", "description": "No notes for control-id 7.1.3.", "props": [ @@ -30506,7 +30460,7 @@ ] }, { - "uuid": "0833bea4-cdf7-46ea-86d1-edb5daaa128b", + "uuid": "66543cbb-453e-4966-a3df-d89f954ced10", "control-id": "cis_rhel10_7-1.4", "description": "No notes for control-id 7.1.4.", "props": [ @@ -30533,7 +30487,7 @@ ] }, { - "uuid": "3b8a094e-9934-40eb-912e-14676c11bbe0", + "uuid": "3a9172fb-9c34-44a9-9350-8dbf8b960d09", "control-id": "cis_rhel10_7-1.5", "description": "No notes for control-id 7.1.5.", "props": [ @@ -30560,7 +30514,7 @@ ] }, { - "uuid": "143abc49-ea5e-4f6c-85b9-62209b04b15f", + "uuid": "31782436-ed5f-4b67-98aa-e560c497dafa", "control-id": "cis_rhel10_7-1.6", "description": "No notes for control-id 7.1.6.", "props": [ @@ -30587,7 +30541,7 @@ ] }, { - "uuid": "769ef5ee-028c-4604-b68e-b161d88fc9e1", + "uuid": "52bf90a7-c51d-47d0-be75-bcf9e16e81b7", "control-id": "cis_rhel10_7-1.7", "description": "No notes for control-id 7.1.7.", "props": [ @@ -30614,7 +30568,7 @@ ] }, { - "uuid": "8b79a6fa-a838-457a-9dfe-0dd877caaa60", + "uuid": "e94f8f38-fe0b-4d99-a9ec-ff7ef4da5fb0", "control-id": "cis_rhel10_7-1.8", "description": "No notes for control-id 7.1.8.", "props": [ @@ -30641,7 +30595,7 @@ ] }, { - "uuid": "b33fa5f3-2f4d-48ce-a1a5-3a3bd8b10c50", + "uuid": "29db3e51-5871-4edb-a27c-cc848129b8c2", "control-id": "cis_rhel10_7-1.9", "description": "No notes for control-id 7.1.9.", "props": [ @@ -30668,7 +30622,7 @@ ] }, { - "uuid": "512d2da4-1e59-463e-b591-6b5b8ded00ae", + "uuid": "a7c90473-6436-4faf-882a-27d1ad21c829", "control-id": "cis_rhel10_7-1.10", "description": "No notes for control-id 7.1.10.", "props": [ @@ -30710,7 +30664,7 @@ ] }, { - "uuid": "3d763275-c840-4e3f-baf3-8f46129fdc67", + "uuid": "0112f4de-8173-41d7-9df0-712812ead58f", "control-id": "cis_rhel10_7-1.11", "description": "No notes for control-id 7.1.11.", "props": [ @@ -30732,7 +30686,7 @@ ] }, { - "uuid": "1fd0df53-f904-4e83-88cc-a92432035931", + "uuid": "f59cf67f-80ca-42e4-84a0-e9ffb71c8126", "control-id": "cis_rhel10_7-1.12", "description": "No notes for control-id 7.1.12.", "props": [ @@ -30754,7 +30708,7 @@ ] }, { - "uuid": "d1d57bdf-f322-4fd6-9d92-c51016d72129", + "uuid": "12f406f8-ed40-4d6e-83a8-907fa930e60e", "control-id": "cis_rhel10_7-1.13", "description": "The description for control-id cis_rhel10_7-1.13.", "props": [ @@ -30767,7 +30721,7 @@ ] }, { - "uuid": "e691b7e3-5bfb-43c5-85a0-885326af8925", + "uuid": "3e5d2b65-e94d-44ae-bd9d-3eed5c7047d6", "control-id": "cis_rhel10_7-2.1", "description": "No notes for control-id 7.2.1.", "props": [ @@ -30784,7 +30738,7 @@ ] }, { - "uuid": "9b6ca3f4-d6da-4acf-90e7-5da1143d4d20", + "uuid": "53397de9-340c-4ebd-b9ce-2c3a62904864", "control-id": "cis_rhel10_7-2.2", "description": "No notes for control-id 7.2.2.", "props": [ @@ -30801,7 +30755,7 @@ ] }, { - "uuid": "f157f6ad-3dc7-4478-b198-fcc778a78a5b", + "uuid": "f7315bd8-38d1-4715-9d1c-ee68b1b5ee8b", "control-id": "cis_rhel10_7-2.3", "description": "No notes for control-id 7.2.3.", "props": [ @@ -30818,7 +30772,7 @@ ] }, { - "uuid": "3a946528-0dfa-434f-ae26-a72cf1b96bf9", + "uuid": "64e38ff6-df19-41c8-b0b1-06fa611ef6ec", "control-id": "cis_rhel10_7-2.4", "description": "No notes for control-id 7.2.4.", "props": [ @@ -30835,7 +30789,7 @@ ] }, { - "uuid": "ab3ad5d4-3935-4a13-b9ac-2ea054a1ec1a", + "uuid": "9bb19ff4-23b3-480c-8913-c6d708e4425e", "control-id": "cis_rhel10_7-2.5", "description": "No notes for control-id 7.2.5.", "props": [ @@ -30852,7 +30806,7 @@ ] }, { - "uuid": "aacd462c-0b71-401c-b971-2df84c11c252", + "uuid": "a1ea56cd-1770-4518-9132-b9c767464895", "control-id": "cis_rhel10_7-2.6", "description": "No notes for control-id 7.2.6.", "props": [ @@ -30869,7 +30823,7 @@ ] }, { - "uuid": "3b501a9a-72f4-4fcc-b4c2-d586013a597d", + "uuid": "3f1e8b94-2226-4dd1-a34f-178115235238", "control-id": "cis_rhel10_7-2.7", "description": "No notes for control-id 7.2.7.", "props": [ @@ -30886,7 +30840,7 @@ ] }, { - "uuid": "3c3c1d09-81d6-4652-b918-ff9fe2b9e017", + "uuid": "877585de-c66e-4199-a8f7-b39e977fd30f", "control-id": "cis_rhel10_7-2.8", "description": "No notes for control-id 7.2.8.", "props": [ @@ -30913,7 +30867,7 @@ ] }, { - "uuid": "d5259436-4b21-4864-9dc8-e678bd7fc136", + "uuid": "3a1d311a-1729-438a-8879-c123dc9da17b", "control-id": "cis_rhel10_7-2.9", "description": "No notes for control-id 7.2.9.", "props": [ diff --git a/component-definitions/rhel10/rhel10-ism_o-base/component-definition.json b/component-definitions/rhel10/rhel10-ism_o-base/component-definition.json index 286fc6b9..0e2af176 100644 --- a/component-definitions/rhel10/rhel10-ism_o-base/component-definition.json +++ b/component-definitions/rhel10/rhel10-ism_o-base/component-definition.json @@ -3,8 +3,8 @@ "uuid": "608557af-015f-43b1-aacb-5926b2660da3", "metadata": { "title": "Component definition for rhel10", - "last-modified": "2025-12-11T18:27:53.105403+00:00", - "version": "1.3", + "last-modified": "2025-12-17T11:15:49.970100+00:00", + "version": "1.4", "oscal-version": "1.1.3" }, "components": [ @@ -167,7 +167,7 @@ { "name": "Parameter_Value_Alternatives_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -317,1975 +317,1987 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_never_disabled", + "value": "package_sequoia-sq_installed", "remarks": "rule_set_007" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled for All dnf Package Repositories", + "value": "Install sequoia-sq Package", "remarks": "rule_set_007" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_local_packages", + "value": "ensure_gpgcheck_never_disabled", "remarks": "rule_set_008" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled for Local Packages", + "value": "Ensure gpgcheck Enabled for All dnf Package Repositories", "remarks": "rule_set_008" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_globally_activated", + "value": "ensure_gpgcheck_local_packages", "remarks": "rule_set_009" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled In Main dnf Configuration", + "value": "Ensure gpgcheck Enabled for Local Packages", "remarks": "rule_set_009" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dnf-automatic_security_updates_only", + "value": "ensure_gpgcheck_globally_activated", "remarks": "rule_set_010" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure dnf-automatic to Install Only Security Updates", + "value": "Ensure gpgcheck Enabled In Main dnf Configuration", "remarks": "rule_set_010" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_no_uid_except_zero", + "value": "dnf-automatic_security_updates_only", "remarks": "rule_set_011" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Only Root Has UID 0", + "value": "Configure dnf-automatic to Install Only Security Updates", "remarks": "rule_set_011" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sudo_remove_nopasswd", + "value": "accounts_no_uid_except_zero", "remarks": "rule_set_012" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD", + "value": "Verify Only Root Has UID 0", "remarks": "rule_set_012" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sudo_remove_no_authenticate", + "value": "sudo_remove_nopasswd", "remarks": "rule_set_013" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo !authenticate", + "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD", "remarks": "rule_set_013" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sudo_require_authentication", + "value": "sudo_remove_no_authenticate", "remarks": "rule_set_014" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo", + "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo !authenticate", "remarks": "rule_set_014" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_fapolicyd_installed", + "value": "sudo_require_authentication", "remarks": "rule_set_015" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install fapolicyd Package", + "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo", "remarks": "rule_set_015" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_fapolicyd_enabled", + "value": "package_fapolicyd_installed", "remarks": "rule_set_016" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable the File Access Policy Service", + "value": "Install fapolicyd Package", "remarks": "rule_set_016" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_crypto_policy", + "value": "service_fapolicyd_enabled", "remarks": "rule_set_017" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure System Cryptography Policy", + "value": "Enable the File Access Policy Service", "remarks": "rule_set_017" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy", + "value": "configure_crypto_policy", "remarks": "rule_set_018" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure SSH to use System Crypto Policy", + "value": "Configure System Cryptography Policy", "remarks": "rule_set_018" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_use_directory_configuration", + "value": "configure_ssh_crypto_policy", "remarks": "rule_set_019" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Distribute the SSH Server configuration to multiple files in a config directory.", + "value": "Configure SSH to use System Crypto Policy", "remarks": "rule_set_019" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_root_login", + "value": "sshd_use_directory_configuration", "remarks": "rule_set_020" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Root Login", + "value": "Distribute the SSH Server configuration to multiple files in a config directory.", "remarks": "rule_set_020" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_gssapi_auth", + "value": "sshd_disable_root_login", "remarks": "rule_set_021" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable GSSAPI Authentication", + "value": "Disable SSH Root Login", "remarks": "rule_set_021" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_print_last_log", + "value": "sshd_disable_gssapi_auth", "remarks": "rule_set_022" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable SSH Print Last Log", + "value": "Disable GSSAPI Authentication", "remarks": "rule_set_022" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_do_not_permit_user_env", + "value": "sshd_print_last_log", "remarks": "rule_set_023" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Do Not Allow SSH Environment Options", + "value": "Enable SSH Print Last Log", "remarks": "rule_set_023" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_rhosts", + "value": "sshd_do_not_permit_user_env", "remarks": "rule_set_024" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Support for .rhosts Files", + "value": "Do Not Allow SSH Environment Options", "remarks": "rule_set_024" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_set_loglevel_info", + "value": "sshd_disable_rhosts", "remarks": "rule_set_025" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set LogLevel to INFO", + "value": "Disable SSH Support for .rhosts Files", "remarks": "rule_set_025" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_empty_passwords", + "value": "sshd_set_loglevel_info", "remarks": "rule_set_026" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Access via Empty Passwords", + "value": "Set LogLevel to INFO", "remarks": "rule_set_026" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_user_known_hosts", + "value": "sshd_disable_empty_passwords", "remarks": "rule_set_027" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Support for User Known Hosts", + "value": "Disable SSH Access via Empty Passwords", "remarks": "rule_set_027" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_enable_strictmodes", + "value": "sshd_disable_user_known_hosts", "remarks": "rule_set_028" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Use of Strict Mode Checking", + "value": "Disable SSH Support for User Known Hosts", "remarks": "rule_set_028" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_rsyslog_installed", + "value": "sshd_enable_strictmodes", "remarks": "rule_set_029" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure rsyslog is Installed", + "value": "Enable Use of Strict Mode Checking", "remarks": "rule_set_029" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_rsyslog_enabled", + "value": "package_rsyslog_installed", "remarks": "rule_set_030" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable rsyslog Service", + "value": "Ensure rsyslog is Installed", "remarks": "rule_set_030" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_auditd_enabled", + "value": "service_rsyslog_enabled", "remarks": "rule_set_031" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable auditd Service", + "value": "Enable rsyslog Service", "remarks": "rule_set_031" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "auditd_data_retention_flush", + "value": "service_auditd_enabled", "remarks": "rule_set_032" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure auditd flush priority", + "value": "Enable auditd Service", "remarks": "rule_set_032" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "auditd_local_events", + "value": "auditd_data_retention_flush", "remarks": "rule_set_033" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Include Local Events in Audit Logs", + "value": "Configure auditd flush priority", "remarks": "rule_set_033" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "auditd_write_logs", + "value": "auditd_local_events", "remarks": "rule_set_034" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Write Audit Logs to the Disk", + "value": "Include Local Events in Audit Logs", "remarks": "rule_set_034" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "auditd_log_format", + "value": "auditd_write_logs", "remarks": "rule_set_035" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Resolve information before writing to audit logs", + "value": "Write Audit Logs to the Disk", "remarks": "rule_set_035" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "auditd_freq", + "value": "auditd_log_format", "remarks": "rule_set_036" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set number of records to cause an explicit flush to audit logs", + "value": "Resolve information before writing to audit logs", "remarks": "rule_set_036" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "auditd_name_format", + "value": "auditd_freq", "remarks": "rule_set_037" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set type of computer node name logging in audit logs", + "value": "Set number of records to cause an explicit flush to audit logs", "remarks": "rule_set_037" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_login_events_faillock", + "value": "auditd_name_format", "remarks": "rule_set_038" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Logon and Logout Events - faillock", + "value": "Set type of computer node name logging in audit logs", "remarks": "rule_set_038" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_time_adjtimex", + "value": "audit_rules_login_events_faillock", "remarks": "rule_set_039" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record attempts to alter time through adjtimex", + "value": "Record Attempts to Alter Logon and Logout Events - faillock", "remarks": "rule_set_039" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_time_clock_settime", + "value": "audit_rules_time_adjtimex", "remarks": "rule_set_040" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Time Through clock_settime", + "value": "Record attempts to alter time through adjtimex", "remarks": "rule_set_040" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_time_watch_localtime", + "value": "audit_rules_time_clock_settime", "remarks": "rule_set_041" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter the localtime File", + "value": "Record Attempts to Alter Time Through clock_settime", "remarks": "rule_set_041" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_time_settimeofday", + "value": "audit_rules_time_watch_localtime", "remarks": "rule_set_042" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record attempts to alter time through settimeofday", + "value": "Record Attempts to Alter the localtime File", "remarks": "rule_set_042" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_time_stime", + "value": "audit_rules_time_settimeofday", "remarks": "rule_set_043" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Time Through stime", + "value": "Record attempts to alter time through settimeofday", "remarks": "rule_set_043" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_execution_restorecon", + "value": "audit_rules_time_stime", "remarks": "rule_set_044" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Any Attempts to Run restorecon", + "value": "Record Attempts to Alter Time Through stime", "remarks": "rule_set_044" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_execution_chcon", + "value": "audit_rules_execution_restorecon", "remarks": "rule_set_045" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Any Attempts to Run chcon", + "value": "Record Any Attempts to Run restorecon", "remarks": "rule_set_045" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_execution_semanage", + "value": "audit_rules_execution_chcon", "remarks": "rule_set_046" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Any Attempts to Run semanage", + "value": "Record Any Attempts to Run chcon", "remarks": "rule_set_046" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_execution_setsebool", + "value": "audit_rules_execution_semanage", "remarks": "rule_set_047" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Any Attempts to Run setsebool", + "value": "Record Any Attempts to Run semanage", "remarks": "rule_set_047" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_execution_setfiles", + "value": "audit_rules_execution_setsebool", "remarks": "rule_set_048" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Any Attempts to Run setfiles", + "value": "Record Any Attempts to Run setsebool", "remarks": "rule_set_048" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_execution_seunshare", + "value": "audit_rules_execution_setfiles", "remarks": "rule_set_049" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Any Attempts to Run seunshare", + "value": "Record Any Attempts to Run setfiles", "remarks": "rule_set_049" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_sysadmin_actions", + "value": "audit_rules_execution_seunshare", "remarks": "rule_set_050" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure auditd Collects System Administrator Actions", + "value": "Record Any Attempts to Run seunshare", "remarks": "rule_set_050" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_networkconfig_modification", + "value": "audit_rules_sysadmin_actions", "remarks": "rule_set_051" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Network Environment", + "value": "Ensure auditd Collects System Administrator Actions", "remarks": "rule_set_051" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_usergroup_modification_group", + "value": "audit_rules_networkconfig_modification", "remarks": "rule_set_052" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify User/Group Information - /etc/group", + "value": "Record Events that Modify the System's Network Environment", "remarks": "rule_set_052" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_usergroup_modification_gshadow", + "value": "audit_rules_usergroup_modification_group", "remarks": "rule_set_053" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify User/Group Information - /etc/gshadow", + "value": "Record Events that Modify User/Group Information - /etc/group", "remarks": "rule_set_053" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_usergroup_modification_opasswd", + "value": "audit_rules_usergroup_modification_gshadow", "remarks": "rule_set_054" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", + "value": "Record Events that Modify User/Group Information - /etc/gshadow", "remarks": "rule_set_054" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_usergroup_modification_passwd", + "value": "audit_rules_usergroup_modification_opasswd", "remarks": "rule_set_055" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify User/Group Information - /etc/passwd", + "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", "remarks": "rule_set_055" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_usergroup_modification_shadow", + "value": "audit_rules_usergroup_modification_passwd", "remarks": "rule_set_056" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify User/Group Information - /etc/shadow", + "value": "Record Events that Modify User/Group Information - /etc/passwd", "remarks": "rule_set_056" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_dac_modification_chmod", + "value": "audit_rules_usergroup_modification_shadow", "remarks": "rule_set_057" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", + "value": "Record Events that Modify User/Group Information - /etc/shadow", "remarks": "rule_set_057" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_dac_modification_chown", + "value": "audit_rules_dac_modification_chmod", "remarks": "rule_set_058" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Discretionary Access Controls - chown", + "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", "remarks": "rule_set_058" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_kernel_module_loading", + "value": "audit_rules_dac_modification_chown", "remarks": "rule_set_059" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading", + "value": "Record Events that Modify the System's Discretionary Access Controls - chown", "remarks": "rule_set_059" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_randomize_va_space", + "value": "audit_rules_kernel_module_loading", "remarks": "rule_set_060" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Randomized Layout of Virtual Address Space", + "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading", "remarks": "rule_set_060" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_exec_shield", + "value": "sysctl_kernel_randomize_va_space", "remarks": "rule_set_061" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable ExecShield via sysctl", + "value": "Enable Randomized Layout of Virtual Address Space", "remarks": "rule_set_061" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_kptr_restrict", + "value": "sysctl_kernel_exec_shield", "remarks": "rule_set_062" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict Exposed Kernel Pointer Addresses Access", + "value": "Enable ExecShield via sysctl", "remarks": "rule_set_062" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_dmesg_restrict", + "value": "sysctl_kernel_kptr_restrict", "remarks": "rule_set_063" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict Access to Kernel Message Buffer", + "value": "Restrict Exposed Kernel Pointer Addresses Access", "remarks": "rule_set_063" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_kexec_load_disabled", + "value": "sysctl_kernel_dmesg_restrict", "remarks": "rule_set_064" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Image Loading", + "value": "Restrict Access to Kernel Message Buffer", "remarks": "rule_set_064" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_yama_ptrace_scope", + "value": "sysctl_kernel_kexec_load_disabled", "remarks": "rule_set_065" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict usage of ptrace to descendant processes", + "value": "Disable Kernel Image Loading", "remarks": "rule_set_065" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_unprivileged_bpf_disabled", + "value": "sysctl_kernel_yama_ptrace_scope", "remarks": "rule_set_066" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Access to Network bpf() Syscall From Unprivileged Processes", + "value": "Restrict usage of ptrace to descendant processes", "remarks": "rule_set_066" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_core_bpf_jit_harden", + "value": "sysctl_kernel_unprivileged_bpf_disabled", "remarks": "rule_set_067" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Harden the operation of the BPF just-in-time compiler", + "value": "Disable Access to Network bpf() Syscall From Unprivileged Processes", "remarks": "rule_set_067" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "selinux_state", + "value": "sysctl_net_core_bpf_jit_harden", "remarks": "rule_set_068" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure SELinux State is Enforcing", + "value": "Harden the operation of the BPF just-in-time compiler", "remarks": "rule_set_068" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "selinux_policytype", + "value": "selinux_state", "remarks": "rule_set_069" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure SELinux Policy", + "value": "Ensure SELinux State is Enforcing", "remarks": "rule_set_069" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_unauthorized_sgid", + "value": "selinux_policytype", "remarks": "rule_set_070" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All SGID Executables Are Authorized", + "value": "Configure SELinux Policy", "remarks": "rule_set_070" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_unauthorized_suid", + "value": "file_permissions_unauthorized_sgid", "remarks": "rule_set_071" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All SUID Executables Are Authorized", + "value": "Ensure All SGID Executables Are Authorized", "remarks": "rule_set_071" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_unauthorized_world_writable", + "value": "file_permissions_unauthorized_suid", "remarks": "rule_set_072" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure No World-Writable Files Exist", + "value": "Ensure All SUID Executables Are Authorized", "remarks": "rule_set_072" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dir_perms_world_writable_sticky_bits", + "value": "file_permissions_unauthorized_world_writable", "remarks": "rule_set_073" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify that All World-Writable Directories Have Sticky Bits Set", + "value": "Ensure No World-Writable Files Exist", "remarks": "rule_set_073" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_library_dirs", + "value": "dir_perms_world_writable_sticky_bits", "remarks": "rule_set_074" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify that Shared Library Files Have Restrictive Permissions", + "value": "Verify that All World-Writable Directories Have Sticky Bits Set", "remarks": "rule_set_074" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_ownership_binary_dirs", + "value": "file_permissions_library_dirs", "remarks": "rule_set_075" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify that System Executables Have Root Ownership", + "value": "Verify that Shared Library Files Have Restrictive Permissions", "remarks": "rule_set_075" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_binary_dirs", + "value": "file_ownership_binary_dirs", "remarks": "rule_set_076" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify that System Executables Have Restrictive Permissions", + "value": "Verify that System Executables Have Root Ownership", "remarks": "rule_set_076" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_ownership_library_dirs", + "value": "file_permissions_binary_dirs", "remarks": "rule_set_077" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify that Shared Library Files Have Root Ownership", + "value": "Verify that System Executables Have Restrictive Permissions", "remarks": "rule_set_077" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_empty_passwords", + "value": "file_ownership_library_dirs", "remarks": "rule_set_078" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Prevent Login to Accounts With Empty Password", + "value": "Verify that Shared Library Files Have Root Ownership", "remarks": "rule_set_078" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_dev_shm_nodev", + "value": "no_empty_passwords", "remarks": "rule_set_079" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add nodev Option to /dev/shm", + "value": "Prevent Login to Accounts With Empty Password", "remarks": "rule_set_079" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_dev_shm_nosuid", + "value": "mount_option_dev_shm_nodev", "remarks": "rule_set_080" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add nosuid Option to /dev/shm", + "value": "Add nodev Option to /dev/shm", "remarks": "rule_set_080" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_dev_shm_noexec", + "value": "mount_option_dev_shm_nosuid", "remarks": "rule_set_081" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add noexec Option to /dev/shm", + "value": "Add nosuid Option to /dev/shm", "remarks": "rule_set_081" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_firewalld_installed", + "value": "mount_option_dev_shm_noexec", "remarks": "rule_set_082" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install firewalld Package", + "value": "Add noexec Option to /dev/shm", "remarks": "rule_set_082" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_firewalld_enabled", + "value": "package_firewalld_installed", "remarks": "rule_set_083" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify firewalld Enabled", + "value": "Install firewalld Package", "remarks": "rule_set_083" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "network_sniffer_disabled", + "value": "service_firewalld_enabled", "remarks": "rule_set_084" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure System is Not Acting as a Network Sniffer", + "value": "Verify firewalld Enabled", "remarks": "rule_set_084" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_maximum_age_login_defs", + "value": "network_sniffer_disabled", "remarks": "rule_set_085" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Maximum Age", + "value": "Ensure System is Not Acting as a Network Sniffer", "remarks": "rule_set_085" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_minimum_age_login_defs", + "value": "accounts_maximum_age_login_defs", "remarks": "rule_set_086" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Minimum Age", + "value": "Set Password Maximum Age", "remarks": "rule_set_086" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_warn_age_login_defs", + "value": "accounts_minimum_age_login_defs", "remarks": "rule_set_087" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Warning Age", + "value": "Set Password Minimum Age", "remarks": "rule_set_087" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_kerberos_crypto_policy", + "value": "accounts_password_warn_age_login_defs", "remarks": "rule_set_088" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Kerberos to use System Crypto Policy", + "value": "Set Password Warning Age", "remarks": "rule_set_088" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "enable_ldap_client", + "value": "configure_kerberos_crypto_policy", "remarks": "rule_set_089" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable the LDAP Client For Use in Authconfig", + "value": "Configure Kerberos to use System Crypto Policy", "remarks": "rule_set_089" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "kerberos_disable_no_keytab", + "value": "enable_ldap_client", "remarks": "rule_set_090" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kerberos by removing host keytab", + "value": "Enable the LDAP Client For Use in Authconfig", "remarks": "rule_set_090" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "network_nmcli_permissions", + "value": "kerberos_disable_no_keytab", "remarks": "rule_set_091" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Prevent non-Privileged Users from Modifying Network Interfaces using nmcli", + "value": "Disable Kerberos by removing host keytab", "remarks": "rule_set_091" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sebool_kerberos_enabled", + "value": "network_nmcli_permissions", "remarks": "rule_set_092" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable the kerberos_enabled SELinux Boolean", + "value": "Prevent non-Privileged Users from Modifying Network Interfaces using nmcli", "remarks": "rule_set_092" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_libuserconf", + "value": "sebool_kerberos_enabled", "remarks": "rule_set_093" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Hashing Algorithm in /etc/libuser.conf", + "value": "Enable the kerberos_enabled SELinux Boolean", "remarks": "rule_set_093" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_logindefs", + "value": "set_password_hashing_algorithm_libuserconf", "remarks": "rule_set_094" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Hashing Algorithm in /etc/login.defs", + "value": "Set Password Hashing Algorithm in /etc/libuser.conf", "remarks": "rule_set_094" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_passwordauth", + "value": "set_password_hashing_algorithm_logindefs", "remarks": "rule_set_095" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set PAM Password Hashing Algorithm - password-auth", + "value": "Set Password Hashing Algorithm in /etc/login.defs", "remarks": "rule_set_095" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_systemauth", + "value": "set_password_hashing_algorithm_passwordauth", "remarks": "rule_set_096" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set PAM Password Hashing Algorithm - system-auth", + "value": "Set PAM Password Hashing Algorithm - password-auth", "remarks": "rule_set_096" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_minlen_login_defs", + "value": "set_password_hashing_algorithm_systemauth", "remarks": "rule_set_097" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Minimum Length in login.defs", + "value": "Set PAM Password Hashing Algorithm - system-auth", "remarks": "rule_set_097" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_dcredit", + "value": "accounts_password_minlen_login_defs", "remarks": "rule_set_098" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure PAM Enforces Password Requirements - Minimum Digit Characters", + "value": "Set Password Minimum Length in login.defs", "remarks": "rule_set_098" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_lcredit", + "value": "accounts_password_pam_dcredit", "remarks": "rule_set_099" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure PAM Enforces Password Requirements - Minimum Lowercase Characters", + "value": "Ensure PAM Enforces Password Requirements - Minimum Digit Characters", "remarks": "rule_set_099" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_minclass", + "value": "accounts_password_pam_lcredit", "remarks": "rule_set_100" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", + "value": "Ensure PAM Enforces Password Requirements - Minimum Lowercase Characters", "remarks": "rule_set_100" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_minlen", + "value": "accounts_password_pam_minclass", "remarks": "rule_set_101" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure PAM Enforces Password Requirements - Minimum Length", + "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", "remarks": "rule_set_101" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_ocredit", + "value": "accounts_password_pam_minlen", "remarks": "rule_set_102" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure PAM Enforces Password Requirements - Minimum Special Characters", + "value": "Ensure PAM Enforces Password Requirements - Minimum Length", "remarks": "rule_set_102" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_ucredit", + "value": "accounts_password_pam_ocredit", "remarks": "rule_set_103" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure PAM Enforces Password Requirements - Minimum Uppercase Characters", + "value": "Ensure PAM Enforces Password Requirements - Minimum Special Characters", "remarks": "rule_set_103" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_passwords_pam_faillock_deny", + "value": "accounts_password_pam_ucredit", "remarks": "rule_set_104" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Lock Accounts After Failed Password Attempts", + "value": "Ensure PAM Enforces Password Requirements - Minimum Uppercase Characters", "remarks": "rule_set_104" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_passwords_pam_faillock_deny_root", + "value": "accounts_passwords_pam_faillock_deny", "remarks": "rule_set_105" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure the root Account for Failed Password Attempts", + "value": "Lock Accounts After Failed Password Attempts", "remarks": "rule_set_105" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_passwords_pam_faillock_interval", + "value": "accounts_passwords_pam_faillock_deny_root", "remarks": "rule_set_106" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Interval For Counting Failed Password Attempts", + "value": "Configure the root Account for Failed Password Attempts", "remarks": "rule_set_106" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_passwords_pam_faillock_unlock_time", + "value": "accounts_passwords_pam_faillock_interval", "remarks": "rule_set_107" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Lockout Time for Failed Password Attempts", + "value": "Set Interval For Counting Failed Password Attempts", "remarks": "rule_set_107" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "disable_host_auth", + "value": "accounts_passwords_pam_faillock_unlock_time", "remarks": "rule_set_108" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Host-Based Authentication", + "value": "Set Lockout Time for Failed Password Attempts", "remarks": "rule_set_108" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "require_emergency_target_auth", + "value": "disable_host_auth", "remarks": "rule_set_109" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Require Authentication for Emergency Systemd Target", + "value": "Disable Host-Based Authentication", "remarks": "rule_set_109" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sebool_authlogin_nsswitch_use_ldap", + "value": "require_emergency_target_auth", "remarks": "rule_set_110" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable the authlogin_nsswitch_use_ldap SELinux Boolean", + "value": "Require Authentication for Emergency Systemd Target", "remarks": "rule_set_110" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sebool_authlogin_radius", + "value": "sebool_authlogin_nsswitch_use_ldap", "remarks": "rule_set_111" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable the authlogin_radius SELinux Boolean", + "value": "Disable the authlogin_nsswitch_use_ldap SELinux Boolean", "remarks": "rule_set_111" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_kerb_auth", + "value": "sebool_authlogin_radius", "remarks": "rule_set_112" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kerberos Authentication", + "value": "Disable the authlogin_radius SELinux Boolean", "remarks": "rule_set_112" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_set_max_auth_tries", + "value": "sshd_disable_kerb_auth", "remarks": "rule_set_113" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set SSH authentication attempt limit", + "value": "Disable Kerberos Authentication", "remarks": "rule_set_113" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sssd_enable_smartcards", + "value": "sshd_set_max_auth_tries", "remarks": "rule_set_114" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Smartcards in SSSD", + "value": "Set SSH authentication attempt limit", "remarks": "rule_set_114" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_enable_warning_banner", + "value": "sssd_enable_smartcards", "remarks": "rule_set_115" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable SSH Warning Banner", + "value": "Enable Smartcards in SSSD", "remarks": "rule_set_115" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_x11_forwarding", + "value": "sshd_enable_warning_banner", "remarks": "rule_set_116" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable X11 Forwarding", + "value": "Enable SSH Warning Banner", "remarks": "rule_set_116" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_access_failed", + "value": "sshd_disable_x11_forwarding", "remarks": "rule_set_117" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure auditing of unsuccessful file accesses", + "value": "Disable X11 Forwarding", "remarks": "rule_set_117" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_access_failed_aarch64", + "value": "audit_access_failed", "remarks": "rule_set_118" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure auditing of unsuccessful file accesses (AArch64)", + "value": "Configure auditing of unsuccessful file accesses", "remarks": "rule_set_118" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_access_failed_ppc64le", + "value": "audit_access_failed_aarch64", "remarks": "rule_set_119" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure auditing of unsuccessful file accesses (ppc64le)", + "value": "Configure auditing of unsuccessful file accesses (AArch64)", "remarks": "rule_set_119" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_access_success", + "value": "audit_access_failed_ppc64le", "remarks": "rule_set_120" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure auditing of successful file accesses", + "value": "Configure auditing of unsuccessful file accesses (ppc64le)", "remarks": "rule_set_120" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_access_success_aarch64", + "value": "audit_access_success", "remarks": "rule_set_121" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure auditing of successful file accesses (AArch64)", + "value": "Configure auditing of successful file accesses", "remarks": "rule_set_121" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_access_success_ppc64le", + "value": "audit_access_success_aarch64", "remarks": "rule_set_122" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure auditing of successful file accesses (ppc64le)", + "value": "Configure auditing of successful file accesses (AArch64)", "remarks": "rule_set_122" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_privileged_commands", + "value": "audit_access_success_ppc64le", "remarks": "rule_set_123" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure auditd Collects Information on the Use of Privileged Commands", + "value": "Configure auditing of successful file accesses (ppc64le)", "remarks": "rule_set_123" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_session_events_utmp", + "value": "audit_rules_privileged_commands", "remarks": "rule_set_124" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Process and Session Initiation Information utmp", + "value": "Ensure auditd Collects Information on the Use of Privileged Commands", "remarks": "rule_set_124" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_session_events_btmp", + "value": "audit_rules_session_events_utmp", "remarks": "rule_set_125" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Process and Session Initiation Information btmp", + "value": "Record Attempts to Alter Process and Session Initiation Information utmp", "remarks": "rule_set_125" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_session_events_wtmp", + "value": "audit_rules_session_events_btmp", "remarks": "rule_set_126" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", + "value": "Record Attempts to Alter Process and Session Initiation Information btmp", "remarks": "rule_set_126" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_unsuccessful_file_modification_creat", + "value": "audit_rules_session_events_wtmp", "remarks": "rule_set_127" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Unsuccessful Access Attempts to Files - creat", + "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", "remarks": "rule_set_127" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_unsuccessful_file_modification_open", + "value": "audit_rules_unsuccessful_file_modification_creat", "remarks": "rule_set_128" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Unsuccessful Access Attempts to Files - open", + "value": "Record Unsuccessful Access Attempts to Files - creat", "remarks": "rule_set_128" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_unsuccessful_file_modification_openat", + "value": "audit_rules_unsuccessful_file_modification_open", "remarks": "rule_set_129" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Unsuccessful Access Attempts to Files - openat", + "value": "Record Unsuccessful Access Attempts to Files - open", "remarks": "rule_set_129" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_unsuccessful_file_modification_open_by_handle_at", + "value": "audit_rules_unsuccessful_file_modification_openat", "remarks": "rule_set_130" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Unsuccessful Access Attempts to Files - open_by_handle_at", + "value": "Record Unsuccessful Access Attempts to Files - openat", "remarks": "rule_set_130" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_unsuccessful_file_modification_truncate", + "value": "audit_rules_unsuccessful_file_modification_open_by_handle_at", "remarks": "rule_set_131" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Unsuccessful Access Attempts to Files - truncate", + "value": "Record Unsuccessful Access Attempts to Files - open_by_handle_at", "remarks": "rule_set_131" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_unsuccessful_file_modification_ftruncate", + "value": "audit_rules_unsuccessful_file_modification_truncate", "remarks": "rule_set_132" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Unsuccessful Access Attempts to Files - ftruncate", + "value": "Record Unsuccessful Access Attempts to Files - truncate", "remarks": "rule_set_132" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_audit_installed", + "value": "audit_rules_unsuccessful_file_modification_ftruncate", "remarks": "rule_set_133" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the audit Subsystem is Installed", + "value": "Record Unsuccessful Access Attempts to Files - ftruncate", "remarks": "rule_set_133" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sebool_auditadm_exec_content", + "value": "package_audit_installed", "remarks": "rule_set_134" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable the auditadm_exec_content SELinux Boolean", + "value": "Ensure the audit Subsystem is Installed", "remarks": "rule_set_134" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "chronyd_configure_pool_and_server", + "value": "sebool_auditadm_exec_content", "remarks": "rule_set_135" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Chrony Configure Pool and Server", + "value": "Enable the auditadm_exec_content SELinux Boolean", "remarks": "rule_set_135" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "chronyd_or_ntpd_specify_multiple_servers", + "value": "chronyd_configure_pool_and_server", "remarks": "rule_set_136" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Specify Additional Remote NTP Servers", + "value": "Chrony Configure Pool and Server", "remarks": "rule_set_136" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "chronyd_specify_remote_server", + "value": "chronyd_or_ntpd_specify_multiple_servers", "remarks": "rule_set_137" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "A remote time server for Chrony is configured", + "value": "Specify Additional Remote NTP Servers", "remarks": "rule_set_137" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_chrony_installed", + "value": "chronyd_specify_remote_server", "remarks": "rule_set_138" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The Chrony package is installed", + "value": "A remote time server for Chrony is configured", "remarks": "rule_set_138" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_cron_logging", + "value": "package_chrony_installed", "remarks": "rule_set_139" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure cron Is Logging To Rsyslog", + "value": "The Chrony package is installed", "remarks": "rule_set_139" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_groupownership", + "value": "rsyslog_cron_logging", "remarks": "rule_set_140" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Log Files Are Owned By Appropriate Group", + "value": "Ensure cron Is Logging To Rsyslog", "remarks": "rule_set_140" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_ownership", + "value": "rsyslog_files_groupownership", "remarks": "rule_set_141" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Log Files Are Owned By Appropriate User", + "value": "Ensure Log Files Are Owned By Appropriate Group", "remarks": "rule_set_141" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_permissions", + "value": "rsyslog_files_ownership", "remarks": "rule_set_142" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure System Log Files Have Correct Permissions", + "value": "Ensure Log Files Are Owned By Appropriate User", "remarks": "rule_set_142" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_nolisten", + "value": "rsyslog_files_permissions", "remarks": "rule_set_143" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure rsyslog Does Not Accept Remote Messages Unless Acting As Log Server", + "value": "Ensure System Log Files Have Correct Permissions", "remarks": "rule_set_143" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_remote_loghost", + "value": "rsyslog_nolisten", "remarks": "rule_set_144" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Logs Sent To Remote Host", + "value": "Ensure rsyslog Does Not Accept Remote Messages Unless Acting As Log Server", "remarks": "rule_set_144" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_remote_tls", + "value": "rsyslog_remote_loghost", "remarks": "rule_set_145" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure TLS for rsyslog remote logging", + "value": "Ensure Logs Sent To Remote Host", "remarks": "rule_set_145" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_remote_tls_cacert", + "value": "rsyslog_remote_tls", "remarks": "rule_set_146" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure CA certificate for rsyslog remote logging", + "value": "Configure TLS for rsyslog remote logging", "remarks": "rule_set_146" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_chronyd_enabled", + "value": "rsyslog_remote_tls_cacert", "remarks": "rule_set_147" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The Chronyd service is enabled", + "value": "Configure CA certificate for rsyslog remote logging", "remarks": "rule_set_147" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_aide_installed", + "value": "service_chronyd_enabled", "remarks": "rule_set_148" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install AIDE", + "value": "The Chronyd service is enabled", "remarks": "rule_set_148" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_snmpd_disabled", + "value": "package_aide_installed", "remarks": "rule_set_149" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable snmpd Service", + "value": "Install AIDE", "remarks": "rule_set_149" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "snmpd_use_newer_protocol", + "value": "service_snmpd_disabled", "remarks": "rule_set_150" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure SNMP Service to Use Only SNMPv3 or Newer", + "value": "Disable snmpd Service", "remarks": "rule_set_150" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "network_ipv6_static_address", + "value": "snmpd_use_newer_protocol", "remarks": "rule_set_151" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Manually Assign Global IPv6 Address", + "value": "Configure SNMP Service to Use Only SNMPv3 or Newer", "remarks": "rule_set_151" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "wireless_disable_interfaces", + "value": "network_ipv6_static_address", "remarks": "rule_set_152" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Deactivate Wireless Network Interfaces", + "value": "Manually Assign Global IPv6 Address", "remarks": "rule_set_152" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_opensc_card_drivers", + "value": "wireless_disable_interfaces", "remarks": "rule_set_153" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure opensc Smart Card Drivers", + "value": "Deactivate Wireless Network Interfaces", "remarks": "rule_set_153" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_opensc_installed", + "value": "configure_opensc_card_drivers", "remarks": "rule_set_154" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install the opensc Package For Multifactor Authentication", + "value": "Configure opensc Smart Card Drivers", "remarks": "rule_set_154" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_pcsc-lite_installed", + "value": "package_opensc_installed", "remarks": "rule_set_155" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install the pcsc-lite package", + "value": "Install the opensc Package For Multifactor Authentication", "remarks": "rule_set_155" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_pcsc-lite-ccid_installed", + "value": "package_pcsc-lite_installed", "remarks": "rule_set_156" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install the pcsc-lite-ccid package", + "value": "Install the pcsc-lite package", "remarks": "rule_set_156" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_sudo_installed", + "value": "package_pcsc-lite-ccid_installed", "remarks": "rule_set_157" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install sudo Package", + "value": "Install the pcsc-lite-ccid package", "remarks": "rule_set_157" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_pcscd_enabled", + "value": "package_sudo_installed", "remarks": "rule_set_158" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable the pcscd Service", + "value": "Install sudo Package", "remarks": "rule_set_158" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_firewalld_ports", + "value": "service_pcscd_enabled", "remarks": "rule_set_159" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure the Firewalld Ports", + "value": "Enable the pcscd Service", "remarks": "rule_set_159" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_firewalld_default_zone", + "value": "configure_firewalld_ports", "remarks": "rule_set_160" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Default firewalld Zone for Incoming Packets", + "value": "Configure the Firewalld Ports", "remarks": "rule_set_160" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_usbguard_installed", + "value": "set_firewalld_default_zone", "remarks": "rule_set_161" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install usbguard Package", + "value": "Set Default firewalld Zone for Incoming Packets", "remarks": "rule_set_161" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_usbguard_enabled", + "value": "package_usbguard_installed", "remarks": "rule_set_162" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable the USBGuard Service", + "value": "Install usbguard Package", "remarks": "rule_set_162" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "system_booted_in_fips_mode", + "value": "service_usbguard_enabled", "remarks": "rule_set_163" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify that the system was booted with fips=1", + "value": "Enable the USBGuard Service", "remarks": "rule_set_163" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "enable_fips_mode", + "value": "system_booted_in_fips_mode", "remarks": "rule_set_164" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable FIPS Mode", + "value": "Verify that the system was booted with fips=1", "remarks": "rule_set_164" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_sshd_private_key", + "value": "enable_fips_mode", "remarks": "rule_set_165" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on SSH Server Private *_key Key Files", + "value": "Enable FIPS Mode", "remarks": "rule_set_165" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dnf-automatic_apply_updates", + "value": "file_permissions_sshd_private_key", "remarks": "rule_set_166" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure dnf-automatic to Install Available Updates Automatically", + "value": "Verify Permissions on SSH Server Private *_key Key Files", "remarks": "rule_set_166" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_libdnf-plugin-subscription-manager_installed", + "value": "dnf-automatic_apply_updates", "remarks": "rule_set_167" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install libdnf-plugin-subscription-manager Package", + "value": "Configure dnf-automatic to Install Available Updates Automatically", "remarks": "rule_set_167" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_subscription-manager_installed", + "value": "package_libdnf-plugin-subscription-manager_installed", "remarks": "rule_set_168" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install subscription-manager Package", + "value": "Install libdnf-plugin-subscription-manager Package", "remarks": "rule_set_168" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_shelllogin_for_systemaccounts", + "value": "package_subscription-manager_installed", "remarks": "rule_set_169" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", + "value": "Install subscription-manager Package", "remarks": "rule_set_169" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "secure_boot_enabled", + "value": "no_shelllogin_for_systemaccounts", "remarks": "rule_set_170" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that Secure Boot is enabled", + "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", "remarks": "rule_set_170" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "secure_boot_enabled", + "remarks": "rule_set_171" + }, + { + "name": "Rule_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Ensure that Secure Boot is enabled", + "remarks": "rule_set_171" } ], "control-implementations": [ { - "uuid": "0ccce754-0771-4459-b5bb-71ae8bd44f59", + "uuid": "5dc505f5-806d-4a80-bf21-9d471f02ef27", "source": "trestle://profiles/rhel10-ism_o-base/profile.json", "description": "Control implementation for ism_o", "props": [ @@ -2371,7 +2383,7 @@ ], "implemented-requirements": [ { - "uuid": "628faa71-96f1-4656-a421-119e9b937b89", + "uuid": "751481dd-98f8-4b7a-a712-e38088c0e411", "control-id": "ism_o_0418", "description": "No notes for control-id 0418.", "props": [ @@ -2453,7 +2465,7 @@ ] }, { - "uuid": "7c7386a9-8742-45ed-8eea-4a874d16023c", + "uuid": "565ff6b3-7a5e-47bc-9ff3-f2cb9136dc82", "control-id": "ism_o_0421", "description": "No notes for control-id 0421.", "props": [ @@ -2555,7 +2567,7 @@ ] }, { - "uuid": "d207412a-1bb4-4234-9a17-93d24201f726", + "uuid": "db1d0e14-409f-471f-aaef-14533ad09a12", "control-id": "ism_o_0484", "description": "No notes for control-id 0484.", "props": [ @@ -2582,7 +2594,7 @@ ] }, { - "uuid": "ff06c0e2-9714-46f8-88b8-70839c1b989e", + "uuid": "2b9a8ae1-b01b-4c23-b146-27303cd09329", "control-id": "ism_o_0487", "description": "The description for control-id ism_o_0487.", "props": [ @@ -2595,7 +2607,7 @@ ] }, { - "uuid": "88b16101-33e2-4194-9b4b-503c1ce07554", + "uuid": "ccd04ca5-bf14-466e-9094-561ca86d85b2", "control-id": "ism_o_0582", "description": "No notes for control-id 0582.", "props": [ @@ -2847,7 +2859,7 @@ ] }, { - "uuid": "702486bf-e4d6-4f2b-988d-2b534dfc72bb", + "uuid": "a1398e10-9676-470d-a4df-e4679b497fb8", "control-id": "ism_o_0846", "description": "No notes for control-id 0846.", "props": [ @@ -2954,7 +2966,7 @@ ] }, { - "uuid": "06b4fa99-110c-4609-a04a-dec4fc60be51", + "uuid": "1556c6cd-ea70-4e5f-baf9-c922980987f0", "control-id": "ism_o_0974", "description": "This needs reevaluation.", "props": [ @@ -3056,7 +3068,7 @@ ] }, { - "uuid": "aca94006-f954-47b2-9111-7e2461f5e2a5", + "uuid": "020d0825-2580-425c-90e8-e6a821fe2d38", "control-id": "ism_o_0988", "description": "No notes for control-id 0988.", "props": [ @@ -3133,7 +3145,7 @@ ] }, { - "uuid": "d31abf22-e6b9-40e4-8c51-e5afc1339ce5", + "uuid": "b1764986-6943-4120-9706-3b39decd78a2", "control-id": "ism_o_1034", "description": "No notes for control-id 1034.", "props": [ @@ -3150,7 +3162,7 @@ ] }, { - "uuid": "c6d6f947-c8e1-4ed8-bb88-4dc06ba7bc42", + "uuid": "cc93b7ff-00c3-4d89-9e06-6f3b26e516d1", "control-id": "ism_o_1055", "description": "Needs reevaluation", "props": [ @@ -3227,7 +3239,7 @@ ] }, { - "uuid": "881ccef8-fa80-41ae-a68d-b8f52ffdf969", + "uuid": "e7d49ce6-7cac-4640-be86-04e2f853e22c", "control-id": "ism_o_1173", "description": "No notes for control-id 1173.", "props": [ @@ -3329,7 +3341,7 @@ ] }, { - "uuid": "a395ce8d-3ac1-4781-972c-7fc676a191aa", + "uuid": "3c716c41-2d3e-45b5-9b4d-d5f32e1a75d4", "control-id": "ism_o_1277", "description": "No notes for control-id 1277.", "props": [ @@ -3341,7 +3353,7 @@ ] }, { - "uuid": "d655b064-ffd4-4a4a-9ae9-33bf7732c88b", + "uuid": "633dafa1-2a80-4969-b375-b492f34014c7", "control-id": "ism_o_1288", "description": "No notes for control-id 1288.", "props": [ @@ -3358,7 +3370,7 @@ ] }, { - "uuid": "1e97aa98-fa42-4fd6-bac7-5cfefbb9e23a", + "uuid": "779c53f5-c629-434d-ae5c-ab80114aa7f9", "control-id": "ism_o_1311", "description": "No notes for control-id 1311.", "props": [ @@ -3380,7 +3392,7 @@ ] }, { - "uuid": "f79cb3dc-ff20-4439-b6fa-272c07a5a923", + "uuid": "a4436797-f63e-4617-9dd2-7fb8c6a2a23f", "control-id": "ism_o_1315", "description": "No notes for control-id 1315.", "props": [ @@ -3402,7 +3414,7 @@ ] }, { - "uuid": "5284c3a5-e9e0-4995-b069-3c3acb08a751", + "uuid": "67c17cce-1529-4c96-9ea2-77a250e56649", "control-id": "ism_o_1319", "description": "No notes for control-id 1319.", "props": [ @@ -3424,7 +3436,7 @@ ] }, { - "uuid": "06f6541c-0e01-4306-a44b-e0af77b3ea1a", + "uuid": "d20bdad9-e92d-49a2-b701-df534b634385", "control-id": "ism_o_1341", "description": "No notes for control-id 1341.", "props": [ @@ -3441,7 +3453,7 @@ ] }, { - "uuid": "f63861fd-bab4-4b5e-a903-486b4f9a3fcc", + "uuid": "655534bd-5b98-400a-b14e-bd73650bcb5f", "control-id": "ism_o_1386", "description": "This needs reevaluation.", "props": [ @@ -3483,7 +3495,7 @@ ] }, { - "uuid": "a64f2b0d-51fc-4807-94af-084081f80766", + "uuid": "2ae3603c-1b0f-4336-a4eb-51404ea93c43", "control-id": "ism_o_1401", "description": "No notes for control-id 1401.", "props": [ @@ -3585,7 +3597,7 @@ ] }, { - "uuid": "2af220e3-bc99-4303-b349-140d296fc6f7", + "uuid": "5d91ef5f-582d-4573-a77b-97286e7b77b9", "control-id": "ism_o_1402", "description": "No notes for control-id 1402.", "props": [ @@ -3662,7 +3674,7 @@ ] }, { - "uuid": "2a6a85ce-7e16-4bfb-a369-1ca5870c6186", + "uuid": "113c26c8-49e9-4fc5-9a2e-c8932dfe8ec8", "control-id": "ism_o_1405", "description": "No notes for control-id 1405.", "props": [ @@ -3739,7 +3751,7 @@ ] }, { - "uuid": "4837cfc0-afc3-409e-803a-7f9a42d65cfc", + "uuid": "9d53fb1b-f285-4ce6-8e9f-0f2e0bd55940", "control-id": "ism_o_1416", "description": "No notes for control-id 1416.", "props": [ @@ -3761,7 +3773,7 @@ ] }, { - "uuid": "47585b12-d398-48cf-a0f5-dc239ce83a54", + "uuid": "96b61751-6c1a-47b5-acde-a714bdd38b71", "control-id": "ism_o_1417", "description": "No notes for control-id 1417.", "props": [ @@ -3778,7 +3790,7 @@ ] }, { - "uuid": "1516018e-62d8-4578-9ca6-a63608109b00", + "uuid": "0d5634da-500a-44b6-aa24-0bfab1e51bfd", "control-id": "ism_o_1418", "description": "No notes for control-id 1418.", "props": [ @@ -3800,7 +3812,7 @@ ] }, { - "uuid": "701b9558-e2df-470e-b319-c8f2d80d50e9", + "uuid": "93f1a8dc-cbbe-4cfb-b6ec-17378d144a55", "control-id": "ism_o_1446", "description": "No notes for control-id 1446.", "props": [ @@ -3827,7 +3839,7 @@ ] }, { - "uuid": "50ada0bf-436d-433d-917d-ba73747fa31f", + "uuid": "53b7b760-7ced-4c66-8657-fb05f7b5fb1c", "control-id": "ism_o_1449", "description": "This needs more", "props": [ @@ -3844,7 +3856,7 @@ ] }, { - "uuid": "779b9353-5e2a-49ce-89c1-5a36460b9684", + "uuid": "7b48ddef-dc01-42fe-97ff-e8e79b94cb39", "control-id": "ism_o_1467", "description": "No notes for control-id 1467.", "props": [ @@ -3871,7 +3883,7 @@ ] }, { - "uuid": "36fae9c3-85da-49a7-a00c-da31bb4dff1e", + "uuid": "31adc1b6-f075-48ba-8e16-ae2ee5bfe1e2", "control-id": "ism_o_1483", "description": "No notes for control-id 1483.", "props": [ @@ -3898,7 +3910,7 @@ ] }, { - "uuid": "7000829d-2d54-422e-ac9e-0634282e6f49", + "uuid": "5044cb49-f3b8-441c-91a6-b0e77ac6f04a", "control-id": "ism_o_1491", "description": "No notes for control-id 1491.", "props": [ @@ -3915,7 +3927,7 @@ ] }, { - "uuid": "ee7f732c-7bb0-4dc0-8025-b78c4972c869", + "uuid": "77da8ddc-2288-4dd3-a325-7caf7fd0637d", "control-id": "ism_o_1493", "description": "No notes for control-id 1493.", "props": [ @@ -3959,6 +3971,11 @@ "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_redhat_gpgkey_installed" }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "package_sequoia-sq_installed" + }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", @@ -3967,7 +3984,7 @@ ] }, { - "uuid": "b617a9e2-b452-4c30-9a1a-0cd9b6bc521d", + "uuid": "9d36cd9f-c802-47e4-9849-47b62dceee8c", "control-id": "ism_o_1504", "description": "No notes for control-id 1504.", "props": [ @@ -4069,7 +4086,7 @@ ] }, { - "uuid": "f060c957-75d7-4c1d-a29c-b90fea4119e7", + "uuid": "4e308b5e-5823-4411-a5e7-b581cceccf5e", "control-id": "ism_o_1505", "description": "No notes for control-id 1505.", "props": [ @@ -4171,7 +4188,7 @@ ] }, { - "uuid": "b1b28f18-fb69-4116-9b72-3870cb014303", + "uuid": "362d73df-4bda-42e4-b5b9-8708cd619d6f", "control-id": "ism_o_1506", "description": "As of OpenSSH 7.6, OpenSSH only supports SSH 2.", "props": [ @@ -4183,7 +4200,7 @@ ] }, { - "uuid": "5f52abf1-66e2-426e-b7d7-a4571ce9be16", + "uuid": "2beb6190-2c15-4c9e-82c6-9e24cfe35f62", "control-id": "ism_o_1546", "description": "No notes for control-id 1546.", "props": [ @@ -4340,7 +4357,7 @@ ] }, { - "uuid": "0466b7af-fd37-418f-88dd-e8e819761eb4", + "uuid": "5dd44e48-aa6e-4e84-a737-c6ca8aaa50e9", "control-id": "ism_o_1552", "description": "No notes for control-id 1552.", "props": [ @@ -4352,7 +4369,7 @@ ] }, { - "uuid": "f4522eea-769b-4ad7-b013-1b8bba5c3eaf", + "uuid": "fbefb493-7222-44bb-ba54-9d7f50bd3032", "control-id": "ism_o_1558", "description": "No notes for control-id 1558.", "props": [ @@ -4454,7 +4471,7 @@ ] }, { - "uuid": "5aebc986-5c23-4fb1-9564-cf68493c911e", + "uuid": "e18232ce-e80a-4ddb-9fac-87aca88f2c30", "control-id": "ism_o_1559", "description": "No notes for control-id 1559.", "props": [ @@ -4556,7 +4573,7 @@ ] }, { - "uuid": "6c009b0b-82f2-4c0b-ac40-974792590ece", + "uuid": "e0843205-e8f6-442c-baf5-921a52535faa", "control-id": "ism_o_1745", "description": "The description for control-id ism_o_1745.", "props": [ @@ -4748,7 +4765,7 @@ { "name": "Parameter_Value_Alternatives_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -4970,3943 +4987,3967 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_never_disabled", + "value": "package_sequoia-sq_installed", "remarks": "rule_set_007" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled for All dnf Package Repositories", + "value": "Install sequoia-sq Package", "remarks": "rule_set_007" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_never_disabled", + "value": "package_sequoia-sq_installed", "remarks": "rule_set_007" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled for All dnf Package Repositories", + "value": "Install sequoia-sq Package", "remarks": "rule_set_007" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_local_packages", + "value": "ensure_gpgcheck_never_disabled", "remarks": "rule_set_008" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled for Local Packages", + "value": "Ensure gpgcheck Enabled for All dnf Package Repositories", "remarks": "rule_set_008" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_local_packages", + "value": "ensure_gpgcheck_never_disabled", "remarks": "rule_set_008" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled for Local Packages", + "value": "Ensure gpgcheck Enabled for All dnf Package Repositories", "remarks": "rule_set_008" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_globally_activated", + "value": "ensure_gpgcheck_local_packages", "remarks": "rule_set_009" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled In Main dnf Configuration", + "value": "Ensure gpgcheck Enabled for Local Packages", "remarks": "rule_set_009" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_globally_activated", + "value": "ensure_gpgcheck_local_packages", "remarks": "rule_set_009" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled In Main dnf Configuration", + "value": "Ensure gpgcheck Enabled for Local Packages", "remarks": "rule_set_009" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dnf-automatic_security_updates_only", + "value": "ensure_gpgcheck_globally_activated", "remarks": "rule_set_010" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure dnf-automatic to Install Only Security Updates", + "value": "Ensure gpgcheck Enabled In Main dnf Configuration", "remarks": "rule_set_010" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dnf-automatic_security_updates_only", + "value": "ensure_gpgcheck_globally_activated", "remarks": "rule_set_010" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure dnf-automatic to Install Only Security Updates", + "value": "Ensure gpgcheck Enabled In Main dnf Configuration", "remarks": "rule_set_010" }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "dnf-automatic_security_updates_only", + "remarks": "rule_set_011" + }, + { + "name": "Rule_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Configure dnf-automatic to Install Only Security Updates", + "remarks": "rule_set_011" + }, + { + "name": "Check_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "dnf-automatic_security_updates_only", + "remarks": "rule_set_011" + }, + { + "name": "Check_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Configure dnf-automatic to Install Only Security Updates", + "remarks": "rule_set_011" + }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_no_uid_except_zero", - "remarks": "rule_set_011" + "remarks": "rule_set_012" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Root Has UID 0", - "remarks": "rule_set_011" + "remarks": "rule_set_012" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_no_uid_except_zero", - "remarks": "rule_set_011" + "remarks": "rule_set_012" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Root Has UID 0", - "remarks": "rule_set_011" + "remarks": "rule_set_012" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_nopasswd", - "remarks": "rule_set_012" + "remarks": "rule_set_013" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD", - "remarks": "rule_set_012" + "remarks": "rule_set_013" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_nopasswd", - "remarks": "rule_set_012" + "remarks": "rule_set_013" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD", - "remarks": "rule_set_012" + "remarks": "rule_set_013" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_no_authenticate", - "remarks": "rule_set_013" + "remarks": "rule_set_014" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo !authenticate", - "remarks": "rule_set_013" + "remarks": "rule_set_014" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_no_authenticate", - "remarks": "rule_set_013" + "remarks": "rule_set_014" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo !authenticate", - "remarks": "rule_set_013" + "remarks": "rule_set_014" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_require_authentication", - "remarks": "rule_set_014" + "remarks": "rule_set_015" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo", - "remarks": "rule_set_014" + "remarks": "rule_set_015" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_require_authentication", - "remarks": "rule_set_014" + "remarks": "rule_set_015" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo", - "remarks": "rule_set_014" + "remarks": "rule_set_015" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_fapolicyd_installed", - "remarks": "rule_set_015" + "remarks": "rule_set_016" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install fapolicyd Package", - "remarks": "rule_set_015" + "remarks": "rule_set_016" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_fapolicyd_installed", - "remarks": "rule_set_015" + "remarks": "rule_set_016" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install fapolicyd Package", - "remarks": "rule_set_015" + "remarks": "rule_set_016" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_fapolicyd_enabled", - "remarks": "rule_set_016" + "remarks": "rule_set_017" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable the File Access Policy Service", - "remarks": "rule_set_016" + "remarks": "rule_set_017" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_fapolicyd_enabled", - "remarks": "rule_set_016" + "remarks": "rule_set_017" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable the File Access Policy Service", - "remarks": "rule_set_016" + "remarks": "rule_set_017" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy", - "remarks": "rule_set_017" + "remarks": "rule_set_018" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure System Cryptography Policy", - "remarks": "rule_set_017" + "remarks": "rule_set_018" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy", - "remarks": "rule_set_017" + "remarks": "rule_set_018" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure System Cryptography Policy", - "remarks": "rule_set_017" + "remarks": "rule_set_018" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_ssh_crypto_policy", - "remarks": "rule_set_018" + "remarks": "rule_set_019" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure SSH to use System Crypto Policy", - "remarks": "rule_set_018" + "remarks": "rule_set_019" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_ssh_crypto_policy", - "remarks": "rule_set_018" + "remarks": "rule_set_019" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure SSH to use System Crypto Policy", - "remarks": "rule_set_018" + "remarks": "rule_set_019" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_use_directory_configuration", - "remarks": "rule_set_019" + "remarks": "rule_set_020" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Distribute the SSH Server configuration to multiple files in a config directory.", - "remarks": "rule_set_019" + "remarks": "rule_set_020" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_use_directory_configuration", - "remarks": "rule_set_019" + "remarks": "rule_set_020" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Distribute the SSH Server configuration to multiple files in a config directory.", - "remarks": "rule_set_019" + "remarks": "rule_set_020" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_root_login", - "remarks": "rule_set_020" + "remarks": "rule_set_021" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Root Login", - "remarks": "rule_set_020" + "remarks": "rule_set_021" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_root_login", - "remarks": "rule_set_020" + "remarks": "rule_set_021" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Root Login", - "remarks": "rule_set_020" + "remarks": "rule_set_021" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_gssapi_auth", - "remarks": "rule_set_021" + "remarks": "rule_set_022" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GSSAPI Authentication", - "remarks": "rule_set_021" + "remarks": "rule_set_022" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_gssapi_auth", - "remarks": "rule_set_021" + "remarks": "rule_set_022" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GSSAPI Authentication", - "remarks": "rule_set_021" + "remarks": "rule_set_022" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_print_last_log", - "remarks": "rule_set_022" + "remarks": "rule_set_023" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable SSH Print Last Log", - "remarks": "rule_set_022" + "remarks": "rule_set_023" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_print_last_log", - "remarks": "rule_set_022" + "remarks": "rule_set_023" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable SSH Print Last Log", - "remarks": "rule_set_022" + "remarks": "rule_set_023" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_do_not_permit_user_env", - "remarks": "rule_set_023" + "remarks": "rule_set_024" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Do Not Allow SSH Environment Options", - "remarks": "rule_set_023" + "remarks": "rule_set_024" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_do_not_permit_user_env", - "remarks": "rule_set_023" + "remarks": "rule_set_024" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Do Not Allow SSH Environment Options", - "remarks": "rule_set_023" + "remarks": "rule_set_024" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_rhosts", - "remarks": "rule_set_024" + "remarks": "rule_set_025" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Support for .rhosts Files", - "remarks": "rule_set_024" + "remarks": "rule_set_025" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_rhosts", - "remarks": "rule_set_024" + "remarks": "rule_set_025" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Support for .rhosts Files", - "remarks": "rule_set_024" + "remarks": "rule_set_025" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_loglevel_info", - "remarks": "rule_set_025" + "remarks": "rule_set_026" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set LogLevel to INFO", - "remarks": "rule_set_025" + "remarks": "rule_set_026" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_loglevel_info", - "remarks": "rule_set_025" + "remarks": "rule_set_026" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set LogLevel to INFO", - "remarks": "rule_set_025" + "remarks": "rule_set_026" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_empty_passwords", - "remarks": "rule_set_026" + "remarks": "rule_set_027" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Access via Empty Passwords", - "remarks": "rule_set_026" + "remarks": "rule_set_027" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_empty_passwords", - "remarks": "rule_set_026" + "remarks": "rule_set_027" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Access via Empty Passwords", - "remarks": "rule_set_026" + "remarks": "rule_set_027" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_user_known_hosts", - "remarks": "rule_set_027" + "remarks": "rule_set_028" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Support for User Known Hosts", - "remarks": "rule_set_027" + "remarks": "rule_set_028" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_user_known_hosts", - "remarks": "rule_set_027" + "remarks": "rule_set_028" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Support for User Known Hosts", - "remarks": "rule_set_027" + "remarks": "rule_set_028" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_strictmodes", - "remarks": "rule_set_028" + "remarks": "rule_set_029" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Use of Strict Mode Checking", - "remarks": "rule_set_028" + "remarks": "rule_set_029" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_strictmodes", - "remarks": "rule_set_028" + "remarks": "rule_set_029" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Use of Strict Mode Checking", - "remarks": "rule_set_028" + "remarks": "rule_set_029" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_rsyslog_installed", - "remarks": "rule_set_029" + "remarks": "rule_set_030" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure rsyslog is Installed", - "remarks": "rule_set_029" + "remarks": "rule_set_030" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_rsyslog_installed", - "remarks": "rule_set_029" + "remarks": "rule_set_030" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure rsyslog is Installed", - "remarks": "rule_set_029" + "remarks": "rule_set_030" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_rsyslog_enabled", - "remarks": "rule_set_030" + "remarks": "rule_set_031" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable rsyslog Service", - "remarks": "rule_set_030" + "remarks": "rule_set_031" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_rsyslog_enabled", - "remarks": "rule_set_030" + "remarks": "rule_set_031" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable rsyslog Service", - "remarks": "rule_set_030" + "remarks": "rule_set_031" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_auditd_enabled", - "remarks": "rule_set_031" + "remarks": "rule_set_032" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable auditd Service", - "remarks": "rule_set_031" + "remarks": "rule_set_032" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_auditd_enabled", - "remarks": "rule_set_031" + "remarks": "rule_set_032" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable auditd Service", - "remarks": "rule_set_031" + "remarks": "rule_set_032" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_flush", - "remarks": "rule_set_032" + "remarks": "rule_set_033" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd flush priority", - "remarks": "rule_set_032" + "remarks": "rule_set_033" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_flush", - "remarks": "rule_set_032" + "remarks": "rule_set_033" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd flush priority", - "remarks": "rule_set_032" + "remarks": "rule_set_033" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_local_events", - "remarks": "rule_set_033" + "remarks": "rule_set_034" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Include Local Events in Audit Logs", - "remarks": "rule_set_033" + "remarks": "rule_set_034" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_local_events", - "remarks": "rule_set_033" + "remarks": "rule_set_034" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Include Local Events in Audit Logs", - "remarks": "rule_set_033" + "remarks": "rule_set_034" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_write_logs", - "remarks": "rule_set_034" + "remarks": "rule_set_035" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Write Audit Logs to the Disk", - "remarks": "rule_set_034" + "remarks": "rule_set_035" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_write_logs", - "remarks": "rule_set_034" + "remarks": "rule_set_035" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Write Audit Logs to the Disk", - "remarks": "rule_set_034" + "remarks": "rule_set_035" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_log_format", - "remarks": "rule_set_035" + "remarks": "rule_set_036" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Resolve information before writing to audit logs", - "remarks": "rule_set_035" + "remarks": "rule_set_036" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_log_format", - "remarks": "rule_set_035" + "remarks": "rule_set_036" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Resolve information before writing to audit logs", - "remarks": "rule_set_035" + "remarks": "rule_set_036" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_freq", - "remarks": "rule_set_036" + "remarks": "rule_set_037" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set number of records to cause an explicit flush to audit logs", - "remarks": "rule_set_036" + "remarks": "rule_set_037" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_freq", - "remarks": "rule_set_036" + "remarks": "rule_set_037" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set number of records to cause an explicit flush to audit logs", - "remarks": "rule_set_036" + "remarks": "rule_set_037" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_name_format", - "remarks": "rule_set_037" + "remarks": "rule_set_038" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set type of computer node name logging in audit logs", - "remarks": "rule_set_037" + "remarks": "rule_set_038" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_name_format", - "remarks": "rule_set_037" + "remarks": "rule_set_038" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set type of computer node name logging in audit logs", - "remarks": "rule_set_037" + "remarks": "rule_set_038" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_faillock", - "remarks": "rule_set_038" + "remarks": "rule_set_039" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - faillock", - "remarks": "rule_set_038" + "remarks": "rule_set_039" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_faillock", - "remarks": "rule_set_038" + "remarks": "rule_set_039" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - faillock", - "remarks": "rule_set_038" + "remarks": "rule_set_039" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_adjtimex", - "remarks": "rule_set_039" + "remarks": "rule_set_040" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through adjtimex", - "remarks": "rule_set_039" + "remarks": "rule_set_040" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_adjtimex", - "remarks": "rule_set_039" + "remarks": "rule_set_040" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through adjtimex", - "remarks": "rule_set_039" + "remarks": "rule_set_040" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_clock_settime", - "remarks": "rule_set_040" + "remarks": "rule_set_041" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through clock_settime", - "remarks": "rule_set_040" + "remarks": "rule_set_041" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_clock_settime", - "remarks": "rule_set_040" + "remarks": "rule_set_041" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through clock_settime", - "remarks": "rule_set_040" + "remarks": "rule_set_041" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_watch_localtime", - "remarks": "rule_set_041" + "remarks": "rule_set_042" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter the localtime File", - "remarks": "rule_set_041" + "remarks": "rule_set_042" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_watch_localtime", - "remarks": "rule_set_041" + "remarks": "rule_set_042" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter the localtime File", - "remarks": "rule_set_041" + "remarks": "rule_set_042" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_settimeofday", - "remarks": "rule_set_042" + "remarks": "rule_set_043" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through settimeofday", - "remarks": "rule_set_042" + "remarks": "rule_set_043" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_settimeofday", - "remarks": "rule_set_042" + "remarks": "rule_set_043" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through settimeofday", - "remarks": "rule_set_042" + "remarks": "rule_set_043" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_stime", - "remarks": "rule_set_043" + "remarks": "rule_set_044" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through stime", - "remarks": "rule_set_043" + "remarks": "rule_set_044" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_stime", - "remarks": "rule_set_043" + "remarks": "rule_set_044" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through stime", - "remarks": "rule_set_043" + "remarks": "rule_set_044" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_restorecon", - "remarks": "rule_set_044" + "remarks": "rule_set_045" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run restorecon", - "remarks": "rule_set_044" + "remarks": "rule_set_045" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_restorecon", - "remarks": "rule_set_044" + "remarks": "rule_set_045" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run restorecon", - "remarks": "rule_set_044" + "remarks": "rule_set_045" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chcon", - "remarks": "rule_set_045" + "remarks": "rule_set_046" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chcon", - "remarks": "rule_set_045" + "remarks": "rule_set_046" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chcon", - "remarks": "rule_set_045" + "remarks": "rule_set_046" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chcon", - "remarks": "rule_set_045" + "remarks": "rule_set_046" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_semanage", - "remarks": "rule_set_046" + "remarks": "rule_set_047" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run semanage", - "remarks": "rule_set_046" + "remarks": "rule_set_047" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_semanage", - "remarks": "rule_set_046" + "remarks": "rule_set_047" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run semanage", - "remarks": "rule_set_046" + "remarks": "rule_set_047" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_setsebool", - "remarks": "rule_set_047" + "remarks": "rule_set_048" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run setsebool", - "remarks": "rule_set_047" + "remarks": "rule_set_048" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_setsebool", - "remarks": "rule_set_047" + "remarks": "rule_set_048" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run setsebool", - "remarks": "rule_set_047" + "remarks": "rule_set_048" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_setfiles", - "remarks": "rule_set_048" + "remarks": "rule_set_049" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run setfiles", - "remarks": "rule_set_048" + "remarks": "rule_set_049" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_setfiles", - "remarks": "rule_set_048" + "remarks": "rule_set_049" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run setfiles", - "remarks": "rule_set_048" + "remarks": "rule_set_049" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_seunshare", - "remarks": "rule_set_049" + "remarks": "rule_set_050" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run seunshare", - "remarks": "rule_set_049" + "remarks": "rule_set_050" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_seunshare", - "remarks": "rule_set_049" + "remarks": "rule_set_050" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run seunshare", - "remarks": "rule_set_049" + "remarks": "rule_set_050" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_sysadmin_actions", - "remarks": "rule_set_050" + "remarks": "rule_set_051" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects System Administrator Actions", - "remarks": "rule_set_050" + "remarks": "rule_set_051" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_sysadmin_actions", - "remarks": "rule_set_050" + "remarks": "rule_set_051" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects System Administrator Actions", - "remarks": "rule_set_050" + "remarks": "rule_set_051" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification", - "remarks": "rule_set_051" + "remarks": "rule_set_052" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment", - "remarks": "rule_set_051" + "remarks": "rule_set_052" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification", - "remarks": "rule_set_051" + "remarks": "rule_set_052" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment", - "remarks": "rule_set_051" + "remarks": "rule_set_052" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_group", - "remarks": "rule_set_052" + "remarks": "rule_set_053" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/group", - "remarks": "rule_set_052" + "remarks": "rule_set_053" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_group", - "remarks": "rule_set_052" + "remarks": "rule_set_053" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/group", - "remarks": "rule_set_052" + "remarks": "rule_set_053" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_gshadow", - "remarks": "rule_set_053" + "remarks": "rule_set_054" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/gshadow", - "remarks": "rule_set_053" + "remarks": "rule_set_054" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_gshadow", - "remarks": "rule_set_053" + "remarks": "rule_set_054" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/gshadow", - "remarks": "rule_set_053" + "remarks": "rule_set_054" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_opasswd", - "remarks": "rule_set_054" + "remarks": "rule_set_055" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", - "remarks": "rule_set_054" + "remarks": "rule_set_055" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_opasswd", - "remarks": "rule_set_054" + "remarks": "rule_set_055" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", - "remarks": "rule_set_054" + "remarks": "rule_set_055" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_passwd", - "remarks": "rule_set_055" + "remarks": "rule_set_056" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/passwd", - "remarks": "rule_set_055" + "remarks": "rule_set_056" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_passwd", - "remarks": "rule_set_055" + "remarks": "rule_set_056" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/passwd", - "remarks": "rule_set_055" + "remarks": "rule_set_056" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_shadow", - "remarks": "rule_set_056" + "remarks": "rule_set_057" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/shadow", - "remarks": "rule_set_056" + "remarks": "rule_set_057" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_shadow", - "remarks": "rule_set_056" + "remarks": "rule_set_057" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/shadow", - "remarks": "rule_set_056" + "remarks": "rule_set_057" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chmod", - "remarks": "rule_set_057" + "remarks": "rule_set_058" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", - "remarks": "rule_set_057" + "remarks": "rule_set_058" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chmod", - "remarks": "rule_set_057" + "remarks": "rule_set_058" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", - "remarks": "rule_set_057" + "remarks": "rule_set_058" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chown", - "remarks": "rule_set_058" + "remarks": "rule_set_059" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chown", - "remarks": "rule_set_058" + "remarks": "rule_set_059" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chown", - "remarks": "rule_set_058" + "remarks": "rule_set_059" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chown", - "remarks": "rule_set_058" + "remarks": "rule_set_059" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading", - "remarks": "rule_set_059" + "remarks": "rule_set_060" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading", - "remarks": "rule_set_059" + "remarks": "rule_set_060" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading", - "remarks": "rule_set_059" + "remarks": "rule_set_060" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading", - "remarks": "rule_set_059" + "remarks": "rule_set_060" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_randomize_va_space", - "remarks": "rule_set_060" + "remarks": "rule_set_061" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Randomized Layout of Virtual Address Space", - "remarks": "rule_set_060" + "remarks": "rule_set_061" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_randomize_va_space", - "remarks": "rule_set_060" + "remarks": "rule_set_061" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Randomized Layout of Virtual Address Space", - "remarks": "rule_set_060" + "remarks": "rule_set_061" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_exec_shield", - "remarks": "rule_set_061" + "remarks": "rule_set_062" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable ExecShield via sysctl", - "remarks": "rule_set_061" + "remarks": "rule_set_062" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_exec_shield", - "remarks": "rule_set_061" + "remarks": "rule_set_062" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable ExecShield via sysctl", - "remarks": "rule_set_061" + "remarks": "rule_set_062" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_kptr_restrict", - "remarks": "rule_set_062" + "remarks": "rule_set_063" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Exposed Kernel Pointer Addresses Access", - "remarks": "rule_set_062" + "remarks": "rule_set_063" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_kptr_restrict", - "remarks": "rule_set_062" + "remarks": "rule_set_063" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Exposed Kernel Pointer Addresses Access", - "remarks": "rule_set_062" + "remarks": "rule_set_063" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_dmesg_restrict", - "remarks": "rule_set_063" + "remarks": "rule_set_064" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Access to Kernel Message Buffer", - "remarks": "rule_set_063" + "remarks": "rule_set_064" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_dmesg_restrict", - "remarks": "rule_set_063" + "remarks": "rule_set_064" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Access to Kernel Message Buffer", - "remarks": "rule_set_063" + "remarks": "rule_set_064" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_kexec_load_disabled", - "remarks": "rule_set_064" + "remarks": "rule_set_065" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Image Loading", - "remarks": "rule_set_064" + "remarks": "rule_set_065" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_kexec_load_disabled", - "remarks": "rule_set_064" + "remarks": "rule_set_065" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Image Loading", - "remarks": "rule_set_064" + "remarks": "rule_set_065" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_yama_ptrace_scope", - "remarks": "rule_set_065" + "remarks": "rule_set_066" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict usage of ptrace to descendant processes", - "remarks": "rule_set_065" + "remarks": "rule_set_066" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_yama_ptrace_scope", - "remarks": "rule_set_065" + "remarks": "rule_set_066" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict usage of ptrace to descendant processes", - "remarks": "rule_set_065" + "remarks": "rule_set_066" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_unprivileged_bpf_disabled", - "remarks": "rule_set_066" + "remarks": "rule_set_067" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Access to Network bpf() Syscall From Unprivileged Processes", - "remarks": "rule_set_066" + "remarks": "rule_set_067" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_unprivileged_bpf_disabled", - "remarks": "rule_set_066" + "remarks": "rule_set_067" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Access to Network bpf() Syscall From Unprivileged Processes", - "remarks": "rule_set_066" + "remarks": "rule_set_067" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_core_bpf_jit_harden", - "remarks": "rule_set_067" + "remarks": "rule_set_068" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Harden the operation of the BPF just-in-time compiler", - "remarks": "rule_set_067" + "remarks": "rule_set_068" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_core_bpf_jit_harden", - "remarks": "rule_set_067" + "remarks": "rule_set_068" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Harden the operation of the BPF just-in-time compiler", - "remarks": "rule_set_067" + "remarks": "rule_set_068" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_state", - "remarks": "rule_set_068" + "remarks": "rule_set_069" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SELinux State is Enforcing", - "remarks": "rule_set_068" + "remarks": "rule_set_069" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_state", - "remarks": "rule_set_068" + "remarks": "rule_set_069" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SELinux State is Enforcing", - "remarks": "rule_set_068" + "remarks": "rule_set_069" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_policytype", - "remarks": "rule_set_069" + "remarks": "rule_set_070" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure SELinux Policy", - "remarks": "rule_set_069" + "remarks": "rule_set_070" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_policytype", - "remarks": "rule_set_069" + "remarks": "rule_set_070" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure SELinux Policy", - "remarks": "rule_set_069" + "remarks": "rule_set_070" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_sgid", - "remarks": "rule_set_070" + "remarks": "rule_set_071" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All SGID Executables Are Authorized", - "remarks": "rule_set_070" + "remarks": "rule_set_071" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_sgid", - "remarks": "rule_set_070" + "remarks": "rule_set_071" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All SGID Executables Are Authorized", - "remarks": "rule_set_070" + "remarks": "rule_set_071" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_suid", - "remarks": "rule_set_071" + "remarks": "rule_set_072" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All SUID Executables Are Authorized", - "remarks": "rule_set_071" + "remarks": "rule_set_072" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_suid", - "remarks": "rule_set_071" + "remarks": "rule_set_072" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All SUID Executables Are Authorized", - "remarks": "rule_set_071" + "remarks": "rule_set_072" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_072" + "remarks": "rule_set_073" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_072" + "remarks": "rule_set_073" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_072" + "remarks": "rule_set_073" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_072" + "remarks": "rule_set_073" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_073" + "remarks": "rule_set_074" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_073" + "remarks": "rule_set_074" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_073" + "remarks": "rule_set_074" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_073" + "remarks": "rule_set_074" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_library_dirs", - "remarks": "rule_set_074" + "remarks": "rule_set_075" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that Shared Library Files Have Restrictive Permissions", - "remarks": "rule_set_074" + "remarks": "rule_set_075" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_library_dirs", - "remarks": "rule_set_074" + "remarks": "rule_set_075" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that Shared Library Files Have Restrictive Permissions", - "remarks": "rule_set_074" + "remarks": "rule_set_075" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_binary_dirs", - "remarks": "rule_set_075" + "remarks": "rule_set_076" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that System Executables Have Root Ownership", - "remarks": "rule_set_075" + "remarks": "rule_set_076" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_binary_dirs", - "remarks": "rule_set_075" + "remarks": "rule_set_076" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that System Executables Have Root Ownership", - "remarks": "rule_set_075" + "remarks": "rule_set_076" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_binary_dirs", - "remarks": "rule_set_076" + "remarks": "rule_set_077" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that System Executables Have Restrictive Permissions", - "remarks": "rule_set_076" + "remarks": "rule_set_077" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_binary_dirs", - "remarks": "rule_set_076" + "remarks": "rule_set_077" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that System Executables Have Restrictive Permissions", - "remarks": "rule_set_076" + "remarks": "rule_set_077" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_library_dirs", - "remarks": "rule_set_077" + "remarks": "rule_set_078" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that Shared Library Files Have Root Ownership", - "remarks": "rule_set_077" + "remarks": "rule_set_078" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_library_dirs", - "remarks": "rule_set_077" + "remarks": "rule_set_078" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that Shared Library Files Have Root Ownership", - "remarks": "rule_set_077" + "remarks": "rule_set_078" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords", - "remarks": "rule_set_078" + "remarks": "rule_set_079" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent Login to Accounts With Empty Password", - "remarks": "rule_set_078" + "remarks": "rule_set_079" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords", - "remarks": "rule_set_078" + "remarks": "rule_set_079" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent Login to Accounts With Empty Password", - "remarks": "rule_set_078" + "remarks": "rule_set_079" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_dev_shm_nodev", - "remarks": "rule_set_079" + "remarks": "rule_set_080" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nodev Option to /dev/shm", - "remarks": "rule_set_079" + "remarks": "rule_set_080" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_dev_shm_nodev", - "remarks": "rule_set_079" + "remarks": "rule_set_080" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nodev Option to /dev/shm", - "remarks": "rule_set_079" + "remarks": "rule_set_080" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_dev_shm_nosuid", - "remarks": "rule_set_080" + "remarks": "rule_set_081" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /dev/shm", - "remarks": "rule_set_080" + "remarks": "rule_set_081" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_dev_shm_nosuid", - "remarks": "rule_set_080" + "remarks": "rule_set_081" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /dev/shm", - "remarks": "rule_set_080" + "remarks": "rule_set_081" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_dev_shm_noexec", - "remarks": "rule_set_081" + "remarks": "rule_set_082" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add noexec Option to /dev/shm", - "remarks": "rule_set_081" + "remarks": "rule_set_082" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_dev_shm_noexec", - "remarks": "rule_set_081" + "remarks": "rule_set_082" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add noexec Option to /dev/shm", - "remarks": "rule_set_081" + "remarks": "rule_set_082" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_firewalld_installed", - "remarks": "rule_set_082" + "remarks": "rule_set_083" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install firewalld Package", - "remarks": "rule_set_082" + "remarks": "rule_set_083" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_firewalld_installed", - "remarks": "rule_set_082" + "remarks": "rule_set_083" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install firewalld Package", - "remarks": "rule_set_082" + "remarks": "rule_set_083" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_firewalld_enabled", - "remarks": "rule_set_083" + "remarks": "rule_set_084" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify firewalld Enabled", - "remarks": "rule_set_083" + "remarks": "rule_set_084" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_firewalld_enabled", - "remarks": "rule_set_083" + "remarks": "rule_set_084" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify firewalld Enabled", - "remarks": "rule_set_083" + "remarks": "rule_set_084" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "network_sniffer_disabled", - "remarks": "rule_set_084" + "remarks": "rule_set_085" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System is Not Acting as a Network Sniffer", - "remarks": "rule_set_084" + "remarks": "rule_set_085" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "network_sniffer_disabled", - "remarks": "rule_set_084" + "remarks": "rule_set_085" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System is Not Acting as a Network Sniffer", - "remarks": "rule_set_084" + "remarks": "rule_set_085" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_maximum_age_login_defs", - "remarks": "rule_set_085" + "remarks": "rule_set_086" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Age", - "remarks": "rule_set_085" + "remarks": "rule_set_086" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_maximum_age_login_defs", - "remarks": "rule_set_085" + "remarks": "rule_set_086" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Age", - "remarks": "rule_set_085" + "remarks": "rule_set_086" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_minimum_age_login_defs", - "remarks": "rule_set_086" + "remarks": "rule_set_087" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Minimum Age", - "remarks": "rule_set_086" + "remarks": "rule_set_087" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_minimum_age_login_defs", - "remarks": "rule_set_086" + "remarks": "rule_set_087" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Minimum Age", - "remarks": "rule_set_086" + "remarks": "rule_set_087" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_warn_age_login_defs", - "remarks": "rule_set_087" + "remarks": "rule_set_088" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Warning Age", - "remarks": "rule_set_087" + "remarks": "rule_set_088" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_warn_age_login_defs", - "remarks": "rule_set_087" + "remarks": "rule_set_088" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Warning Age", - "remarks": "rule_set_087" + "remarks": "rule_set_088" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_kerberos_crypto_policy", - "remarks": "rule_set_088" + "remarks": "rule_set_089" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Kerberos to use System Crypto Policy", - "remarks": "rule_set_088" + "remarks": "rule_set_089" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_kerberos_crypto_policy", - "remarks": "rule_set_088" + "remarks": "rule_set_089" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Kerberos to use System Crypto Policy", - "remarks": "rule_set_088" + "remarks": "rule_set_089" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "enable_ldap_client", - "remarks": "rule_set_089" + "remarks": "rule_set_090" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable the LDAP Client For Use in Authconfig", - "remarks": "rule_set_089" + "remarks": "rule_set_090" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "enable_ldap_client", - "remarks": "rule_set_089" + "remarks": "rule_set_090" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable the LDAP Client For Use in Authconfig", - "remarks": "rule_set_089" + "remarks": "rule_set_090" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kerberos_disable_no_keytab", - "remarks": "rule_set_090" + "remarks": "rule_set_091" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kerberos by removing host keytab", - "remarks": "rule_set_090" + "remarks": "rule_set_091" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kerberos_disable_no_keytab", - "remarks": "rule_set_090" + "remarks": "rule_set_091" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kerberos by removing host keytab", - "remarks": "rule_set_090" + "remarks": "rule_set_091" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "network_nmcli_permissions", - "remarks": "rule_set_091" + "remarks": "rule_set_092" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent non-Privileged Users from Modifying Network Interfaces using nmcli", - "remarks": "rule_set_091" + "remarks": "rule_set_092" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "network_nmcli_permissions", - "remarks": "rule_set_091" + "remarks": "rule_set_092" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent non-Privileged Users from Modifying Network Interfaces using nmcli", - "remarks": "rule_set_091" + "remarks": "rule_set_092" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sebool_kerberos_enabled", - "remarks": "rule_set_092" + "remarks": "rule_set_093" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable the kerberos_enabled SELinux Boolean", - "remarks": "rule_set_092" + "remarks": "rule_set_093" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sebool_kerberos_enabled", - "remarks": "rule_set_092" + "remarks": "rule_set_093" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable the kerberos_enabled SELinux Boolean", - "remarks": "rule_set_092" + "remarks": "rule_set_093" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_libuserconf", - "remarks": "rule_set_093" + "remarks": "rule_set_094" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/libuser.conf", - "remarks": "rule_set_093" + "remarks": "rule_set_094" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_libuserconf", - "remarks": "rule_set_093" + "remarks": "rule_set_094" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/libuser.conf", - "remarks": "rule_set_093" + "remarks": "rule_set_094" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_logindefs", - "remarks": "rule_set_094" + "remarks": "rule_set_095" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/login.defs", - "remarks": "rule_set_094" + "remarks": "rule_set_095" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_logindefs", - "remarks": "rule_set_094" + "remarks": "rule_set_095" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/login.defs", - "remarks": "rule_set_094" + "remarks": "rule_set_095" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_passwordauth", - "remarks": "rule_set_095" + "remarks": "rule_set_096" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - password-auth", - "remarks": "rule_set_095" + "remarks": "rule_set_096" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_passwordauth", - "remarks": "rule_set_095" + "remarks": "rule_set_096" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - password-auth", - "remarks": "rule_set_095" + "remarks": "rule_set_096" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_systemauth", - "remarks": "rule_set_096" + "remarks": "rule_set_097" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - system-auth", - "remarks": "rule_set_096" + "remarks": "rule_set_097" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_systemauth", - "remarks": "rule_set_096" + "remarks": "rule_set_097" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - system-auth", - "remarks": "rule_set_096" + "remarks": "rule_set_097" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_minlen_login_defs", - "remarks": "rule_set_097" + "remarks": "rule_set_098" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Minimum Length in login.defs", - "remarks": "rule_set_097" + "remarks": "rule_set_098" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_minlen_login_defs", - "remarks": "rule_set_097" + "remarks": "rule_set_098" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Minimum Length in login.defs", - "remarks": "rule_set_097" + "remarks": "rule_set_098" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_dcredit", - "remarks": "rule_set_098" + "remarks": "rule_set_099" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Digit Characters", - "remarks": "rule_set_098" + "remarks": "rule_set_099" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_dcredit", - "remarks": "rule_set_098" + "remarks": "rule_set_099" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Digit Characters", - "remarks": "rule_set_098" + "remarks": "rule_set_099" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_lcredit", - "remarks": "rule_set_099" + "remarks": "rule_set_100" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Lowercase Characters", - "remarks": "rule_set_099" + "remarks": "rule_set_100" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_lcredit", - "remarks": "rule_set_099" + "remarks": "rule_set_100" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Lowercase Characters", - "remarks": "rule_set_099" + "remarks": "rule_set_100" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minclass", - "remarks": "rule_set_100" + "remarks": "rule_set_101" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", - "remarks": "rule_set_100" + "remarks": "rule_set_101" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minclass", - "remarks": "rule_set_100" + "remarks": "rule_set_101" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", - "remarks": "rule_set_100" + "remarks": "rule_set_101" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minlen", - "remarks": "rule_set_101" + "remarks": "rule_set_102" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Length", - "remarks": "rule_set_101" + "remarks": "rule_set_102" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minlen", - "remarks": "rule_set_101" + "remarks": "rule_set_102" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Length", - "remarks": "rule_set_101" + "remarks": "rule_set_102" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_ocredit", - "remarks": "rule_set_102" + "remarks": "rule_set_103" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Special Characters", - "remarks": "rule_set_102" + "remarks": "rule_set_103" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_ocredit", - "remarks": "rule_set_102" + "remarks": "rule_set_103" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Special Characters", - "remarks": "rule_set_102" + "remarks": "rule_set_103" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_ucredit", - "remarks": "rule_set_103" + "remarks": "rule_set_104" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Uppercase Characters", - "remarks": "rule_set_103" + "remarks": "rule_set_104" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_ucredit", - "remarks": "rule_set_103" + "remarks": "rule_set_104" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Uppercase Characters", - "remarks": "rule_set_103" + "remarks": "rule_set_104" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny", - "remarks": "rule_set_104" + "remarks": "rule_set_105" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Lock Accounts After Failed Password Attempts", - "remarks": "rule_set_104" + "remarks": "rule_set_105" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny", - "remarks": "rule_set_104" + "remarks": "rule_set_105" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Lock Accounts After Failed Password Attempts", - "remarks": "rule_set_104" + "remarks": "rule_set_105" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny_root", - "remarks": "rule_set_105" + "remarks": "rule_set_106" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the root Account for Failed Password Attempts", - "remarks": "rule_set_105" + "remarks": "rule_set_106" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny_root", - "remarks": "rule_set_105" + "remarks": "rule_set_106" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the root Account for Failed Password Attempts", - "remarks": "rule_set_105" + "remarks": "rule_set_106" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_interval", - "remarks": "rule_set_106" + "remarks": "rule_set_107" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Interval For Counting Failed Password Attempts", - "remarks": "rule_set_106" + "remarks": "rule_set_107" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_interval", - "remarks": "rule_set_106" + "remarks": "rule_set_107" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Interval For Counting Failed Password Attempts", - "remarks": "rule_set_106" + "remarks": "rule_set_107" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_unlock_time", - "remarks": "rule_set_107" + "remarks": "rule_set_108" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Lockout Time for Failed Password Attempts", - "remarks": "rule_set_107" + "remarks": "rule_set_108" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_unlock_time", - "remarks": "rule_set_107" + "remarks": "rule_set_108" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Lockout Time for Failed Password Attempts", - "remarks": "rule_set_107" + "remarks": "rule_set_108" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_host_auth", - "remarks": "rule_set_108" + "remarks": "rule_set_109" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Host-Based Authentication", - "remarks": "rule_set_108" + "remarks": "rule_set_109" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_host_auth", - "remarks": "rule_set_108" + "remarks": "rule_set_109" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Host-Based Authentication", - "remarks": "rule_set_108" + "remarks": "rule_set_109" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "require_emergency_target_auth", - "remarks": "rule_set_109" + "remarks": "rule_set_110" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require Authentication for Emergency Systemd Target", - "remarks": "rule_set_109" + "remarks": "rule_set_110" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "require_emergency_target_auth", - "remarks": "rule_set_109" + "remarks": "rule_set_110" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require Authentication for Emergency Systemd Target", - "remarks": "rule_set_109" + "remarks": "rule_set_110" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sebool_authlogin_nsswitch_use_ldap", - "remarks": "rule_set_110" + "remarks": "rule_set_111" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the authlogin_nsswitch_use_ldap SELinux Boolean", - "remarks": "rule_set_110" + "remarks": "rule_set_111" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sebool_authlogin_nsswitch_use_ldap", - "remarks": "rule_set_110" + "remarks": "rule_set_111" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the authlogin_nsswitch_use_ldap SELinux Boolean", - "remarks": "rule_set_110" + "remarks": "rule_set_111" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sebool_authlogin_radius", - "remarks": "rule_set_111" + "remarks": "rule_set_112" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the authlogin_radius SELinux Boolean", - "remarks": "rule_set_111" + "remarks": "rule_set_112" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sebool_authlogin_radius", - "remarks": "rule_set_111" + "remarks": "rule_set_112" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the authlogin_radius SELinux Boolean", - "remarks": "rule_set_111" + "remarks": "rule_set_112" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_kerb_auth", - "remarks": "rule_set_112" + "remarks": "rule_set_113" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kerberos Authentication", - "remarks": "rule_set_112" + "remarks": "rule_set_113" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_kerb_auth", - "remarks": "rule_set_112" + "remarks": "rule_set_113" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kerberos Authentication", - "remarks": "rule_set_112" + "remarks": "rule_set_113" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_auth_tries", - "remarks": "rule_set_113" + "remarks": "rule_set_114" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH authentication attempt limit", - "remarks": "rule_set_113" + "remarks": "rule_set_114" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_auth_tries", - "remarks": "rule_set_113" + "remarks": "rule_set_114" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH authentication attempt limit", - "remarks": "rule_set_113" + "remarks": "rule_set_114" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sssd_enable_smartcards", - "remarks": "rule_set_114" + "remarks": "rule_set_115" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Smartcards in SSSD", - "remarks": "rule_set_114" + "remarks": "rule_set_115" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sssd_enable_smartcards", - "remarks": "rule_set_114" + "remarks": "rule_set_115" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Smartcards in SSSD", - "remarks": "rule_set_114" + "remarks": "rule_set_115" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_warning_banner", - "remarks": "rule_set_115" + "remarks": "rule_set_116" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable SSH Warning Banner", - "remarks": "rule_set_115" + "remarks": "rule_set_116" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_warning_banner", - "remarks": "rule_set_115" + "remarks": "rule_set_116" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable SSH Warning Banner", - "remarks": "rule_set_115" + "remarks": "rule_set_116" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_x11_forwarding", - "remarks": "rule_set_116" + "remarks": "rule_set_117" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable X11 Forwarding", - "remarks": "rule_set_116" + "remarks": "rule_set_117" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_x11_forwarding", - "remarks": "rule_set_116" + "remarks": "rule_set_117" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable X11 Forwarding", - "remarks": "rule_set_116" + "remarks": "rule_set_117" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_access_failed", - "remarks": "rule_set_117" + "remarks": "rule_set_118" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditing of unsuccessful file accesses", - "remarks": "rule_set_117" + "remarks": "rule_set_118" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_access_failed", - "remarks": "rule_set_117" + "remarks": "rule_set_118" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditing of unsuccessful file accesses", - "remarks": "rule_set_117" + "remarks": "rule_set_118" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_access_failed_aarch64", - "remarks": "rule_set_118" + "remarks": "rule_set_119" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditing of unsuccessful file accesses (AArch64)", - "remarks": "rule_set_118" + "remarks": "rule_set_119" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_access_failed_aarch64", - "remarks": "rule_set_118" + "remarks": "rule_set_119" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditing of unsuccessful file accesses (AArch64)", - "remarks": "rule_set_118" + "remarks": "rule_set_119" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_access_failed_ppc64le", - "remarks": "rule_set_119" + "remarks": "rule_set_120" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditing of unsuccessful file accesses (ppc64le)", - "remarks": "rule_set_119" + "remarks": "rule_set_120" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_access_failed_ppc64le", - "remarks": "rule_set_119" + "remarks": "rule_set_120" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditing of unsuccessful file accesses (ppc64le)", - "remarks": "rule_set_119" + "remarks": "rule_set_120" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_access_success", - "remarks": "rule_set_120" + "remarks": "rule_set_121" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditing of successful file accesses", - "remarks": "rule_set_120" + "remarks": "rule_set_121" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_access_success", - "remarks": "rule_set_120" + "remarks": "rule_set_121" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditing of successful file accesses", - "remarks": "rule_set_120" + "remarks": "rule_set_121" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_access_success_aarch64", - "remarks": "rule_set_121" + "remarks": "rule_set_122" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditing of successful file accesses (AArch64)", - "remarks": "rule_set_121" + "remarks": "rule_set_122" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_access_success_aarch64", - "remarks": "rule_set_121" + "remarks": "rule_set_122" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditing of successful file accesses (AArch64)", - "remarks": "rule_set_121" + "remarks": "rule_set_122" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_access_success_ppc64le", - "remarks": "rule_set_122" + "remarks": "rule_set_123" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditing of successful file accesses (ppc64le)", - "remarks": "rule_set_122" + "remarks": "rule_set_123" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_access_success_ppc64le", - "remarks": "rule_set_122" + "remarks": "rule_set_123" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditing of successful file accesses (ppc64le)", - "remarks": "rule_set_122" + "remarks": "rule_set_123" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands", - "remarks": "rule_set_123" + "remarks": "rule_set_124" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands", - "remarks": "rule_set_123" + "remarks": "rule_set_124" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands", - "remarks": "rule_set_123" + "remarks": "rule_set_124" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands", - "remarks": "rule_set_123" + "remarks": "rule_set_124" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_utmp", - "remarks": "rule_set_124" + "remarks": "rule_set_125" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information utmp", - "remarks": "rule_set_124" + "remarks": "rule_set_125" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_utmp", - "remarks": "rule_set_124" + "remarks": "rule_set_125" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information utmp", - "remarks": "rule_set_124" + "remarks": "rule_set_125" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_btmp", - "remarks": "rule_set_125" + "remarks": "rule_set_126" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information btmp", - "remarks": "rule_set_125" + "remarks": "rule_set_126" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_btmp", - "remarks": "rule_set_125" + "remarks": "rule_set_126" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information btmp", - "remarks": "rule_set_125" + "remarks": "rule_set_126" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_wtmp", - "remarks": "rule_set_126" + "remarks": "rule_set_127" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", - "remarks": "rule_set_126" + "remarks": "rule_set_127" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_wtmp", - "remarks": "rule_set_126" + "remarks": "rule_set_127" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", - "remarks": "rule_set_126" + "remarks": "rule_set_127" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_creat", - "remarks": "rule_set_127" + "remarks": "rule_set_128" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - creat", - "remarks": "rule_set_127" + "remarks": "rule_set_128" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_creat", - "remarks": "rule_set_127" + "remarks": "rule_set_128" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - creat", - "remarks": "rule_set_127" + "remarks": "rule_set_128" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_open", - "remarks": "rule_set_128" + "remarks": "rule_set_129" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - open", - "remarks": "rule_set_128" + "remarks": "rule_set_129" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_open", - "remarks": "rule_set_128" + "remarks": "rule_set_129" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - open", - "remarks": "rule_set_128" + "remarks": "rule_set_129" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_openat", - "remarks": "rule_set_129" + "remarks": "rule_set_130" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - openat", - "remarks": "rule_set_129" + "remarks": "rule_set_130" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_openat", - "remarks": "rule_set_129" + "remarks": "rule_set_130" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - openat", - "remarks": "rule_set_129" + "remarks": "rule_set_130" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_open_by_handle_at", - "remarks": "rule_set_130" + "remarks": "rule_set_131" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - open_by_handle_at", - "remarks": "rule_set_130" + "remarks": "rule_set_131" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_open_by_handle_at", - "remarks": "rule_set_130" + "remarks": "rule_set_131" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - open_by_handle_at", - "remarks": "rule_set_130" + "remarks": "rule_set_131" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_truncate", - "remarks": "rule_set_131" + "remarks": "rule_set_132" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - truncate", - "remarks": "rule_set_131" + "remarks": "rule_set_132" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_truncate", - "remarks": "rule_set_131" + "remarks": "rule_set_132" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - truncate", - "remarks": "rule_set_131" + "remarks": "rule_set_132" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_ftruncate", - "remarks": "rule_set_132" + "remarks": "rule_set_133" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - ftruncate", - "remarks": "rule_set_132" + "remarks": "rule_set_133" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_ftruncate", - "remarks": "rule_set_132" + "remarks": "rule_set_133" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - ftruncate", - "remarks": "rule_set_132" + "remarks": "rule_set_133" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit_installed", - "remarks": "rule_set_133" + "remarks": "rule_set_134" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit Subsystem is Installed", - "remarks": "rule_set_133" + "remarks": "rule_set_134" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit_installed", - "remarks": "rule_set_133" + "remarks": "rule_set_134" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit Subsystem is Installed", - "remarks": "rule_set_133" + "remarks": "rule_set_134" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sebool_auditadm_exec_content", - "remarks": "rule_set_134" + "remarks": "rule_set_135" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable the auditadm_exec_content SELinux Boolean", - "remarks": "rule_set_134" + "remarks": "rule_set_135" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sebool_auditadm_exec_content", - "remarks": "rule_set_134" + "remarks": "rule_set_135" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable the auditadm_exec_content SELinux Boolean", - "remarks": "rule_set_134" + "remarks": "rule_set_135" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_configure_pool_and_server", - "remarks": "rule_set_135" + "remarks": "rule_set_136" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Chrony Configure Pool and Server", - "remarks": "rule_set_135" + "remarks": "rule_set_136" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_configure_pool_and_server", - "remarks": "rule_set_135" + "remarks": "rule_set_136" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Chrony Configure Pool and Server", - "remarks": "rule_set_135" + "remarks": "rule_set_136" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_or_ntpd_specify_multiple_servers", - "remarks": "rule_set_136" + "remarks": "rule_set_137" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Specify Additional Remote NTP Servers", - "remarks": "rule_set_136" + "remarks": "rule_set_137" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_or_ntpd_specify_multiple_servers", - "remarks": "rule_set_136" + "remarks": "rule_set_137" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Specify Additional Remote NTP Servers", - "remarks": "rule_set_136" + "remarks": "rule_set_137" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_specify_remote_server", - "remarks": "rule_set_137" + "remarks": "rule_set_138" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "A remote time server for Chrony is configured", - "remarks": "rule_set_137" + "remarks": "rule_set_138" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_specify_remote_server", - "remarks": "rule_set_137" + "remarks": "rule_set_138" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "A remote time server for Chrony is configured", - "remarks": "rule_set_137" + "remarks": "rule_set_138" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_chrony_installed", - "remarks": "rule_set_138" + "remarks": "rule_set_139" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "The Chrony package is installed", - "remarks": "rule_set_138" + "remarks": "rule_set_139" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_chrony_installed", - "remarks": "rule_set_138" + "remarks": "rule_set_139" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "The Chrony package is installed", - "remarks": "rule_set_138" + "remarks": "rule_set_139" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_cron_logging", - "remarks": "rule_set_139" + "remarks": "rule_set_140" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure cron Is Logging To Rsyslog", - "remarks": "rule_set_139" + "remarks": "rule_set_140" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_cron_logging", - "remarks": "rule_set_139" + "remarks": "rule_set_140" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure cron Is Logging To Rsyslog", - "remarks": "rule_set_139" + "remarks": "rule_set_140" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_140" + "remarks": "rule_set_141" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_140" + "remarks": "rule_set_141" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_140" + "remarks": "rule_set_141" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_140" + "remarks": "rule_set_141" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_141" + "remarks": "rule_set_142" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_141" + "remarks": "rule_set_142" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_141" + "remarks": "rule_set_142" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_141" + "remarks": "rule_set_142" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_142" + "remarks": "rule_set_143" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_142" + "remarks": "rule_set_143" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_142" + "remarks": "rule_set_143" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_142" + "remarks": "rule_set_143" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_nolisten", - "remarks": "rule_set_143" + "remarks": "rule_set_144" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure rsyslog Does Not Accept Remote Messages Unless Acting As Log Server", - "remarks": "rule_set_143" + "remarks": "rule_set_144" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_nolisten", - "remarks": "rule_set_143" + "remarks": "rule_set_144" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure rsyslog Does Not Accept Remote Messages Unless Acting As Log Server", - "remarks": "rule_set_143" + "remarks": "rule_set_144" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_remote_loghost", - "remarks": "rule_set_144" + "remarks": "rule_set_145" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Logs Sent To Remote Host", - "remarks": "rule_set_144" + "remarks": "rule_set_145" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_remote_loghost", - "remarks": "rule_set_144" + "remarks": "rule_set_145" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Logs Sent To Remote Host", - "remarks": "rule_set_144" + "remarks": "rule_set_145" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_remote_tls", - "remarks": "rule_set_145" + "remarks": "rule_set_146" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure TLS for rsyslog remote logging", - "remarks": "rule_set_145" + "remarks": "rule_set_146" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_remote_tls", - "remarks": "rule_set_145" + "remarks": "rule_set_146" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure TLS for rsyslog remote logging", - "remarks": "rule_set_145" + "remarks": "rule_set_146" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_remote_tls_cacert", - "remarks": "rule_set_146" + "remarks": "rule_set_147" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure CA certificate for rsyslog remote logging", - "remarks": "rule_set_146" + "remarks": "rule_set_147" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_remote_tls_cacert", - "remarks": "rule_set_146" + "remarks": "rule_set_147" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure CA certificate for rsyslog remote logging", - "remarks": "rule_set_146" + "remarks": "rule_set_147" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_chronyd_enabled", - "remarks": "rule_set_147" + "remarks": "rule_set_148" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "The Chronyd service is enabled", - "remarks": "rule_set_147" + "remarks": "rule_set_148" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_chronyd_enabled", - "remarks": "rule_set_147" + "remarks": "rule_set_148" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "The Chronyd service is enabled", - "remarks": "rule_set_147" + "remarks": "rule_set_148" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_148" + "remarks": "rule_set_149" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_148" + "remarks": "rule_set_149" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_148" + "remarks": "rule_set_149" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_148" + "remarks": "rule_set_149" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_snmpd_disabled", - "remarks": "rule_set_149" + "remarks": "rule_set_150" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable snmpd Service", - "remarks": "rule_set_149" + "remarks": "rule_set_150" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_snmpd_disabled", - "remarks": "rule_set_149" + "remarks": "rule_set_150" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable snmpd Service", - "remarks": "rule_set_149" + "remarks": "rule_set_150" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "snmpd_use_newer_protocol", - "remarks": "rule_set_150" + "remarks": "rule_set_151" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure SNMP Service to Use Only SNMPv3 or Newer", - "remarks": "rule_set_150" + "remarks": "rule_set_151" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "snmpd_use_newer_protocol", - "remarks": "rule_set_150" + "remarks": "rule_set_151" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure SNMP Service to Use Only SNMPv3 or Newer", - "remarks": "rule_set_150" + "remarks": "rule_set_151" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "network_ipv6_static_address", - "remarks": "rule_set_151" + "remarks": "rule_set_152" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Manually Assign Global IPv6 Address", - "remarks": "rule_set_151" + "remarks": "rule_set_152" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "network_ipv6_static_address", - "remarks": "rule_set_151" + "remarks": "rule_set_152" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Manually Assign Global IPv6 Address", - "remarks": "rule_set_151" + "remarks": "rule_set_152" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "wireless_disable_interfaces", - "remarks": "rule_set_152" + "remarks": "rule_set_153" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Deactivate Wireless Network Interfaces", - "remarks": "rule_set_152" + "remarks": "rule_set_153" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "wireless_disable_interfaces", - "remarks": "rule_set_152" + "remarks": "rule_set_153" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Deactivate Wireless Network Interfaces", - "remarks": "rule_set_152" + "remarks": "rule_set_153" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_opensc_card_drivers", - "remarks": "rule_set_153" + "remarks": "rule_set_154" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure opensc Smart Card Drivers", - "remarks": "rule_set_153" + "remarks": "rule_set_154" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_opensc_card_drivers", - "remarks": "rule_set_153" + "remarks": "rule_set_154" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure opensc Smart Card Drivers", - "remarks": "rule_set_153" + "remarks": "rule_set_154" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_opensc_installed", - "remarks": "rule_set_154" + "remarks": "rule_set_155" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install the opensc Package For Multifactor Authentication", - "remarks": "rule_set_154" + "remarks": "rule_set_155" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_opensc_installed", - "remarks": "rule_set_154" + "remarks": "rule_set_155" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install the opensc Package For Multifactor Authentication", - "remarks": "rule_set_154" + "remarks": "rule_set_155" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_pcsc-lite_installed", - "remarks": "rule_set_155" + "remarks": "rule_set_156" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install the pcsc-lite package", - "remarks": "rule_set_155" + "remarks": "rule_set_156" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_pcsc-lite_installed", - "remarks": "rule_set_155" + "remarks": "rule_set_156" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install the pcsc-lite package", - "remarks": "rule_set_155" + "remarks": "rule_set_156" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_pcsc-lite-ccid_installed", - "remarks": "rule_set_156" + "remarks": "rule_set_157" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install the pcsc-lite-ccid package", - "remarks": "rule_set_156" + "remarks": "rule_set_157" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_pcsc-lite-ccid_installed", - "remarks": "rule_set_156" + "remarks": "rule_set_157" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install the pcsc-lite-ccid package", - "remarks": "rule_set_156" + "remarks": "rule_set_157" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_sudo_installed", - "remarks": "rule_set_157" + "remarks": "rule_set_158" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install sudo Package", - "remarks": "rule_set_157" + "remarks": "rule_set_158" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_sudo_installed", - "remarks": "rule_set_157" + "remarks": "rule_set_158" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install sudo Package", - "remarks": "rule_set_157" + "remarks": "rule_set_158" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_pcscd_enabled", - "remarks": "rule_set_158" + "remarks": "rule_set_159" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable the pcscd Service", - "remarks": "rule_set_158" + "remarks": "rule_set_159" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_pcscd_enabled", - "remarks": "rule_set_158" + "remarks": "rule_set_159" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable the pcscd Service", - "remarks": "rule_set_158" + "remarks": "rule_set_159" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_firewalld_ports", - "remarks": "rule_set_159" + "remarks": "rule_set_160" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Firewalld Ports", - "remarks": "rule_set_159" + "remarks": "rule_set_160" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_firewalld_ports", - "remarks": "rule_set_159" + "remarks": "rule_set_160" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Firewalld Ports", - "remarks": "rule_set_159" + "remarks": "rule_set_160" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_firewalld_default_zone", - "remarks": "rule_set_160" + "remarks": "rule_set_161" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Default firewalld Zone for Incoming Packets", - "remarks": "rule_set_160" + "remarks": "rule_set_161" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_firewalld_default_zone", - "remarks": "rule_set_160" + "remarks": "rule_set_161" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Default firewalld Zone for Incoming Packets", - "remarks": "rule_set_160" + "remarks": "rule_set_161" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_usbguard_installed", - "remarks": "rule_set_161" + "remarks": "rule_set_162" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install usbguard Package", - "remarks": "rule_set_161" + "remarks": "rule_set_162" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_usbguard_installed", - "remarks": "rule_set_161" + "remarks": "rule_set_162" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install usbguard Package", - "remarks": "rule_set_161" + "remarks": "rule_set_162" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_usbguard_enabled", - "remarks": "rule_set_162" + "remarks": "rule_set_163" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable the USBGuard Service", - "remarks": "rule_set_162" + "remarks": "rule_set_163" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_usbguard_enabled", - "remarks": "rule_set_162" + "remarks": "rule_set_163" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable the USBGuard Service", - "remarks": "rule_set_162" + "remarks": "rule_set_163" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "system_booted_in_fips_mode", - "remarks": "rule_set_163" + "remarks": "rule_set_164" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that the system was booted with fips=1", - "remarks": "rule_set_163" + "remarks": "rule_set_164" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "system_booted_in_fips_mode", - "remarks": "rule_set_163" + "remarks": "rule_set_164" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that the system was booted with fips=1", - "remarks": "rule_set_163" + "remarks": "rule_set_164" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "enable_fips_mode", - "remarks": "rule_set_164" + "remarks": "rule_set_165" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable FIPS Mode", - "remarks": "rule_set_164" + "remarks": "rule_set_165" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "enable_fips_mode", - "remarks": "rule_set_164" + "remarks": "rule_set_165" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable FIPS Mode", - "remarks": "rule_set_164" + "remarks": "rule_set_165" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_private_key", - "remarks": "rule_set_165" + "remarks": "rule_set_166" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Private *_key Key Files", - "remarks": "rule_set_165" + "remarks": "rule_set_166" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_private_key", - "remarks": "rule_set_165" + "remarks": "rule_set_166" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Private *_key Key Files", - "remarks": "rule_set_165" + "remarks": "rule_set_166" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dnf-automatic_apply_updates", - "remarks": "rule_set_166" + "remarks": "rule_set_167" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure dnf-automatic to Install Available Updates Automatically", - "remarks": "rule_set_166" + "remarks": "rule_set_167" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dnf-automatic_apply_updates", - "remarks": "rule_set_166" + "remarks": "rule_set_167" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure dnf-automatic to Install Available Updates Automatically", - "remarks": "rule_set_166" + "remarks": "rule_set_167" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_libdnf-plugin-subscription-manager_installed", - "remarks": "rule_set_167" + "remarks": "rule_set_168" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install libdnf-plugin-subscription-manager Package", - "remarks": "rule_set_167" + "remarks": "rule_set_168" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_libdnf-plugin-subscription-manager_installed", - "remarks": "rule_set_167" + "remarks": "rule_set_168" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install libdnf-plugin-subscription-manager Package", - "remarks": "rule_set_167" + "remarks": "rule_set_168" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_subscription-manager_installed", - "remarks": "rule_set_168" + "remarks": "rule_set_169" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install subscription-manager Package", - "remarks": "rule_set_168" + "remarks": "rule_set_169" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_subscription-manager_installed", - "remarks": "rule_set_168" + "remarks": "rule_set_169" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install subscription-manager Package", - "remarks": "rule_set_168" + "remarks": "rule_set_169" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_shelllogin_for_systemaccounts", - "remarks": "rule_set_169" + "remarks": "rule_set_170" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", - "remarks": "rule_set_169" + "remarks": "rule_set_170" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_shelllogin_for_systemaccounts", - "remarks": "rule_set_169" + "remarks": "rule_set_170" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", - "remarks": "rule_set_169" + "remarks": "rule_set_170" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "secure_boot_enabled", - "remarks": "rule_set_170" + "remarks": "rule_set_171" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Secure Boot is enabled", - "remarks": "rule_set_170" + "remarks": "rule_set_171" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "secure_boot_enabled", - "remarks": "rule_set_170" + "remarks": "rule_set_171" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Secure Boot is enabled", - "remarks": "rule_set_170" + "remarks": "rule_set_171" } ], "control-implementations": [ { - "uuid": "f78d5c35-0b80-4958-9ead-d6ea84f0bb55", + "uuid": "f6ecf497-e23f-4e47-8265-5c3232721890", "source": "trestle://profiles/rhel10-ism_o-base/profile.json", "description": "Control implementation for ism_o", "props": [ @@ -8992,7 +9033,7 @@ ], "implemented-requirements": [ { - "uuid": "0daed040-15c1-4d34-b628-4798c108f45d", + "uuid": "9176bc6b-3ca7-411b-ae38-65f44e1a817f", "control-id": "ism_o_0418", "description": "No notes for control-id 0418.", "props": [ @@ -9074,7 +9115,7 @@ ] }, { - "uuid": "187589db-72af-471b-bbf7-98d6669a43fe", + "uuid": "b4ac1e40-6a29-4fde-8a48-893fbbfdd9fd", "control-id": "ism_o_0421", "description": "No notes for control-id 0421.", "props": [ @@ -9176,7 +9217,7 @@ ] }, { - "uuid": "f1c9650c-cf41-4fdd-940f-f26fb24855c9", + "uuid": "fe5027e0-eb62-4653-8914-89f3d6c82dcf", "control-id": "ism_o_0484", "description": "No notes for control-id 0484.", "props": [ @@ -9203,7 +9244,7 @@ ] }, { - "uuid": "b9b4d707-b24b-4293-bb4e-314610249ed9", + "uuid": "8f6350ae-1a60-41c3-9eba-d3867cadb41f", "control-id": "ism_o_0487", "description": "The description for control-id ism_o_0487.", "props": [ @@ -9216,7 +9257,7 @@ ] }, { - "uuid": "06652fa2-96b1-450c-8d96-1dfe659e90e9", + "uuid": "e9326bb8-0072-4930-a507-b9ed54407030", "control-id": "ism_o_0582", "description": "No notes for control-id 0582.", "props": [ @@ -9468,7 +9509,7 @@ ] }, { - "uuid": "12a51727-1e80-48a1-a109-4eb32e04d34a", + "uuid": "97b08a96-addd-40d4-a7bc-5dfc37054885", "control-id": "ism_o_0846", "description": "No notes for control-id 0846.", "props": [ @@ -9575,7 +9616,7 @@ ] }, { - "uuid": "70918833-9654-4229-a5f0-371c2dac3bb3", + "uuid": "531f766f-47cf-46e9-a319-6c4d9c0938b7", "control-id": "ism_o_0974", "description": "This needs reevaluation.", "props": [ @@ -9677,7 +9718,7 @@ ] }, { - "uuid": "01bbe9e4-676d-40d3-9c19-94bdb5a3150a", + "uuid": "982dce55-9758-4e0a-8e71-c96357685e11", "control-id": "ism_o_0988", "description": "No notes for control-id 0988.", "props": [ @@ -9754,7 +9795,7 @@ ] }, { - "uuid": "c791431e-f66a-459f-8013-a63bca58f19a", + "uuid": "06ce4d6b-877e-4b83-88e5-2ca29486be96", "control-id": "ism_o_1034", "description": "No notes for control-id 1034.", "props": [ @@ -9771,7 +9812,7 @@ ] }, { - "uuid": "7a01524b-0cc0-43f2-b9a1-cecaaed92942", + "uuid": "9645ae5a-8b6d-4420-870b-fe25c4a03d50", "control-id": "ism_o_1055", "description": "Needs reevaluation", "props": [ @@ -9848,7 +9889,7 @@ ] }, { - "uuid": "c9e8b333-9e70-403e-b0d6-53977e2c3c2c", + "uuid": "cedb81d8-d418-40e9-a6af-ae2910e11f7e", "control-id": "ism_o_1173", "description": "No notes for control-id 1173.", "props": [ @@ -9950,7 +9991,7 @@ ] }, { - "uuid": "e0c2a21d-7977-4c15-86d9-f83adb5fb1fe", + "uuid": "116f383f-64a4-4921-8388-82958c33f856", "control-id": "ism_o_1277", "description": "No notes for control-id 1277.", "props": [ @@ -9962,7 +10003,7 @@ ] }, { - "uuid": "ea38b482-f469-45c5-ac04-5959895f56fe", + "uuid": "24b391a4-697c-4352-ba96-cb1b075e1ef0", "control-id": "ism_o_1288", "description": "No notes for control-id 1288.", "props": [ @@ -9979,7 +10020,7 @@ ] }, { - "uuid": "f4fa4795-2e22-48e7-9343-ed4bad3dd58f", + "uuid": "6ec77b3d-4dbc-4502-a6c5-8a0f027f438c", "control-id": "ism_o_1311", "description": "No notes for control-id 1311.", "props": [ @@ -10001,7 +10042,7 @@ ] }, { - "uuid": "bad05912-3c52-420a-a797-5226a91a4062", + "uuid": "eef76069-1272-40c8-a922-ec80fddbf244", "control-id": "ism_o_1315", "description": "No notes for control-id 1315.", "props": [ @@ -10023,7 +10064,7 @@ ] }, { - "uuid": "966c2135-08fc-4414-b69f-68c4f6461d7a", + "uuid": "4db909c8-762e-42e5-b4ce-fe7f53ba2c06", "control-id": "ism_o_1319", "description": "No notes for control-id 1319.", "props": [ @@ -10045,7 +10086,7 @@ ] }, { - "uuid": "bea91a89-603f-40b3-87ae-988edc28e987", + "uuid": "8ce0727d-5125-4411-aa8b-d54d2bff534a", "control-id": "ism_o_1341", "description": "No notes for control-id 1341.", "props": [ @@ -10062,7 +10103,7 @@ ] }, { - "uuid": "f3e1d6b6-9509-49d4-813b-f8a740f523db", + "uuid": "8ec5f965-3c59-42e4-9a9e-2844bd546979", "control-id": "ism_o_1386", "description": "This needs reevaluation.", "props": [ @@ -10104,7 +10145,7 @@ ] }, { - "uuid": "82a52ccd-748a-43a9-aafb-1d2413765552", + "uuid": "4059d981-ab0e-43ac-8c8e-86df6170f247", "control-id": "ism_o_1401", "description": "No notes for control-id 1401.", "props": [ @@ -10206,7 +10247,7 @@ ] }, { - "uuid": "ccf2513a-6869-4abc-998a-cbac86bc0686", + "uuid": "36299531-86fb-4182-b8d3-163f72a21697", "control-id": "ism_o_1402", "description": "No notes for control-id 1402.", "props": [ @@ -10283,7 +10324,7 @@ ] }, { - "uuid": "010d6b5b-2909-4ae4-a923-73cd46792ab8", + "uuid": "b97861e7-e010-42c4-ba54-0b1f349d764d", "control-id": "ism_o_1405", "description": "No notes for control-id 1405.", "props": [ @@ -10360,7 +10401,7 @@ ] }, { - "uuid": "031ffad7-d8a8-4c44-8a4f-ebfba49ee2c1", + "uuid": "a596b15c-59d4-44e7-9878-2b8ddf29f084", "control-id": "ism_o_1416", "description": "No notes for control-id 1416.", "props": [ @@ -10382,7 +10423,7 @@ ] }, { - "uuid": "19f27472-8645-480b-97e7-f69ae05a3b52", + "uuid": "a6653276-981a-4c5d-bb5c-99e47113efb9", "control-id": "ism_o_1417", "description": "No notes for control-id 1417.", "props": [ @@ -10399,7 +10440,7 @@ ] }, { - "uuid": "9d3ba222-253b-416c-b7ca-d3aba3e52c51", + "uuid": "4f0752da-2e7e-447b-8c21-e1a297984bbe", "control-id": "ism_o_1418", "description": "No notes for control-id 1418.", "props": [ @@ -10421,7 +10462,7 @@ ] }, { - "uuid": "dd7b5b6f-092a-480e-bc8a-f948cd6bc227", + "uuid": "e5ed10ab-8df7-447e-8854-9b9522f5a04f", "control-id": "ism_o_1446", "description": "No notes for control-id 1446.", "props": [ @@ -10448,7 +10489,7 @@ ] }, { - "uuid": "93f5c57c-f997-4377-8742-b8cba6e7a481", + "uuid": "cdc1505b-1321-46ab-907f-51c22eca42be", "control-id": "ism_o_1449", "description": "This needs more", "props": [ @@ -10465,7 +10506,7 @@ ] }, { - "uuid": "b31edbc4-480b-4bff-ad65-5b54338f2c2c", + "uuid": "766ba749-44d4-475c-9c33-b0680e8e7294", "control-id": "ism_o_1467", "description": "No notes for control-id 1467.", "props": [ @@ -10492,7 +10533,7 @@ ] }, { - "uuid": "3d5c4e41-d7b7-4b87-af11-76c4df19ff9f", + "uuid": "95d7688a-61f3-45cd-91c6-a68d37816ee8", "control-id": "ism_o_1483", "description": "No notes for control-id 1483.", "props": [ @@ -10519,7 +10560,7 @@ ] }, { - "uuid": "3ff6a06b-602e-469a-a245-ec38c60087da", + "uuid": "9da2014e-ab81-49e1-a2e9-51b7d3330434", "control-id": "ism_o_1491", "description": "No notes for control-id 1491.", "props": [ @@ -10536,7 +10577,7 @@ ] }, { - "uuid": "cbd65aae-e68f-4125-a3e6-0aea7e19b262", + "uuid": "181a832a-9c97-48c4-a09f-f695d5156454", "control-id": "ism_o_1493", "description": "No notes for control-id 1493.", "props": [ @@ -10580,6 +10621,11 @@ "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_redhat_gpgkey_installed" }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "package_sequoia-sq_installed" + }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", @@ -10588,7 +10634,7 @@ ] }, { - "uuid": "144a8108-6ac6-448b-92bd-2d4b9bc33238", + "uuid": "5d51a354-8f1b-4e63-9c3a-275c385a2d22", "control-id": "ism_o_1504", "description": "No notes for control-id 1504.", "props": [ @@ -10690,7 +10736,7 @@ ] }, { - "uuid": "e1d23d1d-c4ec-4fb0-b8a8-73f3628b02e0", + "uuid": "e3c4ec1a-6470-464e-aae6-045a033aa148", "control-id": "ism_o_1505", "description": "No notes for control-id 1505.", "props": [ @@ -10792,7 +10838,7 @@ ] }, { - "uuid": "963121bb-0642-4915-b663-12cfb25600b1", + "uuid": "777e2e55-b1a0-443b-a900-cc8d4439da0d", "control-id": "ism_o_1506", "description": "As of OpenSSH 7.6, OpenSSH only supports SSH 2.", "props": [ @@ -10804,7 +10850,7 @@ ] }, { - "uuid": "e2989e3c-339c-4dff-a502-e8cb4884cb35", + "uuid": "e6a853e8-b433-4df2-85c4-aa3d8bf8e3a0", "control-id": "ism_o_1546", "description": "No notes for control-id 1546.", "props": [ @@ -10961,7 +11007,7 @@ ] }, { - "uuid": "74808339-fa03-49b1-b754-21aa8f862a0b", + "uuid": "1e9a461f-fe48-442b-bb3f-063340e57074", "control-id": "ism_o_1552", "description": "No notes for control-id 1552.", "props": [ @@ -10973,7 +11019,7 @@ ] }, { - "uuid": "c0caffa1-1e4f-4344-809b-112405970442", + "uuid": "ba35644a-5bb9-4b66-8f53-897cfa5c69d2", "control-id": "ism_o_1558", "description": "No notes for control-id 1558.", "props": [ @@ -11075,7 +11121,7 @@ ] }, { - "uuid": "2db62f6a-05c8-4e82-9625-db216c611918", + "uuid": "18e92bf9-8f8a-46e6-84de-9a1fbc81e70e", "control-id": "ism_o_1559", "description": "No notes for control-id 1559.", "props": [ @@ -11177,7 +11223,7 @@ ] }, { - "uuid": "32aacff8-0e3e-4b4c-b4f9-01c70fa858d2", + "uuid": "23297557-e4af-4ebc-a032-eacd25bb85d5", "control-id": "ism_o_1745", "description": "The description for control-id ism_o_1745.", "props": [ diff --git a/component-definitions/rhel10/rhel10-ism_o-secret/component-definition.json b/component-definitions/rhel10/rhel10-ism_o-secret/component-definition.json index 788c9794..114ce9eb 100644 --- a/component-definitions/rhel10/rhel10-ism_o-secret/component-definition.json +++ b/component-definitions/rhel10/rhel10-ism_o-secret/component-definition.json @@ -3,8 +3,8 @@ "uuid": "673e9d3e-1259-437f-9893-b77522335217", "metadata": { "title": "Component definition for rhel10", - "last-modified": "2025-12-11T18:28:32.667208+00:00", - "version": "1.3", + "last-modified": "2025-12-17T11:16:34.194164+00:00", + "version": "1.4", "oscal-version": "1.1.3" }, "components": [ @@ -167,7 +167,7 @@ { "name": "Parameter_Value_Alternatives_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -317,1975 +317,1987 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_never_disabled", + "value": "package_sequoia-sq_installed", "remarks": "rule_set_007" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled for All dnf Package Repositories", + "value": "Install sequoia-sq Package", "remarks": "rule_set_007" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_local_packages", + "value": "ensure_gpgcheck_never_disabled", "remarks": "rule_set_008" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled for Local Packages", + "value": "Ensure gpgcheck Enabled for All dnf Package Repositories", "remarks": "rule_set_008" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_globally_activated", + "value": "ensure_gpgcheck_local_packages", "remarks": "rule_set_009" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled In Main dnf Configuration", + "value": "Ensure gpgcheck Enabled for Local Packages", "remarks": "rule_set_009" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dnf-automatic_security_updates_only", + "value": "ensure_gpgcheck_globally_activated", "remarks": "rule_set_010" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure dnf-automatic to Install Only Security Updates", + "value": "Ensure gpgcheck Enabled In Main dnf Configuration", "remarks": "rule_set_010" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_no_uid_except_zero", + "value": "dnf-automatic_security_updates_only", "remarks": "rule_set_011" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Only Root Has UID 0", + "value": "Configure dnf-automatic to Install Only Security Updates", "remarks": "rule_set_011" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sudo_remove_nopasswd", + "value": "accounts_no_uid_except_zero", "remarks": "rule_set_012" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD", + "value": "Verify Only Root Has UID 0", "remarks": "rule_set_012" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sudo_remove_no_authenticate", + "value": "sudo_remove_nopasswd", "remarks": "rule_set_013" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo !authenticate", + "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD", "remarks": "rule_set_013" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sudo_require_authentication", + "value": "sudo_remove_no_authenticate", "remarks": "rule_set_014" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo", + "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo !authenticate", "remarks": "rule_set_014" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_fapolicyd_installed", + "value": "sudo_require_authentication", "remarks": "rule_set_015" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install fapolicyd Package", + "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo", "remarks": "rule_set_015" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_fapolicyd_enabled", + "value": "package_fapolicyd_installed", "remarks": "rule_set_016" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable the File Access Policy Service", + "value": "Install fapolicyd Package", "remarks": "rule_set_016" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_crypto_policy", + "value": "service_fapolicyd_enabled", "remarks": "rule_set_017" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure System Cryptography Policy", + "value": "Enable the File Access Policy Service", "remarks": "rule_set_017" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy", + "value": "configure_crypto_policy", "remarks": "rule_set_018" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure SSH to use System Crypto Policy", + "value": "Configure System Cryptography Policy", "remarks": "rule_set_018" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_use_directory_configuration", + "value": "configure_ssh_crypto_policy", "remarks": "rule_set_019" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Distribute the SSH Server configuration to multiple files in a config directory.", + "value": "Configure SSH to use System Crypto Policy", "remarks": "rule_set_019" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_root_login", + "value": "sshd_use_directory_configuration", "remarks": "rule_set_020" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Root Login", + "value": "Distribute the SSH Server configuration to multiple files in a config directory.", "remarks": "rule_set_020" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_gssapi_auth", + "value": "sshd_disable_root_login", "remarks": "rule_set_021" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable GSSAPI Authentication", + "value": "Disable SSH Root Login", "remarks": "rule_set_021" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_print_last_log", + "value": "sshd_disable_gssapi_auth", "remarks": "rule_set_022" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable SSH Print Last Log", + "value": "Disable GSSAPI Authentication", "remarks": "rule_set_022" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_do_not_permit_user_env", + "value": "sshd_print_last_log", "remarks": "rule_set_023" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Do Not Allow SSH Environment Options", + "value": "Enable SSH Print Last Log", "remarks": "rule_set_023" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_rhosts", + "value": "sshd_do_not_permit_user_env", "remarks": "rule_set_024" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Support for .rhosts Files", + "value": "Do Not Allow SSH Environment Options", "remarks": "rule_set_024" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_set_loglevel_info", + "value": "sshd_disable_rhosts", "remarks": "rule_set_025" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set LogLevel to INFO", + "value": "Disable SSH Support for .rhosts Files", "remarks": "rule_set_025" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_empty_passwords", + "value": "sshd_set_loglevel_info", "remarks": "rule_set_026" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Access via Empty Passwords", + "value": "Set LogLevel to INFO", "remarks": "rule_set_026" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_user_known_hosts", + "value": "sshd_disable_empty_passwords", "remarks": "rule_set_027" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Support for User Known Hosts", + "value": "Disable SSH Access via Empty Passwords", "remarks": "rule_set_027" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_enable_strictmodes", + "value": "sshd_disable_user_known_hosts", "remarks": "rule_set_028" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Use of Strict Mode Checking", + "value": "Disable SSH Support for User Known Hosts", "remarks": "rule_set_028" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_rsyslog_installed", + "value": "sshd_enable_strictmodes", "remarks": "rule_set_029" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure rsyslog is Installed", + "value": "Enable Use of Strict Mode Checking", "remarks": "rule_set_029" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_rsyslog_enabled", + "value": "package_rsyslog_installed", "remarks": "rule_set_030" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable rsyslog Service", + "value": "Ensure rsyslog is Installed", "remarks": "rule_set_030" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_auditd_enabled", + "value": "service_rsyslog_enabled", "remarks": "rule_set_031" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable auditd Service", + "value": "Enable rsyslog Service", "remarks": "rule_set_031" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "auditd_data_retention_flush", + "value": "service_auditd_enabled", "remarks": "rule_set_032" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure auditd flush priority", + "value": "Enable auditd Service", "remarks": "rule_set_032" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "auditd_local_events", + "value": "auditd_data_retention_flush", "remarks": "rule_set_033" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Include Local Events in Audit Logs", + "value": "Configure auditd flush priority", "remarks": "rule_set_033" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "auditd_write_logs", + "value": "auditd_local_events", "remarks": "rule_set_034" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Write Audit Logs to the Disk", + "value": "Include Local Events in Audit Logs", "remarks": "rule_set_034" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "auditd_log_format", + "value": "auditd_write_logs", "remarks": "rule_set_035" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Resolve information before writing to audit logs", + "value": "Write Audit Logs to the Disk", "remarks": "rule_set_035" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "auditd_freq", + "value": "auditd_log_format", "remarks": "rule_set_036" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set number of records to cause an explicit flush to audit logs", + "value": "Resolve information before writing to audit logs", "remarks": "rule_set_036" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "auditd_name_format", + "value": "auditd_freq", "remarks": "rule_set_037" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set type of computer node name logging in audit logs", + "value": "Set number of records to cause an explicit flush to audit logs", "remarks": "rule_set_037" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_login_events_faillock", + "value": "auditd_name_format", "remarks": "rule_set_038" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Logon and Logout Events - faillock", + "value": "Set type of computer node name logging in audit logs", "remarks": "rule_set_038" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_time_adjtimex", + "value": "audit_rules_login_events_faillock", "remarks": "rule_set_039" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record attempts to alter time through adjtimex", + "value": "Record Attempts to Alter Logon and Logout Events - faillock", "remarks": "rule_set_039" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_time_clock_settime", + "value": "audit_rules_time_adjtimex", "remarks": "rule_set_040" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Time Through clock_settime", + "value": "Record attempts to alter time through adjtimex", "remarks": "rule_set_040" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_time_watch_localtime", + "value": "audit_rules_time_clock_settime", "remarks": "rule_set_041" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter the localtime File", + "value": "Record Attempts to Alter Time Through clock_settime", "remarks": "rule_set_041" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_time_settimeofday", + "value": "audit_rules_time_watch_localtime", "remarks": "rule_set_042" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record attempts to alter time through settimeofday", + "value": "Record Attempts to Alter the localtime File", "remarks": "rule_set_042" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_time_stime", + "value": "audit_rules_time_settimeofday", "remarks": "rule_set_043" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Time Through stime", + "value": "Record attempts to alter time through settimeofday", "remarks": "rule_set_043" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_execution_restorecon", + "value": "audit_rules_time_stime", "remarks": "rule_set_044" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Any Attempts to Run restorecon", + "value": "Record Attempts to Alter Time Through stime", "remarks": "rule_set_044" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_execution_chcon", + "value": "audit_rules_execution_restorecon", "remarks": "rule_set_045" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Any Attempts to Run chcon", + "value": "Record Any Attempts to Run restorecon", "remarks": "rule_set_045" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_execution_semanage", + "value": "audit_rules_execution_chcon", "remarks": "rule_set_046" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Any Attempts to Run semanage", + "value": "Record Any Attempts to Run chcon", "remarks": "rule_set_046" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_execution_setsebool", + "value": "audit_rules_execution_semanage", "remarks": "rule_set_047" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Any Attempts to Run setsebool", + "value": "Record Any Attempts to Run semanage", "remarks": "rule_set_047" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_execution_setfiles", + "value": "audit_rules_execution_setsebool", "remarks": "rule_set_048" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Any Attempts to Run setfiles", + "value": "Record Any Attempts to Run setsebool", "remarks": "rule_set_048" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_execution_seunshare", + "value": "audit_rules_execution_setfiles", "remarks": "rule_set_049" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Any Attempts to Run seunshare", + "value": "Record Any Attempts to Run setfiles", "remarks": "rule_set_049" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_sysadmin_actions", + "value": "audit_rules_execution_seunshare", "remarks": "rule_set_050" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure auditd Collects System Administrator Actions", + "value": "Record Any Attempts to Run seunshare", "remarks": "rule_set_050" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_networkconfig_modification", + "value": "audit_rules_sysadmin_actions", "remarks": "rule_set_051" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Network Environment", + "value": "Ensure auditd Collects System Administrator Actions", "remarks": "rule_set_051" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_usergroup_modification_group", + "value": "audit_rules_networkconfig_modification", "remarks": "rule_set_052" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify User/Group Information - /etc/group", + "value": "Record Events that Modify the System's Network Environment", "remarks": "rule_set_052" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_usergroup_modification_gshadow", + "value": "audit_rules_usergroup_modification_group", "remarks": "rule_set_053" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify User/Group Information - /etc/gshadow", + "value": "Record Events that Modify User/Group Information - /etc/group", "remarks": "rule_set_053" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_usergroup_modification_opasswd", + "value": "audit_rules_usergroup_modification_gshadow", "remarks": "rule_set_054" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", + "value": "Record Events that Modify User/Group Information - /etc/gshadow", "remarks": "rule_set_054" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_usergroup_modification_passwd", + "value": "audit_rules_usergroup_modification_opasswd", "remarks": "rule_set_055" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify User/Group Information - /etc/passwd", + "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", "remarks": "rule_set_055" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_usergroup_modification_shadow", + "value": "audit_rules_usergroup_modification_passwd", "remarks": "rule_set_056" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify User/Group Information - /etc/shadow", + "value": "Record Events that Modify User/Group Information - /etc/passwd", "remarks": "rule_set_056" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_dac_modification_chmod", + "value": "audit_rules_usergroup_modification_shadow", "remarks": "rule_set_057" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", + "value": "Record Events that Modify User/Group Information - /etc/shadow", "remarks": "rule_set_057" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_dac_modification_chown", + "value": "audit_rules_dac_modification_chmod", "remarks": "rule_set_058" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Discretionary Access Controls - chown", + "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", "remarks": "rule_set_058" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_kernel_module_loading", + "value": "audit_rules_dac_modification_chown", "remarks": "rule_set_059" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading", + "value": "Record Events that Modify the System's Discretionary Access Controls - chown", "remarks": "rule_set_059" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_randomize_va_space", + "value": "audit_rules_kernel_module_loading", "remarks": "rule_set_060" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Randomized Layout of Virtual Address Space", + "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading", "remarks": "rule_set_060" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_exec_shield", + "value": "sysctl_kernel_randomize_va_space", "remarks": "rule_set_061" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable ExecShield via sysctl", + "value": "Enable Randomized Layout of Virtual Address Space", "remarks": "rule_set_061" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_kptr_restrict", + "value": "sysctl_kernel_exec_shield", "remarks": "rule_set_062" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict Exposed Kernel Pointer Addresses Access", + "value": "Enable ExecShield via sysctl", "remarks": "rule_set_062" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_dmesg_restrict", + "value": "sysctl_kernel_kptr_restrict", "remarks": "rule_set_063" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict Access to Kernel Message Buffer", + "value": "Restrict Exposed Kernel Pointer Addresses Access", "remarks": "rule_set_063" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_kexec_load_disabled", + "value": "sysctl_kernel_dmesg_restrict", "remarks": "rule_set_064" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Image Loading", + "value": "Restrict Access to Kernel Message Buffer", "remarks": "rule_set_064" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_yama_ptrace_scope", + "value": "sysctl_kernel_kexec_load_disabled", "remarks": "rule_set_065" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict usage of ptrace to descendant processes", + "value": "Disable Kernel Image Loading", "remarks": "rule_set_065" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_unprivileged_bpf_disabled", + "value": "sysctl_kernel_yama_ptrace_scope", "remarks": "rule_set_066" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Access to Network bpf() Syscall From Unprivileged Processes", + "value": "Restrict usage of ptrace to descendant processes", "remarks": "rule_set_066" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_core_bpf_jit_harden", + "value": "sysctl_kernel_unprivileged_bpf_disabled", "remarks": "rule_set_067" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Harden the operation of the BPF just-in-time compiler", + "value": "Disable Access to Network bpf() Syscall From Unprivileged Processes", "remarks": "rule_set_067" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "selinux_state", + "value": "sysctl_net_core_bpf_jit_harden", "remarks": "rule_set_068" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure SELinux State is Enforcing", + "value": "Harden the operation of the BPF just-in-time compiler", "remarks": "rule_set_068" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "selinux_policytype", + "value": "selinux_state", "remarks": "rule_set_069" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure SELinux Policy", + "value": "Ensure SELinux State is Enforcing", "remarks": "rule_set_069" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_unauthorized_sgid", + "value": "selinux_policytype", "remarks": "rule_set_070" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All SGID Executables Are Authorized", + "value": "Configure SELinux Policy", "remarks": "rule_set_070" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_unauthorized_suid", + "value": "file_permissions_unauthorized_sgid", "remarks": "rule_set_071" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All SUID Executables Are Authorized", + "value": "Ensure All SGID Executables Are Authorized", "remarks": "rule_set_071" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_unauthorized_world_writable", + "value": "file_permissions_unauthorized_suid", "remarks": "rule_set_072" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure No World-Writable Files Exist", + "value": "Ensure All SUID Executables Are Authorized", "remarks": "rule_set_072" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dir_perms_world_writable_sticky_bits", + "value": "file_permissions_unauthorized_world_writable", "remarks": "rule_set_073" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify that All World-Writable Directories Have Sticky Bits Set", + "value": "Ensure No World-Writable Files Exist", "remarks": "rule_set_073" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_library_dirs", + "value": "dir_perms_world_writable_sticky_bits", "remarks": "rule_set_074" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify that Shared Library Files Have Restrictive Permissions", + "value": "Verify that All World-Writable Directories Have Sticky Bits Set", "remarks": "rule_set_074" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_ownership_binary_dirs", + "value": "file_permissions_library_dirs", "remarks": "rule_set_075" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify that System Executables Have Root Ownership", + "value": "Verify that Shared Library Files Have Restrictive Permissions", "remarks": "rule_set_075" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_binary_dirs", + "value": "file_ownership_binary_dirs", "remarks": "rule_set_076" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify that System Executables Have Restrictive Permissions", + "value": "Verify that System Executables Have Root Ownership", "remarks": "rule_set_076" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_ownership_library_dirs", + "value": "file_permissions_binary_dirs", "remarks": "rule_set_077" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify that Shared Library Files Have Root Ownership", + "value": "Verify that System Executables Have Restrictive Permissions", "remarks": "rule_set_077" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_empty_passwords", + "value": "file_ownership_library_dirs", "remarks": "rule_set_078" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Prevent Login to Accounts With Empty Password", + "value": "Verify that Shared Library Files Have Root Ownership", "remarks": "rule_set_078" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_dev_shm_nodev", + "value": "no_empty_passwords", "remarks": "rule_set_079" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add nodev Option to /dev/shm", + "value": "Prevent Login to Accounts With Empty Password", "remarks": "rule_set_079" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_dev_shm_nosuid", + "value": "mount_option_dev_shm_nodev", "remarks": "rule_set_080" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add nosuid Option to /dev/shm", + "value": "Add nodev Option to /dev/shm", "remarks": "rule_set_080" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_dev_shm_noexec", + "value": "mount_option_dev_shm_nosuid", "remarks": "rule_set_081" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add noexec Option to /dev/shm", + "value": "Add nosuid Option to /dev/shm", "remarks": "rule_set_081" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_firewalld_installed", + "value": "mount_option_dev_shm_noexec", "remarks": "rule_set_082" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install firewalld Package", + "value": "Add noexec Option to /dev/shm", "remarks": "rule_set_082" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_firewalld_enabled", + "value": "package_firewalld_installed", "remarks": "rule_set_083" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify firewalld Enabled", + "value": "Install firewalld Package", "remarks": "rule_set_083" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "network_sniffer_disabled", + "value": "service_firewalld_enabled", "remarks": "rule_set_084" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure System is Not Acting as a Network Sniffer", + "value": "Verify firewalld Enabled", "remarks": "rule_set_084" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_maximum_age_login_defs", + "value": "network_sniffer_disabled", "remarks": "rule_set_085" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Maximum Age", + "value": "Ensure System is Not Acting as a Network Sniffer", "remarks": "rule_set_085" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_minimum_age_login_defs", + "value": "accounts_maximum_age_login_defs", "remarks": "rule_set_086" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Minimum Age", + "value": "Set Password Maximum Age", "remarks": "rule_set_086" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_warn_age_login_defs", + "value": "accounts_minimum_age_login_defs", "remarks": "rule_set_087" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Warning Age", + "value": "Set Password Minimum Age", "remarks": "rule_set_087" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_kerberos_crypto_policy", + "value": "accounts_password_warn_age_login_defs", "remarks": "rule_set_088" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Kerberos to use System Crypto Policy", + "value": "Set Password Warning Age", "remarks": "rule_set_088" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "enable_ldap_client", + "value": "configure_kerberos_crypto_policy", "remarks": "rule_set_089" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable the LDAP Client For Use in Authconfig", + "value": "Configure Kerberos to use System Crypto Policy", "remarks": "rule_set_089" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "kerberos_disable_no_keytab", + "value": "enable_ldap_client", "remarks": "rule_set_090" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kerberos by removing host keytab", + "value": "Enable the LDAP Client For Use in Authconfig", "remarks": "rule_set_090" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "network_nmcli_permissions", + "value": "kerberos_disable_no_keytab", "remarks": "rule_set_091" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Prevent non-Privileged Users from Modifying Network Interfaces using nmcli", + "value": "Disable Kerberos by removing host keytab", "remarks": "rule_set_091" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sebool_kerberos_enabled", + "value": "network_nmcli_permissions", "remarks": "rule_set_092" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable the kerberos_enabled SELinux Boolean", + "value": "Prevent non-Privileged Users from Modifying Network Interfaces using nmcli", "remarks": "rule_set_092" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_libuserconf", + "value": "sebool_kerberos_enabled", "remarks": "rule_set_093" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Hashing Algorithm in /etc/libuser.conf", + "value": "Enable the kerberos_enabled SELinux Boolean", "remarks": "rule_set_093" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_logindefs", + "value": "set_password_hashing_algorithm_libuserconf", "remarks": "rule_set_094" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Hashing Algorithm in /etc/login.defs", + "value": "Set Password Hashing Algorithm in /etc/libuser.conf", "remarks": "rule_set_094" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_passwordauth", + "value": "set_password_hashing_algorithm_logindefs", "remarks": "rule_set_095" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set PAM Password Hashing Algorithm - password-auth", + "value": "Set Password Hashing Algorithm in /etc/login.defs", "remarks": "rule_set_095" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_systemauth", + "value": "set_password_hashing_algorithm_passwordauth", "remarks": "rule_set_096" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set PAM Password Hashing Algorithm - system-auth", + "value": "Set PAM Password Hashing Algorithm - password-auth", "remarks": "rule_set_096" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_minlen_login_defs", + "value": "set_password_hashing_algorithm_systemauth", "remarks": "rule_set_097" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Minimum Length in login.defs", + "value": "Set PAM Password Hashing Algorithm - system-auth", "remarks": "rule_set_097" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_dcredit", + "value": "accounts_password_minlen_login_defs", "remarks": "rule_set_098" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure PAM Enforces Password Requirements - Minimum Digit Characters", + "value": "Set Password Minimum Length in login.defs", "remarks": "rule_set_098" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_lcredit", + "value": "accounts_password_pam_dcredit", "remarks": "rule_set_099" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure PAM Enforces Password Requirements - Minimum Lowercase Characters", + "value": "Ensure PAM Enforces Password Requirements - Minimum Digit Characters", "remarks": "rule_set_099" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_minclass", + "value": "accounts_password_pam_lcredit", "remarks": "rule_set_100" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", + "value": "Ensure PAM Enforces Password Requirements - Minimum Lowercase Characters", "remarks": "rule_set_100" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_minlen", + "value": "accounts_password_pam_minclass", "remarks": "rule_set_101" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure PAM Enforces Password Requirements - Minimum Length", + "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", "remarks": "rule_set_101" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_ocredit", + "value": "accounts_password_pam_minlen", "remarks": "rule_set_102" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure PAM Enforces Password Requirements - Minimum Special Characters", + "value": "Ensure PAM Enforces Password Requirements - Minimum Length", "remarks": "rule_set_102" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_ucredit", + "value": "accounts_password_pam_ocredit", "remarks": "rule_set_103" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure PAM Enforces Password Requirements - Minimum Uppercase Characters", + "value": "Ensure PAM Enforces Password Requirements - Minimum Special Characters", "remarks": "rule_set_103" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_passwords_pam_faillock_deny", + "value": "accounts_password_pam_ucredit", "remarks": "rule_set_104" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Lock Accounts After Failed Password Attempts", + "value": "Ensure PAM Enforces Password Requirements - Minimum Uppercase Characters", "remarks": "rule_set_104" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_passwords_pam_faillock_deny_root", + "value": "accounts_passwords_pam_faillock_deny", "remarks": "rule_set_105" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure the root Account for Failed Password Attempts", + "value": "Lock Accounts After Failed Password Attempts", "remarks": "rule_set_105" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_passwords_pam_faillock_interval", + "value": "accounts_passwords_pam_faillock_deny_root", "remarks": "rule_set_106" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Interval For Counting Failed Password Attempts", + "value": "Configure the root Account for Failed Password Attempts", "remarks": "rule_set_106" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_passwords_pam_faillock_unlock_time", + "value": "accounts_passwords_pam_faillock_interval", "remarks": "rule_set_107" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Lockout Time for Failed Password Attempts", + "value": "Set Interval For Counting Failed Password Attempts", "remarks": "rule_set_107" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "disable_host_auth", + "value": "accounts_passwords_pam_faillock_unlock_time", "remarks": "rule_set_108" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Host-Based Authentication", + "value": "Set Lockout Time for Failed Password Attempts", "remarks": "rule_set_108" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "require_emergency_target_auth", + "value": "disable_host_auth", "remarks": "rule_set_109" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Require Authentication for Emergency Systemd Target", + "value": "Disable Host-Based Authentication", "remarks": "rule_set_109" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sebool_authlogin_nsswitch_use_ldap", + "value": "require_emergency_target_auth", "remarks": "rule_set_110" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable the authlogin_nsswitch_use_ldap SELinux Boolean", + "value": "Require Authentication for Emergency Systemd Target", "remarks": "rule_set_110" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sebool_authlogin_radius", + "value": "sebool_authlogin_nsswitch_use_ldap", "remarks": "rule_set_111" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable the authlogin_radius SELinux Boolean", + "value": "Disable the authlogin_nsswitch_use_ldap SELinux Boolean", "remarks": "rule_set_111" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_kerb_auth", + "value": "sebool_authlogin_radius", "remarks": "rule_set_112" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kerberos Authentication", + "value": "Disable the authlogin_radius SELinux Boolean", "remarks": "rule_set_112" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_set_max_auth_tries", + "value": "sshd_disable_kerb_auth", "remarks": "rule_set_113" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set SSH authentication attempt limit", + "value": "Disable Kerberos Authentication", "remarks": "rule_set_113" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sssd_enable_smartcards", + "value": "sshd_set_max_auth_tries", "remarks": "rule_set_114" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Smartcards in SSSD", + "value": "Set SSH authentication attempt limit", "remarks": "rule_set_114" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_enable_warning_banner", + "value": "sssd_enable_smartcards", "remarks": "rule_set_115" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable SSH Warning Banner", + "value": "Enable Smartcards in SSSD", "remarks": "rule_set_115" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_x11_forwarding", + "value": "sshd_enable_warning_banner", "remarks": "rule_set_116" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable X11 Forwarding", + "value": "Enable SSH Warning Banner", "remarks": "rule_set_116" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_access_failed", + "value": "sshd_disable_x11_forwarding", "remarks": "rule_set_117" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure auditing of unsuccessful file accesses", + "value": "Disable X11 Forwarding", "remarks": "rule_set_117" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_access_failed_aarch64", + "value": "audit_access_failed", "remarks": "rule_set_118" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure auditing of unsuccessful file accesses (AArch64)", + "value": "Configure auditing of unsuccessful file accesses", "remarks": "rule_set_118" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_access_failed_ppc64le", + "value": "audit_access_failed_aarch64", "remarks": "rule_set_119" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure auditing of unsuccessful file accesses (ppc64le)", + "value": "Configure auditing of unsuccessful file accesses (AArch64)", "remarks": "rule_set_119" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_access_success", + "value": "audit_access_failed_ppc64le", "remarks": "rule_set_120" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure auditing of successful file accesses", + "value": "Configure auditing of unsuccessful file accesses (ppc64le)", "remarks": "rule_set_120" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_access_success_aarch64", + "value": "audit_access_success", "remarks": "rule_set_121" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure auditing of successful file accesses (AArch64)", + "value": "Configure auditing of successful file accesses", "remarks": "rule_set_121" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_access_success_ppc64le", + "value": "audit_access_success_aarch64", "remarks": "rule_set_122" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure auditing of successful file accesses (ppc64le)", + "value": "Configure auditing of successful file accesses (AArch64)", "remarks": "rule_set_122" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_privileged_commands", + "value": "audit_access_success_ppc64le", "remarks": "rule_set_123" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure auditd Collects Information on the Use of Privileged Commands", + "value": "Configure auditing of successful file accesses (ppc64le)", "remarks": "rule_set_123" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_session_events_utmp", + "value": "audit_rules_privileged_commands", "remarks": "rule_set_124" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Process and Session Initiation Information utmp", + "value": "Ensure auditd Collects Information on the Use of Privileged Commands", "remarks": "rule_set_124" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_session_events_btmp", + "value": "audit_rules_session_events_utmp", "remarks": "rule_set_125" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Process and Session Initiation Information btmp", + "value": "Record Attempts to Alter Process and Session Initiation Information utmp", "remarks": "rule_set_125" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_session_events_wtmp", + "value": "audit_rules_session_events_btmp", "remarks": "rule_set_126" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", + "value": "Record Attempts to Alter Process and Session Initiation Information btmp", "remarks": "rule_set_126" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_unsuccessful_file_modification_creat", + "value": "audit_rules_session_events_wtmp", "remarks": "rule_set_127" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Unsuccessful Access Attempts to Files - creat", + "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", "remarks": "rule_set_127" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_unsuccessful_file_modification_open", + "value": "audit_rules_unsuccessful_file_modification_creat", "remarks": "rule_set_128" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Unsuccessful Access Attempts to Files - open", + "value": "Record Unsuccessful Access Attempts to Files - creat", "remarks": "rule_set_128" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_unsuccessful_file_modification_openat", + "value": "audit_rules_unsuccessful_file_modification_open", "remarks": "rule_set_129" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Unsuccessful Access Attempts to Files - openat", + "value": "Record Unsuccessful Access Attempts to Files - open", "remarks": "rule_set_129" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_unsuccessful_file_modification_open_by_handle_at", + "value": "audit_rules_unsuccessful_file_modification_openat", "remarks": "rule_set_130" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Unsuccessful Access Attempts to Files - open_by_handle_at", + "value": "Record Unsuccessful Access Attempts to Files - openat", "remarks": "rule_set_130" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_unsuccessful_file_modification_truncate", + "value": "audit_rules_unsuccessful_file_modification_open_by_handle_at", "remarks": "rule_set_131" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Unsuccessful Access Attempts to Files - truncate", + "value": "Record Unsuccessful Access Attempts to Files - open_by_handle_at", "remarks": "rule_set_131" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_unsuccessful_file_modification_ftruncate", + "value": "audit_rules_unsuccessful_file_modification_truncate", "remarks": "rule_set_132" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Unsuccessful Access Attempts to Files - ftruncate", + "value": "Record Unsuccessful Access Attempts to Files - truncate", "remarks": "rule_set_132" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_audit_installed", + "value": "audit_rules_unsuccessful_file_modification_ftruncate", "remarks": "rule_set_133" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the audit Subsystem is Installed", + "value": "Record Unsuccessful Access Attempts to Files - ftruncate", "remarks": "rule_set_133" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sebool_auditadm_exec_content", + "value": "package_audit_installed", "remarks": "rule_set_134" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable the auditadm_exec_content SELinux Boolean", + "value": "Ensure the audit Subsystem is Installed", "remarks": "rule_set_134" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "chronyd_configure_pool_and_server", + "value": "sebool_auditadm_exec_content", "remarks": "rule_set_135" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Chrony Configure Pool and Server", + "value": "Enable the auditadm_exec_content SELinux Boolean", "remarks": "rule_set_135" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "chronyd_or_ntpd_specify_multiple_servers", + "value": "chronyd_configure_pool_and_server", "remarks": "rule_set_136" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Specify Additional Remote NTP Servers", + "value": "Chrony Configure Pool and Server", "remarks": "rule_set_136" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "chronyd_specify_remote_server", + "value": "chronyd_or_ntpd_specify_multiple_servers", "remarks": "rule_set_137" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "A remote time server for Chrony is configured", + "value": "Specify Additional Remote NTP Servers", "remarks": "rule_set_137" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_chrony_installed", + "value": "chronyd_specify_remote_server", "remarks": "rule_set_138" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The Chrony package is installed", + "value": "A remote time server for Chrony is configured", "remarks": "rule_set_138" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_cron_logging", + "value": "package_chrony_installed", "remarks": "rule_set_139" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure cron Is Logging To Rsyslog", + "value": "The Chrony package is installed", "remarks": "rule_set_139" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_groupownership", + "value": "rsyslog_cron_logging", "remarks": "rule_set_140" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Log Files Are Owned By Appropriate Group", + "value": "Ensure cron Is Logging To Rsyslog", "remarks": "rule_set_140" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_ownership", + "value": "rsyslog_files_groupownership", "remarks": "rule_set_141" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Log Files Are Owned By Appropriate User", + "value": "Ensure Log Files Are Owned By Appropriate Group", "remarks": "rule_set_141" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_permissions", + "value": "rsyslog_files_ownership", "remarks": "rule_set_142" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure System Log Files Have Correct Permissions", + "value": "Ensure Log Files Are Owned By Appropriate User", "remarks": "rule_set_142" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_nolisten", + "value": "rsyslog_files_permissions", "remarks": "rule_set_143" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure rsyslog Does Not Accept Remote Messages Unless Acting As Log Server", + "value": "Ensure System Log Files Have Correct Permissions", "remarks": "rule_set_143" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_remote_loghost", + "value": "rsyslog_nolisten", "remarks": "rule_set_144" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Logs Sent To Remote Host", + "value": "Ensure rsyslog Does Not Accept Remote Messages Unless Acting As Log Server", "remarks": "rule_set_144" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_remote_tls", + "value": "rsyslog_remote_loghost", "remarks": "rule_set_145" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure TLS for rsyslog remote logging", + "value": "Ensure Logs Sent To Remote Host", "remarks": "rule_set_145" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_remote_tls_cacert", + "value": "rsyslog_remote_tls", "remarks": "rule_set_146" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure CA certificate for rsyslog remote logging", + "value": "Configure TLS for rsyslog remote logging", "remarks": "rule_set_146" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_chronyd_enabled", + "value": "rsyslog_remote_tls_cacert", "remarks": "rule_set_147" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The Chronyd service is enabled", + "value": "Configure CA certificate for rsyslog remote logging", "remarks": "rule_set_147" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_aide_installed", + "value": "service_chronyd_enabled", "remarks": "rule_set_148" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install AIDE", + "value": "The Chronyd service is enabled", "remarks": "rule_set_148" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_snmpd_disabled", + "value": "package_aide_installed", "remarks": "rule_set_149" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable snmpd Service", + "value": "Install AIDE", "remarks": "rule_set_149" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "snmpd_use_newer_protocol", + "value": "service_snmpd_disabled", "remarks": "rule_set_150" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure SNMP Service to Use Only SNMPv3 or Newer", + "value": "Disable snmpd Service", "remarks": "rule_set_150" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "network_ipv6_static_address", + "value": "snmpd_use_newer_protocol", "remarks": "rule_set_151" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Manually Assign Global IPv6 Address", + "value": "Configure SNMP Service to Use Only SNMPv3 or Newer", "remarks": "rule_set_151" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "wireless_disable_interfaces", + "value": "network_ipv6_static_address", "remarks": "rule_set_152" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Deactivate Wireless Network Interfaces", + "value": "Manually Assign Global IPv6 Address", "remarks": "rule_set_152" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_opensc_card_drivers", + "value": "wireless_disable_interfaces", "remarks": "rule_set_153" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure opensc Smart Card Drivers", + "value": "Deactivate Wireless Network Interfaces", "remarks": "rule_set_153" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_opensc_installed", + "value": "configure_opensc_card_drivers", "remarks": "rule_set_154" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install the opensc Package For Multifactor Authentication", + "value": "Configure opensc Smart Card Drivers", "remarks": "rule_set_154" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_pcsc-lite_installed", + "value": "package_opensc_installed", "remarks": "rule_set_155" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install the pcsc-lite package", + "value": "Install the opensc Package For Multifactor Authentication", "remarks": "rule_set_155" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_pcsc-lite-ccid_installed", + "value": "package_pcsc-lite_installed", "remarks": "rule_set_156" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install the pcsc-lite-ccid package", + "value": "Install the pcsc-lite package", "remarks": "rule_set_156" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_sudo_installed", + "value": "package_pcsc-lite-ccid_installed", "remarks": "rule_set_157" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install sudo Package", + "value": "Install the pcsc-lite-ccid package", "remarks": "rule_set_157" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_pcscd_enabled", + "value": "package_sudo_installed", "remarks": "rule_set_158" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable the pcscd Service", + "value": "Install sudo Package", "remarks": "rule_set_158" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_firewalld_ports", + "value": "service_pcscd_enabled", "remarks": "rule_set_159" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure the Firewalld Ports", + "value": "Enable the pcscd Service", "remarks": "rule_set_159" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_firewalld_default_zone", + "value": "configure_firewalld_ports", "remarks": "rule_set_160" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Default firewalld Zone for Incoming Packets", + "value": "Configure the Firewalld Ports", "remarks": "rule_set_160" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_usbguard_installed", + "value": "set_firewalld_default_zone", "remarks": "rule_set_161" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install usbguard Package", + "value": "Set Default firewalld Zone for Incoming Packets", "remarks": "rule_set_161" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_usbguard_enabled", + "value": "package_usbguard_installed", "remarks": "rule_set_162" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable the USBGuard Service", + "value": "Install usbguard Package", "remarks": "rule_set_162" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "system_booted_in_fips_mode", + "value": "service_usbguard_enabled", "remarks": "rule_set_163" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify that the system was booted with fips=1", + "value": "Enable the USBGuard Service", "remarks": "rule_set_163" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "enable_fips_mode", + "value": "system_booted_in_fips_mode", "remarks": "rule_set_164" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable FIPS Mode", + "value": "Verify that the system was booted with fips=1", "remarks": "rule_set_164" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_sshd_private_key", + "value": "enable_fips_mode", "remarks": "rule_set_165" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on SSH Server Private *_key Key Files", + "value": "Enable FIPS Mode", "remarks": "rule_set_165" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dnf-automatic_apply_updates", + "value": "file_permissions_sshd_private_key", "remarks": "rule_set_166" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure dnf-automatic to Install Available Updates Automatically", + "value": "Verify Permissions on SSH Server Private *_key Key Files", "remarks": "rule_set_166" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_libdnf-plugin-subscription-manager_installed", + "value": "dnf-automatic_apply_updates", "remarks": "rule_set_167" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install libdnf-plugin-subscription-manager Package", + "value": "Configure dnf-automatic to Install Available Updates Automatically", "remarks": "rule_set_167" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_subscription-manager_installed", + "value": "package_libdnf-plugin-subscription-manager_installed", "remarks": "rule_set_168" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install subscription-manager Package", + "value": "Install libdnf-plugin-subscription-manager Package", "remarks": "rule_set_168" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_shelllogin_for_systemaccounts", + "value": "package_subscription-manager_installed", "remarks": "rule_set_169" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", + "value": "Install subscription-manager Package", "remarks": "rule_set_169" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "secure_boot_enabled", + "value": "no_shelllogin_for_systemaccounts", "remarks": "rule_set_170" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that Secure Boot is enabled", + "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", "remarks": "rule_set_170" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "secure_boot_enabled", + "remarks": "rule_set_171" + }, + { + "name": "Rule_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Ensure that Secure Boot is enabled", + "remarks": "rule_set_171" } ], "control-implementations": [ { - "uuid": "96ceb215-2935-446a-8845-fcab221161b1", + "uuid": "b893b83b-fa59-433a-bfff-d53213fc1011", "source": "trestle://profiles/rhel10-ism_o-secret/profile.json", "description": "Control implementation for ism_o_secret", "props": [ @@ -2371,7 +2383,7 @@ ], "implemented-requirements": [ { - "uuid": "077aebb4-b272-4175-a5bd-b35d68d3a683", + "uuid": "d396ab24-69e8-45f8-a926-f94717d71b08", "control-id": "ism_o_1557", "description": "No notes for control-id 1557.", "props": [ @@ -2473,7 +2485,7 @@ ] }, { - "uuid": "e8fb38d3-0789-4c60-a135-0d85f1b6033a", + "uuid": "cae2bd58-4a60-45d4-b59d-5b5027272a6c", "control-id": "ism_o_1560", "description": "No notes for control-id 1560.", "props": [ @@ -2575,7 +2587,7 @@ ] }, { - "uuid": "3fc6ad39-3212-4d06-89e7-43e8aeb31757", + "uuid": "b447c6cd-9e88-4302-a9f5-14ba6addcb5c", "control-id": "ism_o_0418", "description": "No notes for control-id 0418.", "props": [ @@ -2657,7 +2669,7 @@ ] }, { - "uuid": "618f960c-1f06-44c4-a451-8f0cbe5a3afd", + "uuid": "6aa74d53-35f8-40b3-b1e8-3b85ec7b6190", "control-id": "ism_o_0421", "description": "No notes for control-id 0421.", "props": [ @@ -2759,7 +2771,7 @@ ] }, { - "uuid": "8b1b61d9-72c0-4035-8a56-b339911f5fa6", + "uuid": "52210269-1914-47c1-af8e-4520142c1e3e", "control-id": "ism_o_0484", "description": "No notes for control-id 0484.", "props": [ @@ -2786,7 +2798,7 @@ ] }, { - "uuid": "e1939a5d-9b22-451e-894e-7b98686f8c79", + "uuid": "21eca22f-cc50-42df-8be8-67e9f0ac140b", "control-id": "ism_o_0487", "description": "The description for control-id ism_o_0487.", "props": [ @@ -2799,7 +2811,7 @@ ] }, { - "uuid": "ced72096-f253-4585-9032-690585437bf5", + "uuid": "fae4510b-7b27-4583-a286-c159a28165ac", "control-id": "ism_o_0582", "description": "No notes for control-id 0582.", "props": [ @@ -3051,7 +3063,7 @@ ] }, { - "uuid": "bfef4c50-8e4e-4a46-9dc6-b0707c9b640c", + "uuid": "a1c1597a-c548-4557-a0f1-55aaed034a23", "control-id": "ism_o_0846", "description": "No notes for control-id 0846.", "props": [ @@ -3158,7 +3170,7 @@ ] }, { - "uuid": "1e23399a-afa1-4059-ab24-d0be2a45de65", + "uuid": "edc5ba20-6ecf-4e59-aafc-04b9d362ed52", "control-id": "ism_o_0974", "description": "This needs reevaluation.", "props": [ @@ -3260,7 +3272,7 @@ ] }, { - "uuid": "9609c185-478b-42c6-92a2-b6a560700e89", + "uuid": "117d1024-3c05-4749-b48b-e4606b65b038", "control-id": "ism_o_0988", "description": "No notes for control-id 0988.", "props": [ @@ -3337,7 +3349,7 @@ ] }, { - "uuid": "b33d1389-2d5b-4361-9273-14dcbf87eb4f", + "uuid": "60a48852-0800-4eaa-8cc3-25b46179693f", "control-id": "ism_o_1034", "description": "No notes for control-id 1034.", "props": [ @@ -3354,7 +3366,7 @@ ] }, { - "uuid": "a9bae2f1-74d2-4daf-b7cc-d710fcdb98eb", + "uuid": "4ce592fe-24ab-4b5b-894c-4656d2059e6e", "control-id": "ism_o_1055", "description": "Needs reevaluation", "props": [ @@ -3431,7 +3443,7 @@ ] }, { - "uuid": "643cf6ee-6068-458a-af0f-b10862336dfc", + "uuid": "cb1010d1-6b25-45fe-8537-9420528f58f6", "control-id": "ism_o_1173", "description": "No notes for control-id 1173.", "props": [ @@ -3533,7 +3545,7 @@ ] }, { - "uuid": "48f7c242-a642-496a-87c4-a4d28e716243", + "uuid": "7a081f3d-040e-4af6-b93a-b70da5023bb5", "control-id": "ism_o_1277", "description": "No notes for control-id 1277.", "props": [ @@ -3545,7 +3557,7 @@ ] }, { - "uuid": "7a4f0fd4-7314-4748-8692-b6309f83efc4", + "uuid": "85b8c02e-e5f3-435a-a430-a7e72ac41492", "control-id": "ism_o_1288", "description": "No notes for control-id 1288.", "props": [ @@ -3562,7 +3574,7 @@ ] }, { - "uuid": "a2460a0a-1e22-4aa3-9a7d-ce28853da86b", + "uuid": "b978c830-3aec-4934-b6d3-9427e440c8e9", "control-id": "ism_o_1311", "description": "No notes for control-id 1311.", "props": [ @@ -3584,7 +3596,7 @@ ] }, { - "uuid": "b9c7f02a-8f39-4463-8b01-d78e43c185c6", + "uuid": "8ca51075-518b-43bc-af6c-f2a98b36cf51", "control-id": "ism_o_1315", "description": "No notes for control-id 1315.", "props": [ @@ -3606,7 +3618,7 @@ ] }, { - "uuid": "77a64d20-2751-4194-bf52-852ff13a2b1c", + "uuid": "75c6bcae-11a7-4867-af4a-67bf556030bf", "control-id": "ism_o_1319", "description": "No notes for control-id 1319.", "props": [ @@ -3628,7 +3640,7 @@ ] }, { - "uuid": "13588608-3ab7-4843-a651-b954199303ee", + "uuid": "710dd605-e0af-46a4-b076-f9f3fb435b38", "control-id": "ism_o_1341", "description": "No notes for control-id 1341.", "props": [ @@ -3645,7 +3657,7 @@ ] }, { - "uuid": "dafeb8c8-34f7-492f-99e7-6a7df5146ff8", + "uuid": "26134ae8-0ef1-4e9d-a189-0d1208beef7a", "control-id": "ism_o_1386", "description": "This needs reevaluation.", "props": [ @@ -3687,7 +3699,7 @@ ] }, { - "uuid": "f047657c-f99a-4f1a-a3c4-efda37352d1a", + "uuid": "708b7a4c-fb19-4024-8799-57b4f94b39b0", "control-id": "ism_o_1401", "description": "No notes for control-id 1401.", "props": [ @@ -3789,7 +3801,7 @@ ] }, { - "uuid": "b06df663-7c8f-4e60-b892-9bfcd4eb06b2", + "uuid": "00537b69-12c0-465d-a4ba-8802262fed7a", "control-id": "ism_o_1402", "description": "No notes for control-id 1402.", "props": [ @@ -3866,7 +3878,7 @@ ] }, { - "uuid": "f725bd2a-5fcb-46a3-9465-075c384d5d37", + "uuid": "78184ab0-056b-430e-bbc4-78b4900991a1", "control-id": "ism_o_1405", "description": "No notes for control-id 1405.", "props": [ @@ -3943,7 +3955,7 @@ ] }, { - "uuid": "3fff0959-d9af-45cf-9e5d-8b315eaf4e00", + "uuid": "aeb47103-3772-4baf-bb0a-6c47604f3763", "control-id": "ism_o_1416", "description": "No notes for control-id 1416.", "props": [ @@ -3965,7 +3977,7 @@ ] }, { - "uuid": "e8f96002-ce8e-4242-a7c5-025e25ff9931", + "uuid": "0649b40f-814a-44f7-b3a2-debfb8b53bbb", "control-id": "ism_o_1417", "description": "No notes for control-id 1417.", "props": [ @@ -3982,7 +3994,7 @@ ] }, { - "uuid": "a12a7011-4fcb-48cf-ae18-e84c0892fed0", + "uuid": "c07f8a10-71e5-47ba-99da-d484df4ee633", "control-id": "ism_o_1418", "description": "No notes for control-id 1418.", "props": [ @@ -4004,7 +4016,7 @@ ] }, { - "uuid": "d8a59708-2f7f-4778-bd2e-dc9624984a48", + "uuid": "f1c17fd1-8b90-4d1d-8e61-e53e460d691d", "control-id": "ism_o_1446", "description": "No notes for control-id 1446.", "props": [ @@ -4031,7 +4043,7 @@ ] }, { - "uuid": "01bdcaec-8dbb-418b-937e-39cc036f7936", + "uuid": "196bd980-c113-46e4-b89e-d8190c0640cd", "control-id": "ism_o_1449", "description": "This needs more", "props": [ @@ -4048,7 +4060,7 @@ ] }, { - "uuid": "221a2970-55b0-4cfd-b37b-281404ab34b1", + "uuid": "20c9045d-35b3-44a2-ae5e-75087a9961bb", "control-id": "ism_o_1467", "description": "No notes for control-id 1467.", "props": [ @@ -4075,7 +4087,7 @@ ] }, { - "uuid": "c2c0afc1-b503-4855-85e8-2fd2fa318db6", + "uuid": "24a9f936-7a03-4af3-9daf-81770b9b8fdd", "control-id": "ism_o_1483", "description": "No notes for control-id 1483.", "props": [ @@ -4102,7 +4114,7 @@ ] }, { - "uuid": "367e562d-69b7-4827-81ec-126eba3f8e10", + "uuid": "ef15cfed-529a-4f09-b9de-0d42acffe8ae", "control-id": "ism_o_1491", "description": "No notes for control-id 1491.", "props": [ @@ -4119,7 +4131,7 @@ ] }, { - "uuid": "96a273af-e632-4eb5-b030-8900b3e3cb70", + "uuid": "b64168e1-c524-4f7c-857f-cdc043763f47", "control-id": "ism_o_1493", "description": "No notes for control-id 1493.", "props": [ @@ -4163,6 +4175,11 @@ "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_redhat_gpgkey_installed" }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "package_sequoia-sq_installed" + }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", @@ -4171,7 +4188,7 @@ ] }, { - "uuid": "d1f5d174-9f1b-4ce5-9715-623252ca5e18", + "uuid": "3945b7f0-59bb-49f9-bc24-e1db95a4963f", "control-id": "ism_o_1504", "description": "No notes for control-id 1504.", "props": [ @@ -4273,7 +4290,7 @@ ] }, { - "uuid": "fe6a414c-47f4-40df-b521-e855254d0917", + "uuid": "301f0352-212f-453b-a627-fe3898737772", "control-id": "ism_o_1505", "description": "No notes for control-id 1505.", "props": [ @@ -4375,7 +4392,7 @@ ] }, { - "uuid": "d1b36c30-8e98-486c-a4f5-dfe1a2d838fa", + "uuid": "6fd8dc97-9b11-4615-a7a1-c7cb2d656e0b", "control-id": "ism_o_1506", "description": "As of OpenSSH 7.6, OpenSSH only supports SSH 2.", "props": [ @@ -4387,7 +4404,7 @@ ] }, { - "uuid": "d7277ed3-a425-4b82-8552-ce7669644617", + "uuid": "b980fea9-e6c0-4c94-bbac-3518debc3a14", "control-id": "ism_o_1546", "description": "No notes for control-id 1546.", "props": [ @@ -4544,7 +4561,7 @@ ] }, { - "uuid": "187bd3ce-3903-4af9-be13-9512388d44a3", + "uuid": "6f30964b-0830-400e-a4f8-49f6200a79b0", "control-id": "ism_o_1552", "description": "No notes for control-id 1552.", "props": [ @@ -4556,7 +4573,7 @@ ] }, { - "uuid": "2f076675-6e0f-4ef6-897a-188ef0b8fe0e", + "uuid": "7f9c759d-1c08-4632-9835-676deda2368a", "control-id": "ism_o_1558", "description": "No notes for control-id 1558.", "props": [ @@ -4658,7 +4675,7 @@ ] }, { - "uuid": "29094c1d-aec8-486c-a86c-777c4e25357e", + "uuid": "d564c905-726f-4d14-a9c3-e2d7937bd6f5", "control-id": "ism_o_1559", "description": "No notes for control-id 1559.", "props": [ @@ -4760,7 +4777,7 @@ ] }, { - "uuid": "893cc097-7721-48ed-90ce-409d06484cf8", + "uuid": "250c77dd-c940-427f-99a7-791af2e9495f", "control-id": "ism_o_1745", "description": "The description for control-id ism_o_1745.", "props": [ @@ -4952,7 +4969,7 @@ { "name": "Parameter_Value_Alternatives_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -5174,3943 +5191,3967 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_never_disabled", + "value": "package_sequoia-sq_installed", "remarks": "rule_set_007" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled for All dnf Package Repositories", + "value": "Install sequoia-sq Package", "remarks": "rule_set_007" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_never_disabled", + "value": "package_sequoia-sq_installed", "remarks": "rule_set_007" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled for All dnf Package Repositories", + "value": "Install sequoia-sq Package", "remarks": "rule_set_007" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_local_packages", + "value": "ensure_gpgcheck_never_disabled", "remarks": "rule_set_008" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled for Local Packages", + "value": "Ensure gpgcheck Enabled for All dnf Package Repositories", "remarks": "rule_set_008" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_local_packages", + "value": "ensure_gpgcheck_never_disabled", "remarks": "rule_set_008" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled for Local Packages", + "value": "Ensure gpgcheck Enabled for All dnf Package Repositories", "remarks": "rule_set_008" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_globally_activated", + "value": "ensure_gpgcheck_local_packages", "remarks": "rule_set_009" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled In Main dnf Configuration", + "value": "Ensure gpgcheck Enabled for Local Packages", "remarks": "rule_set_009" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_globally_activated", + "value": "ensure_gpgcheck_local_packages", "remarks": "rule_set_009" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled In Main dnf Configuration", + "value": "Ensure gpgcheck Enabled for Local Packages", "remarks": "rule_set_009" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dnf-automatic_security_updates_only", + "value": "ensure_gpgcheck_globally_activated", "remarks": "rule_set_010" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure dnf-automatic to Install Only Security Updates", + "value": "Ensure gpgcheck Enabled In Main dnf Configuration", "remarks": "rule_set_010" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dnf-automatic_security_updates_only", + "value": "ensure_gpgcheck_globally_activated", "remarks": "rule_set_010" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure dnf-automatic to Install Only Security Updates", + "value": "Ensure gpgcheck Enabled In Main dnf Configuration", "remarks": "rule_set_010" }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "dnf-automatic_security_updates_only", + "remarks": "rule_set_011" + }, + { + "name": "Rule_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Configure dnf-automatic to Install Only Security Updates", + "remarks": "rule_set_011" + }, + { + "name": "Check_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "dnf-automatic_security_updates_only", + "remarks": "rule_set_011" + }, + { + "name": "Check_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Configure dnf-automatic to Install Only Security Updates", + "remarks": "rule_set_011" + }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_no_uid_except_zero", - "remarks": "rule_set_011" + "remarks": "rule_set_012" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Root Has UID 0", - "remarks": "rule_set_011" + "remarks": "rule_set_012" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_no_uid_except_zero", - "remarks": "rule_set_011" + "remarks": "rule_set_012" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Root Has UID 0", - "remarks": "rule_set_011" + "remarks": "rule_set_012" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_nopasswd", - "remarks": "rule_set_012" + "remarks": "rule_set_013" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD", - "remarks": "rule_set_012" + "remarks": "rule_set_013" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_nopasswd", - "remarks": "rule_set_012" + "remarks": "rule_set_013" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD", - "remarks": "rule_set_012" + "remarks": "rule_set_013" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_no_authenticate", - "remarks": "rule_set_013" + "remarks": "rule_set_014" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo !authenticate", - "remarks": "rule_set_013" + "remarks": "rule_set_014" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_no_authenticate", - "remarks": "rule_set_013" + "remarks": "rule_set_014" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo !authenticate", - "remarks": "rule_set_013" + "remarks": "rule_set_014" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_require_authentication", - "remarks": "rule_set_014" + "remarks": "rule_set_015" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo", - "remarks": "rule_set_014" + "remarks": "rule_set_015" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_require_authentication", - "remarks": "rule_set_014" + "remarks": "rule_set_015" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo", - "remarks": "rule_set_014" + "remarks": "rule_set_015" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_fapolicyd_installed", - "remarks": "rule_set_015" + "remarks": "rule_set_016" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install fapolicyd Package", - "remarks": "rule_set_015" + "remarks": "rule_set_016" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_fapolicyd_installed", - "remarks": "rule_set_015" + "remarks": "rule_set_016" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install fapolicyd Package", - "remarks": "rule_set_015" + "remarks": "rule_set_016" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_fapolicyd_enabled", - "remarks": "rule_set_016" + "remarks": "rule_set_017" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable the File Access Policy Service", - "remarks": "rule_set_016" + "remarks": "rule_set_017" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_fapolicyd_enabled", - "remarks": "rule_set_016" + "remarks": "rule_set_017" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable the File Access Policy Service", - "remarks": "rule_set_016" + "remarks": "rule_set_017" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy", - "remarks": "rule_set_017" + "remarks": "rule_set_018" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure System Cryptography Policy", - "remarks": "rule_set_017" + "remarks": "rule_set_018" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy", - "remarks": "rule_set_017" + "remarks": "rule_set_018" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure System Cryptography Policy", - "remarks": "rule_set_017" + "remarks": "rule_set_018" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_ssh_crypto_policy", - "remarks": "rule_set_018" + "remarks": "rule_set_019" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure SSH to use System Crypto Policy", - "remarks": "rule_set_018" + "remarks": "rule_set_019" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_ssh_crypto_policy", - "remarks": "rule_set_018" + "remarks": "rule_set_019" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure SSH to use System Crypto Policy", - "remarks": "rule_set_018" + "remarks": "rule_set_019" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_use_directory_configuration", - "remarks": "rule_set_019" + "remarks": "rule_set_020" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Distribute the SSH Server configuration to multiple files in a config directory.", - "remarks": "rule_set_019" + "remarks": "rule_set_020" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_use_directory_configuration", - "remarks": "rule_set_019" + "remarks": "rule_set_020" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Distribute the SSH Server configuration to multiple files in a config directory.", - "remarks": "rule_set_019" + "remarks": "rule_set_020" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_root_login", - "remarks": "rule_set_020" + "remarks": "rule_set_021" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Root Login", - "remarks": "rule_set_020" + "remarks": "rule_set_021" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_root_login", - "remarks": "rule_set_020" + "remarks": "rule_set_021" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Root Login", - "remarks": "rule_set_020" + "remarks": "rule_set_021" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_gssapi_auth", - "remarks": "rule_set_021" + "remarks": "rule_set_022" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GSSAPI Authentication", - "remarks": "rule_set_021" + "remarks": "rule_set_022" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_gssapi_auth", - "remarks": "rule_set_021" + "remarks": "rule_set_022" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GSSAPI Authentication", - "remarks": "rule_set_021" + "remarks": "rule_set_022" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_print_last_log", - "remarks": "rule_set_022" + "remarks": "rule_set_023" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable SSH Print Last Log", - "remarks": "rule_set_022" + "remarks": "rule_set_023" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_print_last_log", - "remarks": "rule_set_022" + "remarks": "rule_set_023" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable SSH Print Last Log", - "remarks": "rule_set_022" + "remarks": "rule_set_023" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_do_not_permit_user_env", - "remarks": "rule_set_023" + "remarks": "rule_set_024" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Do Not Allow SSH Environment Options", - "remarks": "rule_set_023" + "remarks": "rule_set_024" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_do_not_permit_user_env", - "remarks": "rule_set_023" + "remarks": "rule_set_024" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Do Not Allow SSH Environment Options", - "remarks": "rule_set_023" + "remarks": "rule_set_024" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_rhosts", - "remarks": "rule_set_024" + "remarks": "rule_set_025" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Support for .rhosts Files", - "remarks": "rule_set_024" + "remarks": "rule_set_025" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_rhosts", - "remarks": "rule_set_024" + "remarks": "rule_set_025" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Support for .rhosts Files", - "remarks": "rule_set_024" + "remarks": "rule_set_025" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_loglevel_info", - "remarks": "rule_set_025" + "remarks": "rule_set_026" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set LogLevel to INFO", - "remarks": "rule_set_025" + "remarks": "rule_set_026" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_loglevel_info", - "remarks": "rule_set_025" + "remarks": "rule_set_026" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set LogLevel to INFO", - "remarks": "rule_set_025" + "remarks": "rule_set_026" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_empty_passwords", - "remarks": "rule_set_026" + "remarks": "rule_set_027" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Access via Empty Passwords", - "remarks": "rule_set_026" + "remarks": "rule_set_027" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_empty_passwords", - "remarks": "rule_set_026" + "remarks": "rule_set_027" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Access via Empty Passwords", - "remarks": "rule_set_026" + "remarks": "rule_set_027" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_user_known_hosts", - "remarks": "rule_set_027" + "remarks": "rule_set_028" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Support for User Known Hosts", - "remarks": "rule_set_027" + "remarks": "rule_set_028" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_user_known_hosts", - "remarks": "rule_set_027" + "remarks": "rule_set_028" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Support for User Known Hosts", - "remarks": "rule_set_027" + "remarks": "rule_set_028" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_strictmodes", - "remarks": "rule_set_028" + "remarks": "rule_set_029" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Use of Strict Mode Checking", - "remarks": "rule_set_028" + "remarks": "rule_set_029" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_strictmodes", - "remarks": "rule_set_028" + "remarks": "rule_set_029" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Use of Strict Mode Checking", - "remarks": "rule_set_028" + "remarks": "rule_set_029" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_rsyslog_installed", - "remarks": "rule_set_029" + "remarks": "rule_set_030" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure rsyslog is Installed", - "remarks": "rule_set_029" + "remarks": "rule_set_030" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_rsyslog_installed", - "remarks": "rule_set_029" + "remarks": "rule_set_030" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure rsyslog is Installed", - "remarks": "rule_set_029" + "remarks": "rule_set_030" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_rsyslog_enabled", - "remarks": "rule_set_030" + "remarks": "rule_set_031" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable rsyslog Service", - "remarks": "rule_set_030" + "remarks": "rule_set_031" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_rsyslog_enabled", - "remarks": "rule_set_030" + "remarks": "rule_set_031" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable rsyslog Service", - "remarks": "rule_set_030" + "remarks": "rule_set_031" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_auditd_enabled", - "remarks": "rule_set_031" + "remarks": "rule_set_032" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable auditd Service", - "remarks": "rule_set_031" + "remarks": "rule_set_032" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_auditd_enabled", - "remarks": "rule_set_031" + "remarks": "rule_set_032" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable auditd Service", - "remarks": "rule_set_031" + "remarks": "rule_set_032" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_flush", - "remarks": "rule_set_032" + "remarks": "rule_set_033" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd flush priority", - "remarks": "rule_set_032" + "remarks": "rule_set_033" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_flush", - "remarks": "rule_set_032" + "remarks": "rule_set_033" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd flush priority", - "remarks": "rule_set_032" + "remarks": "rule_set_033" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_local_events", - "remarks": "rule_set_033" + "remarks": "rule_set_034" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Include Local Events in Audit Logs", - "remarks": "rule_set_033" + "remarks": "rule_set_034" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_local_events", - "remarks": "rule_set_033" + "remarks": "rule_set_034" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Include Local Events in Audit Logs", - "remarks": "rule_set_033" + "remarks": "rule_set_034" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_write_logs", - "remarks": "rule_set_034" + "remarks": "rule_set_035" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Write Audit Logs to the Disk", - "remarks": "rule_set_034" + "remarks": "rule_set_035" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_write_logs", - "remarks": "rule_set_034" + "remarks": "rule_set_035" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Write Audit Logs to the Disk", - "remarks": "rule_set_034" + "remarks": "rule_set_035" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_log_format", - "remarks": "rule_set_035" + "remarks": "rule_set_036" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Resolve information before writing to audit logs", - "remarks": "rule_set_035" + "remarks": "rule_set_036" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_log_format", - "remarks": "rule_set_035" + "remarks": "rule_set_036" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Resolve information before writing to audit logs", - "remarks": "rule_set_035" + "remarks": "rule_set_036" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_freq", - "remarks": "rule_set_036" + "remarks": "rule_set_037" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set number of records to cause an explicit flush to audit logs", - "remarks": "rule_set_036" + "remarks": "rule_set_037" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_freq", - "remarks": "rule_set_036" + "remarks": "rule_set_037" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set number of records to cause an explicit flush to audit logs", - "remarks": "rule_set_036" + "remarks": "rule_set_037" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_name_format", - "remarks": "rule_set_037" + "remarks": "rule_set_038" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set type of computer node name logging in audit logs", - "remarks": "rule_set_037" + "remarks": "rule_set_038" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_name_format", - "remarks": "rule_set_037" + "remarks": "rule_set_038" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set type of computer node name logging in audit logs", - "remarks": "rule_set_037" + "remarks": "rule_set_038" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_faillock", - "remarks": "rule_set_038" + "remarks": "rule_set_039" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - faillock", - "remarks": "rule_set_038" + "remarks": "rule_set_039" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_faillock", - "remarks": "rule_set_038" + "remarks": "rule_set_039" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - faillock", - "remarks": "rule_set_038" + "remarks": "rule_set_039" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_adjtimex", - "remarks": "rule_set_039" + "remarks": "rule_set_040" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through adjtimex", - "remarks": "rule_set_039" + "remarks": "rule_set_040" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_adjtimex", - "remarks": "rule_set_039" + "remarks": "rule_set_040" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through adjtimex", - "remarks": "rule_set_039" + "remarks": "rule_set_040" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_clock_settime", - "remarks": "rule_set_040" + "remarks": "rule_set_041" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through clock_settime", - "remarks": "rule_set_040" + "remarks": "rule_set_041" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_clock_settime", - "remarks": "rule_set_040" + "remarks": "rule_set_041" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through clock_settime", - "remarks": "rule_set_040" + "remarks": "rule_set_041" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_watch_localtime", - "remarks": "rule_set_041" + "remarks": "rule_set_042" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter the localtime File", - "remarks": "rule_set_041" + "remarks": "rule_set_042" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_watch_localtime", - "remarks": "rule_set_041" + "remarks": "rule_set_042" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter the localtime File", - "remarks": "rule_set_041" + "remarks": "rule_set_042" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_settimeofday", - "remarks": "rule_set_042" + "remarks": "rule_set_043" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through settimeofday", - "remarks": "rule_set_042" + "remarks": "rule_set_043" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_settimeofday", - "remarks": "rule_set_042" + "remarks": "rule_set_043" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through settimeofday", - "remarks": "rule_set_042" + "remarks": "rule_set_043" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_stime", - "remarks": "rule_set_043" + "remarks": "rule_set_044" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through stime", - "remarks": "rule_set_043" + "remarks": "rule_set_044" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_stime", - "remarks": "rule_set_043" + "remarks": "rule_set_044" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through stime", - "remarks": "rule_set_043" + "remarks": "rule_set_044" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_restorecon", - "remarks": "rule_set_044" + "remarks": "rule_set_045" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run restorecon", - "remarks": "rule_set_044" + "remarks": "rule_set_045" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_restorecon", - "remarks": "rule_set_044" + "remarks": "rule_set_045" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run restorecon", - "remarks": "rule_set_044" + "remarks": "rule_set_045" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chcon", - "remarks": "rule_set_045" + "remarks": "rule_set_046" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chcon", - "remarks": "rule_set_045" + "remarks": "rule_set_046" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chcon", - "remarks": "rule_set_045" + "remarks": "rule_set_046" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chcon", - "remarks": "rule_set_045" + "remarks": "rule_set_046" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_semanage", - "remarks": "rule_set_046" + "remarks": "rule_set_047" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run semanage", - "remarks": "rule_set_046" + "remarks": "rule_set_047" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_semanage", - "remarks": "rule_set_046" + "remarks": "rule_set_047" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run semanage", - "remarks": "rule_set_046" + "remarks": "rule_set_047" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_setsebool", - "remarks": "rule_set_047" + "remarks": "rule_set_048" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run setsebool", - "remarks": "rule_set_047" + "remarks": "rule_set_048" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_setsebool", - "remarks": "rule_set_047" + "remarks": "rule_set_048" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run setsebool", - "remarks": "rule_set_047" + "remarks": "rule_set_048" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_setfiles", - "remarks": "rule_set_048" + "remarks": "rule_set_049" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run setfiles", - "remarks": "rule_set_048" + "remarks": "rule_set_049" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_setfiles", - "remarks": "rule_set_048" + "remarks": "rule_set_049" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run setfiles", - "remarks": "rule_set_048" + "remarks": "rule_set_049" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_seunshare", - "remarks": "rule_set_049" + "remarks": "rule_set_050" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run seunshare", - "remarks": "rule_set_049" + "remarks": "rule_set_050" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_seunshare", - "remarks": "rule_set_049" + "remarks": "rule_set_050" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run seunshare", - "remarks": "rule_set_049" + "remarks": "rule_set_050" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_sysadmin_actions", - "remarks": "rule_set_050" + "remarks": "rule_set_051" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects System Administrator Actions", - "remarks": "rule_set_050" + "remarks": "rule_set_051" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_sysadmin_actions", - "remarks": "rule_set_050" + "remarks": "rule_set_051" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects System Administrator Actions", - "remarks": "rule_set_050" + "remarks": "rule_set_051" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification", - "remarks": "rule_set_051" + "remarks": "rule_set_052" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment", - "remarks": "rule_set_051" + "remarks": "rule_set_052" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification", - "remarks": "rule_set_051" + "remarks": "rule_set_052" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment", - "remarks": "rule_set_051" + "remarks": "rule_set_052" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_group", - "remarks": "rule_set_052" + "remarks": "rule_set_053" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/group", - "remarks": "rule_set_052" + "remarks": "rule_set_053" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_group", - "remarks": "rule_set_052" + "remarks": "rule_set_053" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/group", - "remarks": "rule_set_052" + "remarks": "rule_set_053" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_gshadow", - "remarks": "rule_set_053" + "remarks": "rule_set_054" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/gshadow", - "remarks": "rule_set_053" + "remarks": "rule_set_054" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_gshadow", - "remarks": "rule_set_053" + "remarks": "rule_set_054" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/gshadow", - "remarks": "rule_set_053" + "remarks": "rule_set_054" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_opasswd", - "remarks": "rule_set_054" + "remarks": "rule_set_055" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", - "remarks": "rule_set_054" + "remarks": "rule_set_055" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_opasswd", - "remarks": "rule_set_054" + "remarks": "rule_set_055" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", - "remarks": "rule_set_054" + "remarks": "rule_set_055" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_passwd", - "remarks": "rule_set_055" + "remarks": "rule_set_056" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/passwd", - "remarks": "rule_set_055" + "remarks": "rule_set_056" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_passwd", - "remarks": "rule_set_055" + "remarks": "rule_set_056" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/passwd", - "remarks": "rule_set_055" + "remarks": "rule_set_056" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_shadow", - "remarks": "rule_set_056" + "remarks": "rule_set_057" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/shadow", - "remarks": "rule_set_056" + "remarks": "rule_set_057" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_shadow", - "remarks": "rule_set_056" + "remarks": "rule_set_057" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/shadow", - "remarks": "rule_set_056" + "remarks": "rule_set_057" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chmod", - "remarks": "rule_set_057" + "remarks": "rule_set_058" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", - "remarks": "rule_set_057" + "remarks": "rule_set_058" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chmod", - "remarks": "rule_set_057" + "remarks": "rule_set_058" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", - "remarks": "rule_set_057" + "remarks": "rule_set_058" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chown", - "remarks": "rule_set_058" + "remarks": "rule_set_059" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chown", - "remarks": "rule_set_058" + "remarks": "rule_set_059" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chown", - "remarks": "rule_set_058" + "remarks": "rule_set_059" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chown", - "remarks": "rule_set_058" + "remarks": "rule_set_059" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading", - "remarks": "rule_set_059" + "remarks": "rule_set_060" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading", - "remarks": "rule_set_059" + "remarks": "rule_set_060" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading", - "remarks": "rule_set_059" + "remarks": "rule_set_060" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading", - "remarks": "rule_set_059" + "remarks": "rule_set_060" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_randomize_va_space", - "remarks": "rule_set_060" + "remarks": "rule_set_061" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Randomized Layout of Virtual Address Space", - "remarks": "rule_set_060" + "remarks": "rule_set_061" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_randomize_va_space", - "remarks": "rule_set_060" + "remarks": "rule_set_061" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Randomized Layout of Virtual Address Space", - "remarks": "rule_set_060" + "remarks": "rule_set_061" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_exec_shield", - "remarks": "rule_set_061" + "remarks": "rule_set_062" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable ExecShield via sysctl", - "remarks": "rule_set_061" + "remarks": "rule_set_062" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_exec_shield", - "remarks": "rule_set_061" + "remarks": "rule_set_062" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable ExecShield via sysctl", - "remarks": "rule_set_061" + "remarks": "rule_set_062" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_kptr_restrict", - "remarks": "rule_set_062" + "remarks": "rule_set_063" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Exposed Kernel Pointer Addresses Access", - "remarks": "rule_set_062" + "remarks": "rule_set_063" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_kptr_restrict", - "remarks": "rule_set_062" + "remarks": "rule_set_063" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Exposed Kernel Pointer Addresses Access", - "remarks": "rule_set_062" + "remarks": "rule_set_063" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_dmesg_restrict", - "remarks": "rule_set_063" + "remarks": "rule_set_064" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Access to Kernel Message Buffer", - "remarks": "rule_set_063" + "remarks": "rule_set_064" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_dmesg_restrict", - "remarks": "rule_set_063" + "remarks": "rule_set_064" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Access to Kernel Message Buffer", - "remarks": "rule_set_063" + "remarks": "rule_set_064" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_kexec_load_disabled", - "remarks": "rule_set_064" + "remarks": "rule_set_065" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Image Loading", - "remarks": "rule_set_064" + "remarks": "rule_set_065" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_kexec_load_disabled", - "remarks": "rule_set_064" + "remarks": "rule_set_065" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Image Loading", - "remarks": "rule_set_064" + "remarks": "rule_set_065" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_yama_ptrace_scope", - "remarks": "rule_set_065" + "remarks": "rule_set_066" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict usage of ptrace to descendant processes", - "remarks": "rule_set_065" + "remarks": "rule_set_066" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_yama_ptrace_scope", - "remarks": "rule_set_065" + "remarks": "rule_set_066" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict usage of ptrace to descendant processes", - "remarks": "rule_set_065" + "remarks": "rule_set_066" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_unprivileged_bpf_disabled", - "remarks": "rule_set_066" + "remarks": "rule_set_067" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Access to Network bpf() Syscall From Unprivileged Processes", - "remarks": "rule_set_066" + "remarks": "rule_set_067" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_unprivileged_bpf_disabled", - "remarks": "rule_set_066" + "remarks": "rule_set_067" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Access to Network bpf() Syscall From Unprivileged Processes", - "remarks": "rule_set_066" + "remarks": "rule_set_067" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_core_bpf_jit_harden", - "remarks": "rule_set_067" + "remarks": "rule_set_068" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Harden the operation of the BPF just-in-time compiler", - "remarks": "rule_set_067" + "remarks": "rule_set_068" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_core_bpf_jit_harden", - "remarks": "rule_set_067" + "remarks": "rule_set_068" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Harden the operation of the BPF just-in-time compiler", - "remarks": "rule_set_067" + "remarks": "rule_set_068" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_state", - "remarks": "rule_set_068" + "remarks": "rule_set_069" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SELinux State is Enforcing", - "remarks": "rule_set_068" + "remarks": "rule_set_069" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_state", - "remarks": "rule_set_068" + "remarks": "rule_set_069" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SELinux State is Enforcing", - "remarks": "rule_set_068" + "remarks": "rule_set_069" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_policytype", - "remarks": "rule_set_069" + "remarks": "rule_set_070" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure SELinux Policy", - "remarks": "rule_set_069" + "remarks": "rule_set_070" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_policytype", - "remarks": "rule_set_069" + "remarks": "rule_set_070" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure SELinux Policy", - "remarks": "rule_set_069" + "remarks": "rule_set_070" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_sgid", - "remarks": "rule_set_070" + "remarks": "rule_set_071" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All SGID Executables Are Authorized", - "remarks": "rule_set_070" + "remarks": "rule_set_071" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_sgid", - "remarks": "rule_set_070" + "remarks": "rule_set_071" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All SGID Executables Are Authorized", - "remarks": "rule_set_070" + "remarks": "rule_set_071" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_suid", - "remarks": "rule_set_071" + "remarks": "rule_set_072" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All SUID Executables Are Authorized", - "remarks": "rule_set_071" + "remarks": "rule_set_072" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_suid", - "remarks": "rule_set_071" + "remarks": "rule_set_072" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All SUID Executables Are Authorized", - "remarks": "rule_set_071" + "remarks": "rule_set_072" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_072" + "remarks": "rule_set_073" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_072" + "remarks": "rule_set_073" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_072" + "remarks": "rule_set_073" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_072" + "remarks": "rule_set_073" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_073" + "remarks": "rule_set_074" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_073" + "remarks": "rule_set_074" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_073" + "remarks": "rule_set_074" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_073" + "remarks": "rule_set_074" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_library_dirs", - "remarks": "rule_set_074" + "remarks": "rule_set_075" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that Shared Library Files Have Restrictive Permissions", - "remarks": "rule_set_074" + "remarks": "rule_set_075" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_library_dirs", - "remarks": "rule_set_074" + "remarks": "rule_set_075" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that Shared Library Files Have Restrictive Permissions", - "remarks": "rule_set_074" + "remarks": "rule_set_075" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_binary_dirs", - "remarks": "rule_set_075" + "remarks": "rule_set_076" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that System Executables Have Root Ownership", - "remarks": "rule_set_075" + "remarks": "rule_set_076" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_binary_dirs", - "remarks": "rule_set_075" + "remarks": "rule_set_076" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that System Executables Have Root Ownership", - "remarks": "rule_set_075" + "remarks": "rule_set_076" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_binary_dirs", - "remarks": "rule_set_076" + "remarks": "rule_set_077" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that System Executables Have Restrictive Permissions", - "remarks": "rule_set_076" + "remarks": "rule_set_077" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_binary_dirs", - "remarks": "rule_set_076" + "remarks": "rule_set_077" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that System Executables Have Restrictive Permissions", - "remarks": "rule_set_076" + "remarks": "rule_set_077" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_library_dirs", - "remarks": "rule_set_077" + "remarks": "rule_set_078" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that Shared Library Files Have Root Ownership", - "remarks": "rule_set_077" + "remarks": "rule_set_078" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_library_dirs", - "remarks": "rule_set_077" + "remarks": "rule_set_078" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that Shared Library Files Have Root Ownership", - "remarks": "rule_set_077" + "remarks": "rule_set_078" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords", - "remarks": "rule_set_078" + "remarks": "rule_set_079" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent Login to Accounts With Empty Password", - "remarks": "rule_set_078" + "remarks": "rule_set_079" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords", - "remarks": "rule_set_078" + "remarks": "rule_set_079" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent Login to Accounts With Empty Password", - "remarks": "rule_set_078" + "remarks": "rule_set_079" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_dev_shm_nodev", - "remarks": "rule_set_079" + "remarks": "rule_set_080" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nodev Option to /dev/shm", - "remarks": "rule_set_079" + "remarks": "rule_set_080" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_dev_shm_nodev", - "remarks": "rule_set_079" + "remarks": "rule_set_080" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nodev Option to /dev/shm", - "remarks": "rule_set_079" + "remarks": "rule_set_080" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_dev_shm_nosuid", - "remarks": "rule_set_080" + "remarks": "rule_set_081" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /dev/shm", - "remarks": "rule_set_080" + "remarks": "rule_set_081" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_dev_shm_nosuid", - "remarks": "rule_set_080" + "remarks": "rule_set_081" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /dev/shm", - "remarks": "rule_set_080" + "remarks": "rule_set_081" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_dev_shm_noexec", - "remarks": "rule_set_081" + "remarks": "rule_set_082" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add noexec Option to /dev/shm", - "remarks": "rule_set_081" + "remarks": "rule_set_082" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_dev_shm_noexec", - "remarks": "rule_set_081" + "remarks": "rule_set_082" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add noexec Option to /dev/shm", - "remarks": "rule_set_081" + "remarks": "rule_set_082" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_firewalld_installed", - "remarks": "rule_set_082" + "remarks": "rule_set_083" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install firewalld Package", - "remarks": "rule_set_082" + "remarks": "rule_set_083" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_firewalld_installed", - "remarks": "rule_set_082" + "remarks": "rule_set_083" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install firewalld Package", - "remarks": "rule_set_082" + "remarks": "rule_set_083" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_firewalld_enabled", - "remarks": "rule_set_083" + "remarks": "rule_set_084" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify firewalld Enabled", - "remarks": "rule_set_083" + "remarks": "rule_set_084" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_firewalld_enabled", - "remarks": "rule_set_083" + "remarks": "rule_set_084" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify firewalld Enabled", - "remarks": "rule_set_083" + "remarks": "rule_set_084" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "network_sniffer_disabled", - "remarks": "rule_set_084" + "remarks": "rule_set_085" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System is Not Acting as a Network Sniffer", - "remarks": "rule_set_084" + "remarks": "rule_set_085" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "network_sniffer_disabled", - "remarks": "rule_set_084" + "remarks": "rule_set_085" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System is Not Acting as a Network Sniffer", - "remarks": "rule_set_084" + "remarks": "rule_set_085" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_maximum_age_login_defs", - "remarks": "rule_set_085" + "remarks": "rule_set_086" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Age", - "remarks": "rule_set_085" + "remarks": "rule_set_086" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_maximum_age_login_defs", - "remarks": "rule_set_085" + "remarks": "rule_set_086" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Age", - "remarks": "rule_set_085" + "remarks": "rule_set_086" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_minimum_age_login_defs", - "remarks": "rule_set_086" + "remarks": "rule_set_087" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Minimum Age", - "remarks": "rule_set_086" + "remarks": "rule_set_087" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_minimum_age_login_defs", - "remarks": "rule_set_086" + "remarks": "rule_set_087" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Minimum Age", - "remarks": "rule_set_086" + "remarks": "rule_set_087" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_warn_age_login_defs", - "remarks": "rule_set_087" + "remarks": "rule_set_088" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Warning Age", - "remarks": "rule_set_087" + "remarks": "rule_set_088" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_warn_age_login_defs", - "remarks": "rule_set_087" + "remarks": "rule_set_088" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Warning Age", - "remarks": "rule_set_087" + "remarks": "rule_set_088" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_kerberos_crypto_policy", - "remarks": "rule_set_088" + "remarks": "rule_set_089" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Kerberos to use System Crypto Policy", - "remarks": "rule_set_088" + "remarks": "rule_set_089" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_kerberos_crypto_policy", - "remarks": "rule_set_088" + "remarks": "rule_set_089" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Kerberos to use System Crypto Policy", - "remarks": "rule_set_088" + "remarks": "rule_set_089" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "enable_ldap_client", - "remarks": "rule_set_089" + "remarks": "rule_set_090" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable the LDAP Client For Use in Authconfig", - "remarks": "rule_set_089" + "remarks": "rule_set_090" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "enable_ldap_client", - "remarks": "rule_set_089" + "remarks": "rule_set_090" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable the LDAP Client For Use in Authconfig", - "remarks": "rule_set_089" + "remarks": "rule_set_090" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kerberos_disable_no_keytab", - "remarks": "rule_set_090" + "remarks": "rule_set_091" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kerberos by removing host keytab", - "remarks": "rule_set_090" + "remarks": "rule_set_091" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kerberos_disable_no_keytab", - "remarks": "rule_set_090" + "remarks": "rule_set_091" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kerberos by removing host keytab", - "remarks": "rule_set_090" + "remarks": "rule_set_091" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "network_nmcli_permissions", - "remarks": "rule_set_091" + "remarks": "rule_set_092" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent non-Privileged Users from Modifying Network Interfaces using nmcli", - "remarks": "rule_set_091" + "remarks": "rule_set_092" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "network_nmcli_permissions", - "remarks": "rule_set_091" + "remarks": "rule_set_092" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent non-Privileged Users from Modifying Network Interfaces using nmcli", - "remarks": "rule_set_091" + "remarks": "rule_set_092" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sebool_kerberos_enabled", - "remarks": "rule_set_092" + "remarks": "rule_set_093" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable the kerberos_enabled SELinux Boolean", - "remarks": "rule_set_092" + "remarks": "rule_set_093" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sebool_kerberos_enabled", - "remarks": "rule_set_092" + "remarks": "rule_set_093" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable the kerberos_enabled SELinux Boolean", - "remarks": "rule_set_092" + "remarks": "rule_set_093" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_libuserconf", - "remarks": "rule_set_093" + "remarks": "rule_set_094" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/libuser.conf", - "remarks": "rule_set_093" + "remarks": "rule_set_094" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_libuserconf", - "remarks": "rule_set_093" + "remarks": "rule_set_094" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/libuser.conf", - "remarks": "rule_set_093" + "remarks": "rule_set_094" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_logindefs", - "remarks": "rule_set_094" + "remarks": "rule_set_095" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/login.defs", - "remarks": "rule_set_094" + "remarks": "rule_set_095" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_logindefs", - "remarks": "rule_set_094" + "remarks": "rule_set_095" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/login.defs", - "remarks": "rule_set_094" + "remarks": "rule_set_095" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_passwordauth", - "remarks": "rule_set_095" + "remarks": "rule_set_096" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - password-auth", - "remarks": "rule_set_095" + "remarks": "rule_set_096" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_passwordauth", - "remarks": "rule_set_095" + "remarks": "rule_set_096" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - password-auth", - "remarks": "rule_set_095" + "remarks": "rule_set_096" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_systemauth", - "remarks": "rule_set_096" + "remarks": "rule_set_097" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - system-auth", - "remarks": "rule_set_096" + "remarks": "rule_set_097" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_systemauth", - "remarks": "rule_set_096" + "remarks": "rule_set_097" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - system-auth", - "remarks": "rule_set_096" + "remarks": "rule_set_097" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_minlen_login_defs", - "remarks": "rule_set_097" + "remarks": "rule_set_098" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Minimum Length in login.defs", - "remarks": "rule_set_097" + "remarks": "rule_set_098" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_minlen_login_defs", - "remarks": "rule_set_097" + "remarks": "rule_set_098" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Minimum Length in login.defs", - "remarks": "rule_set_097" + "remarks": "rule_set_098" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_dcredit", - "remarks": "rule_set_098" + "remarks": "rule_set_099" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Digit Characters", - "remarks": "rule_set_098" + "remarks": "rule_set_099" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_dcredit", - "remarks": "rule_set_098" + "remarks": "rule_set_099" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Digit Characters", - "remarks": "rule_set_098" + "remarks": "rule_set_099" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_lcredit", - "remarks": "rule_set_099" + "remarks": "rule_set_100" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Lowercase Characters", - "remarks": "rule_set_099" + "remarks": "rule_set_100" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_lcredit", - "remarks": "rule_set_099" + "remarks": "rule_set_100" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Lowercase Characters", - "remarks": "rule_set_099" + "remarks": "rule_set_100" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minclass", - "remarks": "rule_set_100" + "remarks": "rule_set_101" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", - "remarks": "rule_set_100" + "remarks": "rule_set_101" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minclass", - "remarks": "rule_set_100" + "remarks": "rule_set_101" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", - "remarks": "rule_set_100" + "remarks": "rule_set_101" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minlen", - "remarks": "rule_set_101" + "remarks": "rule_set_102" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Length", - "remarks": "rule_set_101" + "remarks": "rule_set_102" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minlen", - "remarks": "rule_set_101" + "remarks": "rule_set_102" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Length", - "remarks": "rule_set_101" + "remarks": "rule_set_102" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_ocredit", - "remarks": "rule_set_102" + "remarks": "rule_set_103" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Special Characters", - "remarks": "rule_set_102" + "remarks": "rule_set_103" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_ocredit", - "remarks": "rule_set_102" + "remarks": "rule_set_103" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Special Characters", - "remarks": "rule_set_102" + "remarks": "rule_set_103" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_ucredit", - "remarks": "rule_set_103" + "remarks": "rule_set_104" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Uppercase Characters", - "remarks": "rule_set_103" + "remarks": "rule_set_104" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_ucredit", - "remarks": "rule_set_103" + "remarks": "rule_set_104" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Uppercase Characters", - "remarks": "rule_set_103" + "remarks": "rule_set_104" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny", - "remarks": "rule_set_104" + "remarks": "rule_set_105" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Lock Accounts After Failed Password Attempts", - "remarks": "rule_set_104" + "remarks": "rule_set_105" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny", - "remarks": "rule_set_104" + "remarks": "rule_set_105" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Lock Accounts After Failed Password Attempts", - "remarks": "rule_set_104" + "remarks": "rule_set_105" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny_root", - "remarks": "rule_set_105" + "remarks": "rule_set_106" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the root Account for Failed Password Attempts", - "remarks": "rule_set_105" + "remarks": "rule_set_106" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny_root", - "remarks": "rule_set_105" + "remarks": "rule_set_106" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the root Account for Failed Password Attempts", - "remarks": "rule_set_105" + "remarks": "rule_set_106" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_interval", - "remarks": "rule_set_106" + "remarks": "rule_set_107" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Interval For Counting Failed Password Attempts", - "remarks": "rule_set_106" + "remarks": "rule_set_107" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_interval", - "remarks": "rule_set_106" + "remarks": "rule_set_107" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Interval For Counting Failed Password Attempts", - "remarks": "rule_set_106" + "remarks": "rule_set_107" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_unlock_time", - "remarks": "rule_set_107" + "remarks": "rule_set_108" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Lockout Time for Failed Password Attempts", - "remarks": "rule_set_107" + "remarks": "rule_set_108" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_unlock_time", - "remarks": "rule_set_107" + "remarks": "rule_set_108" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Lockout Time for Failed Password Attempts", - "remarks": "rule_set_107" + "remarks": "rule_set_108" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_host_auth", - "remarks": "rule_set_108" + "remarks": "rule_set_109" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Host-Based Authentication", - "remarks": "rule_set_108" + "remarks": "rule_set_109" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_host_auth", - "remarks": "rule_set_108" + "remarks": "rule_set_109" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Host-Based Authentication", - "remarks": "rule_set_108" + "remarks": "rule_set_109" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "require_emergency_target_auth", - "remarks": "rule_set_109" + "remarks": "rule_set_110" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require Authentication for Emergency Systemd Target", - "remarks": "rule_set_109" + "remarks": "rule_set_110" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "require_emergency_target_auth", - "remarks": "rule_set_109" + "remarks": "rule_set_110" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require Authentication for Emergency Systemd Target", - "remarks": "rule_set_109" + "remarks": "rule_set_110" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sebool_authlogin_nsswitch_use_ldap", - "remarks": "rule_set_110" + "remarks": "rule_set_111" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the authlogin_nsswitch_use_ldap SELinux Boolean", - "remarks": "rule_set_110" + "remarks": "rule_set_111" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sebool_authlogin_nsswitch_use_ldap", - "remarks": "rule_set_110" + "remarks": "rule_set_111" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the authlogin_nsswitch_use_ldap SELinux Boolean", - "remarks": "rule_set_110" + "remarks": "rule_set_111" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sebool_authlogin_radius", - "remarks": "rule_set_111" + "remarks": "rule_set_112" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the authlogin_radius SELinux Boolean", - "remarks": "rule_set_111" + "remarks": "rule_set_112" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sebool_authlogin_radius", - "remarks": "rule_set_111" + "remarks": "rule_set_112" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the authlogin_radius SELinux Boolean", - "remarks": "rule_set_111" + "remarks": "rule_set_112" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_kerb_auth", - "remarks": "rule_set_112" + "remarks": "rule_set_113" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kerberos Authentication", - "remarks": "rule_set_112" + "remarks": "rule_set_113" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_kerb_auth", - "remarks": "rule_set_112" + "remarks": "rule_set_113" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kerberos Authentication", - "remarks": "rule_set_112" + "remarks": "rule_set_113" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_auth_tries", - "remarks": "rule_set_113" + "remarks": "rule_set_114" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH authentication attempt limit", - "remarks": "rule_set_113" + "remarks": "rule_set_114" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_auth_tries", - "remarks": "rule_set_113" + "remarks": "rule_set_114" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH authentication attempt limit", - "remarks": "rule_set_113" + "remarks": "rule_set_114" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sssd_enable_smartcards", - "remarks": "rule_set_114" + "remarks": "rule_set_115" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Smartcards in SSSD", - "remarks": "rule_set_114" + "remarks": "rule_set_115" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sssd_enable_smartcards", - "remarks": "rule_set_114" + "remarks": "rule_set_115" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Smartcards in SSSD", - "remarks": "rule_set_114" + "remarks": "rule_set_115" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_warning_banner", - "remarks": "rule_set_115" + "remarks": "rule_set_116" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable SSH Warning Banner", - "remarks": "rule_set_115" + "remarks": "rule_set_116" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_warning_banner", - "remarks": "rule_set_115" + "remarks": "rule_set_116" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable SSH Warning Banner", - "remarks": "rule_set_115" + "remarks": "rule_set_116" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_x11_forwarding", - "remarks": "rule_set_116" + "remarks": "rule_set_117" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable X11 Forwarding", - "remarks": "rule_set_116" + "remarks": "rule_set_117" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_x11_forwarding", - "remarks": "rule_set_116" + "remarks": "rule_set_117" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable X11 Forwarding", - "remarks": "rule_set_116" + "remarks": "rule_set_117" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_access_failed", - "remarks": "rule_set_117" + "remarks": "rule_set_118" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditing of unsuccessful file accesses", - "remarks": "rule_set_117" + "remarks": "rule_set_118" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_access_failed", - "remarks": "rule_set_117" + "remarks": "rule_set_118" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditing of unsuccessful file accesses", - "remarks": "rule_set_117" + "remarks": "rule_set_118" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_access_failed_aarch64", - "remarks": "rule_set_118" + "remarks": "rule_set_119" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditing of unsuccessful file accesses (AArch64)", - "remarks": "rule_set_118" + "remarks": "rule_set_119" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_access_failed_aarch64", - "remarks": "rule_set_118" + "remarks": "rule_set_119" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditing of unsuccessful file accesses (AArch64)", - "remarks": "rule_set_118" + "remarks": "rule_set_119" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_access_failed_ppc64le", - "remarks": "rule_set_119" + "remarks": "rule_set_120" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditing of unsuccessful file accesses (ppc64le)", - "remarks": "rule_set_119" + "remarks": "rule_set_120" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_access_failed_ppc64le", - "remarks": "rule_set_119" + "remarks": "rule_set_120" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditing of unsuccessful file accesses (ppc64le)", - "remarks": "rule_set_119" + "remarks": "rule_set_120" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_access_success", - "remarks": "rule_set_120" + "remarks": "rule_set_121" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditing of successful file accesses", - "remarks": "rule_set_120" + "remarks": "rule_set_121" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_access_success", - "remarks": "rule_set_120" + "remarks": "rule_set_121" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditing of successful file accesses", - "remarks": "rule_set_120" + "remarks": "rule_set_121" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_access_success_aarch64", - "remarks": "rule_set_121" + "remarks": "rule_set_122" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditing of successful file accesses (AArch64)", - "remarks": "rule_set_121" + "remarks": "rule_set_122" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_access_success_aarch64", - "remarks": "rule_set_121" + "remarks": "rule_set_122" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditing of successful file accesses (AArch64)", - "remarks": "rule_set_121" + "remarks": "rule_set_122" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_access_success_ppc64le", - "remarks": "rule_set_122" + "remarks": "rule_set_123" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditing of successful file accesses (ppc64le)", - "remarks": "rule_set_122" + "remarks": "rule_set_123" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_access_success_ppc64le", - "remarks": "rule_set_122" + "remarks": "rule_set_123" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditing of successful file accesses (ppc64le)", - "remarks": "rule_set_122" + "remarks": "rule_set_123" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands", - "remarks": "rule_set_123" + "remarks": "rule_set_124" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands", - "remarks": "rule_set_123" + "remarks": "rule_set_124" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands", - "remarks": "rule_set_123" + "remarks": "rule_set_124" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands", - "remarks": "rule_set_123" + "remarks": "rule_set_124" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_utmp", - "remarks": "rule_set_124" + "remarks": "rule_set_125" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information utmp", - "remarks": "rule_set_124" + "remarks": "rule_set_125" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_utmp", - "remarks": "rule_set_124" + "remarks": "rule_set_125" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information utmp", - "remarks": "rule_set_124" + "remarks": "rule_set_125" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_btmp", - "remarks": "rule_set_125" + "remarks": "rule_set_126" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information btmp", - "remarks": "rule_set_125" + "remarks": "rule_set_126" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_btmp", - "remarks": "rule_set_125" + "remarks": "rule_set_126" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information btmp", - "remarks": "rule_set_125" + "remarks": "rule_set_126" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_wtmp", - "remarks": "rule_set_126" + "remarks": "rule_set_127" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", - "remarks": "rule_set_126" + "remarks": "rule_set_127" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_wtmp", - "remarks": "rule_set_126" + "remarks": "rule_set_127" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", - "remarks": "rule_set_126" + "remarks": "rule_set_127" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_creat", - "remarks": "rule_set_127" + "remarks": "rule_set_128" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - creat", - "remarks": "rule_set_127" + "remarks": "rule_set_128" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_creat", - "remarks": "rule_set_127" + "remarks": "rule_set_128" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - creat", - "remarks": "rule_set_127" + "remarks": "rule_set_128" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_open", - "remarks": "rule_set_128" + "remarks": "rule_set_129" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - open", - "remarks": "rule_set_128" + "remarks": "rule_set_129" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_open", - "remarks": "rule_set_128" + "remarks": "rule_set_129" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - open", - "remarks": "rule_set_128" + "remarks": "rule_set_129" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_openat", - "remarks": "rule_set_129" + "remarks": "rule_set_130" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - openat", - "remarks": "rule_set_129" + "remarks": "rule_set_130" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_openat", - "remarks": "rule_set_129" + "remarks": "rule_set_130" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - openat", - "remarks": "rule_set_129" + "remarks": "rule_set_130" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_open_by_handle_at", - "remarks": "rule_set_130" + "remarks": "rule_set_131" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - open_by_handle_at", - "remarks": "rule_set_130" + "remarks": "rule_set_131" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_open_by_handle_at", - "remarks": "rule_set_130" + "remarks": "rule_set_131" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - open_by_handle_at", - "remarks": "rule_set_130" + "remarks": "rule_set_131" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_truncate", - "remarks": "rule_set_131" + "remarks": "rule_set_132" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - truncate", - "remarks": "rule_set_131" + "remarks": "rule_set_132" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_truncate", - "remarks": "rule_set_131" + "remarks": "rule_set_132" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - truncate", - "remarks": "rule_set_131" + "remarks": "rule_set_132" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_ftruncate", - "remarks": "rule_set_132" + "remarks": "rule_set_133" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - ftruncate", - "remarks": "rule_set_132" + "remarks": "rule_set_133" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_ftruncate", - "remarks": "rule_set_132" + "remarks": "rule_set_133" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - ftruncate", - "remarks": "rule_set_132" + "remarks": "rule_set_133" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit_installed", - "remarks": "rule_set_133" + "remarks": "rule_set_134" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit Subsystem is Installed", - "remarks": "rule_set_133" + "remarks": "rule_set_134" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit_installed", - "remarks": "rule_set_133" + "remarks": "rule_set_134" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit Subsystem is Installed", - "remarks": "rule_set_133" + "remarks": "rule_set_134" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sebool_auditadm_exec_content", - "remarks": "rule_set_134" + "remarks": "rule_set_135" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable the auditadm_exec_content SELinux Boolean", - "remarks": "rule_set_134" + "remarks": "rule_set_135" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sebool_auditadm_exec_content", - "remarks": "rule_set_134" + "remarks": "rule_set_135" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable the auditadm_exec_content SELinux Boolean", - "remarks": "rule_set_134" + "remarks": "rule_set_135" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_configure_pool_and_server", - "remarks": "rule_set_135" + "remarks": "rule_set_136" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Chrony Configure Pool and Server", - "remarks": "rule_set_135" + "remarks": "rule_set_136" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_configure_pool_and_server", - "remarks": "rule_set_135" + "remarks": "rule_set_136" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Chrony Configure Pool and Server", - "remarks": "rule_set_135" + "remarks": "rule_set_136" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_or_ntpd_specify_multiple_servers", - "remarks": "rule_set_136" + "remarks": "rule_set_137" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Specify Additional Remote NTP Servers", - "remarks": "rule_set_136" + "remarks": "rule_set_137" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_or_ntpd_specify_multiple_servers", - "remarks": "rule_set_136" + "remarks": "rule_set_137" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Specify Additional Remote NTP Servers", - "remarks": "rule_set_136" + "remarks": "rule_set_137" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_specify_remote_server", - "remarks": "rule_set_137" + "remarks": "rule_set_138" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "A remote time server for Chrony is configured", - "remarks": "rule_set_137" + "remarks": "rule_set_138" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_specify_remote_server", - "remarks": "rule_set_137" + "remarks": "rule_set_138" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "A remote time server for Chrony is configured", - "remarks": "rule_set_137" + "remarks": "rule_set_138" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_chrony_installed", - "remarks": "rule_set_138" + "remarks": "rule_set_139" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "The Chrony package is installed", - "remarks": "rule_set_138" + "remarks": "rule_set_139" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_chrony_installed", - "remarks": "rule_set_138" + "remarks": "rule_set_139" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "The Chrony package is installed", - "remarks": "rule_set_138" + "remarks": "rule_set_139" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_cron_logging", - "remarks": "rule_set_139" + "remarks": "rule_set_140" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure cron Is Logging To Rsyslog", - "remarks": "rule_set_139" + "remarks": "rule_set_140" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_cron_logging", - "remarks": "rule_set_139" + "remarks": "rule_set_140" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure cron Is Logging To Rsyslog", - "remarks": "rule_set_139" + "remarks": "rule_set_140" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_140" + "remarks": "rule_set_141" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_140" + "remarks": "rule_set_141" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_140" + "remarks": "rule_set_141" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_140" + "remarks": "rule_set_141" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_141" + "remarks": "rule_set_142" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_141" + "remarks": "rule_set_142" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_141" + "remarks": "rule_set_142" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_141" + "remarks": "rule_set_142" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_142" + "remarks": "rule_set_143" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_142" + "remarks": "rule_set_143" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_142" + "remarks": "rule_set_143" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_142" + "remarks": "rule_set_143" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_nolisten", - "remarks": "rule_set_143" + "remarks": "rule_set_144" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure rsyslog Does Not Accept Remote Messages Unless Acting As Log Server", - "remarks": "rule_set_143" + "remarks": "rule_set_144" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_nolisten", - "remarks": "rule_set_143" + "remarks": "rule_set_144" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure rsyslog Does Not Accept Remote Messages Unless Acting As Log Server", - "remarks": "rule_set_143" + "remarks": "rule_set_144" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_remote_loghost", - "remarks": "rule_set_144" + "remarks": "rule_set_145" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Logs Sent To Remote Host", - "remarks": "rule_set_144" + "remarks": "rule_set_145" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_remote_loghost", - "remarks": "rule_set_144" + "remarks": "rule_set_145" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Logs Sent To Remote Host", - "remarks": "rule_set_144" + "remarks": "rule_set_145" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_remote_tls", - "remarks": "rule_set_145" + "remarks": "rule_set_146" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure TLS for rsyslog remote logging", - "remarks": "rule_set_145" + "remarks": "rule_set_146" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_remote_tls", - "remarks": "rule_set_145" + "remarks": "rule_set_146" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure TLS for rsyslog remote logging", - "remarks": "rule_set_145" + "remarks": "rule_set_146" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_remote_tls_cacert", - "remarks": "rule_set_146" + "remarks": "rule_set_147" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure CA certificate for rsyslog remote logging", - "remarks": "rule_set_146" + "remarks": "rule_set_147" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_remote_tls_cacert", - "remarks": "rule_set_146" + "remarks": "rule_set_147" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure CA certificate for rsyslog remote logging", - "remarks": "rule_set_146" + "remarks": "rule_set_147" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_chronyd_enabled", - "remarks": "rule_set_147" + "remarks": "rule_set_148" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "The Chronyd service is enabled", - "remarks": "rule_set_147" + "remarks": "rule_set_148" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_chronyd_enabled", - "remarks": "rule_set_147" + "remarks": "rule_set_148" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "The Chronyd service is enabled", - "remarks": "rule_set_147" + "remarks": "rule_set_148" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_148" + "remarks": "rule_set_149" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_148" + "remarks": "rule_set_149" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_148" + "remarks": "rule_set_149" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_148" + "remarks": "rule_set_149" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_snmpd_disabled", - "remarks": "rule_set_149" + "remarks": "rule_set_150" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable snmpd Service", - "remarks": "rule_set_149" + "remarks": "rule_set_150" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_snmpd_disabled", - "remarks": "rule_set_149" + "remarks": "rule_set_150" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable snmpd Service", - "remarks": "rule_set_149" + "remarks": "rule_set_150" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "snmpd_use_newer_protocol", - "remarks": "rule_set_150" + "remarks": "rule_set_151" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure SNMP Service to Use Only SNMPv3 or Newer", - "remarks": "rule_set_150" + "remarks": "rule_set_151" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "snmpd_use_newer_protocol", - "remarks": "rule_set_150" + "remarks": "rule_set_151" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure SNMP Service to Use Only SNMPv3 or Newer", - "remarks": "rule_set_150" + "remarks": "rule_set_151" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "network_ipv6_static_address", - "remarks": "rule_set_151" + "remarks": "rule_set_152" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Manually Assign Global IPv6 Address", - "remarks": "rule_set_151" + "remarks": "rule_set_152" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "network_ipv6_static_address", - "remarks": "rule_set_151" + "remarks": "rule_set_152" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Manually Assign Global IPv6 Address", - "remarks": "rule_set_151" + "remarks": "rule_set_152" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "wireless_disable_interfaces", - "remarks": "rule_set_152" + "remarks": "rule_set_153" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Deactivate Wireless Network Interfaces", - "remarks": "rule_set_152" + "remarks": "rule_set_153" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "wireless_disable_interfaces", - "remarks": "rule_set_152" + "remarks": "rule_set_153" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Deactivate Wireless Network Interfaces", - "remarks": "rule_set_152" + "remarks": "rule_set_153" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_opensc_card_drivers", - "remarks": "rule_set_153" + "remarks": "rule_set_154" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure opensc Smart Card Drivers", - "remarks": "rule_set_153" + "remarks": "rule_set_154" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_opensc_card_drivers", - "remarks": "rule_set_153" + "remarks": "rule_set_154" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure opensc Smart Card Drivers", - "remarks": "rule_set_153" + "remarks": "rule_set_154" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_opensc_installed", - "remarks": "rule_set_154" + "remarks": "rule_set_155" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install the opensc Package For Multifactor Authentication", - "remarks": "rule_set_154" + "remarks": "rule_set_155" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_opensc_installed", - "remarks": "rule_set_154" + "remarks": "rule_set_155" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install the opensc Package For Multifactor Authentication", - "remarks": "rule_set_154" + "remarks": "rule_set_155" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_pcsc-lite_installed", - "remarks": "rule_set_155" + "remarks": "rule_set_156" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install the pcsc-lite package", - "remarks": "rule_set_155" + "remarks": "rule_set_156" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_pcsc-lite_installed", - "remarks": "rule_set_155" + "remarks": "rule_set_156" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install the pcsc-lite package", - "remarks": "rule_set_155" + "remarks": "rule_set_156" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_pcsc-lite-ccid_installed", - "remarks": "rule_set_156" + "remarks": "rule_set_157" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install the pcsc-lite-ccid package", - "remarks": "rule_set_156" + "remarks": "rule_set_157" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_pcsc-lite-ccid_installed", - "remarks": "rule_set_156" + "remarks": "rule_set_157" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install the pcsc-lite-ccid package", - "remarks": "rule_set_156" + "remarks": "rule_set_157" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_sudo_installed", - "remarks": "rule_set_157" + "remarks": "rule_set_158" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install sudo Package", - "remarks": "rule_set_157" + "remarks": "rule_set_158" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_sudo_installed", - "remarks": "rule_set_157" + "remarks": "rule_set_158" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install sudo Package", - "remarks": "rule_set_157" + "remarks": "rule_set_158" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_pcscd_enabled", - "remarks": "rule_set_158" + "remarks": "rule_set_159" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable the pcscd Service", - "remarks": "rule_set_158" + "remarks": "rule_set_159" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_pcscd_enabled", - "remarks": "rule_set_158" + "remarks": "rule_set_159" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable the pcscd Service", - "remarks": "rule_set_158" + "remarks": "rule_set_159" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_firewalld_ports", - "remarks": "rule_set_159" + "remarks": "rule_set_160" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Firewalld Ports", - "remarks": "rule_set_159" + "remarks": "rule_set_160" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_firewalld_ports", - "remarks": "rule_set_159" + "remarks": "rule_set_160" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Firewalld Ports", - "remarks": "rule_set_159" + "remarks": "rule_set_160" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_firewalld_default_zone", - "remarks": "rule_set_160" + "remarks": "rule_set_161" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Default firewalld Zone for Incoming Packets", - "remarks": "rule_set_160" + "remarks": "rule_set_161" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_firewalld_default_zone", - "remarks": "rule_set_160" + "remarks": "rule_set_161" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Default firewalld Zone for Incoming Packets", - "remarks": "rule_set_160" + "remarks": "rule_set_161" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_usbguard_installed", - "remarks": "rule_set_161" + "remarks": "rule_set_162" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install usbguard Package", - "remarks": "rule_set_161" + "remarks": "rule_set_162" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_usbguard_installed", - "remarks": "rule_set_161" + "remarks": "rule_set_162" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install usbguard Package", - "remarks": "rule_set_161" + "remarks": "rule_set_162" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_usbguard_enabled", - "remarks": "rule_set_162" + "remarks": "rule_set_163" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable the USBGuard Service", - "remarks": "rule_set_162" + "remarks": "rule_set_163" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_usbguard_enabled", - "remarks": "rule_set_162" + "remarks": "rule_set_163" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable the USBGuard Service", - "remarks": "rule_set_162" + "remarks": "rule_set_163" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "system_booted_in_fips_mode", - "remarks": "rule_set_163" + "remarks": "rule_set_164" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that the system was booted with fips=1", - "remarks": "rule_set_163" + "remarks": "rule_set_164" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "system_booted_in_fips_mode", - "remarks": "rule_set_163" + "remarks": "rule_set_164" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that the system was booted with fips=1", - "remarks": "rule_set_163" + "remarks": "rule_set_164" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "enable_fips_mode", - "remarks": "rule_set_164" + "remarks": "rule_set_165" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable FIPS Mode", - "remarks": "rule_set_164" + "remarks": "rule_set_165" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "enable_fips_mode", - "remarks": "rule_set_164" + "remarks": "rule_set_165" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable FIPS Mode", - "remarks": "rule_set_164" + "remarks": "rule_set_165" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_private_key", - "remarks": "rule_set_165" + "remarks": "rule_set_166" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Private *_key Key Files", - "remarks": "rule_set_165" + "remarks": "rule_set_166" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_private_key", - "remarks": "rule_set_165" + "remarks": "rule_set_166" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Private *_key Key Files", - "remarks": "rule_set_165" + "remarks": "rule_set_166" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dnf-automatic_apply_updates", - "remarks": "rule_set_166" + "remarks": "rule_set_167" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure dnf-automatic to Install Available Updates Automatically", - "remarks": "rule_set_166" + "remarks": "rule_set_167" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dnf-automatic_apply_updates", - "remarks": "rule_set_166" + "remarks": "rule_set_167" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure dnf-automatic to Install Available Updates Automatically", - "remarks": "rule_set_166" + "remarks": "rule_set_167" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_libdnf-plugin-subscription-manager_installed", - "remarks": "rule_set_167" + "remarks": "rule_set_168" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install libdnf-plugin-subscription-manager Package", - "remarks": "rule_set_167" + "remarks": "rule_set_168" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_libdnf-plugin-subscription-manager_installed", - "remarks": "rule_set_167" + "remarks": "rule_set_168" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install libdnf-plugin-subscription-manager Package", - "remarks": "rule_set_167" + "remarks": "rule_set_168" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_subscription-manager_installed", - "remarks": "rule_set_168" + "remarks": "rule_set_169" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install subscription-manager Package", - "remarks": "rule_set_168" + "remarks": "rule_set_169" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_subscription-manager_installed", - "remarks": "rule_set_168" + "remarks": "rule_set_169" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install subscription-manager Package", - "remarks": "rule_set_168" + "remarks": "rule_set_169" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_shelllogin_for_systemaccounts", - "remarks": "rule_set_169" + "remarks": "rule_set_170" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", - "remarks": "rule_set_169" + "remarks": "rule_set_170" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_shelllogin_for_systemaccounts", - "remarks": "rule_set_169" + "remarks": "rule_set_170" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", - "remarks": "rule_set_169" + "remarks": "rule_set_170" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "secure_boot_enabled", - "remarks": "rule_set_170" + "remarks": "rule_set_171" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Secure Boot is enabled", - "remarks": "rule_set_170" + "remarks": "rule_set_171" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "secure_boot_enabled", - "remarks": "rule_set_170" + "remarks": "rule_set_171" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Secure Boot is enabled", - "remarks": "rule_set_170" + "remarks": "rule_set_171" } ], "control-implementations": [ { - "uuid": "ab08d6a6-d5ce-4126-aecd-e3466d3d1c79", + "uuid": "193e8321-d556-41e5-babc-abb4a5981b91", "source": "trestle://profiles/rhel10-ism_o-secret/profile.json", "description": "Control implementation for ism_o_secret", "props": [ @@ -9196,7 +9237,7 @@ ], "implemented-requirements": [ { - "uuid": "fc1efe41-f20f-47bc-b6ac-cdd6961f0cd4", + "uuid": "5c9d6857-0e4b-4efa-9a3a-b3b8122c9942", "control-id": "ism_o_1557", "description": "No notes for control-id 1557.", "props": [ @@ -9298,7 +9339,7 @@ ] }, { - "uuid": "76c79edf-7bc0-43c6-9abf-7deb8d477b4e", + "uuid": "853bfac8-2d70-4d88-8fff-c67271fe3b33", "control-id": "ism_o_1560", "description": "No notes for control-id 1560.", "props": [ @@ -9400,7 +9441,7 @@ ] }, { - "uuid": "2a934db1-d655-4618-a560-eddc45c5d039", + "uuid": "a7b34f98-350e-4035-b0fc-9aea970146b4", "control-id": "ism_o_0418", "description": "No notes for control-id 0418.", "props": [ @@ -9482,7 +9523,7 @@ ] }, { - "uuid": "1b073df7-02ba-48e2-9d3e-c942f86690fb", + "uuid": "dc52994b-e159-4d0a-9dfd-b48576400f12", "control-id": "ism_o_0421", "description": "No notes for control-id 0421.", "props": [ @@ -9584,7 +9625,7 @@ ] }, { - "uuid": "7ae78c2b-8571-40a9-a427-cc09403d4083", + "uuid": "7895dd3e-9965-45ed-ad4d-d5f7df1efd97", "control-id": "ism_o_0484", "description": "No notes for control-id 0484.", "props": [ @@ -9611,7 +9652,7 @@ ] }, { - "uuid": "23cab23c-9e56-4cc6-bddf-8170502407e1", + "uuid": "4cc75712-f972-48b5-894a-87ca545dd004", "control-id": "ism_o_0487", "description": "The description for control-id ism_o_0487.", "props": [ @@ -9624,7 +9665,7 @@ ] }, { - "uuid": "892a0361-c5bf-442f-8d9e-76847bed4839", + "uuid": "b7006321-c33c-4d40-9218-33b0922312ba", "control-id": "ism_o_0582", "description": "No notes for control-id 0582.", "props": [ @@ -9876,7 +9917,7 @@ ] }, { - "uuid": "91842d56-8969-4bb2-9372-620de0cdcb80", + "uuid": "72c8a655-7aff-472d-a5d9-49527eca1818", "control-id": "ism_o_0846", "description": "No notes for control-id 0846.", "props": [ @@ -9983,7 +10024,7 @@ ] }, { - "uuid": "a512f0df-3e70-4247-a78c-819f6d912efa", + "uuid": "50b100ff-2d52-47f4-8297-912282271cd0", "control-id": "ism_o_0974", "description": "This needs reevaluation.", "props": [ @@ -10085,7 +10126,7 @@ ] }, { - "uuid": "cf99d618-e1ec-4753-93d1-c039fa00fbf3", + "uuid": "5c91bc0a-91e9-4561-97b9-dea7c1004e86", "control-id": "ism_o_0988", "description": "No notes for control-id 0988.", "props": [ @@ -10162,7 +10203,7 @@ ] }, { - "uuid": "804d4dc5-2eb6-4a81-b99e-47a6bf5ee9b7", + "uuid": "a52400ac-f25e-438a-9387-04bb1e76af10", "control-id": "ism_o_1034", "description": "No notes for control-id 1034.", "props": [ @@ -10179,7 +10220,7 @@ ] }, { - "uuid": "53681e20-1a56-4e85-a740-3b822fa9fec2", + "uuid": "cf960649-e5fd-4ae2-a6c6-f5c75307a5e8", "control-id": "ism_o_1055", "description": "Needs reevaluation", "props": [ @@ -10256,7 +10297,7 @@ ] }, { - "uuid": "31582521-39f0-49a8-aac8-9ad9831e0268", + "uuid": "6a4e6b88-c1a4-4f1e-9a8c-94e752e06270", "control-id": "ism_o_1173", "description": "No notes for control-id 1173.", "props": [ @@ -10358,7 +10399,7 @@ ] }, { - "uuid": "3668ecbd-1169-46da-b8ce-42bd069c7e82", + "uuid": "a6de81f1-d641-41f9-95e9-9b5097a041a9", "control-id": "ism_o_1277", "description": "No notes for control-id 1277.", "props": [ @@ -10370,7 +10411,7 @@ ] }, { - "uuid": "328c4095-9871-4f7a-8170-c3977a5ff0cb", + "uuid": "12efd63b-f206-4c7f-ab77-4f6ec9e12384", "control-id": "ism_o_1288", "description": "No notes for control-id 1288.", "props": [ @@ -10387,7 +10428,7 @@ ] }, { - "uuid": "e005e9e0-56cf-430f-9bcb-80a292d02712", + "uuid": "67dbb61c-41ff-4002-a6fb-bb4318c12a1b", "control-id": "ism_o_1311", "description": "No notes for control-id 1311.", "props": [ @@ -10409,7 +10450,7 @@ ] }, { - "uuid": "945893ea-3b16-44cf-ab42-6a918c433610", + "uuid": "97ec7d61-0eed-4b44-8ffc-3659a105ed18", "control-id": "ism_o_1315", "description": "No notes for control-id 1315.", "props": [ @@ -10431,7 +10472,7 @@ ] }, { - "uuid": "010d0484-9e93-479c-bf98-1cd6a509f8db", + "uuid": "3d26df2a-7382-47d1-bb63-3861a5d9ea91", "control-id": "ism_o_1319", "description": "No notes for control-id 1319.", "props": [ @@ -10453,7 +10494,7 @@ ] }, { - "uuid": "c5c908fc-1fba-4b5e-b95a-b4c32af6481c", + "uuid": "8cb05474-f36d-4183-bfe4-a9af6c571ddd", "control-id": "ism_o_1341", "description": "No notes for control-id 1341.", "props": [ @@ -10470,7 +10511,7 @@ ] }, { - "uuid": "d92840fe-1490-4f92-9047-b5da492d1800", + "uuid": "f931f87d-edec-4b55-b91d-23fcab73ec58", "control-id": "ism_o_1386", "description": "This needs reevaluation.", "props": [ @@ -10512,7 +10553,7 @@ ] }, { - "uuid": "8069fd7b-b27e-4a0c-928b-39015a656cc7", + "uuid": "d9cdc03c-305a-4ad1-90b2-5722739717bc", "control-id": "ism_o_1401", "description": "No notes for control-id 1401.", "props": [ @@ -10614,7 +10655,7 @@ ] }, { - "uuid": "c2687160-24ff-4ce2-ab84-983905317352", + "uuid": "3f383890-9b04-4808-b8f7-aedb04fb67f9", "control-id": "ism_o_1402", "description": "No notes for control-id 1402.", "props": [ @@ -10691,7 +10732,7 @@ ] }, { - "uuid": "e33428fb-b4a1-45b3-8d18-4240da066760", + "uuid": "7c2f7f80-76e4-4723-9967-076ea7bfe1ed", "control-id": "ism_o_1405", "description": "No notes for control-id 1405.", "props": [ @@ -10768,7 +10809,7 @@ ] }, { - "uuid": "9c091a05-2b32-4ce0-9af8-03e16e217b46", + "uuid": "11925089-6311-4994-afd8-f2030620a2f1", "control-id": "ism_o_1416", "description": "No notes for control-id 1416.", "props": [ @@ -10790,7 +10831,7 @@ ] }, { - "uuid": "69ed0dc2-ea48-4aea-9c9c-47004eb68c89", + "uuid": "d28c99a2-7cbb-4ea1-b2c7-f7655ed37aaa", "control-id": "ism_o_1417", "description": "No notes for control-id 1417.", "props": [ @@ -10807,7 +10848,7 @@ ] }, { - "uuid": "43d1d21b-a13a-4de3-bc81-23c0d309be96", + "uuid": "0a570691-1c73-4c6c-8f9d-5bd26314b85f", "control-id": "ism_o_1418", "description": "No notes for control-id 1418.", "props": [ @@ -10829,7 +10870,7 @@ ] }, { - "uuid": "1f13f92a-1c91-4914-a65a-238e182870f9", + "uuid": "1680da3b-f745-4ab7-a90a-4c627a1d6303", "control-id": "ism_o_1446", "description": "No notes for control-id 1446.", "props": [ @@ -10856,7 +10897,7 @@ ] }, { - "uuid": "272bcd82-b559-40ba-869b-da7a502813b4", + "uuid": "7853aa52-ec09-476e-b94b-d84c4174e919", "control-id": "ism_o_1449", "description": "This needs more", "props": [ @@ -10873,7 +10914,7 @@ ] }, { - "uuid": "a4de75e0-01ce-40e3-b67c-86d0585ef7ab", + "uuid": "300de444-db2e-4ded-a923-4597580c977a", "control-id": "ism_o_1467", "description": "No notes for control-id 1467.", "props": [ @@ -10900,7 +10941,7 @@ ] }, { - "uuid": "533ca3ff-8132-405f-acdf-67cbf7c05500", + "uuid": "ffc35925-7323-404c-94d6-f2837033b1f2", "control-id": "ism_o_1483", "description": "No notes for control-id 1483.", "props": [ @@ -10927,7 +10968,7 @@ ] }, { - "uuid": "d2da86b4-d0a9-4e3a-840e-060e1ac13a81", + "uuid": "483a23d6-a8fd-4920-8093-a2f7032f9786", "control-id": "ism_o_1491", "description": "No notes for control-id 1491.", "props": [ @@ -10944,7 +10985,7 @@ ] }, { - "uuid": "a5bd4481-6183-4fd1-9c6c-206e095037b5", + "uuid": "addc3469-34f7-49c9-a6b7-400af8807c05", "control-id": "ism_o_1493", "description": "No notes for control-id 1493.", "props": [ @@ -10988,6 +11029,11 @@ "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_redhat_gpgkey_installed" }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "package_sequoia-sq_installed" + }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", @@ -10996,7 +11042,7 @@ ] }, { - "uuid": "d63a2f5e-bd6e-4149-bd10-b08ce97e542f", + "uuid": "6ffe29cc-ccfa-465d-a4ca-f55d350cd045", "control-id": "ism_o_1504", "description": "No notes for control-id 1504.", "props": [ @@ -11098,7 +11144,7 @@ ] }, { - "uuid": "803099ec-e60f-4532-81b4-0dd20a50ae91", + "uuid": "73f2053f-44d3-4780-882d-cd01f0e20ffe", "control-id": "ism_o_1505", "description": "No notes for control-id 1505.", "props": [ @@ -11200,7 +11246,7 @@ ] }, { - "uuid": "93f38392-7b29-410d-b89e-b698e5d243c0", + "uuid": "22cbb624-cbb8-4d65-802a-59f6819f0fc8", "control-id": "ism_o_1506", "description": "As of OpenSSH 7.6, OpenSSH only supports SSH 2.", "props": [ @@ -11212,7 +11258,7 @@ ] }, { - "uuid": "86dc2772-6bb6-4e98-bd68-0ae1419c81d2", + "uuid": "06e3e826-53de-42d5-98bd-e3acf92ca096", "control-id": "ism_o_1546", "description": "No notes for control-id 1546.", "props": [ @@ -11369,7 +11415,7 @@ ] }, { - "uuid": "b95ec5b4-241e-4dfa-9e7f-fdcb9fa29365", + "uuid": "00e0ce5a-add0-4fcb-a56e-7013151ca6a8", "control-id": "ism_o_1552", "description": "No notes for control-id 1552.", "props": [ @@ -11381,7 +11427,7 @@ ] }, { - "uuid": "fcd52e3e-5add-458e-bd31-036e15314ad8", + "uuid": "2b9d3bab-2672-4212-a815-2faa62d1b531", "control-id": "ism_o_1558", "description": "No notes for control-id 1558.", "props": [ @@ -11483,7 +11529,7 @@ ] }, { - "uuid": "54ffcbbd-4eca-4e6c-925c-f516efbb72ee", + "uuid": "8040ab1e-7726-4dd2-ac2f-da9d05628781", "control-id": "ism_o_1559", "description": "No notes for control-id 1559.", "props": [ @@ -11585,7 +11631,7 @@ ] }, { - "uuid": "bbd98af4-ba9e-49bb-b3c6-7880cc42638d", + "uuid": "d3fa92cb-9561-4e52-85b0-d3e2f03be698", "control-id": "ism_o_1745", "description": "The description for control-id ism_o_1745.", "props": [ diff --git a/component-definitions/rhel10/rhel10-ism_o-top_secret/component-definition.json b/component-definitions/rhel10/rhel10-ism_o-top_secret/component-definition.json index 7e2d3873..7947a54a 100644 --- a/component-definitions/rhel10/rhel10-ism_o-top_secret/component-definition.json +++ b/component-definitions/rhel10/rhel10-ism_o-top_secret/component-definition.json @@ -3,8 +3,8 @@ "uuid": "6ca8c4fe-f75b-4070-a178-188a41fecbf0", "metadata": { "title": "Component definition for rhel10", - "last-modified": "2025-12-11T18:29:11.692013+00:00", - "version": "1.3", + "last-modified": "2025-12-17T11:17:19.541237+00:00", + "version": "1.4", "oscal-version": "1.1.3" }, "components": [ @@ -167,7 +167,7 @@ { "name": "Parameter_Value_Alternatives_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -317,1975 +317,1987 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_never_disabled", + "value": "package_sequoia-sq_installed", "remarks": "rule_set_007" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled for All dnf Package Repositories", + "value": "Install sequoia-sq Package", "remarks": "rule_set_007" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_local_packages", + "value": "ensure_gpgcheck_never_disabled", "remarks": "rule_set_008" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled for Local Packages", + "value": "Ensure gpgcheck Enabled for All dnf Package Repositories", "remarks": "rule_set_008" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_globally_activated", + "value": "ensure_gpgcheck_local_packages", "remarks": "rule_set_009" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled In Main dnf Configuration", + "value": "Ensure gpgcheck Enabled for Local Packages", "remarks": "rule_set_009" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dnf-automatic_security_updates_only", + "value": "ensure_gpgcheck_globally_activated", "remarks": "rule_set_010" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure dnf-automatic to Install Only Security Updates", + "value": "Ensure gpgcheck Enabled In Main dnf Configuration", "remarks": "rule_set_010" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_no_uid_except_zero", + "value": "dnf-automatic_security_updates_only", "remarks": "rule_set_011" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Only Root Has UID 0", + "value": "Configure dnf-automatic to Install Only Security Updates", "remarks": "rule_set_011" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sudo_remove_nopasswd", + "value": "accounts_no_uid_except_zero", "remarks": "rule_set_012" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD", + "value": "Verify Only Root Has UID 0", "remarks": "rule_set_012" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sudo_remove_no_authenticate", + "value": "sudo_remove_nopasswd", "remarks": "rule_set_013" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo !authenticate", + "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD", "remarks": "rule_set_013" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sudo_require_authentication", + "value": "sudo_remove_no_authenticate", "remarks": "rule_set_014" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo", + "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo !authenticate", "remarks": "rule_set_014" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_fapolicyd_installed", + "value": "sudo_require_authentication", "remarks": "rule_set_015" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install fapolicyd Package", + "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo", "remarks": "rule_set_015" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_fapolicyd_enabled", + "value": "package_fapolicyd_installed", "remarks": "rule_set_016" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable the File Access Policy Service", + "value": "Install fapolicyd Package", "remarks": "rule_set_016" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_crypto_policy", + "value": "service_fapolicyd_enabled", "remarks": "rule_set_017" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure System Cryptography Policy", + "value": "Enable the File Access Policy Service", "remarks": "rule_set_017" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_ssh_crypto_policy", + "value": "configure_crypto_policy", "remarks": "rule_set_018" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure SSH to use System Crypto Policy", + "value": "Configure System Cryptography Policy", "remarks": "rule_set_018" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_use_directory_configuration", + "value": "configure_ssh_crypto_policy", "remarks": "rule_set_019" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Distribute the SSH Server configuration to multiple files in a config directory.", + "value": "Configure SSH to use System Crypto Policy", "remarks": "rule_set_019" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_root_login", + "value": "sshd_use_directory_configuration", "remarks": "rule_set_020" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Root Login", + "value": "Distribute the SSH Server configuration to multiple files in a config directory.", "remarks": "rule_set_020" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_gssapi_auth", + "value": "sshd_disable_root_login", "remarks": "rule_set_021" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable GSSAPI Authentication", + "value": "Disable SSH Root Login", "remarks": "rule_set_021" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_print_last_log", + "value": "sshd_disable_gssapi_auth", "remarks": "rule_set_022" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable SSH Print Last Log", + "value": "Disable GSSAPI Authentication", "remarks": "rule_set_022" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_do_not_permit_user_env", + "value": "sshd_print_last_log", "remarks": "rule_set_023" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Do Not Allow SSH Environment Options", + "value": "Enable SSH Print Last Log", "remarks": "rule_set_023" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_rhosts", + "value": "sshd_do_not_permit_user_env", "remarks": "rule_set_024" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Support for .rhosts Files", + "value": "Do Not Allow SSH Environment Options", "remarks": "rule_set_024" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_set_loglevel_info", + "value": "sshd_disable_rhosts", "remarks": "rule_set_025" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set LogLevel to INFO", + "value": "Disable SSH Support for .rhosts Files", "remarks": "rule_set_025" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_empty_passwords", + "value": "sshd_set_loglevel_info", "remarks": "rule_set_026" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Access via Empty Passwords", + "value": "Set LogLevel to INFO", "remarks": "rule_set_026" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_user_known_hosts", + "value": "sshd_disable_empty_passwords", "remarks": "rule_set_027" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable SSH Support for User Known Hosts", + "value": "Disable SSH Access via Empty Passwords", "remarks": "rule_set_027" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_enable_strictmodes", + "value": "sshd_disable_user_known_hosts", "remarks": "rule_set_028" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Use of Strict Mode Checking", + "value": "Disable SSH Support for User Known Hosts", "remarks": "rule_set_028" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_rsyslog_installed", + "value": "sshd_enable_strictmodes", "remarks": "rule_set_029" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure rsyslog is Installed", + "value": "Enable Use of Strict Mode Checking", "remarks": "rule_set_029" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_rsyslog_enabled", + "value": "package_rsyslog_installed", "remarks": "rule_set_030" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable rsyslog Service", + "value": "Ensure rsyslog is Installed", "remarks": "rule_set_030" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_auditd_enabled", + "value": "service_rsyslog_enabled", "remarks": "rule_set_031" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable auditd Service", + "value": "Enable rsyslog Service", "remarks": "rule_set_031" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "auditd_data_retention_flush", + "value": "service_auditd_enabled", "remarks": "rule_set_032" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure auditd flush priority", + "value": "Enable auditd Service", "remarks": "rule_set_032" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "auditd_local_events", + "value": "auditd_data_retention_flush", "remarks": "rule_set_033" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Include Local Events in Audit Logs", + "value": "Configure auditd flush priority", "remarks": "rule_set_033" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "auditd_write_logs", + "value": "auditd_local_events", "remarks": "rule_set_034" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Write Audit Logs to the Disk", + "value": "Include Local Events in Audit Logs", "remarks": "rule_set_034" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "auditd_log_format", + "value": "auditd_write_logs", "remarks": "rule_set_035" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Resolve information before writing to audit logs", + "value": "Write Audit Logs to the Disk", "remarks": "rule_set_035" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "auditd_freq", + "value": "auditd_log_format", "remarks": "rule_set_036" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set number of records to cause an explicit flush to audit logs", + "value": "Resolve information before writing to audit logs", "remarks": "rule_set_036" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "auditd_name_format", + "value": "auditd_freq", "remarks": "rule_set_037" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set type of computer node name logging in audit logs", + "value": "Set number of records to cause an explicit flush to audit logs", "remarks": "rule_set_037" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_login_events_faillock", + "value": "auditd_name_format", "remarks": "rule_set_038" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Logon and Logout Events - faillock", + "value": "Set type of computer node name logging in audit logs", "remarks": "rule_set_038" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_time_adjtimex", + "value": "audit_rules_login_events_faillock", "remarks": "rule_set_039" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record attempts to alter time through adjtimex", + "value": "Record Attempts to Alter Logon and Logout Events - faillock", "remarks": "rule_set_039" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_time_clock_settime", + "value": "audit_rules_time_adjtimex", "remarks": "rule_set_040" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Time Through clock_settime", + "value": "Record attempts to alter time through adjtimex", "remarks": "rule_set_040" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_time_watch_localtime", + "value": "audit_rules_time_clock_settime", "remarks": "rule_set_041" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter the localtime File", + "value": "Record Attempts to Alter Time Through clock_settime", "remarks": "rule_set_041" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_time_settimeofday", + "value": "audit_rules_time_watch_localtime", "remarks": "rule_set_042" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record attempts to alter time through settimeofday", + "value": "Record Attempts to Alter the localtime File", "remarks": "rule_set_042" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_time_stime", + "value": "audit_rules_time_settimeofday", "remarks": "rule_set_043" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Time Through stime", + "value": "Record attempts to alter time through settimeofday", "remarks": "rule_set_043" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_execution_restorecon", + "value": "audit_rules_time_stime", "remarks": "rule_set_044" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Any Attempts to Run restorecon", + "value": "Record Attempts to Alter Time Through stime", "remarks": "rule_set_044" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_execution_chcon", + "value": "audit_rules_execution_restorecon", "remarks": "rule_set_045" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Any Attempts to Run chcon", + "value": "Record Any Attempts to Run restorecon", "remarks": "rule_set_045" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_execution_semanage", + "value": "audit_rules_execution_chcon", "remarks": "rule_set_046" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Any Attempts to Run semanage", + "value": "Record Any Attempts to Run chcon", "remarks": "rule_set_046" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_execution_setsebool", + "value": "audit_rules_execution_semanage", "remarks": "rule_set_047" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Any Attempts to Run setsebool", + "value": "Record Any Attempts to Run semanage", "remarks": "rule_set_047" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_execution_setfiles", + "value": "audit_rules_execution_setsebool", "remarks": "rule_set_048" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Any Attempts to Run setfiles", + "value": "Record Any Attempts to Run setsebool", "remarks": "rule_set_048" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_execution_seunshare", + "value": "audit_rules_execution_setfiles", "remarks": "rule_set_049" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Any Attempts to Run seunshare", + "value": "Record Any Attempts to Run setfiles", "remarks": "rule_set_049" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_sysadmin_actions", + "value": "audit_rules_execution_seunshare", "remarks": "rule_set_050" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure auditd Collects System Administrator Actions", + "value": "Record Any Attempts to Run seunshare", "remarks": "rule_set_050" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_networkconfig_modification", + "value": "audit_rules_sysadmin_actions", "remarks": "rule_set_051" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Network Environment", + "value": "Ensure auditd Collects System Administrator Actions", "remarks": "rule_set_051" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_usergroup_modification_group", + "value": "audit_rules_networkconfig_modification", "remarks": "rule_set_052" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify User/Group Information - /etc/group", + "value": "Record Events that Modify the System's Network Environment", "remarks": "rule_set_052" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_usergroup_modification_gshadow", + "value": "audit_rules_usergroup_modification_group", "remarks": "rule_set_053" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify User/Group Information - /etc/gshadow", + "value": "Record Events that Modify User/Group Information - /etc/group", "remarks": "rule_set_053" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_usergroup_modification_opasswd", + "value": "audit_rules_usergroup_modification_gshadow", "remarks": "rule_set_054" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", + "value": "Record Events that Modify User/Group Information - /etc/gshadow", "remarks": "rule_set_054" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_usergroup_modification_passwd", + "value": "audit_rules_usergroup_modification_opasswd", "remarks": "rule_set_055" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify User/Group Information - /etc/passwd", + "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", "remarks": "rule_set_055" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_usergroup_modification_shadow", + "value": "audit_rules_usergroup_modification_passwd", "remarks": "rule_set_056" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify User/Group Information - /etc/shadow", + "value": "Record Events that Modify User/Group Information - /etc/passwd", "remarks": "rule_set_056" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_dac_modification_chmod", + "value": "audit_rules_usergroup_modification_shadow", "remarks": "rule_set_057" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", + "value": "Record Events that Modify User/Group Information - /etc/shadow", "remarks": "rule_set_057" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_dac_modification_chown", + "value": "audit_rules_dac_modification_chmod", "remarks": "rule_set_058" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Discretionary Access Controls - chown", + "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", "remarks": "rule_set_058" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_kernel_module_loading", + "value": "audit_rules_dac_modification_chown", "remarks": "rule_set_059" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading", + "value": "Record Events that Modify the System's Discretionary Access Controls - chown", "remarks": "rule_set_059" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_randomize_va_space", + "value": "audit_rules_kernel_module_loading", "remarks": "rule_set_060" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Randomized Layout of Virtual Address Space", + "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading", "remarks": "rule_set_060" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_exec_shield", + "value": "sysctl_kernel_randomize_va_space", "remarks": "rule_set_061" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable ExecShield via sysctl", + "value": "Enable Randomized Layout of Virtual Address Space", "remarks": "rule_set_061" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_kptr_restrict", + "value": "sysctl_kernel_exec_shield", "remarks": "rule_set_062" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict Exposed Kernel Pointer Addresses Access", + "value": "Enable ExecShield via sysctl", "remarks": "rule_set_062" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_dmesg_restrict", + "value": "sysctl_kernel_kptr_restrict", "remarks": "rule_set_063" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict Access to Kernel Message Buffer", + "value": "Restrict Exposed Kernel Pointer Addresses Access", "remarks": "rule_set_063" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_kexec_load_disabled", + "value": "sysctl_kernel_dmesg_restrict", "remarks": "rule_set_064" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kernel Image Loading", + "value": "Restrict Access to Kernel Message Buffer", "remarks": "rule_set_064" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_yama_ptrace_scope", + "value": "sysctl_kernel_kexec_load_disabled", "remarks": "rule_set_065" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict usage of ptrace to descendant processes", + "value": "Disable Kernel Image Loading", "remarks": "rule_set_065" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_kernel_unprivileged_bpf_disabled", + "value": "sysctl_kernel_yama_ptrace_scope", "remarks": "rule_set_066" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Access to Network bpf() Syscall From Unprivileged Processes", + "value": "Restrict usage of ptrace to descendant processes", "remarks": "rule_set_066" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sysctl_net_core_bpf_jit_harden", + "value": "sysctl_kernel_unprivileged_bpf_disabled", "remarks": "rule_set_067" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Harden the operation of the BPF just-in-time compiler", + "value": "Disable Access to Network bpf() Syscall From Unprivileged Processes", "remarks": "rule_set_067" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "selinux_state", + "value": "sysctl_net_core_bpf_jit_harden", "remarks": "rule_set_068" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure SELinux State is Enforcing", + "value": "Harden the operation of the BPF just-in-time compiler", "remarks": "rule_set_068" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "selinux_policytype", + "value": "selinux_state", "remarks": "rule_set_069" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure SELinux Policy", + "value": "Ensure SELinux State is Enforcing", "remarks": "rule_set_069" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_unauthorized_sgid", + "value": "selinux_policytype", "remarks": "rule_set_070" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All SGID Executables Are Authorized", + "value": "Configure SELinux Policy", "remarks": "rule_set_070" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_unauthorized_suid", + "value": "file_permissions_unauthorized_sgid", "remarks": "rule_set_071" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All SUID Executables Are Authorized", + "value": "Ensure All SGID Executables Are Authorized", "remarks": "rule_set_071" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_unauthorized_world_writable", + "value": "file_permissions_unauthorized_suid", "remarks": "rule_set_072" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure No World-Writable Files Exist", + "value": "Ensure All SUID Executables Are Authorized", "remarks": "rule_set_072" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dir_perms_world_writable_sticky_bits", + "value": "file_permissions_unauthorized_world_writable", "remarks": "rule_set_073" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify that All World-Writable Directories Have Sticky Bits Set", + "value": "Ensure No World-Writable Files Exist", "remarks": "rule_set_073" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_library_dirs", + "value": "dir_perms_world_writable_sticky_bits", "remarks": "rule_set_074" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify that Shared Library Files Have Restrictive Permissions", + "value": "Verify that All World-Writable Directories Have Sticky Bits Set", "remarks": "rule_set_074" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_ownership_binary_dirs", + "value": "file_permissions_library_dirs", "remarks": "rule_set_075" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify that System Executables Have Root Ownership", + "value": "Verify that Shared Library Files Have Restrictive Permissions", "remarks": "rule_set_075" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_binary_dirs", + "value": "file_ownership_binary_dirs", "remarks": "rule_set_076" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify that System Executables Have Restrictive Permissions", + "value": "Verify that System Executables Have Root Ownership", "remarks": "rule_set_076" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_ownership_library_dirs", + "value": "file_permissions_binary_dirs", "remarks": "rule_set_077" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify that Shared Library Files Have Root Ownership", + "value": "Verify that System Executables Have Restrictive Permissions", "remarks": "rule_set_077" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_empty_passwords", + "value": "file_ownership_library_dirs", "remarks": "rule_set_078" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Prevent Login to Accounts With Empty Password", + "value": "Verify that Shared Library Files Have Root Ownership", "remarks": "rule_set_078" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_dev_shm_nodev", + "value": "no_empty_passwords", "remarks": "rule_set_079" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add nodev Option to /dev/shm", + "value": "Prevent Login to Accounts With Empty Password", "remarks": "rule_set_079" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_dev_shm_nosuid", + "value": "mount_option_dev_shm_nodev", "remarks": "rule_set_080" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add nosuid Option to /dev/shm", + "value": "Add nodev Option to /dev/shm", "remarks": "rule_set_080" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "mount_option_dev_shm_noexec", + "value": "mount_option_dev_shm_nosuid", "remarks": "rule_set_081" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Add noexec Option to /dev/shm", + "value": "Add nosuid Option to /dev/shm", "remarks": "rule_set_081" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_firewalld_installed", + "value": "mount_option_dev_shm_noexec", "remarks": "rule_set_082" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install firewalld Package", + "value": "Add noexec Option to /dev/shm", "remarks": "rule_set_082" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_firewalld_enabled", + "value": "package_firewalld_installed", "remarks": "rule_set_083" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify firewalld Enabled", + "value": "Install firewalld Package", "remarks": "rule_set_083" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "network_sniffer_disabled", + "value": "service_firewalld_enabled", "remarks": "rule_set_084" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure System is Not Acting as a Network Sniffer", + "value": "Verify firewalld Enabled", "remarks": "rule_set_084" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_maximum_age_login_defs", + "value": "network_sniffer_disabled", "remarks": "rule_set_085" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Maximum Age", + "value": "Ensure System is Not Acting as a Network Sniffer", "remarks": "rule_set_085" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_minimum_age_login_defs", + "value": "accounts_maximum_age_login_defs", "remarks": "rule_set_086" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Minimum Age", + "value": "Set Password Maximum Age", "remarks": "rule_set_086" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_warn_age_login_defs", + "value": "accounts_minimum_age_login_defs", "remarks": "rule_set_087" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Warning Age", + "value": "Set Password Minimum Age", "remarks": "rule_set_087" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_kerberos_crypto_policy", + "value": "accounts_password_warn_age_login_defs", "remarks": "rule_set_088" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Kerberos to use System Crypto Policy", + "value": "Set Password Warning Age", "remarks": "rule_set_088" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "enable_ldap_client", + "value": "configure_kerberos_crypto_policy", "remarks": "rule_set_089" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable the LDAP Client For Use in Authconfig", + "value": "Configure Kerberos to use System Crypto Policy", "remarks": "rule_set_089" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "kerberos_disable_no_keytab", + "value": "enable_ldap_client", "remarks": "rule_set_090" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kerberos by removing host keytab", + "value": "Enable the LDAP Client For Use in Authconfig", "remarks": "rule_set_090" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "network_nmcli_permissions", + "value": "kerberos_disable_no_keytab", "remarks": "rule_set_091" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Prevent non-Privileged Users from Modifying Network Interfaces using nmcli", + "value": "Disable Kerberos by removing host keytab", "remarks": "rule_set_091" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sebool_kerberos_enabled", + "value": "network_nmcli_permissions", "remarks": "rule_set_092" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable the kerberos_enabled SELinux Boolean", + "value": "Prevent non-Privileged Users from Modifying Network Interfaces using nmcli", "remarks": "rule_set_092" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_libuserconf", + "value": "sebool_kerberos_enabled", "remarks": "rule_set_093" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Hashing Algorithm in /etc/libuser.conf", + "value": "Enable the kerberos_enabled SELinux Boolean", "remarks": "rule_set_093" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_logindefs", + "value": "set_password_hashing_algorithm_libuserconf", "remarks": "rule_set_094" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Hashing Algorithm in /etc/login.defs", + "value": "Set Password Hashing Algorithm in /etc/libuser.conf", "remarks": "rule_set_094" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_passwordauth", + "value": "set_password_hashing_algorithm_logindefs", "remarks": "rule_set_095" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set PAM Password Hashing Algorithm - password-auth", + "value": "Set Password Hashing Algorithm in /etc/login.defs", "remarks": "rule_set_095" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_systemauth", + "value": "set_password_hashing_algorithm_passwordauth", "remarks": "rule_set_096" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set PAM Password Hashing Algorithm - system-auth", + "value": "Set PAM Password Hashing Algorithm - password-auth", "remarks": "rule_set_096" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_minlen_login_defs", + "value": "set_password_hashing_algorithm_systemauth", "remarks": "rule_set_097" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Minimum Length in login.defs", + "value": "Set PAM Password Hashing Algorithm - system-auth", "remarks": "rule_set_097" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_dcredit", + "value": "accounts_password_minlen_login_defs", "remarks": "rule_set_098" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure PAM Enforces Password Requirements - Minimum Digit Characters", + "value": "Set Password Minimum Length in login.defs", "remarks": "rule_set_098" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_lcredit", + "value": "accounts_password_pam_dcredit", "remarks": "rule_set_099" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure PAM Enforces Password Requirements - Minimum Lowercase Characters", + "value": "Ensure PAM Enforces Password Requirements - Minimum Digit Characters", "remarks": "rule_set_099" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_minclass", + "value": "accounts_password_pam_lcredit", "remarks": "rule_set_100" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", + "value": "Ensure PAM Enforces Password Requirements - Minimum Lowercase Characters", "remarks": "rule_set_100" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_minlen", + "value": "accounts_password_pam_minclass", "remarks": "rule_set_101" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure PAM Enforces Password Requirements - Minimum Length", + "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", "remarks": "rule_set_101" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_ocredit", + "value": "accounts_password_pam_minlen", "remarks": "rule_set_102" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure PAM Enforces Password Requirements - Minimum Special Characters", + "value": "Ensure PAM Enforces Password Requirements - Minimum Length", "remarks": "rule_set_102" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_ucredit", + "value": "accounts_password_pam_ocredit", "remarks": "rule_set_103" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure PAM Enforces Password Requirements - Minimum Uppercase Characters", + "value": "Ensure PAM Enforces Password Requirements - Minimum Special Characters", "remarks": "rule_set_103" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_passwords_pam_faillock_deny", + "value": "accounts_password_pam_ucredit", "remarks": "rule_set_104" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Lock Accounts After Failed Password Attempts", + "value": "Ensure PAM Enforces Password Requirements - Minimum Uppercase Characters", "remarks": "rule_set_104" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_passwords_pam_faillock_deny_root", + "value": "accounts_passwords_pam_faillock_deny", "remarks": "rule_set_105" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure the root Account for Failed Password Attempts", + "value": "Lock Accounts After Failed Password Attempts", "remarks": "rule_set_105" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_passwords_pam_faillock_interval", + "value": "accounts_passwords_pam_faillock_deny_root", "remarks": "rule_set_106" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Interval For Counting Failed Password Attempts", + "value": "Configure the root Account for Failed Password Attempts", "remarks": "rule_set_106" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_passwords_pam_faillock_unlock_time", + "value": "accounts_passwords_pam_faillock_interval", "remarks": "rule_set_107" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Lockout Time for Failed Password Attempts", + "value": "Set Interval For Counting Failed Password Attempts", "remarks": "rule_set_107" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "disable_host_auth", + "value": "accounts_passwords_pam_faillock_unlock_time", "remarks": "rule_set_108" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Host-Based Authentication", + "value": "Set Lockout Time for Failed Password Attempts", "remarks": "rule_set_108" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "require_emergency_target_auth", + "value": "disable_host_auth", "remarks": "rule_set_109" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Require Authentication for Emergency Systemd Target", + "value": "Disable Host-Based Authentication", "remarks": "rule_set_109" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sebool_authlogin_nsswitch_use_ldap", + "value": "require_emergency_target_auth", "remarks": "rule_set_110" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable the authlogin_nsswitch_use_ldap SELinux Boolean", + "value": "Require Authentication for Emergency Systemd Target", "remarks": "rule_set_110" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sebool_authlogin_radius", + "value": "sebool_authlogin_nsswitch_use_ldap", "remarks": "rule_set_111" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable the authlogin_radius SELinux Boolean", + "value": "Disable the authlogin_nsswitch_use_ldap SELinux Boolean", "remarks": "rule_set_111" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_kerb_auth", + "value": "sebool_authlogin_radius", "remarks": "rule_set_112" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Kerberos Authentication", + "value": "Disable the authlogin_radius SELinux Boolean", "remarks": "rule_set_112" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_set_max_auth_tries", + "value": "sshd_disable_kerb_auth", "remarks": "rule_set_113" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set SSH authentication attempt limit", + "value": "Disable Kerberos Authentication", "remarks": "rule_set_113" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sssd_enable_smartcards", + "value": "sshd_set_max_auth_tries", "remarks": "rule_set_114" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Smartcards in SSSD", + "value": "Set SSH authentication attempt limit", "remarks": "rule_set_114" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_enable_warning_banner", + "value": "sssd_enable_smartcards", "remarks": "rule_set_115" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable SSH Warning Banner", + "value": "Enable Smartcards in SSSD", "remarks": "rule_set_115" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_disable_x11_forwarding", + "value": "sshd_enable_warning_banner", "remarks": "rule_set_116" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable X11 Forwarding", + "value": "Enable SSH Warning Banner", "remarks": "rule_set_116" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_access_failed", + "value": "sshd_disable_x11_forwarding", "remarks": "rule_set_117" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure auditing of unsuccessful file accesses", + "value": "Disable X11 Forwarding", "remarks": "rule_set_117" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_access_failed_aarch64", + "value": "audit_access_failed", "remarks": "rule_set_118" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure auditing of unsuccessful file accesses (AArch64)", + "value": "Configure auditing of unsuccessful file accesses", "remarks": "rule_set_118" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_access_failed_ppc64le", + "value": "audit_access_failed_aarch64", "remarks": "rule_set_119" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure auditing of unsuccessful file accesses (ppc64le)", + "value": "Configure auditing of unsuccessful file accesses (AArch64)", "remarks": "rule_set_119" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_access_success", + "value": "audit_access_failed_ppc64le", "remarks": "rule_set_120" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure auditing of successful file accesses", + "value": "Configure auditing of unsuccessful file accesses (ppc64le)", "remarks": "rule_set_120" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_access_success_aarch64", + "value": "audit_access_success", "remarks": "rule_set_121" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure auditing of successful file accesses (AArch64)", + "value": "Configure auditing of successful file accesses", "remarks": "rule_set_121" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_access_success_ppc64le", + "value": "audit_access_success_aarch64", "remarks": "rule_set_122" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure auditing of successful file accesses (ppc64le)", + "value": "Configure auditing of successful file accesses (AArch64)", "remarks": "rule_set_122" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_privileged_commands", + "value": "audit_access_success_ppc64le", "remarks": "rule_set_123" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure auditd Collects Information on the Use of Privileged Commands", + "value": "Configure auditing of successful file accesses (ppc64le)", "remarks": "rule_set_123" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_session_events_utmp", + "value": "audit_rules_privileged_commands", "remarks": "rule_set_124" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Process and Session Initiation Information utmp", + "value": "Ensure auditd Collects Information on the Use of Privileged Commands", "remarks": "rule_set_124" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_session_events_btmp", + "value": "audit_rules_session_events_utmp", "remarks": "rule_set_125" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Process and Session Initiation Information btmp", + "value": "Record Attempts to Alter Process and Session Initiation Information utmp", "remarks": "rule_set_125" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_session_events_wtmp", + "value": "audit_rules_session_events_btmp", "remarks": "rule_set_126" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", + "value": "Record Attempts to Alter Process and Session Initiation Information btmp", "remarks": "rule_set_126" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_unsuccessful_file_modification_creat", + "value": "audit_rules_session_events_wtmp", "remarks": "rule_set_127" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Unsuccessful Access Attempts to Files - creat", + "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", "remarks": "rule_set_127" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_unsuccessful_file_modification_open", + "value": "audit_rules_unsuccessful_file_modification_creat", "remarks": "rule_set_128" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Unsuccessful Access Attempts to Files - open", + "value": "Record Unsuccessful Access Attempts to Files - creat", "remarks": "rule_set_128" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_unsuccessful_file_modification_openat", + "value": "audit_rules_unsuccessful_file_modification_open", "remarks": "rule_set_129" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Unsuccessful Access Attempts to Files - openat", + "value": "Record Unsuccessful Access Attempts to Files - open", "remarks": "rule_set_129" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_unsuccessful_file_modification_open_by_handle_at", + "value": "audit_rules_unsuccessful_file_modification_openat", "remarks": "rule_set_130" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Unsuccessful Access Attempts to Files - open_by_handle_at", + "value": "Record Unsuccessful Access Attempts to Files - openat", "remarks": "rule_set_130" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_unsuccessful_file_modification_truncate", + "value": "audit_rules_unsuccessful_file_modification_open_by_handle_at", "remarks": "rule_set_131" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Unsuccessful Access Attempts to Files - truncate", + "value": "Record Unsuccessful Access Attempts to Files - open_by_handle_at", "remarks": "rule_set_131" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_unsuccessful_file_modification_ftruncate", + "value": "audit_rules_unsuccessful_file_modification_truncate", "remarks": "rule_set_132" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Unsuccessful Access Attempts to Files - ftruncate", + "value": "Record Unsuccessful Access Attempts to Files - truncate", "remarks": "rule_set_132" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_audit_installed", + "value": "audit_rules_unsuccessful_file_modification_ftruncate", "remarks": "rule_set_133" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the audit Subsystem is Installed", + "value": "Record Unsuccessful Access Attempts to Files - ftruncate", "remarks": "rule_set_133" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sebool_auditadm_exec_content", + "value": "package_audit_installed", "remarks": "rule_set_134" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable the auditadm_exec_content SELinux Boolean", + "value": "Ensure the audit Subsystem is Installed", "remarks": "rule_set_134" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "chronyd_configure_pool_and_server", + "value": "sebool_auditadm_exec_content", "remarks": "rule_set_135" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Chrony Configure Pool and Server", + "value": "Enable the auditadm_exec_content SELinux Boolean", "remarks": "rule_set_135" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "chronyd_or_ntpd_specify_multiple_servers", + "value": "chronyd_configure_pool_and_server", "remarks": "rule_set_136" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Specify Additional Remote NTP Servers", + "value": "Chrony Configure Pool and Server", "remarks": "rule_set_136" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "chronyd_specify_remote_server", + "value": "chronyd_or_ntpd_specify_multiple_servers", "remarks": "rule_set_137" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "A remote time server for Chrony is configured", + "value": "Specify Additional Remote NTP Servers", "remarks": "rule_set_137" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_chrony_installed", + "value": "chronyd_specify_remote_server", "remarks": "rule_set_138" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The Chrony package is installed", + "value": "A remote time server for Chrony is configured", "remarks": "rule_set_138" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_cron_logging", + "value": "package_chrony_installed", "remarks": "rule_set_139" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure cron Is Logging To Rsyslog", + "value": "The Chrony package is installed", "remarks": "rule_set_139" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_groupownership", + "value": "rsyslog_cron_logging", "remarks": "rule_set_140" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Log Files Are Owned By Appropriate Group", + "value": "Ensure cron Is Logging To Rsyslog", "remarks": "rule_set_140" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_ownership", + "value": "rsyslog_files_groupownership", "remarks": "rule_set_141" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Log Files Are Owned By Appropriate User", + "value": "Ensure Log Files Are Owned By Appropriate Group", "remarks": "rule_set_141" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_permissions", + "value": "rsyslog_files_ownership", "remarks": "rule_set_142" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure System Log Files Have Correct Permissions", + "value": "Ensure Log Files Are Owned By Appropriate User", "remarks": "rule_set_142" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_nolisten", + "value": "rsyslog_files_permissions", "remarks": "rule_set_143" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure rsyslog Does Not Accept Remote Messages Unless Acting As Log Server", + "value": "Ensure System Log Files Have Correct Permissions", "remarks": "rule_set_143" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_remote_loghost", + "value": "rsyslog_nolisten", "remarks": "rule_set_144" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Logs Sent To Remote Host", + "value": "Ensure rsyslog Does Not Accept Remote Messages Unless Acting As Log Server", "remarks": "rule_set_144" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_remote_tls", + "value": "rsyslog_remote_loghost", "remarks": "rule_set_145" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure TLS for rsyslog remote logging", + "value": "Ensure Logs Sent To Remote Host", "remarks": "rule_set_145" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_remote_tls_cacert", + "value": "rsyslog_remote_tls", "remarks": "rule_set_146" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure CA certificate for rsyslog remote logging", + "value": "Configure TLS for rsyslog remote logging", "remarks": "rule_set_146" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_chronyd_enabled", + "value": "rsyslog_remote_tls_cacert", "remarks": "rule_set_147" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The Chronyd service is enabled", + "value": "Configure CA certificate for rsyslog remote logging", "remarks": "rule_set_147" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_aide_installed", + "value": "service_chronyd_enabled", "remarks": "rule_set_148" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install AIDE", + "value": "The Chronyd service is enabled", "remarks": "rule_set_148" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_snmpd_disabled", + "value": "package_aide_installed", "remarks": "rule_set_149" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable snmpd Service", + "value": "Install AIDE", "remarks": "rule_set_149" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "snmpd_use_newer_protocol", + "value": "service_snmpd_disabled", "remarks": "rule_set_150" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure SNMP Service to Use Only SNMPv3 or Newer", + "value": "Disable snmpd Service", "remarks": "rule_set_150" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "network_ipv6_static_address", + "value": "snmpd_use_newer_protocol", "remarks": "rule_set_151" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Manually Assign Global IPv6 Address", + "value": "Configure SNMP Service to Use Only SNMPv3 or Newer", "remarks": "rule_set_151" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "wireless_disable_interfaces", + "value": "network_ipv6_static_address", "remarks": "rule_set_152" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Deactivate Wireless Network Interfaces", + "value": "Manually Assign Global IPv6 Address", "remarks": "rule_set_152" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_opensc_card_drivers", + "value": "wireless_disable_interfaces", "remarks": "rule_set_153" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure opensc Smart Card Drivers", + "value": "Deactivate Wireless Network Interfaces", "remarks": "rule_set_153" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_opensc_installed", + "value": "configure_opensc_card_drivers", "remarks": "rule_set_154" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install the opensc Package For Multifactor Authentication", + "value": "Configure opensc Smart Card Drivers", "remarks": "rule_set_154" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_pcsc-lite_installed", + "value": "package_opensc_installed", "remarks": "rule_set_155" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install the pcsc-lite package", + "value": "Install the opensc Package For Multifactor Authentication", "remarks": "rule_set_155" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_pcsc-lite-ccid_installed", + "value": "package_pcsc-lite_installed", "remarks": "rule_set_156" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install the pcsc-lite-ccid package", + "value": "Install the pcsc-lite package", "remarks": "rule_set_156" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_sudo_installed", + "value": "package_pcsc-lite-ccid_installed", "remarks": "rule_set_157" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install sudo Package", + "value": "Install the pcsc-lite-ccid package", "remarks": "rule_set_157" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_pcscd_enabled", + "value": "package_sudo_installed", "remarks": "rule_set_158" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable the pcscd Service", + "value": "Install sudo Package", "remarks": "rule_set_158" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "configure_firewalld_ports", + "value": "service_pcscd_enabled", "remarks": "rule_set_159" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure the Firewalld Ports", + "value": "Enable the pcscd Service", "remarks": "rule_set_159" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_firewalld_default_zone", + "value": "configure_firewalld_ports", "remarks": "rule_set_160" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Default firewalld Zone for Incoming Packets", + "value": "Configure the Firewalld Ports", "remarks": "rule_set_160" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_usbguard_installed", + "value": "set_firewalld_default_zone", "remarks": "rule_set_161" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install usbguard Package", + "value": "Set Default firewalld Zone for Incoming Packets", "remarks": "rule_set_161" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_usbguard_enabled", + "value": "package_usbguard_installed", "remarks": "rule_set_162" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable the USBGuard Service", + "value": "Install usbguard Package", "remarks": "rule_set_162" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "system_booted_in_fips_mode", + "value": "service_usbguard_enabled", "remarks": "rule_set_163" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify that the system was booted with fips=1", + "value": "Enable the USBGuard Service", "remarks": "rule_set_163" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "enable_fips_mode", + "value": "system_booted_in_fips_mode", "remarks": "rule_set_164" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable FIPS Mode", + "value": "Verify that the system was booted with fips=1", "remarks": "rule_set_164" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_sshd_private_key", + "value": "enable_fips_mode", "remarks": "rule_set_165" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Permissions on SSH Server Private *_key Key Files", + "value": "Enable FIPS Mode", "remarks": "rule_set_165" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dnf-automatic_apply_updates", + "value": "file_permissions_sshd_private_key", "remarks": "rule_set_166" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure dnf-automatic to Install Available Updates Automatically", + "value": "Verify Permissions on SSH Server Private *_key Key Files", "remarks": "rule_set_166" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_libdnf-plugin-subscription-manager_installed", + "value": "dnf-automatic_apply_updates", "remarks": "rule_set_167" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install libdnf-plugin-subscription-manager Package", + "value": "Configure dnf-automatic to Install Available Updates Automatically", "remarks": "rule_set_167" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_subscription-manager_installed", + "value": "package_libdnf-plugin-subscription-manager_installed", "remarks": "rule_set_168" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install subscription-manager Package", + "value": "Install libdnf-plugin-subscription-manager Package", "remarks": "rule_set_168" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_shelllogin_for_systemaccounts", + "value": "package_subscription-manager_installed", "remarks": "rule_set_169" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", + "value": "Install subscription-manager Package", "remarks": "rule_set_169" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "secure_boot_enabled", + "value": "no_shelllogin_for_systemaccounts", "remarks": "rule_set_170" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that Secure Boot is enabled", + "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", "remarks": "rule_set_170" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "secure_boot_enabled", + "remarks": "rule_set_171" + }, + { + "name": "Rule_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Ensure that Secure Boot is enabled", + "remarks": "rule_set_171" } ], "control-implementations": [ { - "uuid": "b40ba9c2-ff53-4768-85ac-684f8cf811e5", + "uuid": "3ea285c1-3c0c-42a8-9d12-4f6801fceb86", "source": "trestle://profiles/rhel10-ism_o-top_secret/profile.json", "description": "Control implementation for ism_o_top_secret", "props": [ @@ -2371,7 +2383,7 @@ ], "implemented-requirements": [ { - "uuid": "4aff10fa-309d-4b6b-8b97-73ca34446edc", + "uuid": "266091db-3abd-4208-8790-dad8e16704bc", "control-id": "ism_o_0422", "description": "No notes for control-id 0422.", "props": [ @@ -2473,7 +2485,7 @@ ] }, { - "uuid": "ce2cbb67-a2a4-47c8-a54c-769fb53a0df3", + "uuid": "d6300952-a2ab-4afc-ac74-09e2905061ed", "control-id": "ism_o_1561", "description": "No notes for control-id 1561.", "props": [ @@ -2575,7 +2587,7 @@ ] }, { - "uuid": "e6237997-523b-453c-9382-df26b8d28a5d", + "uuid": "2fd35f8a-08f7-4438-b575-8ae72ee3cb76", "control-id": "ism_o_1557", "description": "No notes for control-id 1557.", "props": [ @@ -2677,7 +2689,7 @@ ] }, { - "uuid": "af522e6b-c9c8-49bc-9544-2549a7ec1b81", + "uuid": "ac1b0660-3563-4425-9aad-1ada0fb76634", "control-id": "ism_o_1560", "description": "No notes for control-id 1560.", "props": [ @@ -2779,7 +2791,7 @@ ] }, { - "uuid": "9102ae07-d45d-4633-b6a6-0d8c5716e0ad", + "uuid": "f1a86fcb-0b0b-4e3d-a620-bcffb6b3c999", "control-id": "ism_o_0418", "description": "No notes for control-id 0418.", "props": [ @@ -2861,7 +2873,7 @@ ] }, { - "uuid": "4648b35e-c002-4f4b-a4e3-b3a06c4b5ab5", + "uuid": "f00f4240-dd86-48d4-87f6-025f1ed09794", "control-id": "ism_o_0421", "description": "No notes for control-id 0421.", "props": [ @@ -2963,7 +2975,7 @@ ] }, { - "uuid": "7091642f-d19f-44f0-ac3f-a79e103bcc6f", + "uuid": "e75cdeb6-3ef7-4300-81d5-ed6714f35cb2", "control-id": "ism_o_0484", "description": "No notes for control-id 0484.", "props": [ @@ -2990,7 +3002,7 @@ ] }, { - "uuid": "8d3539fa-cfd4-4e03-a600-0caa88f9f6fc", + "uuid": "76cee3b4-7b92-455a-a219-0551cfff6c69", "control-id": "ism_o_0487", "description": "The description for control-id ism_o_0487.", "props": [ @@ -3003,7 +3015,7 @@ ] }, { - "uuid": "1b856f09-b00b-4491-ba54-8416244f18a0", + "uuid": "ab847d4e-d8d7-4b08-81cf-aefd1ba92399", "control-id": "ism_o_0582", "description": "No notes for control-id 0582.", "props": [ @@ -3255,7 +3267,7 @@ ] }, { - "uuid": "6e9b6dce-4744-4d01-ae24-52443b184c64", + "uuid": "8e3285ad-9e11-4cd3-8d38-47fbfb6727fe", "control-id": "ism_o_0846", "description": "No notes for control-id 0846.", "props": [ @@ -3362,7 +3374,7 @@ ] }, { - "uuid": "0510ceaf-bef9-4ec4-9e72-081d50906b90", + "uuid": "845b0378-7632-400c-b2e0-f3acbeeaa60b", "control-id": "ism_o_0974", "description": "This needs reevaluation.", "props": [ @@ -3464,7 +3476,7 @@ ] }, { - "uuid": "38798124-2214-4784-beab-bc630e312df6", + "uuid": "14fbc9fa-d3b8-4ed2-9948-ef02ccd74432", "control-id": "ism_o_0988", "description": "No notes for control-id 0988.", "props": [ @@ -3541,7 +3553,7 @@ ] }, { - "uuid": "e1c9475d-ac9b-408b-92e6-af9a970fed8b", + "uuid": "ebbdad84-e581-4fba-8505-205c33362752", "control-id": "ism_o_1034", "description": "No notes for control-id 1034.", "props": [ @@ -3558,7 +3570,7 @@ ] }, { - "uuid": "bc3d5642-f306-476d-88fc-0f859cba68fe", + "uuid": "8b44642d-77ef-42ee-a7eb-7619c8390074", "control-id": "ism_o_1055", "description": "Needs reevaluation", "props": [ @@ -3635,7 +3647,7 @@ ] }, { - "uuid": "ecfb1966-d589-4d90-9ebb-3f4378c49d15", + "uuid": "fe05b1f0-7c58-49b8-b2df-79b70de75651", "control-id": "ism_o_1173", "description": "No notes for control-id 1173.", "props": [ @@ -3737,7 +3749,7 @@ ] }, { - "uuid": "545b9301-6aab-4c1b-8cce-fa27e33e369a", + "uuid": "06f2fb1d-5f93-49b2-aec7-6c491c6b2f0c", "control-id": "ism_o_1277", "description": "No notes for control-id 1277.", "props": [ @@ -3749,7 +3761,7 @@ ] }, { - "uuid": "cf8e51f3-fa5f-4122-b82a-4598ab0fbe07", + "uuid": "c7c73395-ab03-417a-8b8f-58aa030da82d", "control-id": "ism_o_1288", "description": "No notes for control-id 1288.", "props": [ @@ -3766,7 +3778,7 @@ ] }, { - "uuid": "8d767382-d4f0-49ac-aa6b-ec0393637eb8", + "uuid": "03a7d777-ee0f-4054-9e2a-556f3a654721", "control-id": "ism_o_1311", "description": "No notes for control-id 1311.", "props": [ @@ -3788,7 +3800,7 @@ ] }, { - "uuid": "81e78d21-5c23-4580-bae2-724037f97800", + "uuid": "780575a7-3995-4c79-a1dc-4ab3176cae43", "control-id": "ism_o_1315", "description": "No notes for control-id 1315.", "props": [ @@ -3810,7 +3822,7 @@ ] }, { - "uuid": "69466acc-45c3-406b-9d9a-9529ad364140", + "uuid": "3da087ee-7029-4d10-a936-a766143681e3", "control-id": "ism_o_1319", "description": "No notes for control-id 1319.", "props": [ @@ -3832,7 +3844,7 @@ ] }, { - "uuid": "1309a46d-690f-4d16-9496-e7b120c753e5", + "uuid": "219ac004-1334-4096-b802-467d8ea871f7", "control-id": "ism_o_1341", "description": "No notes for control-id 1341.", "props": [ @@ -3849,7 +3861,7 @@ ] }, { - "uuid": "52f48397-7871-4439-a1af-5a07f0aee92b", + "uuid": "e2e3452c-b6bd-4d4b-a7ea-ab239cbe78b0", "control-id": "ism_o_1386", "description": "This needs reevaluation.", "props": [ @@ -3891,7 +3903,7 @@ ] }, { - "uuid": "331ad53c-142a-4d02-a689-818d804c74fc", + "uuid": "2106aa84-44c7-45ad-b609-7249fac89454", "control-id": "ism_o_1401", "description": "No notes for control-id 1401.", "props": [ @@ -3993,7 +4005,7 @@ ] }, { - "uuid": "ca3f693d-a170-4d58-beab-e5be00378e1c", + "uuid": "b9a74594-e655-4f22-8c40-fef1177540a1", "control-id": "ism_o_1402", "description": "No notes for control-id 1402.", "props": [ @@ -4070,7 +4082,7 @@ ] }, { - "uuid": "f8e36b68-3e03-4634-88f4-130acb64594f", + "uuid": "7385e9fe-1e15-4855-a21a-45ed8b3773e5", "control-id": "ism_o_1405", "description": "No notes for control-id 1405.", "props": [ @@ -4147,7 +4159,7 @@ ] }, { - "uuid": "5d6785a5-0e80-4023-b691-049511b46a7f", + "uuid": "6284921a-79ee-40ed-ad15-3a6905c4b979", "control-id": "ism_o_1416", "description": "No notes for control-id 1416.", "props": [ @@ -4169,7 +4181,7 @@ ] }, { - "uuid": "6a86aca0-0ef6-4049-9ee7-a678ee63dd34", + "uuid": "f0ad7509-716e-4d8e-a65b-a558b171e1dc", "control-id": "ism_o_1417", "description": "No notes for control-id 1417.", "props": [ @@ -4186,7 +4198,7 @@ ] }, { - "uuid": "7bf33a7d-5003-44c6-a08a-325883589d45", + "uuid": "249d39b6-471d-4008-9691-4bf710d69b2e", "control-id": "ism_o_1418", "description": "No notes for control-id 1418.", "props": [ @@ -4208,7 +4220,7 @@ ] }, { - "uuid": "e51d4b8b-4276-4e84-8bac-6694fe7a0fff", + "uuid": "17f6ecdd-8831-489f-b611-daee64382588", "control-id": "ism_o_1446", "description": "No notes for control-id 1446.", "props": [ @@ -4235,7 +4247,7 @@ ] }, { - "uuid": "b315b496-de81-46f1-99fa-993dc872345f", + "uuid": "5f005a57-fd97-402b-a5ec-82a3e1e7648d", "control-id": "ism_o_1449", "description": "This needs more", "props": [ @@ -4252,7 +4264,7 @@ ] }, { - "uuid": "5574772e-79c3-4d2d-a803-4a24108a85fa", + "uuid": "b4d2bbb3-3b74-4d3e-94f2-8d05950e31d2", "control-id": "ism_o_1467", "description": "No notes for control-id 1467.", "props": [ @@ -4279,7 +4291,7 @@ ] }, { - "uuid": "a6904d0e-b8d3-42c6-99f9-60a70ea8a3f3", + "uuid": "e7fe1966-de53-44c1-8eb0-4d2f94988056", "control-id": "ism_o_1483", "description": "No notes for control-id 1483.", "props": [ @@ -4306,7 +4318,7 @@ ] }, { - "uuid": "f2f16e5a-89fa-4ded-89a7-5f3725174c91", + "uuid": "d1c84448-c477-489b-bc4b-e743c15168fc", "control-id": "ism_o_1491", "description": "No notes for control-id 1491.", "props": [ @@ -4323,7 +4335,7 @@ ] }, { - "uuid": "a0ac1ee5-7630-4cb7-8bd1-9e91f2caff20", + "uuid": "c0771038-691f-4b30-a72a-b95b8a4146bc", "control-id": "ism_o_1493", "description": "No notes for control-id 1493.", "props": [ @@ -4367,6 +4379,11 @@ "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_redhat_gpgkey_installed" }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "package_sequoia-sq_installed" + }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", @@ -4375,7 +4392,7 @@ ] }, { - "uuid": "87383a85-b4e8-40af-93cd-2f6760c91106", + "uuid": "c88047b7-b56e-4035-9610-a7195cc73277", "control-id": "ism_o_1504", "description": "No notes for control-id 1504.", "props": [ @@ -4477,7 +4494,7 @@ ] }, { - "uuid": "7f1e5a9e-c3fd-49d4-99aa-4b44bc0e5f2f", + "uuid": "407ba320-65d6-4944-af13-2eb6371804a3", "control-id": "ism_o_1505", "description": "No notes for control-id 1505.", "props": [ @@ -4579,7 +4596,7 @@ ] }, { - "uuid": "3ecc932e-79f4-48fd-bd55-e66447771dd7", + "uuid": "f5f3b3c5-052d-456e-8092-a333ed04e18b", "control-id": "ism_o_1506", "description": "As of OpenSSH 7.6, OpenSSH only supports SSH 2.", "props": [ @@ -4591,7 +4608,7 @@ ] }, { - "uuid": "9204dcc7-6a5f-4836-9c5a-62a2c2ca241e", + "uuid": "4963fd69-d261-487e-97d1-f80203c04e7e", "control-id": "ism_o_1546", "description": "No notes for control-id 1546.", "props": [ @@ -4748,7 +4765,7 @@ ] }, { - "uuid": "38a87dba-f4d1-4109-afc2-e856b429d225", + "uuid": "a824b069-9360-4e80-b3eb-de6d7125a7b5", "control-id": "ism_o_1552", "description": "No notes for control-id 1552.", "props": [ @@ -4760,7 +4777,7 @@ ] }, { - "uuid": "5f5640c8-b4fe-4641-9f6d-8122506b7821", + "uuid": "219be049-762e-4615-80df-9b3dc922a95e", "control-id": "ism_o_1558", "description": "No notes for control-id 1558.", "props": [ @@ -4862,7 +4879,7 @@ ] }, { - "uuid": "67763694-6dae-4ccc-9f95-ea34cc985341", + "uuid": "28b30fd3-22f3-4499-8f4f-af714484b119", "control-id": "ism_o_1559", "description": "No notes for control-id 1559.", "props": [ @@ -4964,7 +4981,7 @@ ] }, { - "uuid": "98b2144b-9a1d-4037-839e-3e40c899c079", + "uuid": "ec420e77-b367-4277-b099-cfc546b42944", "control-id": "ism_o_1745", "description": "The description for control-id ism_o_1745.", "props": [ @@ -5156,7 +5173,7 @@ { "name": "Parameter_Value_Alternatives_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -5378,3943 +5395,3967 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_never_disabled", + "value": "package_sequoia-sq_installed", "remarks": "rule_set_007" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled for All dnf Package Repositories", + "value": "Install sequoia-sq Package", "remarks": "rule_set_007" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_never_disabled", + "value": "package_sequoia-sq_installed", "remarks": "rule_set_007" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled for All dnf Package Repositories", + "value": "Install sequoia-sq Package", "remarks": "rule_set_007" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_local_packages", + "value": "ensure_gpgcheck_never_disabled", "remarks": "rule_set_008" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled for Local Packages", + "value": "Ensure gpgcheck Enabled for All dnf Package Repositories", "remarks": "rule_set_008" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_local_packages", + "value": "ensure_gpgcheck_never_disabled", "remarks": "rule_set_008" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled for Local Packages", + "value": "Ensure gpgcheck Enabled for All dnf Package Repositories", "remarks": "rule_set_008" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_globally_activated", + "value": "ensure_gpgcheck_local_packages", "remarks": "rule_set_009" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled In Main dnf Configuration", + "value": "Ensure gpgcheck Enabled for Local Packages", "remarks": "rule_set_009" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_globally_activated", + "value": "ensure_gpgcheck_local_packages", "remarks": "rule_set_009" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled In Main dnf Configuration", + "value": "Ensure gpgcheck Enabled for Local Packages", "remarks": "rule_set_009" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dnf-automatic_security_updates_only", + "value": "ensure_gpgcheck_globally_activated", "remarks": "rule_set_010" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure dnf-automatic to Install Only Security Updates", + "value": "Ensure gpgcheck Enabled In Main dnf Configuration", "remarks": "rule_set_010" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dnf-automatic_security_updates_only", + "value": "ensure_gpgcheck_globally_activated", "remarks": "rule_set_010" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure dnf-automatic to Install Only Security Updates", + "value": "Ensure gpgcheck Enabled In Main dnf Configuration", "remarks": "rule_set_010" }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "dnf-automatic_security_updates_only", + "remarks": "rule_set_011" + }, + { + "name": "Rule_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Configure dnf-automatic to Install Only Security Updates", + "remarks": "rule_set_011" + }, + { + "name": "Check_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "dnf-automatic_security_updates_only", + "remarks": "rule_set_011" + }, + { + "name": "Check_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Configure dnf-automatic to Install Only Security Updates", + "remarks": "rule_set_011" + }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_no_uid_except_zero", - "remarks": "rule_set_011" + "remarks": "rule_set_012" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Root Has UID 0", - "remarks": "rule_set_011" + "remarks": "rule_set_012" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_no_uid_except_zero", - "remarks": "rule_set_011" + "remarks": "rule_set_012" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Only Root Has UID 0", - "remarks": "rule_set_011" + "remarks": "rule_set_012" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_nopasswd", - "remarks": "rule_set_012" + "remarks": "rule_set_013" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD", - "remarks": "rule_set_012" + "remarks": "rule_set_013" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_nopasswd", - "remarks": "rule_set_012" + "remarks": "rule_set_013" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD", - "remarks": "rule_set_012" + "remarks": "rule_set_013" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_no_authenticate", - "remarks": "rule_set_013" + "remarks": "rule_set_014" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo !authenticate", - "remarks": "rule_set_013" + "remarks": "rule_set_014" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_remove_no_authenticate", - "remarks": "rule_set_013" + "remarks": "rule_set_014" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo !authenticate", - "remarks": "rule_set_013" + "remarks": "rule_set_014" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_require_authentication", - "remarks": "rule_set_014" + "remarks": "rule_set_015" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo", - "remarks": "rule_set_014" + "remarks": "rule_set_015" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sudo_require_authentication", - "remarks": "rule_set_014" + "remarks": "rule_set_015" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Users Re-Authenticate for Privilege Escalation - sudo", - "remarks": "rule_set_014" + "remarks": "rule_set_015" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_fapolicyd_installed", - "remarks": "rule_set_015" + "remarks": "rule_set_016" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install fapolicyd Package", - "remarks": "rule_set_015" + "remarks": "rule_set_016" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_fapolicyd_installed", - "remarks": "rule_set_015" + "remarks": "rule_set_016" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install fapolicyd Package", - "remarks": "rule_set_015" + "remarks": "rule_set_016" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_fapolicyd_enabled", - "remarks": "rule_set_016" + "remarks": "rule_set_017" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable the File Access Policy Service", - "remarks": "rule_set_016" + "remarks": "rule_set_017" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_fapolicyd_enabled", - "remarks": "rule_set_016" + "remarks": "rule_set_017" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable the File Access Policy Service", - "remarks": "rule_set_016" + "remarks": "rule_set_017" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy", - "remarks": "rule_set_017" + "remarks": "rule_set_018" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure System Cryptography Policy", - "remarks": "rule_set_017" + "remarks": "rule_set_018" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_crypto_policy", - "remarks": "rule_set_017" + "remarks": "rule_set_018" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure System Cryptography Policy", - "remarks": "rule_set_017" + "remarks": "rule_set_018" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_ssh_crypto_policy", - "remarks": "rule_set_018" + "remarks": "rule_set_019" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure SSH to use System Crypto Policy", - "remarks": "rule_set_018" + "remarks": "rule_set_019" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_ssh_crypto_policy", - "remarks": "rule_set_018" + "remarks": "rule_set_019" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure SSH to use System Crypto Policy", - "remarks": "rule_set_018" + "remarks": "rule_set_019" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_use_directory_configuration", - "remarks": "rule_set_019" + "remarks": "rule_set_020" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Distribute the SSH Server configuration to multiple files in a config directory.", - "remarks": "rule_set_019" + "remarks": "rule_set_020" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_use_directory_configuration", - "remarks": "rule_set_019" + "remarks": "rule_set_020" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Distribute the SSH Server configuration to multiple files in a config directory.", - "remarks": "rule_set_019" + "remarks": "rule_set_020" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_root_login", - "remarks": "rule_set_020" + "remarks": "rule_set_021" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Root Login", - "remarks": "rule_set_020" + "remarks": "rule_set_021" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_root_login", - "remarks": "rule_set_020" + "remarks": "rule_set_021" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Root Login", - "remarks": "rule_set_020" + "remarks": "rule_set_021" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_gssapi_auth", - "remarks": "rule_set_021" + "remarks": "rule_set_022" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GSSAPI Authentication", - "remarks": "rule_set_021" + "remarks": "rule_set_022" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_gssapi_auth", - "remarks": "rule_set_021" + "remarks": "rule_set_022" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable GSSAPI Authentication", - "remarks": "rule_set_021" + "remarks": "rule_set_022" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_print_last_log", - "remarks": "rule_set_022" + "remarks": "rule_set_023" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable SSH Print Last Log", - "remarks": "rule_set_022" + "remarks": "rule_set_023" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_print_last_log", - "remarks": "rule_set_022" + "remarks": "rule_set_023" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable SSH Print Last Log", - "remarks": "rule_set_022" + "remarks": "rule_set_023" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_do_not_permit_user_env", - "remarks": "rule_set_023" + "remarks": "rule_set_024" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Do Not Allow SSH Environment Options", - "remarks": "rule_set_023" + "remarks": "rule_set_024" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_do_not_permit_user_env", - "remarks": "rule_set_023" + "remarks": "rule_set_024" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Do Not Allow SSH Environment Options", - "remarks": "rule_set_023" + "remarks": "rule_set_024" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_rhosts", - "remarks": "rule_set_024" + "remarks": "rule_set_025" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Support for .rhosts Files", - "remarks": "rule_set_024" + "remarks": "rule_set_025" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_rhosts", - "remarks": "rule_set_024" + "remarks": "rule_set_025" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Support for .rhosts Files", - "remarks": "rule_set_024" + "remarks": "rule_set_025" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_loglevel_info", - "remarks": "rule_set_025" + "remarks": "rule_set_026" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set LogLevel to INFO", - "remarks": "rule_set_025" + "remarks": "rule_set_026" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_loglevel_info", - "remarks": "rule_set_025" + "remarks": "rule_set_026" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set LogLevel to INFO", - "remarks": "rule_set_025" + "remarks": "rule_set_026" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_empty_passwords", - "remarks": "rule_set_026" + "remarks": "rule_set_027" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Access via Empty Passwords", - "remarks": "rule_set_026" + "remarks": "rule_set_027" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_empty_passwords", - "remarks": "rule_set_026" + "remarks": "rule_set_027" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Access via Empty Passwords", - "remarks": "rule_set_026" + "remarks": "rule_set_027" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_user_known_hosts", - "remarks": "rule_set_027" + "remarks": "rule_set_028" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Support for User Known Hosts", - "remarks": "rule_set_027" + "remarks": "rule_set_028" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_user_known_hosts", - "remarks": "rule_set_027" + "remarks": "rule_set_028" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable SSH Support for User Known Hosts", - "remarks": "rule_set_027" + "remarks": "rule_set_028" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_strictmodes", - "remarks": "rule_set_028" + "remarks": "rule_set_029" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Use of Strict Mode Checking", - "remarks": "rule_set_028" + "remarks": "rule_set_029" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_strictmodes", - "remarks": "rule_set_028" + "remarks": "rule_set_029" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Use of Strict Mode Checking", - "remarks": "rule_set_028" + "remarks": "rule_set_029" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_rsyslog_installed", - "remarks": "rule_set_029" + "remarks": "rule_set_030" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure rsyslog is Installed", - "remarks": "rule_set_029" + "remarks": "rule_set_030" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_rsyslog_installed", - "remarks": "rule_set_029" + "remarks": "rule_set_030" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure rsyslog is Installed", - "remarks": "rule_set_029" + "remarks": "rule_set_030" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_rsyslog_enabled", - "remarks": "rule_set_030" + "remarks": "rule_set_031" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable rsyslog Service", - "remarks": "rule_set_030" + "remarks": "rule_set_031" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_rsyslog_enabled", - "remarks": "rule_set_030" + "remarks": "rule_set_031" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable rsyslog Service", - "remarks": "rule_set_030" + "remarks": "rule_set_031" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_auditd_enabled", - "remarks": "rule_set_031" + "remarks": "rule_set_032" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable auditd Service", - "remarks": "rule_set_031" + "remarks": "rule_set_032" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_auditd_enabled", - "remarks": "rule_set_031" + "remarks": "rule_set_032" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable auditd Service", - "remarks": "rule_set_031" + "remarks": "rule_set_032" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_flush", - "remarks": "rule_set_032" + "remarks": "rule_set_033" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd flush priority", - "remarks": "rule_set_032" + "remarks": "rule_set_033" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_flush", - "remarks": "rule_set_032" + "remarks": "rule_set_033" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd flush priority", - "remarks": "rule_set_032" + "remarks": "rule_set_033" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_local_events", - "remarks": "rule_set_033" + "remarks": "rule_set_034" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Include Local Events in Audit Logs", - "remarks": "rule_set_033" + "remarks": "rule_set_034" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_local_events", - "remarks": "rule_set_033" + "remarks": "rule_set_034" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Include Local Events in Audit Logs", - "remarks": "rule_set_033" + "remarks": "rule_set_034" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_write_logs", - "remarks": "rule_set_034" + "remarks": "rule_set_035" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Write Audit Logs to the Disk", - "remarks": "rule_set_034" + "remarks": "rule_set_035" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_write_logs", - "remarks": "rule_set_034" + "remarks": "rule_set_035" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Write Audit Logs to the Disk", - "remarks": "rule_set_034" + "remarks": "rule_set_035" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_log_format", - "remarks": "rule_set_035" + "remarks": "rule_set_036" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Resolve information before writing to audit logs", - "remarks": "rule_set_035" + "remarks": "rule_set_036" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_log_format", - "remarks": "rule_set_035" + "remarks": "rule_set_036" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Resolve information before writing to audit logs", - "remarks": "rule_set_035" + "remarks": "rule_set_036" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_freq", - "remarks": "rule_set_036" + "remarks": "rule_set_037" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set number of records to cause an explicit flush to audit logs", - "remarks": "rule_set_036" + "remarks": "rule_set_037" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_freq", - "remarks": "rule_set_036" + "remarks": "rule_set_037" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set number of records to cause an explicit flush to audit logs", - "remarks": "rule_set_036" + "remarks": "rule_set_037" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_name_format", - "remarks": "rule_set_037" + "remarks": "rule_set_038" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set type of computer node name logging in audit logs", - "remarks": "rule_set_037" + "remarks": "rule_set_038" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_name_format", - "remarks": "rule_set_037" + "remarks": "rule_set_038" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set type of computer node name logging in audit logs", - "remarks": "rule_set_037" + "remarks": "rule_set_038" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_faillock", - "remarks": "rule_set_038" + "remarks": "rule_set_039" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - faillock", - "remarks": "rule_set_038" + "remarks": "rule_set_039" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_login_events_faillock", - "remarks": "rule_set_038" + "remarks": "rule_set_039" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Logon and Logout Events - faillock", - "remarks": "rule_set_038" + "remarks": "rule_set_039" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_adjtimex", - "remarks": "rule_set_039" + "remarks": "rule_set_040" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through adjtimex", - "remarks": "rule_set_039" + "remarks": "rule_set_040" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_adjtimex", - "remarks": "rule_set_039" + "remarks": "rule_set_040" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through adjtimex", - "remarks": "rule_set_039" + "remarks": "rule_set_040" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_clock_settime", - "remarks": "rule_set_040" + "remarks": "rule_set_041" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through clock_settime", - "remarks": "rule_set_040" + "remarks": "rule_set_041" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_clock_settime", - "remarks": "rule_set_040" + "remarks": "rule_set_041" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through clock_settime", - "remarks": "rule_set_040" + "remarks": "rule_set_041" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_watch_localtime", - "remarks": "rule_set_041" + "remarks": "rule_set_042" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter the localtime File", - "remarks": "rule_set_041" + "remarks": "rule_set_042" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_watch_localtime", - "remarks": "rule_set_041" + "remarks": "rule_set_042" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter the localtime File", - "remarks": "rule_set_041" + "remarks": "rule_set_042" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_settimeofday", - "remarks": "rule_set_042" + "remarks": "rule_set_043" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through settimeofday", - "remarks": "rule_set_042" + "remarks": "rule_set_043" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_settimeofday", - "remarks": "rule_set_042" + "remarks": "rule_set_043" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through settimeofday", - "remarks": "rule_set_042" + "remarks": "rule_set_043" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_stime", - "remarks": "rule_set_043" + "remarks": "rule_set_044" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through stime", - "remarks": "rule_set_043" + "remarks": "rule_set_044" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_stime", - "remarks": "rule_set_043" + "remarks": "rule_set_044" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through stime", - "remarks": "rule_set_043" + "remarks": "rule_set_044" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_restorecon", - "remarks": "rule_set_044" + "remarks": "rule_set_045" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run restorecon", - "remarks": "rule_set_044" + "remarks": "rule_set_045" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_restorecon", - "remarks": "rule_set_044" + "remarks": "rule_set_045" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run restorecon", - "remarks": "rule_set_044" + "remarks": "rule_set_045" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chcon", - "remarks": "rule_set_045" + "remarks": "rule_set_046" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chcon", - "remarks": "rule_set_045" + "remarks": "rule_set_046" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_chcon", - "remarks": "rule_set_045" + "remarks": "rule_set_046" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run chcon", - "remarks": "rule_set_045" + "remarks": "rule_set_046" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_semanage", - "remarks": "rule_set_046" + "remarks": "rule_set_047" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run semanage", - "remarks": "rule_set_046" + "remarks": "rule_set_047" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_semanage", - "remarks": "rule_set_046" + "remarks": "rule_set_047" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run semanage", - "remarks": "rule_set_046" + "remarks": "rule_set_047" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_setsebool", - "remarks": "rule_set_047" + "remarks": "rule_set_048" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run setsebool", - "remarks": "rule_set_047" + "remarks": "rule_set_048" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_setsebool", - "remarks": "rule_set_047" + "remarks": "rule_set_048" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run setsebool", - "remarks": "rule_set_047" + "remarks": "rule_set_048" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_setfiles", - "remarks": "rule_set_048" + "remarks": "rule_set_049" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run setfiles", - "remarks": "rule_set_048" + "remarks": "rule_set_049" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_setfiles", - "remarks": "rule_set_048" + "remarks": "rule_set_049" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run setfiles", - "remarks": "rule_set_048" + "remarks": "rule_set_049" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_seunshare", - "remarks": "rule_set_049" + "remarks": "rule_set_050" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run seunshare", - "remarks": "rule_set_049" + "remarks": "rule_set_050" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_execution_seunshare", - "remarks": "rule_set_049" + "remarks": "rule_set_050" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Any Attempts to Run seunshare", - "remarks": "rule_set_049" + "remarks": "rule_set_050" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_sysadmin_actions", - "remarks": "rule_set_050" + "remarks": "rule_set_051" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects System Administrator Actions", - "remarks": "rule_set_050" + "remarks": "rule_set_051" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_sysadmin_actions", - "remarks": "rule_set_050" + "remarks": "rule_set_051" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects System Administrator Actions", - "remarks": "rule_set_050" + "remarks": "rule_set_051" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification", - "remarks": "rule_set_051" + "remarks": "rule_set_052" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment", - "remarks": "rule_set_051" + "remarks": "rule_set_052" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification", - "remarks": "rule_set_051" + "remarks": "rule_set_052" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment", - "remarks": "rule_set_051" + "remarks": "rule_set_052" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_group", - "remarks": "rule_set_052" + "remarks": "rule_set_053" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/group", - "remarks": "rule_set_052" + "remarks": "rule_set_053" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_group", - "remarks": "rule_set_052" + "remarks": "rule_set_053" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/group", - "remarks": "rule_set_052" + "remarks": "rule_set_053" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_gshadow", - "remarks": "rule_set_053" + "remarks": "rule_set_054" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/gshadow", - "remarks": "rule_set_053" + "remarks": "rule_set_054" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_gshadow", - "remarks": "rule_set_053" + "remarks": "rule_set_054" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/gshadow", - "remarks": "rule_set_053" + "remarks": "rule_set_054" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_opasswd", - "remarks": "rule_set_054" + "remarks": "rule_set_055" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", - "remarks": "rule_set_054" + "remarks": "rule_set_055" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_opasswd", - "remarks": "rule_set_054" + "remarks": "rule_set_055" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", - "remarks": "rule_set_054" + "remarks": "rule_set_055" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_passwd", - "remarks": "rule_set_055" + "remarks": "rule_set_056" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/passwd", - "remarks": "rule_set_055" + "remarks": "rule_set_056" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_passwd", - "remarks": "rule_set_055" + "remarks": "rule_set_056" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/passwd", - "remarks": "rule_set_055" + "remarks": "rule_set_056" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_shadow", - "remarks": "rule_set_056" + "remarks": "rule_set_057" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/shadow", - "remarks": "rule_set_056" + "remarks": "rule_set_057" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_shadow", - "remarks": "rule_set_056" + "remarks": "rule_set_057" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/shadow", - "remarks": "rule_set_056" + "remarks": "rule_set_057" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chmod", - "remarks": "rule_set_057" + "remarks": "rule_set_058" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", - "remarks": "rule_set_057" + "remarks": "rule_set_058" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chmod", - "remarks": "rule_set_057" + "remarks": "rule_set_058" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", - "remarks": "rule_set_057" + "remarks": "rule_set_058" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chown", - "remarks": "rule_set_058" + "remarks": "rule_set_059" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chown", - "remarks": "rule_set_058" + "remarks": "rule_set_059" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chown", - "remarks": "rule_set_058" + "remarks": "rule_set_059" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chown", - "remarks": "rule_set_058" + "remarks": "rule_set_059" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading", - "remarks": "rule_set_059" + "remarks": "rule_set_060" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading", - "remarks": "rule_set_059" + "remarks": "rule_set_060" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_kernel_module_loading", - "remarks": "rule_set_059" + "remarks": "rule_set_060" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Kernel Module Loading and Unloading", - "remarks": "rule_set_059" + "remarks": "rule_set_060" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_randomize_va_space", - "remarks": "rule_set_060" + "remarks": "rule_set_061" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Randomized Layout of Virtual Address Space", - "remarks": "rule_set_060" + "remarks": "rule_set_061" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_randomize_va_space", - "remarks": "rule_set_060" + "remarks": "rule_set_061" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Randomized Layout of Virtual Address Space", - "remarks": "rule_set_060" + "remarks": "rule_set_061" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_exec_shield", - "remarks": "rule_set_061" + "remarks": "rule_set_062" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable ExecShield via sysctl", - "remarks": "rule_set_061" + "remarks": "rule_set_062" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_exec_shield", - "remarks": "rule_set_061" + "remarks": "rule_set_062" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable ExecShield via sysctl", - "remarks": "rule_set_061" + "remarks": "rule_set_062" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_kptr_restrict", - "remarks": "rule_set_062" + "remarks": "rule_set_063" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Exposed Kernel Pointer Addresses Access", - "remarks": "rule_set_062" + "remarks": "rule_set_063" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_kptr_restrict", - "remarks": "rule_set_062" + "remarks": "rule_set_063" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Exposed Kernel Pointer Addresses Access", - "remarks": "rule_set_062" + "remarks": "rule_set_063" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_dmesg_restrict", - "remarks": "rule_set_063" + "remarks": "rule_set_064" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Access to Kernel Message Buffer", - "remarks": "rule_set_063" + "remarks": "rule_set_064" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_dmesg_restrict", - "remarks": "rule_set_063" + "remarks": "rule_set_064" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict Access to Kernel Message Buffer", - "remarks": "rule_set_063" + "remarks": "rule_set_064" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_kexec_load_disabled", - "remarks": "rule_set_064" + "remarks": "rule_set_065" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Image Loading", - "remarks": "rule_set_064" + "remarks": "rule_set_065" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_kexec_load_disabled", - "remarks": "rule_set_064" + "remarks": "rule_set_065" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kernel Image Loading", - "remarks": "rule_set_064" + "remarks": "rule_set_065" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_yama_ptrace_scope", - "remarks": "rule_set_065" + "remarks": "rule_set_066" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict usage of ptrace to descendant processes", - "remarks": "rule_set_065" + "remarks": "rule_set_066" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_yama_ptrace_scope", - "remarks": "rule_set_065" + "remarks": "rule_set_066" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Restrict usage of ptrace to descendant processes", - "remarks": "rule_set_065" + "remarks": "rule_set_066" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_unprivileged_bpf_disabled", - "remarks": "rule_set_066" + "remarks": "rule_set_067" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Access to Network bpf() Syscall From Unprivileged Processes", - "remarks": "rule_set_066" + "remarks": "rule_set_067" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_kernel_unprivileged_bpf_disabled", - "remarks": "rule_set_066" + "remarks": "rule_set_067" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Access to Network bpf() Syscall From Unprivileged Processes", - "remarks": "rule_set_066" + "remarks": "rule_set_067" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_core_bpf_jit_harden", - "remarks": "rule_set_067" + "remarks": "rule_set_068" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Harden the operation of the BPF just-in-time compiler", - "remarks": "rule_set_067" + "remarks": "rule_set_068" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sysctl_net_core_bpf_jit_harden", - "remarks": "rule_set_067" + "remarks": "rule_set_068" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Harden the operation of the BPF just-in-time compiler", - "remarks": "rule_set_067" + "remarks": "rule_set_068" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_state", - "remarks": "rule_set_068" + "remarks": "rule_set_069" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SELinux State is Enforcing", - "remarks": "rule_set_068" + "remarks": "rule_set_069" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_state", - "remarks": "rule_set_068" + "remarks": "rule_set_069" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure SELinux State is Enforcing", - "remarks": "rule_set_068" + "remarks": "rule_set_069" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_policytype", - "remarks": "rule_set_069" + "remarks": "rule_set_070" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure SELinux Policy", - "remarks": "rule_set_069" + "remarks": "rule_set_070" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "selinux_policytype", - "remarks": "rule_set_069" + "remarks": "rule_set_070" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure SELinux Policy", - "remarks": "rule_set_069" + "remarks": "rule_set_070" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_sgid", - "remarks": "rule_set_070" + "remarks": "rule_set_071" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All SGID Executables Are Authorized", - "remarks": "rule_set_070" + "remarks": "rule_set_071" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_sgid", - "remarks": "rule_set_070" + "remarks": "rule_set_071" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All SGID Executables Are Authorized", - "remarks": "rule_set_070" + "remarks": "rule_set_071" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_suid", - "remarks": "rule_set_071" + "remarks": "rule_set_072" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All SUID Executables Are Authorized", - "remarks": "rule_set_071" + "remarks": "rule_set_072" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_suid", - "remarks": "rule_set_071" + "remarks": "rule_set_072" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure All SUID Executables Are Authorized", - "remarks": "rule_set_071" + "remarks": "rule_set_072" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_072" + "remarks": "rule_set_073" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_072" + "remarks": "rule_set_073" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_unauthorized_world_writable", - "remarks": "rule_set_072" + "remarks": "rule_set_073" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure No World-Writable Files Exist", - "remarks": "rule_set_072" + "remarks": "rule_set_073" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_073" + "remarks": "rule_set_074" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_073" + "remarks": "rule_set_074" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dir_perms_world_writable_sticky_bits", - "remarks": "rule_set_073" + "remarks": "rule_set_074" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that All World-Writable Directories Have Sticky Bits Set", - "remarks": "rule_set_073" + "remarks": "rule_set_074" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_library_dirs", - "remarks": "rule_set_074" + "remarks": "rule_set_075" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that Shared Library Files Have Restrictive Permissions", - "remarks": "rule_set_074" + "remarks": "rule_set_075" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_library_dirs", - "remarks": "rule_set_074" + "remarks": "rule_set_075" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that Shared Library Files Have Restrictive Permissions", - "remarks": "rule_set_074" + "remarks": "rule_set_075" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_binary_dirs", - "remarks": "rule_set_075" + "remarks": "rule_set_076" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that System Executables Have Root Ownership", - "remarks": "rule_set_075" + "remarks": "rule_set_076" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_binary_dirs", - "remarks": "rule_set_075" + "remarks": "rule_set_076" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that System Executables Have Root Ownership", - "remarks": "rule_set_075" + "remarks": "rule_set_076" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_binary_dirs", - "remarks": "rule_set_076" + "remarks": "rule_set_077" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that System Executables Have Restrictive Permissions", - "remarks": "rule_set_076" + "remarks": "rule_set_077" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_binary_dirs", - "remarks": "rule_set_076" + "remarks": "rule_set_077" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that System Executables Have Restrictive Permissions", - "remarks": "rule_set_076" + "remarks": "rule_set_077" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_library_dirs", - "remarks": "rule_set_077" + "remarks": "rule_set_078" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that Shared Library Files Have Root Ownership", - "remarks": "rule_set_077" + "remarks": "rule_set_078" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_library_dirs", - "remarks": "rule_set_077" + "remarks": "rule_set_078" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that Shared Library Files Have Root Ownership", - "remarks": "rule_set_077" + "remarks": "rule_set_078" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords", - "remarks": "rule_set_078" + "remarks": "rule_set_079" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent Login to Accounts With Empty Password", - "remarks": "rule_set_078" + "remarks": "rule_set_079" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_empty_passwords", - "remarks": "rule_set_078" + "remarks": "rule_set_079" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent Login to Accounts With Empty Password", - "remarks": "rule_set_078" + "remarks": "rule_set_079" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_dev_shm_nodev", - "remarks": "rule_set_079" + "remarks": "rule_set_080" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nodev Option to /dev/shm", - "remarks": "rule_set_079" + "remarks": "rule_set_080" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_dev_shm_nodev", - "remarks": "rule_set_079" + "remarks": "rule_set_080" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nodev Option to /dev/shm", - "remarks": "rule_set_079" + "remarks": "rule_set_080" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_dev_shm_nosuid", - "remarks": "rule_set_080" + "remarks": "rule_set_081" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /dev/shm", - "remarks": "rule_set_080" + "remarks": "rule_set_081" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_dev_shm_nosuid", - "remarks": "rule_set_080" + "remarks": "rule_set_081" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add nosuid Option to /dev/shm", - "remarks": "rule_set_080" + "remarks": "rule_set_081" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_dev_shm_noexec", - "remarks": "rule_set_081" + "remarks": "rule_set_082" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add noexec Option to /dev/shm", - "remarks": "rule_set_081" + "remarks": "rule_set_082" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "mount_option_dev_shm_noexec", - "remarks": "rule_set_081" + "remarks": "rule_set_082" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Add noexec Option to /dev/shm", - "remarks": "rule_set_081" + "remarks": "rule_set_082" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_firewalld_installed", - "remarks": "rule_set_082" + "remarks": "rule_set_083" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install firewalld Package", - "remarks": "rule_set_082" + "remarks": "rule_set_083" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_firewalld_installed", - "remarks": "rule_set_082" + "remarks": "rule_set_083" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install firewalld Package", - "remarks": "rule_set_082" + "remarks": "rule_set_083" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_firewalld_enabled", - "remarks": "rule_set_083" + "remarks": "rule_set_084" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify firewalld Enabled", - "remarks": "rule_set_083" + "remarks": "rule_set_084" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_firewalld_enabled", - "remarks": "rule_set_083" + "remarks": "rule_set_084" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify firewalld Enabled", - "remarks": "rule_set_083" + "remarks": "rule_set_084" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "network_sniffer_disabled", - "remarks": "rule_set_084" + "remarks": "rule_set_085" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System is Not Acting as a Network Sniffer", - "remarks": "rule_set_084" + "remarks": "rule_set_085" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "network_sniffer_disabled", - "remarks": "rule_set_084" + "remarks": "rule_set_085" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System is Not Acting as a Network Sniffer", - "remarks": "rule_set_084" + "remarks": "rule_set_085" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_maximum_age_login_defs", - "remarks": "rule_set_085" + "remarks": "rule_set_086" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Age", - "remarks": "rule_set_085" + "remarks": "rule_set_086" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_maximum_age_login_defs", - "remarks": "rule_set_085" + "remarks": "rule_set_086" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Maximum Age", - "remarks": "rule_set_085" + "remarks": "rule_set_086" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_minimum_age_login_defs", - "remarks": "rule_set_086" + "remarks": "rule_set_087" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Minimum Age", - "remarks": "rule_set_086" + "remarks": "rule_set_087" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_minimum_age_login_defs", - "remarks": "rule_set_086" + "remarks": "rule_set_087" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Minimum Age", - "remarks": "rule_set_086" + "remarks": "rule_set_087" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_warn_age_login_defs", - "remarks": "rule_set_087" + "remarks": "rule_set_088" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Warning Age", - "remarks": "rule_set_087" + "remarks": "rule_set_088" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_warn_age_login_defs", - "remarks": "rule_set_087" + "remarks": "rule_set_088" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Warning Age", - "remarks": "rule_set_087" + "remarks": "rule_set_088" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_kerberos_crypto_policy", - "remarks": "rule_set_088" + "remarks": "rule_set_089" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Kerberos to use System Crypto Policy", - "remarks": "rule_set_088" + "remarks": "rule_set_089" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_kerberos_crypto_policy", - "remarks": "rule_set_088" + "remarks": "rule_set_089" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Kerberos to use System Crypto Policy", - "remarks": "rule_set_088" + "remarks": "rule_set_089" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "enable_ldap_client", - "remarks": "rule_set_089" + "remarks": "rule_set_090" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable the LDAP Client For Use in Authconfig", - "remarks": "rule_set_089" + "remarks": "rule_set_090" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "enable_ldap_client", - "remarks": "rule_set_089" + "remarks": "rule_set_090" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable the LDAP Client For Use in Authconfig", - "remarks": "rule_set_089" + "remarks": "rule_set_090" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kerberos_disable_no_keytab", - "remarks": "rule_set_090" + "remarks": "rule_set_091" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kerberos by removing host keytab", - "remarks": "rule_set_090" + "remarks": "rule_set_091" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "kerberos_disable_no_keytab", - "remarks": "rule_set_090" + "remarks": "rule_set_091" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kerberos by removing host keytab", - "remarks": "rule_set_090" + "remarks": "rule_set_091" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "network_nmcli_permissions", - "remarks": "rule_set_091" + "remarks": "rule_set_092" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent non-Privileged Users from Modifying Network Interfaces using nmcli", - "remarks": "rule_set_091" + "remarks": "rule_set_092" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "network_nmcli_permissions", - "remarks": "rule_set_091" + "remarks": "rule_set_092" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Prevent non-Privileged Users from Modifying Network Interfaces using nmcli", - "remarks": "rule_set_091" + "remarks": "rule_set_092" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sebool_kerberos_enabled", - "remarks": "rule_set_092" + "remarks": "rule_set_093" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable the kerberos_enabled SELinux Boolean", - "remarks": "rule_set_092" + "remarks": "rule_set_093" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sebool_kerberos_enabled", - "remarks": "rule_set_092" + "remarks": "rule_set_093" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable the kerberos_enabled SELinux Boolean", - "remarks": "rule_set_092" + "remarks": "rule_set_093" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_libuserconf", - "remarks": "rule_set_093" + "remarks": "rule_set_094" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/libuser.conf", - "remarks": "rule_set_093" + "remarks": "rule_set_094" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_libuserconf", - "remarks": "rule_set_093" + "remarks": "rule_set_094" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/libuser.conf", - "remarks": "rule_set_093" + "remarks": "rule_set_094" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_logindefs", - "remarks": "rule_set_094" + "remarks": "rule_set_095" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/login.defs", - "remarks": "rule_set_094" + "remarks": "rule_set_095" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_logindefs", - "remarks": "rule_set_094" + "remarks": "rule_set_095" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Hashing Algorithm in /etc/login.defs", - "remarks": "rule_set_094" + "remarks": "rule_set_095" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_passwordauth", - "remarks": "rule_set_095" + "remarks": "rule_set_096" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - password-auth", - "remarks": "rule_set_095" + "remarks": "rule_set_096" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_passwordauth", - "remarks": "rule_set_095" + "remarks": "rule_set_096" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - password-auth", - "remarks": "rule_set_095" + "remarks": "rule_set_096" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_systemauth", - "remarks": "rule_set_096" + "remarks": "rule_set_097" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - system-auth", - "remarks": "rule_set_096" + "remarks": "rule_set_097" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_password_hashing_algorithm_systemauth", - "remarks": "rule_set_096" + "remarks": "rule_set_097" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set PAM Password Hashing Algorithm - system-auth", - "remarks": "rule_set_096" + "remarks": "rule_set_097" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_minlen_login_defs", - "remarks": "rule_set_097" + "remarks": "rule_set_098" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Minimum Length in login.defs", - "remarks": "rule_set_097" + "remarks": "rule_set_098" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_minlen_login_defs", - "remarks": "rule_set_097" + "remarks": "rule_set_098" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Password Minimum Length in login.defs", - "remarks": "rule_set_097" + "remarks": "rule_set_098" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_dcredit", - "remarks": "rule_set_098" + "remarks": "rule_set_099" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Digit Characters", - "remarks": "rule_set_098" + "remarks": "rule_set_099" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_dcredit", - "remarks": "rule_set_098" + "remarks": "rule_set_099" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Digit Characters", - "remarks": "rule_set_098" + "remarks": "rule_set_099" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_lcredit", - "remarks": "rule_set_099" + "remarks": "rule_set_100" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Lowercase Characters", - "remarks": "rule_set_099" + "remarks": "rule_set_100" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_lcredit", - "remarks": "rule_set_099" + "remarks": "rule_set_100" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Lowercase Characters", - "remarks": "rule_set_099" + "remarks": "rule_set_100" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minclass", - "remarks": "rule_set_100" + "remarks": "rule_set_101" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", - "remarks": "rule_set_100" + "remarks": "rule_set_101" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minclass", - "remarks": "rule_set_100" + "remarks": "rule_set_101" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Different Categories", - "remarks": "rule_set_100" + "remarks": "rule_set_101" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minlen", - "remarks": "rule_set_101" + "remarks": "rule_set_102" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Length", - "remarks": "rule_set_101" + "remarks": "rule_set_102" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_minlen", - "remarks": "rule_set_101" + "remarks": "rule_set_102" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Length", - "remarks": "rule_set_101" + "remarks": "rule_set_102" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_ocredit", - "remarks": "rule_set_102" + "remarks": "rule_set_103" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Special Characters", - "remarks": "rule_set_102" + "remarks": "rule_set_103" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_ocredit", - "remarks": "rule_set_102" + "remarks": "rule_set_103" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Special Characters", - "remarks": "rule_set_102" + "remarks": "rule_set_103" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_ucredit", - "remarks": "rule_set_103" + "remarks": "rule_set_104" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Uppercase Characters", - "remarks": "rule_set_103" + "remarks": "rule_set_104" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_password_pam_ucredit", - "remarks": "rule_set_103" + "remarks": "rule_set_104" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Enforces Password Requirements - Minimum Uppercase Characters", - "remarks": "rule_set_103" + "remarks": "rule_set_104" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny", - "remarks": "rule_set_104" + "remarks": "rule_set_105" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Lock Accounts After Failed Password Attempts", - "remarks": "rule_set_104" + "remarks": "rule_set_105" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny", - "remarks": "rule_set_104" + "remarks": "rule_set_105" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Lock Accounts After Failed Password Attempts", - "remarks": "rule_set_104" + "remarks": "rule_set_105" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny_root", - "remarks": "rule_set_105" + "remarks": "rule_set_106" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the root Account for Failed Password Attempts", - "remarks": "rule_set_105" + "remarks": "rule_set_106" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_deny_root", - "remarks": "rule_set_105" + "remarks": "rule_set_106" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the root Account for Failed Password Attempts", - "remarks": "rule_set_105" + "remarks": "rule_set_106" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_interval", - "remarks": "rule_set_106" + "remarks": "rule_set_107" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Interval For Counting Failed Password Attempts", - "remarks": "rule_set_106" + "remarks": "rule_set_107" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_interval", - "remarks": "rule_set_106" + "remarks": "rule_set_107" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Interval For Counting Failed Password Attempts", - "remarks": "rule_set_106" + "remarks": "rule_set_107" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_unlock_time", - "remarks": "rule_set_107" + "remarks": "rule_set_108" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Lockout Time for Failed Password Attempts", - "remarks": "rule_set_107" + "remarks": "rule_set_108" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "accounts_passwords_pam_faillock_unlock_time", - "remarks": "rule_set_107" + "remarks": "rule_set_108" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Lockout Time for Failed Password Attempts", - "remarks": "rule_set_107" + "remarks": "rule_set_108" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_host_auth", - "remarks": "rule_set_108" + "remarks": "rule_set_109" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Host-Based Authentication", - "remarks": "rule_set_108" + "remarks": "rule_set_109" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "disable_host_auth", - "remarks": "rule_set_108" + "remarks": "rule_set_109" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Host-Based Authentication", - "remarks": "rule_set_108" + "remarks": "rule_set_109" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "require_emergency_target_auth", - "remarks": "rule_set_109" + "remarks": "rule_set_110" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require Authentication for Emergency Systemd Target", - "remarks": "rule_set_109" + "remarks": "rule_set_110" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "require_emergency_target_auth", - "remarks": "rule_set_109" + "remarks": "rule_set_110" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Require Authentication for Emergency Systemd Target", - "remarks": "rule_set_109" + "remarks": "rule_set_110" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sebool_authlogin_nsswitch_use_ldap", - "remarks": "rule_set_110" + "remarks": "rule_set_111" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the authlogin_nsswitch_use_ldap SELinux Boolean", - "remarks": "rule_set_110" + "remarks": "rule_set_111" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sebool_authlogin_nsswitch_use_ldap", - "remarks": "rule_set_110" + "remarks": "rule_set_111" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the authlogin_nsswitch_use_ldap SELinux Boolean", - "remarks": "rule_set_110" + "remarks": "rule_set_111" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sebool_authlogin_radius", - "remarks": "rule_set_111" + "remarks": "rule_set_112" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the authlogin_radius SELinux Boolean", - "remarks": "rule_set_111" + "remarks": "rule_set_112" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sebool_authlogin_radius", - "remarks": "rule_set_111" + "remarks": "rule_set_112" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable the authlogin_radius SELinux Boolean", - "remarks": "rule_set_111" + "remarks": "rule_set_112" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_kerb_auth", - "remarks": "rule_set_112" + "remarks": "rule_set_113" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kerberos Authentication", - "remarks": "rule_set_112" + "remarks": "rule_set_113" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_kerb_auth", - "remarks": "rule_set_112" + "remarks": "rule_set_113" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable Kerberos Authentication", - "remarks": "rule_set_112" + "remarks": "rule_set_113" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_auth_tries", - "remarks": "rule_set_113" + "remarks": "rule_set_114" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH authentication attempt limit", - "remarks": "rule_set_113" + "remarks": "rule_set_114" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_set_max_auth_tries", - "remarks": "rule_set_113" + "remarks": "rule_set_114" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set SSH authentication attempt limit", - "remarks": "rule_set_113" + "remarks": "rule_set_114" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sssd_enable_smartcards", - "remarks": "rule_set_114" + "remarks": "rule_set_115" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Smartcards in SSSD", - "remarks": "rule_set_114" + "remarks": "rule_set_115" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sssd_enable_smartcards", - "remarks": "rule_set_114" + "remarks": "rule_set_115" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Smartcards in SSSD", - "remarks": "rule_set_114" + "remarks": "rule_set_115" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_warning_banner", - "remarks": "rule_set_115" + "remarks": "rule_set_116" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable SSH Warning Banner", - "remarks": "rule_set_115" + "remarks": "rule_set_116" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_enable_warning_banner", - "remarks": "rule_set_115" + "remarks": "rule_set_116" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable SSH Warning Banner", - "remarks": "rule_set_115" + "remarks": "rule_set_116" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_x11_forwarding", - "remarks": "rule_set_116" + "remarks": "rule_set_117" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable X11 Forwarding", - "remarks": "rule_set_116" + "remarks": "rule_set_117" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sshd_disable_x11_forwarding", - "remarks": "rule_set_116" + "remarks": "rule_set_117" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable X11 Forwarding", - "remarks": "rule_set_116" + "remarks": "rule_set_117" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_access_failed", - "remarks": "rule_set_117" + "remarks": "rule_set_118" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditing of unsuccessful file accesses", - "remarks": "rule_set_117" + "remarks": "rule_set_118" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_access_failed", - "remarks": "rule_set_117" + "remarks": "rule_set_118" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditing of unsuccessful file accesses", - "remarks": "rule_set_117" + "remarks": "rule_set_118" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_access_failed_aarch64", - "remarks": "rule_set_118" + "remarks": "rule_set_119" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditing of unsuccessful file accesses (AArch64)", - "remarks": "rule_set_118" + "remarks": "rule_set_119" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_access_failed_aarch64", - "remarks": "rule_set_118" + "remarks": "rule_set_119" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditing of unsuccessful file accesses (AArch64)", - "remarks": "rule_set_118" + "remarks": "rule_set_119" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_access_failed_ppc64le", - "remarks": "rule_set_119" + "remarks": "rule_set_120" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditing of unsuccessful file accesses (ppc64le)", - "remarks": "rule_set_119" + "remarks": "rule_set_120" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_access_failed_ppc64le", - "remarks": "rule_set_119" + "remarks": "rule_set_120" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditing of unsuccessful file accesses (ppc64le)", - "remarks": "rule_set_119" + "remarks": "rule_set_120" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_access_success", - "remarks": "rule_set_120" + "remarks": "rule_set_121" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditing of successful file accesses", - "remarks": "rule_set_120" + "remarks": "rule_set_121" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_access_success", - "remarks": "rule_set_120" + "remarks": "rule_set_121" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditing of successful file accesses", - "remarks": "rule_set_120" + "remarks": "rule_set_121" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_access_success_aarch64", - "remarks": "rule_set_121" + "remarks": "rule_set_122" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditing of successful file accesses (AArch64)", - "remarks": "rule_set_121" + "remarks": "rule_set_122" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_access_success_aarch64", - "remarks": "rule_set_121" + "remarks": "rule_set_122" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditing of successful file accesses (AArch64)", - "remarks": "rule_set_121" + "remarks": "rule_set_122" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_access_success_ppc64le", - "remarks": "rule_set_122" + "remarks": "rule_set_123" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditing of successful file accesses (ppc64le)", - "remarks": "rule_set_122" + "remarks": "rule_set_123" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_access_success_ppc64le", - "remarks": "rule_set_122" + "remarks": "rule_set_123" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditing of successful file accesses (ppc64le)", - "remarks": "rule_set_122" + "remarks": "rule_set_123" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands", - "remarks": "rule_set_123" + "remarks": "rule_set_124" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands", - "remarks": "rule_set_123" + "remarks": "rule_set_124" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_privileged_commands", - "remarks": "rule_set_123" + "remarks": "rule_set_124" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on the Use of Privileged Commands", - "remarks": "rule_set_123" + "remarks": "rule_set_124" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_utmp", - "remarks": "rule_set_124" + "remarks": "rule_set_125" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information utmp", - "remarks": "rule_set_124" + "remarks": "rule_set_125" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_utmp", - "remarks": "rule_set_124" + "remarks": "rule_set_125" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information utmp", - "remarks": "rule_set_124" + "remarks": "rule_set_125" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_btmp", - "remarks": "rule_set_125" + "remarks": "rule_set_126" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information btmp", - "remarks": "rule_set_125" + "remarks": "rule_set_126" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_btmp", - "remarks": "rule_set_125" + "remarks": "rule_set_126" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information btmp", - "remarks": "rule_set_125" + "remarks": "rule_set_126" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_wtmp", - "remarks": "rule_set_126" + "remarks": "rule_set_127" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", - "remarks": "rule_set_126" + "remarks": "rule_set_127" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_session_events_wtmp", - "remarks": "rule_set_126" + "remarks": "rule_set_127" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", - "remarks": "rule_set_126" + "remarks": "rule_set_127" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_creat", - "remarks": "rule_set_127" + "remarks": "rule_set_128" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - creat", - "remarks": "rule_set_127" + "remarks": "rule_set_128" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_creat", - "remarks": "rule_set_127" + "remarks": "rule_set_128" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - creat", - "remarks": "rule_set_127" + "remarks": "rule_set_128" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_open", - "remarks": "rule_set_128" + "remarks": "rule_set_129" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - open", - "remarks": "rule_set_128" + "remarks": "rule_set_129" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_open", - "remarks": "rule_set_128" + "remarks": "rule_set_129" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - open", - "remarks": "rule_set_128" + "remarks": "rule_set_129" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_openat", - "remarks": "rule_set_129" + "remarks": "rule_set_130" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - openat", - "remarks": "rule_set_129" + "remarks": "rule_set_130" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_openat", - "remarks": "rule_set_129" + "remarks": "rule_set_130" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - openat", - "remarks": "rule_set_129" + "remarks": "rule_set_130" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_open_by_handle_at", - "remarks": "rule_set_130" + "remarks": "rule_set_131" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - open_by_handle_at", - "remarks": "rule_set_130" + "remarks": "rule_set_131" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_open_by_handle_at", - "remarks": "rule_set_130" + "remarks": "rule_set_131" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - open_by_handle_at", - "remarks": "rule_set_130" + "remarks": "rule_set_131" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_truncate", - "remarks": "rule_set_131" + "remarks": "rule_set_132" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - truncate", - "remarks": "rule_set_131" + "remarks": "rule_set_132" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_truncate", - "remarks": "rule_set_131" + "remarks": "rule_set_132" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - truncate", - "remarks": "rule_set_131" + "remarks": "rule_set_132" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_ftruncate", - "remarks": "rule_set_132" + "remarks": "rule_set_133" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - ftruncate", - "remarks": "rule_set_132" + "remarks": "rule_set_133" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_unsuccessful_file_modification_ftruncate", - "remarks": "rule_set_132" + "remarks": "rule_set_133" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Unsuccessful Access Attempts to Files - ftruncate", - "remarks": "rule_set_132" + "remarks": "rule_set_133" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit_installed", - "remarks": "rule_set_133" + "remarks": "rule_set_134" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit Subsystem is Installed", - "remarks": "rule_set_133" + "remarks": "rule_set_134" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit_installed", - "remarks": "rule_set_133" + "remarks": "rule_set_134" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit Subsystem is Installed", - "remarks": "rule_set_133" + "remarks": "rule_set_134" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sebool_auditadm_exec_content", - "remarks": "rule_set_134" + "remarks": "rule_set_135" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable the auditadm_exec_content SELinux Boolean", - "remarks": "rule_set_134" + "remarks": "rule_set_135" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "sebool_auditadm_exec_content", - "remarks": "rule_set_134" + "remarks": "rule_set_135" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable the auditadm_exec_content SELinux Boolean", - "remarks": "rule_set_134" + "remarks": "rule_set_135" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_configure_pool_and_server", - "remarks": "rule_set_135" + "remarks": "rule_set_136" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Chrony Configure Pool and Server", - "remarks": "rule_set_135" + "remarks": "rule_set_136" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_configure_pool_and_server", - "remarks": "rule_set_135" + "remarks": "rule_set_136" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Chrony Configure Pool and Server", - "remarks": "rule_set_135" + "remarks": "rule_set_136" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_or_ntpd_specify_multiple_servers", - "remarks": "rule_set_136" + "remarks": "rule_set_137" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Specify Additional Remote NTP Servers", - "remarks": "rule_set_136" + "remarks": "rule_set_137" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_or_ntpd_specify_multiple_servers", - "remarks": "rule_set_136" + "remarks": "rule_set_137" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Specify Additional Remote NTP Servers", - "remarks": "rule_set_136" + "remarks": "rule_set_137" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_specify_remote_server", - "remarks": "rule_set_137" + "remarks": "rule_set_138" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "A remote time server for Chrony is configured", - "remarks": "rule_set_137" + "remarks": "rule_set_138" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_specify_remote_server", - "remarks": "rule_set_137" + "remarks": "rule_set_138" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "A remote time server for Chrony is configured", - "remarks": "rule_set_137" + "remarks": "rule_set_138" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_chrony_installed", - "remarks": "rule_set_138" + "remarks": "rule_set_139" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "The Chrony package is installed", - "remarks": "rule_set_138" + "remarks": "rule_set_139" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_chrony_installed", - "remarks": "rule_set_138" + "remarks": "rule_set_139" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "The Chrony package is installed", - "remarks": "rule_set_138" + "remarks": "rule_set_139" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_cron_logging", - "remarks": "rule_set_139" + "remarks": "rule_set_140" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure cron Is Logging To Rsyslog", - "remarks": "rule_set_139" + "remarks": "rule_set_140" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_cron_logging", - "remarks": "rule_set_139" + "remarks": "rule_set_140" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure cron Is Logging To Rsyslog", - "remarks": "rule_set_139" + "remarks": "rule_set_140" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_140" + "remarks": "rule_set_141" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_140" + "remarks": "rule_set_141" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_140" + "remarks": "rule_set_141" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_140" + "remarks": "rule_set_141" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_141" + "remarks": "rule_set_142" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_141" + "remarks": "rule_set_142" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_141" + "remarks": "rule_set_142" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_141" + "remarks": "rule_set_142" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_142" + "remarks": "rule_set_143" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_142" + "remarks": "rule_set_143" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_142" + "remarks": "rule_set_143" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_142" + "remarks": "rule_set_143" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_nolisten", - "remarks": "rule_set_143" + "remarks": "rule_set_144" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure rsyslog Does Not Accept Remote Messages Unless Acting As Log Server", - "remarks": "rule_set_143" + "remarks": "rule_set_144" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_nolisten", - "remarks": "rule_set_143" + "remarks": "rule_set_144" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure rsyslog Does Not Accept Remote Messages Unless Acting As Log Server", - "remarks": "rule_set_143" + "remarks": "rule_set_144" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_remote_loghost", - "remarks": "rule_set_144" + "remarks": "rule_set_145" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Logs Sent To Remote Host", - "remarks": "rule_set_144" + "remarks": "rule_set_145" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_remote_loghost", - "remarks": "rule_set_144" + "remarks": "rule_set_145" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Logs Sent To Remote Host", - "remarks": "rule_set_144" + "remarks": "rule_set_145" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_remote_tls", - "remarks": "rule_set_145" + "remarks": "rule_set_146" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure TLS for rsyslog remote logging", - "remarks": "rule_set_145" + "remarks": "rule_set_146" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_remote_tls", - "remarks": "rule_set_145" + "remarks": "rule_set_146" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure TLS for rsyslog remote logging", - "remarks": "rule_set_145" + "remarks": "rule_set_146" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_remote_tls_cacert", - "remarks": "rule_set_146" + "remarks": "rule_set_147" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure CA certificate for rsyslog remote logging", - "remarks": "rule_set_146" + "remarks": "rule_set_147" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_remote_tls_cacert", - "remarks": "rule_set_146" + "remarks": "rule_set_147" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure CA certificate for rsyslog remote logging", - "remarks": "rule_set_146" + "remarks": "rule_set_147" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_chronyd_enabled", - "remarks": "rule_set_147" + "remarks": "rule_set_148" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "The Chronyd service is enabled", - "remarks": "rule_set_147" + "remarks": "rule_set_148" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_chronyd_enabled", - "remarks": "rule_set_147" + "remarks": "rule_set_148" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "The Chronyd service is enabled", - "remarks": "rule_set_147" + "remarks": "rule_set_148" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_148" + "remarks": "rule_set_149" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_148" + "remarks": "rule_set_149" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_148" + "remarks": "rule_set_149" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_148" + "remarks": "rule_set_149" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_snmpd_disabled", - "remarks": "rule_set_149" + "remarks": "rule_set_150" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable snmpd Service", - "remarks": "rule_set_149" + "remarks": "rule_set_150" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_snmpd_disabled", - "remarks": "rule_set_149" + "remarks": "rule_set_150" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Disable snmpd Service", - "remarks": "rule_set_149" + "remarks": "rule_set_150" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "snmpd_use_newer_protocol", - "remarks": "rule_set_150" + "remarks": "rule_set_151" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure SNMP Service to Use Only SNMPv3 or Newer", - "remarks": "rule_set_150" + "remarks": "rule_set_151" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "snmpd_use_newer_protocol", - "remarks": "rule_set_150" + "remarks": "rule_set_151" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure SNMP Service to Use Only SNMPv3 or Newer", - "remarks": "rule_set_150" + "remarks": "rule_set_151" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "network_ipv6_static_address", - "remarks": "rule_set_151" + "remarks": "rule_set_152" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Manually Assign Global IPv6 Address", - "remarks": "rule_set_151" + "remarks": "rule_set_152" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "network_ipv6_static_address", - "remarks": "rule_set_151" + "remarks": "rule_set_152" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Manually Assign Global IPv6 Address", - "remarks": "rule_set_151" + "remarks": "rule_set_152" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "wireless_disable_interfaces", - "remarks": "rule_set_152" + "remarks": "rule_set_153" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Deactivate Wireless Network Interfaces", - "remarks": "rule_set_152" + "remarks": "rule_set_153" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "wireless_disable_interfaces", - "remarks": "rule_set_152" + "remarks": "rule_set_153" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Deactivate Wireless Network Interfaces", - "remarks": "rule_set_152" + "remarks": "rule_set_153" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_opensc_card_drivers", - "remarks": "rule_set_153" + "remarks": "rule_set_154" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure opensc Smart Card Drivers", - "remarks": "rule_set_153" + "remarks": "rule_set_154" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_opensc_card_drivers", - "remarks": "rule_set_153" + "remarks": "rule_set_154" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure opensc Smart Card Drivers", - "remarks": "rule_set_153" + "remarks": "rule_set_154" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_opensc_installed", - "remarks": "rule_set_154" + "remarks": "rule_set_155" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install the opensc Package For Multifactor Authentication", - "remarks": "rule_set_154" + "remarks": "rule_set_155" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_opensc_installed", - "remarks": "rule_set_154" + "remarks": "rule_set_155" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install the opensc Package For Multifactor Authentication", - "remarks": "rule_set_154" + "remarks": "rule_set_155" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_pcsc-lite_installed", - "remarks": "rule_set_155" + "remarks": "rule_set_156" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install the pcsc-lite package", - "remarks": "rule_set_155" + "remarks": "rule_set_156" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_pcsc-lite_installed", - "remarks": "rule_set_155" + "remarks": "rule_set_156" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install the pcsc-lite package", - "remarks": "rule_set_155" + "remarks": "rule_set_156" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_pcsc-lite-ccid_installed", - "remarks": "rule_set_156" + "remarks": "rule_set_157" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install the pcsc-lite-ccid package", - "remarks": "rule_set_156" + "remarks": "rule_set_157" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_pcsc-lite-ccid_installed", - "remarks": "rule_set_156" + "remarks": "rule_set_157" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install the pcsc-lite-ccid package", - "remarks": "rule_set_156" + "remarks": "rule_set_157" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_sudo_installed", - "remarks": "rule_set_157" + "remarks": "rule_set_158" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install sudo Package", - "remarks": "rule_set_157" + "remarks": "rule_set_158" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_sudo_installed", - "remarks": "rule_set_157" + "remarks": "rule_set_158" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install sudo Package", - "remarks": "rule_set_157" + "remarks": "rule_set_158" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_pcscd_enabled", - "remarks": "rule_set_158" + "remarks": "rule_set_159" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable the pcscd Service", - "remarks": "rule_set_158" + "remarks": "rule_set_159" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_pcscd_enabled", - "remarks": "rule_set_158" + "remarks": "rule_set_159" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable the pcscd Service", - "remarks": "rule_set_158" + "remarks": "rule_set_159" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_firewalld_ports", - "remarks": "rule_set_159" + "remarks": "rule_set_160" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Firewalld Ports", - "remarks": "rule_set_159" + "remarks": "rule_set_160" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "configure_firewalld_ports", - "remarks": "rule_set_159" + "remarks": "rule_set_160" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure the Firewalld Ports", - "remarks": "rule_set_159" + "remarks": "rule_set_160" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_firewalld_default_zone", - "remarks": "rule_set_160" + "remarks": "rule_set_161" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Default firewalld Zone for Incoming Packets", - "remarks": "rule_set_160" + "remarks": "rule_set_161" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "set_firewalld_default_zone", - "remarks": "rule_set_160" + "remarks": "rule_set_161" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set Default firewalld Zone for Incoming Packets", - "remarks": "rule_set_160" + "remarks": "rule_set_161" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_usbguard_installed", - "remarks": "rule_set_161" + "remarks": "rule_set_162" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install usbguard Package", - "remarks": "rule_set_161" + "remarks": "rule_set_162" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_usbguard_installed", - "remarks": "rule_set_161" + "remarks": "rule_set_162" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install usbguard Package", - "remarks": "rule_set_161" + "remarks": "rule_set_162" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_usbguard_enabled", - "remarks": "rule_set_162" + "remarks": "rule_set_163" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable the USBGuard Service", - "remarks": "rule_set_162" + "remarks": "rule_set_163" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_usbguard_enabled", - "remarks": "rule_set_162" + "remarks": "rule_set_163" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable the USBGuard Service", - "remarks": "rule_set_162" + "remarks": "rule_set_163" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "system_booted_in_fips_mode", - "remarks": "rule_set_163" + "remarks": "rule_set_164" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that the system was booted with fips=1", - "remarks": "rule_set_163" + "remarks": "rule_set_164" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "system_booted_in_fips_mode", - "remarks": "rule_set_163" + "remarks": "rule_set_164" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify that the system was booted with fips=1", - "remarks": "rule_set_163" + "remarks": "rule_set_164" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "enable_fips_mode", - "remarks": "rule_set_164" + "remarks": "rule_set_165" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable FIPS Mode", - "remarks": "rule_set_164" + "remarks": "rule_set_165" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "enable_fips_mode", - "remarks": "rule_set_164" + "remarks": "rule_set_165" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable FIPS Mode", - "remarks": "rule_set_164" + "remarks": "rule_set_165" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_private_key", - "remarks": "rule_set_165" + "remarks": "rule_set_166" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Private *_key Key Files", - "remarks": "rule_set_165" + "remarks": "rule_set_166" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_sshd_private_key", - "remarks": "rule_set_165" + "remarks": "rule_set_166" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify Permissions on SSH Server Private *_key Key Files", - "remarks": "rule_set_165" + "remarks": "rule_set_166" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dnf-automatic_apply_updates", - "remarks": "rule_set_166" + "remarks": "rule_set_167" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure dnf-automatic to Install Available Updates Automatically", - "remarks": "rule_set_166" + "remarks": "rule_set_167" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "dnf-automatic_apply_updates", - "remarks": "rule_set_166" + "remarks": "rule_set_167" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure dnf-automatic to Install Available Updates Automatically", - "remarks": "rule_set_166" + "remarks": "rule_set_167" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_libdnf-plugin-subscription-manager_installed", - "remarks": "rule_set_167" + "remarks": "rule_set_168" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install libdnf-plugin-subscription-manager Package", - "remarks": "rule_set_167" + "remarks": "rule_set_168" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_libdnf-plugin-subscription-manager_installed", - "remarks": "rule_set_167" + "remarks": "rule_set_168" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install libdnf-plugin-subscription-manager Package", - "remarks": "rule_set_167" + "remarks": "rule_set_168" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_subscription-manager_installed", - "remarks": "rule_set_168" + "remarks": "rule_set_169" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install subscription-manager Package", - "remarks": "rule_set_168" + "remarks": "rule_set_169" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_subscription-manager_installed", - "remarks": "rule_set_168" + "remarks": "rule_set_169" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install subscription-manager Package", - "remarks": "rule_set_168" + "remarks": "rule_set_169" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_shelllogin_for_systemaccounts", - "remarks": "rule_set_169" + "remarks": "rule_set_170" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", - "remarks": "rule_set_169" + "remarks": "rule_set_170" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "no_shelllogin_for_systemaccounts", - "remarks": "rule_set_169" + "remarks": "rule_set_170" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", - "remarks": "rule_set_169" + "remarks": "rule_set_170" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "secure_boot_enabled", - "remarks": "rule_set_170" + "remarks": "rule_set_171" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Secure Boot is enabled", - "remarks": "rule_set_170" + "remarks": "rule_set_171" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "secure_boot_enabled", - "remarks": "rule_set_170" + "remarks": "rule_set_171" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that Secure Boot is enabled", - "remarks": "rule_set_170" + "remarks": "rule_set_171" } ], "control-implementations": [ { - "uuid": "702b4091-e7b9-4442-aeca-dcb21eeabc52", + "uuid": "5c38eab1-6288-44d5-862e-2d578847c193", "source": "trestle://profiles/rhel10-ism_o-top_secret/profile.json", "description": "Control implementation for ism_o_top_secret", "props": [ @@ -9400,7 +9441,7 @@ ], "implemented-requirements": [ { - "uuid": "d50c72b4-41c7-4dd5-8b90-4544c4d1ac83", + "uuid": "45501830-5f67-4fa4-8026-1641055bde68", "control-id": "ism_o_0422", "description": "No notes for control-id 0422.", "props": [ @@ -9502,7 +9543,7 @@ ] }, { - "uuid": "5e9294a2-2216-4d9d-bac5-158d5cc298f6", + "uuid": "67725bdd-7591-42c3-a7e6-0666e0e5c9c9", "control-id": "ism_o_1561", "description": "No notes for control-id 1561.", "props": [ @@ -9604,7 +9645,7 @@ ] }, { - "uuid": "d2495034-a4e4-4153-9027-60ad5aa36b3b", + "uuid": "cce93eee-1e00-49b8-9926-eb4ec44c66b8", "control-id": "ism_o_1557", "description": "No notes for control-id 1557.", "props": [ @@ -9706,7 +9747,7 @@ ] }, { - "uuid": "6b67c0af-a363-42de-9b54-d7f49beea285", + "uuid": "add7fa48-facc-4037-bf61-da79f3191305", "control-id": "ism_o_1560", "description": "No notes for control-id 1560.", "props": [ @@ -9808,7 +9849,7 @@ ] }, { - "uuid": "a0bd6f11-7ef4-471a-8297-9d08724a9df2", + "uuid": "951a6a78-005a-4237-a3e6-e31a3d3fe350", "control-id": "ism_o_0418", "description": "No notes for control-id 0418.", "props": [ @@ -9890,7 +9931,7 @@ ] }, { - "uuid": "e0687fa4-cd9d-48d6-94d8-4d3145909e46", + "uuid": "4b02e796-decd-41e7-a03d-29474b23835f", "control-id": "ism_o_0421", "description": "No notes for control-id 0421.", "props": [ @@ -9992,7 +10033,7 @@ ] }, { - "uuid": "0f8c398d-8985-4b94-a7e9-3b4ed8d9cdda", + "uuid": "7b6c0480-6651-4f3c-94a7-2a6fa768934c", "control-id": "ism_o_0484", "description": "No notes for control-id 0484.", "props": [ @@ -10019,7 +10060,7 @@ ] }, { - "uuid": "a15033d6-5692-419f-a614-228eec19ce9c", + "uuid": "aa04dbed-3ae5-4add-bd9e-7d5cb2e50520", "control-id": "ism_o_0487", "description": "The description for control-id ism_o_0487.", "props": [ @@ -10032,7 +10073,7 @@ ] }, { - "uuid": "b0b98f89-9493-40e4-b08d-629151b90cf4", + "uuid": "823e284e-9a75-43a3-9bff-a41501cd99cc", "control-id": "ism_o_0582", "description": "No notes for control-id 0582.", "props": [ @@ -10284,7 +10325,7 @@ ] }, { - "uuid": "8b3bda62-8132-4118-958a-33777785d082", + "uuid": "4d055935-3c6d-4d71-9312-aaa76469e478", "control-id": "ism_o_0846", "description": "No notes for control-id 0846.", "props": [ @@ -10391,7 +10432,7 @@ ] }, { - "uuid": "0f022236-13e8-4743-8c61-ce6f0be160af", + "uuid": "d14b4270-9437-4b70-8b18-f37748fe3342", "control-id": "ism_o_0974", "description": "This needs reevaluation.", "props": [ @@ -10493,7 +10534,7 @@ ] }, { - "uuid": "7424af2c-a854-47ce-8931-36748059d339", + "uuid": "a16ab81b-8df0-45ee-8733-c03af103cc17", "control-id": "ism_o_0988", "description": "No notes for control-id 0988.", "props": [ @@ -10570,7 +10611,7 @@ ] }, { - "uuid": "f1eb2887-45d6-4fad-b30b-cf61d0f681ff", + "uuid": "655c3aef-01b5-4afe-b24c-70d1f2b4c9b1", "control-id": "ism_o_1034", "description": "No notes for control-id 1034.", "props": [ @@ -10587,7 +10628,7 @@ ] }, { - "uuid": "8f16fd21-f9e6-417e-92b9-7e8a54901f98", + "uuid": "172bd056-eb87-4934-a74a-3fa3674c5a02", "control-id": "ism_o_1055", "description": "Needs reevaluation", "props": [ @@ -10664,7 +10705,7 @@ ] }, { - "uuid": "24713f9c-9925-4b77-9d0a-616d53633015", + "uuid": "91b108cf-0c06-41bf-8425-7845b1279e04", "control-id": "ism_o_1173", "description": "No notes for control-id 1173.", "props": [ @@ -10766,7 +10807,7 @@ ] }, { - "uuid": "1f543656-1cba-4063-bfbb-97c30906ec95", + "uuid": "0eb2e411-f78c-491c-b371-5be07ac65572", "control-id": "ism_o_1277", "description": "No notes for control-id 1277.", "props": [ @@ -10778,7 +10819,7 @@ ] }, { - "uuid": "c772c61a-71ae-4938-b5e9-6ebf18b28ff4", + "uuid": "27358c8b-bf13-4dc8-9b34-ab5cdcc8884c", "control-id": "ism_o_1288", "description": "No notes for control-id 1288.", "props": [ @@ -10795,7 +10836,7 @@ ] }, { - "uuid": "1659ec66-b7b0-466f-a09b-8f0962142f83", + "uuid": "add59c32-c899-4dfb-8d97-823e03351507", "control-id": "ism_o_1311", "description": "No notes for control-id 1311.", "props": [ @@ -10817,7 +10858,7 @@ ] }, { - "uuid": "7a0742b4-a9d0-4465-81de-a5b675bbbda9", + "uuid": "bb7291eb-27c3-4b98-859b-f81bb8dcf1bd", "control-id": "ism_o_1315", "description": "No notes for control-id 1315.", "props": [ @@ -10839,7 +10880,7 @@ ] }, { - "uuid": "380ccca6-19bf-4f3d-9ed4-536bd1613fe6", + "uuid": "fa8d0969-301c-4564-ad19-5670f7a781a4", "control-id": "ism_o_1319", "description": "No notes for control-id 1319.", "props": [ @@ -10861,7 +10902,7 @@ ] }, { - "uuid": "5763a26d-3631-4aea-b8ce-0242f0b1e7b4", + "uuid": "11e9ccfc-b2ec-48c5-96ad-6996139f4fa6", "control-id": "ism_o_1341", "description": "No notes for control-id 1341.", "props": [ @@ -10878,7 +10919,7 @@ ] }, { - "uuid": "2e9a0f6d-9f7a-4fd1-9b20-0ecf6a6c30ff", + "uuid": "b7aeb85c-138c-4f92-873e-50c40b12e428", "control-id": "ism_o_1386", "description": "This needs reevaluation.", "props": [ @@ -10920,7 +10961,7 @@ ] }, { - "uuid": "f95ecbc1-57f4-4559-a2fc-d61d0fe4fcb2", + "uuid": "416ebe87-24ca-4946-81a2-7f5e50cb1248", "control-id": "ism_o_1401", "description": "No notes for control-id 1401.", "props": [ @@ -11022,7 +11063,7 @@ ] }, { - "uuid": "3243ca11-4495-49c5-9c40-68f02e4c90af", + "uuid": "5475b649-f8b0-4d2c-b56b-5e772d97f5fc", "control-id": "ism_o_1402", "description": "No notes for control-id 1402.", "props": [ @@ -11099,7 +11140,7 @@ ] }, { - "uuid": "be90006a-3fa8-4f5f-aa1e-b1fa17afcbce", + "uuid": "47e1ac6b-e6bc-4347-8673-22c37bf1d968", "control-id": "ism_o_1405", "description": "No notes for control-id 1405.", "props": [ @@ -11176,7 +11217,7 @@ ] }, { - "uuid": "ceb73ba6-8ff4-4c44-98ea-a1f0d997cdb5", + "uuid": "27188705-1a54-4461-9e75-8cb5642cf4dc", "control-id": "ism_o_1416", "description": "No notes for control-id 1416.", "props": [ @@ -11198,7 +11239,7 @@ ] }, { - "uuid": "47c8d5be-5c7b-4b28-82f5-49f8156f5a26", + "uuid": "150ef267-eb82-4c36-9309-d15f50ddf0b1", "control-id": "ism_o_1417", "description": "No notes for control-id 1417.", "props": [ @@ -11215,7 +11256,7 @@ ] }, { - "uuid": "0083de94-ed0b-40a1-9638-148440ab0532", + "uuid": "fd05c9dc-065a-4776-add5-92a738de0d26", "control-id": "ism_o_1418", "description": "No notes for control-id 1418.", "props": [ @@ -11237,7 +11278,7 @@ ] }, { - "uuid": "76fb6931-1298-490a-9805-cf8a1838abba", + "uuid": "6475f424-0782-4b8b-8a6c-65ffa8165273", "control-id": "ism_o_1446", "description": "No notes for control-id 1446.", "props": [ @@ -11264,7 +11305,7 @@ ] }, { - "uuid": "738ae396-fd61-46fb-9e88-dabfaf9e0feb", + "uuid": "d91efdfb-2249-4485-b27a-99009e473b5b", "control-id": "ism_o_1449", "description": "This needs more", "props": [ @@ -11281,7 +11322,7 @@ ] }, { - "uuid": "07b5963b-5b2c-45a2-9996-1eb82c368104", + "uuid": "9b1185d0-57c5-4346-bb35-7d3595e26a4e", "control-id": "ism_o_1467", "description": "No notes for control-id 1467.", "props": [ @@ -11308,7 +11349,7 @@ ] }, { - "uuid": "5395c7ce-9a70-4452-bc0f-655d2b9ede8c", + "uuid": "d6a1e08c-793a-4443-85ee-b95b6c9c2ff5", "control-id": "ism_o_1483", "description": "No notes for control-id 1483.", "props": [ @@ -11335,7 +11376,7 @@ ] }, { - "uuid": "242bf033-227f-42ec-819b-b1d20c55060d", + "uuid": "74f6a485-caa1-48ef-a7e9-70c394d7e209", "control-id": "ism_o_1491", "description": "No notes for control-id 1491.", "props": [ @@ -11352,7 +11393,7 @@ ] }, { - "uuid": "7244a6fb-5329-41a2-824d-36a0cf76ef7b", + "uuid": "1ee40db5-814b-4653-a7e9-324dfb7dc801", "control-id": "ism_o_1493", "description": "No notes for control-id 1493.", "props": [ @@ -11396,6 +11437,11 @@ "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_redhat_gpgkey_installed" }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "package_sequoia-sq_installed" + }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", @@ -11404,7 +11450,7 @@ ] }, { - "uuid": "0de82ae4-c583-4d23-899e-49ca31c7ad07", + "uuid": "b20d5778-de2d-4905-94d8-39e57c3d4c35", "control-id": "ism_o_1504", "description": "No notes for control-id 1504.", "props": [ @@ -11506,7 +11552,7 @@ ] }, { - "uuid": "e1e58200-3985-431e-8b9f-b10931262d14", + "uuid": "2dc4ced9-005e-4cb3-b761-6819d822ffff", "control-id": "ism_o_1505", "description": "No notes for control-id 1505.", "props": [ @@ -11608,7 +11654,7 @@ ] }, { - "uuid": "4e0c1dd6-5c93-4225-8ec0-6da89ad8e70c", + "uuid": "75bbda51-64b5-4957-a140-4b354bbe9854", "control-id": "ism_o_1506", "description": "As of OpenSSH 7.6, OpenSSH only supports SSH 2.", "props": [ @@ -11620,7 +11666,7 @@ ] }, { - "uuid": "85f19927-2e59-4037-89c9-1f9be6aaf003", + "uuid": "2427baae-b748-4992-9ded-3f98dff321f6", "control-id": "ism_o_1546", "description": "No notes for control-id 1546.", "props": [ @@ -11777,7 +11823,7 @@ ] }, { - "uuid": "9e534e5d-9408-4572-a3f0-c7e7f3f0756a", + "uuid": "ae44a4e9-f2ae-490a-9aa2-dfeedaff0dfc", "control-id": "ism_o_1552", "description": "No notes for control-id 1552.", "props": [ @@ -11789,7 +11835,7 @@ ] }, { - "uuid": "aebd7527-0f53-47cc-a98d-6d3ae47c3f79", + "uuid": "111ec0ec-20b3-4add-9216-4d523504e923", "control-id": "ism_o_1558", "description": "No notes for control-id 1558.", "props": [ @@ -11891,7 +11937,7 @@ ] }, { - "uuid": "8c0c1b46-1836-4d15-8f7d-c0d298c4f46d", + "uuid": "9671f6a5-d969-473c-97db-ef0bfc891df9", "control-id": "ism_o_1559", "description": "No notes for control-id 1559.", "props": [ @@ -11993,7 +12039,7 @@ ] }, { - "uuid": "df96d163-9d0c-4c8f-a2ee-2dbe421a65f8", + "uuid": "00c596a4-89ad-42c3-9684-5001edb76a90", "control-id": "ism_o_1745", "description": "The description for control-id ism_o_1745.", "props": [ diff --git a/component-definitions/rhel10/rhel10-pcidss_4-base/component-definition.json b/component-definitions/rhel10/rhel10-pcidss_4-base/component-definition.json index a611b1dc..364a46f6 100644 --- a/component-definitions/rhel10/rhel10-pcidss_4-base/component-definition.json +++ b/component-definitions/rhel10/rhel10-pcidss_4-base/component-definition.json @@ -3,8 +3,8 @@ "uuid": "e263ec70-49b2-459f-bfae-283464b2cdcb", "metadata": { "title": "Component definition for rhel10", - "last-modified": "2025-12-11T18:29:55.666458+00:00", - "version": "1.5", + "last-modified": "2025-12-17T11:18:09.672940+00:00", + "version": "1.6", "oscal-version": "1.1.3" }, "components": [ @@ -311,7 +311,7 @@ { "name": "Parameter_Value_Alternatives_15", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -329,7 +329,7 @@ { "name": "Parameter_Value_Alternatives_16", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -2183,1411 +2183,1423 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_globally_activated", + "value": "package_sequoia-sq_installed", "remarks": "rule_set_134" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled In Main dnf Configuration", + "value": "Install sequoia-sq Package", "remarks": "rule_set_134" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_never_disabled", + "value": "ensure_gpgcheck_globally_activated", "remarks": "rule_set_135" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled for All dnf Package Repositories", + "value": "Ensure gpgcheck Enabled In Main dnf Configuration", "remarks": "rule_set_135" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "account_unique_id", + "value": "ensure_gpgcheck_never_disabled", "remarks": "rule_set_136" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All Accounts on the System Have Unique User IDs", + "value": "Ensure gpgcheck Enabled for All dnf Package Repositories", "remarks": "rule_set_136" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "account_unique_name", + "value": "account_unique_id", "remarks": "rule_set_137" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All Accounts on the System Have Unique Names", + "value": "Ensure All Accounts on the System Have Unique User IDs", "remarks": "rule_set_137" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_no_uid_except_zero", + "value": "account_unique_name", "remarks": "rule_set_138" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Only Root Has UID 0", + "value": "Ensure All Accounts on the System Have Unique Names", "remarks": "rule_set_138" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_root_gid_zero", + "value": "accounts_no_uid_except_zero", "remarks": "rule_set_139" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Root Has A Primary GID 0", + "value": "Verify Only Root Has UID 0", "remarks": "rule_set_139" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "group_unique_id", + "value": "accounts_root_gid_zero", "remarks": "rule_set_140" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All Groups on the System Have Unique Group ID", + "value": "Verify Root Has A Primary GID 0", "remarks": "rule_set_140" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "group_unique_name", + "value": "group_unique_id", "remarks": "rule_set_141" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All Groups on the System Have Unique Group Names", + "value": "Ensure All Groups on the System Have Unique Group ID", "remarks": "rule_set_141" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "gid_passwd_group_same", + "value": "group_unique_name", "remarks": "rule_set_142" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", + "value": "Ensure All Groups on the System Have Unique Group Names", "remarks": "rule_set_142" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_password_auth_for_systemaccounts", + "value": "gid_passwd_group_same", "remarks": "rule_set_143" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that System Accounts Are Locked", + "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", "remarks": "rule_set_143" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_shelllogin_for_systemaccounts", + "value": "no_password_auth_for_systemaccounts", "remarks": "rule_set_144" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", + "value": "Ensure that System Accounts Are Locked", "remarks": "rule_set_144" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "account_disable_post_pw_expiration", + "value": "no_shelllogin_for_systemaccounts", "remarks": "rule_set_145" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Account Expiration Following Inactivity", + "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", "remarks": "rule_set_145" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_set_post_pw_existing", + "value": "account_disable_post_pw_expiration", "remarks": "rule_set_146" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set existing passwords a period of inactivity before they been locked", + "value": "Set Account Expiration Following Inactivity", "remarks": "rule_set_146" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_db_up_to_date", + "value": "accounts_set_post_pw_existing", "remarks": "rule_set_147" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Make sure that the dconf databases are up-to-date with regards to respective keyfiles", + "value": "Set existing passwords a period of inactivity before they been locked", "remarks": "rule_set_147" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_session_idle_user_locks", + "value": "dconf_db_up_to_date", "remarks": "rule_set_148" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Users Cannot Change GNOME3 Session Idle Settings", + "value": "Make sure that the dconf databases are up-to-date with regards to respective keyfiles", "remarks": "rule_set_148" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_idle_activation_enabled", + "value": "dconf_gnome_session_idle_user_locks", "remarks": "rule_set_149" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable GNOME3 Screensaver Idle Activation", + "value": "Ensure Users Cannot Change GNOME3 Session Idle Settings", "remarks": "rule_set_149" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_idle_delay", + "value": "dconf_gnome_screensaver_idle_activation_enabled", "remarks": "rule_set_150" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set GNOME3 Screensaver Inactivity Timeout", + "value": "Enable GNOME3 Screensaver Idle Activation", "remarks": "rule_set_150" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_lock_delay", + "value": "dconf_gnome_screensaver_idle_delay", "remarks": "rule_set_151" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set GNOME3 Screensaver Lock Delay After Activation Period", + "value": "Set GNOME3 Screensaver Inactivity Timeout", "remarks": "rule_set_151" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_lock_enabled", + "value": "dconf_gnome_screensaver_lock_delay", "remarks": "rule_set_152" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable GNOME3 Screensaver Lock After Idle Period", + "value": "Set GNOME3 Screensaver Lock Delay After Activation Period", "remarks": "rule_set_152" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_mode_blank", + "value": "dconf_gnome_screensaver_lock_enabled", "remarks": "rule_set_153" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Implement Blank Screensaver", + "value": "Enable GNOME3 Screensaver Lock After Idle Period", "remarks": "rule_set_153" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_set_idle_timeout", + "value": "dconf_gnome_screensaver_mode_blank", "remarks": "rule_set_154" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set SSH Client Alive Interval", + "value": "Implement Blank Screensaver", "remarks": "rule_set_154" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_set_keepalive", + "value": "sshd_set_idle_timeout", "remarks": "rule_set_155" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set SSH Client Alive Count Max", + "value": "Set SSH Client Alive Interval", "remarks": "rule_set_155" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "disable_host_auth", + "value": "sshd_set_keepalive", "remarks": "rule_set_156" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Host-Based Authentication", + "value": "Set SSH Client Alive Count Max", "remarks": "rule_set_156" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "gnome_gdm_disable_automatic_login", + "value": "disable_host_auth", "remarks": "rule_set_157" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable GDM Automatic Login", + "value": "Disable Host-Based Authentication", "remarks": "rule_set_157" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "gnome_gdm_disable_guest_login", + "value": "gnome_gdm_disable_automatic_login", "remarks": "rule_set_158" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable GDM Guest Login", + "value": "Disable GDM Automatic Login", "remarks": "rule_set_158" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_empty_passwords", + "value": "gnome_gdm_disable_guest_login", "remarks": "rule_set_159" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Prevent Login to Accounts With Empty Password", + "value": "Disable GDM Guest Login", "remarks": "rule_set_159" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_all_shadowed", + "value": "no_empty_passwords", "remarks": "rule_set_160" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify All Account Password Hashes are Shadowed", + "value": "Prevent Login to Accounts With Empty Password", "remarks": "rule_set_160" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_libuserconf", + "value": "accounts_password_all_shadowed", "remarks": "rule_set_161" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Hashing Algorithm in /etc/libuser.conf", + "value": "Verify All Account Password Hashes are Shadowed", "remarks": "rule_set_161" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_logindefs", + "value": "set_password_hashing_algorithm_libuserconf", "remarks": "rule_set_162" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Hashing Algorithm in /etc/login.defs", + "value": "Set Password Hashing Algorithm in /etc/libuser.conf", "remarks": "rule_set_162" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_systemauth", + "value": "set_password_hashing_algorithm_logindefs", "remarks": "rule_set_163" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set PAM Password Hashing Algorithm - system-auth", + "value": "Set Password Hashing Algorithm in /etc/login.defs", "remarks": "rule_set_163" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_passwords_pam_faillock_deny", + "value": "set_password_hashing_algorithm_systemauth", "remarks": "rule_set_164" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Lock Accounts After Failed Password Attempts", + "value": "Set PAM Password Hashing Algorithm - system-auth", "remarks": "rule_set_164" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_passwords_pam_faillock_unlock_time", + "value": "accounts_passwords_pam_faillock_deny", "remarks": "rule_set_165" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Lockout Time for Failed Password Attempts", + "value": "Lock Accounts After Failed Password Attempts", "remarks": "rule_set_165" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_last_change_is_in_past", + "value": "accounts_passwords_pam_faillock_unlock_time", "remarks": "rule_set_166" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure all users last password change date is in the past", + "value": "Set Lockout Time for Failed Password Attempts", "remarks": "rule_set_166" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_dcredit", + "value": "accounts_password_last_change_is_in_past", "remarks": "rule_set_167" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure PAM Enforces Password Requirements - Minimum Digit Characters", + "value": "Ensure all users last password change date is in the past", "remarks": "rule_set_167" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_lcredit", + "value": "accounts_password_pam_dcredit", "remarks": "rule_set_168" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure PAM Enforces Password Requirements - Minimum Lowercase Characters", + "value": "Ensure PAM Enforces Password Requirements - Minimum Digit Characters", "remarks": "rule_set_168" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_minlen", + "value": "accounts_password_pam_lcredit", "remarks": "rule_set_169" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure PAM Enforces Password Requirements - Minimum Length", + "value": "Ensure PAM Enforces Password Requirements - Minimum Lowercase Characters", "remarks": "rule_set_169" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_unix_remember", + "value": "accounts_password_pam_minlen", "remarks": "rule_set_170" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Limit Password Reuse", + "value": "Ensure PAM Enforces Password Requirements - Minimum Length", "remarks": "rule_set_170" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_pwhistory_remember_password_auth", + "value": "accounts_password_pam_unix_remember", "remarks": "rule_set_171" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Limit Password Reuse: password-auth", + "value": "Limit Password Reuse", "remarks": "rule_set_171" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_pwhistory_remember_system_auth", + "value": "accounts_password_pam_pwhistory_remember_password_auth", "remarks": "rule_set_172" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Limit Password Reuse: system-auth", + "value": "Limit Password Reuse: password-auth", "remarks": "rule_set_172" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_maximum_age_login_defs", + "value": "accounts_password_pam_pwhistory_remember_system_auth", "remarks": "rule_set_173" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Maximum Age", + "value": "Limit Password Reuse: system-auth", "remarks": "rule_set_173" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_set_max_life_existing", + "value": "accounts_maximum_age_login_defs", "remarks": "rule_set_174" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Existing Passwords Maximum Age", + "value": "Set Password Maximum Age", "remarks": "rule_set_174" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_warn_age_login_defs", + "value": "accounts_password_set_max_life_existing", "remarks": "rule_set_175" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Warning Age", + "value": "Set Existing Passwords Maximum Age", "remarks": "rule_set_175" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_set_warn_age_existing", + "value": "accounts_password_warn_age_login_defs", "remarks": "rule_set_176" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Existing Passwords Warning Age", + "value": "Set Password Warning Age", "remarks": "rule_set_176" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_tmout", + "value": "accounts_password_set_warn_age_existing", "remarks": "rule_set_177" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Interactive Session Timeout", + "value": "Set Existing Passwords Warning Age", "remarks": "rule_set_177" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_direct_root_logins", + "value": "accounts_tmout", "remarks": "rule_set_178" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Direct root Logins Not Allowed", + "value": "Set Interactive Session Timeout", "remarks": "rule_set_178" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "securetty_root_login_console_only", + "value": "no_direct_root_logins", "remarks": "rule_set_179" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict Virtual Console Root Logins", + "value": "Direct root Logins Not Allowed", "remarks": "rule_set_179" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_suid_privilege_function", + "value": "securetty_root_login_console_only", "remarks": "rule_set_180" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events When Privileged Executables Are Run", + "value": "Restrict Virtual Console Root Logins", "remarks": "rule_set_180" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_login_events_faillock", + "value": "audit_rules_suid_privilege_function", "remarks": "rule_set_181" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Logon and Logout Events - faillock", + "value": "Record Events When Privileged Executables Are Run", "remarks": "rule_set_181" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_login_events_lastlog", + "value": "audit_rules_login_events_faillock", "remarks": "rule_set_182" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Logon and Logout Events - lastlog", + "value": "Record Attempts to Alter Logon and Logout Events - faillock", "remarks": "rule_set_182" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_login_events_tallylog", + "value": "audit_rules_login_events_lastlog", "remarks": "rule_set_183" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Logon and Logout Events - tallylog", + "value": "Record Attempts to Alter Logon and Logout Events - lastlog", "remarks": "rule_set_183" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_session_events_utmp", + "value": "audit_rules_login_events_tallylog", "remarks": "rule_set_184" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Process and Session Initiation Information utmp", + "value": "Record Attempts to Alter Logon and Logout Events - tallylog", "remarks": "rule_set_184" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_session_events_btmp", + "value": "audit_rules_session_events_utmp", "remarks": "rule_set_185" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Process and Session Initiation Information btmp", + "value": "Record Attempts to Alter Process and Session Initiation Information utmp", "remarks": "rule_set_185" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_session_events_wtmp", + "value": "audit_rules_session_events_btmp", "remarks": "rule_set_186" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", + "value": "Record Attempts to Alter Process and Session Initiation Information btmp", "remarks": "rule_set_186" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_sudo_log_events", + "value": "audit_rules_session_events_wtmp", "remarks": "rule_set_187" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to perform maintenance activities", + "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", "remarks": "rule_set_187" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "display_login_attempts", + "value": "audit_sudo_log_events", "remarks": "rule_set_188" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure PAM Displays Last Logon/Access Notification", + "value": "Record Attempts to perform maintenance activities", "remarks": "rule_set_188" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_usergroup_modification_group", + "value": "display_login_attempts", "remarks": "rule_set_189" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify User/Group Information - /etc/group", + "value": "Ensure PAM Displays Last Logon/Access Notification", "remarks": "rule_set_189" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_usergroup_modification_gshadow", + "value": "audit_rules_usergroup_modification_group", "remarks": "rule_set_190" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify User/Group Information - /etc/gshadow", + "value": "Record Events that Modify User/Group Information - /etc/group", "remarks": "rule_set_190" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_usergroup_modification_opasswd", + "value": "audit_rules_usergroup_modification_gshadow", "remarks": "rule_set_191" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", + "value": "Record Events that Modify User/Group Information - /etc/gshadow", "remarks": "rule_set_191" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_usergroup_modification_passwd", + "value": "audit_rules_usergroup_modification_opasswd", "remarks": "rule_set_192" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify User/Group Information - /etc/passwd", + "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", "remarks": "rule_set_192" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_usergroup_modification_shadow", + "value": "audit_rules_usergroup_modification_passwd", "remarks": "rule_set_193" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify User/Group Information - /etc/shadow", + "value": "Record Events that Modify User/Group Information - /etc/passwd", "remarks": "rule_set_193" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_sysadmin_actions", + "value": "audit_rules_usergroup_modification_shadow", "remarks": "rule_set_194" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure auditd Collects System Administrator Actions", + "value": "Record Events that Modify User/Group Information - /etc/shadow", "remarks": "rule_set_194" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_file_deletion_events_rename", + "value": "audit_rules_sysadmin_actions", "remarks": "rule_set_195" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure auditd Collects File Deletion Events by User - rename", + "value": "Ensure auditd Collects System Administrator Actions", "remarks": "rule_set_195" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_file_deletion_events_renameat", + "value": "audit_rules_file_deletion_events_rename", "remarks": "rule_set_196" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure auditd Collects File Deletion Events by User - renameat", + "value": "Ensure auditd Collects File Deletion Events by User - rename", "remarks": "rule_set_196" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_file_deletion_events_renameat2", + "value": "audit_rules_file_deletion_events_renameat", "remarks": "rule_set_197" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure auditd Collects File Deletion Events by User - renameat2", + "value": "Ensure auditd Collects File Deletion Events by User - renameat", "remarks": "rule_set_197" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_file_deletion_events_rmdir", + "value": "audit_rules_file_deletion_events_renameat2", "remarks": "rule_set_198" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure auditd Collects File Deletion Events by User - rmdir", + "value": "Ensure auditd Collects File Deletion Events by User - renameat2", "remarks": "rule_set_198" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_file_deletion_events_unlink", + "value": "audit_rules_file_deletion_events_rmdir", "remarks": "rule_set_199" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure auditd Collects File Deletion Events by User - unlink", + "value": "Ensure auditd Collects File Deletion Events by User - rmdir", "remarks": "rule_set_199" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_file_deletion_events_unlinkat", + "value": "audit_rules_file_deletion_events_unlink", "remarks": "rule_set_200" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure auditd Collects File Deletion Events by User - unlinkat", + "value": "Ensure auditd Collects File Deletion Events by User - unlink", "remarks": "rule_set_200" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_media_export", + "value": "audit_rules_file_deletion_events_unlinkat", "remarks": "rule_set_201" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure auditd Collects Information on Exporting to Media (successful)", + "value": "Ensure auditd Collects File Deletion Events by User - unlinkat", "remarks": "rule_set_201" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_audit_installed", + "value": "audit_rules_media_export", "remarks": "rule_set_202" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure the audit Subsystem is Installed", + "value": "Ensure auditd Collects Information on Exporting to Media (successful)", "remarks": "rule_set_202" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "service_auditd_enabled", + "value": "package_audit_installed", "remarks": "rule_set_203" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable auditd Service", + "value": "Ensure the audit Subsystem is Installed", "remarks": "rule_set_203" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "auditd_name_format", + "value": "service_auditd_enabled", "remarks": "rule_set_204" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set type of computer node name logging in audit logs", + "value": "Enable auditd Service", "remarks": "rule_set_204" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "directory_access_var_log_audit", + "value": "auditd_name_format", "remarks": "rule_set_205" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Access Events to Audit Log Directory", + "value": "Set type of computer node name logging in audit logs", "remarks": "rule_set_205" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_permissions_var_log_audit", + "value": "directory_access_var_log_audit", "remarks": "rule_set_206" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "System Audit Logs Must Have Mode 0640 or Less Permissive", + "value": "Record Access Events to Audit Log Directory", "remarks": "rule_set_206" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_permissions", + "value": "file_permissions_var_log_audit", "remarks": "rule_set_207" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure System Log Files Have Correct Permissions", + "value": "System Audit Logs Must Have Mode 0640 or Less Permissive", "remarks": "rule_set_207" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_group_ownership_var_log_audit", + "value": "rsyslog_files_permissions", "remarks": "rule_set_208" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "System Audit Logs Must Be Group Owned By Root", + "value": "Ensure System Log Files Have Correct Permissions", "remarks": "rule_set_208" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "file_ownership_var_log_audit", + "value": "file_group_ownership_var_log_audit", "remarks": "rule_set_209" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "System Audit Logs Must Be Owned By Root", + "value": "System Audit Logs Must Be Group Owned By Root", "remarks": "rule_set_209" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_ownership", + "value": "file_ownership_var_log_audit", "remarks": "rule_set_210" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Log Files Are Owned By Appropriate User", + "value": "System Audit Logs Must Be Owned By Root", "remarks": "rule_set_210" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rsyslog_files_groupownership", + "value": "rsyslog_files_ownership", "remarks": "rule_set_211" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Log Files Are Owned By Appropriate Group", + "value": "Ensure Log Files Are Owned By Appropriate User", "remarks": "rule_set_211" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_immutable", + "value": "rsyslog_files_groupownership", "remarks": "rule_set_212" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Make the auditd Configuration Immutable", + "value": "Ensure Log Files Are Owned By Appropriate Group", "remarks": "rule_set_212" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "auditd_audispd_syslog_plugin_activated", + "value": "audit_rules_immutable", "remarks": "rule_set_213" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure auditd to use audispd's syslog plugin", + "value": "Make the auditd Configuration Immutable", "remarks": "rule_set_213" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_audispd-plugins_installed", + "value": "auditd_audispd_syslog_plugin_activated", "remarks": "rule_set_214" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install audispd-plugins Package", + "value": "Configure auditd to use audispd's syslog plugin", "remarks": "rule_set_214" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_dac_modification_chmod", + "value": "package_audispd-plugins_installed", "remarks": "rule_set_215" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", + "value": "Install audispd-plugins Package", "remarks": "rule_set_215" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_dac_modification_chown", + "value": "audit_rules_dac_modification_chmod", "remarks": "rule_set_216" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Discretionary Access Controls - chown", + "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", "remarks": "rule_set_216" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_dac_modification_fchmod", + "value": "audit_rules_dac_modification_chown", "remarks": "rule_set_217" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Discretionary Access Controls - fchmod", + "value": "Record Events that Modify the System's Discretionary Access Controls - chown", "remarks": "rule_set_217" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_dac_modification_fchmodat", + "value": "audit_rules_dac_modification_fchmod", "remarks": "rule_set_218" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat", + "value": "Record Events that Modify the System's Discretionary Access Controls - fchmod", "remarks": "rule_set_218" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_dac_modification_fchmodat2", + "value": "audit_rules_dac_modification_fchmodat", "remarks": "rule_set_219" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat2", + "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat", "remarks": "rule_set_219" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_dac_modification_fchown", + "value": "audit_rules_dac_modification_fchmodat2", "remarks": "rule_set_220" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Discretionary Access Controls - fchown", + "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat2", "remarks": "rule_set_220" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_dac_modification_fchownat", + "value": "audit_rules_dac_modification_fchown", "remarks": "rule_set_221" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Discretionary Access Controls - fchownat", + "value": "Record Events that Modify the System's Discretionary Access Controls - fchown", "remarks": "rule_set_221" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_dac_modification_fremovexattr", + "value": "audit_rules_dac_modification_fchownat", "remarks": "rule_set_222" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Discretionary Access Controls - fremovexattr", + "value": "Record Events that Modify the System's Discretionary Access Controls - fchownat", "remarks": "rule_set_222" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_dac_modification_fsetxattr", + "value": "audit_rules_dac_modification_fremovexattr", "remarks": "rule_set_223" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Discretionary Access Controls - fsetxattr", + "value": "Record Events that Modify the System's Discretionary Access Controls - fremovexattr", "remarks": "rule_set_223" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_dac_modification_lremovexattr", + "value": "audit_rules_dac_modification_fsetxattr", "remarks": "rule_set_224" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Discretionary Access Controls - lremovexattr", + "value": "Record Events that Modify the System's Discretionary Access Controls - fsetxattr", "remarks": "rule_set_224" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_dac_modification_lchown", + "value": "audit_rules_dac_modification_lremovexattr", "remarks": "rule_set_225" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Discretionary Access Controls - lchown", + "value": "Record Events that Modify the System's Discretionary Access Controls - lremovexattr", "remarks": "rule_set_225" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_dac_modification_lsetxattr", + "value": "audit_rules_dac_modification_lchown", "remarks": "rule_set_226" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Discretionary Access Controls - lsetxattr", + "value": "Record Events that Modify the System's Discretionary Access Controls - lchown", "remarks": "rule_set_226" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_dac_modification_removexattr", + "value": "audit_rules_dac_modification_lsetxattr", "remarks": "rule_set_227" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Discretionary Access Controls - removexattr", + "value": "Record Events that Modify the System's Discretionary Access Controls - lsetxattr", "remarks": "rule_set_227" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_dac_modification_setxattr", + "value": "audit_rules_dac_modification_removexattr", "remarks": "rule_set_228" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Discretionary Access Controls - setxattr", + "value": "Record Events that Modify the System's Discretionary Access Controls - removexattr", "remarks": "rule_set_228" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_networkconfig_modification", + "value": "audit_rules_dac_modification_setxattr", "remarks": "rule_set_229" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Network Environment", + "value": "Record Events that Modify the System's Discretionary Access Controls - setxattr", "remarks": "rule_set_229" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_mac_modification_etc_selinux", + "value": "audit_rules_networkconfig_modification", "remarks": "rule_set_230" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events that Modify the System's Mandatory Access Controls (/etc/selinux)", + "value": "Record Events that Modify the System's Network Environment", "remarks": "rule_set_230" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "auditd_data_retention_admin_space_left_action", + "value": "audit_rules_mac_modification_etc_selinux", "remarks": "rule_set_231" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure auditd admin_space_left Action on Low Disk Space", + "value": "Record Events that Modify the System's Mandatory Access Controls (/etc/selinux)", "remarks": "rule_set_231" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "auditd_data_retention_space_left", + "value": "auditd_data_retention_admin_space_left_action", "remarks": "rule_set_232" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure auditd space_left on Low Disk Space", + "value": "Configure auditd admin_space_left Action on Low Disk Space", "remarks": "rule_set_232" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "auditd_data_retention_space_left_action", + "value": "auditd_data_retention_space_left", "remarks": "rule_set_233" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure auditd space_left Action on Low Disk Space", + "value": "Configure auditd space_left on Low Disk Space", "remarks": "rule_set_233" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_logrotate_installed", + "value": "auditd_data_retention_space_left_action", "remarks": "rule_set_234" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure logrotate is Installed", + "value": "Configure auditd space_left Action on Low Disk Space", "remarks": "rule_set_234" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "timer_logrotate_enabled", + "value": "package_logrotate_installed", "remarks": "rule_set_235" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable logrotate Timer", + "value": "Ensure logrotate is Installed", "remarks": "rule_set_235" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_chrony_installed", + "value": "timer_logrotate_enabled", "remarks": "rule_set_236" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "The Chrony package is installed", + "value": "Enable logrotate Timer", "remarks": "rule_set_236" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "chronyd_specify_remote_server", + "value": "package_chrony_installed", "remarks": "rule_set_237" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "A remote time server for Chrony is configured", + "value": "The Chrony package is installed", "remarks": "rule_set_237" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_time_watch_localtime", + "value": "chronyd_specify_remote_server", "remarks": "rule_set_238" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter the localtime File", + "value": "A remote time server for Chrony is configured", "remarks": "rule_set_238" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_time_settimeofday", + "value": "audit_rules_time_watch_localtime", "remarks": "rule_set_239" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record attempts to alter time through settimeofday", + "value": "Record Attempts to Alter the localtime File", "remarks": "rule_set_239" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_time_clock_settime", + "value": "audit_rules_time_settimeofday", "remarks": "rule_set_240" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Time Through clock_settime", + "value": "Record attempts to alter time through settimeofday", "remarks": "rule_set_240" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_time_stime", + "value": "audit_rules_time_clock_settime", "remarks": "rule_set_241" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Time Through stime", + "value": "Record Attempts to Alter Time Through clock_settime", "remarks": "rule_set_241" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_time_adjtimex", + "value": "audit_rules_time_stime", "remarks": "rule_set_242" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record attempts to alter time through adjtimex", + "value": "Record Attempts to Alter Time Through stime", "remarks": "rule_set_242" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "chronyd_run_as_chrony_user", + "value": "audit_rules_time_adjtimex", "remarks": "rule_set_243" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that chronyd is running under chrony user account", + "value": "Record attempts to alter time through adjtimex", "remarks": "rule_set_243" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_audit_argument", + "value": "chronyd_run_as_chrony_user", "remarks": "rule_set_244" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable Auditing for Processes Which Start Prior to the Audit Daemon", + "value": "Ensure that chronyd is running under chrony user account", "remarks": "rule_set_244" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "grub2_audit_backlog_limit_argument", + "value": "grub2_audit_argument", "remarks": "rule_set_245" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Extend Audit Backlog Limit for the Audit Daemon", + "value": "Enable Auditing for Processes Which Start Prior to the Audit Daemon", "remarks": "rule_set_245" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_build_database", + "value": "grub2_audit_backlog_limit_argument", "remarks": "rule_set_246" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Build and Test AIDE Database", + "value": "Extend Audit Backlog Limit for the Audit Daemon", "remarks": "rule_set_246" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "aide_periodic_cron_checking", + "value": "aide_build_database", "remarks": "rule_set_247" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Configure Periodic Execution of AIDE", + "value": "Build and Test AIDE Database", "remarks": "rule_set_247" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "package_aide_installed", + "value": "aide_periodic_cron_checking", "remarks": "rule_set_248" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Install AIDE", + "value": "Configure Periodic Execution of AIDE", "remarks": "rule_set_248" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rpm_verify_hashes", + "value": "package_aide_installed", "remarks": "rule_set_249" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify File Hashes with RPM", + "value": "Install AIDE", "remarks": "rule_set_249" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "rpm_verify_ownership", + "value": "rpm_verify_hashes", "remarks": "rule_set_250" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify and Correct Ownership with RPM", + "value": "Verify File Hashes with RPM", "remarks": "rule_set_250" + }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "rpm_verify_ownership", + "remarks": "rule_set_251" + }, + { + "name": "Rule_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Verify and Correct Ownership with RPM", + "remarks": "rule_set_251" } ], "control-implementations": [ { - "uuid": "727a1cf4-0ff4-49d8-8db5-f4223f5bab85", + "uuid": "4779a6da-6150-4929-8109-06b753a76fca", "source": "trestle://profiles/rhel10-pcidss_4-base/profile.json", "description": "Control implementation for pci-dss", "props": [ @@ -3787,7 +3799,7 @@ ], "implemented-requirements": [ { - "uuid": "29f81c65-1f5c-4453-9b82-ded8f4d095dc", + "uuid": "09b34302-3303-455b-b753-e4c6e03e572b", "control-id": "pcidss_4_1-1.1", "description": "The description for control-id pcidss_4_1-1.1.", "props": [ @@ -3800,7 +3812,7 @@ ] }, { - "uuid": "bff9a16b-297b-4a39-834c-974f529238ac", + "uuid": "26bb7bae-8100-4c0f-9d49-bebecd9a7e69", "control-id": "pcidss_4_1-1.2", "description": "The description for control-id pcidss_4_1-1.2.", "props": [ @@ -3813,7 +3825,7 @@ ] }, { - "uuid": "f9d85c91-74dd-4435-ae72-332968b638f0", + "uuid": "465e0763-da72-466d-b52f-dfacc0ac538e", "control-id": "pcidss_4_1-2.1", "description": "Examples of NSCs covered by these configuration standards include, but are not limited to,\nfirewalls, routers configured with access control lists, and cloud virtual networks. The\nobjective of this requirement is to ensure the way that NSCs are configured and operate\nare defined and consistently applied. While the tooling and standards can be automated,\nthe review of allowed accesses should be manual as different sites may have different\npolicies.", "props": [ @@ -3845,7 +3857,7 @@ ] }, { - "uuid": "01cbb26c-8712-4de8-878f-2c013ceb1c2e", + "uuid": "b69fa2b1-3bb7-4bef-adf8-040b08cc6239", "control-id": "pcidss_4_1-2.2", "description": "The description for control-id pcidss_4_1-2.2.", "props": [ @@ -3858,7 +3870,7 @@ ] }, { - "uuid": "ead54f5e-79f2-41e4-9ca4-ba883a4701f5", + "uuid": "45da60f8-f894-42b4-bb6a-dd08bf5e0446", "control-id": "pcidss_4_1-2.3", "description": "The description for control-id pcidss_4_1-2.3.", "props": [ @@ -3871,7 +3883,7 @@ ] }, { - "uuid": "2de5155b-2d13-408f-90f4-22d5e5a712cb", + "uuid": "8630de18-1c14-4625-b0d7-431175526c75", "control-id": "pcidss_4_1-2.4", "description": "The description for control-id pcidss_4_1-2.4.", "props": [ @@ -3884,7 +3896,7 @@ ] }, { - "uuid": "4c793423-c2e1-4955-a52c-5c83f1d071cb", + "uuid": "020e0b13-a298-488f-bfe0-6bf42da71843", "control-id": "pcidss_4_1-2.5", "description": "The description for control-id pcidss_4_1-2.5.", "props": [ @@ -3897,7 +3909,7 @@ ] }, { - "uuid": "36e05a94-4b5f-4008-a7a5-f0793582e79e", + "uuid": "42d2ae87-4d76-4824-99ce-002bad579fef", "control-id": "pcidss_4_1-2.6", "description": "The specific risks associated with the use of insecure services, protocols, and ports are\nunderstood, assessed, and appropriately mitigated. The selected rules here basically\nremove services without encryption and restricted some common services.", "props": [ @@ -3934,7 +3946,7 @@ ] }, { - "uuid": "bce264b1-b6c7-4a8d-8900-388a70101fce", + "uuid": "74142d39-c48c-4ea5-a171-e7f6790026a9", "control-id": "pcidss_4_1-2.7", "description": "The description for control-id pcidss_4_1-2.7.", "props": [ @@ -3947,7 +3959,7 @@ ] }, { - "uuid": "960bb30d-bbc8-4be5-9ff0-87180270f1e9", + "uuid": "7ee51e07-8a1a-4368-bf33-ea2d66a75601", "control-id": "pcidss_4_1-2.8", "description": "No notes for control-id 1.2.8.", "props": [ @@ -3979,7 +3991,7 @@ ] }, { - "uuid": "61de84b8-b751-4d39-ab20-bf0143fe8532", + "uuid": "52cfefd0-9f3f-4210-b938-d850e1d892bc", "control-id": "pcidss_4_1-3.1", "description": "No notes for control-id 1.3.1.", "props": [ @@ -4001,7 +4013,7 @@ ] }, { - "uuid": "82abd6e6-3e94-44e2-abf8-7759f6502306", + "uuid": "48f6144c-752e-4bce-828f-26ffba93116a", "control-id": "pcidss_4_1-3.2", "description": "The description for control-id pcidss_4_1-3.2.", "props": [ @@ -4014,7 +4026,7 @@ ] }, { - "uuid": "850cba27-c263-492e-b633-d138e27b850d", + "uuid": "900ae6ed-bd01-4e44-8457-c3d2ae528e91", "control-id": "pcidss_4_1-3.3", "description": "Wireless interfaces are not expected in servers so they are disabled by default in this\npolicy.", "props": [ @@ -4031,7 +4043,7 @@ ] }, { - "uuid": "bdde9517-173e-4f8b-9c5e-e362670b97d3", + "uuid": "c79cb6d9-b2e6-47e1-81bb-9c7e2ce891d1", "control-id": "pcidss_4_1-4.1", "description": "Trusted and untrusted networks are expected to be different for each environment.\nBut loopback traffic is assumed to be trusted and even necessary for some services.\nThis requirement is complements 1.2.1 and 1.3.1 requirements.", "props": [ @@ -4053,7 +4065,7 @@ ] }, { - "uuid": "c96b45e3-f2a8-4cee-8d97-6d7b1aa8dfd0", + "uuid": "5cb1be33-e5d7-4b03-a8da-0d46bc1d8108", "control-id": "pcidss_4_1-4.2", "description": "Probably missing some relevant IPv6 related rules. Needs to be investigated.", "props": [ @@ -4090,7 +4102,7 @@ ] }, { - "uuid": "0adf7505-01ee-41be-9058-66a8b7fb0f9f", + "uuid": "40b09b2b-99b1-45f6-af89-0aa2ce300b33", "control-id": "pcidss_4_1-4.3", "description": "Probably missing some relevant IPv6 related rules. Needs to be investigated.", "props": [ @@ -4127,7 +4139,7 @@ ] }, { - "uuid": "b77c5836-289d-4ff0-ab34-8f78813607ad", + "uuid": "4a0d4934-d510-4418-b179-85e4b2a6be52", "control-id": "pcidss_4_1-4.4", "description": "The description for control-id pcidss_4_1-4.4.", "props": [ @@ -4140,7 +4152,7 @@ ] }, { - "uuid": "eee73722-8c0a-416d-ba1e-e23bfca3f98d", + "uuid": "7e0681d2-f4e9-4a92-9aba-aed06cc6db23", "control-id": "pcidss_4_1-4.5", "description": "No notes for control-id 1.4.5.", "props": [ @@ -4167,7 +4179,7 @@ ] }, { - "uuid": "e6ed1bcd-35e5-4ba9-97ae-a6016c1fbeb3", + "uuid": "30932674-b2e3-4b6d-be0d-121774862e4b", "control-id": "pcidss_4_1-5.1", "description": "To ensure this requirement, a manual analysis of site policy and topology is inevitable.\nFrom the technical perspective, previous requirements should already cover this\nrequirement at some level.", "props": [ @@ -4179,7 +4191,7 @@ ] }, { - "uuid": "d45d613a-6b62-48d7-bc88-bd52f780569a", + "uuid": "a103140b-cb2e-4d5c-b8d2-9abc07f8efce", "control-id": "pcidss_4_2-1.1", "description": "The description for control-id pcidss_4_2-1.1.", "props": [ @@ -4192,7 +4204,7 @@ ] }, { - "uuid": "c6d9e243-f3c5-42d4-b70d-55134f834faf", + "uuid": "8df47bf8-d610-497d-ac6c-2835c0e50bb2", "control-id": "pcidss_4_2-1.2", "description": "The description for control-id pcidss_4_2-1.2.", "props": [ @@ -4205,7 +4217,7 @@ ] }, { - "uuid": "b10303de-6e67-4aa3-b8fd-369a0d1d8a55", + "uuid": "cb85f7a9-05dd-4b72-8862-fbb1b09de910", "control-id": "pcidss_4_2-2.1", "description": "Interestingly this requirement recommends other standards, such as Center for Internet\nSecurity (CIS), International Organization for Standardization (ISO), National Institute\nof Standards and Technology (NIST), Cloud Security Alliance, and product vendors. So, the\nrules included here are very generic in terms of hardening.", "props": [ @@ -4222,7 +4234,7 @@ ] }, { - "uuid": "886b69fd-0555-4726-8ef9-f6e456aa3bc9", + "uuid": "b92ff121-9a73-4b27-80ee-3e4af67c2ad9", "control-id": "pcidss_4_2-2.2", "description": "Also related to requirement 8.2.6 and 8.3.5.", "props": [ @@ -4244,7 +4256,7 @@ ] }, { - "uuid": "e76c1b37-1c1f-470f-8793-a92cf47de1a8", + "uuid": "1d1e3829-44e1-4420-8eec-9cc424977c30", "control-id": "pcidss_4_2-2.3", "description": "The description for control-id pcidss_4_2-2.3.", "props": [ @@ -4257,7 +4269,7 @@ ] }, { - "uuid": "8f30557e-868f-4b31-a4c1-88d97b825fde", + "uuid": "b6646005-1a9c-4523-878d-c78f9c426176", "control-id": "pcidss_4_2-2.4", "description": "No notes for control-id 2.2.4.", "props": [ @@ -4314,7 +4326,7 @@ ] }, { - "uuid": "92258432-310a-4591-884d-c2c146b6099f", + "uuid": "47ecfb75-1af9-458d-9363-d220a388ffa3", "control-id": "pcidss_4_2-2.5", "description": "The description for control-id pcidss_4_2-2.5.", "props": [ @@ -4327,7 +4339,7 @@ ] }, { - "uuid": "ab235deb-3014-49ee-8af7-2a7943191471", + "uuid": "632c3492-ebb6-4201-85a8-245400a2d23b", "control-id": "pcidss_4_2-2.6", "description": "This requirement is not specific but also points to 2.2.1, where other policies are\nreferenced. Therefore, the most common rules related to system configuration in order to\nprevent misuse and selected in main profiles are also selected here.", "props": [ @@ -4729,7 +4741,7 @@ ] }, { - "uuid": "0661bdd9-e175-495f-b1e0-baadeaf30863", + "uuid": "3f933195-12ad-4f0f-8903-744e80edfa7e", "control-id": "pcidss_4_2-2.7", "description": "Related to requirement 12.3.3.", "props": [ @@ -4751,7 +4763,7 @@ ] }, { - "uuid": "7af7a465-a612-41a1-80d8-39ee03e6028c", + "uuid": "ceb70ffc-571c-4bfc-b20f-274c3f769b19", "control-id": "pcidss_4_2-3.1", "description": "Wireless interfaces are disabled by 1.3.3.", "props": [ @@ -4763,7 +4775,7 @@ ] }, { - "uuid": "36de20f1-c8ab-4209-9f7e-a845e6fbea0b", + "uuid": "0973befc-e335-4852-a27b-661cf909e1d0", "control-id": "pcidss_4_2-3.2", "description": "Wireless interfaces are disabled by 1.3.3.", "props": [ @@ -4775,7 +4787,7 @@ ] }, { - "uuid": "2668d34e-5dc8-4fd3-8dcf-0d0fb659a383", + "uuid": "d2b4dc97-8b0a-4a90-b867-fd003e86c18e", "control-id": "pcidss_4_3-1.1", "description": "The description for control-id pcidss_4_3-1.1.", "props": [ @@ -4788,7 +4800,7 @@ ] }, { - "uuid": "5400b8b1-e8a1-4d94-adbb-f8ff6991a7fd", + "uuid": "d522ad70-09c8-4369-a8a4-f0e7bcefe1c7", "control-id": "pcidss_4_3-1.2", "description": "The description for control-id pcidss_4_3-1.2.", "props": [ @@ -4801,7 +4813,7 @@ ] }, { - "uuid": "b56ce8b8-144b-4b46-9eef-02c13317a275", + "uuid": "a0d404f8-5eab-45c6-bdc8-defcd241fc02", "control-id": "pcidss_4_3-2.1", "description": "The description for control-id pcidss_4_3-2.1.", "props": [ @@ -4814,7 +4826,7 @@ ] }, { - "uuid": "48f1210b-4603-4718-89f6-679dd6a044d2", + "uuid": "3f28624c-6ee0-4f02-a5d3-a03515362d17", "control-id": "pcidss_4_3-3.1.1", "description": "This requirement consists in auditing files, databases and memory to make sure the full\ncontent of any track is not unnecessarily stored. It involves manual auditing but some\nautomated rules fit this requirement in order to reduce the chances if this data be\nunintentionally stored in memory.", "props": [ @@ -4856,7 +4868,7 @@ ] }, { - "uuid": "ca078aaf-bec6-4c0f-9b06-60b7c8c4a992", + "uuid": "c7c3e795-634d-4f59-9322-7b9acf6e4c64", "control-id": "pcidss_4_3-3.1.2", "description": "Same rules already selected in 3.3.1.1 are valid here, but they are not repeated.", "props": [ @@ -4868,7 +4880,7 @@ ] }, { - "uuid": "811eb658-3616-4c7c-b538-f8477378dc32", + "uuid": "4fe6df5f-c572-4b62-bdcb-e6e2b1f9f5fd", "control-id": "pcidss_4_3-3.1.3", "description": "Same rules already selected in 3.3.1.1 are valid here, but they are not repeated.", "props": [ @@ -4880,7 +4892,7 @@ ] }, { - "uuid": "2e97d984-aa66-4a2d-8a5c-ff6abd859eec", + "uuid": "2b97ff47-a592-46bc-b3b9-625fd48f8ca1", "control-id": "pcidss_4_3-3.2", "description": "The description for control-id pcidss_4_3-3.2.", "props": [ @@ -4893,7 +4905,7 @@ ] }, { - "uuid": "e0d39466-df0d-4e44-89d5-3372ea8a2814", + "uuid": "31802b14-6fba-4fcd-ae09-98f90291e143", "control-id": "pcidss_4_3-3.3", "description": "The description for control-id pcidss_4_3-3.3.", "props": [ @@ -4906,7 +4918,7 @@ ] }, { - "uuid": "04722979-c0d9-4b71-bd19-8ae6b974cd53", + "uuid": "9b4d9003-7416-4c71-96a7-f06dcf820b5c", "control-id": "pcidss_4_3-4.1", "description": "The description for control-id pcidss_4_3-4.1.", "props": [ @@ -4919,7 +4931,7 @@ ] }, { - "uuid": "ae1ecb2f-17fb-43d2-9572-9b661e0bcf15", + "uuid": "eaa65782-4ca5-4877-b6fc-4ada1375f023", "control-id": "pcidss_4_3-4.2", "description": "There are technical rules to disable removable storage devices. However, this requirement\nstill demand some manual auditing in documentation and eventual exceptions.", "props": [ @@ -4946,7 +4958,7 @@ ] }, { - "uuid": "3652d652-a2c8-4d75-b12e-854c1b9e5fd5", + "uuid": "f5dbc0ce-933c-4132-ad98-3142ddfb7bb2", "control-id": "pcidss_4_3-5.1.1", "description": "The description for control-id pcidss_4_3-5.1.1.", "props": [ @@ -4959,7 +4971,7 @@ ] }, { - "uuid": "71ca8c67-a214-4d3a-a460-93e43448d47e", + "uuid": "2b36f7ad-1144-44bf-870b-dc4c47d5a599", "control-id": "pcidss_4_3-5.1.2", "description": "No notes for control-id 3.5.1.2.", "props": [ @@ -4976,7 +4988,7 @@ ] }, { - "uuid": "0586481f-4bc2-4430-9552-066a1aa92704", + "uuid": "9f4a700b-42bb-4555-8d78-e8c05239387d", "control-id": "pcidss_4_3-5.1.3", "description": "The description for control-id pcidss_4_3-5.1.3.", "props": [ @@ -4989,7 +5001,7 @@ ] }, { - "uuid": "c4078050-ec58-44d6-8c37-7ea76fbde711", + "uuid": "71757b85-193c-4055-b209-d63d9f20e682", "control-id": "pcidss_4_3-6.1.1", "description": "The description for control-id pcidss_4_3-6.1.1.", "props": [ @@ -5002,7 +5014,7 @@ ] }, { - "uuid": "988a8612-7544-4a84-90c3-5829ef5d40b3", + "uuid": "b2158d4c-34d8-4995-b3fd-4f3fe784bca5", "control-id": "pcidss_4_3-6.1.2", "description": "The description for control-id pcidss_4_3-6.1.2.", "props": [ @@ -5015,7 +5027,7 @@ ] }, { - "uuid": "855d1866-89cb-41ba-9ed7-0fe96c5e7c91", + "uuid": "667b6cf5-e131-4eac-aec5-bceb3f554b97", "control-id": "pcidss_4_3-6.1.3", "description": "The description for control-id pcidss_4_3-6.1.3.", "props": [ @@ -5028,7 +5040,7 @@ ] }, { - "uuid": "1ecc542b-fa19-478a-a2a7-76d5a65807d9", + "uuid": "ec9c6862-cc89-4cc8-8330-ed41090b0d7e", "control-id": "pcidss_4_3-6.1.4", "description": "The description for control-id pcidss_4_3-6.1.4.", "props": [ @@ -5041,7 +5053,7 @@ ] }, { - "uuid": "43bd4659-83af-4b02-9ec0-a1788c608625", + "uuid": "ec34d477-b131-491a-a179-d4eb15261e5c", "control-id": "pcidss_4_3-7.1", "description": "The description for control-id pcidss_4_3-7.1.", "props": [ @@ -5054,7 +5066,7 @@ ] }, { - "uuid": "ed70ea11-782d-4e88-a26c-eea734890f81", + "uuid": "3b1322fc-6a64-46ba-a25b-7668b0f9322f", "control-id": "pcidss_4_3-7.2", "description": "The description for control-id pcidss_4_3-7.2.", "props": [ @@ -5067,7 +5079,7 @@ ] }, { - "uuid": "8d1924ba-8aa3-4984-8ba6-ecf84c6fd6ce", + "uuid": "d379ad8e-b14a-4dae-8cc8-5b33d8dbc8e3", "control-id": "pcidss_4_3-7.3", "description": "The description for control-id pcidss_4_3-7.3.", "props": [ @@ -5080,7 +5092,7 @@ ] }, { - "uuid": "9045a72c-5a72-424c-8920-327edfbc460d", + "uuid": "49f9482f-8c86-40be-a67e-3228a85eb39f", "control-id": "pcidss_4_3-7.4", "description": "The description for control-id pcidss_4_3-7.4.", "props": [ @@ -5093,7 +5105,7 @@ ] }, { - "uuid": "60288641-124f-4ef9-aec6-61068c9f1a54", + "uuid": "2efc6811-38bd-467f-af9c-b7130fa295a4", "control-id": "pcidss_4_3-7.5", "description": "The description for control-id pcidss_4_3-7.5.", "props": [ @@ -5106,7 +5118,7 @@ ] }, { - "uuid": "e3a74562-de53-4493-9917-e8565609cdd5", + "uuid": "055d258a-5d8e-48eb-8886-deeb51d5a712", "control-id": "pcidss_4_3-7.6", "description": "The description for control-id pcidss_4_3-7.6.", "props": [ @@ -5119,7 +5131,7 @@ ] }, { - "uuid": "818311ec-9543-4998-8dc2-82ac6ffdd8f6", + "uuid": "aed9eae8-17f7-4ea7-8506-5430ab9e75d0", "control-id": "pcidss_4_3-7.7", "description": "The description for control-id pcidss_4_3-7.7.", "props": [ @@ -5132,7 +5144,7 @@ ] }, { - "uuid": "e72e8508-662d-42cd-a75a-6ebe380d8a70", + "uuid": "1d062fb0-519e-48b8-b3cf-57a917a00245", "control-id": "pcidss_4_3-7.8", "description": "The description for control-id pcidss_4_3-7.8.", "props": [ @@ -5145,7 +5157,7 @@ ] }, { - "uuid": "3e3cb974-941e-4c02-8a26-fb7d05fca0c8", + "uuid": "61c17fc7-8193-4055-b68f-0aa33c2f4be4", "control-id": "pcidss_4_3-7.9", "description": "The description for control-id pcidss_4_3-7.9.", "props": [ @@ -5158,7 +5170,7 @@ ] }, { - "uuid": "fc7836b1-b919-4416-93eb-aab03c1ef437", + "uuid": "39361890-8b3a-482e-8525-17f8a7208700", "control-id": "pcidss_4_4-1.1", "description": "The description for control-id pcidss_4_4-1.1.", "props": [ @@ -5171,7 +5183,7 @@ ] }, { - "uuid": "bf57f218-496d-46b8-aa8d-fac010ace742", + "uuid": "be801bff-6e92-4357-a104-64468ac87c62", "control-id": "pcidss_4_4-1.2", "description": "The description for control-id pcidss_4_4-1.2.", "props": [ @@ -5184,7 +5196,7 @@ ] }, { - "uuid": "1c6b8af1-4c3d-4b3a-a032-adaadc20fe64", + "uuid": "494499f9-a161-47a1-9163-52463ab40808", "control-id": "pcidss_4_4-2.1.1", "description": "The description for control-id pcidss_4_4-2.1.1.", "props": [ @@ -5197,7 +5209,7 @@ ] }, { - "uuid": "ee3abdc5-a0f5-45e2-a83e-4de0599d579d", + "uuid": "ee1578f2-7886-4fc4-981f-eabab90a59e9", "control-id": "pcidss_4_4-2.1.2", "description": "The description for control-id pcidss_4_4-2.1.2.", "props": [ @@ -5210,7 +5222,7 @@ ] }, { - "uuid": "2e4f8e9e-40f0-4384-8721-6a686016fd22", + "uuid": "3b4f50bc-50a8-484c-a0cd-371dfc9447c2", "control-id": "pcidss_4_4-2.2", "description": "The description for control-id pcidss_4_4-2.2.", "props": [ @@ -5223,7 +5235,7 @@ ] }, { - "uuid": "709d1f99-55e4-454d-a2b0-8d1b4123aa47", + "uuid": "a22f7414-05cc-4435-8710-d6ca1319e45d", "control-id": "pcidss_4_5-1.1", "description": "The description for control-id pcidss_4_5-1.1.", "props": [ @@ -5236,7 +5248,7 @@ ] }, { - "uuid": "de7ce4a9-b41c-4d89-a850-6ddf55fbce48", + "uuid": "31858cb9-9e7f-45ad-8a1f-6225b6bd4afd", "control-id": "pcidss_4_5-1.2", "description": "The description for control-id pcidss_4_5-1.2.", "props": [ @@ -5249,7 +5261,7 @@ ] }, { - "uuid": "7e97c10b-112b-4329-bcb4-de7cfd403a5a", + "uuid": "d7ceff20-03e5-4e1b-8334-f8d625cfefbb", "control-id": "pcidss_4_5-2.1", "description": "There are many options of anti-malware and the criteria for any adopted solution or\napproach relies on each site policy. Technologies are supported but manual assessment is\nrequired.", "props": [ @@ -5261,7 +5273,7 @@ ] }, { - "uuid": "95bbee71-df56-4447-964f-f778d73f72e6", + "uuid": "710c0473-e64e-449a-8393-7e9f01e121d0", "control-id": "pcidss_4_5-2.2", "description": "The description for control-id pcidss_4_5-2.2.", "props": [ @@ -5274,7 +5286,7 @@ ] }, { - "uuid": "51e18fd8-a2d4-4da4-a643-55497b760a60", + "uuid": "6d50cafb-4ad0-42be-87c4-f616eee84647", "control-id": "pcidss_4_5-2.3.1", "description": "The description for control-id pcidss_4_5-2.3.1.", "props": [ @@ -5287,7 +5299,7 @@ ] }, { - "uuid": "0cf3368e-ec75-453c-bbcd-170e8351cd67", + "uuid": "ef7f7b61-d83f-4a09-9d50-14d064c669ab", "control-id": "pcidss_4_5-3.1", "description": "The description for control-id pcidss_4_5-3.1.", "props": [ @@ -5300,7 +5312,7 @@ ] }, { - "uuid": "aaf58f8e-640b-4780-835a-6100df1b26c0", + "uuid": "9b5f606b-b061-4b54-8302-fe09ee417204", "control-id": "pcidss_4_5-3.2.1", "description": "The description for control-id pcidss_4_5-3.2.1.", "props": [ @@ -5313,7 +5325,7 @@ ] }, { - "uuid": "6a039b59-eb92-4a6b-bbd0-c82393f8f6ce", + "uuid": "71366f05-eb6a-4c66-ba77-9cf6b03dab90", "control-id": "pcidss_4_5-3.3", "description": "The description for control-id pcidss_4_5-3.3.", "props": [ @@ -5326,7 +5338,7 @@ ] }, { - "uuid": "e828f5dc-d429-44f7-85a2-6cf7e0e59d4b", + "uuid": "ea7a54da-6fd0-4fd1-9843-353cb219959b", "control-id": "pcidss_4_5-3.4", "description": "The description for control-id pcidss_4_5-3.4.", "props": [ @@ -5339,7 +5351,7 @@ ] }, { - "uuid": "3847a29d-300e-4117-bea8-e69543973952", + "uuid": "30552798-8021-4029-8502-fbf5d1e68791", "control-id": "pcidss_4_5-3.5", "description": "The description for control-id pcidss_4_5-3.5.", "props": [ @@ -5352,7 +5364,7 @@ ] }, { - "uuid": "6e8e1cbf-cb09-4fcc-bcb3-e168f7d83814", + "uuid": "4858287c-2c42-4b36-82c5-55de505922b6", "control-id": "pcidss_4_5-4.1", "description": "The description for control-id pcidss_4_5-4.1.", "props": [ @@ -5365,7 +5377,7 @@ ] }, { - "uuid": "02164858-5cdb-4797-bc96-181328a98f9d", + "uuid": "2dee6113-bd47-4e37-86de-8f013f200ae1", "control-id": "pcidss_4_6-1.1", "description": "The description for control-id pcidss_4_6-1.1.", "props": [ @@ -5378,7 +5390,7 @@ ] }, { - "uuid": "fd5acf57-6328-46f3-a309-8020c3d31661", + "uuid": "99ab4986-5ee5-418a-9a38-c546afb0e3eb", "control-id": "pcidss_4_6-1.2", "description": "The description for control-id pcidss_4_6-1.2.", "props": [ @@ -5391,7 +5403,7 @@ ] }, { - "uuid": "54fabd1b-8c7a-4b80-b2b7-5c0866d1ca15", + "uuid": "1e6c05de-4933-4376-b889-b4f675b8e1ed", "control-id": "pcidss_4_6-2.1", "description": "The description for control-id pcidss_4_6-2.1.", "props": [ @@ -5404,7 +5416,7 @@ ] }, { - "uuid": "c483e29c-bc8f-4880-b5ea-41a00a9a5f8d", + "uuid": "95d4832d-87a6-4d0c-9d80-6d4f0736c11a", "control-id": "pcidss_4_6-2.2", "description": "The description for control-id pcidss_4_6-2.2.", "props": [ @@ -5417,7 +5429,7 @@ ] }, { - "uuid": "141036c4-ba14-4f6e-93cd-366087c85477", + "uuid": "7d14eb4e-481c-437c-898a-4b437f49fc8c", "control-id": "pcidss_4_6-2.3.1", "description": "The description for control-id pcidss_4_6-2.3.1.", "props": [ @@ -5430,7 +5442,7 @@ ] }, { - "uuid": "dd701611-25e2-48f3-af01-3f0bd27998fe", + "uuid": "a703ba20-c683-4c14-854a-2ead162792de", "control-id": "pcidss_4_6-2.4", "description": "The description for control-id pcidss_4_6-2.4.", "props": [ @@ -5443,7 +5455,7 @@ ] }, { - "uuid": "bade0302-8df0-4c89-b132-1b96339481c8", + "uuid": "b978c13d-255d-459d-b1ad-d8d3b93029c0", "control-id": "pcidss_4_6-3.1", "description": "The description for control-id pcidss_4_6-3.1.", "props": [ @@ -5456,7 +5468,7 @@ ] }, { - "uuid": "b6ea7341-1b30-40bb-aa4b-7caf91a0f9d5", + "uuid": "4c7220e1-dd84-466c-90cd-8545f499bd1f", "control-id": "pcidss_4_6-3.2", "description": "The description for control-id pcidss_4_6-3.2.", "props": [ @@ -5469,7 +5481,7 @@ ] }, { - "uuid": "f082e536-9526-4860-b745-695dbfb9f737", + "uuid": "69cee302-ddc2-4c6c-a90d-48975c8f799d", "control-id": "pcidss_4_6-3.3", "description": "No notes for control-id 6.3.3.", "props": [ @@ -5483,6 +5495,11 @@ "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_redhat_gpgkey_installed" }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "package_sequoia-sq_installed" + }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", @@ -5496,7 +5513,7 @@ ] }, { - "uuid": "34296d1c-5dfe-4db8-8747-1f2fb675ac99", + "uuid": "4825843e-471c-4477-bc3b-283a5be21de9", "control-id": "pcidss_4_6-4.1", "description": "The description for control-id pcidss_4_6-4.1.", "props": [ @@ -5509,7 +5526,7 @@ ] }, { - "uuid": "723f1ab1-3c4f-44ed-b06c-7145dfb396b0", + "uuid": "c1fc573c-d4dc-4190-a31e-57db8b3f6861", "control-id": "pcidss_4_6-4.2", "description": "The description for control-id pcidss_4_6-4.2.", "props": [ @@ -5522,7 +5539,7 @@ ] }, { - "uuid": "cd32ecf1-3611-45f6-a60c-abe1621d978f", + "uuid": "03395da0-ef36-4e44-80cc-415be3184c5f", "control-id": "pcidss_4_6-4.3", "description": "The description for control-id pcidss_4_6-4.3.", "props": [ @@ -5535,7 +5552,7 @@ ] }, { - "uuid": "b6396e11-f068-47f5-ba65-f3d8cd2a1179", + "uuid": "73e500cb-884e-4dbc-9c08-bc70e2fadf4c", "control-id": "pcidss_4_6-5.1", "description": "The description for control-id pcidss_4_6-5.1.", "props": [ @@ -5548,7 +5565,7 @@ ] }, { - "uuid": "1304c543-f651-4f6a-9d58-6fe5a7278dfc", + "uuid": "dd34710a-af3a-40cf-ab15-a2a93d209749", "control-id": "pcidss_4_6-5.2", "description": "The description for control-id pcidss_4_6-5.2.", "props": [ @@ -5561,7 +5578,7 @@ ] }, { - "uuid": "548d3921-7656-481b-b285-96bba602b8ad", + "uuid": "67860641-cfe9-419e-8958-ffed1a77a187", "control-id": "pcidss_4_6-5.3", "description": "The description for control-id pcidss_4_6-5.3.", "props": [ @@ -5574,7 +5591,7 @@ ] }, { - "uuid": "234a8ff2-af6b-43e3-9ea3-0b1393e75c7f", + "uuid": "01032535-b9d2-46e7-9f6a-6df16b081225", "control-id": "pcidss_4_6-5.4", "description": "The description for control-id pcidss_4_6-5.4.", "props": [ @@ -5587,7 +5604,7 @@ ] }, { - "uuid": "8485c0fe-1c57-4133-a510-d21b0bcd4deb", + "uuid": "17ddd318-3b02-4782-9a7b-e7804933aef5", "control-id": "pcidss_4_6-5.5", "description": "The description for control-id pcidss_4_6-5.5.", "props": [ @@ -5600,7 +5617,7 @@ ] }, { - "uuid": "079a70c3-ab9a-4300-90e8-ffd929526c68", + "uuid": "32b12843-d548-4b91-a231-7b36a8aac1f2", "control-id": "pcidss_4_6-5.6", "description": "The description for control-id pcidss_4_6-5.6.", "props": [ @@ -5613,7 +5630,7 @@ ] }, { - "uuid": "b8049f3a-5dc3-4577-b381-d36048a341d1", + "uuid": "c124b4e9-672b-4177-957e-0aca38347a0d", "control-id": "pcidss_4_7-1.1", "description": "The description for control-id pcidss_4_7-1.1.", "props": [ @@ -5626,7 +5643,7 @@ ] }, { - "uuid": "8e7cf615-20e6-4af1-8333-31932f6942a2", + "uuid": "2d2e07f1-a89c-488a-b9cd-e1551af4fe5d", "control-id": "pcidss_4_7-1.2", "description": "The description for control-id pcidss_4_7-1.2.", "props": [ @@ -5639,7 +5656,7 @@ ] }, { - "uuid": "ae7cf883-308e-433f-a1fa-70e65a87bc3e", + "uuid": "41cd3797-1015-43df-bfe8-3f294c87ae9e", "control-id": "pcidss_4_7-2.1", "description": "The description for control-id pcidss_4_7-2.1.", "props": [ @@ -5652,7 +5669,7 @@ ] }, { - "uuid": "b1aa17b0-229a-4301-ab20-cf3727f84d42", + "uuid": "2cd3ab9d-0e26-4ad2-8c61-3ec647616c8b", "control-id": "pcidss_4_7-2.2", "description": "The description for control-id pcidss_4_7-2.2.", "props": [ @@ -5665,7 +5682,7 @@ ] }, { - "uuid": "73cded1f-1cc2-4c6d-8e8e-3218ef6511ab", + "uuid": "59580ec7-73ed-47d6-a5e8-1b2789d041f6", "control-id": "pcidss_4_7-2.3", "description": "The description for control-id pcidss_4_7-2.3.", "props": [ @@ -5678,7 +5695,7 @@ ] }, { - "uuid": "8cd37644-2276-4c3c-add8-dc67d04d3fbb", + "uuid": "c0322567-aed0-42a7-9ac1-ada29c842061", "control-id": "pcidss_4_7-2.4", "description": "The description for control-id pcidss_4_7-2.4.", "props": [ @@ -5691,7 +5708,7 @@ ] }, { - "uuid": "7413a0d3-6f40-4f4c-b2d4-76d2d9e5abdf", + "uuid": "f9b49b3f-325a-4c71-955b-a7cb9241eb7f", "control-id": "pcidss_4_7-2.5.1", "description": "The description for control-id pcidss_4_7-2.5.1.", "props": [ @@ -5704,7 +5721,7 @@ ] }, { - "uuid": "4bd0e64d-88d7-4c0d-980a-8a9c19209300", + "uuid": "65b1afdd-1128-4bc0-99a4-cc34398069d4", "control-id": "pcidss_4_7-2.6", "description": "The description for control-id pcidss_4_7-2.6.", "props": [ @@ -5717,7 +5734,7 @@ ] }, { - "uuid": "922c0cb9-98a9-491d-9312-d72a7de1c769", + "uuid": "4a2716f9-06fe-4d3b-aca9-30587ca0a3dd", "control-id": "pcidss_4_7-3.1", "description": "The description for control-id pcidss_4_7-3.1.", "props": [ @@ -5730,7 +5747,7 @@ ] }, { - "uuid": "762b9272-b798-4c84-aa2d-6d0ec9d187dc", + "uuid": "deac304e-1629-42ad-a5ad-e7d2b1c5f9b0", "control-id": "pcidss_4_7-3.2", "description": "The description for control-id pcidss_4_7-3.2.", "props": [ @@ -5743,7 +5760,7 @@ ] }, { - "uuid": "5908739f-89d1-4535-bae9-cdb4479075a4", + "uuid": "ad240a48-61a0-43d2-b838-6ff22d3295f4", "control-id": "pcidss_4_7-3.3", "description": "The description for control-id pcidss_4_7-3.3.", "props": [ @@ -5756,7 +5773,7 @@ ] }, { - "uuid": "c1526d7e-6f52-4021-aaa2-e43540bae12a", + "uuid": "4c0e02a9-3388-46c5-8cdc-2a4e76fc176f", "control-id": "pcidss_4_8-1.1", "description": "The description for control-id pcidss_4_8-1.1.", "props": [ @@ -5769,7 +5786,7 @@ ] }, { - "uuid": "588037cc-9a1a-4850-9b2b-9e7fab78af81", + "uuid": "ac8a0fd3-e5f4-4fd7-89fb-b36988041196", "control-id": "pcidss_4_8-1.2", "description": "The description for control-id pcidss_4_8-1.2.", "props": [ @@ -5782,7 +5799,7 @@ ] }, { - "uuid": "657f62fd-d23a-4409-917d-edbd31033bdf", + "uuid": "dc2655f2-2600-42e0-afcc-9c840aec57d2", "control-id": "pcidss_4_8-2.1", "description": "The description for control-id pcidss_4_8-2.1.", "props": [ @@ -5825,7 +5842,7 @@ ] }, { - "uuid": "0aabdc9d-618b-4c32-b06a-a6344c2f36a7", + "uuid": "1ff2331e-2e4c-4299-9533-00862185d49d", "control-id": "pcidss_4_8-2.2", "description": "This requirement is complemented by 8.2.1 and related to 8.3.5.", "props": [ @@ -5852,7 +5869,7 @@ ] }, { - "uuid": "26940715-df78-46a9-b639-0b6416a5a6d3", + "uuid": "f5889f0d-fd66-4476-b2a8-75bd8c6b6de3", "control-id": "pcidss_4_8-2.3", "description": "The description for control-id pcidss_4_8-2.3.", "props": [ @@ -5865,7 +5882,7 @@ ] }, { - "uuid": "e1c71b98-42c3-4c43-958e-f0e4788f8784", + "uuid": "97e72e44-666f-4ade-9381-499e4edfec99", "control-id": "pcidss_4_8-2.4", "description": "The description for control-id pcidss_4_8-2.4.", "props": [ @@ -5878,7 +5895,7 @@ ] }, { - "uuid": "e031a370-4268-404d-89c8-1eaa5bc36438", + "uuid": "a246f6a3-fd75-4095-a20b-1925d3b0a88c", "control-id": "pcidss_4_8-2.5", "description": "The description for control-id pcidss_4_8-2.5.", "props": [ @@ -5891,7 +5908,7 @@ ] }, { - "uuid": "a27df131-e904-411a-8725-a669514cfcf8", + "uuid": "b9d45bad-a273-4f8e-9085-3e30a2f9ac87", "control-id": "pcidss_4_8-2.6", "description": "Also related to requirements 2.2.2 and 8.3.5.", "props": [ @@ -5913,7 +5930,7 @@ ] }, { - "uuid": "6028ef50-d338-40b4-af66-725a35489ef1", + "uuid": "c3860dc7-b4ca-4415-9402-e3980687a910", "control-id": "pcidss_4_8-2.7", "description": "The description for control-id pcidss_4_8-2.7.", "props": [ @@ -5926,7 +5943,7 @@ ] }, { - "uuid": "6d18fbaf-8943-4dc3-b0e4-6e8ebcebf363", + "uuid": "471899d7-dc05-4e71-9810-762ae40089ec", "control-id": "pcidss_4_8-2.8", "description": "No notes for control-id 8.2.8.", "props": [ @@ -5983,7 +6000,7 @@ ] }, { - "uuid": "4833d30c-fde6-408f-aa3e-78f235c82969", + "uuid": "60c3f81a-5860-4323-97c7-f00e2a8752e0", "control-id": "pcidss_4_8-3.1", "description": "No notes for control-id 8.3.1.", "props": [ @@ -6015,7 +6032,7 @@ ] }, { - "uuid": "1f7f55a5-c117-4d90-974b-9fb42bd6c137", + "uuid": "042624e1-841d-4334-a08d-f951f99c5e46", "control-id": "pcidss_4_8-3.2", "description": "There are similar rules that might be redundant for some distros.", "props": [ @@ -6047,7 +6064,7 @@ ] }, { - "uuid": "e9746978-385a-41ea-8ccc-8a377a2fafbf", + "uuid": "166b2d85-e15a-4c95-8cce-38f1381ff14a", "control-id": "pcidss_4_8-3.3", "description": "The description for control-id pcidss_4_8-3.3.", "props": [ @@ -6060,7 +6077,7 @@ ] }, { - "uuid": "2273fcb4-5729-4695-8462-68c13cb3fd4c", + "uuid": "f6d7aea1-1379-4fc4-959c-eb1d3b40af72", "control-id": "pcidss_4_8-3.4", "description": "No notes for control-id 8.3.4.", "props": [ @@ -6082,7 +6099,7 @@ ] }, { - "uuid": "ef1688d9-eb16-4c25-b502-3fd34a1d593e", + "uuid": "ebf2701d-cbbd-4231-b151-589626f37299", "control-id": "pcidss_4_8-3.5", "description": "Also related to requirement 2.2.2, 8.2.2 and 8.2.6.", "props": [ @@ -6099,7 +6116,7 @@ ] }, { - "uuid": "4eb087c7-692c-49d0-b8b5-b87e88510958", + "uuid": "ae220150-01c1-4d1e-9de0-5dbac112b516", "control-id": "pcidss_4_8-3.6", "description": "This requirement is not intended to apply to:\n- User accounts on point-of-sale terminals that have access to only one card number at a\ntime to facilitate a single transaction (such as IDs used by cashiers on point-of-sale\nterminals).\n- Application or system accounts, which are governed by requirements in section 8.6.", "props": [ @@ -6126,7 +6143,7 @@ ] }, { - "uuid": "f2df9d53-261b-48d4-9d4b-39950d45a598", + "uuid": "6ae40633-d574-4af9-a8be-c5d5cbff2801", "control-id": "pcidss_4_8-3.7", "description": "This requirement is not intended to apply to user accounts on point-of-sale terminals that\nhave access to only one card number at a time to facilitate a single transaction (such as\nIDs used by cashiers on point-of-sale terminals).\nFor RHEL 8 and RHEL 9 systems, the accounts_password_pam_pwhistory_... rules should be\nprefered in detriment of accounts_password_pam_unix_remember. Using both should not create\nconflict but is unnecessary and the last should be filtered out from the profile.", "props": [ @@ -6153,7 +6170,7 @@ ] }, { - "uuid": "f558b91f-b325-44f3-8095-92807fef5b8e", + "uuid": "95e8be20-d921-462f-a7c2-dae2d9e04635", "control-id": "pcidss_4_8-3.8", "description": "The description for control-id pcidss_4_8-3.8.", "props": [ @@ -6166,7 +6183,7 @@ ] }, { - "uuid": "19792d29-9446-4a52-a36b-0d83939a719a", + "uuid": "9d5c25a3-e1ad-4cfd-b3d0-e67f86b92251", "control-id": "pcidss_4_8-3.9", "description": "The requirement does not explicitily define the number of days before the password\nexpiration to warn the users, but the relevant rules were selected here as they do not\ncause any problems in combination with password lifetime rules.", "props": [ @@ -6198,7 +6215,7 @@ ] }, { - "uuid": "dffe9154-b92a-4a64-b1ca-cc43b38c23aa", + "uuid": "6eb6a237-b572-4070-bafe-09162c96401b", "control-id": "pcidss_4_8-3.10.1", "description": "This requirement is already covered by 8.3.9.", "props": [ @@ -6210,7 +6227,7 @@ ] }, { - "uuid": "9d6dc3f1-42f3-4f2b-bd1b-87752158261d", + "uuid": "be6cbd5c-6c16-4e3a-b560-c4a880a2846c", "control-id": "pcidss_4_8-3.11", "description": "The description for control-id pcidss_4_8-3.11.", "props": [ @@ -6223,7 +6240,7 @@ ] }, { - "uuid": "a0e20078-3ac4-48e0-8636-b9a218f63025", + "uuid": "eeaeb8b3-b6e6-4beb-a719-63270bab66ad", "control-id": "pcidss_4_8-4.1", "description": "No notes for control-id 8.4.1.", "props": [ @@ -6235,7 +6252,7 @@ ] }, { - "uuid": "6e84db2b-d369-46bc-9868-14b1d06950c1", + "uuid": "942fcdf1-1e20-4f9d-987e-7d785e55839c", "control-id": "pcidss_4_8-4.2", "description": "The description for control-id pcidss_4_8-4.2.", "props": [ @@ -6248,7 +6265,7 @@ ] }, { - "uuid": "ea6ebb56-c93a-434b-8b90-5ed4bdad1540", + "uuid": "4ea36027-9d7c-4594-853a-5c2a94e69340", "control-id": "pcidss_4_8-4.3", "description": "The description for control-id pcidss_4_8-4.3.", "props": [ @@ -6261,7 +6278,7 @@ ] }, { - "uuid": "c6d0d01c-eeef-42f9-b598-dd37e111fdaa", + "uuid": "179d4c5f-e00f-4828-937c-3fe5182da7ae", "control-id": "pcidss_4_8-5.1", "description": "The description for control-id pcidss_4_8-5.1.", "props": [ @@ -6274,7 +6291,7 @@ ] }, { - "uuid": "e6f3ac32-c528-4f7c-948d-d59ac87236f5", + "uuid": "6786a388-800b-4f33-b6a7-77901dc36515", "control-id": "pcidss_4_8-6.1", "description": "This requirement is related to 2.2.2, 2.2.6, 8.2.1 and 8.2.2. Specifically on 8.2.2 system\naccounts usage is restricted. Exceptions to system accounts should be manually checked to\nensure the requirements in description. This requirement although implements some extra\ncontrols regarding root account.", "props": [ @@ -6301,7 +6318,7 @@ ] }, { - "uuid": "7b487496-6e55-431e-ab48-02e0d43f36e5", + "uuid": "7a8888bd-fdfb-4f7a-9238-42d1be38348d", "control-id": "pcidss_4_8-6.2", "description": "The description for control-id pcidss_4_8-6.2.", "props": [ @@ -6314,7 +6331,7 @@ ] }, { - "uuid": "1a1818ed-d100-481d-8fb5-594f2db03949", + "uuid": "6dd8a0b4-756e-4f69-b5a7-5e0a5706bc73", "control-id": "pcidss_4_8-6.3", "description": "Related to requirements 8.3.6 and 8.3.9.", "props": [ @@ -6326,7 +6343,7 @@ ] }, { - "uuid": "8b26b07a-a526-4a62-ae3f-bc7a53770e05", + "uuid": "cb1e4077-b44e-4287-8d17-859d3d157155", "control-id": "pcidss_4_9-1.1", "description": "The description for control-id pcidss_4_9-1.1.", "props": [ @@ -6339,7 +6356,7 @@ ] }, { - "uuid": "5dba4500-5197-4db9-b7fc-fe9b00e22ef8", + "uuid": "15b90706-f0e6-42ed-9a0e-908b5cbbd14d", "control-id": "pcidss_4_9-1.2", "description": "The description for control-id pcidss_4_9-1.2.", "props": [ @@ -6352,7 +6369,7 @@ ] }, { - "uuid": "157335b9-9af5-4681-81c7-7acdb8663c12", + "uuid": "60ce9d3b-6bd3-4b20-9ce4-b630dcb2cff7", "control-id": "pcidss_4_9-2.1.1", "description": "The description for control-id pcidss_4_9-2.1.1.", "props": [ @@ -6365,7 +6382,7 @@ ] }, { - "uuid": "0cf0c50f-a660-4479-802a-7d6d1cc906d8", + "uuid": "80c23ccb-007b-4517-a22e-47b4b6fcdc0c", "control-id": "pcidss_4_9-2.2", "description": "The description for control-id pcidss_4_9-2.2.", "props": [ @@ -6378,7 +6395,7 @@ ] }, { - "uuid": "1135386e-d71b-424f-8f6f-9c7b624502aa", + "uuid": "b86eddaf-9823-4cde-8568-7513e5e64a94", "control-id": "pcidss_4_9-2.3", "description": "The description for control-id pcidss_4_9-2.3.", "props": [ @@ -6391,7 +6408,7 @@ ] }, { - "uuid": "5710b85f-03b9-4c56-a786-99c6ecae11ff", + "uuid": "ae7826a2-9cdf-4990-86bf-a6be18c7e1f1", "control-id": "pcidss_4_9-2.4", "description": "The description for control-id pcidss_4_9-2.4.", "props": [ @@ -6404,7 +6421,7 @@ ] }, { - "uuid": "08a26a91-44e6-409e-9204-883339568311", + "uuid": "fdabb1f2-b7ae-4148-b640-15601f1bd655", "control-id": "pcidss_4_9-3.1.1", "description": "The description for control-id pcidss_4_9-3.1.1.", "props": [ @@ -6417,7 +6434,7 @@ ] }, { - "uuid": "d11e4b6c-b882-4d48-8b74-b89665dd4819", + "uuid": "3625abef-a471-44e3-8596-2df75c8b238b", "control-id": "pcidss_4_9-3.2", "description": "The description for control-id pcidss_4_9-3.2.", "props": [ @@ -6430,7 +6447,7 @@ ] }, { - "uuid": "9043b812-9bbf-4980-aa86-8fb00db73a00", + "uuid": "8048a65b-9a67-412c-a911-7bbfa83a7b07", "control-id": "pcidss_4_9-3.3", "description": "The description for control-id pcidss_4_9-3.3.", "props": [ @@ -6443,7 +6460,7 @@ ] }, { - "uuid": "669e136e-34d1-45cc-900f-005c7b8ac33d", + "uuid": "f17ee621-6664-4d59-ba7a-1e70b4111af4", "control-id": "pcidss_4_9-3.4", "description": "The description for control-id pcidss_4_9-3.4.", "props": [ @@ -6456,7 +6473,7 @@ ] }, { - "uuid": "76a8ac2e-6e43-4a9f-9825-0374f451bd52", + "uuid": "5b40c4fa-adee-4450-8774-ba495dde9ff1", "control-id": "pcidss_4_9-4.1.1", "description": "The description for control-id pcidss_4_9-4.1.1.", "props": [ @@ -6469,7 +6486,7 @@ ] }, { - "uuid": "5269fe5f-c123-4bad-88da-34e690ced695", + "uuid": "bedaa0a9-5e47-4244-b9d8-c1ba47e29eda", "control-id": "pcidss_4_9-4.1.2", "description": "The description for control-id pcidss_4_9-4.1.2.", "props": [ @@ -6482,7 +6499,7 @@ ] }, { - "uuid": "8fb44636-fba5-4247-a155-f52e365a6528", + "uuid": "4592839a-e52e-49d7-b697-b33015249a8b", "control-id": "pcidss_4_9-4.2", "description": "The description for control-id pcidss_4_9-4.2.", "props": [ @@ -6495,7 +6512,7 @@ ] }, { - "uuid": "44c73a0d-594d-44de-8ef7-f5f746ec165b", + "uuid": "6e5a3186-b185-45e0-9abf-f9645f291b8e", "control-id": "pcidss_4_9-4.3", "description": "The description for control-id pcidss_4_9-4.3.", "props": [ @@ -6508,7 +6525,7 @@ ] }, { - "uuid": "146751dd-5aa6-40cb-893b-65fe86b04725", + "uuid": "96a6800a-4c34-4814-b000-c673e2fb2120", "control-id": "pcidss_4_9-4.4", "description": "The description for control-id pcidss_4_9-4.4.", "props": [ @@ -6521,7 +6538,7 @@ ] }, { - "uuid": "e32b061b-57d4-4631-b850-48c5a96be4c2", + "uuid": "c7ff4099-2dea-4060-8539-dab4770580c6", "control-id": "pcidss_4_9-4.5.1", "description": "The description for control-id pcidss_4_9-4.5.1.", "props": [ @@ -6534,7 +6551,7 @@ ] }, { - "uuid": "354660bd-f423-44e1-8612-8219a68d391e", + "uuid": "a1e30cb0-4d58-4d0a-b5cc-d17108dae1e5", "control-id": "pcidss_4_9-4.6", "description": "The description for control-id pcidss_4_9-4.6.", "props": [ @@ -6547,7 +6564,7 @@ ] }, { - "uuid": "e2ee6c91-e7c6-47be-b9a2-525b47324baf", + "uuid": "0b85bc15-4325-4939-bdda-2a034b1c5e84", "control-id": "pcidss_4_9-4.7", "description": "The description for control-id pcidss_4_9-4.7.", "props": [ @@ -6560,7 +6577,7 @@ ] }, { - "uuid": "37ba97b3-f2b2-40b6-ac8a-31df0060a0ca", + "uuid": "63874669-9abf-4a79-8652-853bf72d0add", "control-id": "pcidss_4_9-5.1.1", "description": "The description for control-id pcidss_4_9-5.1.1.", "props": [ @@ -6573,7 +6590,7 @@ ] }, { - "uuid": "01234135-2069-43bd-8905-6f910ca916c5", + "uuid": "05a4c201-d608-4627-9e28-64375dfcad49", "control-id": "pcidss_4_9-5.1.2.1", "description": "The description for control-id pcidss_4_9-5.1.2.1.", "props": [ @@ -6586,7 +6603,7 @@ ] }, { - "uuid": "cead7cc4-c459-443b-a960-a356362abb00", + "uuid": "c7d09232-b56d-4737-9beb-d149098b6dfb", "control-id": "pcidss_4_9-5.1.3", "description": "The description for control-id pcidss_4_9-5.1.3.", "props": [ @@ -6599,7 +6616,7 @@ ] }, { - "uuid": "c82c46b9-8fe3-433e-af4d-1a0bdf52c3ba", + "uuid": "d3918303-49b6-4907-92f4-3a6b0689cada", "control-id": "pcidss_4_10-1.1", "description": "The description for control-id pcidss_4_10-1.1.", "props": [ @@ -6612,7 +6629,7 @@ ] }, { - "uuid": "091709be-cdd8-4d12-a44b-70a4850e3cbb", + "uuid": "ba571d63-110c-46d9-919b-a9d568702aa7", "control-id": "pcidss_4_10-1.2", "description": "The description for control-id pcidss_4_10-1.2.", "props": [ @@ -6625,7 +6642,7 @@ ] }, { - "uuid": "f5c1b046-a7fb-4501-b35a-6215051d9036", + "uuid": "2d5c5227-8ce1-4ea8-82f1-724680f127b2", "control-id": "pcidss_4_10-2.1.1", "description": "The description for control-id pcidss_4_10-2.1.1.", "props": [ @@ -6638,7 +6655,7 @@ ] }, { - "uuid": "2e592bb5-9aea-45cc-861d-3c2ae23f169e", + "uuid": "df04ad10-4600-4394-ba46-e02406df1e10", "control-id": "pcidss_4_10-2.1.2", "description": "Not all privileged commands have suid or sgid enabled. We probably want to include more\nrules for this requirement.", "props": [ @@ -6655,7 +6672,7 @@ ] }, { - "uuid": "2e054e3a-33ab-4a09-b139-3bc30deb7751", + "uuid": "a43f75e4-a4c3-4f38-90ff-157b5162a67b", "control-id": "pcidss_4_10-2.1.3", "description": "No notes for control-id 10.2.1.3.", "props": [ @@ -6702,7 +6719,7 @@ ] }, { - "uuid": "9ec2fab0-860a-4f45-9cd5-3b1ae2ff4786", + "uuid": "06471539-0a11-4418-9eec-0e1eb1915e43", "control-id": "pcidss_4_10-2.1.4", "description": "No notes for control-id 10.2.1.4.", "props": [ @@ -6719,7 +6736,7 @@ ] }, { - "uuid": "ee642407-89cf-44cc-b11b-acb2a69175a3", + "uuid": "4acdc8c3-f4f8-4c8c-9e6a-901a12fe33a0", "control-id": "pcidss_4_10-2.1.5", "description": "No notes for control-id 10.2.1.5.", "props": [ @@ -6761,7 +6778,7 @@ ] }, { - "uuid": "40dd81df-12e4-492d-8f98-bb7fc8918106", + "uuid": "1e9b83ad-4272-43ed-a75d-f0d0cbda63d7", "control-id": "pcidss_4_10-2.1.6", "description": "The description for control-id pcidss_4_10-2.1.6.", "props": [ @@ -6774,7 +6791,7 @@ ] }, { - "uuid": "b68b7567-e8c9-46f0-b803-bd4f4d6ab1c1", + "uuid": "6ff7e28a-149f-4bcf-83d0-85f49ec71b68", "control-id": "pcidss_4_10-2.1.7", "description": "There are enough rules to capture deletion events but not for creation events.\nThis requirement needs to be better investigated to confirm which additional rules would\nsatistfy the requirement.", "props": [ @@ -6821,7 +6838,7 @@ ] }, { - "uuid": "2b3f963a-fdbb-4d5a-ac60-88a4079f45ab", + "uuid": "ebdf442d-4115-4693-9d01-b9e2bdc88829", "control-id": "pcidss_4_10-2.2", "description": "Standard settings for audit should be enough.", "props": [ @@ -6838,7 +6855,7 @@ ] }, { - "uuid": "0b512cf5-cbe9-45fb-b43e-72f44ad6c500", + "uuid": "3e7fd906-31ef-4c7f-adda-7ec2fea332e8", "control-id": "pcidss_4_10-3.1", "description": "No notes for control-id 10.3.1.", "props": [ @@ -6865,7 +6882,7 @@ ] }, { - "uuid": "56f8f9a7-f494-4fcc-86e7-edf6ce8ac1b2", + "uuid": "6028b4b6-79e7-4410-8512-d53457d03e30", "control-id": "pcidss_4_10-3.2", "description": "No notes for control-id 10.3.2.", "props": [ @@ -6902,7 +6919,7 @@ ] }, { - "uuid": "7a776be3-8aca-4018-9658-1ffb9684980e", + "uuid": "a6820a2c-ad17-4e69-a886-14585a94a5d0", "control-id": "pcidss_4_10-3.3", "description": "Although the technologies in general allow to send logs to a centralized server, some\nparameters for this configuration are specific to each site policy and therefore the\nrequirement demands manual assessment.", "props": [ @@ -6924,7 +6941,7 @@ ] }, { - "uuid": "2fb9baa0-7000-4e4c-ad88-38175346cf79", + "uuid": "d376c578-a5a7-48db-b801-3cf4a7c41e3e", "control-id": "pcidss_4_10-3.4", "description": "No notes for control-id 10.3.4.", "props": [ @@ -7016,7 +7033,7 @@ ] }, { - "uuid": "2514efcd-9e30-4a82-8435-4c954992f715", + "uuid": "d371802c-a5d8-4ba4-9123-ad4430d7b443", "control-id": "pcidss_4_10-4.1.1", "description": "The description for control-id pcidss_4_10-4.1.1.", "props": [ @@ -7029,7 +7046,7 @@ ] }, { - "uuid": "8ecd7821-f1a4-47b4-b620-ac893ad8fcd5", + "uuid": "7618db41-d5aa-44bb-a6c2-67a1430a4149", "control-id": "pcidss_4_10-4.2.1", "description": "The description for control-id pcidss_4_10-4.2.1.", "props": [ @@ -7042,7 +7059,7 @@ ] }, { - "uuid": "7c70c16d-c4c9-42b9-9b12-d2dee52a9226", + "uuid": "b572908d-0840-4457-b581-2bda3dd0fe06", "control-id": "pcidss_4_10-4.3", "description": "The description for control-id pcidss_4_10-4.3.", "props": [ @@ -7055,7 +7072,7 @@ ] }, { - "uuid": "c7075b81-bae0-41fd-91ff-73a45cc58a9d", + "uuid": "52fe9855-fb9a-4008-a89c-3d0697714b5a", "control-id": "pcidss_4_10-5.1", "description": "It is not simple to ensure 12 months history is present in each system but the rules in\nthis requirement ensures the logs are not lost without administrators awareness.", "props": [ @@ -7092,7 +7109,7 @@ ] }, { - "uuid": "5b3241b2-5dcf-4ed4-9f76-42bda2dde319", + "uuid": "ed976b21-0155-464d-ac6e-0c2efd7cca50", "control-id": "pcidss_4_10-6.1", "description": "Maybe it is possible to optmize some similar rules related to ntp.", "props": [ @@ -7109,7 +7126,7 @@ ] }, { - "uuid": "8f39de40-1afe-4d1a-b0ea-9cc9c8770873", + "uuid": "484ff03c-16c4-4481-a6b7-779f36da23b2", "control-id": "pcidss_4_10-6.2", "description": "The selected rules might need updates in order to restrict their platform applicability\nto avoid conflicts.", "props": [ @@ -7126,7 +7143,7 @@ ] }, { - "uuid": "427e21b7-9744-4ea9-be70-6072c0a8bc57", + "uuid": "253ef780-0ef7-4cf9-aec8-b501472c932b", "control-id": "pcidss_4_10-6.3", "description": "No notes for control-id 10.6.3.", "props": [ @@ -7168,7 +7185,7 @@ ] }, { - "uuid": "088c375e-def3-4d8a-9c87-2010dcae1a5f", + "uuid": "747e89d3-676a-42a0-9aea-884ba11cd3d3", "control-id": "pcidss_4_10-7.1", "description": "The description for control-id pcidss_4_10-7.1.", "props": [ @@ -7181,7 +7198,7 @@ ] }, { - "uuid": "ca7c203b-fdb5-4737-9da8-47c80a1884b3", + "uuid": "bbb12c40-2631-4437-a1fc-c3a94b23bfde", "control-id": "pcidss_4_10-7.2", "description": "No notes for control-id 10.7.2.", "props": [ @@ -7203,7 +7220,7 @@ ] }, { - "uuid": "56f997f9-b68f-4c64-b9f4-ebbd0446de53", + "uuid": "9146f256-d7ea-4e8c-983c-1b9c5b9b2c4d", "control-id": "pcidss_4_10-7.3", "description": "The description for control-id pcidss_4_10-7.3.", "props": [ @@ -7216,7 +7233,7 @@ ] }, { - "uuid": "3a782f2a-5ab1-49a3-8a66-65d956c717e2", + "uuid": "67f302b1-5ec4-4c46-b4f9-e7965d2b0a21", "control-id": "pcidss_4_11-1.1", "description": "The description for control-id pcidss_4_11-1.1.", "props": [ @@ -7229,7 +7246,7 @@ ] }, { - "uuid": "aa9d25f2-8f22-4d08-912a-b6c88231f2d7", + "uuid": "487f2b56-97e1-4e48-8e5c-2f026685a2b4", "control-id": "pcidss_4_11-1.2", "description": "The description for control-id pcidss_4_11-1.2.", "props": [ @@ -7242,7 +7259,7 @@ ] }, { - "uuid": "17be2e4e-38b0-4c47-8d68-2cc2c99e7ac3", + "uuid": "d1184540-5777-47ec-8a18-38f4dcaab1e8", "control-id": "pcidss_4_11-2.1", "description": "The description for control-id pcidss_4_11-2.1.", "props": [ @@ -7255,7 +7272,7 @@ ] }, { - "uuid": "3a920d8f-cfd3-4ed0-90f4-44efce2f719b", + "uuid": "1b257540-cd3e-4073-b88f-93f90dd1015e", "control-id": "pcidss_4_11-2.2", "description": "The description for control-id pcidss_4_11-2.2.", "props": [ @@ -7268,7 +7285,7 @@ ] }, { - "uuid": "1c7188ab-42f8-4301-92a9-59fb3edfbc9e", + "uuid": "ae364acb-6f2e-437a-b844-ffe0a6c428b5", "control-id": "pcidss_4_11-3.1.1", "description": "The description for control-id pcidss_4_11-3.1.1.", "props": [ @@ -7281,7 +7298,7 @@ ] }, { - "uuid": "63d9c2aa-a71d-4e40-b286-9210481835cf", + "uuid": "79fb1da1-aae2-4ca9-82ee-265ef3960eac", "control-id": "pcidss_4_11-3.1.2", "description": "The description for control-id pcidss_4_11-3.1.2.", "props": [ @@ -7294,7 +7311,7 @@ ] }, { - "uuid": "406836e4-c398-48e8-b3db-4caaeb540ca2", + "uuid": "5e0f4a57-c776-4d56-994d-ce9c516d5b0f", "control-id": "pcidss_4_11-3.1.3", "description": "The description for control-id pcidss_4_11-3.1.3.", "props": [ @@ -7307,7 +7324,7 @@ ] }, { - "uuid": "1929d806-03be-4d56-82e3-c0ae05d438aa", + "uuid": "018e620b-153f-462b-9e51-9c5103798e10", "control-id": "pcidss_4_11-3.2.1", "description": "The description for control-id pcidss_4_11-3.2.1.", "props": [ @@ -7320,7 +7337,7 @@ ] }, { - "uuid": "ffa02d6a-b1cd-46f6-9aec-7df1bffac8c1", + "uuid": "35afc1d9-a138-4d81-866d-7202be2f17c8", "control-id": "pcidss_4_11-4.1", "description": "The description for control-id pcidss_4_11-4.1.", "props": [ @@ -7333,7 +7350,7 @@ ] }, { - "uuid": "85133f91-d288-4b07-8ffc-0b17372ba6a0", + "uuid": "b7cfae0c-a283-485b-adb4-b6a20e9aa418", "control-id": "pcidss_4_11-4.2", "description": "The description for control-id pcidss_4_11-4.2.", "props": [ @@ -7346,7 +7363,7 @@ ] }, { - "uuid": "c1eace52-f1f7-44d4-93c0-d7a4c121bf0f", + "uuid": "cd8ea9f9-a928-496f-aa0d-f56b8d86fd5d", "control-id": "pcidss_4_11-4.3", "description": "The description for control-id pcidss_4_11-4.3.", "props": [ @@ -7359,7 +7376,7 @@ ] }, { - "uuid": "d3e93689-fe8d-4f2b-9991-9530ab93aea8", + "uuid": "d418c6fe-de7d-48e9-8d3a-0dd11dbd01f2", "control-id": "pcidss_4_11-4.4", "description": "The description for control-id pcidss_4_11-4.4.", "props": [ @@ -7372,7 +7389,7 @@ ] }, { - "uuid": "924a1042-925e-489c-a70b-36d1707913c3", + "uuid": "6b89679b-9be9-40b9-9b69-e9561c1521a7", "control-id": "pcidss_4_11-4.5", "description": "The description for control-id pcidss_4_11-4.5.", "props": [ @@ -7385,7 +7402,7 @@ ] }, { - "uuid": "48e2e21a-c7a1-4035-8f1d-02b61d64b2c6", + "uuid": "4259ce1c-4717-427b-a452-13fac2fd3e3f", "control-id": "pcidss_4_11-4.6", "description": "The description for control-id pcidss_4_11-4.6.", "props": [ @@ -7398,7 +7415,7 @@ ] }, { - "uuid": "c295333d-053b-4980-8464-e42d15c60712", + "uuid": "436b7281-6d26-4cd1-b72f-ee49c4640050", "control-id": "pcidss_4_11-4.7", "description": "The description for control-id pcidss_4_11-4.7.", "props": [ @@ -7411,7 +7428,7 @@ ] }, { - "uuid": "cb489df4-2dd6-4ead-bf31-21ab6de0263d", + "uuid": "a087cdfc-9ea8-4b17-8364-e37ba8dbdf89", "control-id": "pcidss_4_11-5.1.1", "description": "The description for control-id pcidss_4_11-5.1.1.", "props": [ @@ -7424,7 +7441,7 @@ ] }, { - "uuid": "3939adcb-2b62-4dd4-bb23-9e922be05229", + "uuid": "35974825-c25d-45f6-9bb7-97249c3f4397", "control-id": "pcidss_4_11-5.2", "description": "No notes for control-id 11.5.2.", "props": [ @@ -7461,7 +7478,7 @@ ] }, { - "uuid": "3d0d78b6-92f1-4360-bbf4-03c5969a94fc", + "uuid": "d7909aa6-3c0d-443c-8b2b-6b5af598028c", "control-id": "pcidss_4_11-6.1", "description": "The description for control-id pcidss_4_11-6.1.", "props": [ @@ -7474,7 +7491,7 @@ ] }, { - "uuid": "f155e82e-6a5a-4cf6-abb2-375044250332", + "uuid": "6d3dfc34-0fba-40f6-88ca-f01f54c1f881", "control-id": "pcidss_4_12-1.1", "description": "The description for control-id pcidss_4_12-1.1.", "props": [ @@ -7487,7 +7504,7 @@ ] }, { - "uuid": "51c27ffa-df8e-4d0c-8818-01f33ebc8f08", + "uuid": "116f319a-1821-4d10-8a26-3379fdc0a371", "control-id": "pcidss_4_12-1.2", "description": "The description for control-id pcidss_4_12-1.2.", "props": [ @@ -7500,7 +7517,7 @@ ] }, { - "uuid": "d276dc3e-d37d-4694-a8f1-c924869b9fce", + "uuid": "7ef4224c-4299-42eb-a6cf-bcf7f1cc11e5", "control-id": "pcidss_4_12-1.3", "description": "The description for control-id pcidss_4_12-1.3.", "props": [ @@ -7513,7 +7530,7 @@ ] }, { - "uuid": "1996b04e-5960-4b96-a4a7-90838950ae8e", + "uuid": "fe23027d-4153-402e-8499-c3dfd7969d90", "control-id": "pcidss_4_12-1.4", "description": "The description for control-id pcidss_4_12-1.4.", "props": [ @@ -7526,7 +7543,7 @@ ] }, { - "uuid": "a8e54724-7cfe-443c-97fa-661a192e87d4", + "uuid": "a7340de8-6841-4c34-9dfc-ea5bdf75c6f0", "control-id": "pcidss_4_12-2.1", "description": "The description for control-id pcidss_4_12-2.1.", "props": [ @@ -7539,7 +7556,7 @@ ] }, { - "uuid": "eea0dbe1-b215-40ee-8d3d-b86c69f4e857", + "uuid": "fe97e021-4686-475a-a9a1-7bf186899dbd", "control-id": "pcidss_4_12-3.1", "description": "The description for control-id pcidss_4_12-3.1.", "props": [ @@ -7552,7 +7569,7 @@ ] }, { - "uuid": "af41d84b-161e-4753-87ec-8b7504b76c72", + "uuid": "e4c67219-945d-49c0-bd45-4b962785e83f", "control-id": "pcidss_4_12-3.2", "description": "The description for control-id pcidss_4_12-3.2.", "props": [ @@ -7565,7 +7582,7 @@ ] }, { - "uuid": "9e296358-72e9-4ca5-beab-8b3d41180771", + "uuid": "75f8cec1-4b42-4832-a58d-caad2a9ccaa9", "control-id": "pcidss_4_12-3.3", "description": "The description for control-id pcidss_4_12-3.3.", "props": [ @@ -7578,7 +7595,7 @@ ] }, { - "uuid": "a7a98c56-8957-4970-84c5-5313b4bda57b", + "uuid": "2ba357b0-ea09-40ce-be06-b145eed475fd", "control-id": "pcidss_4_12-3.4", "description": "The description for control-id pcidss_4_12-3.4.", "props": [ @@ -7591,7 +7608,7 @@ ] }, { - "uuid": "e2515e0a-66e5-4429-a383-fe1bc2977acc", + "uuid": "a43305c8-a9f6-4d9c-9f0a-6ec4779f8a5e", "control-id": "pcidss_4_12-4.1", "description": "The description for control-id pcidss_4_12-4.1.", "props": [ @@ -7604,7 +7621,7 @@ ] }, { - "uuid": "56348c47-24b5-45d6-980d-d0ef18905728", + "uuid": "30f1207e-5665-4fc5-862f-1289eda70cb1", "control-id": "pcidss_4_12-4.2.1", "description": "The description for control-id pcidss_4_12-4.2.1.", "props": [ @@ -7617,7 +7634,7 @@ ] }, { - "uuid": "8bc1110b-ac4f-484d-9806-87ecea370e48", + "uuid": "09f67b49-5cf9-4320-900d-cf051a02f241", "control-id": "pcidss_4_12-5.1", "description": "The description for control-id pcidss_4_12-5.1.", "props": [ @@ -7630,7 +7647,7 @@ ] }, { - "uuid": "024b6ce3-4d39-431b-b8f7-146505c1c9fe", + "uuid": "9d77f314-50ff-4925-a6c6-a9b96e761889", "control-id": "pcidss_4_12-5.2.1", "description": "The description for control-id pcidss_4_12-5.2.1.", "props": [ @@ -7643,7 +7660,7 @@ ] }, { - "uuid": "d6149121-703b-4937-b044-571d394e625e", + "uuid": "1ae2b68f-3561-4563-9cfd-12a2a0dda8d8", "control-id": "pcidss_4_12-5.3", "description": "The description for control-id pcidss_4_12-5.3.", "props": [ @@ -7656,7 +7673,7 @@ ] }, { - "uuid": "e0b3e48e-5097-419c-a4be-ac8b159beb6a", + "uuid": "acaa7e67-b5a1-458b-8787-5757b3704575", "control-id": "pcidss_4_12-6.1", "description": "The description for control-id pcidss_4_12-6.1.", "props": [ @@ -7669,7 +7686,7 @@ ] }, { - "uuid": "aaf487f8-97c5-4764-b8af-9543f8868fa5", + "uuid": "4c731b93-7517-4e3b-a85f-8494004bd587", "control-id": "pcidss_4_12-6.2", "description": "The description for control-id pcidss_4_12-6.2.", "props": [ @@ -7682,7 +7699,7 @@ ] }, { - "uuid": "b5db4709-379d-470f-b531-8fb2586771e1", + "uuid": "08160de4-af23-4f54-98ec-653736a7810c", "control-id": "pcidss_4_12-6.3.1", "description": "The description for control-id pcidss_4_12-6.3.1.", "props": [ @@ -7695,7 +7712,7 @@ ] }, { - "uuid": "31a3ebea-09e8-4ad2-a97b-4d4f33d0dd26", + "uuid": "ce2ea606-f35e-4409-a40a-411a8058005a", "control-id": "pcidss_4_12-6.3.2", "description": "The description for control-id pcidss_4_12-6.3.2.", "props": [ @@ -7708,7 +7725,7 @@ ] }, { - "uuid": "ffe659b4-31c8-42b7-9997-5725922f50be", + "uuid": "97f2d70e-f552-43ef-9ba0-148da26d05f2", "control-id": "pcidss_4_12-7.1", "description": "The description for control-id pcidss_4_12-7.1.", "props": [ @@ -7721,7 +7738,7 @@ ] }, { - "uuid": "0a988e7c-4ecc-40ff-aeef-cfff0a3580f6", + "uuid": "23d37200-df9c-46b6-9d50-f218e902256b", "control-id": "pcidss_4_12-8.1", "description": "The description for control-id pcidss_4_12-8.1.", "props": [ @@ -7734,7 +7751,7 @@ ] }, { - "uuid": "20768300-5d92-4f5b-8f0f-9f16b59c28cf", + "uuid": "a83e6536-3f65-4273-8bec-6c45e3a65bab", "control-id": "pcidss_4_12-8.2", "description": "The description for control-id pcidss_4_12-8.2.", "props": [ @@ -7747,7 +7764,7 @@ ] }, { - "uuid": "be276f06-cb4e-4237-b0d9-f4828899356b", + "uuid": "167e9e03-0221-4cb1-9a4a-0a784b0ab9ce", "control-id": "pcidss_4_12-8.3", "description": "The description for control-id pcidss_4_12-8.3.", "props": [ @@ -7760,7 +7777,7 @@ ] }, { - "uuid": "fbf50b37-d7dc-4c8a-a4d4-a433d58d547f", + "uuid": "37a3f10e-3de2-493e-9c7c-761c88b062d7", "control-id": "pcidss_4_12-8.4", "description": "The description for control-id pcidss_4_12-8.4.", "props": [ @@ -7773,7 +7790,7 @@ ] }, { - "uuid": "08610dd2-4517-4fd0-8d97-099d0b21888c", + "uuid": "8e52c143-6fb1-49d7-b4c4-cd3cff071018", "control-id": "pcidss_4_12-8.5", "description": "The description for control-id pcidss_4_12-8.5.", "props": [ @@ -7786,7 +7803,7 @@ ] }, { - "uuid": "1939334a-7831-4e0b-87ae-d165a81fe4ca", + "uuid": "8a6955a6-0b1c-41bf-9f55-66ceb9ac82c5", "control-id": "pcidss_4_12-9.1", "description": "The description for control-id pcidss_4_12-9.1.", "props": [ @@ -7799,7 +7816,7 @@ ] }, { - "uuid": "78a49eea-da6e-40fe-a196-48ac9ced0b72", + "uuid": "7cd24204-6694-40c2-9b46-938dfb4cc4d4", "control-id": "pcidss_4_12-9.2", "description": "The description for control-id pcidss_4_12-9.2.", "props": [ @@ -7812,7 +7829,7 @@ ] }, { - "uuid": "3aebf078-dcd5-47c4-ab0f-7208c42efb44", + "uuid": "9bfc3acf-abf4-4ffc-b0e4-a3e469fbd218", "control-id": "pcidss_4_12-10.1", "description": "The description for control-id pcidss_4_12-10.1.", "props": [ @@ -7825,7 +7842,7 @@ ] }, { - "uuid": "0252bcd9-8b40-48a8-8ee3-c1bde5464081", + "uuid": "d14d8ab7-2f59-4206-9f13-76305518e45d", "control-id": "pcidss_4_12-10.2", "description": "The description for control-id pcidss_4_12-10.2.", "props": [ @@ -7838,7 +7855,7 @@ ] }, { - "uuid": "9787e43d-6587-4695-b9dd-d1aefa58e3c4", + "uuid": "b1e7abc7-588f-41f7-9240-5a575fa73265", "control-id": "pcidss_4_12-10.3", "description": "The description for control-id pcidss_4_12-10.3.", "props": [ @@ -7851,7 +7868,7 @@ ] }, { - "uuid": "2af0d890-c26f-45d4-9add-c38a2f3dd5bd", + "uuid": "dbade05d-3712-4d08-9bd6-e1b4e20c7508", "control-id": "pcidss_4_12-10.4.1", "description": "The description for control-id pcidss_4_12-10.4.1.", "props": [ @@ -7864,7 +7881,7 @@ ] }, { - "uuid": "a141457c-48d4-49ce-a160-dba593aa9a4a", + "uuid": "cd5472b2-62f0-4bc5-b186-7003f0a07513", "control-id": "pcidss_4_12-10.5", "description": "The description for control-id pcidss_4_12-10.5.", "props": [ @@ -7877,7 +7894,7 @@ ] }, { - "uuid": "b114f802-7d55-4f00-b15f-e231e6cad5b9", + "uuid": "a6a53c82-893a-4597-b4f4-6092fe462a3e", "control-id": "pcidss_4_12-10.6", "description": "The description for control-id pcidss_4_12-10.6.", "props": [ @@ -7890,7 +7907,7 @@ ] }, { - "uuid": "496d8b0a-6a9f-415e-9bc8-0b3d3c1368b4", + "uuid": "355421f0-1ece-4c9e-833d-83ef304b319c", "control-id": "pcidss_4_12-10.7", "description": "The description for control-id pcidss_4_12-10.7.", "props": [ @@ -7903,7 +7920,7 @@ ] }, { - "uuid": "f20ae31b-76bf-4e97-97c1-882bac77a356", + "uuid": "21eccbe1-f9fd-46d9-a66b-a5faf59a6d3d", "control-id": "a1-1.1", "description": "The description for control-id a1-1.1.", "props": [ @@ -7916,7 +7933,7 @@ ] }, { - "uuid": "ae0f15ea-6047-4615-941e-023330cb1e40", + "uuid": "86c2c9fd-1e1a-4f61-bc8f-2ac2ef138c79", "control-id": "a1-1.2", "description": "The description for control-id a1-1.2.", "props": [ @@ -7929,7 +7946,7 @@ ] }, { - "uuid": "b0127802-c69b-4148-a909-f4ca6c489724", + "uuid": "f01620fc-3639-432d-9970-cbb629f37c54", "control-id": "a1-1.3", "description": "The description for control-id a1-1.3.", "props": [ @@ -7942,7 +7959,7 @@ ] }, { - "uuid": "fb511673-dfd8-48e8-b3eb-2cfa998dec9e", + "uuid": "1549bad1-ab94-488d-bd69-df59cc49d89d", "control-id": "a1-1.4", "description": "The description for control-id a1-1.4.", "props": [ @@ -7955,7 +7972,7 @@ ] }, { - "uuid": "5e5c959c-e24e-43cf-bec2-97ac36269717", + "uuid": "c0edec21-72e6-49ff-8640-1cea6f012e84", "control-id": "a1-2.1", "description": "The description for control-id a1-2.1.", "props": [ @@ -7968,7 +7985,7 @@ ] }, { - "uuid": "d3861817-4f5f-4695-814d-6ba736ee0efa", + "uuid": "e5eb7411-5836-4551-843f-354b6072ce2e", "control-id": "a1-2.2", "description": "The description for control-id a1-2.2.", "props": [ @@ -7981,7 +7998,7 @@ ] }, { - "uuid": "bf6dec46-51a5-4cd4-a1e6-7e91cf60c53c", + "uuid": "fcfd2d38-b8d0-4db6-a675-149bb134a345", "control-id": "a1-2.3", "description": "The description for control-id a1-2.3.", "props": [ @@ -7994,7 +8011,7 @@ ] }, { - "uuid": "96a51c43-2867-4c66-95e3-e799a92a717c", + "uuid": "01f86832-fcef-4c03-aa56-949cb6d4407d", "control-id": "a2-1.1", "description": "The description for control-id a2-1.1.", "props": [ @@ -8007,7 +8024,7 @@ ] }, { - "uuid": "6eb38944-0d69-4c06-9910-79d17207de64", + "uuid": "0139d631-4f60-48ca-9376-a1c6a39880ca", "control-id": "a2-1.2", "description": "The description for control-id a2-1.2.", "props": [ @@ -8020,7 +8037,7 @@ ] }, { - "uuid": "6bb3599b-4035-4689-888e-d8b1bb86ef85", + "uuid": "eb5ba465-3765-487e-935e-adaf5f7a8c28", "control-id": "a2-1.3", "description": "The description for control-id a2-1.3.", "props": [ @@ -8033,7 +8050,7 @@ ] }, { - "uuid": "80d647de-92f3-4849-8b23-11ca68595b01", + "uuid": "5a898a1c-7e92-4e7e-b7e6-702666cc98d1", "control-id": "a3-1.1", "description": "The description for control-id a3-1.1.", "props": [ @@ -8046,7 +8063,7 @@ ] }, { - "uuid": "09eda38c-abe3-4263-b486-46365f7deec9", + "uuid": "7d3ee99f-fc92-4752-a011-1a341485cc24", "control-id": "a3-1.2", "description": "The description for control-id a3-1.2.", "props": [ @@ -8059,7 +8076,7 @@ ] }, { - "uuid": "7e33f134-1197-4d90-81a8-d6295fd9ddb6", + "uuid": "5c140ff1-76e4-430b-8df5-1314d04d0b43", "control-id": "a3-1.3", "description": "The description for control-id a3-1.3.", "props": [ @@ -8072,7 +8089,7 @@ ] }, { - "uuid": "706b6310-6f85-469b-8cb4-a34e1db6b923", + "uuid": "745c1660-a31d-4d99-b9cb-fe863cb27982", "control-id": "a3-1.4", "description": "The description for control-id a3-1.4.", "props": [ @@ -8085,7 +8102,7 @@ ] }, { - "uuid": "224f1e4d-fcc2-4754-9086-052eaf4f75d5", + "uuid": "32d18cfd-e3a0-4113-aabc-48126cc68922", "control-id": "a3-2.1", "description": "The description for control-id a3-2.1.", "props": [ @@ -8098,7 +8115,7 @@ ] }, { - "uuid": "faf1c8c4-97d9-460f-b451-c801c9202e09", + "uuid": "895dc630-6159-4485-be7a-39709f6f417d", "control-id": "a3-2.2.1", "description": "The description for control-id a3-2.2.1.", "props": [ @@ -8111,7 +8128,7 @@ ] }, { - "uuid": "cca1ae42-2bc9-4a36-9f20-a4e043f65f28", + "uuid": "ff0bf3be-6887-4422-b574-6a8d27dbe2e8", "control-id": "a3-2.3", "description": "The description for control-id a3-2.3.", "props": [ @@ -8124,7 +8141,7 @@ ] }, { - "uuid": "0c4ab029-9120-494f-91d4-2689d5cc956d", + "uuid": "e12428fa-ea1b-412e-af61-6a3f68bb9762", "control-id": "a3-2.4", "description": "The description for control-id a3-2.4.", "props": [ @@ -8137,7 +8154,7 @@ ] }, { - "uuid": "8fb04c52-39f6-46e4-80f5-810513e476ba", + "uuid": "e11f6b8a-6faf-4ac8-b68f-6799a0f62804", "control-id": "a3-2.5.1", "description": "The description for control-id a3-2.5.1.", "props": [ @@ -8150,7 +8167,7 @@ ] }, { - "uuid": "cf448df0-2f84-4573-9a7c-1110d3f9ae42", + "uuid": "3caab8c1-11c6-4bd6-9225-21c36a179d93", "control-id": "a3-2.5.2", "description": "The description for control-id a3-2.5.2.", "props": [ @@ -8163,7 +8180,7 @@ ] }, { - "uuid": "c815350f-1d7b-4166-988f-d5e98b4c7aac", + "uuid": "28afedb0-5762-4fa6-bfc9-cb3cf0712f1f", "control-id": "a3-2.6.1", "description": "The description for control-id a3-2.6.1.", "props": [ @@ -8176,7 +8193,7 @@ ] }, { - "uuid": "bae0fc55-cdf9-47aa-b781-cafbdf996435", + "uuid": "beca8bff-2c1f-49d3-a8c8-021945d41db4", "control-id": "a3-3.1.2", "description": "The description for control-id a3-3.1.2.", "props": [ @@ -8189,7 +8206,7 @@ ] }, { - "uuid": "94c465db-d992-4ba6-b738-90cf0f4f4ced", + "uuid": "3e8ee70f-4072-48ce-9381-3182c6c0d7c5", "control-id": "a3-3.2", "description": "The description for control-id a3-3.2.", "props": [ @@ -8202,7 +8219,7 @@ ] }, { - "uuid": "eb9a8943-9ae3-4ccd-8d0f-62bda0f80268", + "uuid": "19514a5b-f802-4016-bc2c-d025f8d9105a", "control-id": "a3-3.3", "description": "The description for control-id a3-3.3.", "props": [ @@ -8215,7 +8232,7 @@ ] }, { - "uuid": "27a8062c-dc90-47c7-b25e-b6e07969deef", + "uuid": "04268248-1a17-41b7-988d-366c883ed98d", "control-id": "a3-4.1", "description": "The description for control-id a3-4.1.", "props": [ @@ -8228,7 +8245,7 @@ ] }, { - "uuid": "668a1217-5390-4f6b-9f98-fda453b4e9e3", + "uuid": "033fa171-e4db-46b2-b652-ff3bd73b8afc", "control-id": "a3-5.1", "description": "The description for control-id a3-5.1.", "props": [ @@ -8559,7 +8576,7 @@ { "name": "Parameter_Value_Alternatives_15", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -8577,7 +8594,7 @@ { "name": "Parameter_Value_Alternatives_16", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -12027,2815 +12044,2839 @@ { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_globally_activated", + "value": "package_sequoia-sq_installed", "remarks": "rule_set_134" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled In Main dnf Configuration", + "value": "Install sequoia-sq Package", "remarks": "rule_set_134" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_globally_activated", + "value": "package_sequoia-sq_installed", "remarks": "rule_set_134" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled In Main dnf Configuration", + "value": "Install sequoia-sq Package", "remarks": "rule_set_134" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_never_disabled", + "value": "ensure_gpgcheck_globally_activated", "remarks": "rule_set_135" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled for All dnf Package Repositories", + "value": "Ensure gpgcheck Enabled In Main dnf Configuration", "remarks": "rule_set_135" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "ensure_gpgcheck_never_disabled", + "value": "ensure_gpgcheck_globally_activated", "remarks": "rule_set_135" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure gpgcheck Enabled for All dnf Package Repositories", + "value": "Ensure gpgcheck Enabled In Main dnf Configuration", "remarks": "rule_set_135" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "account_unique_id", + "value": "ensure_gpgcheck_never_disabled", "remarks": "rule_set_136" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All Accounts on the System Have Unique User IDs", + "value": "Ensure gpgcheck Enabled for All dnf Package Repositories", "remarks": "rule_set_136" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "account_unique_id", + "value": "ensure_gpgcheck_never_disabled", "remarks": "rule_set_136" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All Accounts on the System Have Unique User IDs", + "value": "Ensure gpgcheck Enabled for All dnf Package Repositories", "remarks": "rule_set_136" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "account_unique_name", + "value": "account_unique_id", "remarks": "rule_set_137" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All Accounts on the System Have Unique Names", + "value": "Ensure All Accounts on the System Have Unique User IDs", "remarks": "rule_set_137" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "account_unique_name", + "value": "account_unique_id", "remarks": "rule_set_137" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All Accounts on the System Have Unique Names", + "value": "Ensure All Accounts on the System Have Unique User IDs", "remarks": "rule_set_137" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_no_uid_except_zero", + "value": "account_unique_name", "remarks": "rule_set_138" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Only Root Has UID 0", + "value": "Ensure All Accounts on the System Have Unique Names", "remarks": "rule_set_138" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_no_uid_except_zero", + "value": "account_unique_name", "remarks": "rule_set_138" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Only Root Has UID 0", + "value": "Ensure All Accounts on the System Have Unique Names", "remarks": "rule_set_138" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_root_gid_zero", + "value": "accounts_no_uid_except_zero", "remarks": "rule_set_139" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Root Has A Primary GID 0", + "value": "Verify Only Root Has UID 0", "remarks": "rule_set_139" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_root_gid_zero", + "value": "accounts_no_uid_except_zero", "remarks": "rule_set_139" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify Root Has A Primary GID 0", + "value": "Verify Only Root Has UID 0", "remarks": "rule_set_139" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "group_unique_id", + "value": "accounts_root_gid_zero", "remarks": "rule_set_140" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All Groups on the System Have Unique Group ID", + "value": "Verify Root Has A Primary GID 0", "remarks": "rule_set_140" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "group_unique_id", + "value": "accounts_root_gid_zero", "remarks": "rule_set_140" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All Groups on the System Have Unique Group ID", + "value": "Verify Root Has A Primary GID 0", "remarks": "rule_set_140" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "group_unique_name", + "value": "group_unique_id", "remarks": "rule_set_141" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All Groups on the System Have Unique Group Names", + "value": "Ensure All Groups on the System Have Unique Group ID", "remarks": "rule_set_141" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "group_unique_name", + "value": "group_unique_id", "remarks": "rule_set_141" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure All Groups on the System Have Unique Group Names", + "value": "Ensure All Groups on the System Have Unique Group ID", "remarks": "rule_set_141" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "gid_passwd_group_same", + "value": "group_unique_name", "remarks": "rule_set_142" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", + "value": "Ensure All Groups on the System Have Unique Group Names", "remarks": "rule_set_142" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "gid_passwd_group_same", + "value": "group_unique_name", "remarks": "rule_set_142" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", + "value": "Ensure All Groups on the System Have Unique Group Names", "remarks": "rule_set_142" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_password_auth_for_systemaccounts", + "value": "gid_passwd_group_same", "remarks": "rule_set_143" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that System Accounts Are Locked", + "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", "remarks": "rule_set_143" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_password_auth_for_systemaccounts", + "value": "gid_passwd_group_same", "remarks": "rule_set_143" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that System Accounts Are Locked", + "value": "All GIDs referenced in /etc/passwd must be defined in /etc/group", "remarks": "rule_set_143" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_shelllogin_for_systemaccounts", + "value": "no_password_auth_for_systemaccounts", "remarks": "rule_set_144" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", + "value": "Ensure that System Accounts Are Locked", "remarks": "rule_set_144" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_shelllogin_for_systemaccounts", + "value": "no_password_auth_for_systemaccounts", "remarks": "rule_set_144" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", + "value": "Ensure that System Accounts Are Locked", "remarks": "rule_set_144" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "account_disable_post_pw_expiration", + "value": "no_shelllogin_for_systemaccounts", "remarks": "rule_set_145" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Account Expiration Following Inactivity", + "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", "remarks": "rule_set_145" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "account_disable_post_pw_expiration", + "value": "no_shelllogin_for_systemaccounts", "remarks": "rule_set_145" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Account Expiration Following Inactivity", + "value": "Ensure that System Accounts Do Not Run a Shell Upon Login", "remarks": "rule_set_145" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_set_post_pw_existing", + "value": "account_disable_post_pw_expiration", "remarks": "rule_set_146" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set existing passwords a period of inactivity before they been locked", + "value": "Set Account Expiration Following Inactivity", "remarks": "rule_set_146" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_set_post_pw_existing", + "value": "account_disable_post_pw_expiration", "remarks": "rule_set_146" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set existing passwords a period of inactivity before they been locked", + "value": "Set Account Expiration Following Inactivity", "remarks": "rule_set_146" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_db_up_to_date", + "value": "accounts_set_post_pw_existing", "remarks": "rule_set_147" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Make sure that the dconf databases are up-to-date with regards to respective keyfiles", + "value": "Set existing passwords a period of inactivity before they been locked", "remarks": "rule_set_147" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_db_up_to_date", + "value": "accounts_set_post_pw_existing", "remarks": "rule_set_147" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Make sure that the dconf databases are up-to-date with regards to respective keyfiles", + "value": "Set existing passwords a period of inactivity before they been locked", "remarks": "rule_set_147" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_session_idle_user_locks", + "value": "dconf_db_up_to_date", "remarks": "rule_set_148" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Users Cannot Change GNOME3 Session Idle Settings", + "value": "Make sure that the dconf databases are up-to-date with regards to respective keyfiles", "remarks": "rule_set_148" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_session_idle_user_locks", + "value": "dconf_db_up_to_date", "remarks": "rule_set_148" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure Users Cannot Change GNOME3 Session Idle Settings", + "value": "Make sure that the dconf databases are up-to-date with regards to respective keyfiles", "remarks": "rule_set_148" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_idle_activation_enabled", + "value": "dconf_gnome_session_idle_user_locks", "remarks": "rule_set_149" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable GNOME3 Screensaver Idle Activation", + "value": "Ensure Users Cannot Change GNOME3 Session Idle Settings", "remarks": "rule_set_149" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_idle_activation_enabled", + "value": "dconf_gnome_session_idle_user_locks", "remarks": "rule_set_149" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable GNOME3 Screensaver Idle Activation", + "value": "Ensure Users Cannot Change GNOME3 Session Idle Settings", "remarks": "rule_set_149" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_idle_delay", + "value": "dconf_gnome_screensaver_idle_activation_enabled", "remarks": "rule_set_150" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set GNOME3 Screensaver Inactivity Timeout", + "value": "Enable GNOME3 Screensaver Idle Activation", "remarks": "rule_set_150" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_idle_delay", + "value": "dconf_gnome_screensaver_idle_activation_enabled", "remarks": "rule_set_150" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set GNOME3 Screensaver Inactivity Timeout", + "value": "Enable GNOME3 Screensaver Idle Activation", "remarks": "rule_set_150" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_lock_delay", + "value": "dconf_gnome_screensaver_idle_delay", "remarks": "rule_set_151" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set GNOME3 Screensaver Lock Delay After Activation Period", + "value": "Set GNOME3 Screensaver Inactivity Timeout", "remarks": "rule_set_151" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_lock_delay", + "value": "dconf_gnome_screensaver_idle_delay", "remarks": "rule_set_151" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set GNOME3 Screensaver Lock Delay After Activation Period", + "value": "Set GNOME3 Screensaver Inactivity Timeout", "remarks": "rule_set_151" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_lock_enabled", + "value": "dconf_gnome_screensaver_lock_delay", "remarks": "rule_set_152" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable GNOME3 Screensaver Lock After Idle Period", + "value": "Set GNOME3 Screensaver Lock Delay After Activation Period", "remarks": "rule_set_152" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_lock_enabled", + "value": "dconf_gnome_screensaver_lock_delay", "remarks": "rule_set_152" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Enable GNOME3 Screensaver Lock After Idle Period", + "value": "Set GNOME3 Screensaver Lock Delay After Activation Period", "remarks": "rule_set_152" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_mode_blank", + "value": "dconf_gnome_screensaver_lock_enabled", "remarks": "rule_set_153" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Implement Blank Screensaver", + "value": "Enable GNOME3 Screensaver Lock After Idle Period", "remarks": "rule_set_153" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "dconf_gnome_screensaver_mode_blank", + "value": "dconf_gnome_screensaver_lock_enabled", "remarks": "rule_set_153" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Implement Blank Screensaver", + "value": "Enable GNOME3 Screensaver Lock After Idle Period", "remarks": "rule_set_153" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_set_idle_timeout", + "value": "dconf_gnome_screensaver_mode_blank", "remarks": "rule_set_154" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set SSH Client Alive Interval", + "value": "Implement Blank Screensaver", "remarks": "rule_set_154" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_set_idle_timeout", + "value": "dconf_gnome_screensaver_mode_blank", "remarks": "rule_set_154" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set SSH Client Alive Interval", + "value": "Implement Blank Screensaver", "remarks": "rule_set_154" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_set_keepalive", + "value": "sshd_set_idle_timeout", "remarks": "rule_set_155" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set SSH Client Alive Count Max", + "value": "Set SSH Client Alive Interval", "remarks": "rule_set_155" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "sshd_set_keepalive", + "value": "sshd_set_idle_timeout", "remarks": "rule_set_155" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set SSH Client Alive Count Max", + "value": "Set SSH Client Alive Interval", "remarks": "rule_set_155" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "disable_host_auth", + "value": "sshd_set_keepalive", "remarks": "rule_set_156" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Host-Based Authentication", + "value": "Set SSH Client Alive Count Max", "remarks": "rule_set_156" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "disable_host_auth", + "value": "sshd_set_keepalive", "remarks": "rule_set_156" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable Host-Based Authentication", + "value": "Set SSH Client Alive Count Max", "remarks": "rule_set_156" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "gnome_gdm_disable_automatic_login", + "value": "disable_host_auth", "remarks": "rule_set_157" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable GDM Automatic Login", + "value": "Disable Host-Based Authentication", "remarks": "rule_set_157" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "gnome_gdm_disable_automatic_login", + "value": "disable_host_auth", "remarks": "rule_set_157" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable GDM Automatic Login", + "value": "Disable Host-Based Authentication", "remarks": "rule_set_157" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "gnome_gdm_disable_guest_login", + "value": "gnome_gdm_disable_automatic_login", "remarks": "rule_set_158" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable GDM Guest Login", + "value": "Disable GDM Automatic Login", "remarks": "rule_set_158" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "gnome_gdm_disable_guest_login", + "value": "gnome_gdm_disable_automatic_login", "remarks": "rule_set_158" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Disable GDM Guest Login", + "value": "Disable GDM Automatic Login", "remarks": "rule_set_158" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_empty_passwords", + "value": "gnome_gdm_disable_guest_login", "remarks": "rule_set_159" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Prevent Login to Accounts With Empty Password", + "value": "Disable GDM Guest Login", "remarks": "rule_set_159" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_empty_passwords", + "value": "gnome_gdm_disable_guest_login", "remarks": "rule_set_159" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Prevent Login to Accounts With Empty Password", + "value": "Disable GDM Guest Login", "remarks": "rule_set_159" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_all_shadowed", + "value": "no_empty_passwords", "remarks": "rule_set_160" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify All Account Password Hashes are Shadowed", + "value": "Prevent Login to Accounts With Empty Password", "remarks": "rule_set_160" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_all_shadowed", + "value": "no_empty_passwords", "remarks": "rule_set_160" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Verify All Account Password Hashes are Shadowed", + "value": "Prevent Login to Accounts With Empty Password", "remarks": "rule_set_160" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_libuserconf", + "value": "accounts_password_all_shadowed", "remarks": "rule_set_161" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Hashing Algorithm in /etc/libuser.conf", + "value": "Verify All Account Password Hashes are Shadowed", "remarks": "rule_set_161" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_libuserconf", + "value": "accounts_password_all_shadowed", "remarks": "rule_set_161" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Hashing Algorithm in /etc/libuser.conf", + "value": "Verify All Account Password Hashes are Shadowed", "remarks": "rule_set_161" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_logindefs", + "value": "set_password_hashing_algorithm_libuserconf", "remarks": "rule_set_162" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Hashing Algorithm in /etc/login.defs", + "value": "Set Password Hashing Algorithm in /etc/libuser.conf", "remarks": "rule_set_162" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_logindefs", + "value": "set_password_hashing_algorithm_libuserconf", "remarks": "rule_set_162" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Hashing Algorithm in /etc/login.defs", + "value": "Set Password Hashing Algorithm in /etc/libuser.conf", "remarks": "rule_set_162" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_systemauth", + "value": "set_password_hashing_algorithm_logindefs", "remarks": "rule_set_163" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set PAM Password Hashing Algorithm - system-auth", + "value": "Set Password Hashing Algorithm in /etc/login.defs", "remarks": "rule_set_163" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "set_password_hashing_algorithm_systemauth", + "value": "set_password_hashing_algorithm_logindefs", "remarks": "rule_set_163" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set PAM Password Hashing Algorithm - system-auth", + "value": "Set Password Hashing Algorithm in /etc/login.defs", "remarks": "rule_set_163" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_passwords_pam_faillock_deny", + "value": "set_password_hashing_algorithm_systemauth", "remarks": "rule_set_164" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Lock Accounts After Failed Password Attempts", + "value": "Set PAM Password Hashing Algorithm - system-auth", "remarks": "rule_set_164" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_passwords_pam_faillock_deny", + "value": "set_password_hashing_algorithm_systemauth", "remarks": "rule_set_164" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Lock Accounts After Failed Password Attempts", + "value": "Set PAM Password Hashing Algorithm - system-auth", "remarks": "rule_set_164" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_passwords_pam_faillock_unlock_time", + "value": "accounts_passwords_pam_faillock_deny", "remarks": "rule_set_165" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Lockout Time for Failed Password Attempts", + "value": "Lock Accounts After Failed Password Attempts", "remarks": "rule_set_165" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_passwords_pam_faillock_unlock_time", + "value": "accounts_passwords_pam_faillock_deny", "remarks": "rule_set_165" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Lockout Time for Failed Password Attempts", + "value": "Lock Accounts After Failed Password Attempts", "remarks": "rule_set_165" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_last_change_is_in_past", + "value": "accounts_passwords_pam_faillock_unlock_time", "remarks": "rule_set_166" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure all users last password change date is in the past", + "value": "Set Lockout Time for Failed Password Attempts", "remarks": "rule_set_166" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_last_change_is_in_past", + "value": "accounts_passwords_pam_faillock_unlock_time", "remarks": "rule_set_166" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure all users last password change date is in the past", + "value": "Set Lockout Time for Failed Password Attempts", "remarks": "rule_set_166" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_dcredit", + "value": "accounts_password_last_change_is_in_past", "remarks": "rule_set_167" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure PAM Enforces Password Requirements - Minimum Digit Characters", + "value": "Ensure all users last password change date is in the past", "remarks": "rule_set_167" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_dcredit", + "value": "accounts_password_last_change_is_in_past", "remarks": "rule_set_167" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure PAM Enforces Password Requirements - Minimum Digit Characters", + "value": "Ensure all users last password change date is in the past", "remarks": "rule_set_167" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_lcredit", + "value": "accounts_password_pam_dcredit", "remarks": "rule_set_168" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure PAM Enforces Password Requirements - Minimum Lowercase Characters", + "value": "Ensure PAM Enforces Password Requirements - Minimum Digit Characters", "remarks": "rule_set_168" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_lcredit", + "value": "accounts_password_pam_dcredit", "remarks": "rule_set_168" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure PAM Enforces Password Requirements - Minimum Lowercase Characters", + "value": "Ensure PAM Enforces Password Requirements - Minimum Digit Characters", "remarks": "rule_set_168" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_minlen", + "value": "accounts_password_pam_lcredit", "remarks": "rule_set_169" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure PAM Enforces Password Requirements - Minimum Length", + "value": "Ensure PAM Enforces Password Requirements - Minimum Lowercase Characters", "remarks": "rule_set_169" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_minlen", + "value": "accounts_password_pam_lcredit", "remarks": "rule_set_169" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Ensure PAM Enforces Password Requirements - Minimum Length", + "value": "Ensure PAM Enforces Password Requirements - Minimum Lowercase Characters", "remarks": "rule_set_169" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_unix_remember", + "value": "accounts_password_pam_minlen", "remarks": "rule_set_170" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Limit Password Reuse", + "value": "Ensure PAM Enforces Password Requirements - Minimum Length", "remarks": "rule_set_170" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_unix_remember", + "value": "accounts_password_pam_minlen", "remarks": "rule_set_170" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Limit Password Reuse", + "value": "Ensure PAM Enforces Password Requirements - Minimum Length", "remarks": "rule_set_170" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_pwhistory_remember_password_auth", + "value": "accounts_password_pam_unix_remember", "remarks": "rule_set_171" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Limit Password Reuse: password-auth", + "value": "Limit Password Reuse", "remarks": "rule_set_171" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_pwhistory_remember_password_auth", + "value": "accounts_password_pam_unix_remember", "remarks": "rule_set_171" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Limit Password Reuse: password-auth", + "value": "Limit Password Reuse", "remarks": "rule_set_171" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_pwhistory_remember_system_auth", + "value": "accounts_password_pam_pwhistory_remember_password_auth", "remarks": "rule_set_172" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Limit Password Reuse: system-auth", + "value": "Limit Password Reuse: password-auth", "remarks": "rule_set_172" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_pam_pwhistory_remember_system_auth", + "value": "accounts_password_pam_pwhistory_remember_password_auth", "remarks": "rule_set_172" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Limit Password Reuse: system-auth", + "value": "Limit Password Reuse: password-auth", "remarks": "rule_set_172" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_maximum_age_login_defs", + "value": "accounts_password_pam_pwhistory_remember_system_auth", "remarks": "rule_set_173" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Maximum Age", + "value": "Limit Password Reuse: system-auth", "remarks": "rule_set_173" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_maximum_age_login_defs", + "value": "accounts_password_pam_pwhistory_remember_system_auth", "remarks": "rule_set_173" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Maximum Age", + "value": "Limit Password Reuse: system-auth", "remarks": "rule_set_173" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_set_max_life_existing", + "value": "accounts_maximum_age_login_defs", "remarks": "rule_set_174" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Existing Passwords Maximum Age", + "value": "Set Password Maximum Age", "remarks": "rule_set_174" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_set_max_life_existing", + "value": "accounts_maximum_age_login_defs", "remarks": "rule_set_174" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Existing Passwords Maximum Age", + "value": "Set Password Maximum Age", "remarks": "rule_set_174" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_warn_age_login_defs", + "value": "accounts_password_set_max_life_existing", "remarks": "rule_set_175" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Warning Age", + "value": "Set Existing Passwords Maximum Age", "remarks": "rule_set_175" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_warn_age_login_defs", + "value": "accounts_password_set_max_life_existing", "remarks": "rule_set_175" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Password Warning Age", + "value": "Set Existing Passwords Maximum Age", "remarks": "rule_set_175" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_set_warn_age_existing", + "value": "accounts_password_warn_age_login_defs", "remarks": "rule_set_176" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Existing Passwords Warning Age", + "value": "Set Password Warning Age", "remarks": "rule_set_176" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_password_set_warn_age_existing", + "value": "accounts_password_warn_age_login_defs", "remarks": "rule_set_176" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Existing Passwords Warning Age", + "value": "Set Password Warning Age", "remarks": "rule_set_176" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_tmout", + "value": "accounts_password_set_warn_age_existing", "remarks": "rule_set_177" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Interactive Session Timeout", + "value": "Set Existing Passwords Warning Age", "remarks": "rule_set_177" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "accounts_tmout", + "value": "accounts_password_set_warn_age_existing", "remarks": "rule_set_177" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Set Interactive Session Timeout", + "value": "Set Existing Passwords Warning Age", "remarks": "rule_set_177" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_direct_root_logins", + "value": "accounts_tmout", "remarks": "rule_set_178" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Direct root Logins Not Allowed", + "value": "Set Interactive Session Timeout", "remarks": "rule_set_178" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "no_direct_root_logins", + "value": "accounts_tmout", "remarks": "rule_set_178" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Direct root Logins Not Allowed", + "value": "Set Interactive Session Timeout", "remarks": "rule_set_178" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "securetty_root_login_console_only", + "value": "no_direct_root_logins", "remarks": "rule_set_179" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict Virtual Console Root Logins", + "value": "Direct root Logins Not Allowed", "remarks": "rule_set_179" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "securetty_root_login_console_only", + "value": "no_direct_root_logins", "remarks": "rule_set_179" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Restrict Virtual Console Root Logins", + "value": "Direct root Logins Not Allowed", "remarks": "rule_set_179" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_suid_privilege_function", + "value": "securetty_root_login_console_only", "remarks": "rule_set_180" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events When Privileged Executables Are Run", + "value": "Restrict Virtual Console Root Logins", "remarks": "rule_set_180" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_suid_privilege_function", + "value": "securetty_root_login_console_only", "remarks": "rule_set_180" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Events When Privileged Executables Are Run", + "value": "Restrict Virtual Console Root Logins", "remarks": "rule_set_180" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_login_events_faillock", + "value": "audit_rules_suid_privilege_function", "remarks": "rule_set_181" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Logon and Logout Events - faillock", + "value": "Record Events When Privileged Executables Are Run", "remarks": "rule_set_181" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_login_events_faillock", + "value": "audit_rules_suid_privilege_function", "remarks": "rule_set_181" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Logon and Logout Events - faillock", + "value": "Record Events When Privileged Executables Are Run", "remarks": "rule_set_181" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_login_events_lastlog", + "value": "audit_rules_login_events_faillock", "remarks": "rule_set_182" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Logon and Logout Events - lastlog", + "value": "Record Attempts to Alter Logon and Logout Events - faillock", "remarks": "rule_set_182" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_login_events_lastlog", + "value": "audit_rules_login_events_faillock", "remarks": "rule_set_182" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Logon and Logout Events - lastlog", + "value": "Record Attempts to Alter Logon and Logout Events - faillock", "remarks": "rule_set_182" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_login_events_tallylog", + "value": "audit_rules_login_events_lastlog", "remarks": "rule_set_183" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Logon and Logout Events - tallylog", + "value": "Record Attempts to Alter Logon and Logout Events - lastlog", "remarks": "rule_set_183" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_login_events_tallylog", + "value": "audit_rules_login_events_lastlog", "remarks": "rule_set_183" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Logon and Logout Events - tallylog", + "value": "Record Attempts to Alter Logon and Logout Events - lastlog", "remarks": "rule_set_183" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_session_events_utmp", + "value": "audit_rules_login_events_tallylog", "remarks": "rule_set_184" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Process and Session Initiation Information utmp", + "value": "Record Attempts to Alter Logon and Logout Events - tallylog", "remarks": "rule_set_184" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_session_events_utmp", + "value": "audit_rules_login_events_tallylog", "remarks": "rule_set_184" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Process and Session Initiation Information utmp", + "value": "Record Attempts to Alter Logon and Logout Events - tallylog", "remarks": "rule_set_184" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_session_events_btmp", + "value": "audit_rules_session_events_utmp", "remarks": "rule_set_185" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Process and Session Initiation Information btmp", + "value": "Record Attempts to Alter Process and Session Initiation Information utmp", "remarks": "rule_set_185" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_session_events_btmp", + "value": "audit_rules_session_events_utmp", "remarks": "rule_set_185" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Process and Session Initiation Information btmp", + "value": "Record Attempts to Alter Process and Session Initiation Information utmp", "remarks": "rule_set_185" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_session_events_wtmp", + "value": "audit_rules_session_events_btmp", "remarks": "rule_set_186" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", + "value": "Record Attempts to Alter Process and Session Initiation Information btmp", "remarks": "rule_set_186" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "audit_rules_session_events_wtmp", + "value": "audit_rules_session_events_btmp", "remarks": "rule_set_186" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", + "value": "Record Attempts to Alter Process and Session Initiation Information btmp", "remarks": "rule_set_186" }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "audit_rules_session_events_wtmp", + "remarks": "rule_set_187" + }, + { + "name": "Rule_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", + "remarks": "rule_set_187" + }, + { + "name": "Check_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "audit_rules_session_events_wtmp", + "remarks": "rule_set_187" + }, + { + "name": "Check_Description", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "Record Attempts to Alter Process and Session Initiation Information wtmp", + "remarks": "rule_set_187" + }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_sudo_log_events", - "remarks": "rule_set_187" + "remarks": "rule_set_188" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to perform maintenance activities", - "remarks": "rule_set_187" + "remarks": "rule_set_188" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_sudo_log_events", - "remarks": "rule_set_187" + "remarks": "rule_set_188" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to perform maintenance activities", - "remarks": "rule_set_187" + "remarks": "rule_set_188" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "display_login_attempts", - "remarks": "rule_set_188" + "remarks": "rule_set_189" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Displays Last Logon/Access Notification", - "remarks": "rule_set_188" + "remarks": "rule_set_189" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "display_login_attempts", - "remarks": "rule_set_188" + "remarks": "rule_set_189" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure PAM Displays Last Logon/Access Notification", - "remarks": "rule_set_188" + "remarks": "rule_set_189" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_group", - "remarks": "rule_set_189" + "remarks": "rule_set_190" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/group", - "remarks": "rule_set_189" + "remarks": "rule_set_190" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_group", - "remarks": "rule_set_189" + "remarks": "rule_set_190" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/group", - "remarks": "rule_set_189" + "remarks": "rule_set_190" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_gshadow", - "remarks": "rule_set_190" + "remarks": "rule_set_191" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/gshadow", - "remarks": "rule_set_190" + "remarks": "rule_set_191" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_gshadow", - "remarks": "rule_set_190" + "remarks": "rule_set_191" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/gshadow", - "remarks": "rule_set_190" + "remarks": "rule_set_191" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_opasswd", - "remarks": "rule_set_191" + "remarks": "rule_set_192" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", - "remarks": "rule_set_191" + "remarks": "rule_set_192" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_opasswd", - "remarks": "rule_set_191" + "remarks": "rule_set_192" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/security/opasswd", - "remarks": "rule_set_191" + "remarks": "rule_set_192" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_passwd", - "remarks": "rule_set_192" + "remarks": "rule_set_193" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/passwd", - "remarks": "rule_set_192" + "remarks": "rule_set_193" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_passwd", - "remarks": "rule_set_192" + "remarks": "rule_set_193" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/passwd", - "remarks": "rule_set_192" + "remarks": "rule_set_193" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_shadow", - "remarks": "rule_set_193" + "remarks": "rule_set_194" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/shadow", - "remarks": "rule_set_193" + "remarks": "rule_set_194" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_usergroup_modification_shadow", - "remarks": "rule_set_193" + "remarks": "rule_set_194" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify User/Group Information - /etc/shadow", - "remarks": "rule_set_193" + "remarks": "rule_set_194" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_sysadmin_actions", - "remarks": "rule_set_194" + "remarks": "rule_set_195" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects System Administrator Actions", - "remarks": "rule_set_194" + "remarks": "rule_set_195" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_sysadmin_actions", - "remarks": "rule_set_194" + "remarks": "rule_set_195" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects System Administrator Actions", - "remarks": "rule_set_194" + "remarks": "rule_set_195" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rename", - "remarks": "rule_set_195" + "remarks": "rule_set_196" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rename", - "remarks": "rule_set_195" + "remarks": "rule_set_196" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rename", - "remarks": "rule_set_195" + "remarks": "rule_set_196" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rename", - "remarks": "rule_set_195" + "remarks": "rule_set_196" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat", - "remarks": "rule_set_196" + "remarks": "rule_set_197" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat", - "remarks": "rule_set_196" + "remarks": "rule_set_197" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat", - "remarks": "rule_set_196" + "remarks": "rule_set_197" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat", - "remarks": "rule_set_196" + "remarks": "rule_set_197" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat2", - "remarks": "rule_set_197" + "remarks": "rule_set_198" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat2", - "remarks": "rule_set_197" + "remarks": "rule_set_198" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_renameat2", - "remarks": "rule_set_197" + "remarks": "rule_set_198" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - renameat2", - "remarks": "rule_set_197" + "remarks": "rule_set_198" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rmdir", - "remarks": "rule_set_198" + "remarks": "rule_set_199" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rmdir", - "remarks": "rule_set_198" + "remarks": "rule_set_199" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_rmdir", - "remarks": "rule_set_198" + "remarks": "rule_set_199" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - rmdir", - "remarks": "rule_set_198" + "remarks": "rule_set_199" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlink", - "remarks": "rule_set_199" + "remarks": "rule_set_200" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlink", - "remarks": "rule_set_199" + "remarks": "rule_set_200" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlink", - "remarks": "rule_set_199" + "remarks": "rule_set_200" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlink", - "remarks": "rule_set_199" + "remarks": "rule_set_200" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlinkat", - "remarks": "rule_set_200" + "remarks": "rule_set_201" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlinkat", - "remarks": "rule_set_200" + "remarks": "rule_set_201" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_file_deletion_events_unlinkat", - "remarks": "rule_set_200" + "remarks": "rule_set_201" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects File Deletion Events by User - unlinkat", - "remarks": "rule_set_200" + "remarks": "rule_set_201" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_media_export", - "remarks": "rule_set_201" + "remarks": "rule_set_202" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Exporting to Media (successful)", - "remarks": "rule_set_201" + "remarks": "rule_set_202" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_media_export", - "remarks": "rule_set_201" + "remarks": "rule_set_202" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure auditd Collects Information on Exporting to Media (successful)", - "remarks": "rule_set_201" + "remarks": "rule_set_202" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit_installed", - "remarks": "rule_set_202" + "remarks": "rule_set_203" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit Subsystem is Installed", - "remarks": "rule_set_202" + "remarks": "rule_set_203" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audit_installed", - "remarks": "rule_set_202" + "remarks": "rule_set_203" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure the audit Subsystem is Installed", - "remarks": "rule_set_202" + "remarks": "rule_set_203" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_auditd_enabled", - "remarks": "rule_set_203" + "remarks": "rule_set_204" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable auditd Service", - "remarks": "rule_set_203" + "remarks": "rule_set_204" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "service_auditd_enabled", - "remarks": "rule_set_203" + "remarks": "rule_set_204" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable auditd Service", - "remarks": "rule_set_203" + "remarks": "rule_set_204" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_name_format", - "remarks": "rule_set_204" + "remarks": "rule_set_205" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set type of computer node name logging in audit logs", - "remarks": "rule_set_204" + "remarks": "rule_set_205" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_name_format", - "remarks": "rule_set_204" + "remarks": "rule_set_205" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Set type of computer node name logging in audit logs", - "remarks": "rule_set_204" + "remarks": "rule_set_205" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_access_var_log_audit", - "remarks": "rule_set_205" + "remarks": "rule_set_206" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Access Events to Audit Log Directory", - "remarks": "rule_set_205" + "remarks": "rule_set_206" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "directory_access_var_log_audit", - "remarks": "rule_set_205" + "remarks": "rule_set_206" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Access Events to Audit Log Directory", - "remarks": "rule_set_205" + "remarks": "rule_set_206" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_var_log_audit", - "remarks": "rule_set_206" + "remarks": "rule_set_207" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0640 or Less Permissive", - "remarks": "rule_set_206" + "remarks": "rule_set_207" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_permissions_var_log_audit", - "remarks": "rule_set_206" + "remarks": "rule_set_207" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Have Mode 0640 or Less Permissive", - "remarks": "rule_set_206" + "remarks": "rule_set_207" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_207" + "remarks": "rule_set_208" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_207" + "remarks": "rule_set_208" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_permissions", - "remarks": "rule_set_207" + "remarks": "rule_set_208" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure System Log Files Have Correct Permissions", - "remarks": "rule_set_207" + "remarks": "rule_set_208" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_group_ownership_var_log_audit", - "remarks": "rule_set_208" + "remarks": "rule_set_209" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Group Owned By Root", - "remarks": "rule_set_208" + "remarks": "rule_set_209" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_group_ownership_var_log_audit", - "remarks": "rule_set_208" + "remarks": "rule_set_209" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Group Owned By Root", - "remarks": "rule_set_208" + "remarks": "rule_set_209" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_var_log_audit", - "remarks": "rule_set_209" + "remarks": "rule_set_210" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Owned By Root", - "remarks": "rule_set_209" + "remarks": "rule_set_210" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "file_ownership_var_log_audit", - "remarks": "rule_set_209" + "remarks": "rule_set_210" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "System Audit Logs Must Be Owned By Root", - "remarks": "rule_set_209" + "remarks": "rule_set_210" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_210" + "remarks": "rule_set_211" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_210" + "remarks": "rule_set_211" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_ownership", - "remarks": "rule_set_210" + "remarks": "rule_set_211" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate User", - "remarks": "rule_set_210" + "remarks": "rule_set_211" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_211" + "remarks": "rule_set_212" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_211" + "remarks": "rule_set_212" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rsyslog_files_groupownership", - "remarks": "rule_set_211" + "remarks": "rule_set_212" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure Log Files Are Owned By Appropriate Group", - "remarks": "rule_set_211" + "remarks": "rule_set_212" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_immutable", - "remarks": "rule_set_212" + "remarks": "rule_set_213" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Make the auditd Configuration Immutable", - "remarks": "rule_set_212" + "remarks": "rule_set_213" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_immutable", - "remarks": "rule_set_212" + "remarks": "rule_set_213" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Make the auditd Configuration Immutable", - "remarks": "rule_set_212" + "remarks": "rule_set_213" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_audispd_syslog_plugin_activated", - "remarks": "rule_set_213" + "remarks": "rule_set_214" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd to use audispd's syslog plugin", - "remarks": "rule_set_213" + "remarks": "rule_set_214" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_audispd_syslog_plugin_activated", - "remarks": "rule_set_213" + "remarks": "rule_set_214" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd to use audispd's syslog plugin", - "remarks": "rule_set_213" + "remarks": "rule_set_214" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audispd-plugins_installed", - "remarks": "rule_set_214" + "remarks": "rule_set_215" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install audispd-plugins Package", - "remarks": "rule_set_214" + "remarks": "rule_set_215" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_audispd-plugins_installed", - "remarks": "rule_set_214" + "remarks": "rule_set_215" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install audispd-plugins Package", - "remarks": "rule_set_214" + "remarks": "rule_set_215" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chmod", - "remarks": "rule_set_215" + "remarks": "rule_set_216" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", - "remarks": "rule_set_215" + "remarks": "rule_set_216" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chmod", - "remarks": "rule_set_215" + "remarks": "rule_set_216" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chmod", - "remarks": "rule_set_215" + "remarks": "rule_set_216" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chown", - "remarks": "rule_set_216" + "remarks": "rule_set_217" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chown", - "remarks": "rule_set_216" + "remarks": "rule_set_217" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_chown", - "remarks": "rule_set_216" + "remarks": "rule_set_217" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - chown", - "remarks": "rule_set_216" + "remarks": "rule_set_217" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmod", - "remarks": "rule_set_217" + "remarks": "rule_set_218" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmod", - "remarks": "rule_set_217" + "remarks": "rule_set_218" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmod", - "remarks": "rule_set_217" + "remarks": "rule_set_218" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmod", - "remarks": "rule_set_217" + "remarks": "rule_set_218" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat", - "remarks": "rule_set_218" + "remarks": "rule_set_219" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat", - "remarks": "rule_set_218" + "remarks": "rule_set_219" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat", - "remarks": "rule_set_218" + "remarks": "rule_set_219" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat", - "remarks": "rule_set_218" + "remarks": "rule_set_219" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat2", - "remarks": "rule_set_219" + "remarks": "rule_set_220" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat2", - "remarks": "rule_set_219" + "remarks": "rule_set_220" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchmodat2", - "remarks": "rule_set_219" + "remarks": "rule_set_220" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchmodat2", - "remarks": "rule_set_219" + "remarks": "rule_set_220" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchown", - "remarks": "rule_set_220" + "remarks": "rule_set_221" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchown", - "remarks": "rule_set_220" + "remarks": "rule_set_221" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchown", - "remarks": "rule_set_220" + "remarks": "rule_set_221" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchown", - "remarks": "rule_set_220" + "remarks": "rule_set_221" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchownat", - "remarks": "rule_set_221" + "remarks": "rule_set_222" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchownat", - "remarks": "rule_set_221" + "remarks": "rule_set_222" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fchownat", - "remarks": "rule_set_221" + "remarks": "rule_set_222" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fchownat", - "remarks": "rule_set_221" + "remarks": "rule_set_222" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fremovexattr", - "remarks": "rule_set_222" + "remarks": "rule_set_223" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fremovexattr", - "remarks": "rule_set_222" + "remarks": "rule_set_223" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fremovexattr", - "remarks": "rule_set_222" + "remarks": "rule_set_223" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fremovexattr", - "remarks": "rule_set_222" + "remarks": "rule_set_223" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fsetxattr", - "remarks": "rule_set_223" + "remarks": "rule_set_224" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fsetxattr", - "remarks": "rule_set_223" + "remarks": "rule_set_224" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_fsetxattr", - "remarks": "rule_set_223" + "remarks": "rule_set_224" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - fsetxattr", - "remarks": "rule_set_223" + "remarks": "rule_set_224" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lremovexattr", - "remarks": "rule_set_224" + "remarks": "rule_set_225" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lremovexattr", - "remarks": "rule_set_224" + "remarks": "rule_set_225" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lremovexattr", - "remarks": "rule_set_224" + "remarks": "rule_set_225" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lremovexattr", - "remarks": "rule_set_224" + "remarks": "rule_set_225" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lchown", - "remarks": "rule_set_225" + "remarks": "rule_set_226" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lchown", - "remarks": "rule_set_225" + "remarks": "rule_set_226" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lchown", - "remarks": "rule_set_225" + "remarks": "rule_set_226" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lchown", - "remarks": "rule_set_225" + "remarks": "rule_set_226" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lsetxattr", - "remarks": "rule_set_226" + "remarks": "rule_set_227" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lsetxattr", - "remarks": "rule_set_226" + "remarks": "rule_set_227" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_lsetxattr", - "remarks": "rule_set_226" + "remarks": "rule_set_227" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - lsetxattr", - "remarks": "rule_set_226" + "remarks": "rule_set_227" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_removexattr", - "remarks": "rule_set_227" + "remarks": "rule_set_228" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - removexattr", - "remarks": "rule_set_227" + "remarks": "rule_set_228" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_removexattr", - "remarks": "rule_set_227" + "remarks": "rule_set_228" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - removexattr", - "remarks": "rule_set_227" + "remarks": "rule_set_228" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_setxattr", - "remarks": "rule_set_228" + "remarks": "rule_set_229" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - setxattr", - "remarks": "rule_set_228" + "remarks": "rule_set_229" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_dac_modification_setxattr", - "remarks": "rule_set_228" + "remarks": "rule_set_229" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Discretionary Access Controls - setxattr", - "remarks": "rule_set_228" + "remarks": "rule_set_229" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification", - "remarks": "rule_set_229" + "remarks": "rule_set_230" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment", - "remarks": "rule_set_229" + "remarks": "rule_set_230" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_networkconfig_modification", - "remarks": "rule_set_229" + "remarks": "rule_set_230" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Network Environment", - "remarks": "rule_set_229" + "remarks": "rule_set_230" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_etc_selinux", - "remarks": "rule_set_230" + "remarks": "rule_set_231" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls (/etc/selinux)", - "remarks": "rule_set_230" + "remarks": "rule_set_231" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_mac_modification_etc_selinux", - "remarks": "rule_set_230" + "remarks": "rule_set_231" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Events that Modify the System's Mandatory Access Controls (/etc/selinux)", - "remarks": "rule_set_230" + "remarks": "rule_set_231" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_admin_space_left_action", - "remarks": "rule_set_231" + "remarks": "rule_set_232" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd admin_space_left Action on Low Disk Space", - "remarks": "rule_set_231" + "remarks": "rule_set_232" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_admin_space_left_action", - "remarks": "rule_set_231" + "remarks": "rule_set_232" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd admin_space_left Action on Low Disk Space", - "remarks": "rule_set_231" + "remarks": "rule_set_232" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_space_left", - "remarks": "rule_set_232" + "remarks": "rule_set_233" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd space_left on Low Disk Space", - "remarks": "rule_set_232" + "remarks": "rule_set_233" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_space_left", - "remarks": "rule_set_232" + "remarks": "rule_set_233" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd space_left on Low Disk Space", - "remarks": "rule_set_232" + "remarks": "rule_set_233" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_space_left_action", - "remarks": "rule_set_233" + "remarks": "rule_set_234" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd space_left Action on Low Disk Space", - "remarks": "rule_set_233" + "remarks": "rule_set_234" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "auditd_data_retention_space_left_action", - "remarks": "rule_set_233" + "remarks": "rule_set_234" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure auditd space_left Action on Low Disk Space", - "remarks": "rule_set_233" + "remarks": "rule_set_234" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_logrotate_installed", - "remarks": "rule_set_234" + "remarks": "rule_set_235" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure logrotate is Installed", - "remarks": "rule_set_234" + "remarks": "rule_set_235" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_logrotate_installed", - "remarks": "rule_set_234" + "remarks": "rule_set_235" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure logrotate is Installed", - "remarks": "rule_set_234" + "remarks": "rule_set_235" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "timer_logrotate_enabled", - "remarks": "rule_set_235" + "remarks": "rule_set_236" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable logrotate Timer", - "remarks": "rule_set_235" + "remarks": "rule_set_236" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "timer_logrotate_enabled", - "remarks": "rule_set_235" + "remarks": "rule_set_236" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable logrotate Timer", - "remarks": "rule_set_235" + "remarks": "rule_set_236" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_chrony_installed", - "remarks": "rule_set_236" + "remarks": "rule_set_237" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "The Chrony package is installed", - "remarks": "rule_set_236" + "remarks": "rule_set_237" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_chrony_installed", - "remarks": "rule_set_236" + "remarks": "rule_set_237" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "The Chrony package is installed", - "remarks": "rule_set_236" + "remarks": "rule_set_237" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_specify_remote_server", - "remarks": "rule_set_237" + "remarks": "rule_set_238" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "A remote time server for Chrony is configured", - "remarks": "rule_set_237" + "remarks": "rule_set_238" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_specify_remote_server", - "remarks": "rule_set_237" + "remarks": "rule_set_238" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "A remote time server for Chrony is configured", - "remarks": "rule_set_237" + "remarks": "rule_set_238" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_watch_localtime", - "remarks": "rule_set_238" + "remarks": "rule_set_239" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter the localtime File", - "remarks": "rule_set_238" + "remarks": "rule_set_239" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_watch_localtime", - "remarks": "rule_set_238" + "remarks": "rule_set_239" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter the localtime File", - "remarks": "rule_set_238" + "remarks": "rule_set_239" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_settimeofday", - "remarks": "rule_set_239" + "remarks": "rule_set_240" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through settimeofday", - "remarks": "rule_set_239" + "remarks": "rule_set_240" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_settimeofday", - "remarks": "rule_set_239" + "remarks": "rule_set_240" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through settimeofday", - "remarks": "rule_set_239" + "remarks": "rule_set_240" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_clock_settime", - "remarks": "rule_set_240" + "remarks": "rule_set_241" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through clock_settime", - "remarks": "rule_set_240" + "remarks": "rule_set_241" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_clock_settime", - "remarks": "rule_set_240" + "remarks": "rule_set_241" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through clock_settime", - "remarks": "rule_set_240" + "remarks": "rule_set_241" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_stime", - "remarks": "rule_set_241" + "remarks": "rule_set_242" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through stime", - "remarks": "rule_set_241" + "remarks": "rule_set_242" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_stime", - "remarks": "rule_set_241" + "remarks": "rule_set_242" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record Attempts to Alter Time Through stime", - "remarks": "rule_set_241" + "remarks": "rule_set_242" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_adjtimex", - "remarks": "rule_set_242" + "remarks": "rule_set_243" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through adjtimex", - "remarks": "rule_set_242" + "remarks": "rule_set_243" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "audit_rules_time_adjtimex", - "remarks": "rule_set_242" + "remarks": "rule_set_243" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Record attempts to alter time through adjtimex", - "remarks": "rule_set_242" + "remarks": "rule_set_243" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_run_as_chrony_user", - "remarks": "rule_set_243" + "remarks": "rule_set_244" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that chronyd is running under chrony user account", - "remarks": "rule_set_243" + "remarks": "rule_set_244" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "chronyd_run_as_chrony_user", - "remarks": "rule_set_243" + "remarks": "rule_set_244" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Ensure that chronyd is running under chrony user account", - "remarks": "rule_set_243" + "remarks": "rule_set_244" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_argument", - "remarks": "rule_set_244" + "remarks": "rule_set_245" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Auditing for Processes Which Start Prior to the Audit Daemon", - "remarks": "rule_set_244" + "remarks": "rule_set_245" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_argument", - "remarks": "rule_set_244" + "remarks": "rule_set_245" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Enable Auditing for Processes Which Start Prior to the Audit Daemon", - "remarks": "rule_set_244" + "remarks": "rule_set_245" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_backlog_limit_argument", - "remarks": "rule_set_245" + "remarks": "rule_set_246" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Extend Audit Backlog Limit for the Audit Daemon", - "remarks": "rule_set_245" + "remarks": "rule_set_246" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "grub2_audit_backlog_limit_argument", - "remarks": "rule_set_245" + "remarks": "rule_set_246" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Extend Audit Backlog Limit for the Audit Daemon", - "remarks": "rule_set_245" + "remarks": "rule_set_246" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_build_database", - "remarks": "rule_set_246" + "remarks": "rule_set_247" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Build and Test AIDE Database", - "remarks": "rule_set_246" + "remarks": "rule_set_247" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_build_database", - "remarks": "rule_set_246" + "remarks": "rule_set_247" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Build and Test AIDE Database", - "remarks": "rule_set_246" + "remarks": "rule_set_247" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_periodic_cron_checking", - "remarks": "rule_set_247" + "remarks": "rule_set_248" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Periodic Execution of AIDE", - "remarks": "rule_set_247" + "remarks": "rule_set_248" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "aide_periodic_cron_checking", - "remarks": "rule_set_247" + "remarks": "rule_set_248" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Configure Periodic Execution of AIDE", - "remarks": "rule_set_247" + "remarks": "rule_set_248" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_248" + "remarks": "rule_set_249" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_248" + "remarks": "rule_set_249" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "package_aide_installed", - "remarks": "rule_set_248" + "remarks": "rule_set_249" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Install AIDE", - "remarks": "rule_set_248" + "remarks": "rule_set_249" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rpm_verify_hashes", - "remarks": "rule_set_249" + "remarks": "rule_set_250" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify File Hashes with RPM", - "remarks": "rule_set_249" + "remarks": "rule_set_250" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rpm_verify_hashes", - "remarks": "rule_set_249" + "remarks": "rule_set_250" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify File Hashes with RPM", - "remarks": "rule_set_249" + "remarks": "rule_set_250" }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rpm_verify_ownership", - "remarks": "rule_set_250" + "remarks": "rule_set_251" }, { "name": "Rule_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify and Correct Ownership with RPM", - "remarks": "rule_set_250" + "remarks": "rule_set_251" }, { "name": "Check_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "rpm_verify_ownership", - "remarks": "rule_set_250" + "remarks": "rule_set_251" }, { "name": "Check_Description", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "Verify and Correct Ownership with RPM", - "remarks": "rule_set_250" + "remarks": "rule_set_251" } ], "control-implementations": [ { - "uuid": "459f6aef-0ccf-418a-974b-670eb559af24", + "uuid": "36c19a9f-7b67-4566-ab64-6b3bfe2da2c3", "source": "trestle://profiles/rhel10-pcidss_4-base/profile.json", "description": "Control implementation for pci-dss", "props": [ @@ -15035,7 +15076,7 @@ ], "implemented-requirements": [ { - "uuid": "4d63c1cc-53df-4262-85c5-8a3a6c0a397e", + "uuid": "6df5b31f-6e56-422c-90b5-91a01e5696bf", "control-id": "pcidss_4_1-1.1", "description": "The description for control-id pcidss_4_1-1.1.", "props": [ @@ -15048,7 +15089,7 @@ ] }, { - "uuid": "eed1b03e-5a2a-448e-83d2-54403bb2c882", + "uuid": "bbcaa792-8cd4-4141-a451-be651f644aa9", "control-id": "pcidss_4_1-1.2", "description": "The description for control-id pcidss_4_1-1.2.", "props": [ @@ -15061,7 +15102,7 @@ ] }, { - "uuid": "a1972efa-d683-4d01-b30d-4bc601ecfee4", + "uuid": "13bc2c89-3c13-462f-a65d-db09eb8f77a4", "control-id": "pcidss_4_1-2.1", "description": "Examples of NSCs covered by these configuration standards include, but are not limited to,\nfirewalls, routers configured with access control lists, and cloud virtual networks. The\nobjective of this requirement is to ensure the way that NSCs are configured and operate\nare defined and consistently applied. While the tooling and standards can be automated,\nthe review of allowed accesses should be manual as different sites may have different\npolicies.", "props": [ @@ -15093,7 +15134,7 @@ ] }, { - "uuid": "042f78b4-d071-4dc0-9b2a-fa27e1121613", + "uuid": "c2243cae-a0c6-4457-ac9c-6fbdbc2d9403", "control-id": "pcidss_4_1-2.2", "description": "The description for control-id pcidss_4_1-2.2.", "props": [ @@ -15106,7 +15147,7 @@ ] }, { - "uuid": "4e311480-1804-4088-a7d2-a506d572ab36", + "uuid": "8b2b758f-4158-49b5-8757-97123634cd51", "control-id": "pcidss_4_1-2.3", "description": "The description for control-id pcidss_4_1-2.3.", "props": [ @@ -15119,7 +15160,7 @@ ] }, { - "uuid": "1a131487-617f-4ce9-ab91-2775c55dbff9", + "uuid": "169f6228-a0e0-43e4-b8a6-79e89ec25318", "control-id": "pcidss_4_1-2.4", "description": "The description for control-id pcidss_4_1-2.4.", "props": [ @@ -15132,7 +15173,7 @@ ] }, { - "uuid": "48c80ac2-1a77-4401-9191-02740d5419f9", + "uuid": "b82df07f-fb30-495b-9dec-3a1530851005", "control-id": "pcidss_4_1-2.5", "description": "The description for control-id pcidss_4_1-2.5.", "props": [ @@ -15145,7 +15186,7 @@ ] }, { - "uuid": "c20cb4d3-d9c8-4eff-979b-af55cfd0aa09", + "uuid": "bb5611fa-db7e-4b6d-9d99-bfedb69bcd38", "control-id": "pcidss_4_1-2.6", "description": "The specific risks associated with the use of insecure services, protocols, and ports are\nunderstood, assessed, and appropriately mitigated. The selected rules here basically\nremove services without encryption and restricted some common services.", "props": [ @@ -15182,7 +15223,7 @@ ] }, { - "uuid": "c5804fa5-8e18-427c-b1bc-bf23c5fb834a", + "uuid": "12875268-b7c9-4a79-9675-c647d0e5adba", "control-id": "pcidss_4_1-2.7", "description": "The description for control-id pcidss_4_1-2.7.", "props": [ @@ -15195,7 +15236,7 @@ ] }, { - "uuid": "40d34a35-d91d-4afd-9bac-67c575138809", + "uuid": "4ae0966c-3477-4aa8-86c2-f472e3d83cc3", "control-id": "pcidss_4_1-2.8", "description": "No notes for control-id 1.2.8.", "props": [ @@ -15227,7 +15268,7 @@ ] }, { - "uuid": "890e25f6-0548-45e1-aabd-8191ace0f996", + "uuid": "ec7827ec-bf12-446c-9ede-a3a99e545c1a", "control-id": "pcidss_4_1-3.1", "description": "No notes for control-id 1.3.1.", "props": [ @@ -15249,7 +15290,7 @@ ] }, { - "uuid": "32da13c1-2131-404b-8a11-2738455f6144", + "uuid": "053c4bf6-1f3d-48ca-bee3-ca8c43ad8189", "control-id": "pcidss_4_1-3.2", "description": "The description for control-id pcidss_4_1-3.2.", "props": [ @@ -15262,7 +15303,7 @@ ] }, { - "uuid": "b2245280-f65f-46a9-a264-deeb6ab276bf", + "uuid": "9159ab4a-210a-4f56-bc79-ae765d973c57", "control-id": "pcidss_4_1-3.3", "description": "Wireless interfaces are not expected in servers so they are disabled by default in this\npolicy.", "props": [ @@ -15279,7 +15320,7 @@ ] }, { - "uuid": "006ca478-5fe1-4187-9d85-312b884c9403", + "uuid": "c325d909-2f0e-42fc-b040-d64d28c23d44", "control-id": "pcidss_4_1-4.1", "description": "Trusted and untrusted networks are expected to be different for each environment.\nBut loopback traffic is assumed to be trusted and even necessary for some services.\nThis requirement is complements 1.2.1 and 1.3.1 requirements.", "props": [ @@ -15301,7 +15342,7 @@ ] }, { - "uuid": "c61e9a24-aca8-4fa8-b63a-1f7bdb4d1b87", + "uuid": "431a4d5f-f930-4062-b652-6881653af3f1", "control-id": "pcidss_4_1-4.2", "description": "Probably missing some relevant IPv6 related rules. Needs to be investigated.", "props": [ @@ -15338,7 +15379,7 @@ ] }, { - "uuid": "03275e76-a937-4206-bfd6-9c72e850dee4", + "uuid": "30158866-8b11-4a38-af54-89d27cac4250", "control-id": "pcidss_4_1-4.3", "description": "Probably missing some relevant IPv6 related rules. Needs to be investigated.", "props": [ @@ -15375,7 +15416,7 @@ ] }, { - "uuid": "e8c85ba4-19b9-4ef1-a5fa-ac36a5be5351", + "uuid": "4bb720e3-9b17-4d7a-8005-43647d3bec97", "control-id": "pcidss_4_1-4.4", "description": "The description for control-id pcidss_4_1-4.4.", "props": [ @@ -15388,7 +15429,7 @@ ] }, { - "uuid": "2ab5d103-7894-4037-9cc3-5958b87ccd43", + "uuid": "dc975e76-df03-4dcd-a7a1-20eae4498d85", "control-id": "pcidss_4_1-4.5", "description": "No notes for control-id 1.4.5.", "props": [ @@ -15415,7 +15456,7 @@ ] }, { - "uuid": "f2dd89ff-fbc0-4893-9fb5-6a40b6719528", + "uuid": "773661da-701d-491c-95b5-2389c13c8c9e", "control-id": "pcidss_4_1-5.1", "description": "To ensure this requirement, a manual analysis of site policy and topology is inevitable.\nFrom the technical perspective, previous requirements should already cover this\nrequirement at some level.", "props": [ @@ -15427,7 +15468,7 @@ ] }, { - "uuid": "abaaaa88-e0bc-4b2d-82a9-946b2a7bc195", + "uuid": "f3d00b12-e668-4338-b1c8-19295b7a4f98", "control-id": "pcidss_4_2-1.1", "description": "The description for control-id pcidss_4_2-1.1.", "props": [ @@ -15440,7 +15481,7 @@ ] }, { - "uuid": "13eebde4-c8c0-411f-a8e6-c7cfdb19434d", + "uuid": "d2644fc7-e191-4f22-bed7-9683ecc97765", "control-id": "pcidss_4_2-1.2", "description": "The description for control-id pcidss_4_2-1.2.", "props": [ @@ -15453,7 +15494,7 @@ ] }, { - "uuid": "45af2d2a-470d-4594-b74d-167251b3754a", + "uuid": "eaffc10c-0bd9-4aaf-b3fa-ea97311523b7", "control-id": "pcidss_4_2-2.1", "description": "Interestingly this requirement recommends other standards, such as Center for Internet\nSecurity (CIS), International Organization for Standardization (ISO), National Institute\nof Standards and Technology (NIST), Cloud Security Alliance, and product vendors. So, the\nrules included here are very generic in terms of hardening.", "props": [ @@ -15470,7 +15511,7 @@ ] }, { - "uuid": "1e83ec34-1121-432e-a2cd-af94a702cb4b", + "uuid": "c3f2770a-ed6d-4ec7-bbcd-f21645f72628", "control-id": "pcidss_4_2-2.2", "description": "Also related to requirement 8.2.6 and 8.3.5.", "props": [ @@ -15492,7 +15533,7 @@ ] }, { - "uuid": "924924c4-f93c-4dfe-a5d6-27d95407fc70", + "uuid": "002f9fd3-4172-4cb7-9723-32e7c488cd43", "control-id": "pcidss_4_2-2.3", "description": "The description for control-id pcidss_4_2-2.3.", "props": [ @@ -15505,7 +15546,7 @@ ] }, { - "uuid": "c7818319-ea87-4c6b-bd81-9f9e8b4d27f4", + "uuid": "8c06ec7a-2f5a-48cd-8db7-8a40561ad409", "control-id": "pcidss_4_2-2.4", "description": "No notes for control-id 2.2.4.", "props": [ @@ -15562,7 +15603,7 @@ ] }, { - "uuid": "a937f9cd-f9a5-47ca-8dd9-163c11d710e2", + "uuid": "91e0d21a-1c09-4ee7-bc7f-26be5e76683b", "control-id": "pcidss_4_2-2.5", "description": "The description for control-id pcidss_4_2-2.5.", "props": [ @@ -15575,7 +15616,7 @@ ] }, { - "uuid": "ec61d4f2-3184-4461-b017-083f57e06353", + "uuid": "f725a7d5-f8f4-48a4-9e35-6cb6aa91090d", "control-id": "pcidss_4_2-2.6", "description": "This requirement is not specific but also points to 2.2.1, where other policies are\nreferenced. Therefore, the most common rules related to system configuration in order to\nprevent misuse and selected in main profiles are also selected here.", "props": [ @@ -15977,7 +16018,7 @@ ] }, { - "uuid": "0852780d-6210-41f2-8ec5-b30d7ee5ecd9", + "uuid": "7d365dab-bde3-4d88-8535-c770e051fce9", "control-id": "pcidss_4_2-2.7", "description": "Related to requirement 12.3.3.", "props": [ @@ -15999,7 +16040,7 @@ ] }, { - "uuid": "09a753f0-7625-441f-943d-06901c12ae5d", + "uuid": "5027aa00-e5d8-4ec5-bc8d-c7b10fdbdc0c", "control-id": "pcidss_4_2-3.1", "description": "Wireless interfaces are disabled by 1.3.3.", "props": [ @@ -16011,7 +16052,7 @@ ] }, { - "uuid": "b14f42d2-8a7f-4458-bf36-020474143292", + "uuid": "14859664-773a-4db0-92f4-abd3ed9bec83", "control-id": "pcidss_4_2-3.2", "description": "Wireless interfaces are disabled by 1.3.3.", "props": [ @@ -16023,7 +16064,7 @@ ] }, { - "uuid": "480f88db-2a20-4664-b334-ccf616e44d5a", + "uuid": "00fa6700-fc95-40bf-899d-3e1ae07414fd", "control-id": "pcidss_4_3-1.1", "description": "The description for control-id pcidss_4_3-1.1.", "props": [ @@ -16036,7 +16077,7 @@ ] }, { - "uuid": "11f85606-4c63-44a9-8dbf-45edde43bd49", + "uuid": "cb8c068c-79b2-4d0f-af8d-b8f58654c20b", "control-id": "pcidss_4_3-1.2", "description": "The description for control-id pcidss_4_3-1.2.", "props": [ @@ -16049,7 +16090,7 @@ ] }, { - "uuid": "70a16ec9-c53d-41d1-b348-d4ba35997acc", + "uuid": "f78f20ce-c6a2-497a-a1d2-de2742f89b22", "control-id": "pcidss_4_3-2.1", "description": "The description for control-id pcidss_4_3-2.1.", "props": [ @@ -16062,7 +16103,7 @@ ] }, { - "uuid": "7171b4ef-4751-4180-997f-c7265a15b3f1", + "uuid": "c77a2995-71a7-458b-aa4f-679e8c3a6801", "control-id": "pcidss_4_3-3.1.1", "description": "This requirement consists in auditing files, databases and memory to make sure the full\ncontent of any track is not unnecessarily stored. It involves manual auditing but some\nautomated rules fit this requirement in order to reduce the chances if this data be\nunintentionally stored in memory.", "props": [ @@ -16104,7 +16145,7 @@ ] }, { - "uuid": "7122d9df-bb2f-46fe-b8be-204bfd4c7aa5", + "uuid": "9d88a3a4-4e8a-4317-a978-4329b696eb4f", "control-id": "pcidss_4_3-3.1.2", "description": "Same rules already selected in 3.3.1.1 are valid here, but they are not repeated.", "props": [ @@ -16116,7 +16157,7 @@ ] }, { - "uuid": "7fcd4022-0665-4d6f-b1b4-b6c8b0d739a8", + "uuid": "37de0dc9-1050-4bfd-b494-5f138aba9439", "control-id": "pcidss_4_3-3.1.3", "description": "Same rules already selected in 3.3.1.1 are valid here, but they are not repeated.", "props": [ @@ -16128,7 +16169,7 @@ ] }, { - "uuid": "0487e23e-de55-41e2-8739-ffe7be86dd83", + "uuid": "47766304-8817-4f15-9cbf-42485160c427", "control-id": "pcidss_4_3-3.2", "description": "The description for control-id pcidss_4_3-3.2.", "props": [ @@ -16141,7 +16182,7 @@ ] }, { - "uuid": "3dc3d429-aa00-4b51-b4f1-297d03cf919a", + "uuid": "21bd6a02-b227-41f4-9997-b61504547eab", "control-id": "pcidss_4_3-3.3", "description": "The description for control-id pcidss_4_3-3.3.", "props": [ @@ -16154,7 +16195,7 @@ ] }, { - "uuid": "0eaf95c4-93d4-406e-9310-896ff6746290", + "uuid": "63d3edee-abfa-4e5d-8c17-495f4faa6919", "control-id": "pcidss_4_3-4.1", "description": "The description for control-id pcidss_4_3-4.1.", "props": [ @@ -16167,7 +16208,7 @@ ] }, { - "uuid": "34d7b244-f3db-4396-8b65-e8da018424b5", + "uuid": "58b2e52d-d14e-4406-8116-d7e746d22eb0", "control-id": "pcidss_4_3-4.2", "description": "There are technical rules to disable removable storage devices. However, this requirement\nstill demand some manual auditing in documentation and eventual exceptions.", "props": [ @@ -16194,7 +16235,7 @@ ] }, { - "uuid": "a6df459d-3f64-4789-8468-80e553f0336f", + "uuid": "2ceb5da2-0156-4d2f-a3e5-19f6df5124d9", "control-id": "pcidss_4_3-5.1.1", "description": "The description for control-id pcidss_4_3-5.1.1.", "props": [ @@ -16207,7 +16248,7 @@ ] }, { - "uuid": "e5b8277a-b65f-4a18-b379-1e7c515bfc1b", + "uuid": "b739f9e9-24b3-4eb5-ae41-830e5518a775", "control-id": "pcidss_4_3-5.1.2", "description": "No notes for control-id 3.5.1.2.", "props": [ @@ -16224,7 +16265,7 @@ ] }, { - "uuid": "8c07b9a6-5784-4e7e-b3e3-153d64e2efce", + "uuid": "e19587f4-4e3d-4030-b59a-83b1a4fcd72f", "control-id": "pcidss_4_3-5.1.3", "description": "The description for control-id pcidss_4_3-5.1.3.", "props": [ @@ -16237,7 +16278,7 @@ ] }, { - "uuid": "e349beed-1459-4502-b4fc-9c1169e37050", + "uuid": "9fec4c59-df30-4700-8458-63218a75f77b", "control-id": "pcidss_4_3-6.1.1", "description": "The description for control-id pcidss_4_3-6.1.1.", "props": [ @@ -16250,7 +16291,7 @@ ] }, { - "uuid": "38ddf5e3-97ae-4248-b36f-1aa5cec56938", + "uuid": "be3a5023-c59c-40e0-af22-5da5124e1105", "control-id": "pcidss_4_3-6.1.2", "description": "The description for control-id pcidss_4_3-6.1.2.", "props": [ @@ -16263,7 +16304,7 @@ ] }, { - "uuid": "c9f6e55b-c78f-4f03-8abf-5bde9d96ecbb", + "uuid": "2cb00efd-d030-4137-a233-1e884262c6b2", "control-id": "pcidss_4_3-6.1.3", "description": "The description for control-id pcidss_4_3-6.1.3.", "props": [ @@ -16276,7 +16317,7 @@ ] }, { - "uuid": "8f1960de-9d26-4afd-aa6f-137c3c6ed196", + "uuid": "722c0ae0-7b9c-45cd-a398-c44c71b53baf", "control-id": "pcidss_4_3-6.1.4", "description": "The description for control-id pcidss_4_3-6.1.4.", "props": [ @@ -16289,7 +16330,7 @@ ] }, { - "uuid": "00ae37fb-78df-4ec4-8a3d-1903caa4676f", + "uuid": "f78e9b20-f421-4239-afc1-378a1157a6a6", "control-id": "pcidss_4_3-7.1", "description": "The description for control-id pcidss_4_3-7.1.", "props": [ @@ -16302,7 +16343,7 @@ ] }, { - "uuid": "afe68188-4884-49b5-a98c-19a73786449c", + "uuid": "9a88fda7-8fc7-466d-b8d3-cafc7510c5cc", "control-id": "pcidss_4_3-7.2", "description": "The description for control-id pcidss_4_3-7.2.", "props": [ @@ -16315,7 +16356,7 @@ ] }, { - "uuid": "ac4c77a7-aba0-463e-bfc7-e877ff432f93", + "uuid": "446a44b7-eb4d-4cd3-b51c-2a7e18047561", "control-id": "pcidss_4_3-7.3", "description": "The description for control-id pcidss_4_3-7.3.", "props": [ @@ -16328,7 +16369,7 @@ ] }, { - "uuid": "4f8630c8-f260-42a5-8387-a2e9123d2a3d", + "uuid": "2a4f46a1-4ee2-422e-987b-228845214604", "control-id": "pcidss_4_3-7.4", "description": "The description for control-id pcidss_4_3-7.4.", "props": [ @@ -16341,7 +16382,7 @@ ] }, { - "uuid": "9a0a1492-13b1-49c3-81ef-74ad85d6b2a1", + "uuid": "41bed6ef-de2c-44c7-8bc7-6eea512b63f6", "control-id": "pcidss_4_3-7.5", "description": "The description for control-id pcidss_4_3-7.5.", "props": [ @@ -16354,7 +16395,7 @@ ] }, { - "uuid": "b62f8b9b-43f8-4ebf-9e85-cca56fced53e", + "uuid": "f773f504-a136-442e-8363-54a16d79f218", "control-id": "pcidss_4_3-7.6", "description": "The description for control-id pcidss_4_3-7.6.", "props": [ @@ -16367,7 +16408,7 @@ ] }, { - "uuid": "395b3e80-3469-44a5-b593-3b6695e39ccb", + "uuid": "925a9d52-ca13-4dd1-9eef-1c02f2071e36", "control-id": "pcidss_4_3-7.7", "description": "The description for control-id pcidss_4_3-7.7.", "props": [ @@ -16380,7 +16421,7 @@ ] }, { - "uuid": "54fd622f-dab5-4eb1-9f8c-56a3a761e85a", + "uuid": "fa746d8b-1f20-4d00-b2ac-89936b9c1fa0", "control-id": "pcidss_4_3-7.8", "description": "The description for control-id pcidss_4_3-7.8.", "props": [ @@ -16393,7 +16434,7 @@ ] }, { - "uuid": "35f9a72e-3b76-4fe3-9af1-10b8455aeaba", + "uuid": "aa006234-1e47-440a-8db6-4c763ef7b29c", "control-id": "pcidss_4_3-7.9", "description": "The description for control-id pcidss_4_3-7.9.", "props": [ @@ -16406,7 +16447,7 @@ ] }, { - "uuid": "d59ed04d-d809-4ab4-a852-1c02b632cc48", + "uuid": "55e2ab03-e769-4447-9059-27fa67561f1b", "control-id": "pcidss_4_4-1.1", "description": "The description for control-id pcidss_4_4-1.1.", "props": [ @@ -16419,7 +16460,7 @@ ] }, { - "uuid": "af0ab4d7-e17f-458b-a5d8-52ccc984210c", + "uuid": "43dd52af-b6a1-4eb2-837a-bd57c8805447", "control-id": "pcidss_4_4-1.2", "description": "The description for control-id pcidss_4_4-1.2.", "props": [ @@ -16432,7 +16473,7 @@ ] }, { - "uuid": "1592da00-ad76-4358-8bd9-db8666ce28e5", + "uuid": "2dd7364f-76ea-448b-b467-b1070cbf140a", "control-id": "pcidss_4_4-2.1.1", "description": "The description for control-id pcidss_4_4-2.1.1.", "props": [ @@ -16445,7 +16486,7 @@ ] }, { - "uuid": "ae009867-91f3-49ac-942a-ca506cce8257", + "uuid": "9cbc0c91-5e76-4fd1-860d-39bf41f4902f", "control-id": "pcidss_4_4-2.1.2", "description": "The description for control-id pcidss_4_4-2.1.2.", "props": [ @@ -16458,7 +16499,7 @@ ] }, { - "uuid": "198fe4df-dc66-46b9-b95b-19574caf7072", + "uuid": "7b01212f-defa-4cc5-98d9-afebd418ca31", "control-id": "pcidss_4_4-2.2", "description": "The description for control-id pcidss_4_4-2.2.", "props": [ @@ -16471,7 +16512,7 @@ ] }, { - "uuid": "4df46ace-69a4-4316-bf2f-3b31423fb837", + "uuid": "d4fc4337-1e69-4983-8ab7-dd18dfd84667", "control-id": "pcidss_4_5-1.1", "description": "The description for control-id pcidss_4_5-1.1.", "props": [ @@ -16484,7 +16525,7 @@ ] }, { - "uuid": "6a803c1f-44b0-4261-b3bf-3ff4a4d02a06", + "uuid": "af24f75a-b627-485a-9948-056d934105ef", "control-id": "pcidss_4_5-1.2", "description": "The description for control-id pcidss_4_5-1.2.", "props": [ @@ -16497,7 +16538,7 @@ ] }, { - "uuid": "2d3265b6-31ca-48f6-8951-9907d340660c", + "uuid": "ca9ad5c9-e3e1-4688-b60f-35ebda83861c", "control-id": "pcidss_4_5-2.1", "description": "There are many options of anti-malware and the criteria for any adopted solution or\napproach relies on each site policy. Technologies are supported but manual assessment is\nrequired.", "props": [ @@ -16509,7 +16550,7 @@ ] }, { - "uuid": "8fec617c-fd39-4bb2-a080-0aef627c0887", + "uuid": "32524bea-c726-4f43-82cf-6b6a13e05f3b", "control-id": "pcidss_4_5-2.2", "description": "The description for control-id pcidss_4_5-2.2.", "props": [ @@ -16522,7 +16563,7 @@ ] }, { - "uuid": "53209025-bc97-4755-97c0-e6d9f9d338e1", + "uuid": "9fc64eef-8e8f-4e70-a68a-3eb911a037e6", "control-id": "pcidss_4_5-2.3.1", "description": "The description for control-id pcidss_4_5-2.3.1.", "props": [ @@ -16535,7 +16576,7 @@ ] }, { - "uuid": "da3ce805-9c5f-4a09-a17a-905d20514c77", + "uuid": "c6698a14-1599-4b46-8ab9-05a2e94428f2", "control-id": "pcidss_4_5-3.1", "description": "The description for control-id pcidss_4_5-3.1.", "props": [ @@ -16548,7 +16589,7 @@ ] }, { - "uuid": "b805696d-f1d7-491a-9998-19c3483b1baa", + "uuid": "7e5cb81f-308b-495e-9c59-d267176c622c", "control-id": "pcidss_4_5-3.2.1", "description": "The description for control-id pcidss_4_5-3.2.1.", "props": [ @@ -16561,7 +16602,7 @@ ] }, { - "uuid": "55daccfd-8b1d-427b-9710-d2889b19caad", + "uuid": "a1bf7463-a885-41b7-be21-32d04154d344", "control-id": "pcidss_4_5-3.3", "description": "The description for control-id pcidss_4_5-3.3.", "props": [ @@ -16574,7 +16615,7 @@ ] }, { - "uuid": "d053839b-8b82-46f4-a1f3-3e0e5b527b4e", + "uuid": "915926ab-4e56-46cf-8916-5c36d98acbfa", "control-id": "pcidss_4_5-3.4", "description": "The description for control-id pcidss_4_5-3.4.", "props": [ @@ -16587,7 +16628,7 @@ ] }, { - "uuid": "f3074520-158b-44d2-9c8e-dafc7baf1866", + "uuid": "c702e287-1124-47e7-b12d-f22fd8bd6d40", "control-id": "pcidss_4_5-3.5", "description": "The description for control-id pcidss_4_5-3.5.", "props": [ @@ -16600,7 +16641,7 @@ ] }, { - "uuid": "ccdd8066-fc19-4982-8ef5-0b2ac281702e", + "uuid": "9d669776-c0d7-4ec7-899a-e49898bbd843", "control-id": "pcidss_4_5-4.1", "description": "The description for control-id pcidss_4_5-4.1.", "props": [ @@ -16613,7 +16654,7 @@ ] }, { - "uuid": "ecfb0444-91a9-4983-8823-f665ea5dc763", + "uuid": "1d7f8873-cb35-4f18-bfc0-6282153ec228", "control-id": "pcidss_4_6-1.1", "description": "The description for control-id pcidss_4_6-1.1.", "props": [ @@ -16626,7 +16667,7 @@ ] }, { - "uuid": "09a909a6-9780-49aa-bd09-4eeb94fc77ac", + "uuid": "422d9aa7-b0a1-441a-8871-80c230179a43", "control-id": "pcidss_4_6-1.2", "description": "The description for control-id pcidss_4_6-1.2.", "props": [ @@ -16639,7 +16680,7 @@ ] }, { - "uuid": "2a88109a-980e-421c-a18b-e6fd4fbdce51", + "uuid": "96593e8a-ccf3-4785-8f34-95a07fa3fd6e", "control-id": "pcidss_4_6-2.1", "description": "The description for control-id pcidss_4_6-2.1.", "props": [ @@ -16652,7 +16693,7 @@ ] }, { - "uuid": "6f8d6cc5-c0aa-4aba-bfff-a71fe5693fd9", + "uuid": "53b8ba7b-1b1e-4601-b603-88ef8744f914", "control-id": "pcidss_4_6-2.2", "description": "The description for control-id pcidss_4_6-2.2.", "props": [ @@ -16665,7 +16706,7 @@ ] }, { - "uuid": "b89fae01-0a95-45bb-8e75-8f744c4cddee", + "uuid": "49203f27-58f7-4d97-a331-d77922edbd93", "control-id": "pcidss_4_6-2.3.1", "description": "The description for control-id pcidss_4_6-2.3.1.", "props": [ @@ -16678,7 +16719,7 @@ ] }, { - "uuid": "04187f38-0159-44c5-88ed-ba4feeaf9a10", + "uuid": "a2766dbc-260a-4f48-a5d0-aeb82cee5265", "control-id": "pcidss_4_6-2.4", "description": "The description for control-id pcidss_4_6-2.4.", "props": [ @@ -16691,7 +16732,7 @@ ] }, { - "uuid": "5afabb5b-a0a7-4650-94df-7640c4ed9fe9", + "uuid": "4d2747fe-7b36-4ab3-b943-9b39a53ad59a", "control-id": "pcidss_4_6-3.1", "description": "The description for control-id pcidss_4_6-3.1.", "props": [ @@ -16704,7 +16745,7 @@ ] }, { - "uuid": "605758f3-bff5-4688-b105-6a97469becb2", + "uuid": "eb07b638-094e-4a5d-bdbe-c48ff09e5280", "control-id": "pcidss_4_6-3.2", "description": "The description for control-id pcidss_4_6-3.2.", "props": [ @@ -16717,7 +16758,7 @@ ] }, { - "uuid": "d62d844f-a5f6-43e6-9425-fdb1c1060f6b", + "uuid": "00ba2d6e-80a0-4488-9b59-a36cf7b67b98", "control-id": "pcidss_4_6-3.3", "description": "No notes for control-id 6.3.3.", "props": [ @@ -16731,6 +16772,11 @@ "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", "value": "ensure_redhat_gpgkey_installed" }, + { + "name": "Rule_Id", + "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", + "value": "package_sequoia-sq_installed" + }, { "name": "Rule_Id", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", @@ -16744,7 +16790,7 @@ ] }, { - "uuid": "6c133279-e02e-4350-bc04-95694a85ad16", + "uuid": "75122bed-96d8-49b8-b446-48a05fb851ff", "control-id": "pcidss_4_6-4.1", "description": "The description for control-id pcidss_4_6-4.1.", "props": [ @@ -16757,7 +16803,7 @@ ] }, { - "uuid": "fd051a4b-fadf-4b0b-a860-9221e6b690ac", + "uuid": "b907d6a7-8f60-4cbd-ac79-fe7bd7a25fc6", "control-id": "pcidss_4_6-4.2", "description": "The description for control-id pcidss_4_6-4.2.", "props": [ @@ -16770,7 +16816,7 @@ ] }, { - "uuid": "00d6633d-c461-40be-a6b3-94fadc8e2e5b", + "uuid": "6455831d-cb14-4b2c-b89f-6c5bc17115af", "control-id": "pcidss_4_6-4.3", "description": "The description for control-id pcidss_4_6-4.3.", "props": [ @@ -16783,7 +16829,7 @@ ] }, { - "uuid": "b88f02c9-2ea4-4332-96ad-da60cfd59022", + "uuid": "ec84557c-e5e0-4f67-9ed0-7e86213849b5", "control-id": "pcidss_4_6-5.1", "description": "The description for control-id pcidss_4_6-5.1.", "props": [ @@ -16796,7 +16842,7 @@ ] }, { - "uuid": "13e3d65f-f3f4-4156-a0b3-60cab1018739", + "uuid": "e7e1f087-4a21-48d0-a3d9-d642f2474c73", "control-id": "pcidss_4_6-5.2", "description": "The description for control-id pcidss_4_6-5.2.", "props": [ @@ -16809,7 +16855,7 @@ ] }, { - "uuid": "8e80557d-414d-4137-bb5b-b63a4956d85f", + "uuid": "6329a3ae-bade-418b-84f5-8ad50620ea0a", "control-id": "pcidss_4_6-5.3", "description": "The description for control-id pcidss_4_6-5.3.", "props": [ @@ -16822,7 +16868,7 @@ ] }, { - "uuid": "d557c83a-1668-41f0-a7b2-2117abe56cb7", + "uuid": "a8433409-8120-4922-b730-c4f1f6b62793", "control-id": "pcidss_4_6-5.4", "description": "The description for control-id pcidss_4_6-5.4.", "props": [ @@ -16835,7 +16881,7 @@ ] }, { - "uuid": "89d544ac-37f2-47df-813a-cd88a1fca652", + "uuid": "de95caa5-f3f9-4fea-b03b-4c34f3554bd9", "control-id": "pcidss_4_6-5.5", "description": "The description for control-id pcidss_4_6-5.5.", "props": [ @@ -16848,7 +16894,7 @@ ] }, { - "uuid": "1ec3b79f-92de-4552-86d9-2ffc351c1e02", + "uuid": "1a5869b0-0fe4-40fe-b6db-71bf9817eeee", "control-id": "pcidss_4_6-5.6", "description": "The description for control-id pcidss_4_6-5.6.", "props": [ @@ -16861,7 +16907,7 @@ ] }, { - "uuid": "9373bed4-ec4e-4c1c-a016-8326a378dd56", + "uuid": "f351ab80-a131-42de-9f70-c49acee7f0f3", "control-id": "pcidss_4_7-1.1", "description": "The description for control-id pcidss_4_7-1.1.", "props": [ @@ -16874,7 +16920,7 @@ ] }, { - "uuid": "410cdf37-41fb-40bf-8f81-7c15502a3b8a", + "uuid": "c172efbb-1eed-421b-9eb0-ed2389b41462", "control-id": "pcidss_4_7-1.2", "description": "The description for control-id pcidss_4_7-1.2.", "props": [ @@ -16887,7 +16933,7 @@ ] }, { - "uuid": "a37d000c-6b4a-44cc-a4a0-1657e69de04b", + "uuid": "508d554d-549f-4615-8b74-f38334c0165d", "control-id": "pcidss_4_7-2.1", "description": "The description for control-id pcidss_4_7-2.1.", "props": [ @@ -16900,7 +16946,7 @@ ] }, { - "uuid": "56065cf5-01c6-48fe-955d-8ee21bbb0701", + "uuid": "163d47bd-74ad-4573-81c2-fe1d11bbf312", "control-id": "pcidss_4_7-2.2", "description": "The description for control-id pcidss_4_7-2.2.", "props": [ @@ -16913,7 +16959,7 @@ ] }, { - "uuid": "7e8914f0-a7a8-40df-999e-2936a49c4e97", + "uuid": "33cdaf7b-e060-41e7-81fa-8ac9a3327988", "control-id": "pcidss_4_7-2.3", "description": "The description for control-id pcidss_4_7-2.3.", "props": [ @@ -16926,7 +16972,7 @@ ] }, { - "uuid": "b9cf28a2-ca26-48c8-9cf3-a599de0b2123", + "uuid": "2c4774b3-12ed-451a-b748-1949ad420eee", "control-id": "pcidss_4_7-2.4", "description": "The description for control-id pcidss_4_7-2.4.", "props": [ @@ -16939,7 +16985,7 @@ ] }, { - "uuid": "4f074311-54a9-4ec3-9481-f2dd8dc968c3", + "uuid": "60b4db24-6541-4685-9e9d-df896bf5de0c", "control-id": "pcidss_4_7-2.5.1", "description": "The description for control-id pcidss_4_7-2.5.1.", "props": [ @@ -16952,7 +16998,7 @@ ] }, { - "uuid": "7220c5c1-2a92-4c3e-8ed3-27cd41850f82", + "uuid": "6c22dee7-8625-4737-8da4-89544f5f96fa", "control-id": "pcidss_4_7-2.6", "description": "The description for control-id pcidss_4_7-2.6.", "props": [ @@ -16965,7 +17011,7 @@ ] }, { - "uuid": "77a52f79-49fd-4929-b457-cb62ba62573e", + "uuid": "f2f41e04-3246-423c-835f-0898e11e8e70", "control-id": "pcidss_4_7-3.1", "description": "The description for control-id pcidss_4_7-3.1.", "props": [ @@ -16978,7 +17024,7 @@ ] }, { - "uuid": "f1920801-757a-443a-81b8-df739d5fdf45", + "uuid": "5c32aae8-9262-46cf-bf34-64237a4c8d3f", "control-id": "pcidss_4_7-3.2", "description": "The description for control-id pcidss_4_7-3.2.", "props": [ @@ -16991,7 +17037,7 @@ ] }, { - "uuid": "dadc5ffb-0be4-49bb-9464-8e610304671c", + "uuid": "4fd48b51-9b76-46c0-ad66-b4c0f28309c9", "control-id": "pcidss_4_7-3.3", "description": "The description for control-id pcidss_4_7-3.3.", "props": [ @@ -17004,7 +17050,7 @@ ] }, { - "uuid": "fd769fb9-5438-4a69-ac81-6603e3707dcb", + "uuid": "6c820426-6eba-484f-8e8f-0fedc846b653", "control-id": "pcidss_4_8-1.1", "description": "The description for control-id pcidss_4_8-1.1.", "props": [ @@ -17017,7 +17063,7 @@ ] }, { - "uuid": "9ab8b5ed-8121-47ee-a33c-08b0cf3beaf0", + "uuid": "42c07623-8ca5-4095-8654-f86ed1fe9363", "control-id": "pcidss_4_8-1.2", "description": "The description for control-id pcidss_4_8-1.2.", "props": [ @@ -17030,7 +17076,7 @@ ] }, { - "uuid": "6196e842-d505-4353-9510-1bf92b2f3742", + "uuid": "b911fae4-705d-4376-a035-f0cd5a17c93c", "control-id": "pcidss_4_8-2.1", "description": "The description for control-id pcidss_4_8-2.1.", "props": [ @@ -17073,7 +17119,7 @@ ] }, { - "uuid": "7ddc9e28-0fdc-4654-a0e7-ea9585f7caa9", + "uuid": "30d89b2e-dcbd-45ab-a39a-cfc4d7180ce1", "control-id": "pcidss_4_8-2.2", "description": "This requirement is complemented by 8.2.1 and related to 8.3.5.", "props": [ @@ -17100,7 +17146,7 @@ ] }, { - "uuid": "0ce93b57-019c-4b96-8ce0-7c27e00a9d1c", + "uuid": "6ed1e7cf-e9a3-42ef-a49c-82883a94cc94", "control-id": "pcidss_4_8-2.3", "description": "The description for control-id pcidss_4_8-2.3.", "props": [ @@ -17113,7 +17159,7 @@ ] }, { - "uuid": "cce35fc4-d0f8-4195-9466-fa52667e50d6", + "uuid": "1d632c27-ed44-41db-8666-fe11b7625e4e", "control-id": "pcidss_4_8-2.4", "description": "The description for control-id pcidss_4_8-2.4.", "props": [ @@ -17126,7 +17172,7 @@ ] }, { - "uuid": "cc3c8d2a-17c5-4c3f-bf40-06d59e98c8b1", + "uuid": "85a3f6a2-3788-4c0a-8c9f-16948fdd27ad", "control-id": "pcidss_4_8-2.5", "description": "The description for control-id pcidss_4_8-2.5.", "props": [ @@ -17139,7 +17185,7 @@ ] }, { - "uuid": "ab6fc7e5-7c4b-4b50-b588-78acbf97ad95", + "uuid": "7052f529-8584-4e39-aa47-52b2bbee9820", "control-id": "pcidss_4_8-2.6", "description": "Also related to requirements 2.2.2 and 8.3.5.", "props": [ @@ -17161,7 +17207,7 @@ ] }, { - "uuid": "b19cb6fa-aab4-4e36-a975-efa4d47271a5", + "uuid": "8801c32a-4a3e-4def-8617-cf9bbc29f254", "control-id": "pcidss_4_8-2.7", "description": "The description for control-id pcidss_4_8-2.7.", "props": [ @@ -17174,7 +17220,7 @@ ] }, { - "uuid": "32933f3a-685d-473d-94fb-6153ada5fbc5", + "uuid": "029c9ff7-7235-4351-ad18-4a653f36f022", "control-id": "pcidss_4_8-2.8", "description": "No notes for control-id 8.2.8.", "props": [ @@ -17231,7 +17277,7 @@ ] }, { - "uuid": "0b60b29f-f992-48a1-b9f2-7165773a4a1b", + "uuid": "1bdb8711-7a0e-4eb0-939d-dcef49050614", "control-id": "pcidss_4_8-3.1", "description": "No notes for control-id 8.3.1.", "props": [ @@ -17263,7 +17309,7 @@ ] }, { - "uuid": "e46bf63c-bec8-4d53-8430-f48e22c10221", + "uuid": "db5e42ca-b08a-4212-9e25-a2cc9b2c4204", "control-id": "pcidss_4_8-3.2", "description": "There are similar rules that might be redundant for some distros.", "props": [ @@ -17295,7 +17341,7 @@ ] }, { - "uuid": "88953503-e438-4e20-b79c-48a7cba11143", + "uuid": "ee0717ee-b53b-4c4d-8210-0ddb1e1b2d79", "control-id": "pcidss_4_8-3.3", "description": "The description for control-id pcidss_4_8-3.3.", "props": [ @@ -17308,7 +17354,7 @@ ] }, { - "uuid": "193cc2c7-9dfc-4464-9cf4-57f1a75d58c7", + "uuid": "e91b5cde-9c29-4f6f-8c71-54f1b97c5465", "control-id": "pcidss_4_8-3.4", "description": "No notes for control-id 8.3.4.", "props": [ @@ -17330,7 +17376,7 @@ ] }, { - "uuid": "f744cfcc-8123-41e4-919e-d2c485ed1fc1", + "uuid": "252477cc-3ba6-4afe-b21e-919ed6f1bb3c", "control-id": "pcidss_4_8-3.5", "description": "Also related to requirement 2.2.2, 8.2.2 and 8.2.6.", "props": [ @@ -17347,7 +17393,7 @@ ] }, { - "uuid": "e8941814-508f-47e0-ab58-09214f90380e", + "uuid": "5901a6f1-e67b-464c-84b0-d8e41a3d1e80", "control-id": "pcidss_4_8-3.6", "description": "This requirement is not intended to apply to:\n- User accounts on point-of-sale terminals that have access to only one card number at a\ntime to facilitate a single transaction (such as IDs used by cashiers on point-of-sale\nterminals).\n- Application or system accounts, which are governed by requirements in section 8.6.", "props": [ @@ -17374,7 +17420,7 @@ ] }, { - "uuid": "3e80d13e-500c-48ef-afbf-1297215aaa43", + "uuid": "0273be09-e61a-4aec-b61e-61bd3ec11497", "control-id": "pcidss_4_8-3.7", "description": "This requirement is not intended to apply to user accounts on point-of-sale terminals that\nhave access to only one card number at a time to facilitate a single transaction (such as\nIDs used by cashiers on point-of-sale terminals).\nFor RHEL 8 and RHEL 9 systems, the accounts_password_pam_pwhistory_... rules should be\nprefered in detriment of accounts_password_pam_unix_remember. Using both should not create\nconflict but is unnecessary and the last should be filtered out from the profile.", "props": [ @@ -17401,7 +17447,7 @@ ] }, { - "uuid": "9438c318-ac09-4e22-bdda-3d84551f6a01", + "uuid": "ab690703-e920-48ee-b3e8-3b8bbbc80356", "control-id": "pcidss_4_8-3.8", "description": "The description for control-id pcidss_4_8-3.8.", "props": [ @@ -17414,7 +17460,7 @@ ] }, { - "uuid": "c4388b66-da81-4dba-8581-6f4726a1a665", + "uuid": "1337a4ae-39d7-4447-b67f-f915cfc7ed51", "control-id": "pcidss_4_8-3.9", "description": "The requirement does not explicitily define the number of days before the password\nexpiration to warn the users, but the relevant rules were selected here as they do not\ncause any problems in combination with password lifetime rules.", "props": [ @@ -17446,7 +17492,7 @@ ] }, { - "uuid": "7b6fa2db-18d8-4a06-ba68-838a4b4f93ce", + "uuid": "f8a47ee0-dfbb-4509-89de-45139f2feef0", "control-id": "pcidss_4_8-3.10.1", "description": "This requirement is already covered by 8.3.9.", "props": [ @@ -17458,7 +17504,7 @@ ] }, { - "uuid": "fe982730-f394-4468-8de1-2b680f404275", + "uuid": "544b42ad-cadf-4060-aec7-1e4c083eb338", "control-id": "pcidss_4_8-3.11", "description": "The description for control-id pcidss_4_8-3.11.", "props": [ @@ -17471,7 +17517,7 @@ ] }, { - "uuid": "2123b627-9997-4042-bedb-c320d2f3e216", + "uuid": "dd81e452-dfd3-474b-874c-149ca927c4c2", "control-id": "pcidss_4_8-4.1", "description": "No notes for control-id 8.4.1.", "props": [ @@ -17483,7 +17529,7 @@ ] }, { - "uuid": "f5356b11-739a-405b-8a17-6606b9567142", + "uuid": "b15a06d5-884e-4810-b7ca-9ee0ef177764", "control-id": "pcidss_4_8-4.2", "description": "The description for control-id pcidss_4_8-4.2.", "props": [ @@ -17496,7 +17542,7 @@ ] }, { - "uuid": "00c48726-35f0-415c-a49c-6e9f3d87db03", + "uuid": "acd63d47-0710-4122-bcd7-70e391f42954", "control-id": "pcidss_4_8-4.3", "description": "The description for control-id pcidss_4_8-4.3.", "props": [ @@ -17509,7 +17555,7 @@ ] }, { - "uuid": "11d67754-492c-44e2-acf5-1ba76009acb9", + "uuid": "57441db0-fbd2-4ec0-b59d-51dbeddda268", "control-id": "pcidss_4_8-5.1", "description": "The description for control-id pcidss_4_8-5.1.", "props": [ @@ -17522,7 +17568,7 @@ ] }, { - "uuid": "854bbd5d-23fd-47ff-a40b-c774aceb1d07", + "uuid": "601ba051-5626-4274-a45a-4f13ad0e7b4a", "control-id": "pcidss_4_8-6.1", "description": "This requirement is related to 2.2.2, 2.2.6, 8.2.1 and 8.2.2. Specifically on 8.2.2 system\naccounts usage is restricted. Exceptions to system accounts should be manually checked to\nensure the requirements in description. This requirement although implements some extra\ncontrols regarding root account.", "props": [ @@ -17549,7 +17595,7 @@ ] }, { - "uuid": "a442c741-05b1-4e1e-a1fa-f1061c1bae1c", + "uuid": "ca896e2e-f86c-46cc-b796-adf41c0486e2", "control-id": "pcidss_4_8-6.2", "description": "The description for control-id pcidss_4_8-6.2.", "props": [ @@ -17562,7 +17608,7 @@ ] }, { - "uuid": "7ed7b928-5497-4c4c-9ec7-a04b21f341c5", + "uuid": "09a8c4c3-3dd8-495d-913e-ecf0717a2c42", "control-id": "pcidss_4_8-6.3", "description": "Related to requirements 8.3.6 and 8.3.9.", "props": [ @@ -17574,7 +17620,7 @@ ] }, { - "uuid": "c0280898-aebc-429f-bf88-7055d93faaf0", + "uuid": "0de668e2-15cb-48f7-9844-88f7600e7da7", "control-id": "pcidss_4_9-1.1", "description": "The description for control-id pcidss_4_9-1.1.", "props": [ @@ -17587,7 +17633,7 @@ ] }, { - "uuid": "1b9f4ac2-8044-479d-b066-c8e8d1402436", + "uuid": "5e2bc6ea-c879-4411-9417-587778af92d3", "control-id": "pcidss_4_9-1.2", "description": "The description for control-id pcidss_4_9-1.2.", "props": [ @@ -17600,7 +17646,7 @@ ] }, { - "uuid": "37dc18f2-ca57-4d32-91a6-212535d78f4e", + "uuid": "f72462e3-3f0b-4830-afa5-bf8525706c35", "control-id": "pcidss_4_9-2.1.1", "description": "The description for control-id pcidss_4_9-2.1.1.", "props": [ @@ -17613,7 +17659,7 @@ ] }, { - "uuid": "81dee0a6-8bef-4c15-b951-8d18de06a440", + "uuid": "c362e2fb-1119-4f10-9fe4-bdfd08803d50", "control-id": "pcidss_4_9-2.2", "description": "The description for control-id pcidss_4_9-2.2.", "props": [ @@ -17626,7 +17672,7 @@ ] }, { - "uuid": "ea917a4e-7945-4e9c-ae00-c09a9e4f8fe8", + "uuid": "81b1eb52-5745-4c3c-b38f-fc74ee3f2a96", "control-id": "pcidss_4_9-2.3", "description": "The description for control-id pcidss_4_9-2.3.", "props": [ @@ -17639,7 +17685,7 @@ ] }, { - "uuid": "681c9316-74a1-42ff-bb8b-6dce89337fd7", + "uuid": "fe3cd312-f3a1-4a37-ae74-e71392dc9a04", "control-id": "pcidss_4_9-2.4", "description": "The description for control-id pcidss_4_9-2.4.", "props": [ @@ -17652,7 +17698,7 @@ ] }, { - "uuid": "a70bb259-6f0d-4d93-92f1-69a60c1657fe", + "uuid": "c07576e5-ab9e-4910-ba66-4e85c205a008", "control-id": "pcidss_4_9-3.1.1", "description": "The description for control-id pcidss_4_9-3.1.1.", "props": [ @@ -17665,7 +17711,7 @@ ] }, { - "uuid": "9a68cbd4-efd5-4e2d-b4ac-b53de853af1e", + "uuid": "fd246425-f682-4161-8446-8f300389904c", "control-id": "pcidss_4_9-3.2", "description": "The description for control-id pcidss_4_9-3.2.", "props": [ @@ -17678,7 +17724,7 @@ ] }, { - "uuid": "676463a1-7e80-4a16-88b8-3c6c6f2b7f5b", + "uuid": "8acdc158-9c3e-4684-b024-ca12d6b864fb", "control-id": "pcidss_4_9-3.3", "description": "The description for control-id pcidss_4_9-3.3.", "props": [ @@ -17691,7 +17737,7 @@ ] }, { - "uuid": "c9f3498a-db63-4e27-9606-a899a36aebf1", + "uuid": "c53c9350-f395-4fc4-9a70-650e46ef9d75", "control-id": "pcidss_4_9-3.4", "description": "The description for control-id pcidss_4_9-3.4.", "props": [ @@ -17704,7 +17750,7 @@ ] }, { - "uuid": "66a2b4c9-035e-40d0-927c-9dea0f286b09", + "uuid": "b4fd322e-08f7-4f20-b2d9-bfa0737f1b93", "control-id": "pcidss_4_9-4.1.1", "description": "The description for control-id pcidss_4_9-4.1.1.", "props": [ @@ -17717,7 +17763,7 @@ ] }, { - "uuid": "a6f0899c-862e-4aee-b9b2-894f5ee070b5", + "uuid": "a325ce8f-aeb9-4d1e-8e89-dce035311164", "control-id": "pcidss_4_9-4.1.2", "description": "The description for control-id pcidss_4_9-4.1.2.", "props": [ @@ -17730,7 +17776,7 @@ ] }, { - "uuid": "a9409879-a273-4a64-a02a-7344f2421de1", + "uuid": "ae590699-8c34-4e17-8182-7ffec0f6bf2a", "control-id": "pcidss_4_9-4.2", "description": "The description for control-id pcidss_4_9-4.2.", "props": [ @@ -17743,7 +17789,7 @@ ] }, { - "uuid": "1961b60f-e600-4717-9031-356dc55ee144", + "uuid": "5a1bb062-32ab-43dd-8a38-0118657138f2", "control-id": "pcidss_4_9-4.3", "description": "The description for control-id pcidss_4_9-4.3.", "props": [ @@ -17756,7 +17802,7 @@ ] }, { - "uuid": "91c43136-54e0-4ca2-82cd-3ab53e325ed1", + "uuid": "5d50f2d6-e49e-4acf-b022-eaf2aeb8744b", "control-id": "pcidss_4_9-4.4", "description": "The description for control-id pcidss_4_9-4.4.", "props": [ @@ -17769,7 +17815,7 @@ ] }, { - "uuid": "4ba1d7a6-3536-4d9d-9d07-f444fe181a0d", + "uuid": "16bb9d48-c45c-4916-b994-b6a3981cc270", "control-id": "pcidss_4_9-4.5.1", "description": "The description for control-id pcidss_4_9-4.5.1.", "props": [ @@ -17782,7 +17828,7 @@ ] }, { - "uuid": "c0e43da2-89aa-405b-a7ca-2be73be5d80b", + "uuid": "2af9468c-b654-4807-a23c-7a950ab9c3a6", "control-id": "pcidss_4_9-4.6", "description": "The description for control-id pcidss_4_9-4.6.", "props": [ @@ -17795,7 +17841,7 @@ ] }, { - "uuid": "92e6a19c-aad0-4d5a-8590-55ead762217d", + "uuid": "29a51c92-b1e0-4ce9-b7fa-f9033297db3c", "control-id": "pcidss_4_9-4.7", "description": "The description for control-id pcidss_4_9-4.7.", "props": [ @@ -17808,7 +17854,7 @@ ] }, { - "uuid": "8f2e9e31-16b6-4adb-8e1b-0b143e633532", + "uuid": "3705dd7d-19fe-4d9f-b001-aa78ab57c861", "control-id": "pcidss_4_9-5.1.1", "description": "The description for control-id pcidss_4_9-5.1.1.", "props": [ @@ -17821,7 +17867,7 @@ ] }, { - "uuid": "97afe940-3601-4d89-99a9-1cf3ea414e97", + "uuid": "f1a0c91d-b41a-4583-8bf8-4e1320e23519", "control-id": "pcidss_4_9-5.1.2.1", "description": "The description for control-id pcidss_4_9-5.1.2.1.", "props": [ @@ -17834,7 +17880,7 @@ ] }, { - "uuid": "92c6cb42-08eb-4a02-aa80-fa36b1c05525", + "uuid": "e6a820f6-ca5e-4016-9f41-494efd55e111", "control-id": "pcidss_4_9-5.1.3", "description": "The description for control-id pcidss_4_9-5.1.3.", "props": [ @@ -17847,7 +17893,7 @@ ] }, { - "uuid": "b5339f86-1797-4e56-b349-c0f5a18df548", + "uuid": "c4f39dc6-021d-483a-ab56-f71c901f2abd", "control-id": "pcidss_4_10-1.1", "description": "The description for control-id pcidss_4_10-1.1.", "props": [ @@ -17860,7 +17906,7 @@ ] }, { - "uuid": "e886b484-711c-4e5e-9968-cf477a62fbd7", + "uuid": "742ded6f-0391-4df2-a7f6-1e4fe7c9250f", "control-id": "pcidss_4_10-1.2", "description": "The description for control-id pcidss_4_10-1.2.", "props": [ @@ -17873,7 +17919,7 @@ ] }, { - "uuid": "e8607493-5fbb-4e74-b566-13b9e2d0c3bd", + "uuid": "3b1514ba-b040-4703-84a4-646032c6a4d1", "control-id": "pcidss_4_10-2.1.1", "description": "The description for control-id pcidss_4_10-2.1.1.", "props": [ @@ -17886,7 +17932,7 @@ ] }, { - "uuid": "27e5de04-e33e-4b75-9b65-6532ac2dd7f0", + "uuid": "9be33227-b0ab-4e94-a996-97b884066b5c", "control-id": "pcidss_4_10-2.1.2", "description": "Not all privileged commands have suid or sgid enabled. We probably want to include more\nrules for this requirement.", "props": [ @@ -17903,7 +17949,7 @@ ] }, { - "uuid": "9098b93e-c4f8-4c30-8042-0e74039edcf3", + "uuid": "4bd0c176-7aa3-449c-a354-30f0ccc84384", "control-id": "pcidss_4_10-2.1.3", "description": "No notes for control-id 10.2.1.3.", "props": [ @@ -17950,7 +17996,7 @@ ] }, { - "uuid": "ac30f58e-1de8-42fc-a058-c068d9c467db", + "uuid": "d491404d-a3b0-4c03-9f60-9e55b6523a80", "control-id": "pcidss_4_10-2.1.4", "description": "No notes for control-id 10.2.1.4.", "props": [ @@ -17967,7 +18013,7 @@ ] }, { - "uuid": "8c3ebc71-08b2-43c6-b9c4-692fc97bbd9d", + "uuid": "f0020751-9b80-484a-bcba-a3740e638628", "control-id": "pcidss_4_10-2.1.5", "description": "No notes for control-id 10.2.1.5.", "props": [ @@ -18009,7 +18055,7 @@ ] }, { - "uuid": "3b365c39-3b1b-4858-ab97-af06d0b4d0c6", + "uuid": "f142316e-0563-40a9-85f9-cfcdab9ff842", "control-id": "pcidss_4_10-2.1.6", "description": "The description for control-id pcidss_4_10-2.1.6.", "props": [ @@ -18022,7 +18068,7 @@ ] }, { - "uuid": "40e77d07-70f1-4382-9be7-2346cde72100", + "uuid": "b0b7cdc2-7364-4043-acc7-bf90d1c3fac0", "control-id": "pcidss_4_10-2.1.7", "description": "There are enough rules to capture deletion events but not for creation events.\nThis requirement needs to be better investigated to confirm which additional rules would\nsatistfy the requirement.", "props": [ @@ -18069,7 +18115,7 @@ ] }, { - "uuid": "03a1c9ab-5609-4316-b8c0-22741bdb8db1", + "uuid": "fd6dd3b9-a18a-4763-9bc6-f3ab9f60421f", "control-id": "pcidss_4_10-2.2", "description": "Standard settings for audit should be enough.", "props": [ @@ -18086,7 +18132,7 @@ ] }, { - "uuid": "19f64298-1f92-4155-8ccb-3d2f37c03c61", + "uuid": "7cd5aec4-78fc-4ce8-b597-7494f94b5c76", "control-id": "pcidss_4_10-3.1", "description": "No notes for control-id 10.3.1.", "props": [ @@ -18113,7 +18159,7 @@ ] }, { - "uuid": "5c179a8a-823b-46ba-b733-31c70155df4b", + "uuid": "226e7a47-3ebc-4f0b-8364-9f7db4985fe4", "control-id": "pcidss_4_10-3.2", "description": "No notes for control-id 10.3.2.", "props": [ @@ -18150,7 +18196,7 @@ ] }, { - "uuid": "f67cb13d-acf5-438d-bd54-fc2fe4eadad8", + "uuid": "f12c6a12-ff82-46ba-a61b-49227de6f43b", "control-id": "pcidss_4_10-3.3", "description": "Although the technologies in general allow to send logs to a centralized server, some\nparameters for this configuration are specific to each site policy and therefore the\nrequirement demands manual assessment.", "props": [ @@ -18172,7 +18218,7 @@ ] }, { - "uuid": "05f0f221-18ab-46dc-ad5e-a9ccc5eca0db", + "uuid": "c5da10f5-e495-4af2-a21f-d56c4ef54097", "control-id": "pcidss_4_10-3.4", "description": "No notes for control-id 10.3.4.", "props": [ @@ -18264,7 +18310,7 @@ ] }, { - "uuid": "7200e6a4-f363-4ec4-966c-25b7764763b3", + "uuid": "c62fac83-71a6-4174-b2d0-89d2efc89089", "control-id": "pcidss_4_10-4.1.1", "description": "The description for control-id pcidss_4_10-4.1.1.", "props": [ @@ -18277,7 +18323,7 @@ ] }, { - "uuid": "baac620e-f83c-4759-ac21-f5042981aa40", + "uuid": "30d35f80-ac5c-4168-8565-7b2ca8d58aa3", "control-id": "pcidss_4_10-4.2.1", "description": "The description for control-id pcidss_4_10-4.2.1.", "props": [ @@ -18290,7 +18336,7 @@ ] }, { - "uuid": "e90eb576-4500-4267-a6b3-2c84ab4aab37", + "uuid": "7bb993fd-71a3-4e7b-9099-f91467ab2950", "control-id": "pcidss_4_10-4.3", "description": "The description for control-id pcidss_4_10-4.3.", "props": [ @@ -18303,7 +18349,7 @@ ] }, { - "uuid": "1c54de51-7d29-4d71-bf84-43bf031bdf76", + "uuid": "f7ef0b45-caac-420e-b638-5ab9569d49a0", "control-id": "pcidss_4_10-5.1", "description": "It is not simple to ensure 12 months history is present in each system but the rules in\nthis requirement ensures the logs are not lost without administrators awareness.", "props": [ @@ -18340,7 +18386,7 @@ ] }, { - "uuid": "e2c1d8ec-1280-46fb-b8c8-0cec9775d948", + "uuid": "e4f50991-5e66-47c4-be71-620daf65449d", "control-id": "pcidss_4_10-6.1", "description": "Maybe it is possible to optmize some similar rules related to ntp.", "props": [ @@ -18357,7 +18403,7 @@ ] }, { - "uuid": "89844b70-36a8-4729-ba42-a1297c9ab5b5", + "uuid": "43f0a294-5181-4417-993a-b5c91c2919f2", "control-id": "pcidss_4_10-6.2", "description": "The selected rules might need updates in order to restrict their platform applicability\nto avoid conflicts.", "props": [ @@ -18374,7 +18420,7 @@ ] }, { - "uuid": "9f02f7c1-5d8f-4689-aa4c-5052cc76aee9", + "uuid": "3ef64294-7c7d-4a1f-9266-81c870e77b99", "control-id": "pcidss_4_10-6.3", "description": "No notes for control-id 10.6.3.", "props": [ @@ -18416,7 +18462,7 @@ ] }, { - "uuid": "96019657-f808-4e02-82d4-1e000eca059e", + "uuid": "c07d9d79-eec9-4ad2-8e89-d86f5e90aa81", "control-id": "pcidss_4_10-7.1", "description": "The description for control-id pcidss_4_10-7.1.", "props": [ @@ -18429,7 +18475,7 @@ ] }, { - "uuid": "b7f96da4-80ee-47e7-933e-edf9e6c94c77", + "uuid": "19dca3aa-bdcd-4f93-bbd7-39c939af56bd", "control-id": "pcidss_4_10-7.2", "description": "No notes for control-id 10.7.2.", "props": [ @@ -18451,7 +18497,7 @@ ] }, { - "uuid": "aa533014-f42a-4a7e-bb0d-52960c262673", + "uuid": "8e23a978-015e-435a-90df-9ab58875100d", "control-id": "pcidss_4_10-7.3", "description": "The description for control-id pcidss_4_10-7.3.", "props": [ @@ -18464,7 +18510,7 @@ ] }, { - "uuid": "be82e9ab-f76a-41a2-a0cc-5927f409fb72", + "uuid": "4262aeaf-e80e-4308-ad6a-76941b993743", "control-id": "pcidss_4_11-1.1", "description": "The description for control-id pcidss_4_11-1.1.", "props": [ @@ -18477,7 +18523,7 @@ ] }, { - "uuid": "1fd62c9d-5580-40e7-b622-72df0b76f79c", + "uuid": "f8861f27-e9fd-4f7a-85e3-830a871ea279", "control-id": "pcidss_4_11-1.2", "description": "The description for control-id pcidss_4_11-1.2.", "props": [ @@ -18490,7 +18536,7 @@ ] }, { - "uuid": "6f9fe5fe-bfde-4ba7-875d-f43fbf0d6972", + "uuid": "9d71b785-55c0-4a2c-849a-ed95954a4b08", "control-id": "pcidss_4_11-2.1", "description": "The description for control-id pcidss_4_11-2.1.", "props": [ @@ -18503,7 +18549,7 @@ ] }, { - "uuid": "4e5bfff3-b5ca-4fbb-a72b-5fcc7b552beb", + "uuid": "ef22e120-2e7e-4211-8e59-3b05ade00a21", "control-id": "pcidss_4_11-2.2", "description": "The description for control-id pcidss_4_11-2.2.", "props": [ @@ -18516,7 +18562,7 @@ ] }, { - "uuid": "a3e77c22-9e8b-4309-bd9a-3be2c86bb772", + "uuid": "66e5de8b-3bf2-4016-aaf3-26d37f53ff4f", "control-id": "pcidss_4_11-3.1.1", "description": "The description for control-id pcidss_4_11-3.1.1.", "props": [ @@ -18529,7 +18575,7 @@ ] }, { - "uuid": "f27eaa4d-caf9-4782-a74d-a5e4d42968d0", + "uuid": "f7cd55df-d651-4d47-b024-c95aa4915c2b", "control-id": "pcidss_4_11-3.1.2", "description": "The description for control-id pcidss_4_11-3.1.2.", "props": [ @@ -18542,7 +18588,7 @@ ] }, { - "uuid": "22824286-21ce-4c11-8050-a29d884938f4", + "uuid": "e929c4c7-e0f1-4d9c-bbd7-e754aa580447", "control-id": "pcidss_4_11-3.1.3", "description": "The description for control-id pcidss_4_11-3.1.3.", "props": [ @@ -18555,7 +18601,7 @@ ] }, { - "uuid": "09652cd9-681e-417d-b65b-2b81014ef04a", + "uuid": "1032e1a4-3650-48fa-99ee-4e6d444a27ce", "control-id": "pcidss_4_11-3.2.1", "description": "The description for control-id pcidss_4_11-3.2.1.", "props": [ @@ -18568,7 +18614,7 @@ ] }, { - "uuid": "94f3873a-40d9-43fc-8b83-a9742cd6c130", + "uuid": "07f0f173-65d1-4db8-9380-3ebc5ef8908f", "control-id": "pcidss_4_11-4.1", "description": "The description for control-id pcidss_4_11-4.1.", "props": [ @@ -18581,7 +18627,7 @@ ] }, { - "uuid": "e99f5c08-48f0-46b6-be85-52f46eccc7ca", + "uuid": "cbaa8119-eaf7-43b2-b93c-a9baaee06dab", "control-id": "pcidss_4_11-4.2", "description": "The description for control-id pcidss_4_11-4.2.", "props": [ @@ -18594,7 +18640,7 @@ ] }, { - "uuid": "a9734ea8-4ed0-4cc0-b14d-c4107bd82ded", + "uuid": "07ca94eb-138f-49c2-806c-225d45fe46e0", "control-id": "pcidss_4_11-4.3", "description": "The description for control-id pcidss_4_11-4.3.", "props": [ @@ -18607,7 +18653,7 @@ ] }, { - "uuid": "ea3d928e-a59c-4202-b518-849f93d04131", + "uuid": "73f5744d-7f7b-4dd6-95ee-3c732a433b9a", "control-id": "pcidss_4_11-4.4", "description": "The description for control-id pcidss_4_11-4.4.", "props": [ @@ -18620,7 +18666,7 @@ ] }, { - "uuid": "5c1cb067-8d05-46a9-af70-14e87fd8517a", + "uuid": "251e4872-2307-447e-93c7-fd86c94647c8", "control-id": "pcidss_4_11-4.5", "description": "The description for control-id pcidss_4_11-4.5.", "props": [ @@ -18633,7 +18679,7 @@ ] }, { - "uuid": "65a12d6f-c701-4612-9c8c-90881b04cf1e", + "uuid": "29dc6610-a009-4f78-a0b3-cb1228a279e7", "control-id": "pcidss_4_11-4.6", "description": "The description for control-id pcidss_4_11-4.6.", "props": [ @@ -18646,7 +18692,7 @@ ] }, { - "uuid": "572a2543-ffb8-485b-92c8-376e3b697e8d", + "uuid": "2f59f966-4189-4095-9404-be07138bc851", "control-id": "pcidss_4_11-4.7", "description": "The description for control-id pcidss_4_11-4.7.", "props": [ @@ -18659,7 +18705,7 @@ ] }, { - "uuid": "d3ecf9cb-eb19-44a6-8c6f-a77213f8dc11", + "uuid": "5a7f4469-8852-4f05-866d-73bd085cd7d8", "control-id": "pcidss_4_11-5.1.1", "description": "The description for control-id pcidss_4_11-5.1.1.", "props": [ @@ -18672,7 +18718,7 @@ ] }, { - "uuid": "b535fff8-1172-4e62-8477-fd30d6415154", + "uuid": "90b2b330-3e08-4188-91e8-ebd035763002", "control-id": "pcidss_4_11-5.2", "description": "No notes for control-id 11.5.2.", "props": [ @@ -18709,7 +18755,7 @@ ] }, { - "uuid": "7ecc5657-93bb-4202-aacf-31e3f3d9baa3", + "uuid": "f29f57e1-bf8e-474f-ad31-6318aa4286d1", "control-id": "pcidss_4_11-6.1", "description": "The description for control-id pcidss_4_11-6.1.", "props": [ @@ -18722,7 +18768,7 @@ ] }, { - "uuid": "376fef0e-8b24-43e8-b5a9-0820140733ce", + "uuid": "c8b94bf4-f034-47a8-8185-c2fbf9a142cf", "control-id": "pcidss_4_12-1.1", "description": "The description for control-id pcidss_4_12-1.1.", "props": [ @@ -18735,7 +18781,7 @@ ] }, { - "uuid": "ed2659ec-fe3a-4cd0-990d-65e714d9a48b", + "uuid": "fd21d72e-88de-4515-a042-1112269299fd", "control-id": "pcidss_4_12-1.2", "description": "The description for control-id pcidss_4_12-1.2.", "props": [ @@ -18748,7 +18794,7 @@ ] }, { - "uuid": "7621aec8-1e86-4775-b600-3f4c492224a6", + "uuid": "40698f43-5c0d-4bd3-8c23-427f3c661a47", "control-id": "pcidss_4_12-1.3", "description": "The description for control-id pcidss_4_12-1.3.", "props": [ @@ -18761,7 +18807,7 @@ ] }, { - "uuid": "4ab93a3c-84bb-4ca5-863e-57d74a2648bf", + "uuid": "c89c74fb-8397-4c04-837d-033be69a6bd3", "control-id": "pcidss_4_12-1.4", "description": "The description for control-id pcidss_4_12-1.4.", "props": [ @@ -18774,7 +18820,7 @@ ] }, { - "uuid": "c448b7d3-e401-46ef-b9e5-b3f24b619b75", + "uuid": "1d850774-1d49-4192-8ddb-72626e7c50ce", "control-id": "pcidss_4_12-2.1", "description": "The description for control-id pcidss_4_12-2.1.", "props": [ @@ -18787,7 +18833,7 @@ ] }, { - "uuid": "f77e820e-0c0c-4e9a-9905-3511b233fafa", + "uuid": "9a70d04a-365f-4d37-a195-57fa0b0e0b3c", "control-id": "pcidss_4_12-3.1", "description": "The description for control-id pcidss_4_12-3.1.", "props": [ @@ -18800,7 +18846,7 @@ ] }, { - "uuid": "c5c10daa-b051-4dba-a10e-5ec3cb89610f", + "uuid": "279332b1-5404-4de0-8d82-853b1e1bfb10", "control-id": "pcidss_4_12-3.2", "description": "The description for control-id pcidss_4_12-3.2.", "props": [ @@ -18813,7 +18859,7 @@ ] }, { - "uuid": "1f5f9afd-63da-4f0e-9a7e-21875002da07", + "uuid": "48edb6a1-b1f8-4423-82f8-3da3a8542392", "control-id": "pcidss_4_12-3.3", "description": "The description for control-id pcidss_4_12-3.3.", "props": [ @@ -18826,7 +18872,7 @@ ] }, { - "uuid": "892031b6-ff40-4029-9bbb-12efb5b6e4ef", + "uuid": "8a97f9bc-84aa-4f54-9c0b-ced2840c8ed6", "control-id": "pcidss_4_12-3.4", "description": "The description for control-id pcidss_4_12-3.4.", "props": [ @@ -18839,7 +18885,7 @@ ] }, { - "uuid": "cb087929-a5bc-4867-b1f2-f5d5de21779e", + "uuid": "839b204e-fe56-4a08-8eba-fca49d56ee72", "control-id": "pcidss_4_12-4.1", "description": "The description for control-id pcidss_4_12-4.1.", "props": [ @@ -18852,7 +18898,7 @@ ] }, { - "uuid": "4b994f9a-3bb0-4b1c-b134-c66a5a758341", + "uuid": "42d2fd95-05e2-4f61-8f51-2a3f5b594d05", "control-id": "pcidss_4_12-4.2.1", "description": "The description for control-id pcidss_4_12-4.2.1.", "props": [ @@ -18865,7 +18911,7 @@ ] }, { - "uuid": "139a6dfe-20f9-4068-81e0-51df7cad4cb5", + "uuid": "cd6e972a-06b9-48a3-9686-9e70cb8dcb4c", "control-id": "pcidss_4_12-5.1", "description": "The description for control-id pcidss_4_12-5.1.", "props": [ @@ -18878,7 +18924,7 @@ ] }, { - "uuid": "9d6b28e5-a1d7-4278-8a19-caf9ff1a9d37", + "uuid": "864f9682-7f43-4688-aed8-96a299975c73", "control-id": "pcidss_4_12-5.2.1", "description": "The description for control-id pcidss_4_12-5.2.1.", "props": [ @@ -18891,7 +18937,7 @@ ] }, { - "uuid": "51e0b791-6720-4131-8b4f-65eebe0a95da", + "uuid": "b47aa4d8-c019-42f1-9ce9-1ebd06ab538c", "control-id": "pcidss_4_12-5.3", "description": "The description for control-id pcidss_4_12-5.3.", "props": [ @@ -18904,7 +18950,7 @@ ] }, { - "uuid": "9f70fa1e-34a8-4c7a-8b10-ce4cedb3aa1a", + "uuid": "4d1f54ca-b1f6-44fa-a06d-f7ba8e171172", "control-id": "pcidss_4_12-6.1", "description": "The description for control-id pcidss_4_12-6.1.", "props": [ @@ -18917,7 +18963,7 @@ ] }, { - "uuid": "55257a7b-92ea-4758-91ae-ed555938b93c", + "uuid": "b42cae82-1145-4f8f-9351-7c9770553285", "control-id": "pcidss_4_12-6.2", "description": "The description for control-id pcidss_4_12-6.2.", "props": [ @@ -18930,7 +18976,7 @@ ] }, { - "uuid": "570e319f-4188-4c11-b800-61406eda3ff7", + "uuid": "addd101c-cba9-4f09-af68-79b2544182fc", "control-id": "pcidss_4_12-6.3.1", "description": "The description for control-id pcidss_4_12-6.3.1.", "props": [ @@ -18943,7 +18989,7 @@ ] }, { - "uuid": "fb8f8393-150d-415e-baa1-959dc138d1f1", + "uuid": "b9915085-536c-44e2-9528-a7b9333f5cde", "control-id": "pcidss_4_12-6.3.2", "description": "The description for control-id pcidss_4_12-6.3.2.", "props": [ @@ -18956,7 +19002,7 @@ ] }, { - "uuid": "9d364b38-ac78-4481-82f8-7a9a08acfcd4", + "uuid": "162f111c-3244-4158-a386-d88436815c25", "control-id": "pcidss_4_12-7.1", "description": "The description for control-id pcidss_4_12-7.1.", "props": [ @@ -18969,7 +19015,7 @@ ] }, { - "uuid": "ada23b2b-bef0-422e-a44e-4e918e541260", + "uuid": "ea82bb7f-cd82-4270-a100-59799bce8204", "control-id": "pcidss_4_12-8.1", "description": "The description for control-id pcidss_4_12-8.1.", "props": [ @@ -18982,7 +19028,7 @@ ] }, { - "uuid": "3a4525f7-87c1-4df7-bc2d-44c7ec56c287", + "uuid": "e587a8c2-6baa-4354-811d-c892f66b9d0b", "control-id": "pcidss_4_12-8.2", "description": "The description for control-id pcidss_4_12-8.2.", "props": [ @@ -18995,7 +19041,7 @@ ] }, { - "uuid": "440a8d44-d05b-4016-ae4b-0aaafc39a0d4", + "uuid": "796da077-cbd3-4fb1-9537-e109c990e4e4", "control-id": "pcidss_4_12-8.3", "description": "The description for control-id pcidss_4_12-8.3.", "props": [ @@ -19008,7 +19054,7 @@ ] }, { - "uuid": "6835b3b1-4972-4fb7-bf6d-6e051ee19bb9", + "uuid": "eeb20e08-11f7-4079-a898-6ba9aca9fc93", "control-id": "pcidss_4_12-8.4", "description": "The description for control-id pcidss_4_12-8.4.", "props": [ @@ -19021,7 +19067,7 @@ ] }, { - "uuid": "3b9de56c-ebde-414b-9d7b-9c0ec8975ea9", + "uuid": "00fd78f8-4e81-4251-bc5d-c363b99f90ca", "control-id": "pcidss_4_12-8.5", "description": "The description for control-id pcidss_4_12-8.5.", "props": [ @@ -19034,7 +19080,7 @@ ] }, { - "uuid": "25f7fad3-89e9-4ba8-a8f7-6a5ba2f29bcf", + "uuid": "3ac8f696-2902-4cf9-817f-ef5fb8b22589", "control-id": "pcidss_4_12-9.1", "description": "The description for control-id pcidss_4_12-9.1.", "props": [ @@ -19047,7 +19093,7 @@ ] }, { - "uuid": "d4b13a02-d3e0-4610-927a-0f893eb6b2f8", + "uuid": "b4a2be92-c196-4a6f-ae40-7382b6092fe2", "control-id": "pcidss_4_12-9.2", "description": "The description for control-id pcidss_4_12-9.2.", "props": [ @@ -19060,7 +19106,7 @@ ] }, { - "uuid": "ba92fad1-ecfc-4218-be94-ecde8454d5d7", + "uuid": "210e883c-f79a-4340-8f18-f2ca03524aea", "control-id": "pcidss_4_12-10.1", "description": "The description for control-id pcidss_4_12-10.1.", "props": [ @@ -19073,7 +19119,7 @@ ] }, { - "uuid": "ca63bd24-bb9d-4967-b5b3-98a8fec28250", + "uuid": "b585e1e0-bf6c-4f53-8983-a1af6183ac80", "control-id": "pcidss_4_12-10.2", "description": "The description for control-id pcidss_4_12-10.2.", "props": [ @@ -19086,7 +19132,7 @@ ] }, { - "uuid": "c8fba1df-a98d-4937-8e91-3fa78372c121", + "uuid": "712d2511-d4da-43da-94f8-3f5c99417bba", "control-id": "pcidss_4_12-10.3", "description": "The description for control-id pcidss_4_12-10.3.", "props": [ @@ -19099,7 +19145,7 @@ ] }, { - "uuid": "25cca5b3-c38d-49d6-953f-44ab67bb6651", + "uuid": "f24ffbdf-4513-4f36-ac36-5ee96157cc90", "control-id": "pcidss_4_12-10.4.1", "description": "The description for control-id pcidss_4_12-10.4.1.", "props": [ @@ -19112,7 +19158,7 @@ ] }, { - "uuid": "52ada8ae-85d6-44e1-b7cf-7ee32825cb6a", + "uuid": "fd9e69a7-7f04-48f2-ae8e-19442b530890", "control-id": "pcidss_4_12-10.5", "description": "The description for control-id pcidss_4_12-10.5.", "props": [ @@ -19125,7 +19171,7 @@ ] }, { - "uuid": "e3e937e4-16fb-4a2f-9291-8df3adae0bc9", + "uuid": "e6b49ca7-290a-44cf-bc74-a129065d4941", "control-id": "pcidss_4_12-10.6", "description": "The description for control-id pcidss_4_12-10.6.", "props": [ @@ -19138,7 +19184,7 @@ ] }, { - "uuid": "94bb7ec8-2316-4e80-b8cb-1a49f2f296e6", + "uuid": "47e08e56-4682-4ad7-a438-cc2440dd77e0", "control-id": "pcidss_4_12-10.7", "description": "The description for control-id pcidss_4_12-10.7.", "props": [ @@ -19151,7 +19197,7 @@ ] }, { - "uuid": "39c11b6a-0edd-4f56-9d94-abbea7fc2e4d", + "uuid": "4511bb85-f01d-4121-a4f5-12af031e557d", "control-id": "a1-1.1", "description": "The description for control-id a1-1.1.", "props": [ @@ -19164,7 +19210,7 @@ ] }, { - "uuid": "9ad4e73b-5ce9-4b6a-84ea-149ae7f5c172", + "uuid": "9fedc4dc-9318-4e6b-b869-cfe77ccf6582", "control-id": "a1-1.2", "description": "The description for control-id a1-1.2.", "props": [ @@ -19177,7 +19223,7 @@ ] }, { - "uuid": "7c6ff28e-7481-411f-acb3-86c3d0627992", + "uuid": "5c425079-411f-4008-992e-a2dc4ee4c6fa", "control-id": "a1-1.3", "description": "The description for control-id a1-1.3.", "props": [ @@ -19190,7 +19236,7 @@ ] }, { - "uuid": "98e2ba76-427d-456d-ab90-641ede665412", + "uuid": "53ffa5a9-7647-4f8c-a786-70675f68ab11", "control-id": "a1-1.4", "description": "The description for control-id a1-1.4.", "props": [ @@ -19203,7 +19249,7 @@ ] }, { - "uuid": "4b05cdc9-3839-42c7-975e-5ec9845a7c1d", + "uuid": "13a65a27-e20b-450e-95be-112a60aaf448", "control-id": "a1-2.1", "description": "The description for control-id a1-2.1.", "props": [ @@ -19216,7 +19262,7 @@ ] }, { - "uuid": "0add3835-57a0-4aff-bb9a-555d5a6373f9", + "uuid": "72772d5f-92ab-4b85-8661-d7144d52a6ea", "control-id": "a1-2.2", "description": "The description for control-id a1-2.2.", "props": [ @@ -19229,7 +19275,7 @@ ] }, { - "uuid": "44351c7c-2adc-4a88-bb00-43c5fc8223af", + "uuid": "c7529b54-93a8-4fcf-bc70-1ce7171695a4", "control-id": "a1-2.3", "description": "The description for control-id a1-2.3.", "props": [ @@ -19242,7 +19288,7 @@ ] }, { - "uuid": "4da1cc93-e028-449d-839d-f0c638de5bbb", + "uuid": "570ffd45-8eb9-45b9-b6a4-944ff09ebfbc", "control-id": "a2-1.1", "description": "The description for control-id a2-1.1.", "props": [ @@ -19255,7 +19301,7 @@ ] }, { - "uuid": "5fa473bd-df51-4a98-8160-9d920bad64a8", + "uuid": "afa02101-a6e8-459f-bdf6-88a0dabc1a74", "control-id": "a2-1.2", "description": "The description for control-id a2-1.2.", "props": [ @@ -19268,7 +19314,7 @@ ] }, { - "uuid": "191fafc7-7d84-4a42-bff5-81ea128ee12e", + "uuid": "c5ce7873-294b-4876-b60a-1deae4059331", "control-id": "a2-1.3", "description": "The description for control-id a2-1.3.", "props": [ @@ -19281,7 +19327,7 @@ ] }, { - "uuid": "cb508467-200f-44f7-86fe-b6bc3df5d8b1", + "uuid": "2ee02984-beec-4af6-a651-3e92f5e63552", "control-id": "a3-1.1", "description": "The description for control-id a3-1.1.", "props": [ @@ -19294,7 +19340,7 @@ ] }, { - "uuid": "2d1d120c-5b44-49d4-ba81-cda8130b8081", + "uuid": "6e86dd09-0d31-4a13-b852-a5ef8c72aaa1", "control-id": "a3-1.2", "description": "The description for control-id a3-1.2.", "props": [ @@ -19307,7 +19353,7 @@ ] }, { - "uuid": "9d75bf57-3999-427b-9ae8-87df3e6fe895", + "uuid": "3622635a-cf34-43cc-9014-609bc6263ae2", "control-id": "a3-1.3", "description": "The description for control-id a3-1.3.", "props": [ @@ -19320,7 +19366,7 @@ ] }, { - "uuid": "473ae376-89c9-46f4-b98a-f5644afc3b6e", + "uuid": "2e58d01c-ddbd-498b-8f2c-777a9ec76779", "control-id": "a3-1.4", "description": "The description for control-id a3-1.4.", "props": [ @@ -19333,7 +19379,7 @@ ] }, { - "uuid": "5d342aa1-4e5a-4b68-90a4-0b22515db1da", + "uuid": "ba3cf32e-49c5-46bb-b150-b6e3921c6780", "control-id": "a3-2.1", "description": "The description for control-id a3-2.1.", "props": [ @@ -19346,7 +19392,7 @@ ] }, { - "uuid": "a56e0c56-4946-495b-989e-a767c37bf5de", + "uuid": "688df02a-150c-4c6b-a7b5-fc05c8927d85", "control-id": "a3-2.2.1", "description": "The description for control-id a3-2.2.1.", "props": [ @@ -19359,7 +19405,7 @@ ] }, { - "uuid": "acc5147c-f74a-4e16-8dfe-cfc4d39e0fce", + "uuid": "2be3561b-4b9a-4997-a26b-4e9606183bd3", "control-id": "a3-2.3", "description": "The description for control-id a3-2.3.", "props": [ @@ -19372,7 +19418,7 @@ ] }, { - "uuid": "21290493-ce3c-48f2-9092-1ea0feafd30b", + "uuid": "bac5827b-e6b2-4151-a555-a00ee0c43a0f", "control-id": "a3-2.4", "description": "The description for control-id a3-2.4.", "props": [ @@ -19385,7 +19431,7 @@ ] }, { - "uuid": "4976e047-8b25-46d1-922b-32e9c4024416", + "uuid": "741420e2-8075-4246-9706-0c7cb6459599", "control-id": "a3-2.5.1", "description": "The description for control-id a3-2.5.1.", "props": [ @@ -19398,7 +19444,7 @@ ] }, { - "uuid": "5a544112-cc14-4062-8232-f598e918b68e", + "uuid": "744fcdbc-8b16-42cc-9d19-e819a2bd6585", "control-id": "a3-2.5.2", "description": "The description for control-id a3-2.5.2.", "props": [ @@ -19411,7 +19457,7 @@ ] }, { - "uuid": "c6423f37-fecd-43b0-8bb5-b296985f03cf", + "uuid": "f4b05953-bef4-41da-bce0-782455a1fec0", "control-id": "a3-2.6.1", "description": "The description for control-id a3-2.6.1.", "props": [ @@ -19424,7 +19470,7 @@ ] }, { - "uuid": "6a452572-12ab-4367-92f4-17156b0f7199", + "uuid": "013c1c9d-9b76-4f3d-b501-eb98607762d6", "control-id": "a3-3.1.2", "description": "The description for control-id a3-3.1.2.", "props": [ @@ -19437,7 +19483,7 @@ ] }, { - "uuid": "10124d36-658a-45a3-8861-a74e9b43d683", + "uuid": "ab2e016f-f666-4c6f-af9e-88ab9c2632d6", "control-id": "a3-3.2", "description": "The description for control-id a3-3.2.", "props": [ @@ -19450,7 +19496,7 @@ ] }, { - "uuid": "ba78fa75-4491-41fc-b394-ecc2dbf9bb71", + "uuid": "3a76794e-3257-45d1-9c81-748c0b54b630", "control-id": "a3-3.3", "description": "The description for control-id a3-3.3.", "props": [ @@ -19463,7 +19509,7 @@ ] }, { - "uuid": "b85d074d-8dab-4a8a-a8de-95d0dac0b4be", + "uuid": "d0c98d01-0f70-4e09-ac22-e24313ad0f6f", "control-id": "a3-4.1", "description": "The description for control-id a3-4.1.", "props": [ @@ -19476,7 +19522,7 @@ ] }, { - "uuid": "846c5b69-26ee-4811-b634-0b62f69e95bc", + "uuid": "d20e2e28-8eb9-447f-89ae-1b8e1f02f0ec", "control-id": "a3-5.1", "description": "The description for control-id a3-5.1.", "props": [ diff --git a/component-definitions/rhel8/rhel8-anssi-enhanced/component-definition.json b/component-definitions/rhel8/rhel8-anssi-enhanced/component-definition.json index 4d88aa1f..1c43e3d8 100644 --- a/component-definitions/rhel8/rhel8-anssi-enhanced/component-definition.json +++ b/component-definitions/rhel8/rhel8-anssi-enhanced/component-definition.json @@ -3,8 +3,8 @@ "uuid": "b295d181-e9e6-410c-96a5-120787697faf", "metadata": { "title": "Component definition for rhel8", - "last-modified": "2025-12-11T18:04:43.959675+00:00", - "version": "1.9", + "last-modified": "2025-12-17T10:49:45.328702+00:00", + "version": "2.0", "oscal-version": "1.1.3" }, "components": [ @@ -347,7 +347,7 @@ { "name": "Parameter_Value_Alternatives_17", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -365,7 +365,7 @@ { "name": "Parameter_Value_Alternatives_18", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -7525,7 +7525,7 @@ { "name": "Parameter_Value_Alternatives_17", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -7543,7 +7543,7 @@ { "name": "Parameter_Value_Alternatives_18", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { diff --git a/component-definitions/rhel8/rhel8-anssi-high/component-definition.json b/component-definitions/rhel8/rhel8-anssi-high/component-definition.json index bd122385..e77d7207 100644 --- a/component-definitions/rhel8/rhel8-anssi-high/component-definition.json +++ b/component-definitions/rhel8/rhel8-anssi-high/component-definition.json @@ -3,8 +3,8 @@ "uuid": "ee3f4035-1eac-4bf9-afc2-08795f43524d", "metadata": { "title": "Component definition for rhel8", - "last-modified": "2025-12-11T18:05:36.050209+00:00", - "version": "1.7", + "last-modified": "2025-12-17T10:50:40.115409+00:00", + "version": "1.8", "oscal-version": "1.1.3" }, "components": [ @@ -365,7 +365,7 @@ { "name": "Parameter_Value_Alternatives_18", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -383,7 +383,7 @@ { "name": "Parameter_Value_Alternatives_19", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -9193,7 +9193,7 @@ { "name": "Parameter_Value_Alternatives_18", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -9211,7 +9211,7 @@ { "name": "Parameter_Value_Alternatives_19", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { diff --git a/component-definitions/rhel8/rhel8-anssi-intermediary/component-definition.json b/component-definitions/rhel8/rhel8-anssi-intermediary/component-definition.json index 9950af2f..f6e8cfb5 100644 --- a/component-definitions/rhel8/rhel8-anssi-intermediary/component-definition.json +++ b/component-definitions/rhel8/rhel8-anssi-intermediary/component-definition.json @@ -3,8 +3,8 @@ "uuid": "64e51a15-1ac4-48f3-84c6-aa4b5ad14f72", "metadata": { "title": "Component definition for rhel8", - "last-modified": "2025-12-11T18:06:19.180851+00:00", - "version": "1.7", + "last-modified": "2025-12-17T10:51:27.198836+00:00", + "version": "1.8", "oscal-version": "1.1.3" }, "components": [ @@ -329,7 +329,7 @@ { "name": "Parameter_Value_Alternatives_16", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -347,7 +347,7 @@ { "name": "Parameter_Value_Alternatives_17", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -5686,7 +5686,7 @@ { "name": "Parameter_Value_Alternatives_16", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -5704,7 +5704,7 @@ { "name": "Parameter_Value_Alternatives_17", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { diff --git a/component-definitions/rhel8/rhel8-anssi-minimal/component-definition.json b/component-definitions/rhel8/rhel8-anssi-minimal/component-definition.json index 05c7a035..14d752b5 100644 --- a/component-definitions/rhel8/rhel8-anssi-minimal/component-definition.json +++ b/component-definitions/rhel8/rhel8-anssi-minimal/component-definition.json @@ -3,8 +3,8 @@ "uuid": "dca4a913-7a66-4798-b587-254db2359b9b", "metadata": { "title": "Component definition for rhel8", - "last-modified": "2025-12-11T18:06:53.706361+00:00", - "version": "1.5", + "last-modified": "2025-12-17T10:52:04.794802+00:00", + "version": "1.6", "oscal-version": "1.1.3" }, "components": [ @@ -149,7 +149,7 @@ { "name": "Parameter_Value_Alternatives_6", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_00" }, { @@ -167,7 +167,7 @@ { "name": "Parameter_Value_Alternatives_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_00" }, { @@ -1467,7 +1467,7 @@ { "name": "Parameter_Value_Alternatives_6", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_00" }, { @@ -1485,7 +1485,7 @@ { "name": "Parameter_Value_Alternatives_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_00" }, { diff --git a/component-definitions/rhel8/rhel8-cis_rhel8-l1_server/component-definition.json b/component-definitions/rhel8/rhel8-cis_rhel8-l1_server/component-definition.json index 3e3fba69..25707a81 100644 --- a/component-definitions/rhel8/rhel8-cis_rhel8-l1_server/component-definition.json +++ b/component-definitions/rhel8/rhel8-cis_rhel8-l1_server/component-definition.json @@ -3,8 +3,8 @@ "uuid": "06123c91-c99b-48fb-866b-cebd9848462f", "metadata": { "title": "Component definition for rhel8", - "last-modified": "2025-12-11T18:08:32.724107+00:00", - "version": "3.7", + "last-modified": "2025-12-17T10:53:57.574079+00:00", + "version": "3.8", "oscal-version": "1.1.3" }, "components": [ @@ -689,7 +689,7 @@ { "name": "Parameter_Value_Alternatives_36", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -707,7 +707,7 @@ { "name": "Parameter_Value_Alternatives_37", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -9850,7 +9850,7 @@ { "name": "Parameter_Value_Alternatives_36", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -9868,7 +9868,7 @@ { "name": "Parameter_Value_Alternatives_37", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { diff --git a/component-definitions/rhel8/rhel8-cis_rhel8-l1_workstation/component-definition.json b/component-definitions/rhel8/rhel8-cis_rhel8-l1_workstation/component-definition.json index 606c9e1f..2901ed51 100644 --- a/component-definitions/rhel8/rhel8-cis_rhel8-l1_workstation/component-definition.json +++ b/component-definitions/rhel8/rhel8-cis_rhel8-l1_workstation/component-definition.json @@ -3,8 +3,8 @@ "uuid": "b9989c96-f468-4740-8fbb-45451e6617c7", "metadata": { "title": "Component definition for rhel8", - "last-modified": "2025-12-11T18:09:19.913586+00:00", - "version": "3.9", + "last-modified": "2025-12-17T10:54:50.722251+00:00", + "version": "4.0", "oscal-version": "1.1.3" }, "components": [ @@ -689,7 +689,7 @@ { "name": "Parameter_Value_Alternatives_36", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -707,7 +707,7 @@ { "name": "Parameter_Value_Alternatives_37", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -9676,7 +9676,7 @@ { "name": "Parameter_Value_Alternatives_36", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -9694,7 +9694,7 @@ { "name": "Parameter_Value_Alternatives_37", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { diff --git a/component-definitions/rhel8/rhel8-cis_rhel8-l2_server/component-definition.json b/component-definitions/rhel8/rhel8-cis_rhel8-l2_server/component-definition.json index 309ae7c9..1757ad92 100644 --- a/component-definitions/rhel8/rhel8-cis_rhel8-l2_server/component-definition.json +++ b/component-definitions/rhel8/rhel8-cis_rhel8-l2_server/component-definition.json @@ -3,8 +3,8 @@ "uuid": "77746010-6ea0-42aa-9b34-f14ce18e20f9", "metadata": { "title": "Component definition for rhel8", - "last-modified": "2025-12-11T18:07:45.626688+00:00", - "version": "4.3", + "last-modified": "2025-12-17T10:53:02.668904+00:00", + "version": "4.4", "oscal-version": "1.1.3" }, "components": [ @@ -851,7 +851,7 @@ { "name": "Parameter_Value_Alternatives_45", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -869,7 +869,7 @@ { "name": "Parameter_Value_Alternatives_46", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -12729,7 +12729,7 @@ { "name": "Parameter_Value_Alternatives_45", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -12747,7 +12747,7 @@ { "name": "Parameter_Value_Alternatives_46", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { diff --git a/component-definitions/rhel8/rhel8-cis_rhel8-l2_workstation/component-definition.json b/component-definitions/rhel8/rhel8-cis_rhel8-l2_workstation/component-definition.json index b68830ef..3a044048 100644 --- a/component-definitions/rhel8/rhel8-cis_rhel8-l2_workstation/component-definition.json +++ b/component-definitions/rhel8/rhel8-cis_rhel8-l2_workstation/component-definition.json @@ -3,8 +3,8 @@ "uuid": "22768ddf-d6e1-4d57-9409-6a35fd1883ca", "metadata": { "title": "Component definition for rhel8", - "last-modified": "2025-12-11T18:10:10.821944+00:00", - "version": "4.3", + "last-modified": "2025-12-17T10:55:50.849535+00:00", + "version": "4.4", "oscal-version": "1.1.3" }, "components": [ @@ -851,7 +851,7 @@ { "name": "Parameter_Value_Alternatives_45", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -869,7 +869,7 @@ { "name": "Parameter_Value_Alternatives_46", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -12567,7 +12567,7 @@ { "name": "Parameter_Value_Alternatives_45", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -12585,7 +12585,7 @@ { "name": "Parameter_Value_Alternatives_46", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { diff --git a/component-definitions/rhel8/rhel8-ism_o-base/component-definition.json b/component-definitions/rhel8/rhel8-ism_o-base/component-definition.json index a31ccd21..4ed7fa8f 100644 --- a/component-definitions/rhel8/rhel8-ism_o-base/component-definition.json +++ b/component-definitions/rhel8/rhel8-ism_o-base/component-definition.json @@ -3,8 +3,8 @@ "uuid": "a2008f82-e4ed-407a-bef6-183adc890d41", "metadata": { "title": "Component definition for rhel8", - "last-modified": "2025-10-17T08:35:27.669488+00:00", - "version": "1.9", + "last-modified": "2025-12-17T10:56:37.379227+00:00", + "version": "2.0", "oscal-version": "1.1.3" }, "components": [ @@ -167,7 +167,7 @@ { "name": "Parameter_Value_Alternatives_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -6958,7 +6958,7 @@ { "name": "Parameter_Value_Alternatives_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { diff --git a/component-definitions/rhel8/rhel8-ism_o-secret/component-definition.json b/component-definitions/rhel8/rhel8-ism_o-secret/component-definition.json index f257a563..042d51fd 100644 --- a/component-definitions/rhel8/rhel8-ism_o-secret/component-definition.json +++ b/component-definitions/rhel8/rhel8-ism_o-secret/component-definition.json @@ -3,8 +3,8 @@ "uuid": "94022509-931e-45be-8b82-07d701b58383", "metadata": { "title": "Component definition for rhel8", - "last-modified": "2025-10-17T08:36:10.878844+00:00", - "version": "1.7", + "last-modified": "2025-12-17T10:57:21.868880+00:00", + "version": "1.8", "oscal-version": "1.1.3" }, "components": [ @@ -167,7 +167,7 @@ { "name": "Parameter_Value_Alternatives_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -7206,7 +7206,7 @@ { "name": "Parameter_Value_Alternatives_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { diff --git a/component-definitions/rhel8/rhel8-ism_o-top_secret/component-definition.json b/component-definitions/rhel8/rhel8-ism_o-top_secret/component-definition.json index ba2f31da..de334c94 100644 --- a/component-definitions/rhel8/rhel8-ism_o-top_secret/component-definition.json +++ b/component-definitions/rhel8/rhel8-ism_o-top_secret/component-definition.json @@ -3,8 +3,8 @@ "uuid": "58dcf5ea-6e5f-45eb-ab43-a97553d39619", "metadata": { "title": "Component definition for rhel8", - "last-modified": "2025-10-17T08:36:54.170842+00:00", - "version": "1.7", + "last-modified": "2025-12-17T10:58:05.314880+00:00", + "version": "1.8", "oscal-version": "1.1.3" }, "components": [ @@ -167,7 +167,7 @@ { "name": "Parameter_Value_Alternatives_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -7330,7 +7330,7 @@ { "name": "Parameter_Value_Alternatives_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { diff --git a/component-definitions/rhel8/rhel8-pcidss_4-base/component-definition.json b/component-definitions/rhel8/rhel8-pcidss_4-base/component-definition.json index be18fe68..cd2fa2c2 100644 --- a/component-definitions/rhel8/rhel8-pcidss_4-base/component-definition.json +++ b/component-definitions/rhel8/rhel8-pcidss_4-base/component-definition.json @@ -3,8 +3,8 @@ "uuid": "086b160b-e979-4e7f-ab46-a2f7c88b7bdd", "metadata": { "title": "Component definition for rhel8", - "last-modified": "2025-12-11T18:12:49.041322+00:00", - "version": "2.3", + "last-modified": "2025-12-17T10:58:55.538765+00:00", + "version": "2.4", "oscal-version": "1.1.3" }, "components": [ @@ -311,7 +311,7 @@ { "name": "Parameter_Value_Alternatives_15", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -329,7 +329,7 @@ { "name": "Parameter_Value_Alternatives_16", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -8695,7 +8695,7 @@ { "name": "Parameter_Value_Alternatives_15", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -8713,7 +8713,7 @@ { "name": "Parameter_Value_Alternatives_16", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { diff --git a/component-definitions/rhel8/rhel8-stig_rhel8-high/component-definition.json b/component-definitions/rhel8/rhel8-stig_rhel8-high/component-definition.json index 091a04cc..748c7c88 100644 --- a/component-definitions/rhel8/rhel8-stig_rhel8-high/component-definition.json +++ b/component-definitions/rhel8/rhel8-stig_rhel8-high/component-definition.json @@ -3,8 +3,8 @@ "uuid": "a6de6ef1-cb05-40a3-a5d0-09b4b4949aee", "metadata": { "title": "Component definition for rhel8", - "last-modified": "2025-12-11T18:13:40.879300+00:00", - "version": "2.9", + "last-modified": "2025-12-17T10:59:55.600629+00:00", + "version": "3.0", "oscal-version": "1.1.3" }, "components": [ @@ -491,7 +491,7 @@ { "name": "Parameter_Value_Alternatives_25", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -509,7 +509,7 @@ { "name": "Parameter_Value_Alternatives_26", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -7248,7 +7248,7 @@ { "name": "Parameter_Value_Alternatives_25", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -7266,7 +7266,7 @@ { "name": "Parameter_Value_Alternatives_26", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { diff --git a/component-definitions/rhel8/rhel8-stig_rhel8-low/component-definition.json b/component-definitions/rhel8/rhel8-stig_rhel8-low/component-definition.json index 65af2e99..a6e69df1 100644 --- a/component-definitions/rhel8/rhel8-stig_rhel8-low/component-definition.json +++ b/component-definitions/rhel8/rhel8-stig_rhel8-low/component-definition.json @@ -3,8 +3,8 @@ "uuid": "4766b5c9-d8da-483e-a2b2-41cdbdd0a7cb", "metadata": { "title": "Component definition for rhel8", - "last-modified": "2025-12-11T18:15:23.582531+00:00", - "version": "2.9", + "last-modified": "2025-12-17T11:01:53.750541+00:00", + "version": "3.0", "oscal-version": "1.1.3" }, "components": [ @@ -491,7 +491,7 @@ { "name": "Parameter_Value_Alternatives_25", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -509,7 +509,7 @@ { "name": "Parameter_Value_Alternatives_26", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -7288,7 +7288,7 @@ { "name": "Parameter_Value_Alternatives_25", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -7306,7 +7306,7 @@ { "name": "Parameter_Value_Alternatives_26", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { diff --git a/component-definitions/rhel8/rhel8-stig_rhel8-medium/component-definition.json b/component-definitions/rhel8/rhel8-stig_rhel8-medium/component-definition.json index 52a360b5..6ebc645a 100644 --- a/component-definitions/rhel8/rhel8-stig_rhel8-medium/component-definition.json +++ b/component-definitions/rhel8/rhel8-stig_rhel8-medium/component-definition.json @@ -3,8 +3,8 @@ "uuid": "d6bf05ff-8086-4127-a221-4429b77ab593", "metadata": { "title": "Component definition for rhel8", - "last-modified": "2025-12-11T18:14:32.255541+00:00", - "version": "2.9", + "last-modified": "2025-12-17T11:00:55.945517+00:00", + "version": "3.0", "oscal-version": "1.1.3" }, "components": [ @@ -491,7 +491,7 @@ { "name": "Parameter_Value_Alternatives_25", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -509,7 +509,7 @@ { "name": "Parameter_Value_Alternatives_26", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -12449,7 +12449,7 @@ { "name": "Parameter_Value_Alternatives_25", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -12467,7 +12467,7 @@ { "name": "Parameter_Value_Alternatives_26", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { diff --git a/component-definitions/rhel9/rhel9-anssi-enhanced/component-definition.json b/component-definitions/rhel9/rhel9-anssi-enhanced/component-definition.json index d760a23a..1e65f696 100644 --- a/component-definitions/rhel9/rhel9-anssi-enhanced/component-definition.json +++ b/component-definitions/rhel9/rhel9-anssi-enhanced/component-definition.json @@ -3,8 +3,8 @@ "uuid": "fb4d7f88-deb5-45ad-a88a-f90300331665", "metadata": { "title": "Component definition for rhel9", - "last-modified": "2025-12-11T18:16:10.145195+00:00", - "version": "1.4", + "last-modified": "2025-12-17T11:02:45.835322+00:00", + "version": "1.5", "oscal-version": "1.1.3" }, "components": [ @@ -365,7 +365,7 @@ { "name": "Parameter_Value_Alternatives_18", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -383,7 +383,7 @@ { "name": "Parameter_Value_Alternatives_19", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -7278,7 +7278,7 @@ { "name": "Parameter_Value_Alternatives_18", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -7296,7 +7296,7 @@ { "name": "Parameter_Value_Alternatives_19", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { diff --git a/component-definitions/rhel9/rhel9-anssi-high/component-definition.json b/component-definitions/rhel9/rhel9-anssi-high/component-definition.json index d9f1146e..17ece30f 100644 --- a/component-definitions/rhel9/rhel9-anssi-high/component-definition.json +++ b/component-definitions/rhel9/rhel9-anssi-high/component-definition.json @@ -3,8 +3,8 @@ "uuid": "ba234c1c-cc49-4b41-a997-69fd477a45fd", "metadata": { "title": "Component definition for rhel9", - "last-modified": "2025-12-11T18:16:59.883691+00:00", - "version": "1.4", + "last-modified": "2025-12-17T11:03:42.161031+00:00", + "version": "1.5", "oscal-version": "1.1.3" }, "components": [ @@ -383,7 +383,7 @@ { "name": "Parameter_Value_Alternatives_19", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -401,7 +401,7 @@ { "name": "Parameter_Value_Alternatives_20", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -9014,7 +9014,7 @@ { "name": "Parameter_Value_Alternatives_19", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -9032,7 +9032,7 @@ { "name": "Parameter_Value_Alternatives_20", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { diff --git a/component-definitions/rhel9/rhel9-anssi-intermediary/component-definition.json b/component-definitions/rhel9/rhel9-anssi-intermediary/component-definition.json index 07ba5a5c..b53695d2 100644 --- a/component-definitions/rhel9/rhel9-anssi-intermediary/component-definition.json +++ b/component-definitions/rhel9/rhel9-anssi-intermediary/component-definition.json @@ -3,8 +3,8 @@ "uuid": "08306d16-4996-4b5d-bbf3-1800c9877ae1", "metadata": { "title": "Component definition for rhel9", - "last-modified": "2025-12-11T18:17:42.142180+00:00", - "version": "1.4", + "last-modified": "2025-12-17T11:04:29.770656+00:00", + "version": "1.5", "oscal-version": "1.1.3" }, "components": [ @@ -347,7 +347,7 @@ { "name": "Parameter_Value_Alternatives_17", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -365,7 +365,7 @@ { "name": "Parameter_Value_Alternatives_18", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -5558,7 +5558,7 @@ { "name": "Parameter_Value_Alternatives_17", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -5576,7 +5576,7 @@ { "name": "Parameter_Value_Alternatives_18", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { diff --git a/component-definitions/rhel9/rhel9-anssi-minimal/component-definition.json b/component-definitions/rhel9/rhel9-anssi-minimal/component-definition.json index e01790bc..31332407 100644 --- a/component-definitions/rhel9/rhel9-anssi-minimal/component-definition.json +++ b/component-definitions/rhel9/rhel9-anssi-minimal/component-definition.json @@ -3,8 +3,8 @@ "uuid": "5e2a14d9-cdc9-4476-b4c5-04ab3a945548", "metadata": { "title": "Component definition for rhel9", - "last-modified": "2025-12-11T18:18:15.893736+00:00", - "version": "1.4", + "last-modified": "2025-12-17T11:05:08.424160+00:00", + "version": "1.5", "oscal-version": "1.1.3" }, "components": [ @@ -167,7 +167,7 @@ { "name": "Parameter_Value_Alternatives_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_00" }, { @@ -185,7 +185,7 @@ { "name": "Parameter_Value_Alternatives_8", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_00" }, { @@ -1458,7 +1458,7 @@ { "name": "Parameter_Value_Alternatives_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_00" }, { @@ -1476,7 +1476,7 @@ { "name": "Parameter_Value_Alternatives_8", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_00" }, { diff --git a/component-definitions/rhel9/rhel9-ism_o-base/component-definition.json b/component-definitions/rhel9/rhel9-ism_o-base/component-definition.json index 19d98354..d5111af0 100644 --- a/component-definitions/rhel9/rhel9-ism_o-base/component-definition.json +++ b/component-definitions/rhel9/rhel9-ism_o-base/component-definition.json @@ -3,8 +3,8 @@ "uuid": "388b9288-f46a-40ea-9738-afb900d979c2", "metadata": { "title": "Component definition for rhel9", - "last-modified": "2025-10-17T08:37:46.034708+00:00", - "version": "1.4", + "last-modified": "2025-12-17T11:05:55.788737+00:00", + "version": "1.5", "oscal-version": "1.1.3" }, "components": [ @@ -167,7 +167,7 @@ { "name": "Parameter_Value_Alternatives_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -6877,7 +6877,7 @@ { "name": "Parameter_Value_Alternatives_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { diff --git a/component-definitions/rhel9/rhel9-ism_o-secret/component-definition.json b/component-definitions/rhel9/rhel9-ism_o-secret/component-definition.json index 60889d17..449b1714 100644 --- a/component-definitions/rhel9/rhel9-ism_o-secret/component-definition.json +++ b/component-definitions/rhel9/rhel9-ism_o-secret/component-definition.json @@ -3,8 +3,8 @@ "uuid": "843d4fc0-6ea9-457d-a5e4-183938619a7c", "metadata": { "title": "Component definition for rhel9", - "last-modified": "2025-10-17T08:38:29.609148+00:00", - "version": "1.4", + "last-modified": "2025-12-17T11:06:39.913673+00:00", + "version": "1.5", "oscal-version": "1.1.3" }, "components": [ @@ -167,7 +167,7 @@ { "name": "Parameter_Value_Alternatives_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -7125,7 +7125,7 @@ { "name": "Parameter_Value_Alternatives_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { diff --git a/component-definitions/rhel9/rhel9-ism_o-top_secret/component-definition.json b/component-definitions/rhel9/rhel9-ism_o-top_secret/component-definition.json index 8a537ae0..34b8aa3e 100644 --- a/component-definitions/rhel9/rhel9-ism_o-top_secret/component-definition.json +++ b/component-definitions/rhel9/rhel9-ism_o-top_secret/component-definition.json @@ -3,8 +3,8 @@ "uuid": "3ac308b5-d965-4da5-ab3f-1c7de14c5a9f", "metadata": { "title": "Component definition for rhel9", - "last-modified": "2025-10-17T08:39:13.260308+00:00", - "version": "1.4", + "last-modified": "2025-12-17T11:07:22.955326+00:00", + "version": "1.5", "oscal-version": "1.1.3" }, "components": [ @@ -167,7 +167,7 @@ { "name": "Parameter_Value_Alternatives_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -7249,7 +7249,7 @@ { "name": "Parameter_Value_Alternatives_7", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { diff --git a/component-definitions/rhel9/rhel9-pcidss_4-base/component-definition.json b/component-definitions/rhel9/rhel9-pcidss_4-base/component-definition.json index 007106ef..51ca2c12 100644 --- a/component-definitions/rhel9/rhel9-pcidss_4-base/component-definition.json +++ b/component-definitions/rhel9/rhel9-pcidss_4-base/component-definition.json @@ -3,8 +3,8 @@ "uuid": "82eef6a2-1ce5-4817-af27-287cf97df8aa", "metadata": { "title": "Component definition for rhel9", - "last-modified": "2025-12-11T18:20:55.612819+00:00", - "version": "1.6", + "last-modified": "2025-12-17T11:08:12.684423+00:00", + "version": "1.7", "oscal-version": "1.1.3" }, "components": [ @@ -311,7 +311,7 @@ { "name": "Parameter_Value_Alternatives_15", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -329,7 +329,7 @@ { "name": "Parameter_Value_Alternatives_16", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, { @@ -8576,7 +8576,7 @@ { "name": "Parameter_Value_Alternatives_15", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT'}", + "value": "{'default': 'SHA512', 'SHA512': 'SHA512', 'SHA256': 'SHA256', 'yescrypt': 'YESCRYPT', 'cis_ubuntu2204': 'SHA512|YESCRYPT', 'cis_ubuntu2404': 'SHA512|YESCRYPT', 'cis_rhel10': 'YESCRYPT|SHA512'}", "remarks": "rule_set_000" }, { @@ -8594,7 +8594,7 @@ { "name": "Parameter_Value_Alternatives_16", "ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd", - "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt'}", + "value": "{'default': 'sha512', 'sha512': 'sha512', 'yescrypt': 'yescrypt', 'cis_rhel10': 'yescrypt|sha512'}", "remarks": "rule_set_000" }, {